Category Archives: Uncategorized

Frequently Asked Questions


FAQs Related to International Journal for paper Publication

  • How to submit a paper in International Journal?

  • Journal provides two options (1) author can directly send paper at: (2) Online Submission form, For online submission visit. Submission through online medium is fast and easy for scholars.
  • How many days do the reviewers take to respond for paper acceptance or rejection?

  • Review time depends on the reviewer but normally it takes 2 to 5 days. As per paper content time vary, but for some fast review, the scholar can request at after paper submission.
  • What is the paper submission format (pdf, doc)?

  • Journal accepts paper in all pdf and doc files. But it’s better if scholars provide doc file.
  • What are publication charges?

  • Publication fees is categorize into two types. (1) Indian author charges are 1000 Rs, we reduce this fees upto 600Rs as per paper quality (good quality paper less price). (2) Non-Indian ublication charge is 32USD.
  • Does the author get digital certificates after publication?

  • Yes, all authors in a research paper get separate digital certificates.
  • Do authors get digital or hard copies of paper and certificates?

  • This is an online journal so only soft or digital copies of paper and certificates were provided.
  • Paper publication link?

  • Scholar check volume issue of publication mention in certificate and visit on Archives page of the portal. Select specific volume and issue link after this you can search on-page by author, paper title, and click on the download button to view your published paper.
  • How to complete the copyright form?

  • In copyright write detail of first / corresponding author,
  • How to submit publication fees?

  • Indian authors can pay by Netbanking, UPI options available at: . Non-Indian authors can pay by Paypal
  • Journal Indexing on other sites?

  • We have list all our indexing at
  • Maximum limit for number of author and pages ? Journal charge extra amount after any specific number of authors/pages?

  • No extra charges for increase in number of pages or authors in page. Minimum one author and minimum 3 pages is lower limit for publication. No maximum limit set for the autho and page count.

For other queries, scholars can chat with our staff and resolve their doubts. We are ready to help you.



Published by:

IJSRET Volume 7 Issue 3, May-June-2021


Estimation of Cooling/Heating Loads Quantity of Air (CFM) and Hence Tons of Refrigeration Required for Air-Conditioning of Commercial Establishment
Authors:- Asst. Prof. Attalique Rabbani, Moazzam Mohd Mujeeb, Samad Bin Khaled, Abdul Wahab

Abstract- More than 90 per cent of our time is spent in buildings i.e. either in the office or at home. Energy used in buildings (residential and commercial) accounts for a significant percentage of a country’s total energy consumption. This percentage depends greatly on the degree of electrification, the level of urbanization, the amount of building area per capita, the prevailing climate, as well as national and local policies to promote efficiency. In many countries, buildings consume more energy than transport and industry. The International Energy Agency (IEA) statistics estimate that globally, the building sector is responsible for more electricity consumption than any other sector, 42 per cent. Today, the field of air conditioning design is more technologically challenging than ever before. While design innovations and product improvement promise sleeker, more versatile, more powerful and more energy-efficient air conditioners, the challenge today lies in identifying the most appropriate products, for their application at hand. Indeed, today the emphasis is no more on understanding air conditioning “products” but on crating “solutions” and not just solutions, but “customized solutions” that suit specific needs i.e., heating/cooling or ventilation. Central Air-conditioning plant comprises of Heating Ventilation and Air-Conditioning. Conditioning means control of mainly Temperature and humidity apart from dust odour. Temperature and humidity is control through vapour refrigeration cycle, having refrigeration like R-134a. Air is composed mainly of gases. The major gaseous components of clean, dry air near sea level are approximately 21% oxygen, 78% nitrogen, 1% argon, and 0.04% carbon dioxide. Normal outdoor air contains varying amounts of foreign materials (permanent atmospheric impurities). These materials can arise from natural processes such as wind erosion, sea spray evaporation, volcanic eruption, and metabolism or decay of organic matter. The natural contaminant concentrations in the air that we breathe vary but are usually lower than those caused by human activity. To evaluate the thermal load, quantity of air to be distributed and ventilation air in the conditioned space Carrier developed software HAP v.4.41 is used. Quantity of air, which is evaluated from the heat gains/loss into the space need to be properly evaluated considering the orientation if the building, type of glass/structure, occupancy and nature of work in the conditioned area, so is the quantity of air need to be exhausted. And to evaluate ton of the refrigeration required for the same.

A Survey on Cloud Environment Intrusion Detection System Types and Issues
Authors:- Asst. Prof. Ms. Amlesh Singh, Dean Dr. Pratima Gautam

Abstract- Cloud reduces implementation cost and increases flexibility of data access around the globe. But this easiness of uses introduces the vulnerability in the network. So different type of attacks inform of intrusion was prepared and execute by insider or outsider virtual machines in the cloud. Detection of such type of attacks needs to develop intrusion detection system. This paper has found type of intrusion in cloud environment. Further paper has summarized various techniques proposed by scholars to develop a intrusion detection system. Various intrusion detection system were classified as per detection approaches adopt by researcher. Finally paper detailed the issues of cloud security that make this area of research more complex.

An Analysis of Receiver Operating Characteristic Curve, Area Under Curve and Precision Recall
Authors:- Associate Prof. Praveen Gujjar J, Asst. Prof. Naveen Kumar V

Abstract- Receiver Operating Characteristic (ROC) curves are commonly used to present results for binary decision problems in machine learning. However, when dealing with highly skewed datasets, Precision-Recall (PR) curves give a more informative picture of an algorithm’s performance. Researcher show that a deep connection exists between ROC space and PR space, such that a curve dominates in ROC space if and only if it dominates in PR space. A corollary is the notion of an achievable PR curve, which has properties much like the convex hull in ROC space; researcher show an efficient algorithm for computing this curve. Finally, we also note differences in the two types of curves are significant for algorithm design. For example, in PR space it is incorrect to linearly interpolate between points. Furthermore, algorithms that optimize the area under the ROC curve are not guaranteed to optimize the area under the PR curve.

Experimental Study on Dolomite Bricks with Positive Permanent Linear Change
Authors:- Ms. Varnita Mahant, Asst. Prof. Ms. Swati Agrawal, Asst. Prof. Mr. Akshit Lamba

Abstract- Dolomite brick is that the foremost vital stable refractory under the working conditions of Argon Oxygen De-carbonization (AOD). For AOD applications, the Dolomite bricks should have positive Permanent Linear Change (PLC) on re-heating. A positive PLC dolomite brick has higher life and best fitted to joint less refractory lining with no cobble stoning defect. Therefore the event of dolomite bricks having positive PLC during applications could also be a challenge for refractory manufacturing industry. Within this investigation, dolomite refractory bricks were prepared by varying different additive with an intention to urge the positive PLC of the brick. It’s documented that Iron Oxide could also be an honest additive for dolomite brick sintering. it is also been reported that monoclinic zirconia (m-ZrO2) additive improves the BD, CCS and PLC of dolomite brick. During this background, first trial composition was containing a tough and fast amount of 1% m-ZrO2 and different concentration and sorts of iron oxide. Mill scale containing Fe2O3 was added in two different concentrations 0.5%, 1% and in another trial 0.25% of nano Fe2O3 was added. Fe2O3 containing bricks showed an honest improvement in BD and CCS because of the upper sintering of dolomite grains in presence of liquid formation during sintering by the presence of Fe2O3.The CCS value was within the range 750-800 kg/cm2. However, the PLC value was negative within the range of -0.2 to -0.35%. relying on this result, new additive, Chrome Green oxide was then used. it has been found that the PLC tends to be positive with increase in Cr2O3 content. However, in presence of Cr2O3 the m-ZrO2 it had been not performing well. Finally m-ZrO2 was removed and a far better percentage of Cr2O3 additives showed the positive PLC (+ 0.12%) of the dolomite brick. The brick showed a CCS value of 650 g/cm2. this is often often within the suitable limit.

Memory Organization in Computer Architecture
Authors:- Kishan Singh, Aniket Singh, Asst. Prof. Rohini Rathod

Abstract- This article presents give an general idea of the memory organization in computer architecture .In this paper we will learn about type of memory and there memory organization in COA (computer application and architecture). Memory is employed for storing programs and knowledge that area unit needed to perform a particular task. A memory unit is that the assortment of storage units or devices along. The memory unit stores the binary data within the variety of bits. The classification of primary and secondary memory, the different types of ROM and RAM we will learn about direct mapping in the article.

IOT Based Healthcare Monitoring and Intelligence
Authors:- Namrata Jewargi, Sonal Shinde, Mr. Pratap Nair

Abstract- Nowadays, People are getting more prone to diseases and medical problems more than ever. So to reduce the Regular Routine Check-ups, an IOT based system which is Smart and Intelligent using Sensors for sick patients examination has been proposed here. Healthcare Services using IOT based Platform will make a huge difference for medical field. Using Internet of Things with Wireless Connectivity alongside an Android Application which will make the Doctors and Patients easier to communicate. The proposed system here is an Smart and Intelligent system that will give proper medicine the patient his/her with prescription that will be shown on Patient’s Phone. Any updates related to medicines given by doctor’s will be shown on Patient’s phone and will alarm the patient about the right timings and right medicines.

IOT Based Surveillance Robotic Car Using Raspberry Pi
Authors:- Aniket M. Ainapure, Akshay kumar S. Basargav, Sanket V. Mhetar, Asst. Prof. Saurabh R. Prasad

Abstract- Robots have found a drastically increasing demand in day-to-day life. In this present work, a Raspberry Pi based spy robot with remote monitoring and control through Internet of Things (IoT) has been developed. Because of IoT feature, it overcomes the problem of limited range surveillance. The spy robot system comprises the Raspberry Pi (small single-board computer), night vision pi camera and sensors. This robot can be controlled with the help of laptop/mobile. The proposed robot is small in size thus capable of manoeuvring into area where human access is not easily possible. This surveillance system using spy robot can be customized for various fields like industries, banks and shopping malls. This system will save human live, and protect the country from enemies. We have also developed a webpage consisting of Graphical User Interface (GUI) application to facilitate the robot control. The live streaming ability of the Pi allows the camera feed to be analysed from any location using internet.

Review Paper on the Study of Permeable Pavement
Authors:- Aditi S. Shinde, Shilpa B. More, Onkar S. Shekade, Pranay D. Shelar, Asst. Prof. Baliram R. Warvate

Abstract- Permeable pavement is used in construction industries such as, parking lots, low–traffic roads and sidewalks. It consist of porous concrete, portland cement concrete, coarse aggregate, fine aggregate, water, cement and admixtures. From recent studies, it is conclude that permeable pavement is best solution to reduce stormwater pollution. As per litrearure review it is seen that permeable pavement is an eco–friendly paving material that allows water to percolate directly through the surface and recharge groundwater. And also can reduce volumes and improve water quality of stormwater runoff by allowing water to percolate through it’s joints, while being filtered through layers of aggregate

Mandatory Seat Belt With Steering Controlled Head Light
Authors:- Thakkar Vrushabh, Sorathia Nishant, Jethva Hardik, Diwasaliwala Kushang, Bhure Kunal, Asst. Prof. Dhruv Solanki

Abstract- The purpose of this project was done to focus on the design and working of an Arduino based Adaptive Headlight System (AHS) for automobile safety. The highest fatal accidents occur on the curved road at night time. In maximum cases, the recognition of objects in the traffic zone plays an important role. These facts point to the necessity of the role of automobile adaptive headlight systems. The dazzling headlights also contribute to recognition of objects due to temporary vision loss. Components that are easily available in the market are suitable for adaptive headlight system. The system is designed to receive input from the sensors and manipulate the data which drives the motor connected to the headlights. Also, the headlights brightness is automatically varied to prevent glare on other drivers. Safety is a precaution taken to live our life to live in a better way. Safety is a main concern while considering automobiles too. Basically, our little carelessness has led to many accidents in roadways. Negligence of wearing seatbelt is also a major reason for the fatal accident. To prevent that we are making the seatbelt as a mandatory one. Unless or until the seatbelt the driver will not be able to start the vehicle. Our innovation is done by placing the IR sensor in the seatbelt and the IR sensor is connected to the microcontroller. The microcontroller is connected to the ignition coil. When the heartbeat sensor senses the heartbeat, the signal is transmitted to the microcontroller which makes the ignition coil to ignite and the spark plug sparks and the car starts. By making our innovation in seatbelt, carelessness transforms into mandatory and it also increase the safety level in the automobile.

Survey on Content Based Disaster Management Using Social Media
Authors:- Prof. Ashish P. Mohod, Vedant Dhurve, Krutika Hedaoo, Himanshu Itankar, Jayesh Lanjewar

Abstract- Today, Online Social Media such as Twitter, Facebook, WhatsApp, are important sources of real-time information related to things happen around us. People use social media for discussing different situation like disaster / crisis including both natural and man-made disasters. We can use this information for Disaster management. There has been a lot of work on designing information systems that would be useful for aiding post and pre disaster relief operations. We need Automatic System for gathering critical information and coordinating relief ops. And Also need to Learn from Prior Events and be prepared accordingly. Hence we have used Twitter API to access the twitter data. In this project we propose a natural disaster analysis interface that solely makes use of tweets generated by the twitter user during the event of disasters. We observe that our analysis of data from social media provides a viable, economical, uncensored and real-time alternative to traditional methods for disaster analysis and the perception of affected population towards a natural disaster.

Smart Energy Efficient Home Automation System Using IOT
Authors:- Asst. Prof Shaik Fareed Ahmed, Mohammed Abdul Sami Rahman, Syed Mudaseer Ahmed Razvi, Adeel Ahmed

Abstract- Advancement in IoT based application has become the state-of-the art technology among there searcher due to the availability of Internet everywhere. To make the application more user friendly, web based and android based technologies have gained their importance in this cutting edge technology. In this paper, smart energy efficient home automation system is proposed that can access and control the home equipments from every corner of the world. For this system, Internet connectivity module is attached to the main supply unit of the home system which can be accessed through the Internet. For wireless connectivity, the static IP address is used. Home automation is based on multimodal application that can be operated using voice recognition command of the user using the Google Assistant or through a web based application. Thus, main objective of this work is to make our home automation system more secure and intelligent.

Website Like Github for Project Sharing and Open Source Work
Authors:- Gitanjali Mukadam, Nandini Naik, Samyukta Sandeep, Rashmi Mada, Prof. Audumber Umbare

Abstract- The goal of this project is to create a git-based website. The website will provide users the option to store all the code that they are working in a public or private database/repository. If the repository is public then the code is available to download on the website for other users. This gives users a chance to collaborate with people working on the same topic of interest around the world. In simpler words the website is going to be a social networking site for software enthusiasts around the world.

Disease Prediction System in New Normal
Authors:- Sonal Shilimkar, Pratiksha Thosar, Prajakta Dharade, Ayushi Patel, Asst. Prof. Varsha Pimprale

Abstract- In this disease prediction system follows normal rules. The system is designed such that to provide a facility predicting disease from given reports. Report can be in the form of image (MRI, x-Ray, mammography, etc). Or in the form of input parameters like numerical value came with the result of reports. The system will take an input from the user for specific disease the system will follow image processing techniques to process and extract result from image. The result will be provided to a user. The system will also suggest nearby specialists for detected disease.

A Review on Applications of Artificial Intelligence for Public Cloud
Authors:- Assistant Professor Anumandla Mounika

Abstract- Artificial Intelligence has additionally made it less complicated for individuals to trade as well as invest. Before artificial intelligence, evaluating stock market information was an opportunity taking in and also complicated for individuals. Currently, individuals have the energy to commit at their fingertips. They may analysis which shares that they want to buy and they can know the danger of investing by looking at just how the company has performed in the past. This also creates the stock market much more affordable because it is now simpler to invest. Folks may analyze the changes in stock just before the put-in, this caused even more reliability in trading.

Survey on IoT Security: Challenges and Solution with ML, AI, Block Chain Technology
Authors:- P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N, HOD. Dr.Narasimhamurthy M S

Abstract- Internet of Things (IoT) is one of the most rapidly used technologies in the last decade in various applications. The smart things are connected in wireless or wired for communication, processing, computing, and monitoring different real-time scenarios. The things are heterogeneous and have low memory, less processing power. The implementation of the IoT system comes with security and privacy challenges because traditional based existing security protocols do not suitable for IoT devices. In this survey, the authors initially described an overview of the IoT technology and the area of its application. The primary security issue CIA (confidentially, Integrity, Availability) and layer-wise issues are identified. Then the authors systematically study the three primary technology Machine learning(ML), Artificial intelligence (AI), and Blockchain for addressing the security issue in IoT. In the end, an analysis of this survey, security issues solved by the ML, AI, and Blockchain with research challenges are mention.

Covid19: Distance Learning in Times of Crisis(Job Portal)
Authors:- Prof. Hemant Kumar Pathak, M. Tech. Scholar Vinita Sahu

Abstract- The process we followed in this is promoting distance learning and students can get their job during this COVID period. The main aims of this portal are to connect to the industries and acts as an online recruitment to support the students to find the right IT job after graduation. We create a portal like job portal and students do registration by filling their information one by one and after collecting all details we can shortlist the students according to their fields and interest and provide job. Our job portal contains 3 modules. Administrators, recruiters and job seekers the administrator has the authority of the entire portal. You can view the recruiter’s requirements and search for relevant candidates for that profile. Recruiters can post jobs and view profiles of job applicants. The project brief aims to provide work during this COVID time period and promote distance learning. There are many platforms to learn different technologies. Therefore, we can use these online platforms to learn different technologies and apply for different job profiles. The purpose of the app is to develop a system that job seekers and recruiters can use to communicate with each other. The online job portal is an application where job seekers can register on the website and search for positions that suit them, because employers register on the website and provide company vacancies. The online job portal system is a software package that agencies can use to improve business efficiency.

Visual and Vocal Prosody Analysis Based on Artificial Intelligence
Authors:- Asst. Prof. Ramya. R, Asst. Prof. Bilomin Ramya. A, Somnath. S. M, Amarthiyan. S, Karan. D

Abstract- Analysis of observable behavior in depression primarily relies on subjective measures. New computational approaches make possible automated audiovisual measurement of behaviors that humans struggle to quantify (e.g., movement velocity and voice inflection). Emotions are normally displayed by visual, vocal, and other physiological means. One of the important way humans display emotions is through facial expressions. Facial expression is one of the most powerful ways that people bring together conversation and communicate emotions and other mental, social, and physiological cues. Highlights include a study that measured the temporal coordination of vocal tract and facial movements, a study that predicted which adolescents would go on to develop depression based on their voice qualities, and a study that tested the behavioral predictions of clinical theories using automated measures of facial actions and head motion. The large sizes of data in recent years has led to the need for big data and streaming frameworks for mining.

IoT Based Underground Fault Cable Detection Using Wireless Technology
Authors:- P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N

Abstract- Underground cables are prone to a wide variety of faults due to underground conditions, wear and tear, rodents etc. Diagnosing fault source is difficult and entire cable should be taken out from the ground to check and fix faults. The project work is intended to detect the location of fault in underground cable lines from the base station in km using a PIC16F877A controller. To locate a fault in the cable, the cable must be tested for faults. This prototype uses the simple concept of Ohms law. The current would vary depending upon the length of fault of the cable. In the urban areas, the electrical cables run in underground instead of overhead lines. Whenever the fault occurs in underground cable it is difficult to detect the exact location of the fault for process of repairing that particular cable. The proposed system finds the exact location of the fault. The prototype is modeled with a set of resistors representing cable length in km and fault creation is made by a set of switches at every known distance to cross check the accuracy of the same. In case of fault, the voltage across series resistors changes accordingly, which is then fed to an ADC to develop precise digital data to a programmed PIC IC that further displays fault location in distance. The fault occurring distance, phase, and time is displayed on a 16X2 LCD interfaced with the microcontroller. IoT is used to display the information over Internet using the Wi-Fi module ESP8266.A webpage is created using HTML coding and the information about occurrence of fault is displayed in a webpage.

Face Detection using Neural Network
Authors:- Owais Khan, Prabhat Singh, Ruchika Suryawanshi, Manish Shetty, Prof. Devidas Chikhale

Abstract- Face recognition is an important function of surveillance system, enabling detection and identification of person who appear in a frame. Face recognition from the real data, capture images, sensor images and database images is challenging problem due to the wide variation of face appearances, illumination effect and the complexity of the image background. With the development of deep learning, face recognition technology based on CNN (Convolutional Neural Network) has become the main method adopted in the field of face recognition. It is a multi-layer network which is used to train the network, to perform a particular task using classification. This paper suggests a cascade classifier based face detection and convolutional neural network based face recognition that can recognize the faces.

Sustainable, Portable and Efficient Electricity Delivery from 4 Different Sources
Authors:- Asst. Prof. Syed Shajih Uddin Ahmed, Md Khaleel Ur Rehman, Md Zain Ul Abedeen, Syed Akber Ali Salman,

Abstract- The main objective of this project is to provide uninterrupted power supply to a load, by selecting the supply from any source out of 4 such as main power supply,solar energy, generator, and inverter power supply automatically in the absence of any of the source. The demand for electricity is increasing every day and frequent power cuts is causing many problems in various areas like industries, hospitals and houses. An alternative arrangement for power source is a serious matter. In this project we used four switches to demonstrate the respective failure of that power supply. When any of the switches is pressed it shows the absence of that particular source, switches are connected to microcontroller as input signals. A microcontroller of ATMEGA8-32 family is used. The output of microcontroller is given to the relay driver IC, which switches appropriate relay to maintain uninterrupted supply to the load. The output shall be observed using a lamp drawing power supply from main supply initially. On failure of the main supply (which is actuated by pressing the appropriate switch) the load gets supply from the next available source, say the solar. If the solar also fails it switches over to the next available source and so on. The current status, as to which source supplies the load is also displayed on an LCD. As it is not feasible to provide all 4 different sources of supply, one source with alternate switches are provided to get the same function, Taking in consideration the use of the source whose cost is the lowest then, the higher cost sources and so on.

Memory Organization in Computer Architecture
Authors:- Kishan Singh, Aniket Singh

Abstract- This article presents give an general idea of the memory organization in computer architecture .In this paper we will learn about type of memory and there memory organization in COA (computer application and architecture). Memory is employed for storing programs and knowledge that area unit needed to perform a particular task. A memory unit is that the assortment of storage units or devices along. The memory unit stores the binary data within the variety of bits. The classification of primary and secondary memory, the different types of ROM and RAM we will learn about direct mapping in the article.

Identification and Controlled of Short Duration Voltage Disturbance by using RMS Algorithm of Distribution System
Authors:- PG Scholar Miss. Anjali Nandkumar Jambhulkar , Prof. Hitesh Murkute, Prof. R.M Bhombe (HOD)

Abstract- Delivering good quality of power is the main agenda for distribution system to the loads. But maintain power quality is not so easy due to the load variations in the system. Sag and swell are the main factors that affect power quality. In this paper, multiple sag conditions and swell conditions were tested by producing the condition in different phases of the system. A simple algorithm called RMS algorithm was developed and tested for the said conditions. Sag and swell were generated on single phase and multiple phases for testing the algorithm. The algorithm and the results were obtained using Matlab. .DVR is installed between supply and load which will inject voltage and active power to the distribution system during balanced/unbalanced voltage sag and swell disturbances. The performance of DVR based of voltage sag, swell is going to be tested and Simulation results are going to be carried out by MATLAB with its Simu-link to analyze the proposed method.

A Review Article of Road Ways Hot Spot Design Optimization with Calibration of Geographical Side
Authors:-Monika Dawar, Asst. Prof. Vinay Deulkar (HOD)

Abstract- In this a literature review is given of the methods and techniques that are used to analyse black spots and black zones. Although, no universally accepted definition of a black spot or black zone is given, these locations will in general be described as high risk accident locations. In this context, several statistical models are described in literature to model the accident frequency and accident severity.

Configurable Survey Template APP
Authors:- Mr. Shubham Ambre,Ms. Priyanka Lokhande,Mr. Manish Ram, Ms.Mohini Misale

Abstract- Mobile phones have become a necessity for living in this technologically advanced generation with development in electronics and communication. The applications used daily have become an essential part of the business world and provide a simpler means to communicate with the consumer. This paper deals with such an android application which will be used to gather information for creating upcoming products in various industries by targeting the need of their customers. A survey app is required for the industries to connect with their clients to collect better feedback. So, they would be able to design their future products according to the need and demand of today’s society. When the opinion of the client is considered, the industry can provide good and a satisfactory service. This platform allows the client to raise their concerns freely. For example, when we consider a survey app in the fashion industry the features included are- provide upcoming product details before it hits the market, release and pre-order schedule, notice board, updates on previous products like bags, shoes, purses etc. notification for recently inclusive updates, designer details and collaborative works. Its goal is to provide the customer every detail before passing out a feedback form so the feedback and review of the customer is unbiased, and they can make a well-informed decision before purchasing the products. It will take place by making communication effortless, provide simple and quick access to information. Though it will be a development for a specific industry only, this application has the potential function to have an extension version for a wide range of users.

PC Based 2D Game Design
Authors:- Aanesha S. Ghosh Dastidar, Rini Sarkar, Pranjal S. Tikande, Shree S. Meher, Dr. Siddharth Hariharan

Abstract- Games are a fundamental way that humans interact and learn. They provide so many advantages for people of all interests and abilities. The main benefits of using computer games as learning tools, is related with problem solving, 21st- century skills, integration of learning and assessment, collaboratives and interactivity, addressing cognitive as well as affective learning issues, and motivation for learning. Gaming is gaining a different level of attention not only from the youngsters but also from different age people. It is creating a virtual world where we can virtually live our life. Gaming has gained importance in Desktop application as well as in Android Application. The objective of the following paper is to give information about pc-based game designs. In this paper a 2d game generation is described. The game is “Brick Blasters”. It is a 2.0 version of this respective game where its background theme and many other aspects are changed. Different levels and different attraction have enhanced the game in a new way.

Aahar – Food Donation App
Authors:- Mrigank Mathur, Ishan Srivastava, Vaishnavi Rai, Assistant Prof. Mr. S. Kalidass

Abstract- The sharp rise in the amount of food waste creates theneed for charity in terms of donations. Food is mostly lost everyday in numerous restaurants, parties, socialgatherings, college canteens and many other social activities in the present scenario. By visiting each organisation several times to reduce the problems with food waste, people donate food manually. Where there are platforms that have made attempts to help people donate food, the current framework offers a new internet-based application that provides all poor people/organizations with a forum for recycling surplus food. The device has seen to be an efficient wayto donate items over the Internet to organizations, etc. It highlights the ability to prevent food waste. It offers details about the inspiration behind such an application, explaining the current mechanism of contributions and how the product works to benefit society. This framework would establish a shared communication platform for hotels/restaurants, charities and individuals, where charities and individuals can contact restaurants that have remaining food directly and report generation. Showing how much food is given by which restaurant and giving reward points Food Donor, Food Receiver, Third Party Provider, Admin are the key modules in this framework where Food Donor can be any organisation, entity or college that wants to donate food and build a new food donation request and Food Receiver can be any food-seeking charity corporation. A fresh food donation request will be produced on thesite and a message will be sent to the third-party provider responsible for transporting food from the food donor to the food recipient until the request is approved.

Pothole and Uneven Roads Detection using Android Application
Authors:- Prof. Sadhana B, P M Vidyashree, Sahana Salian, Sushmitha Shetty, Thrupthi H Karkera

Abstract- The android application makes use of mobile sensors for detecting anomalies on the road surface including potholes, cracks and bumps. This application will utilize sensors to analyse the level of unevenness of the road. The application collects information and stores the information on a database so that the potholes location can be made public to all the users. When all the potholes are pinpointed on a map, it becomes very easy for civic authorities to focus their efforts on stretches of roads. A good road helps to simulate economic and social development. Maintenance of proper condition of roads is becoming a major issues in many developing countries like India creating disturbance in smooth travel and cause damage to vehicles. This project proposes an efficient solution for pothole detection which is cost and power effective.

Design and Optimization Power in 10T SD RAM with Voltage Etimation using Artficial Intelligence
Authors:-Priya Jain, Mrs. Megha Soni

Abstract- Random access memory is an essential resource required by the computational hardware. As the processor speed has attained GHz clock frequency, memory throughput can be a bottleneck to achieve high performance. 10T SDRAM can deliver a reasonable solution for such data storage. Typical computational system consists of multiple hardware modules that perform different operations on the data. These modules attempt to access the data concurrently. This leads to a requisite for a memory controller that arbitrates amid requests queried by different modules and exploits maximum throughput. The memory controller interfaces SDRAM and other subsystems. Hence it manages the data into and out of memory. The access latency or access speed solely depends on the implementation of memory controller. We are also proposed on AI algorithm because it is consume lower power as compare to AI. The study comprises area, power and timing analysis of the both in AI based 10T SDRAM. Synopsys Design Compiler tool is used to obtain the necessary results. Conventional 10T SDRAM and MESFET 10T SDRAM are analyzed through Microwind and DHCH tool in technology. It is seen that sub-threshold and gate leakage, both effects the operation of the SSDRAM cell. In this thesis MESFET is used to simulate the 10T SDRAM cell and it is concluded that MESFET increases the performance of SDRAM cell.

Prepaid Energy Meter using GSM and Arduino
Authors:-Dinesh Yadav, Atharva Parab, Siddharth Raul, Bhavesh Sharma, Sheeba P.S.

Abstract- It is realized that one of the main defective subsystems adding to the tremendous budget loss in Power Supply Company is that the improper meter reading and charging framework. Mistakes are observed at every phase of charging the energy rates, almost like blunders with conventional meters, reading errors by humans while noticing the consumed energy; and error during the preparation of paid and the due bills. The solution for this downside may be a prepaid charging or billing framework of consumed energy. Most of the developing countries are in the process to shift their conventional energy management practices to the fashionable ones by replacing the old and traditional energy meters with the smart technology meters outfitted with the prepaid facility to quantify the facility consumption so on decrease the income deficits looked by utilities due to customer unwillingness to form consumed energy payments on time. Our proposed design embedded with Arduino and GSM technology is a level-up upgrade over the currently existing energy meter, which enables consumers to effectively manage their electricity usage. The system performance is sweet with the acquired results. An earlier charging will undoubtedly get solve the problems of unpaid bills and man-made mistakes in meter readings, along these lines guaranteeing justified income for the utility.

Comparative Analysis of Financial Performance: A Study with Reference to TCS & INFOSYS
Authors:-Asst. Prof. Samrat Banerjee, Nikhil Modi

Abstract- The implementation of Liberalization, Privatization and Globalization lead to the emergence of the IT sector in India, which is one of the most booming sector of 21st century.Increased Foreign Direct investment provided more impetus for these IT giants to explore its massive heights in India. As service sector contributes a major portion of our GDP,IT sector has been instrumental in contributing to the success of the service sector.This study focuses on evaluating and comparing the financial performance of two IT giants, TCS & Infosys, and thus analyzes its Du-pont model.Descriptive statistics and Multiple regression model were used for the analysis.

IOT Based Surveillance Robotic Car Using Raspberry Pi
Authors:-Aniket M. Ainapure, Akshay kumar S. Basargav, Sanket V. Mhetar, Asst. Prof. Saurabh R. Prasad

Abstract- Robots have found a drastically increasing demand in day-to-day life. In this present work, a Raspberry Pi based spy robot with remote monitoring and control through Internet of Things (IoT) has been developed. Because of IoT feature, it overcomes the problem of limited range surveillance. The spy robot system comprises the Raspberry Pi (small single-board computer), night vision pi camera and sensors. This robot can be controlled with the help of laptop/mobile. The proposed robot is small in size thus capable of manoeuvring into area where human access is not easily possible. This surveillance system using spy robot can be customized for various fields like industries, banks and shopping malls. This system will save human live, and protect the country from enemies. We have also developed a webpage consisting of Graphical User Interface (GUI) application to facilitate the robot control. The live streaming ability of the Pi allows the camera feed to be analysed from any location using internet.

Designing the Communication Architecture in Future Tripping Device
Authors:-Vikas Shrivastava

Abstract- This paper presents an estimation of SF6 gas circuit breakers reliability in the transmission substations, Among the substation equipment circuit breakers play a vital role when triggered to switch to Control the power transfer based on the load demand situations, Isolate faulty circuits, Prevent system stability failures in case the system parameters are crossing the permissible limit allow maintenance of substation equipment Generally when utilities wanted to procure circuit breakers (CBs) in past as well as today, their preference is always for three pole operated circuit breakers due to cost effectiveness. This preference continued up to voltage levels of 220kV, beyond which the higher phase spacing has not permitted possibility of three pole operated Air Insulated Substation (AIS) circuit breakers. In Gas Insulated Substations (GIS), the limitation is 170kV for three pole operated CBs, beyond which the size of the tubular housing may become uneconomical. A circuit breaker failure may result in the unavailability of an entire power system, causing major disruption and severe financial losses. Describe in this paper.

Designing the Communication Architecture in Future Tripping Device
Authors:-Vikas Shrivastava

Abstract- Transformers are basic design of electrical device which provide power transmission with transforming induced current from one circuit to another. The induced current can be converted step up or step down of current or voltage. This application mainly deliberates on the three-phase transformers which are used in among electric poles and the Power transformers. The real time overprotective is done on the basic features like gas level, oil aging and regulation of overload and temperature maintenance. These features are essential for effective power transmission and long life of industrial transformers and Communication Architecture for Future Protection & Control of Power Transformer .The monitoring and control of the transformer is done by using IEC 61850 AND RET 620 processor.

D.C. Operated Portable Vehicle Lifting Jack
Authors:-Joshi Kandarp U, Patel Nisarg N, Soni Vatsal D, Vakil Brijesh M, Asst. Prof. Mr. Bhaumik Bhandari, Principal Dr. D.M. Patel

Abstract-Car jack is a device used to lift up the cars while changing the tires during an emergency. Car jacks are available at the market has some disadvantages such as requiring more energy to operate, are not suitable for women and cannot be used on the uneven surface. The purpose of this project is to modify the design of the existing car jack in terms of its functionality and also human factors considerations. In this project, the scopes of research were on the designing 1.5 to 3 Ton maximum lifting capacity of car jack by using optimization concept.

Big Data Security Challenges and Prevention Mechanisms in Business
Authors:-Anusha Dissanayake

Abstract-Sensitive data analytics have reached gradually a smart area in the business world over the past few years. Various research has emphasized the importance of this field in augmenting the business performance in the industry. Excessive collection of data is making harmful effects on human beings. These data are extremely vulnerable for outsiders thanks to their hidden value. Big data gives us more advantages to make progress in many fields including business. It improves the competitive advantage of companies and to add value for many social and economic sectors. Sensitive data sharing brings new information security and privacy challenges. Earlier technologies and methods are no longer appropriate and lack performance when applied in a big data context. This research focuses on investigating the challenges and providing viable solutions to minimize the risk of the threats of user data.

QR Scan Based System for School Bus Tracking
Authors:- S. Ramya, P. Ajitha, M. Brindha, A. Gayathri, Mrs. V. Kavitha

Abstract- In the current day, it isn’t unprecedented for guardians and watchmen to stress over the prosperity and security of their youngster or kids. With the appearance of various advancements, schools that can bear, execute broad and exorbitant measures to guarantee the security of their understudies. Nonetheless, such advances remain out of reach to the not all that rich. This paper proposes a productive and dependable school transport following cum security arrangement as an application combined with a site. The framework consolidates area following, a basic yet idiot proof validation and warning system, and oddity discovery strategies for bringing cautions up if there should arise an occurrence of strange movement. Such a framework takes into account the guardians to be mindful of their youngster in remarkable just as known conditions. The school specialists are likewise ready to screen the situation with their transports by means of a site.

Review on Finite Element Modelling and Analysis of Steel Angles
Authors:- Md Mozaffar Masud, Prof. A. K. L. Srivastava

Abstract- Steel angles under tension are frequently used in a variety of structures because of the basic simplicity of its cross-section. The stress distribution in the vicinity of such connections is non-uniform because of the coupled effects of connection eccentricity, shear lag and stress concentrations. This paper presents finite element techniques used in modelling the angle tension members. Further, the associated problems such as the shape of the material stress-strain curve, the interaction between the gusset plate and the angle, the interaction between the bolt and the bolt hole, the appropriate failure criteria, the effect of punching of holes etc. are discussed. Finally, the prospects of accurate modelling of such connections are explored.

Early Detection of Heart Disease Using Machine Learning
Authors:- Shekhar Chavda, Rishikesh Kumbhar, Shubham Karande, Prof. Snigdha Bangal

Abstract- Heart connected diseases square measure primarily the foremost reason of death throughout the world and because of that an outsized range of casualties square measure arising in countries with low and middle financial gain like Asian nation. A large quantity of information is unendingly generated by medical practitioners. the information generated will be used for the first detection of heart diseases, which may effectively support to scale back the incidence of assorted heart connected diseases. the choice prediction will be effectively done by enhancing the information identification needed to find patterns that weren’t once renowned. economical prediction will be done by accessing the information accumulated from health care firms and industries and realize the hidden patterns.

Cloud Based Meta Engine for High Availability and Maximum Service Performance
Authors:- Infant Raju. R, Ananthi Christina R, ArshimaShimona C A, Sherril Sophie Maria Vincent

Abstract- A one stop solution for the entire mobile and PC OS, which uses only the hardware of the system whereas the software (Meta Engine) resides on the cloud which replaces existing OS. A cloud OS is a kind of lightweight operating system that stores data and can access Web-based applications from a remote server. In the proposed system, users work with Cloud-based framework accessible via browser on any device, which is similar in services, applications, look and feel of an operating system. With this design, users can work from multiple devices and multiple places which are accessible to the Internet over the same set of applications and files.High availability and Cloud Computing yields maximum service performance with a minimalistic hardware support using SaaS and DaaS service. This integrates existing operating systems and web browsers. The internet becomes your personal computer, the browser becomes your cloud desktop. Secure and effortless integration of applications and data that ends up in aqueous experience. Working throughout all phases of the software development lifecycle: writing, testing, and maintaining the code that powers highly scalable cloud applications offering the user full stack support. The cloud stack OS provides Saas and Daas services at the user end. DaaS-offering a service provider that delivers virtual desktops to end users over the Internet. Saas – allows each user to access programs via the internet, instead of having to install the software on the user’s computer. The software could be customized anyway for any purpose. This OS could include the demanded applications inevitable by the client. Eg. Bank, Hospital, Workplace monitoring. Thus a Generic OS simulation for mobile and desktop via mobile app and web app is rendered.

Design and Analysis of Submarine Radome
Authors:- Asst. Prof. Md Baha Uddin, Mohd. Mahmood, Shahbaz Pasha, Mohd. Naqi Ahmed

Abstract- Submarine antenna is used for communication by Radio Frequency (RF) system. It is protected by radome. Radomes are the electromagnetic windows that protect microwave sub-systems from the environmental effects Low-observable radomes are usually made of E-glass/epoxy composite due to its low dielectric constant which is necessary not to interfere electromagnetic (EM) wave transmission characteristics. Since aramid fibers have lower dielectric constant and higher strength than those of E-glass fiber. The dielectric strength constant were measured of the E-glass/epoxy and Aramid/epoxy materials The modal analysis is also carried out on radome to check for the natural frequency of the radome. So that resonance does not occur if the natural frequency of the radome coincides with the excitation frequency of the submarine. It is designed to a high pressure radome covering frequencies from 15 KHz to 18 GHz to meet the submarine applications. The details are presented in this paper.

Risk Management System For Stock Market
Authors:- Amey More, Tejas Warishe, Abhay Mehta

Abstract- A sound risk management system is integral to an efficient clearing and settlement system. NSE introduced for the first time in India, risk containment measures that were common internationally but were absent from the Indian securities markets. Risk containment measures include capital adequacy requirements of members, monitoring of member performance and track record, stringent margin requirements, position limits based on capital, online monitoring of member positions and automatic disablement from trading when limits are breached, etc. Risk Management for Derivative products is managed with Standard Portfolio Analysis of Risk (SPAN)® is a highly sophisticated, value-at-risk methodology that calculates performance bond/margin requirements by analyzing the “what-if’s” of virtually any market scenario. SPAN ® is a registered trademark of the Chicago Mercantile Exchange, used herein under License. The Chicago Mercantile Exchange assumes no liability in connection with the use of SPAN by any person or entity.

Dual Axis Solar Tracking System
Authors:- Asst. Prof. Asra Sultana, Shaik Omer, Mohammed Sameer, Mohammed Abdul Bari

Abstract- Solar panel has been used increasingly in recent years to convert solar energy to electrical energy. The solar panel can be used either as a stand-alone system or as a large solar system that is connected to the electricity grids. The earth receives 84 Terawatts of power and our world consumes about 12 Terawatts of power per day. We are trying to consume more energy from the sun using solar panel. In order to maximize the conversion from solar to electrical energy, the solar panels have to be positioned perpendicular to the sun. Thus the tracking of the sun’s location and positioning of the solar panel are important. The goal of this project is to design an automatic tracking system, which can locate position of the sun. The tracking system will move the solar panel so that it is positioned perpendicular to the sun for maximum energy conversion at all time. Photo resistors will be used as sensors in this system. The system will consist of light sensing system, microcontroller, gear motor system, and a solar panel. Our system will output up to 40% more energy than solar panels without tracking systems.

Mood Music Player
Authors:- Nitesh Jha, Ronak Shukla, Prof. Uma Goradiya

Abstract- Recent studies confirm that humans respond and react to music and that music has a high impact on person’s brain activity. The average Indian listens up to two hours of music every day. People tend to listen to music based on their mood and interests. This project focuses on creating an application to suggest songs for user based on their mood by capturing facial expressions. Facial expression is a form of nonverbal communication. Computer vision is an interdisciplinary field that helps convey a high-level understanding of digital images or videos to computers. In this system, computer vision components are used to determine the user’s mood through facial expressions. Once the mood is recognized, the system suggests a playlist for that mood, saving a lot of time for a user over selecting and playing songs manually. Mood-Based Music Player also keeps track of user’s details like number of plays for each song, sorts songs based on category and interest level, and reorganizes the play-list every time. The system also notifies user about the songs that are never played so that they can be deleted or modified.

Inventory Management System
Authors:- Prof. Deshmukh R.R, Aishwarya Pawar, Vaishnavi Katore, Nikita Dabhade,
Vishakha Kasture, Sohan Bagul

Abstract- This project is aimed at developing a desktop based application named Inventory Management System for managing the inventory system of any organization. The Inventory Management System (IMS) refers to the system and processes to manage the stock of organization with the involvement of Technology system. This system can be used to store the details of the inventory, stock maintenance, update the inventory based on the sales details, generate sales and inventory report daily or weekly based. This project is categorize individual aspects for the sales and inventory management system. In this system we are solving different problem affecting to direct sales management and purchase management. Inventory Management System is important to ensure quality control in businesses that handle transactions resolving around consumer goods. Without proper inventory control, a large retail store may run out of stock on an important item. A good inventory management system will alert the wholesaler when it is time to record. An automated Inventory Management System helps to minimize the errors while recording the stock.

Methodological Obligation in Inherited Procedures for the Optimization Through Agile Considerable Awareness and Investigative for E-Commerce
Authors:- Dr. Santosh Kumar Dwivedi, Dr. Rajeev Tripathi

Abstract- In talent state of concerns after Coid-19 pandemic software program-based equipment deployed in a company to cater to the complicated commercial enterprise processes, combine diverse commercial enterprise devices and cope with necessities of a worldwide consumer base. The conventional method of software program engineering succumbs to the converting want of consumer and era advancement. On the behest of the consumer, a software program system ought to be designed in a manner that it is going in concert with the existing person needs. Agile for instance, is a famous instance of a lifecycle used to construct smart and analytical systems. Methodological responsibility is a time period coined through Ward Cunningham to indicate the quantity of rework required to position a bit of software program into that nation which it ought to have had from the beginning. Obligation Management Model is used to hit upon Methodological responsibility. The examination pursues updated address the reason of the boost of IS lightsomeness and pleasant for detecting, finding, associated mixture and execution in a mild-footed IS. IS lightsomeness is specified in mild of the reality that the ability of associate IS to acumen changing progressively; determine it continuously; and select out and achieve a reaction continuously. Architecting associate dexterous IS can be a multifaceted and asset extreme crucial, ultimately assessment of its factors of hobby is quite desired and proper, associate hobby for lithe system is presented, this paper expects associate net commercial enterprise approach with lightsomeness, and it talks approximately its security conjointly. This system receives better on-line commercial enterprise viability and acquires to unmatched low of goings-on troubles.

Multilevel Security Using Honeypot
Authors:- M. Tech. Scholar Yamini S. Shegaonkar, Asst Prof. Dr. Leena Patil, Asst Prof. Dr. Shrikant Zade

Abstract- Security is becoming a major issue today. A Security is not limited to laptops and other devices. Data security is becoming more and more important today. Data is not safe in any social situation since any person with access to hacking can access data, so that any organization can protect its data against any type of cyber attack. It is important. It is an imperative task, and work. This is why honeypot security is used primarily for data protection. Interacting with the location of attackers and attackers, network of attackers and malware assault details is the main work of this security. Honeypot will create data logs for attackers. Honeypot supplies a researcher with relevant data on attackers. They might understand easily. Honeypot and its benefits will be examined in this paper. We will also learn how Honeypot interacts and collects information and keeps data secure from attackers.

“Design and Development of Multiutility Sheller Machine using Powered by Vehicle”
Authors:- M. Tech. Scholar K. N. Ramteke, Asst. Prof. V. B. Vaidya

Abstract- Agriculture is the most important factor of our Indian economy, in Indian agricultural farming produces semi-finished product or goods. Groundnut, chickpeas and other various different types of seeds are agricultural semi-finished Products. Lack of processing machines on these types of goods, especially Groundnut, Yellow peas, Chickpeas etc. these types of seeds, their lack of Sheller machine is a major problem of formers to production of the finished product in our country. In beginning this Process was done by manually which is output got from this method was very low and it does very time consuming process. On other hand some machines are working on the electric motor or tractor which is very costly as well as not comfortable for every former at every place. Therefore we proposed affordable Sheller machine. And this is powered by vehicle as well as an electric motor. The farmer can be selected on our own requirement what her need and what he want. This project involves so many processes like research of previous machines, design of new components, calculation, fabrication and assembling of different components.

Speed & Direction Control of DC Motor through Bluetooth HC-05 Using Arduino
Authors:- Asst. Prof. S.Md. Mazhar Ul Haq, Mohammad Mujahid, Mir Naser Ali Khan, Syed Abdul Farhan

Abstract- The technology is a process that never ends and to improve the quality of any product these technologies are required. Under this article, the blueprint and execution of a cheap, robust as well as resilient and secure Bluetooth based device DC motor is present. The blueprint is represented on AT Mega 328 board and the motor is liaisons to the input/output ports. The connection between the controlling device and the Arduino Nano is without wire i.e. wireless due to which an individual can operate easily who are using Bluetooth devices. Due to low cost of this system, DC motor to be controlled with the help of this board.

Designing of CSSD System using VGG Algorithm
Authors:- Avani Agrawal, HOD. Dr. Kamal Shah

Abstract- Five billion people worldwide have no access to quality surgical care. The skill of the physician varies greatly, and many patients who are offered care have problems and are easily injured. Improving surgical training and feedback can help reduce the level of complications that have been shown to be preventable. To do this, it is important to test the ability to work, a process that requires professionals right now and manual, time-consuming, and humble. In this work, we introduce a method to automatically assess the performance of physicians by tracking and analyzing the movement of tools in surgical videos, using region-based convolutional neural networks. While previous methods have talked about the availability of tools, ours is the first to not only see the presence but also locally available surgical tools in real laparoscopic surgical videos. We show that our approach is more sensitive to the limitations of tools and far outweighs the methods available to determine the presence of tools.

Brain Tumor Detection
Authors:- Tejas Mhatre, Omkar Narangikar, Shubham Dhonde, SugatPalaspagar, Dr. Shilpa Joshi

Abstract- One of the dreadful diseases existing within the world is brain tumor. When it involves biomedical applications, Image Processing is widely used for diagnosis of various tissues. This paper deals with detection of brain tumor from MRI images of the brain. Tumor may be a rapid uncontrollable growth of cells. Magnetic Resonance Imaging (MRI) is that the device required to diagnose brain tumor. The traditional MRI images are not that suitable for fine analysis, so Image Processing is a crucial process required for efficiently analyzing the tumor images. An algorithm for brain tumor detection is proposed. Image Processing is employed within the medical tools for detection of tumors. Image Segmentation alongside pre-processing of images is implemented for detection of tumors. The shape and texture for feature extraction is considered. It is expected that the experimental results of the proposed system will give better leads to comparison to other existing systems.

Multifunctional Agricultural Sprayer
Authors:- Parikh Vaibhav D., Patel Chirag J., Patel Het J., Patel Ronak S., Asst. Prof. Pankaj Prajapati, Principal Dr. D. M. Patel

Abstract- India is claimed to be an agricultural base country directly or indirectly 75% of the peoples are hooked in to farming, during this agriculture sector there’re tons of field work, such as weeding, reaping, sowing etc. Apart from these operations, spraying is additionally a crucial operation to be performed by the farmer to guard the cultivated crops from insects, pests, fungi and diseases that various insecticides, pesticides, fungicides and nutrients are sprayed on crops for cover. Farmers face enormous problem while spraying the pesticide like tank capacity is extremely small, high cost and spaying time taken more. In order to scale back problems different sort of sprayers has been introduced within the market, but these devices don’t meet the required problems or demands of the farmers. Small scale farmers are very curious about manually lever operated knapsack sprayer due to its versatility, cost and style. But multi-functional pesticide sprayer pumps are combination of both manually & battery-operated pump for better efficiency. We make it as Multifunctional Pesticide Sprayer which can perform many tasks at a time like weeding, cropping etc. This one is trolley operated system by using this we can reduce maximum effort required for spraying pesticides as well as we can spray pesticides in any direction or around the crops at any height of crops. This is used for weeding, ploughing etc. This paper suggests a model of operated by hand multi nozzle pesticides sprayer pump which may perform spraying at maximum rate in minimum time.

A Review of Face Recognition Using SIFT Feature Extraction
Authors:- Prof. Shubha Dubey, Ravina Meena

Abstract- Face detection may be defined as the process of determining whether face is present or not in a given image, if present, then the location of the face is notified. Face can be detected in colour or single intensity, single image or video sequence (single image/frame taken at a time).Another term closely related to face detection is face localization. It may be defined as determining position of single face in a given image. The difference is that in face localization it is assumed that only one face is present in the input image. But in the face detection presence of face either one or many is not known prior. Facial feature detection is to detect the presence and location of facial features like eyes, eyebrow, nose, nostrils, mouth, lips and ears. Automatic Face Recognition aims to use pattern recognition technology to identify people in photos or videos. Automatic face recognition has been widely used in applications from social media to advanced authentication systems. Face recognition technology is very mature. In an unlimited real environment, automatic recognition of faces from digital cameras is still very challenging because it involves important changes in acquisition conditions, facial expressions and attitude changes. Therefore, the key challenges in this area as well as developed solutions and applications based on imaging and machine learning technologies are introducing the topic of automatic computer face recognition.

Control BLDC Motor using Bidirectional DC Converter for Electric Vehicle
Authors:- M. Tech. Scholar Sana Afreen Khan, Prof. Diksha Khare, Prof. Yogesh Likhar

Abstract- The aim of this research project is to design a three phase four quadrant variable speed drive (VSD) for a permanent magnet brushless direct current motor (PMBLDC) that can be applied to an electric vehicle (e-bike). The design is confined to PMBLDC motors with a maximum power rating of 1.5kW. The speed controller operates in current mode at a maximum voltage and current rating of 50V and 30A, respectively. The VSD has the ability to smoothly control the current delivered to the DC motor and therefore controls its torque. The motor’s current is limited in all four quadrants of operation, and its speed is limited in the forward and reverse directions. The performance of the proposed DC motor VSD system is tested on an electric vehicle. Simulation is carried out using MATLAB. A Simulink model is developed to simulate and analyze the operation of the motor. A permanent magnet synchronous machine with trapezoidal back EMFis modeled as a BLDC machine. A controller has been modeled with feedback signals from the Hall sensors of the motor. Based on the Hall signals, gate pulses (PWM pulses) are generated and appropriate switches of the inverter circuit are triggered to achieve precise control of the motor. The voltage across the battery which is charged during the braking period is also measured. The proposed electrical vehicle speed control system provides efficient control in all four quadrants of operation and it is a suitable alternative for a low cost transportation mode.

A Review: Design And Implementation Of An Intelligent Wheelchair Controlled By Multifunctional Parameter
Authors:- Bhushan M. Ghubade, Dr. Shubhangi Giripunje

Abstract- The purpose of this task is to make a Multi-Functional Wheelchair using Accelerometer ADXL335 and ESP32 as sensor to help physically disabled human beings in transferring from one region to any other simply by giving path from the hand, voice, Bluetooth. This Accelerometer ADXL335 and ESP32 primarily based totally challenge use Accelerometer ADXL335 and ESP32 for transferring backward path, ahead path, left path or proper path. We have advanced a Multi-useful wheelchair for medically disable human beings. We are working wheelchair by multi-feature 1) Bluetooth (Using Bluetooth device, ESP32), 2) Hand Gesture (Using Accelerometer ADXL335 MEMS), 3) Voice (ESP32). This makes challenge very powerful. The fundamental of this challenge is achieved retaining in thoughts to able the handicapped man or woman to transport round their domestic without any assist of different character.

Design of Single Precision Floating Point Arithmetic Unit
Authors:-Devyani R. Kamale, Lecturer Mrs. Pradnya J. Suryavanshi, Lecturer Ms. Sharda G. Mungale

Abstract- Most of the algorithms instigated in FPGAs used to be fixed-point. Floating-point operations are useful for calculations involving large dynamic range, but they require significantly more resources than integer operations. With the current trends in system necessities and available FPGAs, floating- point implementations are becoming more common and designers are increasingly taking benefit of FPGAs as a platform for floating-point implementations. The rapid development in Field- Programmable Gate Array (FPGA) technology makes such devices increasingly attractive for instigating floating-point arithmetic. Associated to Application Specific Integrated Circuits, FPGAs offer reduced development time and costs. Moreover, their suppleness enables field upgrade and variation of hardware to run-time conditions. A 32-bit floating-point arithmetic unit with IEEE 754 Standard has been premeditated using VHDL code and all operations of addition, subtraction, multiplication and division are verified on Xilinx.

A Study on Vertical Axis Wind Turbine
Authors:-Maicecer Karan, Abhishek Singh, Parikh Kaival, Vaghela Pruthviraj, Malek Sohil,
Asst. Prof. Nishit Patel, Principal Dr. D.M Patel

Abstract- This project studied the potential for installing roof-mounted vertical axis wind turbine (VAWT) systems on house roofs. The project designed several types of VAWT blades with the goal of maximizing the efficiency of a shrouded turbine. The project also used a wind simulation software program, WASP, to analyze existing wind data measured on the roofs of various WPI buildings. Scale-model tests were performed in the WPI closed- circuit wind tunnel. An RPM meter and a 12 volt step generator were used to measure turbine rotation speeds and power output at different wind speeds. The project also studied roof mounting systems for turbines that are meant to dissipate vibrations to the roof structure. Turbine vibrations were measured during the wind tunnel tests and in impact tests on a scale-model house. Recommendations were made for future designs of roof-mounted VAWTs.

Why Data Structures?
Authors:- M. Amitha Reddy

Abstract- This paper explores the definition and importance of data structures in the field of Computer Science. We will aslo see the chief grounds of using various data structures.The study of data structure helps us to understand how data is organized and how data flow is managed to increase efficiency of any process or program. They also provide various methods to organize and represent the data within the computer’s memory. Different types of data structures are examined in this paper. This paper begins with an overview of data structures and its types. It then examines their main application and concludes with the necessity of data structures in the Computer Science specialization. This paper is the result after a detailed research under the situation of absence of data structures.

Design of Cashew Nut Shelling Machine
Authors:- Suhas M Chougule, Prof. R. B. Gunale

Abstract- Cashew is highly appreciated in a large number of countries and cultures. India is the largest cashew processor in the world. Export of cashew nut shell liquid from India stood at 11,677 million tones (MT). Cashew which belongs to the family is native to the tropical parts the USA, Mexico, Brazil and the West Indies. However, it has since become naturalized in many lowland tropical areas. It is one of the most nutritious food crops of the tropical world, with high protein and fat content. The US is the largest market for Indian cashew kernels, followed by the UAE and the Netherlands, while Indian Cashew nut shell liquid is largely exported to South Korea, followed by China and the US. The cashew industry ranks third in the world production of edible nuts. The major exporters of cashew in the world are India and Brazil with 60% and 31% respectively of the world market share. The major cashew nut importers are the United States (55%), the Netherlands (10%), Germany (17%), Japan (5%) and the UK (5%). Cashew kernels are ranked as either the second or third most expensive nut traded in the US. Also process of cashew nut is very much important as to improve production rate. Now days there are various machineries used to save the time and to improve the quality. The Industries are using manual, Semi-Automatic and fully automatic machineries to increase the production rate. But In conventional process, it takes more time to complete operation and hence production rate is very low. Thus to reduce human injuries in conventional methods and to increase the production of cashew nut the present study has been studied.

Customer’s Attitude and Awareness Towards Food App System
Authors:- Bibek Ghimire, Nirajan Poudel Chhetri, Ahamadullah Ryne

Abstract- Services are intangible products or a system that provides community needs such as transportation, communications, etc. They cannot be sold but are available at the time they are used or purchased. Other examples are accounting service, banking, consultation, education, cleaning etc. Food app services on the other hand are services that can be delivered through information infrastructure such as the internet, in a variety of ways namely apps, web pages, social media, etc. Customers are a target group that uses, or disposes of goods through services. Similarly, customers are also consumers. In this research paper we can understand the changing consumer behavior through the introduction of technology and what are the different types of consumer satisfaction that they are satisfied with and what makes them happy and satisfied with this service. The main purpose of this paper is to understand the relationship between resources and purchasing behavior. The second is to find the most popular app in the food delivery industry and understand technology has played an important role in the restaurant industry.

Farmer Friendly Drone
Authors:- Rajnandini Patil, Narayani Peshkar, Saloni Hatgine, Atharv Ghalsasi, Prof. Mrs S A Pore

Abstract- With the increase in population, the demand for the production of crops is also increasing. Along with the production, the quality of crops is one of the major concerns which come with this. Vast fields and low efficiency in crop monitoring create the largest obstacle in farming. It creates a major threat to food security. With the recent advances in technology, we can use quadcopters equipped with cameras for monitoring the fields. For crop disease identification advanced technologies like deep learning, image processing is very useful. These Unmanned aerial vehicles (UAV) are great to achieve the goals for tomorrow’s farming. Our proposed work discusses how we can detect the diseases on crops in the early stages. In this project, we have used raspberry pi to gather the required images from the camera and after capturing the image, image segmentation is done through Keras. This image segmentation will provide in the end a classification between the diseased and healthy crop and this information will be given to the farmer.

Android Mobile Monitoring Application with Google Firebase Real-Time Database
Authors:- Ankit Kukade, Dikshant Deogade, Ankur Ramteke ,Saurabh Kambale, Saurabh Kambale, Prof.Jayant Rohankar

Abstract- Using electronic devices is not limited to adult or to specific time or place. Children use difficult types of mobile device with no constraints. Guardian concern about the effect of the technical explosion on theirchildren development. Controlling , monitoring and managing approaches are in need to help in overcoming some of the worries. This gives insight in approaches to monitor and control children electronic devices thatallow guardian to manage and monitoring data, applications, or services available in kids mobile devices. The main challengeis to balance privacy and flexibility with the case of use. The project also includes the implementation of an androidapp called parent monitor app.

Clustering Approaches to Offer Business Insights
Authors:- B.Tech. Student Suyash Sharma , B.Tech. Student Kashif Ahmad, B.Tech. Student Varundeep Singh

Abstract- Various business undertakings have come to understand the centrality of CRM and the utilization of specialized skills to accomplish serious advantages. This examination investigates the significance of Customer Segmentation as a center capacity of CRM(Customer Relationship Management ) just as the different models for fragmenting clients utilizing bunching procedures. The accessible bunching models for client division, when all is said in done, and the major models of K-Means, DBSCAN, and Hierarchical Clustering, specifically, are examined and the temperance and indecencies of the strategies are called under attention. The individual models are examined.

Face Mask Detection System
Authors:- Shelke Rohit, Salke Sumedha, Rahate Anchal, Sherkar Tejaswini

Abstract- The COVID-19 pandemic is causing a global health crisis so the effective protection methods is wearing a face mask and follow social distancing in public areas according to the World Health Organization (WHO). The COVID-19 pandemic forced governments across the world to impose lockdowns to prevent virus transmissions. Reports indicate that wearing face masks while at work clearly reduces the risk of transmission. An efficient and economic approach of using AI to create a safe environment in a manufacturing setup. A hybrid model using deep and classical machine learning for face mask detection will be presented. A face mask detection dataset consists of with mask and without mask images , we are going to use OpenCV to do real-time face detection from a live stream via our webcam. We will use the dataset to build a COVID-19 face mask detector with computer vision using Python, OpenCV, and Tensor Flow and Keras. Our goal is to identify whether the person on image/video stream is wearing a face mask or not with the help of computer vision and deep learning.

Medicine Reuse System
Authors:- Komal Chunge, Shruti Deshmane, Vikas Solanke

Abstract- Today in this present area where technological advances are at its vertex, there is not even a single sector which remains untouched by technology. Technology has not merely established our lives simpler, but also offers a high level of safety and security wherever required. Technological devices are available which provides refuge for all the mankind. People are very concern about their health, But there are some people who cannot afford to take medicines. And such people are more likely to get major rather serious. Serious disease are dangerous and can become uncontrollable if timely medicines are not taken. Our health should be our first priority. Medicine donation is an active activity which is done by NGOs, but there are very few donors are available. Because of today’s situation donors cannot donate medicines to NGO. This paper basically deals with the donors who can donate the medicines, and transforming this simple application into most advanced donation system in the future. Some of the condition for the donor they can donate only they medicines which are not expired. Some people die simply because they do not receive timely medication. Therefore, developing medicine reuse system is very essential. Hence, this paper presents a medicine reuse system to donate medicines to the NGO.

Knowledge, Attitude, & Practice Regarding Environmental Hazards of Plastic Use
Authors:- Renno Jose B. Gabuya. Ed.D.

Abstract- This study looks into the knowledge, attitude, and practice of Barangay Bachao, Daram, Samar regarding environmental hazards of plastic use. Specifically it aims to: 1) identify the knowledge or information that residents possess regarding the danger of plastic use; 2) find out their attitude towards the use of plastic and the hazards it carries; and 3) identify their practices that might mitigate or perpetuate the hazards. Both quantitative and qualitative research designs were employed in the study. A survey was conducted among the 78 residents of the barangay and non-numerical data were also gathered from unstructured interviews.

Survey On Skin Disease Recognition Using Texture Analysis
Authors:- Gauravi S. Khandalkar, Associate Prof. Leena H. Patil, Associate Prof. Shrikant Zade

Abstract- Skin diseases are one of the most common diseases that people have faced over the years. The recognition of skin diseases is mainly based on the doctor’s experience and the results of skin biopsy. This is a long process. Image recognition and classification are important for improvement. Diagnose accuracy and overcome the lack of human experts. Image classification of skin diseases is an important task. The correct classification depends largely on the characteristics of the disease in question. Many skin conditions have very similar visual characteristics, which makes it more difficult. Choose useful image functions. Accurate image analysis of such diseases can increase the speed of diagnosis and speed up the diagnosis Process. A shorter diagnosis time can provide patients with better and cheaper care. Various methods and techniques are used to classify skin diseases, namely: traditional or manual performance-based methods and deep learning-based methods.

Future of Commerce Between Farmers and Merchants
Authors:- Vinay Solanki, Yash Mehta, Prabhat Tiwari, Shreshth Gupta, Margi Patel

Abstract- In recent years, electronic commerce of agricultural products has developed rapidly. In the development process of electronic commerce of agricultural products, many classic cases and business models have emerged, such as Reliance Fresh. The author analyzes and compares each model from 7 aspects and summarizes their differences and links. Finally, the author puts forward suggestions on the development of electronic commerce of agricultural products in India.[1]

Implementation On Iot Based Underground Fault Detection Using Wireless Technology
Authors:-P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N

Abstract- Detecting fault cable system proposes fault location model for underground power cable using microcontroller. Fault location models are to determine the distance of underground cable fault from base station in kilometers. This project uses the simple concept of ohm’s law. When any fault like short circuit occurs, voltage drop will vary depending on the length of fault in cable, since the current varies. A set of resistors are therefore used to represent the cable and a dc voltage is fed at one end and the fault is detected by detecting the change in voltage using a analog to voltage converter and a microcontroller is used to make the necessary calculations so that the fault distance is displayed on the LCD display.

Smart Shopping Cart with Interactive Chatbot
Authors:-Naveen Kumar B S, Prem Kumar, Anil Kumar, Dibyendu Dey

Abstract- The main focus of our project is to reduce human efforts and ease of shopping at shopping malls. The present scenario at every mega malls or shopping malls has the hastiest situation when it comes to heavy rush while standing in queue for prolonged hours at the billing counter. Our goal is to reduce those meaningless efforts to minimum and provide a better option using latest technology for a user-friendly shopping experience of the mall customers.

Generation of High Frequency Bat Voice for Avoiding Locust Attack in Field
Authors:- Krishna Deshpande, Jay Gaikwad, Pranjal Tiwari, Prof. Dr. Prasanna G Shete

Abstract- Locust attacks needs to be avoided for the healthy growth of the wheat crop. And farmers generally use harmful chemicals sprays to avoid the locust attack. The use of chemical sprays affects the growth of wheat crop adversely, and also have toxic effect on humans and environment. To avoid toxic chemical spray and its ef- fects on humanity, environment, and most importantly on the crop for locust attack we are proposing to generate high frequency (200- 250KHz) signal to tackle locust attack.

IOT Based Water Quality Monitoring System
Authors:- Preeti S. Hadimani, Shivani B. Mane, Rohitkumar S. Korvi, Asst. Prof. Saurabh R. Prasad

Abstract- The conventional method of testing water quality involves collecting samples of water manually and then using laboratory methods to test and analyse the collected samples. But this method is time consuming, involves wastage of man power, and uneconomical. The water quality measuring system that we have implemented checks the quality of water in real time through various sensors. The microcontroller transfers the data collected by the sensors to the smart phone/PC using Wi-Fi connection. This system can keep a strict check on the pollution of the water resources and thus ensures to provide safe drinking water

IOT Based Water Quality Monitoring System
Authors:- Preeti S. Hadimani, Shivani B. Mane, Rohitkumar S. Korvi, Asst. Prof. Saurabh R. Prasad

Abstract- The conventional method of testing water quality involves collecting samples of water manually and then using laboratory methods to test and analyse the collected samples. But this method is time consuming, involves wastage of man power, and uneconomical. The water quality measuring system that we have implemented checks the quality of water in real time through various sensors. The microcontroller transfers the data collected by the sensors to the smart phone/PC using Wi-Fi connection. This system can keep a strict check on the pollution of the water resources and thus ensures to provide safe drinking water.

A Literature Review on Privacy Preserving Implementing for TPA Data Sharing in Cloud
Authors:-Dnyanada N. Meshram, Asst. Prof. Shrikant D. Zade, Associate Prof. Leena H. Patil

Abstract- Today, many data warehouses and computing facilities are tested in cloud computing systems. Several people participated in the improvement of services in the system. Nowadays, cloud computing services cover a variety of possibilities, so shared computing resources and data can be transferred to computers and other devices as needed, thereby providing users with space for storing documents, pictures, etc. Whenever they want. However, the security of the document cannot be guaranteed. Cloud can provide services, through these services, you can access your applications and data anytime, anywhere. Since the data is stored in encrypted form, it must be fully protected. Many users host their data in the cloud, so accuracy and security are a top priority. We want to enable an external auditor (TPA) to check the integrity of the data stored in the cloud. Using cloud storage to share data with others is a common process. The current system believes that sharing data among multiple users may be one of the most compelling features that inspire cloud storage. In this we propose a secure cloud storage system supporting privacy-preserving publicauditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently.

Continuous Monitoring & Protection of 3-Phase Induction Motors Using PLC and SCADA
Authors:- Arsalan Ahmed Danish, Md Khaleelullah, Fahad Bin Zaid, Asst. Prof. Asra Sultana

Abstract- Induction motors are widely used in many operating areas and industrial applications as they are simple, robust, and reliable and have low production costs. The use of Induction motors have increased nowadays due to their versatility, good self-starting capability and these motors also offer simple, rugged construction, , low cost, reliability and easy maintenance. The reliability of an induction motor is of great Importance in applications such as commercial, aerospace and military and many industrial applications. In this paper different problems of IM are dealt with as over current, overvoltage, over temperature, over speed, inrush current, vibration monitoring during it’s time of operation. There are various proposed methods for fault diagnosis and protection of IM. Some of them are Stator fault monitoring techniques, protection system using Microcontrollers, On-line fault detection, Programmable Integrated Circuit (PIC) based protection system and Programmable Logic Controller (PLC) based protection system. In this study, the method which is applied is PLC based protection system of an IM.

A Fuzzy Text Fragementation by Implementing SSA Algorithm
Authors:- PG Scholar Aakansha Jha, HOD. Dr. Lal Ji Prasad

Abstract- In this new world that is surrounded by digital technologies and human wants to utilize the technology in spite of manually complete the assignments. The digital environment of today’s world creates a knowledge-based society surrounded by a high-tech economy concept that spans over its influence on how the manufacturing throughput and the information technology sector operate in an efficient and convenient way. Here we announce a project research based on Extract Technology. In this technology data can be refined and sourced with specific certainty and relevance. The concept of artificial intelligence technique correlates with the design of machine learning and it is very effective. Auto Defragmentation is an intelligent content summarization concept that automatically parses information, documents and many more into relevant and accurately abbreviated summaries. This is a concept of converting a whole paragraph into one third. This paper introduce the main research challenges of the data mining algorithm implementation with analysing the one subject note and bifurcate it into different subjects on the basis of ‘keywords’. In our technology chart ‘keyword’ are relative words of a prescribed subject that helps to distribute a single note into its respective subject’s folders. The basic architectural approach of the Data Defragmenter is to manipulate and rectify the data structure implementation on the basis of data mining and data warehouse concepts. Finally, the future of notes making approach will work terms like “Data Arranger”. Proposed approach is researched in different sectors like student’s notes making, letter writing, news reporting, script managing, and different more criteria related to writing work and managing prepared notes. General Terms: Fragmenting Notes, Auto Separation, Notes Classification.

PRAYAS Child Welfare Application
Authors:- Prof. Sonal Chakole, Sourabh Pandya, Pratik Pogde, Ankit Vitale, Dipika Katare

Abstract- Street life is a challenge or survival, even for adults, and is yet more difficult for children. They live within the city but are unable to take advantages of the comforts of urban life. There are so many slum children who roam on streets, while at this age they should study. But due to the financial crisis, they don’t have the privileges of education. Therefore they risk their lives just to get enough meal to stay alive. To get overcome from such crisis, our system will help the needy and homeless children. If we develop such kind of system, then this will surely promote poor and destitute children of our country. And this will be a small step towards promoting new generation.

IOT Based Water Quality Monitoring System
Authors:- Preeti S. Hadimani, Shivani B. Mane, Rohitkumar S. Korvi, Asst. Prof. Saurabh R. Prasad

Abstract- The conventional method of testing water quality involves collecting samples of water manually and then using laboratory methods to test and analyse the collected samples. But this method is time consuming, involves wastage of man power, and uneconomical. The water quality measuring system that we have implemented checks the quality of water in real time through various sensors. The microcontroller transfers the data collected by the sensors to the smart phone/PC using Wi-Fi connection. This system can keep a strict check on the pollution of the water resources and thus ensures to provide safe drinking water.

Plant Disease Detection and Solution Using Image Classification
Authors:- Sahil Thakur, Darshan Patil, Rita Sarse, Prof. Manisha Bharambe

Abstract- Crop cultivation plays a crucial role within the agricultural field. Presently, the loss of food is particularly because of infected crops, which reflexively reduces the assembly rate. Identifying plant diseases is not explored yet. The foremost challenge is to reduce the usage of pesticides within the agricultural field and to increase the quality and quantity of the assembly rate. Our paper is used to explore the disease prediction at an untimely action. We propose an enhanced algorithm to predict the infected area of the leaves. For segmenting infected region and placing it to its relevant classes, colour based segmentation model is used. Experimental analyses were done on samples images in terms of sometime complexity and thus the world of infected region. Plant diseases are often detected by image processing technique. Disease detection has steps like image acquisition, pre-processing, segmentation, classification and feature extraction. Our project is used to detect the plant diseases and provide solutions to urge over the disease. It shows the affected a neighbourhood of the leaf in percentage. We planned to style our project with voice navigation system, so a private with lesser expertise in software should even be able to use it easily.

Pre-Processing for the Reconstruction of Fetal MRI Images
Authors:- M. Tech. Scholar Anagha A, Asst. Prof. Aruna B

Abstract- Clinical imaging scenarios like foetus imaging, which include significant subjective movements, does complicate the 3D image and volume reconstruction process and it remains as a problem to overcome. This project is to bring up a learning based image registration to picture the 3D rigid transformations of arbitrarily oriented 2D slices. The advantage is that no spatial transform initialization is required. Only image slice intensity is needed. Convolutional Neural Network (CNN) architecture is used to learn the regression function for mapping 2D image slices to a 3D canonical atlas space. This quantitatively evaluates the simulated magnetic resonance imaging (MRI). Further it demonstrates the results on MRI data where this method is integrated into a full reconstruction and compensation. This paper is to elaborate the preprocessing step for the whole reconstruction of fetal image project.

Accident Avoidance and Alert System
Authors:-Sourabh S. Bagi, Prathmesh S. Parit, Nilesh B. Vaishnav, Asst. Prof. Anushka D. Kadage

Abstract- Accidents are the main threat in today’s modern world. All though the technological development in automobiles increases day by day, there are no proper advancements in the perspective of accident avoidance and detection. This system avoids accidents due to collisions occurring between the vehicles because of the driver’s negligence. In case of any accidents, there is smart rescue system in the vehicle which helps in sending the location of accident spot to the family members. So, the proposed system is designed for vehicle which will not only prevent the accidents but will also look over the safety of the driver. It is used to analyze the cause of vehicular accidents and prevent the loss of life and property arising from vehicle accidents.The system also involves the improvement of the security by preventing the damage of the Car.This System records the relevant details about a Vehicle such as Distance from obstacles, Speed of Vehicle, detect vibration of the vehicle Detect orientation or inclination of vehicle.

A Novel Smart Energy Theft System
Authors:-Asst. Prof. S. Md. Mazher Ul Haq, Yaseen Quraishi, Syed Mohd Taseen Shuttari, Mohd Abdul Faheem

Abstract- Energy theft has become a serious issue in the smart grid community. It has caused massive losses for many countries that exceed billions of dollar. Nowadays, a smart meter will be placed at the end of every distribution network to record power consumption and generates the energy reports remotely. Energy theft methods involve hacking smart home appliance and most commonly direct hooking on other households electricity supplies. Other methods involved are tampering with the smart meter’s software, mechanism, and manipulating data through cloud storage. Thus, attackers can reduce their own electricity usage by manipulating other households through tampering and hacking to increase their electricity usage as the aggregate bill for all customers in the community remains the same This system principally monitors electrical parameters of household appliances such as voltage and current and subsequently calculates the power consumed.

A Review on AFD- PSO Algorithm Based Secured Energy Efficient Wireless Sensor Network
Authors:-M. Tech. Scholar Diksha Jharbade, Prof. Amit Shrivastav

Abstract- Wireless Sensor Networks (WSNs) are networks of autonomous nodes used for monitoring an environment. Energy efficiency and secured data transmission are considered as the most important design goals for WSN. As the complexity of computer networks increased, the erudition of network-based attacks drew the attention of various researchers from several sectors. As a result of this, many Intrusion Detection System (IDS) have been deployed in such a way that it resolves various aspects of network security such as DoS, worms, viruses, malware, etc. Automation of IDS has been proposed in order to improve the energy efficient routing in Wireless Sensor Network in a secured manner. This paper represent a review on LD2FA (Learning Dynamic Deterministic Finite Automata) the dynamic nature of the network is cultured. In turn, LD2FA – PSO provides the information about the node, packet and route inspection for detection and elimination of intruders so that the data transmission is done in an energy efficient manner through the optimal path. Routing through optimal path improves the overall performance of the sensor network and through various metrics such as energy consumption, throughput, network lifetime, alive and dead nodes incorporates the Deterministic Finite Automata (DFA) and Particle Swarm Optimization (PSO) for intrusion detection and the data transmission is done in a secured manner by determining and following the optimized route. Various techniques showing in the literature.

A Review on Digital Image Copy –Move Detection
Authors:-M. Tech. Scholar Deepali Pal, Prof. Amit Shrivastav

Abstract- The use of digital photography has increased over the last few years and this trend has opened the door for image falsification. Image falsification has become a central issue in many applications. Common techniques used to create fake digital images (copy-moving and sewing images). Existing systems integrate block-based and keypoint-based counterfeit detection methods with SLIC super pixel segmentation algorithms. Existing programs can roughly indicate suspicious, counterfeit areas. SLIC image segmentation uses simple and global stopping criteria, which reduces the accuracy of image debugging and detects copy-moving image falsification. The most important contribution of this proposed work is to use local termination criteria for each cluster to avoid cluster and image region audits, and there have been no major changes since the last iteration. Adaptively, the algorithm divides the host image into non-overlapping and irregular blocks, extracts function points from each block, and matches the block functions to each other to locate the selected function points. An effective method of detecting image falsification is proposed.

Antioxidant Properties of Prosopis Cineraria (Ghaf): Pods And Leaves
Authors:- Dr. Vibha Bhardwaj

Abstract- The aim of the present investigation was to evaluate the antioxidant properties of Pods and Leaves of Prosopiscineraria (Ghaf). Antioxidants protect biological systems against free radical damage. Insufficient levels of endogenous and exogenous antioxidants can cause oxidative stress, an imbalance of oxidants and antioxidants resulting in cellular damage or death. The antioxidant activity was assessed by DPPH scavenging activity. The methanolic extract of pods and leaves P. cineraria had shown very significant DPPH (1, 1-diphenyl-2-picrylhydrazyl) radical scavenging activity. The DPPH radical scavenging activity of the extract increased with the increasing concentration of the plant extract. In DPPH free radical scavenging assay IC50 value of methanolic extract of P. cineraria pod and leaves were found to be 550 μg/mL and 480μg/mL respectively. Therefore, in vitro assays indicate that P. cineraria pods and leaves extracts are a better source of natural antioxidant, which might be helpful in preventing the progress of various oxidative stresses.

Slider Foot Scaffold on Railway Station with New Perception
Authors:- Mayur Kailas Suryawanshi, Vivekanand Gopalrao Patil, Bharat Prakash Shirsath, Kunal Sunil Aaglave, Asst. Prof. Habiburrahman Ansari

Abstract- The Fundamental objective of Customized Railway Bridge System is to assist the truly Tried Explorers to move beginning with one Phase then onto the following. Crossing point the railway track inside the railway station is outstandingly problematic. Nevertheless, it is extremely difficult to the impaired and developed individuals to cross the railway track without the help of others. In railroad station people’s necessities to move from one phase to other stage hence, stairway is given. In present day times lift or lift system is similarly being executed. Nonetheless, these options are either a costly endeavor or then again dreary endeavor. In this paper the experts use a lot of resources train characteristics, driving rules and information about various trains to make their movement technique. There are various elderly individuals social classes encountering leg cramps walking inconveniences leg vain issues and tenacious foot tortures, etc That is the motivation to deal with this troublesome we are making a response for that is we will make a venture on a level changed stage which is related between the two stations stage. Since because of this there will be no convincing motivation to bouncing on a bridge by adults similarly as kids. This will help the voyager’s with diminishing the effort in moving between various stages. The developed and incapacitated individual can without a doubt get across the contrary side. Lately, focal points for the advancement are the applying using modified associate is move backward by using clock base furthermore, manual executive or sensor base and manual overseers. So specific use in having railroad station. Exactly when the train will pass from stage by then request will be send through Arduino to motor to pen it.

FARMBOOK-Portal for Connecting Buyers and Sellers
Authors:- Asst. Prof. Saravanan, Bharath.T, Sravan.P

Abstract- Agriculture a huge role in the economy of India, where more half of its rural households still depend on agriculture for their livelihood. More than 75% of farmers being small and marginal. Even though agriculture is the major block in the Indian economy. But the farmers who are the back bone of this are not benefited due to the lack of good prices for the crop, lack of new techniques, and lack of technologies, and methods to see profits. The growth of the mobile communication technology is creating more opportunities learn and make huge innovations in the developing countries, where bringing information technology in the field of agriculture give best of it as well. The introduction of the mobile phones leads to new services and applications, in agriculture sector this is used to know the information about the new technique, climate, soil, marketing etc. It is one of the areas where it makes a huge impact on the agriculture and the rural development. Information technology in the agriculture opens the gates to the huge productions and profits which leads to increase in economy and profits to farmers. Giving importance to the agriculture leads to growth of our nation. Where information technology with agriculture provides good ability and awareness to the future generation. As per the concern of the farmers this combination of technology leads to the huge change in trends.

Brain Tumor Recognition through MIR Image
Authors:- Prof. Pranay M. Meshram, Lalit Roshankhede, Ujwal Kurhade, Priyanka Waghmare, Nilkanth Bhagat

Abstract- Brain tumor at early stage is very difficult task for doctors to identify. MRI images are more prone to noise and other environmental interference. So it becomes difficult for doctors to identify tumor and their causes. So here we come up with the system, where system will detect brain tumor from images. Here we convert image into grayscale image. We apply filter to image to remove noise and other environmental interference from image. User has to select the image. System will process the image by applying image processing steps. We applied a unique algorithm to detect tumor from brain image. But edges of the image are not sharp in early stage of brain tumor. So we apply image segmentation on image to detect edges of the images. In this method we applied image segmentation to detect tumor. Here we proposed image segmentation process and many image filtering techniques for accuracy.

Vision Face Recognition Attendance Monitoring System Using Deep Learning and Computer Vision
Authors:- Ritika Andhare, Akanksha Baghele, Ankita Tiwari, Prof. K.D. Yesugade

Abstract- Background: This рrоjeсt will show how we can use algorithms fоr fasсe deteсtiоn and recognition in the construction of programs to build a program that will look and see the front faces of students in сlаssrооm. “A fassee is the frоnt раrt оf а рersоn’s heаd frоm the fоreheаd tо the сhin, оr the соrresроnding раrt оf аn аnimаl” (Oxfоrd Diсtiоnаry). In interасtiоns, fasсe is the most imrоrtаnt fасtоr and is capable of extracting implоrtаnt infоrmаtiоn аbоut а рersоn оr individualuаl. All humnns have the power to see how people can cope with their consequences. The рrороsed sоlutiоn is tо develоr а wоrking рrоtоtyрe оf а system thаt will fasсilitаte сlаss соntrоl fоr BVСОEW leсturers in а сlаssrооm by deteсting fо them. The second part of the program will also be able to make face recognition compared to a smaller database. In recent years, research has been done, and vision and development programs have been developed. Some are used on social media, in banking apps, in government offices e.g. Metropolitan Police, Facebook etc. After that, the Classification algorithm was used within an application that created multiple human templates. So facial features have it been detected. After that, it saved a particular database with their unique ID. Furthermоre, the verifiсаtiоn рrосess hаs been stаrted by mаtсhing the temрlаtes inside the dаtаbаse. To please this, the student is then regarded as аutоmаtiсаlly. Findings: Submitted prematurely with vоiсe and biоmetriс teсhnоlоgy саn improve security time. Emрlоyee’s аttendаnсe саn is characterized by the modern pull of the potential disruption of рunсtuаlity. Students can be arrested and transported by the fasсe deteсtiоn. Well, it may be set to bnnks tо improve chastity by capturing аuthоrized рeорle оnly оr whо hаve ассоunts in thаt bank. Nоvelty / imрrоvements: Fоr acquires gender and sexuality, appropriate tactilenics distressed, and new sоme аррrоасhes fоr mаintаining security. We have removed the mоdels соmрlete with safety challenges in this рrоjeсt.

Thermal Insulating Powder Tester
Authors:- Mr. Aakash Ashtankar, Mr.Abhay Rakhade , Mr. Ankit Ghode, Mr. Rahul Katr, Mr. Rushab Kamble, Prof. Rahul. M. Dahekar

Abstract- Insulating Powder apparatus is designed to determine the thermal conductivity of insulating Powder. In this paper we will discuss about different powders testing its insulating properties. How different powders react in the insulating powder tester.

FEA of Existing Rocker Arm of Compression Garbage Truck
Authors:- Mr.Ashish R. Tale, Prof. A. S. Patil Prof. A. D. Diwate

Abstract- Experimental analysis of existing rocker arm is performed to determine stress and deformation. Later topology optimization is to be carried out for best optimized model leads to saving of material, cost as well as sustaining existing boundary condition. Manufacturing of new optimized model is compared with existing and analyzed in ANSYS software.
This project focuses on design optimization of Rocker arm targeting weight reduction with required strength and stiffness. Optimized design of arm is mandatory with appropriate material selection as well as valid finite element analysis. Optimization was performed considering static analysis of stress, strain and total deformation along with the suitable material selection. The experimental testing will be performed on universal testing machine. After making the comparative analysis result and conclusion was drawn.

Finite Element Analysis of Vehicle Seat
Authors:- Mr.Avadhoot D. Prabhu, Prof. A. S. Patil, Prof. A. D. Diwate

Abstract- Vehicle seat has great importance as it is the primary component of vehicle that provides comfort to the occupants. The seat should have proper strength and durability in case of accidents of when vehicle passes thru bumps. If seat structure breaks, severe injury can be occurred to the passengers. In present scenario fuel consumption of the vehicle should be minimum; hence there is a need to weight optimization of vehicle components without compromising the strength. To check these qualities of any physical components, Finite Element Analysis (FEA) is an imperative simulation tool. In this method CAD model of seat structure is prepared and developed FE model of complete seat assembly. Steel properties were used to model seat members. Passenger mass was distributed to the seat floor and seat back. As vehicle can have braking, cornering and bump event while passing on the roads, three load cases were simulated on seat and measured the stresses generated on seat members.

Vocal Extraction from Music Signal: Classification
Authors:- M. Tech. Scholar Anila R, Asst. Prof. Safoora O K

Abstract- Music signals contains atleast one vocal and instrumental music or can be pure music or can be pure instrumental music. Most of the researchers are doing their research on vocal signal separation from the mixed music signal. For this application the music which contain both vocal signal and instrumental music is taken. For this purpose first the feature is extracted from the music signal then the classification is done using SVM.

Emission Evaluation of Single Cylinder Four Stroke Diesel Engine with Tire Pyrolysis Oil with Cetane Improval
Authors:- Asst. Prof. Attalique Rabbani, Mohd Ameer Moinuddin Ansari, Mohd Sakeeb, Mohammed Asif

Abstract- Due to the fossil fuel disaster in past decade, mankind has to spotlight on emergent the alternate energy sources such as biomass, hydropower, geothermal energy, wind energy, solar energy, and nuclear energy. The rising of alternative-fuel technologies are examined to convey the alternate of fossil fuel. The focused technologies are bio- ethanol, bio-diesel lipid derived biofuel, waste oil recycling, pyrolysis, gasification, dimethyl ether, and biogas. On the other hand, suitable waste management tactic is another important feature of sustainable development since waste problem is troubled in every city. To meet the growing fuel requirements many governments are entering into biodiesel sector and some private corporations are also performance more interest in this field. in addition, research is going on practical suitability of Tire Pyrolysis oil in various applications. This research is concerned with groundwork of blends with Tire Pyrolysis oil. The load test is conducted on IC engine at constant speed with different blend compositions of Tire Pyrolysis oil and diesel , performance and emission curves are planned. This project works prospects of Tire pyrolysis oil and increasing Tire pyrolysis oil diesel blend ratio as a fuel in diesel engine is going to be studied by varying engine loads. Also based on experimentation an optimum blend and engine parameters are to be suggested for obtaining better performance. Tire pyrolysis oil presents a very promising scenario of functioning as alternative fuels to fossil diesel fuel. Experimental investigation will be carried out on the same engine by changing the crank angle and by using the tire pyrolysis oil blended with Diesel in Different proportions such as T10, T20 and T30, to Find out the performance parameters, by changing the inlet pressures as 200bar, 220bar and 240 at different load condition for each inlet pressure 6, 9 & 12, with crank angle 23deg standard. The Emission characteristics are determined after performing the experiment.

Performance & Analysis of Single Cylinder Four Stroke Diesel Engine with Tyre Pyrolysis Oil with Cetane Improval
Authors:- Asst. Prof. Attalique Rabbani, Abdullah Bin Sulaiman Masood, Mirza Abdullah Baig, Md. Ayub Khan

Abstract- As we all know the due to the scarcity of conventional fuels and the Crude oil, the price of the conventional fuel is going up day by day and there Will no more conventional fuel in future and it is also Increasing the environmental pollution by the usage Of crude oil .And by using biofuels also we are consuming the natural products Therefore in the investigation the oil taken will pyrolysis oil which will be obtained by the Pyrolysis of the waste of automobile tire , and by this the disposal of waste rubber are Becoming the threat to the environment will also be Solved. By this investigation we can not only solve the shortage of crude oil but also can reuse the waste automobile tires, In the initial stage the test will be conducted on four Stroke single cylinder diesel engine by using diesel. Experimental investigation will be carried out on the same engine by changing the crank angle and by using the tire pyrolysis oil blended with Diesel in Different proportions such as T10, T20 and T30, to Find out the performance parameters, by changing the inlet pressures as 200bar, 220bar and 240 at different load condition for each inlet pressure 6, 9 & 12, with crank angle 23deg standard. After performing the experiment the performance characteristics would be determined.

Implementing of Online Auction System
Authors:- Ms. Amrita Shirode, Akanksha Chavan, Sneha Bansoda, Vaibhavee Gadhave, Pranali Tatkar

Abstract- Online Auctions system is web application which will help the users to buy and sell the products. The system that holds the various products on a website and server sellers and bidders accordingly. And it is designed to allow users to set up their products for auctions and bidders to register and bid for different types of products that are available. This is a best method for buying and selling the products and services. And it helps the customers to buy and sell the products at reasonable price. There are some existing applications that allows users forbidding but the product is not available in your local area, you cannot do inspection of the product that you are going to buy. By online auction application user will be able to bid for product that is available in this local area.

Smart Attendence Monitoring System in College Smart Attendence Monitoring System in College Bus using RFIDBus using RFID
Authors:- K. Priyanka, S. Abirami, S. Kalivani, A. Kavitha, A. Meena

Abstract- On reviewing the past work of college bus tracking, monitoring and alerting system, there is a possibility to categorize various methodologies and identify new trends. One among them is a challenge for vehicle tracking, monitoring and alerting system. Now-a-days with the increase in the crime rate and accidents, Student often gets on the wrong buses and get off at the wrong stop. Bus drivers may be unable to identify all students and will not know in time if a student is missing. Parents have no way of knowing if there ward is safe until the evening when the returns there is no provision to monitor driving with in speed limit unscheduled deviation.. And it has the advantage of efficient tracking capabilities, low cost and easy maintenance. The RFID tags are effective and it is used for tracking and monitoring students. The bus unit is used to detect when a student enters/exits from the bus using RFID Card. This information is communicated to the parent unit and school unit that identify the presence of students. The system tracks the students by the IOT.

A Survey Paper on Full Stack Web Development
Authors:- Manish Bagal, Gaurav Kadam, Ajay Bandgar, Abhijit Salunkhe, Prof. R.M. Kedar

Abstract- The complexity of Web sites is increasing and transforming into Web applications that contain business logic, interactivity, transaction handling and states. This phenomenon forces the Web developers to adapt more traditional software engineering techniques to keep the Web applications error free, maintainable, reusable, well documented etc. Many Web developers do not use any engineering techniques at all and design mainly to create as fashionable applications as possible with no regards on the application’s functionality. This results in applications that are hard to maintain and with poor functionality. The purpose with this thesis was to see if the use of a more traditional software engineering technique, namely the Unified Modeling Language with the newly added Web Application Extension, resulted in a Web application with good design regarding the maintainability of the application. To investigate the maintainability of an application, the maintainability was further divided into three sub criteria: extensibility, reusability and documentation. These three criteria were then applied on a case study where a Web application was designed. From the analysis of the final design, using the three criteria, the maintainability was derived. This paper examines the four components of MEAN stack (Mongo DB, Express.js, Angular.js &Node.js) and how they go well together, their benefits as a complete stack in web development. This paper also describes the work flow and server architecture in detail to understand the working of these four technologies employed in the MEAN stack web development. This paper mainly focuses on roles of these four technologies in MEAN stack and how they are popularly implemented in present times.

A Review Paper on: Design of Reconfigurable Microstrip Antenna with Low Noise for Wi-Max Applications
Authors:- Ms. Rohini Pochhi (HOD), Ms. Sonal Tikale

Abstract- A compact, single feed, multi frequency style of reconfigurable microstrip antenna with varied slots are given during this paper. An oblong patch loaded with horizontal slots having extended slot arms constitutes the basic structure of the antenna. The standardization of the multi resonant frequencies is completed by variable the effective electrical length of the slots by loading varactor diodes across the slots. A size reduction of eighty four for the lower operative frequency is obtained in comparison to standard rectangular microstrip patch. planned antennas are helpful for multi-band wireless applications like GSM1800, IMT2000, WLAN etc operating over a good vary of bands. Measured and simulated results of come back loss, antenna gain and radiation patterns also are discussed.

A Review Paper on: Design of Reconfigurable Microstrip Antenna with Low Noise for Wi-Max Applications
Authors:- Ms. Rohini Pochhi (HOD), Ms. Sonal Tikale

Abstract- A compact, single feed, multi frequency style of reconfigurable microstrip antenna with varied slots are given during this paper. An oblong patch loaded with horizontal slots having extended slot arms constitutes the basic structure of the antenna. The standardization of the multi resonant frequencies is completed by variable the effective electrical length of the slots by loading varactor diodes across the slots. A size reduction of eighty four for the lower operative frequency is obtained in comparison to standard rectangular microstrip patch. planned antennas are helpful for multi-band wireless applications like GSM1800, IMT2000, WLAN etc operating over a good vary of bands. Measured and simulated results of come back loss, antenna gain and radiation patterns also are discussed.

A Review Paper on: Design of Reconfigurable Microstrip Antenna with Low Noise for Wi-Max Applications
Authors:- Ms. Rohini Pochhi (HOD), Ms. Sonal Tikale

Abstract- A compact, single feed, multi frequency style of reconfigurable microstrip antenna with varied slots are given during this paper. An oblong patch loaded with horizontal slots having extended slot arms constitutes the basic structure of the antenna. The standardization of the multi resonant frequencies is completed by variable the effective electrical length of the slots by loading varactor diodes across the slots. A size reduction of eighty four for the lower operative frequency is obtained in comparison to standard rectangular microstrip patch. planned antennas are helpful for multi-band wireless applications like GSM1800, IMT2000, WLAN etc operating over a good vary of bands. Measured and simulated results of come back loss, antenna gain and radiation patterns also are discussed.

Analysis Of Ber Performance Of Ofdm System Using Different Modulation Methods
Authors:- M.Tech. Scholar Shubham Srivastava, Associate Prof.Dr. Bharti Chourasia

Abstract- Now a days, demand for wireless systems are reliable and have a high spectral efficiency have increased because of the rapid expand of wireless digital communications. orthogonal frequency division multiplexing (ofdm) has been recognized for its good performance to achieve high data rates. ofdm and multiple input and multiple output (mimo) are two main techniques employed in 4th generation long term evolution (lte) networks. in ofdm, multiple carriers are used and it provide higher level of spectral efficiency as compared to frequency division multiplexing (fdm). in ofdm, because of loss of orthogonality between the subcarriers there is inter carrier interference (ici) and inter symbol interference (isi) and to overcome this problem, the use of cyclic prefixing (cp) is required. this uses 20% of available and width. but we are using the proposed method the bit error rate (ber) is improved and this may lead to higher accuracy rate.

Thermal Analysis of Dryer of Low Cost Split Pigeon Pea (Tur Dal) Extraction Machine with Combine Operation for Value Addition in Farmer Crop
Authors:-M. Tech. Scholar Deepika P. Bhuyar, Asst. Prof. V. Padole

Abstract- We know that pulses are necessary component of the human diet in world wide. In our country, approximately 13 million tons of pulses are produced annually and more than 70 % of these pulses are processed by dal mill. The Dal milling industry is one of the major growing industries. The demand of dal is growing day by day hence to meet this demand processing methods has been changed. Various conventional methods are adopted for milling and many machines are available but they are very huge and space consuming. For subsistence farmers cost of milling is unaffordable. A low cost milling machine can be used in dal mills which would help to reduce the cost. Such a convenient and low cost dal milling machine is being represented by us who will be also useful for subsistence farmers. Complete removal of the husk with less generation of powder and broken husks are the main characteristics of milling. Many numbers of trails are undertaken for milling to get optimum response. To increase its efficiency without compromising its parameters such as grinder speed, grit size, feed rate is an important aspect needed in milling industry. Hence we are representing such a dal mill which is compact in size and gives a better output rate than other systems. Keyword: pulse milling, grit size, milling efficiency, split formation.

Automatic Image Captioning With CNN and LSTM
Authors:- Biswarup Harh, Tejas Mahajan, Zulkif Khan, Prof. Gajanan Arsalwal

Abstract- PC Vision and Natural Language Processing in man-made consciousness is utilized for consequently portraying the substance of an image. To portray the image a very much framed English expressions is required. Naturally portraying image content is a lot of supportive to the outwardly debilitated individuals to comprehend the issue better. The paper is expected to recognize protests and advise individuals through text. It perceives image and converts to text utilizing LSTM. At first, the information image is changed over to a grayscale image that is handled through the Convolution Neural Network (CNN) to effectively distinguish the objects. Objects in the image are effectively recognized utilizing OpenCV, which is then changed over to text. The proposed technique for blind individuals is intended to expand to people with vision misfortune to accomplish their full potential.

Attenuation Coefficients of Gamma Rays in Some Natural Rocks
Authors:- A.Abbady, M. Motawea, S. Harb

Abstract- In this work, gamma-ray linear attenuation coefficients of phosphate and sandstone materialswere determined using an alternative method for determining gamma-ray linear attenuation coefficients. Different energies for gamma rays ( 22 Na 511, 1280 Kev) ( 137 Cs 662 Kev) ( 54 Mn 0.834.9 Kev) ( 65 Zn 1115.5 Kev) and ( 60 Co 1173, 1332 keV) had been used to ensure that the obtained experimental results are accurate; Moreover, the coefficients had been determined using the XCOM code and Radiological ToolboxUser’s Guide program. The XCOM code and Radiological Toolbox program had been utilized for gamma rays attenuation coefficients. The data show good correlation between experimentally and theoretically results. So, they can be applied as well as the empirical methods. The obtained results show that phosphate has effective shielding properties against gamma rays than sandstone.

Regenerative Braking System Using Buck-Booster
Authors:- Raj S. Mishra, Athang S. Ramadhin, Sharique A. L. Shaikh, Krishna K. Verma, Asst. Prof. Tejas K. Thakur

Abstract- In Automotive vehicles that are completely mechanical in nature, the braking system makes use of a vast surface to produce a rubbing action and converting all energy received into heat. The stopping power or capacity of brake can largely vary with the amount of frictional power generated. The objective is to capture this released energy byproduct, when brakes are applied and use it for electric power generation. With the help of conventional regenerative braking systems available in the markets, the above mentioned claim could be achieved. To enhance this system even more with an incorporation of DC to DC transfer (BOOST) module in the regenerative braking circuit we target to amplify the output generated even more which will be sufficient enough to recharge the battery at a much efficient rate resulting in less battery recharging times. The power can be further stored in capacitors for emergency electronic motor boost torque, providing immense acceleration at an instant to avoid accidents from rear or the sides making it a Safety feature.

Review of Fack News Analysis on Twitter Data Set
Authors:- M. Tech. Scholar Mamta Gehlot, Asst. Prof. Vasudha Sharma

Abstract- Today’s the modern era of the internet where people share the opinions, ideas of the people through such social media: microblogging sites, personal blog, reviews. various users review for a specific product, company, brand, individual, forums, company, brand and movies etc. sentiment analysis is a part of text mining where Analyzed, opinion of people and classified into tweets as good, bad, neutral. In this paper work data will be collected from twitter API and the sentiment of tweets and reviews published paper identified by searching particular keywords and then evaluate the polarity of tweets based on classified tweets as positive. Negative.After fed data into a supervised model for testing of new data sets. Machine learning techniques and tools are used. Machine learning classifiers such as Naive Bayes (NB), Maximum Entropy, Random Forest (RF), Support vector machine SVM classifiers are used for testing and training of the data sets and also evaluating the Polarity of sentiment of each tweet based on this analysis. Show that in result we get a performance of classifiers by evaluate parameters has highest accuracy. Using machine learning classifier RF, DTs, SVM and evaluate the accuracy of features and increasing the number of tweets. In the future work use of same methodology some more features can be added which are used for improving accuracy of prediction.

A Study on Consumer Perception with Reference to Flipkart
Authors:- Pawan Dadoria ,Ajitanshu Yadav , Ashish Teotia

Abstract- The importance of this study is to examine the customer perception towards users in Greater Noida city. What people are thinking about flipkart company and what new and old generation people like most in Flipkart. com. Also tried to find out various attributes of Flipkart users of Greater Noida city towards the online shopping. For this study survey was conducted. The data will be collected from respondents through a scheduled containing question. The study result concluded that future in India especially in cities looking very bright. offering best prices, good products and completely easy shopping experience for our customers. The success of any e-commerce company in India is depending upon its popularity, its branding image, its unique & fair policies, and its customer relationship etc. Design/ Methodology/ Approach– The study used a descriptive research methodology. A survey of 300 hundred college students in Greater Noida was conducted to describe and identify the perception of Finding-The key result is that 83 percent of respondents provide cash on delivery, which influences respondents to buy online. The majority of respondents (54%) agree that detailed information about products in online shopping is essential. In Greater Noida, 75% of respondents are very happy with their online shopping experience on the website.

Weight Optimization of Vehicle Rim with Fatigue Tests
Authors:- M.E. Student Ashwini T. Vinchu, Asst. Prof D. S. Chaudhari

Abstract- Rims are now produced in Aluminum Alloy and Magnesium Alloy providing options to steel material which are heavy and difficult to produce due to complex styling. Also, rim should satisfy all the fatigue test criteria according to IS and ARAI standards. There are two important fatigue tests Radial fatigue test and Dynamic cornering fatigue test. In this paper we are studying optimization of Wheel rim with mass criteria and testing 2 different models and 2 materials on Fatigue tests with finite element analysis.

Review on “Design and Combustion of Pulsejet Engine”
Authors:- M. Tech. Scholar Ganesh Motekar, Prof. G.R. Kesheorey (Supervisor & HOD), Dr. A.J. Siddiqui (Executive Director)

Abstract- The pulsejet engines are of relatively simple design without any moving or rotating parts with low cost, easy to use but extremely high noise. The performance of pulsejet engine is significantly affected by design type, geometric parameters and combustion chamber volume. The current research studies the various researches conducted in improving the existing design of pulsejet engine using experimental and numerical techniques. The fuel type and fuel inlet configuration affecting the thrust generation and pressure is also studied by various researchers.

Identification of Potential Phytoremediation Behaviour of Arsenic and Cadmium Tolerant Plants in Contaminated Sites of Central India
Authors:-Ashish Kumar Bhui, Piyush Kant Pandey

Abstract-Arsenic and cadmium are of great environmental concern due to its extensive contamination and carcinogenic toxicity. There is a great need for reliable and cost-effective technologies capable of reducing arsenic contaminated sites to environmentally acceptable levels. Phytoremediation, a plant-based green technology, has been successfully used to remove contaminants from soils. After the discovery of an efficient arsenic-hyper accumulating plant in cold countries, the Brake fern (Nature, 409:579), efforts for discovering similar hyper accumulating species in areas having arid environment is in progress. In this effort four different plant samples found in wild, terrestrial and arid environment were harvested in Greenhouse in an arsenic- cadmium contaminated soil for 16 weeks and were analyzed for arsenic concentrations. In addition, some plants growing in naturally contaminated soils were also analyzed. Among these species Calotropis procera among other species was found to be a better arsenic and cadmium hyper accumulator, its efficiency being calculated in terms of their enrichment factor which for Calotropis procera was as high as 25.00 and 17. The highest arsenic concentrations the biomass of the plant growing in the arsenic-cadmium contaminated soil in the field was 14 ppm. This plant thus has a better potential to be used for Phyto remediating arsenic and cadmium contaminated sites.

Managing Changes Safely
Authors:- M. Tech. Scholar Ritesh Makwani, Nisha Kushwaha

Abstract- Change is the only permanent thing in this world” quoted by the Greek philosopher, Heraclitus, fits perfectly right for the industrial setting as well. In the current world of industrialization, the race to make any business successful leads to lot of dynamic conditions at workplace. Be it capacity enhancement of equipment and facility OR introduction of new aspect in technology & process to increase production quantity and quality, generates the need of Change. The Change is intended for good & useful purposes, however it has potential to add new hazards & risks and aggravate the existing ones. Disasters in the past have proved that if changes are not handled cautiously they can prove very costly. Lessons learnt from the past incidents and disasters have emphasized the need for Managing Change Safely. Management of Change (MOC) is one of the key aspect required to be complied as per many legal & regulatory requirements in several countries. This paper explores the requirements of the procedural details for Management of Change by deliberating on the various stages involved in handling Changes in an operating facility. Management of Change will typically comprise five key steps – Screen, Review, Approve, Implement, and Close. By implementing & maintaining a sound MOC Procedure, the industries, by managing hazards & risks, will make sure there are ZERO incidents, injuries & illnesses. Overall it means no suffering by injured/deceased and family, it also means no breach of laws & regulations, no penalties & compensations to be paid, no lost time, no business interruption and no financial losses.

Student’s Attendance Management System
Authors:- Nikita Shriname, Vaishali Pandhare, Prof. Palwe R.M

Abstract- Fingerprint verification is one of the most reliable personal identification methods is biometrics. With the rapid development of fingerprint verification, a number of its applications system etc. In this paper, a fingerprint Attendance management system is designed and implemented. This system based biometrics and serial port communication technique solve the problem of attendance and trouble of maintaining the register. It can make the user’s attendance more easily and effectively.

Fabrication of Automatic Pneumatic Braking System
Authors:- Avinash V. Khadye, Hardik A. Thakur, Akash S. Waghdhare, Abhishek K. Yadav, HOD. Wasim Khan

Abstract- Most of the accidents in four wheeled vehicles occur because of failure of braking systems. Manual method of applying brakes is always dangerous as it leads to accidents. Unconsciousness of driver, failure in the linkages of braking systems, road conditions, uncontrollable speed of the vehicle and manual operation of braking systems are the reasons of accidents. It is necessary to control brakes automatically through electronics devices to minimize the accident problems. In this project report we propose an effective methodology for automatic control of braking system to avoid accidents. In this technology we used Arduino, relays, IR transmitter and IR receiver for effective function of braking control system. This Braking system consists of IR transmitter and receiver circuit and the vehicle. The IR sensor is used to detect the obstacle. There is any obstacle in the path, the IR sensor senses the obstacle and giving the control signal to the Arduino Board which in turn sends signal to relay circuit and actuate solenoid which actuates the flow control system from the pneumatic circuit by actuates the pneumatic cylinder so as to stop the vehicle as programmed. This complete system can be fitted on to dashboard of a vehicle and effectively used for automatic control of braking system. The prototype has been prepared depicting the technology and tested as per the simulated conditions. In future the actual model may be developed depending on its feasibility.

Application Research on Smart Hospital Bed for Paralytic Patients
Authors:- Aayushma Jain

Abstract- The chosen idea is that of a Smart Hospital Bed for Paralytic Patients. I came across hospitals and NGO’s serving paralytic patients who have their whole or partial body disabled by the paralysis attack. These people in most cases are not able to convey their needs as they are neither able to speak properly nor do they convey through sign language due to loss in motor control by their brain. The focus of this project is to develop a software-hardware platform that addresses one of the costliest, acute health conditions of a paralytic patient. Caring for paralytic patient is extremely costly, increases the length of hospital stays and is very labor intensive. The proposed platform collects information from various sensors incorporated into the bed, analyzes the data to create a time-stamped, and commands the bed’s actuators to start ringing alarm whenever the patient shows a slight movement. These capabilities are combined to form a cognitive support system that augments the ability of a care giver, allowing them to provide better care to more patients in less time. For proof of concept, Ihave implemented algorithms and architectures that cover three key aspects of this platform: 1) data collection, 2) modeling & profiling, and 3) acting.

Rational Fire Revealing and Pictorial Guided Evacuation System Consuming Arduino and GSM
Authors:- Asst. Prof. Potaparthini Kiranmayee, Asst. Prof. Dubasi Kirtana, Asst. Prof. Chakali Swathi

Abstract-An example accomplished of distinguishing fire coincidence in actual time and as long as a pictorial management organization in circumstance of alternative in space Area is communicated in offered case. Project consumes binary parts hardware part and software part. The central and intellectual unit of the prototypical is arduino. “Hardware design comprises arduino, flame sensor, LEDs, liquid crystal display (LCD), buzzer, GSM. And software contains the programming of Arduino conferring to preparation of fire sensor and grounding of LED panels for supervisory emigration in case of fire”. The sensor units are associated via common data line to ATMEL MEGA328P AU1722 Arduino. A SIM 800C GSM kit based network module, accomplished of operational in normal. GSM Bands has been recycled to send alert communication. The scheme is working on overall determination published circuit board (PCB).

Fitness Club Management System
Authors:- Priyanka Sakhare, Prajkta Zanje, Palwe R.M.

Abstract- This Project “Fitness club Management system” is solution fitness centres to manage the customers in an easier and more convenient way.The administrator, is able to view all the members of fitness centre as well as their details. This project is a computer based program and it manages the gym members, the personal and the inventory. This system also maintains the client details,to provide the valuable reports regarding the progress of the gym member.

Productivity Improvement in Manufacturing Industry using Industrial Engineering Tools
Authors:- M. Tech. Scholar Pawan Nathani, HOD. Praveen Patidar

Abstract- This research study proposes an innovative analysis for controlling the defects in manufacturing industry. In this analysis, pipe bending process is concentrated. The component selected has often rejected due to flattening and crinkling of cross section of tube defects. Six Sigma, the zero defect approach, is used in this study. Define measure, analyse, improve and control (DMAIC) problem solving methodology is applied for problem analysis. Taguchi’s experimental design is used for process validation and improvement. The confirmation experiment showed that the rejection rate was reduced to 6.77 % from 21.66 % in case of flattening defect while rejection rate was reduced to 8.22 % from 16.77 % in case of crinkling defect. The application of Six Sigma program with Taguchi technique has developed an innovative cost effective methodology for controlling defects in less experimental time.

A Review on Defect Reduction in Manufacturing Process by Applying Six Sigma and Dmaic Problem Solving Methodology
Authors:- M. Tech. Scholar Pawan Nathani, HOD. Praveen Patidar

Abstract- In today’s competitive world, customer wants perfection and there is no room for error. Delighting the customer and new ways to exceed their expectations is requirement of today’s business world. Six sigma helps to achieve this goal. Six sigma is a highly disciplined process that helps us focus on developing and delivering near-perfect products and services. Six sigma helps us to reduce deviation in process and keep them within acceptance limit.

Android Based Furniture Shopping
Authors:- Mohini Bhosale, Varsha Pandit, Kulkarni D.P

Abstract- The furniture shopping system is an android application that allows clients to check out for different furniture available in the store and can even buy them on the online. The system gives a categories list of furniture results of various styles and models. Clients need to login into the system for browsing every item and would then be able to include them into their truck. Subsequent to choosing the items clients can make an anchor online installment by means of the credit card. In this manner, the online furniture shopping project brings a whole furniture shop on the web and makes it simple for both purchaser and dealer to make furniture deals.

Web Application for Rule Based Banking Chatbot
Authors:- Swathi. K, Arul Vijay Kumar. CH, A. P. S. B Vyshnav, A. Krishna Chaitanya, Manoj. K

Abstract- The banking industry is one of the most important sectors of Indian economy that has continuously increasing its activities due to the rise of population. Today banks have diversified their activities by offering various products and services such as credit cards, debit card, home loan, equity and general insurance.We all know we are running in tough times due to this pandemic situation,to support middle class families the reserve bank of india announced a three month loan moratorium on Indian public sector banks. So,we decided to develop a rule based banking chatbot web application to collect statistical data,scenarios and the reasons why the customers applied for loan moratorium and when will they get back to normal situation.The economical condition of the customer during this pandemic the customers looking other options to settle their loan or want to continue and the application stores all the feedback/responses provided by the customer.Our work concentrates to develop a chatbot web application that will help the customers understand the various options available to them during this tough time.

Crop Market
Authors:- Purval Bhoyar, Khushabu Potwar, Mansi Tiple, Pralay Ramteke, Payal Satpute, Asst. Prof. Nutan Sonwane

Abstract- There is lot of headache in crop selling and buying because farmer get very less prices of crop and these crop are very expensive for customer. In the current situation, farmers to direct consumer marketing is the most need of the country. As farmers are not getting high Compensation on the selling of agriculture commodities and customers are also not satisfied because they are paying high price than the original price of the product. This situation happens because of mediators. In this paper, we are trying to resolve various approaches regarding farmer to customer crop selling.

Arduino Based Solar Tracking Using LDR Sensor & Servo Motor
Authors:- Anshad M, Asst. Prof. Mrs. Asmin M K, Associate Prof. Ms. Shamna A

Abstract- The main objective of this seminar is to explain about solar tracking system which will keep the solar panels aligned with right facing the Sun in order to consume maximum solar power. The system tracks the maximum intensity of light from the sunlight . When the intensity of light is decreasing, this system automatically changes its direction to get maximum intensity of light. Light dependent resistors (LDR) have been used for sunlight detection and to capture the maximum light intensity. A servo motor is used to rotate the solar panel to the maximum light source sensing by the light dependent resistor (LDR) in order to increase the efficiency of the solar panel and generate the maximum energy. The system will be controlled by a servo motor and a microcontroller as a main processor. As a result of solar tracking system, solar panel will generate more power, voltage, current value and higher efficiency.

Mask Detection and Face Recognition System Using Tensor Flow, Keras and Mobile Net
Authors:- Samiksha Patankar, Vishakha Dubey, Raghav Bishnoi, Ritik Porwal, Ujjawal Tomar, Assistant Prof. Ronak Jain

Abstract- The deadly COVID-19 virus has become a very serious issue for each and every one in current time. To prevent being infected by the virus one can on his/her personal level can only wear mask to stay safe, keep social distancing and use sanitizers or wash hands. Keeping this pandemic situation in mind we proposed a project “Mask Detection and Face Recognition” which automatically detects face masks on human faces and note down the time and names of people recognized without face masks in excel sheet. The admin can then take actions accordingly on people recognized without face masks, like charging them with some penalty or simply instructing them to wear masks. This project can be implemented in a small organization or department where the face dataset is already available with the admin of that department or organization. By implementing this, the chances of people getting infected by virus reduces in the institution, as everyone will wear mask which are the personal protective equipment against virus. It is a project based on Machine Learning and Artificial Intelligence using OpenCV, Keras/Tensorflow, MobileNet and Deep Learning.

A Review Vision Guided Plant Leaf Disease Detection Using IOT
Authors:- Meghana B S, Roshani S P, Sindhu H M, Vidyashree, Asst. Prof. Gana K P

Abstract- In agribusiness exploration of programmed checking of diverse parameters along leaf illness recognition is imperative exam challenge as it is able to show blessings in controlling vast quarter of yields, and eventually this framework obviously identifies facet consequences of illness when they display up on plant clears out. The term leaf contamination is usually applied just for devastation of stay and sound takes to the air. This paper offers notion concerning estimation of various parameters of plant and investigation of leaf sickness discovery using image processing technique and machine learning algorithm i.e, SVM and sends the whole data over net by way of technique for time period IoT. Internet of factors (IoT) expects to stretch out internet to massive number of dispersed devices by means of characterizing preferred, interoperable correspondence conference. The real intention of internet of things (IoT) is to make a eager situation utilizing empowering advances, for instance, sensors, inserted gadgets, and correspondence conventions. For result purpose leaf of the plant is picked in positive framework growing any leaf is an awesome errand as the plant is provided to the assaults from distinct small-scale lifestyles bureaucracy, bacterial maladies and irritations. The facet effects of the attacks are usually identified via the leaves, stems or natural product exam. This is the motive leaf ailment location of plant is picked on this framework.

Survey Paper on Edge Computing
Authors:- Shashank Sharma, Anurag Punde, Nidhi Agrawal, Deepak Agrawal

Abstract- By utilizing cloud computing engineering and administrations to do concentrated calculation, particularly when Internet of Things (IoT) situations need to respond from experiences came about because of that calculation back to end gadgets, at that point we run into real restrictions of transfer speed blockage and the came about high dormancy. Edge Computing come to presence with various executions to steadily eliminate these hindrances on restrictions. A few approaches have been created in equal by various substances, similar to investigate gatherings, industry, administrators, and normalization associations. Haze registering, Multi-access (Versatile) Edge Computing, cloudlets, and so forth, are applicable models, remembered for the enormous class of Edge figuring. Their structures and advancements have numerous fundamental normal qualities, yet additionally contrasts in approach. A whiz question is raised – if any critical union will arise soon. This paper isn’t expected to be a finished study, however it endeavors to distinguish some intermingling architecture and some case studies related to edge computing.

A Hybrid MPPT Technique for Partially Shaded Photovoltaic Arrays
Authors:- M. Tech. Scholar Utsav Patil, Prof. R. M. Bhombe, Prof. Diksha Khare

Abstract- Photovoltaic panels are the most important green energy source because of their inexhaustible moreover its clean. It is important to connect the PV panels to the maximum power point tracking (MPPT) controller to optimize its output power. The PV panels output power efficiency is related to the rapidly variation of the incident irradiance moreover the partial shading pattern. The variation of the incident irradiance and the partial shading pattern makes the tracking of the global maximum peak (GMP) through the local ones too difficult, which extremely decrease the efficiency of the PV panels. The problem is the GMP value varies as the sun irradiance varies so; the detection of the GMP needs an efficient and fast algorithm which cannot be done by the traditional MPPT. In order to solve the problem, proposed system a hybrid new algorithm can combine a traditional MPPT algorithm, such as perturb and observe, or incremental conductance, with the ANN (artificial neural network) This new algorithm can combine a traditional MPPT algorithm, the proposed hybrid MPPT algorithm is based on the ANN and used to predict the global MPP region by estimating its voltage boundaries. Consequently, the conventional MPPT algorithm searches for the MPP in the predicted region. The proposed technique is modeled and simulated using MATLAB/Simulink.

Online Voting System
Authors:-Dr. Anupam Sharma (HOD), Yash Kumar Jain, Sudhanshu Gupta,Yash Jajoria, Kartikey Tyagi

Abstract- This paper deals with design, build and test an online voting system that facilitates user (the person who is eligible for voting), candidate (Candidate are the users who are going to stand in elections for their respective party), Election Commission Officer (Election Commission Officer who will verify whether registered user and candidates are authentic or not) to participate in online voting. This online voting system is highly secured, and its design is very simple, ease of use and also reliable. The proposed software is developed and tested to work on Ethernet and allows online voting. It also creates and manages voting and an election detail as all the users must login by voter id card number and password and click on his favourite candidates to register vote. This will increase the voting percentage in India. By applying high security, it will reduce false votes.

Published by:

Paid Journals For Publishing Research Paper


International journals are controlled by a non-government organizations, private agencies, etc. These are a non-funded organizations, hence depend on publication fees or paper processing charges. So scholars who are searching paid journals for publishing research paper doesn’t mean that journal accepts low-quality paper just for money. Scholar / Researcher have to understand that journal has following set of expenses:

Submit Paper Now

Article Processing Charges

  1. Portal need a technical expert that maintains the server for site update throughout the year.
  2. Plagiarism software is paid with a monthly or yearly subscription.
  3. Some field reviewers take charge to review the paper.
  4. Paper formatting, digital certificates are manual operations, hence a dedicated staff needs to do such work.
  5. Some journal indexing sites provide impact factors on yearly basis with some charges.
  6. Print journals have to publish a proceeding of the published paper and submit to the ISSN organization for each new issue.
  7. Editorial board have members that always look journal paper quality, submit journal in good indexing and follow-up.


The above reasons help mentor to clear though that Paid Journals For Publishing Research Paper is also good, as many high index journals charge money to increase the review process. I suggest scholar to filter journal on the basis of the following points that are genuine and improve paper reach around the globe:

  1. Journal Indexing
  2. Journal age (Starting year minimum 5 years)
  3. Issue per year
  4. Article-processing charges
  5. Review time to get submitted paper status
  6. Publishing country (As transaction with some of the country is not allow from few nations)
  7. Research area journal accepts for paper publishing.
  8. Other scholars published paper quality matching your paper content.

I hope all above points help the young scholars to filer the journal on the basis of valid checkpoints not on the basis of paid or unpaid class. Finally, I conclude this article with a note that to run any organization or publishing house money is only medium to increase its quality, so journal charge in form of publication fees, paper processing fees, paper language improvement fees, paper formatting fees is not an unfair activity.

Published by:

IJSRET Volume 7 Issue 2, Mar-Apr-2021


Strength Analysis by Utilization of Plastic PET Bottles In Concrete Material
Authors:-Priyanka Yadav, Mr. Anuj Verma

Abstract:-Plastic waste disposal in the environment is a big problem since it is impossible to biodegrade and has a broad footprint. Plastic recycling was practiced on a wide scale in India. Recycling from various sources accounts for up to 60% of industrial and urban plastic waste. Recently, plastic waste has been studied as a possible replacement for a portion of the current concrete aggregates. In this study, trials and measurements were carried out in order to evaluate the effectiveness of waste plastic reuse in concrete building. Waste plastic was used to partially replace sand in 0 percent, 1 percent, 2 percent, 3 percent, 4 percent, and 5 percent of concrete blends. The concrete cubes were tested at room temperature. Slumping and compression are needed for these measurements. This study ensures that reusing plastic waste as a substitute for fine concrete aggregates will result in lower material costs while still addressing the waste disposal problem.

A Review of Mechanical Properties of Fly Ash Based Geo-Polymer Concrete Used As Paver Blocks
Authors:-Awdhesh Kumar, Anuj Verma

Abstract:-The world is facing the challenges of climate changes due to the increase in CO2 emissions. Cement production is one of the biggest contributors to CO2 emissions due to combustion processes that require high temperatures. The new development in building construction showed that fly ash based Geopolymer concrete can be as structure materials to reduce or even eliminate ordinary Portland cement concrete. This paper presented the research results of fly ash based geopolymer concrete mechanical properties, like the compressive strength, flexural strength, and Elastic Modulus.Paver block is often used in alternative functions, such as those in street as well as other areas of building. So far, roof tiles and paving bricks are the only products to have been manufactured at the lab-scale. Future studies could focus on the investigation of other mechanical and durability properties of the optimum formulations, in order to find applications in the manufacturing of a variety of building materials.

A Review of Bamboo/Jute/PLA Biodegradable Composite
Authors:Subhash Kumar, Dr. Anil Kumar, Mr Amit Sharma

Abstract:-Biodegradable polymers can potentially be combined with natural fibers to produce biodegradable compositematerials. In this work, PLA (Polylactide) was used in combination with Jute fabric to generate bio-composite by compression molding technique. Various mechanical characterizations like tensile, flexural and impact properties of bio-composite were determined. The result from mechanical testing showed that use of Jute fabric with PLA, increases the tensile strength and tensile modulus, why the flexural modulus is reduced. Scanning electron microscopy (SEM) investigation also showed good bonding between the Jute fabric and PLA as there were no air voids. Water absorption results reported increase in weight of the bio-composite for 24 hrs conditioned time. The findings of this work create the scope of use of the Jute fiber/ fabric for making fully biodegradable composites for potential application as architectural interiors in building construction sector. The developed composites were also used as the replacement for mica sheets for the table top, chairs, door panels and many more.

A Review of Solar Energy Based Heat and Power Generation Systems
Authors:M. Tech. Pooja Vaishya, Prof. Barkha Khambra

Abstract:-The microgrid has shown to be a promising solution for the integration and management of intermittent renewable energy generation. This paper looks at critical issues surrounding microgrid control and protection. It proposes an integrated control and protection system with a hierarchical coordination control strategy consisting of a stand-alone operation mode, a grid-connected operation mode, and transitions between these two modes for a microgrid. To enhance the fault ride-through capability of the system, a comprehensive three-layer hierarchical protection system is also proposed, which fully adopts different protection schemes, such as relay protection, a hybrid energy storage system (HESS) regulation, and an emergency control. The effectiveness, feasibility, and practicality of the proposed systems are validated on a practical photovoltaic (PV) microgrid. This study is expected to provide some theoretical guidance and engineering construction experience for microgrids in general. The utilization of solar energy based technologies has attracted increased interest in recent times in order to satisfy the various energy demands of our society. This paper presents a thorough review of the open literature on solar energy based heat and power plants. In order to limit the scope of the review, only fully renewable plants with at least the production of electricity and heat/hot water for end use are considered. These include solar photovoltaic and solar thermal based plants with both concentrating and non-concentrating collectors in both solar-only and solar-hybrid configurations.

Disease Prediction System in New Normal
Authors:Sonal Shilimkar, Pratiksha Thosar, Prajakta Dharade, Ayushi Patel4, Asst. Prof. Varsha Pimprale

Abstract:-In this disease prediction system follows normal rules. The system is designed such that to provide a facility predicting disease from given reports. Report can be in the form of image (MRI, x-Ray, mammography, etc). Or in the form of input parameters like numerical value came with the result of reports. The system will take input from the user for a specific disease the system will follow image processing techniques to process and extract results from images. The result will be provided to a user. The system will also suggest nearby specialists for the detected disease.

Study on Concrete Properties under Acid Attacks
Authors:- Racharla Nageswara Rao, Asst. Prof. DMS Nageswara Rao

Abstract:-Acidic attack on concrete imparts unique set of injury mechanisms and manifestations compared to other durability problems with concrete. vitriol attack limits the service lifetime of concrete elements and, thus, leads to increased expenditures for the repair or in some cases replacement of the entire structure. To date, there’s lack of standardized tests for specifically evaluating the resistance of concrete to vitriol attack, which has caused great variability, for instance in terms of solution concentration, pH level/control, etc., among previous studies during this area. Accordingly, there are conflicting data about the role of key constituents of concrete (e.g. supplementary cementitious materials [SCMs]), and uncertainty about building codes’ stipulations for concrete exposed to vitriol. Hence, the primary objective of this thesis was to assess the behaviour of an equivalent concretes, prepared with single and blended binders, to incremental levels (mild, severe and really severe) of vitriol solutions over 36 weeks. The test variables included the sort of cement (general use [GU] or Portland limestone cement [PLC]) and SCMs (fly ash, silica fume and nano-silica). The severe (1%, pH of 1) and really severe aggression (2.5%, pH of 0.5) phases caused mass loss of all specimens, with the latter phase providing clear distinction among the performance of concrete mixtures. The results showed that the penetrability of concrete wasn’t a controlling factor, under severe and really severe damage by vitriol attack, whereas the chemical vulnerability of the binder was the dominant factor. Mixtures prepared from PLC performed better than that of counterparts made up of GU. While the quaternary mixtures comprising GU or PLC, fly ash, silica fume and nanosilica showed the very best mass losses after 36 weeks,binarymixturesincorporatingGUorPLCwith ash had rockbottom masslosses. Several studies reported that the improved chemical resistance of alkali-activated materials (AAMs) over concrete supported Portland cements. However, AAMs have technical limitations, which could deter its widespread use in cast-in place applications. These limitations include need for warmth curing, slow setting, and slow strength development, which could be mitigated by further improving the reactivity of AAMs during early-age with nanoparticles; however, this area remains largely unexplored. Hence, the second objective of this thesis was to develop innovative sorts of AAMs-based concrete [alkali activated ash (AAFA), alkali activated slag (AAS) and their blends incorporating nanosilica] and evaluate their resistance to 2 different vitriol exposures over 18 weeks for potential use in repair of concrete elements susceptible to acidic attack. While AAFA specimens, produced without heat curing, experienced rapid ingress of the acidic solution and a big reduction within the bond strength with substrate concrete, ash based AAMs comprising slag and or nanosilica (AAFA-S and AAFA-S-NS) had improved performance thanks to discounting the ingress of acidic solution and continued geopolymerization reactivity. Comparatively, specimens from the slag group exhibited high levels of swelling, internal cracking and mass loss thanks to chemical deterioration. The general results suggest that AAFA-S and AAFA-S-NS mixture, without heat curing, could also be a viable option for repair applications of concrete elements in acidic entrainments, but field trials are still needed to further verify their performance.

Experimental Study on Presence of Calcium Exchange Capacity on the Properties of Expansive Soils
Authors:- Sunkara Suresh, Asst. Prof. A. Sarath Babu

Abstract:- This research work presents the efficacy of salt and ash as an additive in improving the engineering properties of Black cotton soil which is expansive soil. Salt of 1%, 2% and three were mixed with black cotton soil utilized in the laboratory experiments. The ash percentages of 20% and 30% were used for compare the results obtained with salt percentages. The effectiveness of the salt and ash tested by conducting unconfined compressive strength and swelling pressure test. The unconfined compressive test has finished curing period of seven, 14, and 28 days to match the results with 0 days unconfined compressive strength. The soil samples were subjected to wet and dry cycles and observed that increase of unconfined compressive strength and reduction of swelling pressure. The results were obtained from salt mixes soil sample after wet and dry cycles has better strength, less swelling pressure and fewer swelling index.

Strength and Behavior of Concrete by Partial Replacement of Fine Aggregate with Recycled Plastic
Authors:- Nithisha Nalluri, Asst. Prof. A. Sarath Babu

Abstract:- Considering quick improvement of individuals in nations like India the discarding Solid waste is an immense issue in our bit by bit life. Distinctive waste materials are made from social event measures, association associations and normal strong squanders. The developing consideration about nature has enormously added to the worries related with ejection of the made squanders. Strong waste association is one of the critical typical worries on the planet. With the insufficiency of room for land filling and because of its always expanding cost, squander use has gotten an engaging decision instead of ejection. Among the waste material, plastic is the material that is the significant worry to by a wide margin the majority of the ordinary impacts. Examination is being done on the usage of waste plastic things in cement. The utilization of waste things in strong makes it prudent, yet besides helps in reducing removal issues. The movement of new improvement materials utilizing reused plastics is essential to both the unforeseen development and the plastic reusing adventures. Reuse of waste and reused plastic materials in solid blend as a characteristic neighborly improvement material has pulled considering specialists advancing occasions, and unlimited appraisals revealing the direct of cement containing waste and reused plastic materials have been scattered. This paper sums up an extensive survey on the evaluation articles on the utilization of reused plastics in strong dependent on whether they administered concrete containing plastic totals or plastic filaments. Moreover, the morphology of cement containing plastic materials is to clarify the impact of plastic totals and plastic filaments on the properties of cement. The properties of cements containing virgin plastic materials were additionally examined to build up their similitudes and contrasts with concrete containing reused plastics. Solid shape, chamber and segment were casted taking 0% to 40% of plastic as halfway substitution of fine total and pursued for 28days of compressive quality, flexural quality and split adaptability of cement.

Response of Shear Wall in Open Storey Building under Seismic Excitation
Authors:- Shaik Mohammed Imran, Asst. Prof. D.C. Anajaya Reddy

Abstract:- The Open Ground Storey buildings are very commonly found in India due to provision3 for considerably needed parking lot in urban areas. However, seismic performance of this sort of buildings is found to be consistently poor as demonstrated by the past earthquakes. A number of the literatures indicate that use of shear walls may enhance the performance of this type of buildings without obstructing the free movement of vehicles within the parking zone . This study is an effort during this direction to review the performance of Open Ground Storey buildings strengthened with shear walls during a bay or two. additionally thereto , the study considers a special scenarios of Open Ground storey buildings strengthened by applying various schemes of multiplication factors in line with the approach proposed by IS 1893 (2002) for the comparison purpose. Study shows that the shear walls significantly increases the bottom shear capacity of OGS buildings however the comparative cost is slightly on the upper side.

Analysis of Credit Card Fraud Detection in Data Mining using Various Classifier Techniques
Authors:- Research Scholar Sachin Jain, Professor Dr. Rohit Kumar Singhal

Abstract:-The data mining is the technique which can mine useful information from the rough data. The prediction analysis is the technique of data mining which can predict new things from the current data. The classifications techniques are generally applied for the prediction analysis. This research work is based on the prediction of the credit card fraud detection. The various techniques are proposed by the authors for the credit card fraud detection. The technique which is proposed the study in the different paper is based on the conventional neural networks in which system learns from the previous experiences and drive new values.

Analysis of Software Project Cost Estimation using Functional Point
Authors:-Research Scholar Sunil Kumar, Professor Dr. Rohit Kumar Singhal

Abstract:-Effort estimation has been used for planning and monitoring project resources. As software grew in size and complexity, it is very difficult to predict the development cost. There is no single technique, which is best for all situations. A careful comparison of the results of several approaches is necessary to produce realistic estimates. The use of workforce is measured as effort and defined as total time taken by development team members to perform a given task. It is usually expressed in units such as man-day, man -month, and man-year, which is a basis for estimating other values relevant for software projects, like cost or total time required to produce a software product.

Study and Analysis in HEART DISEASE ANALYSIS USING K-Nearest Neighbor Classifier
Authors:- Research Scholar Wasim Akaram, Professor Dr. Rohit Kumar Singhal

Abstract:- Data mining refers to analysis of complex data. The prediction is the process of determining what will happen next. Recently, various techniques have been applied for the prediction analysis. A SVM technique is applied to the prediction analysis. The technique divides data into training and testing stages. The first class of test data is for the most part related to the individuals who have little to no risk of having a heart disease . The second class of test data all have risk-of-heart-disease levels above 50%. This research work proposes to improve this existing method using decision tree classifier. The proposal would improve accuracy and reduce the execution time.

A Review on Design Considerations for a Bidirectional Dc/Dc Converter
Authors:- M.Tech. Scholar Alka Tanwar, Asst. Prof. Mithilesh Gautam

Abstract:- Recently the use of renewable energy resources has been increased to save the environment and remaining fossil fuel and the requirement of storing the energy is also increased. In many applications like electric vehicles the need of interfacing of energy storage with load and source is increased for a reliable and efficient system. Bidirectional dc to dc converter is the main device used to interface the Battery and super capacitor as a storage device to increase the system reliability A conventional buck-boost converter can management the power flow in one direction only but power can flow in both the direction in bidirectional converter. Bidirectional dc-dc converters are the device for the purpose of step-up or step-down the voltage level with the capability of flow power in either forward directions or in backward direction. Bidirectional dc-dc converters work as regulator of power flow of the DC bus voltage in both the direction. In the power generation by wind mills and solar power systems, output fluctuates because of the changing environment condition. the basic knowledge and classification of bidirectional dc to dc converters on the basis of galvanic isolation, the comparison between their voltage conversion ratio and output current ripple along with various topologies researched in recent years are presented in this paper. Finally, zero current and zero voltage soft switching schemes and phase shifted controlling techniques are also highlighted.

Classification of Brain tumour in MRI images using BWT and SVM classifier
Authors:- M.Tech. Scholar Nisha Tomar, Asst.Prof. Ashish Tiwari

Abstract:- The improvement in medical image dispensation is increasing in an incredible manner. The speed of increasing ailment by method of reverence to various types of cancer and other related human exertion pave the way for the increase in biomedical research. as a result giving elsewhere and analyzing these medical descriptions is of high significance for scientific diagnosis. This work focus on the stage effectual categorization of brain tumour descriptions and segmentation of exist illness images employing the planned mixture bright techniques. The challenge as well as objectives lying on design of mark extraction, characteristic collection in addition to image classification and segmentation for medical images are discuss The tentative results of intended method contain been appraise and validate for arrangement in addition to superiority examination on magnetic clatter brain images, based on accuracy, sensitivity, specificity, and dice comparison directory coefficient. The experimental marks achieved 91.73% accuracy, 91.76% specificity, and 98.452% sensitivity, demonstrating the efficiency of the proposed method for identify normal and nonstandard tissues from intelligence MR images.

Dynamic Brain Tumor Image Detection Using Median Filter and Genetic Algorithm
Authors:- M.Tech. Scholar Shivi Joshi, Prof. Shalini Sahay

Abstract:- Processing of MRI image for detection of disease in human body was done manually by heath specialist. But most of machine develops automation for the same, so researchers are working in this field to improve the accuracy of detection. This paper has proposed the brain tumor detection algorithm in MRI images. Due to the dynamic nature of tumor in any part of brain sculpture genetic algorithm was used for tumor detection. Proposed tumor detection model use Teacher Learning Based Optimization genetic algorithm which classify image pixel into two regions first was tumor and other was non tumor portion of brain. So no need of training for the detection of tumor from image is required. Use of median filter increase detection accuracy with gray scal image input in fitness function. Real image brain tumor dataset was taken for testing of algorithm. Result shows that proposed model has improve the precision, recall, f-measure evaluation parameters as compare to previous approaches.

Gesture Recognition for User Interaction
Authors:- Anshul Joshi, Harsh Gupta, Srija Nagabhyru

Abstract:- With the massive influx and advancement of technologies there is a scope for us to interact with our systems in the best possible way. One such technology would be Gesture based Human Computer Interaction. So our system makes use of HCI which would help us interact without touching the screen. It is a well known fact that two dimensional user interfaces are everywhere, but with the increasing popularity of Extended Reality (XR) we require a better, more sophisticated three dimensional user interface.

Prediction of Earthquake Magnitude Based on the Clusters in Sulawesi Island, Indonesia
Authors:-Fachrizal Fajrin Aksana*, Andi Azizaha, Enggar Dwi Prihastomob

Abstract:- In this paper, we present an earthquake magnitude prediction model based on similar earthquake locations. To classify the earthquakes that occurred in Sulawesi Island, we use the K-Means clustering method to group the earthquakes based on the longitude and latitude of the earthquake. Support Vector Regression and Random Forest Regressor are proposed model to predict the magnitude in each cluster based on the longitude, latitude, and depth of the earthquakes. The data of past earthquakes are obtained from the USA Geological Survey and Meteorology, Climatology and Geophysical Agency of the Republic of Indonesia (BMKG). The optimal number of clusters is determined by the elbow method is 3. The prediction results show that the most accurate prediction model is Random Forest Regressor when the clustering approach is used.

Emotion Recognition Using Face Detection
Authors:- Amit Badave, Shivani Oswal, Siddharth Atre, Prof. Shilpa Khedkar, Vivek Alhat, Prof. Bhagyashri More

Abstract:- Human-machine interaction is one of the most important aspects of computing. Automatic emotion recognition has been an active topic for research since the last decade. Analyzing unique patterns of human emotions will help machines to understand humans better. Face detection and emotion recognition can be used in several application areas. It can be used in real-time monitoring, security and in gaming applications. In recent years, deep learning has provided a whole fresh approach to understanding and process real-time data. It provides effective methods and algorithms to process images, audio, video, and metadata. In this paper, we propose a system that aims to classify human emotions in different categories such as happy, sad, neutral, disgust, ange and fear. It bases our paper upon the idea of using different techniques of machine learning such as neural networks, haar cascade, principal component analysis (PCA), and facial features extraction to classify human emotions.

Survey on Secure Transactions Using Facial Identification
Authors:- Assistant Professor A.Porselvi, M.E, Anusha S, Meena P, Nishitha K

Abstract:- The rise of technology brings into force many varieties of tools that draw a bead on a lot of client pleasure. There’s associate degree pressing would like for up security in banking region. During this survey, we tend to discuss banking transactions exploitation facial identification. This subject has relevance to facial idea exploitation bank dealing. The processed info passes through the information of banks and payment systems. If facial identity is matched then dealing can be finished. The event of such a system would serve to safeguard customers and money establishments alike from intruders and identity thieves. The combined biometric options approach is to serve the aim each the identification and authentication.

Use Cases of Blockchain with Big Data
Authors:- Ms. Pratima Keni

Abstract:- Big data means data which is stored in massive amount of storage. Big data is high- volume, high-velocity and high-variety of data which is cost effective and help us to take any decision. Block chain is nothing but data which is stored in block and connect that data with each other through the block. Most recent transaction data which is added to block. This is also known as peer in chain. Blockchain which is the trending technology in today’s world. In this research paper we are dealing with what are the advantages when big data and blockchain are two big technologies are come into the picture. Basic Introduction of this paper which is explains in Section I. Section II talks about what is big data. Section III tells about What are the issues of Big data analytics. Block chain basic information which is explain in Section IV. Use Cases of Big data with Blockchain which is explain in section V.

Haar Cascades On Face Mask Detection
Authors:- Chinmay Patil

Abstract:-Coronavirus disease 2019 has affected the world seriously. One major protection method for people is to wear masks in public areas. Furthermore, many public service providers require customers to use the service only if they wear masks correctly. However, there are only a few research studies about face mask detection based on image analysis. Object detection is an important feature of computer science. The benefits of object detection are however not limited to someone with a Doctor of Informatics. Instead, object detection is growing deeper and deeper into the common parts of the information society, lending a helping hand wherever needed. This paper will address one such possibility , namely the help of a Haar-cascade classifier.

Analysis of Major Cenrifugal Pumps Failures (With Application to Irrigation Pumps in Sudan)
Authors:- Mohamed Yagoub Adam, Hassan Khalifa Osman, M. I. Shukri

Abstract:-Centrifugal pumps are one of the most widely used pumps in the world, with a wide range of applications, from the petroleum industry to the transportation of irrigation water. Despite the extensive use of pumps, few component failures cause severe degradation of pump performance and increase downtime, which adversely affect production. Therefore, in order to minimize downtime and improve pump reliability and availability, these pumps must be carefully controlled, diagnosed, maintained or replaced before a catastrophic pump failure occurs. This study investigated the major faults found in centrifugal pumps, especially in Sudan’s irrigation pumps. In this study, we analyzed the problems faced by pump failures causing yield loss at the level of all privatization and parastatal pump schemes operating under government license, government pump stations in the four national government owner agricultural schemes (New Halfa, Rahad, Suki and Gezira & Managil), by using statistical methods. Results show that, at the technical level of the system, a probabilistic method based on the evolution of the pump state enables us to carry out preventive interventions; when the component reaches the degradation zone, it leads to an increase in periodic system intervention. For equipment, whose system schedule set in advance by the manufacturer cannot effectively meet the maintenance requirements; the mathematical model based on failure linearization can correct or even optimize the maintenance plan. Through our own investigation, we have concluded that it is necessary to change the structure of the maintenance cycle of the irrigation pumps under consideration. In this study, the feasibility of preventive maintenance based on reliability and conditional maintenance was verified. The results obtained are contributions to meet the reliability goals pursued by irrigation pumps.

Study of On-Line Monitoring Technology on the Transmission Line
Authors:- M.Tech.Scholar Manmay Banerjee, Asst. Prof.Sachin Kumar

Abstract:- This paper presents a ground-breaking thought of overhead T/L web based checking. Mainly premise of this paper is to secure the tons of exploration con-ducted by generation and distribution engineers & another serious T/L secure activity observing framework is working with effectively. Moreover, we are trying to utilize fake impartial organization for analysis models, to demonstrate the plausibility and adequacy for the serious T/L secure activity framework.

Blind – Sight: Object Detection with Voice Feedback
Authors:- A. Annapoorani, Nerosha Senthil Kumar, Dr. V. Vidhya

Abstract:- Computer vision deals with how computers can be made to gain high-level understanding from digital images or videos. It seeks to automate tasks that the human visual system can do. Humans glance at an image and instantly know what objects are in the image, where they are, and how they interact. An estimate of 285 million people is visually impaired worldwide, stated by WHO. The proposed Blind Sight-Object Detection with Voice Feedback is a computer vision-based application that leverages state of the art object detection techniques. These are employed to detect objects in the vicinity. You Only Look Once (YOLO): Unified, Real-Time Object Detection a new approach to object detection is deployed in this proposed work. YOLO has 75 Convolutional Neural Network (CNN). Image classification techniques are used to identify the features of the image and categorize them into their appropriate class. The COCO dataset used in this project consists of around 123,287 hand labelled images classified into 80 categories. This wide set of data is used to describe spatial relationships between objects and their location in the environment. In addition, an Indian currency recognition module is developed to identify the denominations. The text description of the recognised object will be sent to the Google Text-to-Speech API using the gTTS package. Voice feedback on the 1st frame of each second will be scheduled as an output to help the visually impaired hear what they cannot see.

Convolutional Neural Network Based Facial Expression Recognition
Authors:- M.Tech. Scholar Ramchandra Solanki, Asst. Prof. Vijay Yadav

Abstract:- We see the importance of facial expression recognition in different applications. To do such task the traditional feature extraction is used which involves in complex processing. Previously various deep neural networks have been used for this task; as well it can be replaced by some improved methods. So, in this paper we have proposed a system for face recognition which uses the convolutional neural network (CNN) along with the detection of the edges of image. The proposed workflows in two steps in the first the normalization of the facial expression in the image is done, secondly the convolution is done for the extraction of the edges in images. After this the maximum pooling method is used for the dimensionality reduction. At the end the classification of the facial expression is done and the Softmax classifier is used for this classification and the face expression is recognized. The facial expression recognition experiment is done on the Fer-2013 dataset. The results obtained from the proposed approach gets a face recognition rate up to 92.45% for the used dataset. The given method works with lesser number of iterations for the recognition and the system provides approx 1.5 times fast execution as compared to the SDSRN algorithm..

A Review: Improvement of Link Permanency
Authors:- M. Tech. Scholar Bharti Chouhan, HOD Avinash Pal

Abstract:- Vehicular Ad hoc Networks (VANET) are highly mobile wireless ad hoc networks that provides communication between vehicles. As a promising technology it plays an important role in public safety communications and commercial applications. Due to the rapidly changing of topology and high-speed mobility of vehicle, routing of data in vanet becomes a challenging task. One of the critical issues of VANETs are frequent path disruptions caused by high-speed mobility of vehicle that leads to broken links which results in low throughput and high overhead. This paper argues with how to maintain the reliable link stability between the vehicles without any packet loss using two separate algorithms besides position, direction, velocity and digital mapping of roads. In this paper we propose a reliable position-based routing approach called Reliable Directional Greedy routing (RDGR) which is used to obtain the position, speed and direction of its neighboring nodes through GPS and as well as the well-known Ad-Hoc On-Demand Distance Vector (AODV) which includes vehicles position, direction, velocity with link stability. This approach incorporates potential score-based strategy, which calculates link stability between neighbor nodes for reliable data transfer in this paper we use both RDGR and AODV approach in order to provide reliable link stability and efficient packet delivery ratio even in high-speed mobility and changing of topology.

News Classification System Based on Area
Authors:- Prof. Krishnanjali Shinde, Prachi Prajapati, Sakshi Tagalpallewar, Ruchita Bacchuwar

Abstract:- – In 21st century the internet is filled with loads of news articles, there is a pressing need to classify news according to the requirements of an individual. People are generally more interested what is going on, in their immediate surroundings. News has a vital role in the society. Most people read news every day to keep up with the latest information and trends. The information could be anything, from technology, disaster, politics, even the affair of the celebrities. After they absorb the information and understand it, it will be used by the people as a reference to their ideology and decision making. With the help of technology advancements, news disseminates relatively quick across the globe. Using the internet, people can send information from another side of the world in under a second. Because of this, almost any kind of information such as knowledge, idea, entertainment, and news from the people can easily spread to the community. With the development of the web, and ton of internet sites that provide similar information and data. So, users often discover it hard todecide that of those websites will offer thespecified information inside the foremost valuable and effective way.

Behaviour of Combined Piled Raft Foundation in Clayey Soil
Authors:- S. Lakshmi Prabha

Abstract:- In situations where a raft foundation alone does not satisfy the design requirements, it may be possible to enhance the performance of the raft by addition of piles, the use of a limited number of piles, strategically located, may improve both the ultimate load capacity and the settlement and the differential settlement performance of raft. This paper discusses the philosophy of using piles as settlement reducers and considering interaction effects. In this method the raft is considered as a plate supported by a group of piles. To verify the reliability of the proposed method, a 5 storied RCC structure is analysed in SAP 2000, considering the guidelines given in chapter 56 of ICE manual of geotechnical engineering (volumeII) and Theoretical manual for pile foundation by US Army corps of Engineers (ERDC/ITL TR-00-5).

Optimize Piston Durability by Coating Layer of Tungsten Carbide
Authors:- Student of M.Tech. Nitesh Kumar, Gouraw Beohar(HOD), Assistant Professor Anshul Jain

Abstract:- This coating enhance piston durability on layer of 0.20 to 0.25µm which explore that after all testing on Coated piston minimum coating thickness which has been coated will be 0.20 µm whereas maximum thickness of coating which has been coated on piston will be 0.25 µm . There are various result which shows that these layer are efficient during long run .These layer also having less absorption capacity of heat results in maximum heat energy transform into work due to this exhaust will be less. The most expensive way to reduce fuel consumption is to develop more efficient fire engines. Today, about 40-45% of gasoline is converted into useful energy, while the remaining thermal energy is converted into heat. One of the possible solutions of decreasing heat losses from the engine is by insulation of piston coated with Tungsten carbide; all possible measures of improvements are in the scope of interest. Therefore this master thesis was carried out. The theoretical study was focused on about appropriate materials, industrial applications and the state of the art research in the area of coating. Sample prototypes and material samples were coated using a thickness of 0.5 µm to 0.25 µm and coated with Tungsten Carbide powder coating. Heat flux, Shear stress, Elastic strain, and total deformation are measured for each coating. The integrated pistons have been tested in a single cylinder engine, to ensure the strength of the thermal barrier. Due to the negative impact on piston the combustion process and the overall efficiency of piston, were obtain .A trend showing a decrease in heat loss with an increase in the coating of the layer was observed. During both load and thermal cycling tests of different thickness of Tungsten Carbide powder coating such as 0.05 µm, 0.1 µm, 0.15 µm, 0.20 µm, 0.25 µm, and 0.3µm. The temperature and stress field of piston are resolved using ANSYS (Version 18) software. The optimum result obtained to acquire minimum heat loss during combustion and obtained no deformation during high heat in general 150 cc Aluminum alloy piston, the best result obtained on coating piston with 0.25 µm with Tungsten Carbide powder coating.

Acoustic Steam Leak Detection System
Authors:- R. Saravanan M.E.,Ap/Eee, R. Balambika , R.Chelvadharani , A. Divyadharshin

Abstract:- The boiler tube failure is occurring frequently in thermal power plants. Boiler tube leakage is the significant reason for blackout of units and age misfortune in warm influence plants. Location of boiler tube leakage is a significant factor for power plant working as roughly 60% of boiler outages are because of tube leaks. Power plant engineers must cautious about boiler tube puncher so that further damages to pressure parts such as water wall tubes and headers, super heater tubes, re-heater tubes, and furnace refractory may be avoided. Boiler tube leaks have even been known to prompt to bending damage and deformation of the entire boiler. The costs of repair, substitution, and maintenance due to secondary damage can be maximum. There are several solutions are available to identify the boiler tube leakages such that analyzing the make-up water, survey of tube thickness and fitting sensors inside the boiler. The compact solution is fitting sensors inside the boiler. Here, we are using piezoelectric sensor to detect the tube leakages. There are two types of sensors available which are airborne sensor and structure borne sensor. Airborne contains a genuine microphone, which is totally insensitive to vibration. Structure borne is Piezo- electric based sensors can measure sound generated by a leak in the boiler structure by either acoustic frequencies or ultrasonic frequencies. The airborne sensor is used in acoustic steam leak detection system. The Acoustic Steam Leak Detection (ASLD) system works on the principle of detecting the sound waves emanating from the steam leak, processing the same and then indicating the quantum of steam leak and the location. When a leak is detected by a change in the sound patterns, alarms are activated and the fault is localized. By using these methods the leak is detected and the many secondary damages were avoided.

Design and Deflection Analysis of Deck Slab
Authors:- Kapil Mohaliya, Sourabh Dashore (HOD)

Abstract:- Steel-Free Deck Composite Bridges system has been investigated during the past two decades. The concept is totally new and innovative. The new structural system enables the construction of a concrete deck that is totally devoid of all internal steel reinforcement. Traditionally, reinforced concrete bridge decks are designed to sustain loads in flexure. The new innovative bridges with steel-free decks develop internal compressive forces “internal arching” which leads to failure by punching shear at substantially higher loads than the flexural design load. Five composite bridges have been recently constructed in Canada adopting this new concept.

CFD Analysis of Tubular Heat Exchanger with Ribbed Twisted Tapes for Heat Exchanger Enhancement
Authors:- M.Tech. Scholar Vinita Kapse, Prof. Sharvan Vishwakarma

Abstract:- A heat exchanger is really a system that transfers heat between two or more fluids. The fluids can also be single-phase or two-phase, so they can be isolated or in close contact, depending on the form of exchanger. In this study, two twisted ribbons are inserted into another heat exchanger tube and heat transfer is studied. The aim of both the ongoing project is to figure out how fast heat transfers in a circular tube with entangled ribbons. The Reynolds (Re) number as well as the geometry of tube is the parameters of concern. For the first case, diameter of tube is taken 50.8 mm and length 1000 mm. For the second case the diameter is increased and length is kept constant, diameter is constant and length is increased for third case, and for fourth cases both length and diameter is increased. It is found that with the increase in both length and diameter of tubes, the heat transfer is increasing, pressure drop is decreasing by 56%, Nusselt number (Nu) is decreasing by 72% and the thermal enhancement factor is increasing by 12%. It can be concluded that the increase in diameter results in decrease in heat transfer while increase in length is preferable for increase in heat transfer rate. Hence, among the selected four designs, the fourth case with diameter=80mm, and length=3000 mm is the most preferable one.

An Iot Based Modern Street Light System for Energy Efficient and Energy Auditing with Fault Identification System
Authors:- Asst. Prof. R. Rubanraja, M. Kanimozhi, M. Mahalakshmi, K. Mounika, V. Suruthipriya

Abstract:- Today’s modern world people preferred to live the sophisticated life with all facilities. The science and technological developments are growing rapidly to meet the above requirements. With advanced innovations, Internet of Things (IoT) plays a major role to automate different areas like health monitoring, traffic management, agricultural irrigation, street lights, class rooms, etc., Currently we use manual system to operate the street lights, this leads to the enormous energy waste in all over the world and it should be changed. In this survey we studied about, how IoT is used to develop the street lights in the smart way for our modern era. It is an important fact to solvethe energy crises and also to develop the street lights to the entire world. In addition, with the study on Smart Street lighting systems we analysed and described different sensors and components which are used in Iot environment. All the components of this survey are frequently used and very modest but effective to make the unswerving intelligence systems.

A Model for Sentimental Analysis of Twitter Data in Hindi Polarity: A Study
Authors:- Suraj Prasad Keshri1, Neelam Sahu2

Abstract:- This research explores real-time feelings of analysis. Twitter / WhatsApp posts are based in Hindi, with a sense of classification on a three-way scale, negative, positive and natural. The efficiency of various methods such as speech (POS) tagging and part of the stop word extract are compared and WordNet is proposed to improve the Hindi Sentimental Word. The current work of analysis on sentiment has been done in mining. There are resource-rich languages such as English; while data in Indian languages is still relatively low web content in languages like Hindi has grown rapidly over the past few years. In addition, as the length of social media increases, WhatsApp has become a hotbed of user content on platforms such as Twitter and Facebook SA of tweets made in English. There is not an analysis of similar data in Hindi. In this paper, we perform real-time SA on a live stream of Hindi tweets. Twitter social media application is a popular site Forum to share opinions of millions of people there are users on a variety of topics. The Analysis and opinion mining websites are rich sources of data for sentiment. A Twitter user can often use hash tags, then the same tag is used to group similar posts. A group of people can become a hash tag trend Attract a special discussion to as many people as possible to participate in it.

Privacy-Preserving Zero Knowledge Scheme for Attribute-based Matchmaking
Authors:- Solomon Sarpong

Abstract:- Making friends with common attributes is a characteristic of some persons. This characteristic is also extended to matchmaking on social networks. In some of the existing matchmaking protocols, the users are match-paired without considering the number of attributes they have in common. Furthermore, the bane of the existing proposed matchmaking protocols has been how to preserve the users’ privacy and this has been considered as the key security issue for such applications. In order to prevent malicious users from gaining extra information, the attributes in this protocol will be certified. Hence, certification authority ensures that, a user actually possesses the input attributes and binds them to him/her. With the use of certified sets and zero knowledge proofs, users can adequately find a matching-pair whilst keeping his/her input set private. Furthermore, in this proposed protocol, a person can find a best match among potential candidates by finding the one who has the maximum number of common attributes. At the end of the protocol, the match-pair can exchange their attributes without any other person knowing the number or the type of attributes they have in common.

Structural Investigation of Agricultural UAV
Authors:- E.Akshaya Chandar, Adesh Phalphale, Sourav Ghosh, Sanket Desai

Abstract:- UAV Technology has improved exponentially in the last few cycles, and we can discuss its importance as new resolutions to all challenging queries that include managed services on a unique land that a computer can make floating above it. It covers UAV that produces agricultural projects like spraying, an examination of products for vast hectare fields. Structural analysis is the purpose of the consequences of pressures on concrete buildings and their elements. The structural analysis applies applied mechanics, materials science, and applied mathematics to measure a structure’s deformations, internal forces, stresses, support reactions, accelerations, and stability. The analysis results verify a structure’s fitness for use, often precluding physical tests. This report presents the results of structural analysis of the Agricultural Unmanned Aerial Vehicle in compliance with the requirements of DGCA. The analysis includes the Strength of Materials approach to determine loads (Shear Force and Bending Moments) which is utilized for further analysis using the Finite Element Analysis (FEA) approach. Commercial FEA software ANSYS is used for this purpose. The static structural analyses of the UAV are performed under different load conditions. The consequences of these researches show that the planned construction is safe within the flight envelope. This paper lays the structural analysis framework, which could as a source for additional temporary separation. The products can be increased additional to effective reports like Crash Test, sloshing examination of Fuel tanks, Etc. to mimic real-time events. This paper is required to showcase the structure’s authenticity (hypothetical load circumstances compelling) for certification determinations and vibration endorsement from DGCA.

Enhancing Air Pollution Predicton Using Artificial Neural Network with XG Boost Algorithm
Authors:- Assistant Professor Christina Rini R, Aishwarya N, Meenakshi G, Saranya M

Abstract:- Air pollution has become a major public health concern in recent years. Despite substantial improvements in overall air quality in recent years, India remains the third most polluted country according to the latest edition of the World Air Quality Report [1]. The release of gases into the air that are harmful to human health and the environment is referred to as air pollution. Lung cancer, cardiovascular disease, respiratory disease, and metabolic disease have all been linked to high concentrations of fine particulate matter with a diameter less than 2.5 m (PM2.5). Experimental research with various machine learning algorithms has yielded promising results in the field of air pollution prediction. Predicting air quality by determining concentrations will assist different departments, including governments, in alerting people who are at high risk, reducing complications. An improved air pollution prediction approach based on the XGBOOST and ARTIFICIAL NEURAL NETWORK algorithms is used to forecast air quality. Our goal is to look into a machine learning-based approach for air quality forecasting using the AQI index and get the best results possible. In addition, we compare the performance of different ML algorithms from the dataset with the use of a GUI to predict air quality bycharacteristics.

Localization of Partial Discharge in a Transformer Winding Using Ladder Network – A Review
Authors:- Tejal Dixit, Vivek Anand

Abstract:- The Detection of the location of partial discharge in the windings of power transformers has always been considered a challenging task because of the convoluted structure of the winding. There are several methods proposed for the localization of partial discharge in the transformer winding. In this paper, we have concluded a detailed study on detecting the partial discharge using a ladder network to compute the response of a partial discharge in a winding of a transformer. The algorithm for two separate winding sections that are along and across the winding is computed. A response is calculated at the winding neutral terminal.

A Study on Proximate Analysis of Chicken Intestine and Chicken Skin
Authors:- Asst. Prof. Mohammad Saydul Islam Sarkar, Student Md. Saiful Islam

Abstract:- In the present study, percentage of protein, fat, moisture, ash and carbohydrates of poultry by product was studied. For this analysis poultry by product were collected from dining and restaurant. For chicken intestine the intestine percentage of protein, fat, moisture, ash and carbohydrate was 68.28%, 8.64%, 7.37%, 4.33% and 11.40% respectively. For chicken skin the percentage of protein, fat, moisture, ash and carbohydrate was 22.16%, 47.64%, 9.2%, 11.14% and 10.86% respectively. Percentage of protein was more in intestine than skin. Percentage of fat content was more in skin than intestine. Percentage of moisture content was similar between intestine and skin. Percentage of ash content was more in skin than intestine. Percentage of carbohydrate content was similar between intestine and skin.

COVID – 19 Detection Using Medical Imaging and Health Parameters
Authors:- Aditya Raute, Alisha Punwani, Siddhesh Hadkar, Heramb Kulkarni, Asst. Prof. Lifna C.S.

Abstract:- This research paper focuses on the use of advanced technology in confluence with readily available machinery to create a testing environment for COVID-19 that is more efficient, accurate, and has a higher reachability. This paper aims to develop a unique algorithm for detection of COVID-19 based on chest X-Rays, in combination with the patient’s medical information including symptoms, age, bloodwork, and possible contact with someone infected with the virus. This proposal will especially be instrumental in locations with inadequate medical staff, and can drastically reduce the diagnosis time that is otherwise required.

Excessive Retardation in Concrete
Authors:- P.Senthamil Selvan

Abstract:-Setting time of concrete has vital role in the construction process. Retarders are used where early setting of concrete is not required and when higher retention period is needed to place the concrete. Chemical composition of retarder is formulated to stop the hydration temporarily to delay the initial set of concrete. Once the effect of retarder wears off initial set will begin and hardening will develop. Use of concrete as a construction material depends upon the fact that it is plastic in fresh state and gets hardens subsequently with considerable strength. This change in physical properties is due the hydration process which is irreversible. This reaction is gradual, first stiffening of concrete and then development of strength which continues for a long time. The rate of reaction primarily depends on the cement property, concrete mix, and use of mineral and chemical admixtures. It is observed from study that delayed setting of concrete has impacted only early compressive strength of concrete but later strength at 28days remains unaffected by delayed setting of concrete.

Factors Affecting Water Absorption in Hardened Concrete
Authors:- P. Senthamil Selvan

Abstract:Concrete can absorb moisture because of its porous nature. When ambient relative humidity is high, concrete will absorb moisture from the air. When relative humidity is low, water will evaporate from the concrete in to the ambient environment. This absorption of moisture by concrete causes dampness in roof slabs and when concrete is more porous dampness will be higher. Porosity in concrete especially in roof slabs is caused by following several factors; Poor mix proportion, Poor compaction and laying, Curing regime, Poor construction practices.And dampness in roof slab which is primarily absorption of moisture by concrete is caused by following factors; Porosity of concrete, Relative Humidity, Surface area of element, Exposure period of wetting and drying.

A Review Article of thermal Analysis of Shell and Tube Heat Exchanger Using Artificial Neural Network
Authors:- Dhananjay Kumar, Asst. Prof. Deepak Solanki

Abstract:This review explains the effective utilization of artificial neural network (ANN) modeling in various heat transfer applications like steady and dynamic thermal problems, heat exchangers, gas-solid fluidized beds etc. It is not always feasible to deal with many critical problems in thermal engineering by the use of traditional analysis such as fundamental equations, conventional correlations or developing unique designs from experimental data through trial and error. Implementation of ANN tool with different techniques and structures shows that there is good agreement in the results obtained by ANN and experimental data. The purpose of the present review is to point out the recent advances in ANN and its successful implementation in dealing with a variety of important heat transfer problems. Based on the literature it is observed that the feed-forward network with back propagation technique implemented successfully in many heat transfer studies. The performance of the network trained were tested using regression analysis and the performance parameters such as root mean square error, mean absolute error, coefficient of determination, absolute standard deviation etc. The authors own experimental investigation of heat transfer studies of tube immersed in gas-solid fluidized bed using ANN is included for strengthening the said review. The results achieved by performance parameters shows that ANN can be used reliably in many heat transfer applications successfully.

Security in ad-hoc network using encrypted data transmission and Steganography
Authors:- Prof. Ravindra Ghugare, Ankita Patil, Ajay Jha, Dhiraj Kuslekar

Abstract- Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost. Thus users can reduce the maintenance and burden of local data storage. Meanwhile, once data goes into cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. Hence, efficient and effective methods are needed to ensure the data integrity and confidentiality of outsource data on untrusted cloud servers. Thepreviously proposed protocols fail to provide strong security assurance to the users. In this paper, we propose an efficient and secure protocol to address these issues. Our method allows third party auditor to periodically verify the data integrity stored at CSP without retrieving original data. To compare with existing schemes, our scheme is more secure and efficient.

Design; Construction and Evaluation of Engine Operated Rotary Tiller
Authors:- Tamiru Dibaba, Rabira Wirtu, Wasihun Mitiku, Teklewold Dabi

Abstract- Currently, as Ethiopia is importing most of the agricultural mechanization technologies, including power tillers, there are significant shortages for using powered farm machineries in the country. Thus, this activity was initiated to design and construct an engine operated rotary power tiller locally and test performances. Accordingly, the design of this machine was based on the total specific energy requirements which carried out for an L-shape rotary tiller blade through using mathematical model. This rotary tiller was operated by 10 hp motor engine out of this 2.25 hp of the power was used to dig the soil. The performance of the machine was evaluated in terms of theoretical field capacity, actual field capacity and field efficiency on clay soil. The results indicated that the theoretical field capacity, the actual field capacity and the field efficiency was 0.146 ha/hr., 0.134 ha/hr. and 91.78 % respectively at 1.11 g/cm3 soil bulk density and 30.3 % soil moisture content. The soil mean clod diameter after pass through by rotary was 0.127 mm. But, the designed rotary tiller requires some improvement on operation system as writing on recommendation parts before demonstration.

Robot for Defense & Security with IOT
Authors:- P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N, HOD. Dr. Narasimhamurthy M S

Abstract- This Project is an IR & camera-based security system or robot for protected areas & borders, which senses the Intruders, trespassers and transfer video to other end. The robot to be built is going to have an IR Sensor which senses any intruders / trespassers and will activate the alarm as well as switch on the guns. The robot will also be capable of shooting the intruder when he cross the border, the bullet shall also be equipped with a GPS facility so that incase if the intruder tries to escapes he can be tracked with devices or smart phone. The robot will also activate the Camera, which will start capturing the live video and transmit the same to the receiver end, the smart phone. It will trigger the alarm and the data will be transferred to the mobile device.

Advance Glass House Monitoring and Controlling Using Deep Learning
Authors:- Raju. U, Siva. B, Vishal Jayaruban. S, Asst. Professor Ms. S. S. Sugania

Abstract- In current era, Faster Region-Convolution Neural Networks (Faster R-CNN) are desperately improved localization, identification and detection of objects. Recent days, Big data is evolved which leads huge data generation through modern tools like surveillance video cameras. In this project, it focused on tomato growing stages and plant health condition in the agricultural field, monitor the temperature, soil moisture, light intensity and sends the notification message to the user. Agriculture is one of major living source in India. By using impro ved and customized Faster R-CNN model (improved-detect), this project had trained datasets of Tomato and Plant. In this project, Tomato plant is mainly used for model training and testing. This project have experimented on plant image data set and tomato growing stages. Expe rimental results are compared with state of the architectures like Mobile Net, Dark Net-19, ResNet-101 and proposed model out performs in location. O btains best results in computation and accuracy. In the below results sections, we have presented the results with suitable models.

Reduce waste by using lean Manufacturing: Case study in Yarmouk complex
Authors:- Mohammed Sirelkhatim Abdelwahab, Prof. Hassan Khalifa Osman

Abstract- The aim of this paper is to study the gap of applying lean philosophy in production lines in one of Yarmouk industrial complex factories(A22) to achieve some goals summarized in changing production management from traditional manufacturing concepts to lean manufacturing concepts. Selection one of products mix in factory A22 to apply lean principles. The methodology of this research is to investigate the effect of batch size, inventory between processes and time spend due to transportation in total throughput and mean life time of the product.

Secure Data Search in Cloud Services Based on Encryption Scheme
Authors:- M. Tech. Scholar Shraddha Verma, Asst. Prof. Dr. Neha Singh

Abstract- In recent days, Cloud storage has become good entrant for organizations that suffer from resource limitation. Cloud computing is a procedure that surveys internet founded computing. The cloud computing method is used to lessen data organisation cost or time. In addition, cloud computing is used to store data that can be retrieved in remote areas. The most challenging task in the cloud is to ensure availability, integrity, and secure file transfer Searchable symmetric encryption (SSE) has been extensively explored in cloud storage, enabling cloud services directly .Search for encrypted data. Most SSE solutions are only suitable for honest but curious cloud services and will not differ. Because storage outsourcing is not trusted, this assumption is not always true in practice. Data protection or file protection in the cloud environment is one of the biggest problems in the cloud environment. Data protection involves many issues, such as wise management, integrity, claims, accessibility, etc. Data confidentiality means that only authorized users can access the data. The accuracy of the data means that if the information is accessible to a remote system or local system it should not be altered. Verification is an effective way to authenticate users who are trying to access information. The availability of data indicates the availability of data if necessary. Confidentiality is usually through encryption technology. The confidentiality of data and keywords is the most important privacy requirements in SSE. It ensures that users’ plaintext data and keywords cannot be revealed by any unauthorized parties, and an adversary cannot learn any useful information about files and keywords through the proof index and update tokens used in GSSE. A verifiable SSE scheme should be able to verify the freshness and integrity of the search results for users.

Performance Analysis of Routing Protocols for Security Attacks
Authors:- M. Tech. Scholar Pooja Verma, Asst. Prof. Dr. Priyanka Shivhare

Abstract- The next generation communication network has been widely popular as an ad hoc network and is roughly divided into mobile nodes based on mobile ad hoc networks (MANET) and vehicle nodes based on the vehicle’s ad hoc network (VANET). VANET aims to maintain traffic congestion by keeping in touch with nearby vehicles. Every car in the ad-hoc network works like a smart phone, which is a sign of high performance and building an active network.The self-organizing network is a decentralized dynamic network, as vehicles are constantly moving, efficient and secure communication requirements are required. These networks are more vulnerable to various attacks, such as hot hole attacks, denial of service attacks. This article is a new attempt to investigate the security features of the VANET routing protocol and the applicability of the AODV protocol to detect and manage specific types of network attacks called “black hole attacks Sybil attack and DDoS attack.A new algorithm is proposed to improve the security mechanism of the AODV protocol, and a mechanism is introduced to detect attack and prevent the network from being attacked by the source node this simulation set up performed on matlab simulation.

Artificial Intelligence in Healthcare
Authors:- Pooja Mahanth Bhagat

Abstract- Artificial intelligence (AI) is outlined as a field of science and engineering involved concerning the computational comprehension of what’s ordinarily referred to as intelligent behavior, and with the creation of artifacts that exhibit such behavior. It’s the subfield of engineering. AI is turning into a renowned field in engineering because it has increased the human life in several areas. AI has recently surpassed human performance in many domains, and there’s nice hope that in care. Artificial intelligence might leave the better interference, detection, diagnosis and treatment of unwellness. Major unwellness areas that use AI tool include cancer, neurology, medical specialty and polygenic disorder. Review contains this standing of AI applications in care. AI can even be accustomed mechanically spot issues and threats to patient safety, like patterns of sub- optimum care or outbreaks of hospital-acquired malady with high accuracy and speed. Some current researches of AI applications in care that offer a read of a future where supplying is a lot of unified, human experiences. This review will explore however AI and machine learning will save lives by serving to individual patients.

Improving Vegetable Disease Detection using Modified K-Means Clustering Algorithm
Authors:- Asst. Prof. C. Santhosh Kumar, J. Jenifer, G.Vidhya, Asst.Prof. R. Vijayabhasker

Abstract- India is the cultivating country and rich in producing agricultural products. So, we have to classify and exchange our agricultural products. Manual arranging is tedious so we use automatic grading system. It requires less time for grading of the agricultural products. Image processing technique is helpful in examination and evaluating the products. In this paper we proposed a vegetable disease detection system for recognizing diseased vegetables. Here we utilize the Image processing system for reviewing the vegetables. Vegetables are recognized dependent on their features. The features are color, shape, size,texture. We extract these features utilizing algorithms to distinguish the vegetables. We develop a recognition system for 2D input images. The main aim of this work is detecting infected vegetable based on their features with K-means clustering algorithm. Algorithm is classified into three steps namely enhancement, segmentation and classification. In this Vegetable samples are collected as images from high resolution camera and the data acquisition is carried out for database preparation. The image segmentation process is based on pixel of the image and it is applied to get the segmented and infected vegetables using K- Means Clustering algorithm.

Comparison of Different Hybrid Approaches Used for Sentiment Analysis: Survey
Authors:- Research Scholar Mansi Chauhan, Research Scholar Devangi Paneri

Abstract- In Today’s Technological Life Social media quiets a specious amount of Information. Social media has become a tremendous source of acquiring Users Opinions. It also helps to analyze how people, particularly consumers, feel about a particular topic, product or Idea. Among such opinions plays an important role in analyzing different business aspects. Sentiment analysis therefore becomes an effective way of Understanding public Opinions. Business Organizations can predict best Decision with Using Sentiment analysis. A lot of Research work has been done on Sentiment analysis in order to classify the opinions. Researchers have tested a variety of methods for automating the sentiment analysis process but very few Researchers are using Hybrid Approaches. This research paper shows the advantage of hybrid approaches to improve classification accuracy Compare to individuals. In proposed work a comparative study of the effectiveness of hybrid approaches was used for Sentiment analysis. Empirical results indicate that the hybrid approaches outperform compare to this individuals Classifiers.

Automating Business Processes to Improve Efficiency Efficient Design of Building Automation Systems
Authors:- Akaash Dey

Abstract-Back in the day, logistic companies weren’t using GPS devices and tracking software to optimize their routes throughout the day. They used to fill out bills on paper, using a finite set of receipt numbers, carrying over to accounting which spent days to a month for completion. More manpower means more delay and more cost as well, and productivity can only be followed by discipline and quality work on a gradual basis(Guerra, L., & Stapleton, L. (2019). How will our capabilities change after adding automation processes in existing businesses that follow traditional methodologies? To improve day to day operations of business using new technologies and automation to increase efficiency, save time and cost.Building and maintaining Automation Performance Index models (to keep track of the performance. We have already recognized some clear opportunities for research process automation: automated sampling, automated survey, and automated visualization of data (through online reporting dashboards or tools). These tools allow researchers to handle much bigger data sets and spend less time creating (or editing) common charts and graphs(Martinho, R., Rijo, R., &Nunes, A. (2015). This helps in quality decision making thus helping businesses to upscale.

Performance Enhancement of Leaf Spring Using Design Optimization
Authors:- M.Tech. Scholar Abhishek Chandra, Prof. G.R. Kesheorey (Supervisor & HOD), Dr. A.J. Siddiqui (Executive Director)

Abstract-Leaf spring is one of the potential parts for weight reduction as it accounts for 10% – 20% of the unsprung weightand thereforegood scope of work lies in its design optimization for weight reduction. This current research investigates the application of Taguchi Response Surface Optimization in optimizing dimensions of mono leaf spring. Initial FEA analysis is conducted using ANSYS software to determine to determine stresses, deformation and strain energy of mono leaf spring.Design of leaf spring is optimized using Taguchi design of experiments scheme generating 3D response surfaces, sensitivities, goodness of fit curves. The optimization parameter considered for analysis are spring inner radius and spring outer radius while the output parametersare equivalent stress, mass and deformation.

Fatigue Life Analysis of Tube Flange Welded Joint using ANSYS
Authors:- M. Tech. Scholar Sumit Kumar, Prof. G.R. Kesheorey (Supervisor & HOD), Dr. A.J. Siddiqui (Executive Director)

Abstract-The fatigue cracks are the one of the major cause of failures in welded joints and it us therefore essential to investigate the dimensional parameters affecting the fatigue characteristics of welded joints. The current research investigates the fatigue life characteristics of tube flange welded joint using techniques of Finite Element Method. The effect of dimensions i.e.,h, α and t on fatigue life and safety factor is investigated using Taguchi response surface method. The 3D response surface plots are generated each variable and range of dimensions are evaluated for which safety factor is maximum or minimum. The CAD modeling finite element analysis is conducted using ANSYS software.

A Glaucoma Detection Using Deep Learning Technique
Authors:-Ms. Arkaja Saxena, Avinash Pal (HOD)

Abstract- Glaucoma is a disease that relates to the vision of human eye. This disease is considered as the irreversible disease that results into the vision deterioration. Many deep learning (DL) models have been developed for the proper detection of glaucoma so far. SO here we have presented an architecture for the proper glaucoma detection based on the deep learning with making use of the convolutional neural network (CNN). The differentiation between the patterns formed for the glaucoma and the non glaucoma can be finding out with the use of the CNN. The CNN provides a hierarchical structure of the images for differentiation. Proposed work can be evaluated with total six layers. Here we also used the dropout mechanism for the effective performance in the glaucoma detection. The datasets used for the experiments are the SCES and the ORIGA. The experiment is performed for both the dataset and the obtained values are .822 and .882 for the ORIGA and SCES dataset respectively.

Design Factoid Question Answering System using BERT
Authors:- M. Tech. Scholar Sheetal Singh Goutam, HOD. Avinash Pal

Abstract-The field of text mining which deals with the providing of answers to the questions of the users is also one of the hot topics for researchers. In this paper Natural Language Processing (NLP) has been used which deals with the processing of the data that comes in any form like text, video, image, or audio. This NLP comes under the field of artificial intelligence (AI), which is used in the field of question answering (QA) system. Here proposedworked for designing a system that works for factoid QA which will answer the questions that are asked by the users.Lexical Chain and Keyword analysis is used in our system for the answering of questionsfrom a given set of articles.The reasoning system is used for the validity of the answering. The experiment here is done with the SQUAD dataset.In our experimentoverall average of the correct prediction of the answerthe accuracy obtainedfor the passage retrieval using existing TFIDF is70.30% and proposed BERT is 87.81%.

E-Mail Spam Filtring Using Machine Learning Technique
Authors:- ME Scholar Shivani Panwar, Asst. Prof. Kapil Shah

Abstract- In recent years, the single-modal spam filtering systems have had a high detection rate for text spamming. To avoid detection based on the single-modal spam filtering systems, spammers inject junk information into the multi-modality part of an email and combine them to reduce there cognition rate of the single-modal spam filtering systems, there by implementing the purpose of evading detection. In view of this situation, a new model called text-based dataset modal architecture based on model fusion (MMA-MF) is proposed, which use a text-based dataset fusion method to ensure it could effectively filter spam whether it is hidden in the text. The model fuses a Convolutional Neural Network (CNN) model and a Long Short-Term Memory (LSTM) model to filter spam. Using the LSTM model and the CNN model to process the text parts of an email separately to obtain two classification probability values, then the two classification probability values are incorporated into a fusion model to identify whether the email is spam or not. For the hyper parameters of the MMA-MF model, we use a grid search optimization method to get the most suitable hyper parameters for it, and employ a k-fold cross-validation method to evaluate the performance of this model. Our experimental results show that this model is superior to the traditional spam filtering systems and can achieve accuracies in the range of92.64–98.48%.

Intrusion Detection System Using Deep Learning
Authors:- M. Tech. Scholar Megha Sharma, Asst. Prof. Khushboo Sawant

Abstract- As the beginning of twenty-first century, PC framework describing improving Updationin form of network efficiency, several hand holders & kind of operationswhich achieve on the system. As progressing accompanied by latest generation under comfortable machines for ex: Internet mobile, tabs, smart instruments i.e. updated machines & software also several calculating devices, no. connected hand holders progressing most & most. Therefore, safety on connection has been key process which support complete hand holders. Intrusion detection has been procedure in protecting intrusion. Process of going to a system unable to take agreement termed as intrusion. An intrusion detection techniquemay predictcomplete upcoming & on- going intrusion at a structure. Intrusion detection techniquemay investigate complete priority under safety procedure with the help of managing infrastructure movement. As Intrusion detection system (IDS) are obvious class under safety layout, therefore it may manage capacity with support to determine safety points in a frame work. Numbers of several system supports under intrusion detection. Given research studying distinguishing in middle of hybrid documents opening approach & mono approach. Primary objective of the research are representing i.e. With support to hybrid document opening approaches may minimize duration difficulty in process as compared to mono approach. Particular structures were certifiedwith support to kdd’99 document pair. An observational out come significantly describing i.e. hybrid approaches with support to k-means & Projective Adaptive Resonance Theory may uniquely minimize structure practicing duration of the frame work &balancing perfectness of detections.

Healthcare Prediction Using Machine Learning Technique
Authors:- ME Scholar Chetna Sawalde, Asst. Prof. Ranjan Thakur

Abstract- In medicinal sciences forecast of Heart sickness is most troublesome undertaking. In India, fundamental driver of Death is because of Heart Diseases. The passings because of coronary illness in numerous nations happen because of work over-burden, mental pressure and numerous different issues. It is found as fundamental reason in grown-ups is because of coronary illness. Along these lines, for distinguishing coronary illness of a patient, there emerges a need to build up a choice emotionally supportive network. Information mining order systems, to be specific Modified K-means and SVM are broke down on Heart Disease is proposed in this Paper.

Reliable and Energy-Efficient Routing Protocol for Under Water Acoustic Sensor Networks
Authors:-M.Tech. Scholar Surbhi Rathore, Asst. Prof. & Head Ashish Tiwari

Abstract- The research for UASN has attracted a lot of people in recent years. Here, propagation and globalization are done for 3-D environments. The Acoustic Sensor network (UASN) works extensively with activities such as groundwater data and water filtration. An aquatic reactor network has been created to be used for marine harvesting, pollution control, marine exploitation, disaster prevention, cruise assistance, and monitoring applications. The UASN is a chemical sensor that uses batteries as a power source. Due to the difficult environment of UASN, replacing these batteries is difficult. One way to alleviate this problem is to extend the life span of UASN batteries by reducing energy consumption (improving energy efficiency). This proposes an Energy-Balanced Unequal Layering Clustering (EULC) algorithm that can improve acoustic sensor operation. The UASN layer produced by the EULC algorithm differs greatly from the nodes, providing a solution to the “hot spot” problem by building different clusters of similar size. Simulation results show that the EULC algorithm can efficiently balance the energy of the UASN platform, thus enhancing network life.

Facial Expressions Recognition Based on LBP & SVM
Authors:- M.Tech. Scholar Nagesh Patel, Asst. Prof. & Head Ashish Tiwari

Abstract- Facial expression analysis is a compelling and demanding problem affecting important applications in various fields such as human-computer interaction and data-driven animation. The development of effective facial expressions from the original facial images is an important step in gaining facial expression recognition. The actual evaluation is based on the face representation of statistical local functions, local binary pattern (LBP). Several machine learning techniques have been thoroughly observed on various databases. Researchers usually use the effective and competent LBP feature of facial expression recognition. Cohn Kanade is the database for the current work and the programming language used is MATLAB. First, the face area is divided into small areas through which histograms are extracted, local binary pattern (LBP) and then connected as a single function vector. This feature vector outlines a well-organized representation of face and is helpful in determining the resemblance among images. These operators along with other proposed techniques were experimented considering different settings viz. with or without localization and registration errors, person dependent or independent, operator scales, number of grids (hence the size) and number of available LBP based codes. The FR system was configured in verification mode using Eigen face approach derived on these LBP based histogram feature vectors. The FER system was configured for multi-class facial expression classification mode using Support Vector Machine (SVM). Experiments on facial expression databases reveal that maximum recognition rate would be obtained for the scale in which width is larger than height of the operator. Both proposed operators are sensitive to registration errors. However, these operators could be applied in automatic FERS.

Online Crime Management System
Authors:- S.S. Sugania, D. Jason Daniel Raj, S. Jagath Ratchagan, C. Dinesh Pandi

Abstract- The Online Crime Management system is designed in such a way that, it can be accessed anywhere through internet. A person who is about to file a complaint approaches the portal and registers into the portal using his information. After that the admin authenticates the user, after a successful authentication the user can login into the portal. The complaint will be received at the police end. And the process will be updated in the portal. For the efficiency of the police, various criminal activities are collected as datasets and analyzed using the KNN algorithm. The crime types like methods, properties used, fingerprints obtained are analyzed using the datasets. Now if the crime filed by the user matches the crime patters occurred before it will be easy for the police to solve the crime.

Image Processing Based Leaf Disease Detection Using Raspberry Pi
Authors:- Dinesh Kumar R, Prema V, Radhika R, Queen Mercy C.A, Ramya S

Abstract- Green plants are very much important to the human environment; they form the basis for the sustainability and long term health of environmental systems. In this project, we have proposed a system using raspberry pi to detect healthy and unhealthy plants & alerts the farmer by sending email. The main objective of this project is detection of diseases at the early stage. We mainly focus on image processing techniques. This includes a series of steps from capturing the image of leaves to identifying the disease through the implementation in raspberry pi. Raspberry pi is used to interface the camera and the display device along which the data is stored in the cloud. Here the main feature is that the crops in the field are continuously monitored and the data is streamed lively. The captured images are analyzed by various steps like acquisition, preprocessing, segmentation, clustering. This turn reduces the need for labor in large farm lands. Also the cost and efforts are reduced whereas the productivity is increased. Automatic detection of symptoms of diseases is useful for upgrading agricultural products. Completely automatic design and implementation of these technologies will make a significant contribution to the chemical application.

A Review on Software Fault Detection using a Classification Model with Dimensionality Reduction Technique
Authors:- Research Scholar Devangi Paneri, Research Scholar Mansi Chauhan

Abstract-Software plays the most important role in every organization it requires high-quality software. If a fault happens in this system then it causes high financial costs and affects people’s lives. So, it is important to develop fault-free software. Sometimes, a single fault can cause the entire system to frailer. So in the SDLC life cycle Fault prediction at an early stage is the most important activity it helps in effectively utilize the resources for better quality assurance. So before delivering the software to market it is important to identify defects in the software because it increases the customer satisfaction level. here in this survey paper present an ensemble approach to identifying fault before delivering the software. Ensemble classifier improved classification performance compared to the single classifier. So improved the accuracy the new algorithm is proposed that is “improved random forest” it works with random forest classifier with filter-based feature selection method. The feature selection method reduces the dimensionality and selects the best subset of features and gives that subset to the random forest classifier. The experiment carried the public NASA dataset of the PROMISE repository.

Load Flow Studies of 132/33KV Transmission Line in Port Harcourt Zone Using Newton Raphson’s Method
Authors:- M. Tech. Scholar Eze I. Wokocha, Prof. Christopher O. Ahiakwo, Prof. Dikio C. Idoniboyeobu

Abstract- This paper critically examines the Load Flow condition of the Port Harcourt Mains and Town 132/33kV transmission networks. In carrying out the Load flow study, the Newton Raphson power flow method in Electrical Transient Analyzer Program (ETAP) was used to evaluate the performance of both networks. Findings from the simulation exercise showed a lot of grey areas that required urgent attention within both networks. The combined transmission efficiency recorded low and the total system apparent losses stood at 52.5912MVA. All transformers were critically loaded as some exceeded 100% loading. The percentage operational bus voltages were below threshold as bus voltage magnitudes fell outside the +/- 5% nominal rated values. The systems also had undesired power factor levels. These threatening findings led to the quest to improve the networks. Three system improvement algorithms were used in this research viz: capacitor placement, transformer upgrade and transformer load tap modifications. These algorithms were superimposed in a stepwise mznner to obtain the most desired result. The final simulation result saw the performance of both networks within acceptable limits as the systems were greatly improved. The total system apparent losses reduced to 26.129MVA (50% improvement). All percentage loading of transformers were seen below the 60% benchmark. Bus voltage levels with significantly within the +/-5% limit and finally the power factor values were good.

Enhanced Drowsiness Detection Using Machine Learning
Authors:- Mohamed Nasrutheen. S, Morton Rillo. S, Naveen. A, Asst. Prof. Ms. K. Thamizharasi M. E

Abstract- A recent study showed that around half a million accidents occur in a year, in India itself. Out of which 60% of these accidents are caused due to Driver Drowsiness. Previous approaches are generally based on blink rate, eye closure, and other hand-engineered facial features. The proposed algorithm makes use of features learned using a convolutional neural network (CNN) to explicitly capture various latent facial features and the complex non-linear feature interactions. This system is hence used for warning the drowsiness of driver by ringing an alarm as well as to prevent traffic accidents by turning ON Parking lights and information shared to the registered mobile number via SMS, Phone Call with the help of GSM Module. This can reduce more than 50 percent of the accident.

Enhancing Air Pollution Predicton Using Artificial Neural Network with XGBOOST Algorithm
Authors:-Asst. Prof. Christina Rini R, Aishwarya N, Meenakshi G, Saranya M

Abstract- Air pollution has become a major public health concern in recent years. Despite substantial improvements in overall air quality in recent years, India remains the third most polluted country according to the latest edition of the World Air Quality Report [1]. The release of gases into the air that are harmful to human health and the environment is referred to as air pollution. Lung cancer, cardiovascular disease, respiratory disease, and metabolic disease have all been linked to high concentrations of fine particulate matter with a diameter less than 2.5 m (PM2.5). Experimental research with various machine learning algorithms has yielded promising results in the field of air pollution prediction. Predicting air quality by determining concentrations will assist different departments, including governments, in alerting people who are at high risk, reducing complications. An improved air pollution prediction approach based on the XGBOOST and ARTIFICIAL NEURAL NETWORK algorithms is used to forecast air quality. Our goal is to look into a machine learning-based approach for air quality forecasting using the AQI index and get the best results possible. In addition, we compare the performance of different ML algorithms from the dataset with the use of a GUI to predict air quality by characteristics.

Android Agricultural Application
Authors:- Omkar Aditya, Aparna Shukla

Abstract- Forecasting and technical information regarding farming can be provided by the experts of the farming community to the farmers by using new development in Information and Communication Technology (ICT). Agriculture kiosk is one of the many routes by which farmers in the rural areas get various agriculture information on the run using IT-based application installed in a Kiosk. There are few disadvantages of kiosks given as; a) It is not user friendly. b) Setup cost of the kiosk is very high. c) Problem of internet network connection. d) Security cost for protecting kiosk. Here, in this document, we have planned to build an IT-based application which provides a piece of information to the farmers overcoming the above problems by developing android application. The android operating system is open-source; using it we can design and develop software having functionality similar to agriculture kiosk. After developing an android application, we can deploy it in an android market, so that everyone can download it freely. This research paper shows how to design and implement such a technique which focuses on mobile farming technology.

Human Facial Expression Recognition Model Using Convolutional Neural Network
Authors:- Asst. Prof. M. J. Freeda, Maajidha Kamar. A, Lisha. S, Iswarya. M

Abstract- Facial expression is that the most powerful and natural non-verbal emotional communication methodology. the popularity of facial expressions isn’t a simple downside. folks will vary considerably within the approach they show their expressions. Hence, the face expression recognition remains a difficult downside in pc vision. To propose an answer for face expression recognition that uses a mix of Convolutional Neural Network and specific image preprocessing steps.It delineate the innovative resolution that has economical facial expression and deep learning with convolutional neural networks (CNNs) has achieved nice success within the classification of assorted face feeling like happy, angry, unhappy and neutral.

Emotional Contagion in Teenagers and Women
Authors:- Kavadi Teja Sree

Abstract- This study aimed at measuring the difference between emotional contingency among teenagers and women by using The Emotional Contagion Scale by Doherty, R.W. Emotional contagion is the phenomenon of having one person’s emotions and related behaviour’s directly trigger similar emotions and behaviour’s in other people. Emotions can be shared across individuals in many different ways both implicitly or explicitly. The Emotional Contagion Scale was designed to assess people’s susceptibility to catching joy and happiness, love, fear and anxiety, anger, and sadness and depression, as well as emotions in general (Doherty, 1997; Hatfield, Cacioppo, & Rapson, 1994, p. 157). The main objective of this study is to study whether emotions are contagious among teenagers and women. The survey was conducted among under graduates and post graduates between the age group of 15-28, in 100 under graduates and post graduates, among which 50 of them were teenagers and 50 were women. A statistical analysis of mean, standard deviation and t test were used, thereby concluding that there is a significant difference between teenagers and women. It was found that teenagers were more emotionally contagious than women in general. The study suggests that the teenagers and women should inculcate themselves first and be positive.

Design and Fabrication of Three Axis Rotating Trailer Using Pneumatic System
Authors:- Asst. Prof. S. Divya, Praveen S, Ramchandran R, Selvayukesh M, Sridhar S

Abstract- This project work “design and fabrication of Three axis rotating trailer using pneumatic system” has been conceived having studied the trouble in emptying the materials. Our review in the respect in a few automobile garages, reveals the fact that generally some troublesome strategies were embraced in emptying the materials from the trailer. The trailer will empty the material just in one direction only. It is hard to empty the materials in small compact roads and small streets. All the three sides are effectively to unload the trailer in our task are rectified. Automobile engine drive is coupled to the compressor engine, the compressed air its stores when running the vehicle. the pneumatic cylinder are is used to activate this compressed air, when activate the valve. Spur gear is used for rotating the trailer in three directions & easy for unloading the materials in small compact streets and roads.

Alam’s Model (“The BASE Model”)
Authors:- Mohammed Shafiq ALam.N

Abstract-Introduction–Stable Body Model–BASE Model–Gravity–Formation of Single Cell Atom –The Force, holding the “electrons” and “Planets” in their orbit–Electromagnetism–Light–Conclusion–Applications–Acknowledgement.

Robotic Arm Controlled by Using Arduino Uno
Authors:- Nikhil J.Solaskar, RushikeshM.Desai, AkashD.Sarkar, GaurangP.Tari,
Asst. Prof. VaishaliP.Ramtekkar

Abstract-In recent years the industry and daily routine works are found to be more attracted and implemented through automation via Robots. The pick and place robot is one of the technologies in manufacturing industries which is supposed to perform pick and place operations. The system is so designed that it eliminates the human error and human intervention to urge more precise work. There are many fields during which human intervention is difficult but the method taken into account has got to be operated and controlled. This results in the world during which robots find their applications. Literature suggests that the pick and place robots are designed, implemented in various fields such as; in the bottle filling industry, packing industry, utilized in surveillance to detect and destroy the bombs etc. The project deals with implementing a pick and place robot using Arduino for any pick and place functions. The pick and place robot so implemented is controlled using Bluetooth over Arduino Uno. The robotic arm implemented has three degrees of freedom. Many other features like line follower, wall hugger, obstacle avoider, detector etc are often added to the present robot for versatility of usage.

Face Mask Detection Using Tensor Flow JS. and Arduino
Authors:- Saswat Samal

Abstract-Coronavirus is continuously spreading until now all over the world. The impact of COVID-19 has been fallen on almost all sectors of development. Many precautionary measures have been taken to reduce the spread of this disease where wearing a mask is one of them. In this paper, I propose a system that restrict the spread of COVID by finding out people who are not wearing any mask in the public places which are monitored with cameras. While a person without a mask is detected, a warning sign is created and not allowed to enter into the building. A transfer learning architecture is trained on a dataset that consists of images of people with and without masks collected from various sources. It is hoped that the study would be a useful tool to reduce the spread of this communicable disease for many countries in the world.

Literature Survey of Two-Way Authentication System
Authors:- Mrs Dnyanada Hire, Monika Bhatt, Mohit Anand,Chaitanya Harde

Abstract-We all need to use stronger passwords which should not include our names, sequential number and birthdates even if these are easy to remember. But strong passwords are hard to remember so, the solution is Two-Factor Authentication (2FA). Two-factor authentication, also called multiple-factor or multiple-step verification, is an authentication mechanism to double check that your identity is legitimate, and this does not require transferring data over the internet. The two-factor authentication security feature has the following advantages: Enhanced security, helps in fraud prevention, Easy for users to understand and enable, Easier and quick account recovery

Predicting Areas of Improvement to Boost Up the Sales Using Data Analysis Techniques
Authors:- Manas Maheshwari, K Sai Varun, Farman Ahmed, Sonali Borase

Abstract-This paper gives an overview of Data analysis and how Data analysis is used in Business Intelligence tools and business development. It gives different algorithms and techniques to perform Data analysis and its implementation.

Design and Implementation of Fast Charging Universal Power Bank Using Super Capacitor
Authors:- Asst. Prof. Mr. K. Sathiyaraja, M. Sasikala, R. Shobhana, R. Thamil Ilakkiya, R. Manoj

Abstract-Portable power banks are comprised of battery in a case with a circuit to control power flow. Power banks are becoming increasingly popular because the battery life of phones, tablets and portable media players is exceeded by the number of time gadgets used in a day. In this project, the design and implementation of universal power bank using super capacitors as a charge storage device is presented. Existing power banks use batteries to store charges and it takes a long time to charge completely. In this work, batteries are replaced with super capacitors to take advantage of its quick charging and slow discharging feature. Super capacitors are charged using charging and regulation circuit. An output regulator circuit delivers the necessary power for charging portable devices. A display is also implemented using a Atmega microcontroller for monitoring. Battery technologies are well established and widely used technology but they offer several disadvantages like weight, volume, large internal resistance, poor power density, poor transient response. On the other hand, due to advancement in the material and other technology, Super capacitor or Ultra capacitors or Electrostatic Double Layer Capacitor (EDLC) are a most promising energy storage device. They offer a greater transient response, power density, low weight, low volume and low internal resistance which make them suitable for several applications.

Cyber Security: The Study on Information Gathering
Authors:-Varun Verma, Saurabh Kumar Dubey, Tajwar Khan, Prem, Himanshu Pandey

Abstract- Internet-wide network scanning has numerous security applications, including exposing new vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire public address space with existing tools is both difficult and slow. We introduce GRABIN – An automated Cyber Security tool by which we can gather the information about the particular target like we can gather the information about domains, subdomains, users, user emails, open ports, their IP addresses and much more. Also, we are able to find web App vulnerabilities in the proper CVE format, and we are able to hash the values and we can encrypt and decrypt out messages by using the tool. We present the scanner architecture, experimentally characterize its performance and accuracy, and explore the security implications of high speed Internet-scale network surveys, both offensive and defensive. We also discuss best practices for good Internet citizenship when performing Internet-wide surveys, informed by our own experiences conducting a long-term research survey

Effect of Multifluid Flow for Internal Heat Generation or Absorption in Presence of Concentration in a Vertical Channel
Authors:-Mangala Kandagal, Shreedevi Kalyan

Abstract- The effect in heat mass transfer and of multi-fluid flow characteristics in vertical channel is investigated in this paper. The fluids are incompressible in both the region and assumed the transport properties of fluid flow are constant. By the help of analytical method all the basic equations governing th set of coupled nonlinear ordinary differential equations are solved. These results are illustrated by plotting graphs and for various physical parameters. Here we can control result by heat absorption coefficient, width ratio and viscosity ratio.

Online Crime Management System
Authors:-S.S. Sugania, D. Jason Daniel Raj, S. Jagath Ratchagan, C. Dinesh Pandi

Abstract- The Online Crime Management system is designed in such a way that, it can be accessed anywhere through internet. A person who is about to file a complaint approaches the portal and registers into the portal using his information. After that the admin authenticates the user, after a successful authentication the user can login into the portal. The complaint will be received at the police end. And the process will be updated in the portal. For the efficiency of the police, various criminal activities are collected as datasets and analyzed using the KNN algorithm. The crime types like methods, properties used, fingerprints obtained are analyzed using the datasets. Now if the crime filed by the user matches the crime patters occurred before it will be easy for the police to solve the crime.

Survey on Detection and Identification of Face Mask
Authors:-J. Jenitta, Shrusti B K, Vidya D Y, Vinay S Sinnur, Shivesh Varma P

Abstract- The world is coming out of lockdown and starting its new normal. As Education plays a key role in every student’s life, the Government is planning to reopen schools and colleges after the COVID-19 pandemic situation. It is mandatory for the educational institutions to follow Standard Operating Procedure(SOP) to reduce the risk of spread of COVID-19 in the institution campus. In SOP one important point is wearing a face mask because the virus that causes COVID-19 is mainly transmitted through droplets generated when an infected person coughs, sneezes, or exhales. These droplets are too heavy to hang in the air, and quickly fall on floors or surfaces. This paper aims to review various state of art methods available to find whether the person who is entering the institution is wearing a face mask or not, using various machine learning techniques.

Speed Control Analysis and Performance Comparison of Induction Motor Using Improved Hybrid PID Fuzzy Controller
Authors:-Sartaj Singh, Prof. Priya Sharma (HOD)

Abstract- To control the speed of an induction motor is very difficult. The speed control relies on the electric power factor offered to the motor. Many researchers have performed a significant number of studies to enhance the mechanism of vector control. They have used different controllers such as PI (Proportional Integral), PD (proportional derivative), Fuzzy-PI, Fuzzy PID (Proportional Integral derivative). In this paper, a novel approach is developed which used hybrid controller. This controller is developed by the amalgamation of Fuzzy type-2 and PID controller. Fuzzy type-2 has various advantages over type-1 fuzzy which overcome the limitations of the traditional system. A literature survey is given with the detailed information of the works done in this field. The mechanism is developed by taking into consideration different parameters such as rise time, settling time and overshoot. The proposed model is analysed using MATLAB. Simulation results showed the better efficiency of the novel controller. Is observed that, developed controller reduced the time required by the motor to achieve its target speed, thus, gives excellent outcome.

Patient’s Health Monitoring System with Smart Medicine Box
Authors:-Ms. S. Sivaranjini Ap/Cse, V. Chithiraiselvi, M. Suruthi, M. Vinitha

Abstract- The medicine box system contains a biomedical sensor to monitor the health condition of the patient. The information about the health condition and the details of medication will be stored in the server which can be accessed by both doctor and patient and also doctor can change the prescription based on the patient’s condition on the server. The intelligent medicine box will help a patient to remind the right time to take the medicine based on prescription by receiving notification to the patient’s fixed email address using Wi- Fi module and he also will receive voice message using speaker. If he forgets the actual time of taking medicine and goes to take medicine at any time the medicine box will not open as a servo motor will make the box locked.

Review of Skin Diseases Classification Using Machine Learning
Authors:- Ram Charan Mishra, Rahul Mishra, Kusum Sharma

Abstract- Skin diseases are among the most common health problems worldwide. These diseases like acne, eczema, benign, or malignant melanoma have various dangerous effects on the skin and keep on spreading over time. Feature extraction using complex techniques such as SVM (Support Vector Machine) and Convolutional Neural Network (CNN). The work may in the future serve as a knowledge base for an expert system specializing inmedical diagnosis, testing evaluation, treatment evaluation, and treatment effectiveness. AlexNET, a pre-trained CNN model will be used to extract the features. This system will give more accuracy and will generate results faster than the traditional method. multiple skin lesions are classified using different image processing and machine learning techniques. The most used machine learning techniques used for skin lesion classification are SVM, trees, artificial neural network K-nearest neighbor, ensemble classifiers and convolution neural network (CNN).

Structural Synthesis of Melamine on the Properties of Concrete Different Mix Time Slice
Authors:- M. Tech. Scholar Mohit Chandak, Asst. Prof. Sourabh Dashore

Abstract- The performance of concrete primarily depends upon the sort and quantitative relation of its constituents, compaction, natural conditions and admixtures used throughout the action process. A part of this analysis emphasis to calculate the results on strength of concrete once water-cement quantitative relation is constant and the rise in slump happens with the increase in the quantity of Super plasticizer. The rest of the investigation is dispensed to review the results of Superplasticizer with completely different dosages under completely different action regimes at the associate close field with different temperatures. For this purpose, a concrete combine with silica fume and fly ash with all parameters constant was associate anionic alkali based Superplasticizer with no chlorides. Different percentage of melamine were employed in completely different batches of all 48 specimens and cured under completely different action conditions so tested for compressive and tensile strengths following the water curing testing showed most strength. The highest and lowest values of compressive strength were obtained with the addition of 1.5% to 4.5% Superplasticizer severally. It had been found that while not increasing the W/C quantitative relation, the addition of the Super plasticizer exhibits an increase in strength.

Investigation of Performance of Organic Rankine Cycle-Vapor Compression Refrigeration System Using Different Refrigerant
Authors:- M. Tech. Scholar Amjad Fahad Usmani, Prof. Dr. M. K. Chopra

Abstract- In this study, the energy and exergy analysis of a combined cycle was carried out. This cycle consists of an organic Rankine cycle and a vapor compression refrigeration cycle for producing the cooling effect. Four organic fluids were used as working fluids such as R600a, R245fa, RC318 and R236fa. The parametric analysis allowed us to characterize the combined system and to study the effect of some parameters that were used to estimate the thermal and exergy efficiency of the studied system. The results showed that the operating parameters have a significant impact on the performance of the combined system. Due to environmental issues of R600a is recommended as a superior candidate for the ORC-VCR system for retrieving low-grade thermal energy.On the other hand, the results of the exergydestruction distribution showed also that maximum exergy destruction rate is found in R600a and minimum is in RC318.

The Importance of Drone Technology in Nigerian’s Construction Industry
Authors:- Birmah M. Nyadar, Buba Y. Alfred, Audu M. Justina, Dr. Jibrin Sule, Maton D. John

Abstract- Drone is also known as Unmanned Aerial Vehicles (UAVs) are aircrafts that fly without any humans being onboard. They are either remotely piloted, or piloted by an onboard computer. Drones are used for emergency response, inspection of damaged roofs, collapsed buildings, accessing difficult to reach places and many builders / engineers have come to rely on drones for their everyday operations in the developed countries. The advent of new construction technologies did not exterminate the job for construction workers, rather it created a room for workers to acquire skills of the modern technology for the new generation. Drones are not common in Africa and has been grounded in some countries because the governments do not have full understanding of the technology. The professionals in other related fields don’t really have the knowledge of operating drones. The purpose of this paper is to create awareness of drone technology application in the Construction Industry of Nigeria, which the use of drones is not common in Nigeria. Oral interview with the construction workers in Abuja and the use of personal observation and open source materials were part of the methodology. The use of drones save time, reduces cost, allows remote monitoring of construction site, easy accessibility to difficult terrains or sites and reduces risk of human lives to dangerous sites. The Nigerian Construction Industry needs to embrace the use of drones in all project execution for effective job delivery, the Public and the Private sector can invest in the technology where Professions can be trained in drones operation, the engineers with interest in drone technology should establish a drone service / repair center as an avenue for job creation in Nigeria.

Student Performance Prediction using Machine Learning Techniques
Authors:- M. Tech. Scholar Nandini Sahu, Prof. Ashutosh Khemariya, Prof. Aditi Tiwari

Abstract- The capacity to screen the advancement for students’ academic execution is an essential issue of the educational Group from claiming higher Taking in. An arrangement to dissecting students’ comes about dependent upon group dissection and utilization standard measurable calculations with organize their scores information as stated by the level about their execution may be portrayed. In this paper, we also actualized the k-mean grouping algorithm for examining students’ consequence information. Those model might have been consolidated for those deterministic model should dissect those students’ effects of a private foundation clinched alongside % Iberia which is a great benchmark with screen the progression of academic execution about people for higher institutional to the reason for making an successful choice by those academic organizers.

Android Phone Data Security using Special Features
Authors:- M. Tech. Scholar Rumana Nigar Ansari, Prof. Ashutosh Khemariya, Prof. Aditi Tiwari

Abstract-Today, everyone necessarily requires a smart phone. There are tremendous number of possibilities and numerous scopes witnessed in different areas of the mobile world. With this rapid growth in mobile services the researchers are alarmed about the security threats and are working upon it by securing the infrastructures which support the online-interface and other distributed services. Man has embraced mobile phones like a best friend. Among 7 billion people worldwide, around 4 billion smart phones and millions of tablets are in use. A smart phone has various utilizations like taking pictures, watching movies, listening songs, surfing internet, making bank transactions, using social media, calling etc. A smart phone user keeps all his personal and professional data in his phone. These devices are valued immensely as we keep all our records in it. The personal data carried by such mobile devices are very important. These important and sensitive data (account numbers, policy numbers and others) can cause trouble if the device is lost. At present, there are a huge number of populations which recognize the security threat of smart devices and personal computers. Still, many do not realize the everyday threat while accessing their smart devices. As a matter of fact, around 32 percent of the population thinks that they do not require any software for securing their smart phone devices. But this mindset and rising fame of smart mobile devices have attracted cyber crime up to an extreme extent. Over the period of months, the attacks have increased and reached up to 37 percent. This has become the topic of discussion at this hour and several reports have been published for the same. These reports also talk about the susceptibility of the android smart devices. The susceptibility of smart phones is about 99 percent as mentioned by a survey. These personal phones and tablets are actually a type of mini-computers and they are more prone to vulnerability than desktops. Therefore, a mobile user must be very careful about his smart device and install a simple application and put a password to safeguard his data.We discuss about secure android application on android phone. The objective is to provide such services which can secure customers’ android devices. This data security methodology of cell phones is quite novel. In this paper, we discuss about using AES algorithm for handling the data of Android mobile phones.The objective is to provide such services which can secure customers’ data. This data security methodology of cell phones is quite novel.

Zigbee-GSM Based Automatic Meter Reading System
Authors:- Prof. Z.V. Thorat, Shreyas Chaudhari, Siddhant Hajare, Mansi Kamble, Karan Katariya

Abstract-This project is concerned with the electrical board. As the population grows, the number of electric meters is increasing. In India standard meters are widely used to calculate power consumption. Collecting this large amount of data requires extra time and effort. In this way before the bills are made the meter readings are kept by hand in low-level channels, which are time consuming and full of human error. As a result, the consumer always complains about his or her debts. This whole network is full of holes in different categories and cannot be removed or found. To avoid this type of problem, wireless meter reading technology can be used. It also saves staff. Another feature of this meter is that it improves accuracy because it works in real time. It increases the speed of operation because it requires fewer human efforts and especially energy consumption is very low. In this case, the power consumed by the consumer is monitored by low-level channels via a wireless network. In low-level channels, debt is calculated and records are kept. By using this process, we can easily monitor any error in the meter and any interference is used to steal electricity. Eliminates error of any type of data loss during data transfer and acceptance. The main part of the model is “ZigBee”, because it has a lower data rate and therefore uses less operating power. As we know from ZigBee devices, no one can use the data, only authorized person or device can read the data. That is why it is so reliable. Therefore, this model is a test to remove all errors created with standard meters.

Structral Behavior of Concrete Bridge with Soil-Structure Interaction
Authors:- M. Tech. Scholar Neeraj Sansiya, Prof. Sourabh Dashore

Abstract-An iterative plan technique of progressive straight unique reaction investigations that considers the non-direct conduct of the projections brought about by refill soil yielding is created. Likewise, a non-straight static investigation of the extension soil framework is directed. These examinations explore the impacts of the dirt projection association on seismic investigation and plan of vital scaffolds. Past experience and late examination demonstrates that dirt structure collaboration assumes a significant part on the seismic creation of scaffold structures. Projections pull in an enormous segment of seismic powers, especially in the longitudinal course. In this way, investment of refill soil at the projections must be thought of. A plan-driven system to show the projection firmness for either direct or non-straight examination, considering the inlay and the wharf establishment, is introduced. An extension with solid projections is chosen to exhibit the proposed methods. Parametric investigations show that, if the scaffold is examined with the proposed system rather than a basic methodology that disregards refill firmness decrease, the determined powers and minutes at the docks are more prominent by 25%- 60% and the removals by 25%-75%, contingent upon soil properties.

Modern Air Purifier Drone for Control Air Pollution
Authors:- Asst. Prof./HOD Ramya. R, Asst. Prof. Punithavathi. K, Hariharan. M, Karthi. G, Mohamed Al Ameen. H, Vishnuvarthan. U

Abstract-The pollution is presently become very burning issue not only in India but also all over the globe and it is various types, therefore, here, we considered only air pollution for depth discussion. Pollution refers to the release of chemicals or inimical substances including particulates and biological molecules into the earth`s environment which has a very insidious effect on human, animal and plant life. It is a significant risk factor for several pollutions cognate diseases and health conditions including lung cancer, heart diseases, etc. and water react very rapidly to pollutants and will abstract.

Incisive Health Recognizing for Animals
Authors:- Asst. Prof./HOD Ramya. R, Asst. Prof. Dhivya. K, Afra Banu. A, Arthi. P, Kayalpraba. G, Nithya. V

Abstract-In the some cases of emergency, veterinary or pet hospital staff cannot able to treat sick animals immediately as they cannot monitor animals after surgery or recuperating for 24/7. This problem is the leading cause of death in said animals. Therefore, developers have the concept to develop a health monitoring system which keeps tracking the heart rate and temperature of sick animals in veterinary hospital. The web application focuses on the rate of heart rate and temperature. If the heart rate and temperature are abnormal, it will alarm veterinary or pet hospital staff the animal is at risk and needs to be treated correctly. This system can be monitored by recording and analyzing the health information of sick animals, when animals have abnormal heart rate or temperature, they can be treated as soon as possible.

Instinctive Escalation and Surveying System for Farming
Authors:- Asst. Prof./HOD Ramya. R, Ajithkumar. M, Balamurugan. N, Sakthivel. V, Vignesh. S

Abstract-Agriculture plays a crucial role in the Indian economy. It’s not only a food and raw material but also provides employment opportunities. Instead of increasing the scale of agriculture a better way will be implementing smart is precision agriculture technique using IOT. This model can be very effective than the traditional method as risk of crop failure, less yield, excessive water supply or excessive use of fertilizers and pesticides ect. To monitor the environmental factors such as Temperature, humidity, soil moisture etc and help the formers in handling the crops automatically without any manual effort. The yield of any crop can be maximized with the help of precision agriculture by reducing the wastage. The data controlled by the sensor nodes deployed all over the field in sent to the cloud and there the data is analyzed and visualized for the ease of formers. With the help of visualized data formers can take precise and effective decision affecting their crops.

Smart Strike of Fruit Aspect Using SVM Algorithm
Authors:- Asst. Prof./HOD Ramya. R, Asst. Prof. Thaiyalnayagi. S, Mahadevi. M, Sabitha. D, Nithya. L

Abstract-Diseases in fruit cause devastating problem in economic losses and production in agricultural industry worldwide. In this paper, a solution for the detection and classification of fruit diseases is proposed and experimentally validated. The image processing based proposed approach is composed of the following steps; in the first step K-Means clustering technique is used for the image segmentation, in the second step some features are extracted from the segmented image, and finally images are classified into one of the classes by using a Support Vector Machine. Our experimental results express that the proposed solution can significantly support accurate detection and automatic classification of fruit diseases. In the third step training and classification are performed on a SVM. It would also promote Indian Farmers to do smart farming which helps to take time to time decisions which also save time and reduce loss of fruit due to diseases. The leading objective of our paper is to enhance the value of fruit disease detection.

Systematic Perusal of Volder’s Algorithm in Lifescience
Authors:- Asst. Prof. /HOD Ramya. R, Asst. Prof. Sahaya Reshma. M, Gayathri. R, Parkavi. G, Rakshitha. R

Abstract-In medical field, ICA plays an important role. This system reduce the power consumption and memory using Modular multiplication. The proposed approach reduce the circuit area in separating the super-Gaussian source signals. Efficient hardware architectures for modular multiplication, modular inversion, unified point addition, and modular multiplication are proposed. In this system aims to design and implement a very large scale integration [VLSI] chip of the extend Infomax ICA algorithm. Further more, the measurement results show the ICA core can be successfully applied to get output within a minutes.

Solar Power Driven Multifunctional Agribot
Authors:- Asst. Prof. /HOD Ramya. R, Asst. Prof. Lakshmipriya. D, Ajitha. V, Kavipriya. D, Parkavi. B

Abstract-This paper aims to design an agricultural robot, which helps the people to survive where it performs operations such as digging of soil, sowing of seeds, spraying pesticide, cutting grass and ploughing and the detection of obstacles. In previous projects the techniques used were complicated as well as expensive. This AGRIBOT uses the renewable energy i.e. solar energy obtained from solar panel powered battery, it also consists of a visual obstacle detector and a Bluetooth module which is paired with a Bluetooth terminal application through which it is easily controlled and the instructions are given to the AGRIBOT for the operations to be performed. Hence this is a low cost AGRIBOT and is easy to operate without the need to go to the field personally it also helps the farmers to facilitate to ease work by reducing human effort, saving time and energy. By this farming can be done easily in any climatic condition irrespective of day and night. This agribot compared to other robots is very beneficial as it has multitasking functional system and advanced techniques for smart farming.

Image Processing Based Leaf Disease Detection Using Raspberry Pi
Authors:- Dinesh Kumar R, Prema V, Radhika R, Queen Mercy C.A, Ramya S

Abstract-Green plants are very much important to the human environment; they form the basis for the sustainability and long term health of environmental systems. In this project, we have proposed a system using raspberry pi to detect healthy and unhealthy plants & alerts the farmer by sending email. The main objective of this project is detection of diseases at the early stage. We mainly focus on image processing techniques. This includes a series of steps from capturing the image of leaves to identifying the disease through the implementation in raspberry pi. Raspberry pi is used to interface the camera and the display device along which the data is stored in the cloud. Here the main feature is that the crops in the field are continuously monitored and the data is streamed lively. The captured images are analyzed by various steps like acquisition, preprocessing, segmentation, clustering. This turn reduces the need for labor in large farm lands. Also the cost and efforts are reduced whereas the productivity is increased. Automatic detection of symptoms of diseases is useful for upgrading agricultural products. Completely automatic design and implementation of these technologies will make a significant contribution to the chemical application.

Fire Fly Optimization Based Sentiment Mining Using Pattern Feature
Authors:- M. Tech Scholar Kiran Sahu, Dr. Avinash Sharma

Abstract-As Individual convey their thoughts on social media by discussing personal life events or other issues related to politics, science, environment, etc. This produce large amount of sentiment data which can be further mine by utilizing some techniques of pattern, classification, etc. So this paper solve issues of sentiment identification by proposed an FireFly Optimization Genetic Algorithm (FFFOGA) which is a kind of swarm optimization algorithm. Pattern were extract from the input dataset where each graph was developed as per patterns. Resultant of FFOGA was set of cluster center (Patterns) represent sentiments. Real Twitter dataset was used for the experiment evaluation. Results were compared on Precision, recall, accuracy with existing methods and it was shown that proposed FFOGA works better for sentiment identification.

Big Data Mining in Internet of Things Using Fusion of Deep Features
Authors:- Faraz Pourafshin

Abstract- Today internet of things is employed in different fields such as security, protection and health care systems. This major attention causes huge amount of information transfer from different nodes in network. Recently, big data mining has become one of the most crucial challenges in IOT. In this paper, a novel method based on deep learning is proposed to mine images which is collected from IOT. The proposed method consists of two parts: 1) Features extraction, 2) classification. Features from a convolutional neural network called Alexnet is extracted to use in data mining process. In classification part, a couple of K Nearest Neighbor (KNN) is employed to process features. Also a majority voting approach is used to find the final result. We evaluated our method by pictures which was captured by MIT University. Experimental results proved that the proposed method has better accuracy and precision in comparison of KNN, SVM, Neural network and Bayesian classifiers.

Electricity Generation by E-Bump
Authors:- Parth Gotawala, Smit Gamit, Kedar Kelawala, Niraj Patil, Punit Suthar, Asst. Prof. Happy Patel

Abstract- This project is designed to use the jerking movement produced by the vehicle while passing the speed breaker and then turns this energy to electricity which then can be used for other purposes. Consequently, a kinetic energy is produced and transferred into electrical power. And the biggest advantage of this type of speed breaker over other speed breakers that produces electricity is that, it is not necessary to dig down the road to install or do the maintenance of the speed breaker. Designing energy recovery systems that are pollution free has become a significant goal.

Sentiment Analysis:Textblob For Decision Making
Authors:- Associate Prof. Praveen Gujjar J, Prof. Prasanna Kumar H R

Abstract- Data is the new oil for the market survey. Internet is the one where it constitute the huge amount of the data in the form of customer reviews, customer feedback etc., TextBlob is one of the simple API offered by python library to perform certain natural language processing task. This paper proposed a method for analyzing the sentiment of the customer using TextBlob to understand the customer opinion for market survey. This paper, provide a result for aforesaid data using TextBlob API using python. The paper includes advantages of the proposed technique and concludes with the challenges for the decision makers when using this technique in their market survey.

Modelling of Arduino Based Pre-Paid Energy Meter Using GSM Technology
Authors:- Asst. Prof. Syed Shajih Uddin Ahmed, Md. Basheer Ahmed, Md. Shahnawaz Khan, Mirza Akif Ali Baig

Abstract- This project presents the design and modelling of Energy recharge system for Prepaid metering. The present system for energy building in India is error prone and also time and labor consuming. Errors get introduced at every stage of energy billing like errors with electro-mechanical meters, human errors and processing errors. The aim of this project is to minimize the error by introducing a new system of Pre-paid energy metering. This will enable the user to recharge his/her electricity amount from or any place by using a GSM Module. We can easily implement many add-ons such as energy demand prediction, real time tariff as a function of demand and so on.

Natural Frequency and Dynamic Stability Region Study
Authors:- Prof. A. K. L. Srivastava, Md Mozaffar Masud

Abstract- The dynamic instability regions are analysed using Hill’s infinite determinants system. The excitation frequency of plates with different boundary conditions, or aspect ratios, was investigated. The results are determined using the bending displacements of plate and stiffener. The results show that the principal excitation frequency regions have a significant effect considering and neglecting in-plane displacements.

Power Generated by Regenerative Braking Systems
Authors:- Yash Bhavsar, Mahaveer Jat, Mrs. Hiral Sonkar, Dr. D. M. Patel

Abstract- Most brakes commonly use friction between two surfaces pressed together to convert the kinetic energy of the moving object into heat, though other methods of energy conversion may be employed as all the energy here is being distributed in the form of heat. Regenerative braking converts much of the energy to electrical energy, which maybe stored for later use. Driving an automobile involves many braking events, due to which higher energy losses takesplace, with greater potential savings. With buses, taxis, delivery vans and so on there is even more potential for economy. As we know that the regenerative braking, the efficiency is improved as it results in an increase in energyoutput for a given energy input to a vehicle. The amount of work done by the engine of the vehicle is reduced, in turnreducing the amount of energy required to drive the vehicle. The objective of our project is to study this new type of braking system that can recollect much of the car’s kinetic energy and convert it into electrical energy or mechanical energy. We are also going to make a working model of regenerative braking to illustrate the process of conversion ofenergy fromoneformto another. Regenerative braking converts afraction amount of total kinetic energy intomechanical or electrical energy but with further study and research in near future it can play a vital role in saving thenon-renewable sources of energy.

Literature Survey on IOT and Machine Learning Based Disease Predictor
Authors:- Charmi Zala

Abstract- The world is moving with a fast speed and in Order to keep up ourselves with the whole world we tend to ignore the symptoms of disease which can affect our health at a large extent. Healthcare is one of the important parts for each human being in the world. Health care is given extreme importance with conspicuous novel corona virus. Spreading of disease such as Covid19 has become a global pandemic due to fast spreading of virus in all the countries. Knowing the current situation Internet of Things (IoT) with machine learning will help a lot in serving the best to healthcare and saving many lives around us. Predicting disease according to the symptoms can reduce unnecessary rush to the hospital. This could help to treat the patient early and save many lives getting affected by different disease and virus. As it is rightly said “prevention is better than cure” so predicting disease can help to prevent the occurrence of disease. The Internet of Things (IoT) is very helpful as it can work with real time data as well as the past data that was recorded earlier. This IoT sends data through Wireless Sensor Network (WSN) to the computational devices so that the result can be generated. Machine learning with help of different prediction algorithm such as Decision tree, Naive Bayes etc can help to predict the disease fast and accurate. IOT and Machine Learning are on trend in medical field as it helps both patient and the doctor. Early prediction leads to save time, cost and prevent humans getting affected by diseases.

IOT Based Disinfection and Sterilization using Temperature and Humidity
Authors:- Asst. Prof. M. Nalina Sangaviya, S. Lakshmanan, M. Pavithra, G. Sasireka, G.Vahini

Abstract- The Project is developed based on the Guideline for Disinfection and Sterilization in Healthcare Facilities, University of North Carolina Health Care System. extrapolates quantitative data for ozone virucidal activity on the basis of the available scientific literature data for a safe and effective use of ozone in the appropriate cases and to explore the safety measures developed under the stimulus of the current emergency situation. Ozone is a powerful oxidant reacting with organic molecules, and therefore has bactericidal, virucidal, and fungicidal actions. At the same time it is a toxic substance, having abverse effects on health and safety. Instead of Ozone system ,here we are proposed Temperature and Humidity based Disinfection and Sterilization system. Proposed system maintaining 37OC and 85% of Relative humidity at Disinfection and Sterilization area. Its use is being proposed for the disinfection of workplaces, public places with particular reference to the COVID-19 pandemic outbreak. Water mist is generated by Ultrasonic based mist maker and Temperature of the room is increased by heater attached with proposed system. It should be injected into the room that is to be disinfected until the desired Humidity and Temperature concentration is reached. After the time needed for the disinfection, its concentrations must be reduced to the levels required for the public safety. Here we are using Node MCU Esp8266 module to transfer status of the system to remote location. Electromagnetic relay is used to turn on and off the Ultrasonic humidifier and Heater.16*2 LCD display is used to display the notification to user side. The developed system improves the reliability and stability of Disinfection and Sterilization.

Testing of Alternative Material for Production of Excavator Bucket Teeth from Scrap using Traditional Methods
Authors:- Sir Elkhatim Mohammed Jumaa Abou Zeid, Izeldin Ahmed Abdalla Babikir, M. I. Shukri

Abstract- Failure of the excavator bucket teeth is commonly overcome either by replacing with a new one which is too expensive or by welding the failure parts with metal that sometimes may have different properties from the original one, which may lead to imbalance cases. This study was conducted to test the modified welding method by fabricating alternative bucket teeth from available engine block scrap, using a sand casting process in a traditional foundry, operated by engine waste oil. The quality and properties of the two bucket teeth (Failure (F) and the Alternative (fabricated from scrap) (A)) were tested under laboratory and field measurements. Type of tests includes hardness, chemical composition, heat treatment, microstructure and field failure rate which had resulted in improving some of its mechanical properties such as hardness and wear resistance after practical application and comparison of the two samples in the study field which was tested after (2232 hrs for the failure) and (2016 hrs for the alternative) after 13 months each. According to the experimental results obtained from laboratory examinations and field measurements, the new alternative product has better properties than the failed one.

Bus Ticket Automation with T Money Card
Authors:- M. Ananthi, M. Gowsalya, S. Pavithra, B. Vaishnavi, AP/CSE P. S. Velvizhi

Abstract- These days the public transportation framework like the metro are all around cutting edge. Traveler wellbeing, accommodation and the need to improve the exhibition of existing public transportation is driving interest for shrewd transportation framework on the lookout. The venture based ticket framework for gathering the transport discovered to be a wellspring of major monetary misfortune. It is hard to guarantee the acquisition of ticket by every single traveler .A paper ticket gets pointless to the travelers when the objective is reached. Indeed, even the check of numerous unsold tickets each day is exceptionally high. In the period of innovation, India should zero in on instilling a robotized framework for gathering transport toll. Consequently, this undertaking proposes a computerized card driven framework utilizing Smart Card and GPS Tracking for transport ventures with the assistance of various stages like web, android, IOT. Various situations concerning the execution of this framework here.

Analysis of Energy Management by Using IOT
Authors:- Manmay Banerjee, Amandeep Dhiman, Prateek Shrivastava, Asst. Prof. Rehana Perveen

Abstract- In present scenario the energy is used at a wide range by all our appliances as well as in our industries the energy consumption is getting higher day by day. Therefore, the energy management done by “EMS” Energy management system to reduce energy consumption by using of smart technology and metering, control system in industries. By using of industry automation and PLC, MATLAB, SCADA controlling system we can interface the energy efficient system. The various opportunities are to control interconnected devices by a pre designed scenario human machine interfacing system is a big achievement in IOT. To support the digital transformation of enterprises and help in energy management the transparency is increases by using latest devices due to the need of systematic improvement and increasing the efficiency we used an industrial automation device and hence they consume less amount of energy. The operational cost is higher in any manufacturing and developing industry and it is also responsible for energy consumption, industrial sector is more uses of energy other than any sector it consumes 54% of the global delivered electricity and in addition, non-energy-intensive manufacturing such as pharmaceuticals and energy-intensive-manufacturing are posed make up 70% of the estimated 228 trillion gross output by 2040. So basically, regardless of energy cost fluctuations and an oil prices, the industrial sector is and will continue to be one of the largest contributors of electricity use.

Bank Locker System Using IOT Concept
Authors:- Saifali Shaikh, Rani Jawale, Rushikesh Kandalkar, Onkar Shinde,Prof. Ganesh Kakade,
Prof.Shrikant Dhamdhere(HOD)

Abstract- The main aim of this project is to develop a device for the bank locker security purpose for alerting theft and to auto arrest the thief in bank itself from centralized monitoring unit and control system using IOT technologies. Even the latest technology such as fingerprint sensor lock can be unlocked with ease. So to overcome this problem , this project suggest the use of Internet of Things(IoT) to provide secure enter only to authorized person. For this we are using Raspberry Pi for capturing image, processing it and then sending it via mail to the user’s email account. The Raspberry Pi captures the image when a person tries to enter the bank locker and then process it and sends it to the user’s email account as picture message. The user can then provide authorization to the Raspberry Pi from his/her email account whether to open or remain it shut.

Word Analysis of Friction Stir Spot Weldments Characteristics Using Different Tools Materials and Shape for Similar and Dissimilar Metals
Authors:- Asst. Prof. Attalique Rabbani, Mohd. Zeeshan, Mohammed Salahuddin, Shaik Amjad

Abstract- Efforts to reduce vehicle weight and improve safety performance have resulted in increased application of light-weight aluminium alloys and a recent focus on the weldability of these alloys. Friction stir spot welding (FSSW) is a solid state welding technique (derivative from friction stir welding (FSW), which was developed as a novel method for joining aluminium alloys). During FSSW, the frictional heat generated at the tool-workpiece interface softens the surrounding material, and the rotating and moving pin causes material flow. The forging pressure and mixing of the plasticized material result in the formation of a solid bond region. The present work investigated the effect Aluminium, Brass and Copper alloy plates are joined by friction stir Spot welding (FSSW) by using EN31 and EN19 Tool material with Circular, Taper thread, Square and Diamond Profile Tools. Profiles with varying welding parameters like with a Rotational speed of RPM, Feed and depth of cut, inclinational angle of the tool.All welded samples are observed by followed by their tensile tests. Mechanical strength of the base material with comparable elongation is achieved in FSSW sample rotation speed and welding speed. Material flow during FSSW using a step spiral pin was studied by decomposing the welding process and examining dissimilar alloys spot welds which allowed a visualization of material flow based on their differing etching characteristics. The movement of upper and bottom sheet material, and their mixing during FSSW were observed.

Published by:

Google Scholar Journals


Know the Process of Selecting Compatible Google Scholar Journals

Submit Paper Now

Article Processing Charges

Finding the right journal from the Google scholar journal list is not an easy task. Only a genuine and appropriate audience can understand the importance of your research. But many researchers get depressed and finally publish a paper in any journal in lieu to get at least their paper to publish but this is a wrong strategy. Due to their particular act, they lose the impact that their research would lose. IJSRET would like to mention some important parameters that every researcher should check in a journal before he wishes to publish their paper there.

Stay Away from Predators and Advertisements 

These days as the researchers are more and more eager to publish their papers many journals are taking advantage of their condition and taking high charges from them for publishing their work. You have to stay away from them as they would try to contact you or advertise their services on the internet. It is very easy to start a journal and it just needs a domain, a registration and a well-built impressive website to attract the researchers. You should stay away from all such journals and find quality Google Scholar Journals.

Never get confused with Impact Factor of any Journal

Many researchers often get impressed by knowing the impact factor of any journal. By this, they measure the prestige of any journal and wish to publish their paper in such journals. You should also know the fact that the impact of any journal is different for different areas of study. For example, a journal having an excellent impact on electronics research but can have an average or poor impact in the medical domain. So you should check that the journal that you have selected has a high impact factor in that particular area in which your research lies. These were some of the common ways to determine good Google Scholar Journals.

Published by:

Journal of Advanced Scientific Research


A Guide to How to Select the best journal of advanced scientific research

It is a difficult task to select a journal of advanced scientific research after a researcher has completed his laborious work. The process is complex because one has to seek such a journal that matches his domain of work. One should also check the expectation level of the journal before submitting also. IJSRET would like to guide such researchers in selecting a suitable journal-

Submit Paper Now

Article Processing Charges

Tips to Select journal of advanced scientific research

# Make a List of Available journals

It is necessary to develop some knowledge about the journals available as per your requirement or that lies in your research area. You can consult your friends, colleagues, or professor for this or can browse through the internet.

# Know the Journal Impact

The rank of the journal and its readers play an important role in determining the impact of any journal. Submitting your paper in a low-impact journal will degrade the quality of your research and your work will not be visible to the audience that you wished for. Visiting the website of your selected journal will provide you with such information about the journal.

# A Journal Should Match your need

The subject area which the journal covers is also one of the important factors that one should look for. This helps in finding suitable readers who will admire your work. Also, you should check their editorial policies and the practices which the journal follows along with their reviewing process and the time they take for publication. For this, you have to check the instructions that they give to authors and it is present in nearly all the journals on their website.

After you have completely satisfied with any journal of advanced scientific research, you can proceed further with the publication process.

Published by:

Journal of Materials Science


Importance of Journal of Material Science 

Scholars working in the field of material science really work hard, as preparing samples is a tough task. Chemical composition of different materials for specific product requirement is a deep study of science.  We would like to share some of the advantages of choosing this field to make the researchers realize this unique and trending field. As the name suggests it is the study of properties of material and knowing its boundaries in different environmental conditions so that one can profitably use such products in day-to-day application.

Submit Paper Now

Article Processing Charges

Advantages of Choosing Material Science as a Subject

  • It is an interesting area of study and also contains multiple disciplines within it
  • There is a lot of potential in this area as per job and career is concerned
  • Researching in the material science field will lead to better career growth and chances to settle abroad.

Material science is all about knowing the property of the material or creating new material from the current to help in the advancement of science. Industries these days are falling short of researchers of material science and often look for a capable researcher who helps them by providing them with advanced knowledge. There are many sub-branches of material science in which one can proceed with the research. For example materials in electronics where one can proceed to study the behavior of silicon chips, transistors, etc, and manipulate the materials to make their products better. In short, the subject is best in itself and no one can deny this.

 IJSRET is one of the best journals of materials science in which researchers can easily publish their work without any problems as we provide fast and reliable service to our customers.

Published by:

Peer Reviewed Journal List


IJSRET is one of the leading journals in peer reviewed journals list in India. It accepts work from several engineering scholars, researchers, lecturers, and subject experts. Journal provides both free and paid publication process on several subjects such as civil, mechanical, electronics, machine learning, etc. Through the journal, authors can maximize the chance to get their work read by the new audience in the entire world.

Submit Paper Now

Article Processing Charges

Advantages of Publishing in peer reviewed journal:

  • It is a good way to get your work checked by experts so that you will get aware of the validity of your work.
  • It also provides you with feedback reports by which you can learn about the improvement that can be done on the research paper before publication.
  • Sometimes there is a multi-level of peer reviews that give their expert reviews in some of the peer reviewed journals list in India, which is further better to improve the quality of the paper.
  • Majority of researchers voluntary likes to publish their work in such peer reviewed journal to authenticate their work.

Apart from the advantages, there are some disadvantages with such peer-review process such as-

  • It causes a delay in collecting the shreds of evidence related to research to authenticate a paper
  • It is a time-consuming process and causes a delay in the publication of any research paper.
  • It is not 100% effective as several journals have a low standard of the peer review process and they can publish a low-quality paper by mistake.

Many journals often charge more money just for the reason they had a peer review committee.

Published by:

where can I publish my research paper


Research publish journals is a medium to get worldwide access to your paper. Your paper will be reviewed by several experts throughout the world. So if you are thinking of where can I publish my research paper for free here are some of the answers to it. Choosing the right journal is important and gives a huge impact on your work. Choosing a journal that is not relevant to your work will fail all your months and years of hard work. Before publishing your paper it is better to follow these steps

  • Get your paper to cross-check by some colleague, friend, or professor to eliminate the typo, grammatical, spellings, and punctuation errors
  • After this revise your paper again according to the comments made by your reviewers
  • Prepare a manuscript according to the chosen journal’s needs and requirement
  • Now if you feel everything is done submit your paper
  • You have to be patient and never panic after you have submitted your journal and are waiting for approval

Submit Paper Now

Article Processing Charges

where can I publish my research paper?

IJSRET is one of the leading publications Journal and answers the question of where can I publish my research paper in INDIA, they will meet all your requirements. We offer paper publishing services to researchers, scholars, students, etc at a nominal cost. We also solve the queries of our customers as we have 24*7 chat support. Here some of the domain from which we publish the paper-

  • Electronics
  • Computer Science
  • Civil
  • Machine Learning,
  • Nanotechnology
  • Civil
  • Electrical Topics
Published by:

IJSRET Volume 7 Issue 1,Jan-Feb-2021


A Review of Intrusion Detection Systems
Authors:- Subhash Waskle, Associate Prof. Avinash Pal

Abstract:- An intrusion detection system (IDS) is devices or software’s that are used to monitors networks for any unkind activities that bridge the normal functionality of systems hence causing some policy violation. This paper reviews some of the intrusion detection systems and software’s highlighting their main classifications and their performance evaluations and measure.

Tapping into Geothermal Technology to Boost Electricity Supply in Nigeria
Authors:- Alabi A.A., Adeleke B.S. , Adekanmbi, A.O., Fawole T.G.

Abstract:- It is no more news that attention of humanity has shifted to the generation of energy through renewable energy sources. This paper is based on how Nigeria can tap into the use of geothermal technology other than other renewable energy sources to generate electricity using of the two available geothermal resources (hydrothermal and petrothermal) in available locations. Through hydrothermal plants the heat received from geothermal resources are converted to electricity. This is a technology that if efficiently utilized, can go a long way to make Nigeria electricity challenge a thing of the past.

Segregating Spammers from Social Digital Platform by Genetic Algorithm
Authors:- Rahul Kumar, Dr. Avinash Sharma

Abstract:- Presence of online Social digital platform in human life from past few decade influence advertiser to place their product in different style. Some of digital marketing companies plays a giant role for promoting a product, service, thought, etc. to social digital users. Digital platform do not want to lose their control so spammer who work professionally to promote a brand need to identify ad remove from the platform. This paper has work in this field of online social spammer detection by developing a unsupervised algorithm which identify the user class (Spammer or real) as per sequential behavior done. Proposed work utilized a intelligent water drop genetic algorithm for segregating the users into desired class. Some of digital platform inherent features of the user profile were used for finding the fitness class of the user to the corresponding class of user. Experimental work was done on real twitter dataset and comparison of proposed model was done with existing method of spammer detection. Results shows that proposed model has increased the accuracy of spammer detection.

An Evaluation of the Role Played By The Head Of School In The Delivery Of Quality Education In Zimbabwean Day Secondary Schools: A Case Study Of Guruve District
Authors:- Laison Jairus Kavumbura

Abstract:- Quality education is a critical phenomenon for the provision of quality human resources in any country. Quality education focuses on learning which strengthens the capacity of children to act progressively on their own behalf through the acquisition of knowledge in useful skills. Quality in terms of school products implies school graduates who are not just literate or numerate, but graduates who add value to their families, communities as well as nation through the knowledge, skills and morals they acquired from the school system. In Zimbabwe the parents, government and employers place a very high premium on the quality of education that schools provide to their learners. Certain schools are shunned because of their perceived low standards and yet others are sought after by many parents and students due to the quality of learning perceived to obtain in them. Quality therefore is about high standards of achievement by pupils in all spheres. Quality does not come about like manna from heaven. It is brought about in an organisation deliberately through the leadership process. This article draws on a quantitative enquiry on the role played by heads in the delivery of quality education in Zimbabwean Secondary schools. The study adopted the descriptive survey design. The target population included all secondary school teachers in Guruve district which has a teacher population of plus minus 18000 teachers. Random sampling was used to arrive at a sample of 200 respondents who were made up of 120 males and 80 females. All the information was collected through a questionnaire which had both close-ended and open-ended questions. Descriptive statistical analysis was used to interpret the data. The study revealed that heads did not encourage attendance by pupils to all lessons, there was inadequate provision of stationary and learning equipment and that supervision of learning was not adequately done by the heads. The study also reveals that heads were not results focused in their operations. The study recommends that heads of schools should be equipped with skills and knowledge in the field of leadership and management so that they promote quality education in their schools. Heads should also prioritise supervision of instruction and provision of adequate teaching/learning materials.

A Glass Fiber Compressive Strength Prediction Using Artificial Intelligence (ANN)
Authors:- Madhav Shrivastav, Prof. Sourabh Dashore

Abstract:- Concrete, being widely used, is the most important building material in civil engineering. Concrete is a highly complex material, which makes modeling its behavior a very difficult task. Many attempts were taken earlier to develop suitable mathematical models for the prediction of compressive strength and flexural strength of different concretes. Those traditional methods have failed to map non-linear behavior of concrete ingredients. The present study has used artificial neural networks (ANN) to predict the compressive strength and flexural strength of glass powder concrete. The ANN model has been developed and validated in this research using experimental strength data of different mixes. The artificial neural networks (ANN) model is constructed trained and tested (in MATLAB. For study models were developed. Strength was modeled in ANN model as a function of input data collected by the experimental result in laboratory. In this study, an attempt was also made to develop a multiple regression model for predicting strength (in EXCEL) as it is being used largely by researches in prediction. Finally, this model was used to predict the strength of concrete for different different days.

A Review of Glaucoma Detection Techniques
Authors:- Arkaja Saxena, Associate Prof. Avinash Pal

Abstract:- Glaucoma is one of the main causes of blindness today. It is basically a group of eye diseases that leads to the optic nerve damage and arises mostly due to the increases in the Intraocular Pressure (IOP) within the eyes. The early detection as well as diagnosis of this disorder is very important as at the later stages it leads to complete loss of vision.In this paper we reviewed different glaucoma detection procedures by digital image processing of fundus of eye. This paper also proposes a very simple method for the screening of glaucoma.

Concept Maps: Let’s Organize Your Speech
Authors:- Nirumala Rothinam, Hadidah Abdul Rahman

Abstract:- This research was to observe the effectiveness of concept maps in enhancing Matriculation students’ speaking ability in terms of organization and content. The specific objective of this research is to identify if concept maps could be an effective educational tool to improve students’ speaking scores according to the Malaysian University English Test (MUET) speaking scoring guideline. Participants of this research consist of 24 one-year Science program students. Data collections were done through pre-test and post-test. Data were analysed using descriptive analysis. Results of the analysis established that all the 24 participants showed an increase in the speaking scores after the intervention using concept maps. The research indicated that concept mapping is effective in supporting the organization of thoughts and content to produce verbal output thus producing a positive correlation between the use of concept maps and scores for participants’ speaking assessment.

A Review of Recommendation Techniques
Authors:- M. Tech. Scholar Pooja Relan, Asst. Prof. Avinash Pal

Abstract:- On the Internet, the place the number about
Decisions may be overwhelming, there will be necessity will filter, prioritize Also effectively convey important data so as on allay those issue of majority of the data overload, which need made an possibility issue will huge numbers Internet user. Recommenders techniques work out this issue by looking through huge volume for rapidly created majority of the data on furnish user with customize content and services. This paper investigates the separate aspects and potentials for distinctive prediction techniques clinched alongside recommendation techniques in place with serve concerning illustration a compass to Scrutinize and act in the field of recommendation techniques.

Digital Social Platform BOT User Detection Features and Techniques
Authors:- M.Tech. Scholar Kritya Gorowara, Asst. Prof. Jayshree Boaddh, Asst. Prof. Jashwant Samar

Abstract:- Digital platforms in these days has its own place as a tool for getting more social. This attract many publisher to push there content to relevant audience. As time and labor were optimize by computer programs, so this posting of content is done by BOTs which are program. Many of social platform schedule some programs which detect those BOT user and remove from the network. This paper has summarized BOT detection techniques proposed by various researchers as per different social media platforms, users. As per type of social media platform features were also change and various common features were list in the paper for increasing the understanding of BOTs in the network. Some of evaluation parameters were also formulize which help to compare different BOT detection algorithms.

A Survey on Digital Image Retrieval Technique and Visual Features
Authors:- M.Tech. Scholar Astha Singh, Asst. Prof. Jayshree Boaddh, Asst. Prof. Jashwant Samar

Abstract:- Digital platform based services increases content on servers and retrieval of relevant information depends on data matching algorithms. Out of different type of data image plays an crucial role for various document proof, study, analysis, diagnosis. Hence retrieval of relevant image as per requirement is very important. This paper has summarized various image retrieval techniques proposed by authors for reducing the execution time and improving the relevance of the indexed image as per user query. Paper has list image features used by different scholars for finding the visual similarity between images. Content based image retrieval was done by two type of query first was visual and other was text, paper has list all type of retrieval techniques.

Variables Influencing Food Wastage and Rapid Composting Techniques of Food Waste in Malaysia
Authors:- Nurafiqah Izzati Zafriakma, Faeiza Buyong

Abstract:- – Rapid generation of food waste has become a major concern in municipal solid waste management (MSW) in Malaysia that are practically poor and unstructured. Food waste has significant adverse effects on food security, the environment and the economy, making it a significant problem that needs critical response. The current method in disposing of the waste in a landfill negatively impact human being and environmental safety. Food waste is a material produced when food is purchased, prepared and consumed. Based on the previous studies, it was found that there were variables that influence the number of food waste produced from each individual. Meanwhile, the current treatments used to treat food waste is time-consuming and unable to cope with the amount of incoming waste generated daily. Therefore, this study intended to identify the factors that influence the generation of food waste in Malaysia with the aim of analysing methods to reduce the amount of current or future food waste produced by rapid reduction techniques of composting.

Melanoma classification on Dermoscopy images using Transfer learning with CNN architectures
Authors:- Aaron Hill, Robert Collins, Joseph Morgan

Abstract:- Incidence rate of malignant melanoma has increased from the past two decades but the mortality that comes with it has stabilized. Early detection of melanoma was critical in the past as we do not have effective therapies and detection methodologies. State of the art classifiers based on CNNs are proved efficient to classify images of skin cancer more better than dermatologists and has provided more effective lifesavingdiagnosis, as now a days skin cancers can be detected in early stages. In this paper we will talk about classification of skin cancer using convolutional neural networks and transfer learning. We looked out for papers in Google scholar, PubMed, Google Scholar, Research Gate, Web of Science databases for original research papers and review papers. The papers that has sufficient reports with proofs has been taken into consideration.

Speech Recognition
Authors:- Bhuvan Taneja, Jones C J, Rohan Tanwar

Abstract:-Speech is a simple and effort less approach of communication amongst humans, but in this day and age humans are not restricted to connecting to one another but even to the various machines in their lives. The most essential being the computer. So, this communication approach or technique can be used for connecting humans and computers. This inter play is done by interfaces, this area being titled the Human Computer Interaction (HCI). The following paper gives an general outline of the principal meaning of Automatic Speech Recognition (ASR) which consists an essentialarea of artificial intelligence and it ought to be taken into consideration in course of any connected research (Categoryof vocabulary size ,speech, etc.). It also offers synopsis of essential research applicable to speech processing in the pastfew years, along side the overall scheme of our project that should be taken into account as aaddition of data in this field of study and to finish it off by mentioning about certain improvements that as it may be in further works.

The Efficacy of Risk-Assessment Score for Early Screening of Diabetes Mellitus Among Bangladeshi Adults
Authors:- Zaher Ahmed, Dr. Iftekhar Hasan

Abstract:-The chronic metabolic disorder diabetes mellitus (DM) is a fast-growing global problem with huge social, health, and economic consequences. Studies support the utilization of risk-assessment scoring systems in quantifying individual’s risk for developing T2DM. Thus, using a simple risk-assessment scoring system for early screening of T2DM among Bangladeshi adults will be beneficial to identify the high-risk adults and thus taking adequate preventive measures in combating diabetes. The aim of the study is to evaluate the efficacy of a risk-assessment scoring system for early screening among Bangladeshi adults for developing T2DM. A cross-sectional observational study was carried out to evaluate the efficacy of risk-assessment scoring system in the outpatient department (OPD) of Medicine, Barishal Medical College & Hospital, Barishal, Bangladesh from June 2020 to November 2020 among randomly sampled 323 adult Bangladeshi male and female subjects. With written informed consent, the Finnish Diabetes Risk Score (FINDRISC) questionnaire was used to collect the data including demographic characteristics and different risk factors. In this study, both non-modifiable and modifiable risk factors showed statistically significant association with the FINDRISC among Bangladeshi adults(p<0.05). Among 323 subjects, a total of 28.12% had slightly elevated diabetes risk score (DRS). A total of 16.05% had moderate DRS and 8.48% had very high DRS. There was a significant association among FINDRISC with history of previous high blood glucose, and treated hypertensive Bangladeshi adults. This study predicts that 24.53% of the Bangladeshi adults may develop moderate to high risk T2DM within the consecutive 10 years. This study clearly demonstrates that FINDRISC scoring system can work reasonably well as screening tool, detecting undiagnosed T2DM in the general population. People with high risk of DM should be referred for early intervention and changes to a healthy lifestyle and primary prevention to prevent or delay the onset of T2DM.The findings may help the health care professionals to substantiate the possible improvement in glucose metabolism and lifestyle changes, and better convince people at high risk of T2D to take action towards healthier lifestyle habits.

Big Data Security Challenges and Prevention Mechanisms in Business
Authors:- Anusha Dissanayake

Abstract:-Sensitive data analytics have reached gradually a smart area in the business world over the past few years. Various research has emphasized the importance of this field in augmenting the business performance in the industry. Excessive collection of data is making harmful effects on human beings. These data are extremely vulnerable for outsiders thanks to their hidden value. Big data gives us more advantages to make progress in many fields including business. It improves the competitive advantage of companies and to add value for many social and economic sectors. Sensitive data sharing brings new information security and privacy challenges. Earlier technologies and methods are no longer appropriate and lack performance when applied in a big data context. This research focuses on investigating the challenges and providing viable solutions to minimize the risk of the threats of user data.

Assessment of Waste Management Techniques from Palm Oil Producing Industry: A Case Study of Nigerian Institute for Oil Palm Research (Nifor) Benin City
Authors:- Olawepo B. B., Smart Bello, Diamond Blessing, Ajayi A. S., Eriakha E. C.

Abstract:- Oil palm (Elaeisguineensis) is one of the most important economic oil crops in Nigeria. As of early 1900, Nigeria was producing all palm oil sold in the world market. Nigerian Institute for Oil Palm Research (NIFOR) is an International Center of Excellence in Palms and Shea Research and Development. It is a common sight to see decayed and overflowing solid and liquid waste dumps all over most palm oil producing industries. The objective of this study is to assess the technique for waste management in NIFOR. Primary data through interview and secondary data from literatures and periodicals were used. The survey reveals that most wastes generated are converted into useful means. The POME (Palm oil mill effluent) is converted into organic fertilizer through the process of composting, the EFB (Empty fruit bunch) is used for erosion control and for increasing soil water retention capacity, and the PKS (Palm kernel shell) is used as a source of fuel for boilers and sterilizers. It is therefore recommended that the government and management of NIFOR should increase environment awareness programme for all staff to save cost and create less environmental degradation while vigorously involving the people in all facets of environmental management.

Design, Fabrication and Testing of a Cocoa Depodding Machine
Authors:- Smart Bello, Olawepo B. B., Diamond Blessing, Suleiman A. I.

Abstract:- The project involves the design of a cocoa depodding machine, to eliminate drudgery experienced by local farmers using manual method of pod breaking. The basic features of the machine are the frame, feeding trough, shaft, stationary blade, rotating blade, rotating drum, chain, and electric motor. The machine operates on the principle of compressing the pods against the stationary blade to break it and separate the pods from the beans. As the blade rotates, it pushes the pods towards the stationary blade, which cuts the pods and transfers it to the separation chamber. As the drum rotates the beans are separated from the pods through the rotating sieve while the pod goes out through the discharge outlet. The machine is powered by 1hp three phase electric motor. The machine has an efficiency of 36%, a capacity of 500kg/hr. The depodding machine can be used by local farmers in rural areas for small scale cocoa processing.

Martial Arts and Combative Program of the Philippine Military Academy Cadet Corps Armed Forces of the Philippines: An Assessment
Authors:- Jayson L. Vicente

Abstract:- The young men and women of PMA CCAFP are bred to be front liners and last line of defenseduring war and times of peace as such, they must be equipped with the most practical and most effective combat ready Martial Arts and Combative skills to effectively fulfil their duty,as well as to protect and safeguard themselves to continue serving the people and their country. This study shall assess the current Martial Arts and Combative Program of the PMA CCAFP using descriptive methodology by interviews and floating questionnaires. The current Martial Arts and Combative Program of the PMA CCAFP with all of the subjects involved are more sports inclined rather than combat equipped. Picking the best from each subject used in the program, this study seeks to recommend improvements or create a better Martial Arts and Combative Program that will satisfy the objective of producing Martial Arts combatant graduates. A good Martial Arts and Combative Program for PMA is essential to prepare them on what lies ahead which is unforgiving and no rules to pacify threat.

Identification of New Cloud Computing Approach for User Authentication and Protection
Authors:- Research Scholar Nipun Sharma, Prof. Dr. Rohit Kumar Singhal

Abstract:- Cloud computing is the very attractive technology area in the current era due to its cost effective, flexible and portable services. Cloud computing is basically a business model which provides services related to Information Technology on demand over network. It offers on demand network access to the pool of shared resources with minimal management effort and service provider interaction. When the services of Cloud Computing are used, the major issue arises, that is security. To tackle with these kinds of issues, Cloud Provider must have sufficient control to provide security. There are different-different provisions available with service provider to handle such kinds of above security issues. Intruders can affect files stored in the cloud or messages of users by intercepting. There is required to provide security to files or messages by means of encryption techniques.To prevent attacks like chosen plain text attack, chosen cipher text attack, denial of service attack.

Determination of Seat Design Prameters Based on Ergonomics
Authors:- Shubham Kadam, Amit Nagarkar, Siddhesh Sawant, Pratik Khopade, Prof. Dhiraj Kumar K. More

Abstract:- Automotive seat design has been always challenge for engineers because design parameters for automotive seats are complex. Three design objectives comfort, safety, and health need to be satisfied simultaneously and measurement of this objectives are difficult because of such factors as user subjectivity, seat geometry, occupant anthropometry and amount of time spent sitting. This paper describes various methods of comfort analysis of off-road car vehicle seat which is based on different criteria like fit parameters related to anthropometric measurements, feel parameters and support parameters defined with respect to seated posture.

Current Issues and Challenges of Online Learning Approach due to Pandemic Outbreak of Coronavirus (Covid-19)
Authors:- Hosalya DeviA/P Doraisamy

Abstract:- The pandemic outbreak of novel coronavirus (COVID-19) recently since March 2020 has constrained many people in the world to opt for a different lifestyle, a new way of work as well as an alternative way to learn. Before the COVID-19 pandemic, the face-to-face traditional class is the most common and favorable learning approach among the students, teachers, parents, academic institutions, and the Ministry of Education. However, online learning has become a famous and well-known resolution around the world after the movement control order is enforced. The online mode of learning has many issues and challenges. Both students and teachers require more time to adapt to online learning because the majority of them are still trying to explore the new technological innovation and techniques to use in the online learning process. In the future, a mixture of the mode of learning would be one of the selections for the academic institution, especially a higher learning institution.

Production of Bioplastics from Banana Peels
Authors:-Jaikishan Chandarana, P. L.V. N Sai Chandra

Abstract:- Plastic offers a variety of benefits, in a variety of shapes, such as sheets, panels, film, which can all be flexible as the application requires. However, use of too many plastics results in massive harmful effects. It takes longer time to degrade which is estimated about 500 years to degrade and will become toxic after decomposed. The objective of this study is to produce biodegradable plastic from banana peels as a substitute for the conventional plastic and to prove that the starch in the banana peel could be used in the production of the biodegradable plastic. The strength of the film was determined using the elongation test by comparing the biodegradable film with a control film and a synthetic plastic. In the soil burial degradation test, the intensity of degradation was tested for all three types of film and the biodegradable film degraded at a rapid rate compared to control film while the synthetic plastic did not degrade at all. Based on all the testing that was carried out, the biodegradable film from banana peel is the best and ideal overall compared to the control and synthetic plastic. The tensile strength for sample keeps increasing when the residence times are increased from 5 minutes to 15 minutes and reaches a maximum at 15minutes and then starts decreasing when the time is increased to 20 minutes. This suggests that the optimum hydrolysis time is 15 minutes for this sample set Bioplastic film can sustain the weight near about 2 kg and which have enough tensile strength. The bioplastic prepared from banana peels that can be used as packaging material or as a carrying bag. Glycerol is added as plasticizer that increases its flexibility.

A Genetic Algorithm Approach for the Solution of Economic Load Dispatch Problem
Authors:- M.Tech. Scholar Siddhartha Tiwari, Prof. Dr. Dwarka Prasad

Abstract:- In this paper, comparative study of two approaches, Genetic Algorithm (GA) and Lambda Iteration method (LIM) have been used to provide the solution of the economic load dispatch (ELD) problem. The ELD problem is defined as to minimize the total operating cost of a power system while meeting the total load plus transmission losses within generation limits. The application of Genetic algorithm (GA) is to solve the economic load dispatch problem of the power system. The effectiveness of the proposed algorithm has been demonstrated on two different test systems considering the transmission losses. GA and LIM have been used individually for solving two cases, first is three generator test system and second is ten generator test system. The results are compared which reveals that GA can provide more accurate results with fast convergence characteristics and is superior to LIM.

Expansion in Kernel PCA Approach for Face Recognition
Authors:-Asst. Prof. Ritu Nagila, Asst. Prof. Ashish Nagila

Abstract:- Principle component analysis (PCA) technique is most populating technique of statistics in field of face recognition. Today, numerous extension of PCA is exiting like improved PCA, Fuzzy PCA, Incremental PCA, and Kernel PCA. Kernel PCA (KPCA) is most popular techniques in face recognition in non liner categories. Till date not desirable extensions are accessible. This paper is proposed a novel approach of KPCA. Experiments have been done on ORL database. Proposed method obtained highest recognition rate as 98.6%.

A Review on Lossless Data Compression Techniques
Authors:- Rahul Barman, Sharvari Deshpande, Prof. Dr. Nilima Kulkarni, Shruti Agarwal, Sayali Badade

Abstract:- Data is being generated at an exponential rate in every sector of the world. This much amount of data can prove to be very costly in terms of data storage, transfer speed and infrastructure. Due to this many industries have shifted their focus on cloud-based storage technology. Lossless data compression is one of the important approaches to solve the problem of excessive storage consumption, maintaining data integrity, transfer efficiency and achieving higher streaming speed. Lossless data compression refers to the process of modifying and converting the bit structure of data such that it consumes less storage space and provides near loss of original data. There exists different algorithms and techniques for performing the compression on different types of data formats. This paper identifies different lossless data compression techniques in existence and a conclusion is drawn based on these identified methods. Comparative analysis has been made of different algorithms used in various referenced papers. It describes the future scope and application of compression algorithms in several fields.

Experimental Study on Strength and Durability of Concrete By Partial Replacement of Cement, Fine And Coarse Aggregate using Corn Cob Ash, C&D Waste Recycled Sand and Bethamcherla Stone with Addition of Steel Fibers
Authors:- M.Tech.Scholar Badiga Siva Bhavyank, Asst. Prof. K V Madhav

Abstract:- Main objective of this project is to reduce the usage of cement, fine aggregate and coarse aggregate and improve the strength of concrete by using steel fibers. In this study we will investigate on the strength characteristics and durability properties of concrete with CORN COB ASH (CCA), CONSTRUCTION & DEMOLISION (C&D) WASTE RECYCLED SAND and BHETAMCHERLA STONE (BS) and addition of STEEL FIBERS. Replacement of CCA, C&D Sand and BS are about 0%, 5%, 10%, 15% and 20% respectively by weight of Cement, Fine Aggregate and Coarse Aggregate. The obtained optimum % of CCA, C&D Sand and BS are investigated. Then with that optimum % of CCA, C&D Sand and BS obtained are used to produce concrete.. Then the steel fibers will be added to the optimum % of CCA, C&D Sand and BS concrete and to conventional concrete in the % of 0%, 1%, 1.5%, and 2% by the weight of cement. Mechanical properties at 7,14,28 days will be investigated. Then investigations will be carried out for Percentage loss in compressive, split tensile and flexural strengths, Percentage loss of weights by considering the Durability tests such as acid attack test and alkaline attack test at the age of 28 and 90 days. The grade of concrete is M25.

A Review Study on Theoretical Investigation of Hydrogen Production Methods
Authors:- Pramod Panta, Mohit Pandita, Nitin Kumar, Sudhir Singh

Abstract:- This paper present the sustainable, green and zero-carbon emission method of hydrogen production. Depending upon the source of energy used to generate the hydrogen the methods are classified like solar energy, thermal energy, photo-electric. The different process to generate the hydrogen are analyzed and compared in it which give the brief and important description of green and zero-carbon emission method.

Realizing the Benefits of RPA in the Legal Field
Authors:- Shital Gopal Shetkar

Abstract:-Robotic Process Automation (RPA) is finding many valuable uses in the legal field. Legal work is often repetitive and document-intensive, which makes it suited to RPA. Automation enables law firms and legal departments to speed up routine processes, saving time and reducing errors. As a result, attorneys and other staff members can focus on more critical tasks. RPA also helps with compliance. This paper examines how legal organizations are realizing the benefits of RPA, based on reviews of Ui Path by members of IT Central Station.

Sentiment Analysis of Twitter Data by Making use of Machine Learning Algorithm
Authors:- ME Scholar Kratika Patidar, HOD. Kamlesh Patidar

Abstract:- Individuals utilize online media for amusement, bringing data, news, business, correspondence and some more. Not many such online media applications are Facebook, Twitter,WhatsApp, Snapchat, etc. Twitter is one among the miniature publishing content to a blog site. We are utilizing Twitter predominantly because it has acquired a great deal of media consideration. The content composed is alluded to tweets, where an average person can tweet or compose their hearts out. We would be bringing immediate reactions from the general population also. Thus, the information is all the more ongoing. The initial step is to get the tweets on a specific plan utilizing python language code, followed by the cleaning cycle; at that point comes the making of the sack of words. Later these packs of terms are given as a contribution to the calculations. Finally, after preparing the estimates, we will be getting the sentiment of general society on that system.

Pectin Extraction from Orange Peels by Using Organic Clay
Authors:- Dr. Supriya Pratap Babar

Abstract:- The present work addressed to the development of the method which is the part of the process needed for the extraction of biopolymer like pectin from the orange peel, which is the waste of orange juice processing industry. Pectin is used by pharmaceutical industry, food industry and also widely used in cosmetics, herbal medicines, manufacturing of soaps. In this method we have used the organic clay as mineral acid instead of strong concentrated acid. These results demonstrated, that the pectin yield was affected by pH. At the low pH for red clay (4.3) maximum yield (4%) of pectin was obtained.

Customer Churn Prediction in Telecommunication
Authors:- Pooja Mahanth Bhagat

Abstract:- Procurement and the maintenance of customers/clients are the top most concerns in the present business world. The quick increment of market in each business is prompting higher endorser base. Therefore, organizations have understood the significance of holding the close by clients. It has gotten compulsory for the specialist co-ops to diminish beat rate on the grounds that the carelessness could be come about as productivity decrease in significant viewpoint. Agitate expectation helps in recognizing those clients who are probably going to leave an organization. Media transmission is adapting to the issue of truly expanding agitate rate. Data mining procedures empower these media transmission organizations to be furnished with viable strategies for lessening stir rate. The paper audits 61 diary articles to study the upsides and downsides of prestigious Data mining procedures used to assemble prescient client beat models in the field of media transmission and in this manner giving a guide to scientists to information amassing about Data mining strategies in telecom.

A Review of an Extensive Survey on Audio Steganography Based on LSB Method
Authors:-Hariom Dudhwal, Asst. Prof. Jayshree Boaddh, Asst.Prof. Jashwant Samar

Abstract:- There is issues and challenges regarding the security of information in transit from senders to receivers. The major issue is the protection of digital data against any form of intrusion, penetration, and theft. The major challenge is developing a solution to protect information and ensure their security during transmission. In audio steganography, the cover is an audio and the secret information can be a text file, an image, or an audio. In this work, some audio steganography techniques are explored taking cover audio in WAV and MP3 format. WAV files produce integer samples and MP3 files give floating point numbers as samples. The secret information considered is the text file, the image, and the audio. The embedding and extracting algorithms of the different audio steganography techniques are discussed in this examination. This work presents a survey of literature on MP3 Steganography Based on Modified LSB Method.

A Review Study on Neuro Evolution
Authors:- Reeba Mehmood Khan

Abstract:- With the steady improvement in the field of artificial intelligence and information technology, the part of evolutionary algorithms is likewise booming. There is a need to raise these ideas in-order to broaden the sky-lines amongst newbies. Neuro Evolution is an integral part of artificial intelligence and machine learning wherein it centers around evolutionary algorithms in order to create artificial neural networks. This is a procedure that utilizes the entire parcel of biology and assists with developing and constructing artificial intelligence-based evolutionary algorithms. It is a branch which takes motivation from the evolution of the biological nervous system and attempts to incorporate it with the innovation ace “artificial intelligence”. This paper focuses on the fundamental understanding of what neuro evolution is and what is it doing here, how can it work and get implemented, how are neuro evolution and artificial intelligence working inseparably and furthermore it attempts to raise the algorithmic working alongside the significant applications that neuro evolution presents.

Study on Quality of School Life of Working Students
Authors:- Manit B. Dapadap, Jhon Edcel Calites

Abstract:- This study aims to contribute to developing knowledge and understanding of the phenomenon of school life quality for working students by taking the students’ perspective on what they perceive as positive or/and negative about their school life. The study was conducted among working students at Tacloban National Agricultural School. A semi-structured interview guide was used to get information about students’ experiences as working students. The main study is qualitative, using a phenomenological approach. Five students from junior and senior high were selected for in-depth interviews. Parents of the students, as well as the advisers, were interviewed for triangulation. The collected data were analyzed according to the phenomenological thematic analysis. Findings revealed that students are involved in many activities, and most of them work to assist their families and finance their education. How work influences, their education seems to depend on their perception of their work, whether they like it or not, and to what extent it is an obligation. One strategy to lift the quality of the school life of working students is to listen to the students’ voice. The study emphasizes the teacher as the leading resource contributing to the quality of school life for the students. Positive communication must be encouraged between students and teachers to raise awareness of the conditions of working students. To secure the quality of the school life of the working students, the school should come up with strategies that offer education within special needs, particularly in the delivery and assessment of competencies. Further, a strong partnership between the school and the community should be established to increase understanding of the working students’ condition and contribute to improved quality of school life.

A Survey of Real Time Deep Learning Based Object Detection
Authors:- Ahmad Ismail

Abstract:- The importance of artificial intelligence manifests in all of our life’s aspects, robotics, self-driving, surveillance, agriculture, transportation, medicine, space, and military. Deep learning is the paramount core for AI applications; especially object detection, localization, and tracking. The convolutional neural networks make momentum regarding the aforementioned topics. The architecture in this field varied from the fine-grained to the real-time models. Meanwhile, the fine grained models produce the maximum possible accuracy; it consumes time on the other side, real-time models are featured with speed, but it provides less accuracy.In this paper, we will review start-of-the-art models being used for near real-time object detection and tracking, then introduce our approach; an accurate real-time object detector and tracker.

A Review Article of Image Fusion Technique Using Wavelet Transform
Authors:- P.G. Scholar Pushpa Yadav, Asst. Prof. Hemant Amhia

Abstract:- In this thesis various methods for lossless Image fusion of source image data are analyzed and Discussed. The main focus in this work is lossless Image fusion algorithms based on context modeling using tree structure. The central aspect in context modeling is different context templates, which are based on discrete Cosine transform coefficients, local gradients and intensity of samples in the image. This work includes research on how to use DDCT context tree structure, prediction modeling and probability assignment in lossless image fusion based on context modeling technique. The main advantage over current methods is increasing effectiveness of image fusion and developing new lossless Image fusion methods based on context modeling for different type grayscale images: medical, astronomical, noisy natural images.Due to the increasing requirements for transmission of images in computer, mobile environments, the research in the field of image fusion has increased significantly. Image fusion plays a crucial role in digital image processing, it is also very important for efficient transmission and storage of images. When we compute the number of bits per image resulting from typical sampling rates and quantization methods, we find that Image fusion is needed. Therefore development of efficient techniques for image fusion has become necessary .This paper is a survey for lossy image fusion using Discrete Cosine Transform, it covers JPEG all format of image fusion algorithm which is used for full-color still image applications and describes all the components of it.

Diabetes Prediction Technique Using Ensemble Classification
Authors:- Research Scholar Akanksha Mishra, Dr. Prof. Rohit Kumar Singhal

Abstract:- Data Mining can be defined as a technology using which valuable knowledge can be fetched out from the massive volume of data. The big patterns can be explored and analyzed using statistical and Artificial Intelligence in big databases. Many researchers are implementing data mining techniques in the field of bioinformatics. Bioinformatics can be defined as a science of storing, fetching, arranging, interpreting and using information obtained from biological series and molecules. Prediction can be defined as a statement about future event on the basis of present situation. This work focusses on diabetic prediction with machine learning algorithms. The diabetic prediction has various steps. A voting-based classifier is devised in this research to predict diabetes. The performance for the diabetic prediction is optimized up to 2 percent using proposed algorithm.

Modeling and Simulation of Inverter Based Photovoltaic Power Generation System for Various Applications
Authors:- Aasha Rahangdale, Santosh Kumar

Abstract:- The use of new efficient photovoltaic solar cells (PVSCs) has emerged as an alternative measure of renewable power. Owing to their initial high costs, PVSCs have not yet been a fully attractive alternative for electricity users who are able to buy cheaper electrical energy from the utility grid. A photovoltaic array (PVA) simulation model is developed in Mat lab-Simulink GUI environment. The model is developed using basic circuit equation of the photovoltaic (PV) solar cells including the effects of solar irradiation and temperature changes. The new model was tested using a directly coupled ac load via an inverter. Test and validation studies with proper load matching circuits are simulated and result are presented. The Total harmonic distortion in output voltage with filter is 2.16 % which is under the IEEE standard.

A Review on Energy Efficiency of Microgrid Implementation with Solar Photovoltaic Power Plants
Authors:- M.Tech. Scholar Deepak Kumar Dhote , Dr. Samina Elyas Mubeen (HOD)

Abstract:- The aim of the article is to study of the operating modes basis of distributed solar power plants, power consuming storage and power filtering devices using simulation tools. and energy efficiency assessment of local microgrid on the change of the concept of developing modern power engineering is conditioned by growing interest in renewable energy sources The most rapid pace of the development among low-power distributed renewable energy sources is presented by private solar power plants, which operate both autonomously, and can be integrated into the industrial network which is designed to solve two key tasks – performing the function of the backup power supply in the autonomous operating modes of the system and the alignment of the load profile, that is, the elimination of daily peaks and failures in power consumption. To meet the demand of the next generation power system, renewable energy resources can be the fuel of choice because it is easily available, free of cost, environment-friendly, and the renewable energy-based generation is cost effective in all manners. There are several types of renewable energy resources such as solar, wind, geothermal, tides, and biomass. In this paper, the concentration is limited to the solar energy resources, solar plants, and storage system to provide required power support.

A Vehicles for Open-Pit Mining with Smart Scheduling System for Transportation Based on 5G
Authors:- Atianashie Miracle Atianashie., Michael Opoku

Abstract:- 5G connectivity, big data, and artificial intelligence, open-pit intelligent transport systems based on autonomous cars have become a trend in the construction of smart mines with the advancement of IoT technology. Traditional open-pit mining systems, which often cause vehicle delays and congestion, are controlled by human authority. In an open-pit mine, several sensors are used to operate unmanned cars. We enhance vehicle tracks and, using big sensor data, build an efficient, intelligent transport system. Based on large amounts of data, such as vehicle information, vehicle GPS data, production plan data, etc., a multi-object, intelligent scheduling model of open-pit mine unmanned vehicles were developed to reduce transportation costs, total unmanned vehicle time, and the rate of content fluctuation. The current output of the open-floor mine is reliable. The next thing we use to solve our planning problem is artificial intelligence algorithms. To improve the convergence, distribution, and diversity of the classic, rapidly non-dominated genetic trial algorithm, to solve limited high-dimensional multiobjective problems, we propose a decomposition-based restricted genetic algorithm for dominance (DBCDP-NSGA-II).

Energy Efficiency of Microgrid Implementation with Solar Photovoltaic Power Plants
Authors:-M.Tech. Scholar Deepak Kumar Dhote , Dr. Samina Elyas Mubeen (HOD)

Abstract:- The utilization of solar energy as a solar power plant can be a potential power plant to be developed. One of the problems in the solar power plant system is the power instability generated by the solar panels because it relies heavily on irradiance and relatively low energy conversion efficiency. To solve this problem, the Maximum control of Power Point Tracking (MPPT) is required by the Perturb and Observe (P&O) methods. This P&O MPPT control makes solar PV operate at the MPP point so that the solar PV output power is maximized. However, the MPPT P&O control that works at the MPP point makes the output voltage to the load is also maximum that causes overvoltage. The MPPT mode works when the solar PV output power is smaller than the reference power to maximize solar PV output power The aim of the work to design the distributed solar power plants, power consuming storage and power filtering devices using simulation tools. and energy efficiency assessment of local micro grid on the change of the concept of developing modern power engineering is conditioned by growing interest in renewable energy sources The most rapid pace of the development among low power distributed renewable energy sources is presented by private solar power plants, which operate both autonomously, and can be integrated into the industrial network which is designed to solve performing the function of the backup power supply in the autonomous operating modes of the system and the alignment of the load profile, that is, the elimination of daily peaks and failures in power consumption. The implementation of these functions, combined with the installation of power active filters will minimize losses in the line and elements of ESS and it will be perform on MATLAB simulation.

A Comprehensive Overview of WLAN Security Attacks
Authors:-Yeshwanth Valaboju

Abstract:- Wireless communication has broken the constraint individuals utilized to have also in addition to wired innovation. The right to gain access to provider network without being bound, versatility while accessing the Internet, boosted consistency, as well as adaptability, are an amount of the variables steering the wireless LAN modern-day technology. Different other variables that contribute to the impressive development of Wireless Area Networks(WLANs) are lessened setup time, enduring cost discount rates, and likewise instalment in difficult-to-wire areas. Wireless LANs level of popularity has performed the growth as a result of the fostering of the IEEE 802.11 b spec in 1999. Over the last couple of years, wireless LANs are widely set up in a location like company, federal authorities bodies, health care centres, colleges and also building atmosphere.

Risk Analysis of Putting Attacks into Perspective and Conducting a Vulnerability Assessment
Authors:- Bhagya Rekha Kalukurthi

Abstract:-In various other to prevent unauthorized use risk set up via vulnerable wireless accessibility areas, Wired Matching Personal privacy – a low-level files shield of encryption physical body– was developed for wireless security purposes. WEP protocol protects link-level information throughout wireless transmission in between consumers along with access to aspects. It carries out indeed certainly not give end-to-end security, nevertheless merely for the wireless area of the link. Wireless security is an authentic barrier for network managers and also particulars security managers similar. Unlike the wired Ethernet LANs, 802.11-based wireless LANs broadcast radio-frequency (RF) records for the customer terminals to pay attention to. As a result, anybody along with the right resources can quickly take hold of and also move wireless signs if he is in fact within a selection.

VLSI Architecture for 8-bit Reversible Arithmetic Logic Unit based on Programmable Gate
Authors:- M.Tech.Scholar Sameer Suman, Dr. Anshuj Jain(HOD)

Abstract:- Reversible computing spans computational models that are both forward and backward deterministic. These models have applications in program inversion and bidirectional computing, and are also interesting as a study of theoretical properties. A reversible computation does, thus, not have to use energy, though this is impossible to avoid in practice, due to the way computers are build. It is, however, not always obvious how to implement reversible computing systems. The restriction to avoid information loss imposes new design criteria that need to be incorporated into the design; criteria that do not follow directly from conventional models.In this paper, investigate garbage-free reversible central processing unit computing systems to physical gate-level implementation. Arithmetic operations are a basis for many computing systems, so a proposed the design of adder, sub tractor, multiplexer, encoder and work towards a reversible circuit for general circuit are important new circuits. In all design implemented Xilinx software and simulated VHDL text bench.

Artificial Hand using Embedded System Involve Arm Processor and Sensors
Authors:- Nishanth B

Abstract:- In this work, Many of the people misfortune their hand, for example, mishap, the aid of the amputee, and incapacitated people their life. The artificial hand is low weight and simple compact smaller confined and includes a connection force framework. Artificial hands, which consolidate mechanical plan and established framework multi-modular sensor framework are blanketed detecting everyday and sheer strength. A human hand shape and the capacity of having a take care of utilizing getting a cope with on and grasping items. The artificial hand is a fabricated acrylic cloth that has produced the usage of aluminum and iron respectively. The microcontroller is generally essential in synthetic palms.EMG sensor is interfaced with the top appendage receive the signal from people The palm stayed void and gives sufficient space to a miniature siphon. Due to oneself adjusting highlights of the hand’s several items can be gotten a manage close by. This empowers the improvement of a less weight prosthetic hand with high usefulness Embedded system is a mixture of hardware using a microprocessor and an appropriate software program in conjunction with additional mechanical or different digital components designed to perform a selected assignment. Embedded gadget locations a vital role in this prosthetic hand additionally called an artificial hand Microcontroller and microprocessor places an important role in all types of control applications in prosthetic hand we are using an adhesive substance to deal with light-weight materials It supports weight up to 4kg.

Criminal Activities Predictive Analysis Using Data Mining Techniques
Authors:- Meenu Rai, Bhawana Pillai

Abstract:- Data mining is the extraction of knowledge from large databases. One of the popular data mining techniques is Classification in which different objects are classified into different classes depending on the common properties among them. Machine learning are widely used in Classification. This paper proposes a data mining technique which applies an enhanced existing machine learning Algorithm to detect the suspicious criminal activities. An improved decision tree Algorithm with enhanced feature selection method and attribute- importance factor is applied to generate a better and faster Decision Tree. The objective is to detect the suspicious criminal activities and minimize them. This paper aims at highlighting the importance of data mining technology to design proactive application to detect the suspicious criminal activities.

A Review on Fiber Reinforced Concrete Using Glass Fiber Reinforced Concrete (GFRC)
Authors:- Abdul Rasheed, Asst. Prof. Anuj Verma, Asst. Prof. Mohd Rashid

Abstract:- Plain concrete possess very low tensile strength, limited ductility and little resistance to cracking. Internal micro cracks are inherently present in concrete and its poor tensile strength is due to propagation of such micro cracks. Fibers when added in certain percentage in the concrete improve the strain properties well as crack resistance, ductility, as flexure strength and toughness. Mainly the studies and research in fiber reinforced concrete has been devoted to steel fibers. In recent times, glass fibers have also become available, which are free from corrosion problem associated with steel fibers. The present paper outlines the experimental investigation conducts on the use of glass fibers with structural concrete. CEM-FILL anti crack, high dispersion, alkali resistance glass fiber of diameter 14 micron, having an aspect ratio 857 was employed in percentages , varying from 0.33 to1 percentage by weight in concrete and the properties of this FRC (fiber reinforced concrete) like compressive strength, flexure strength, toughness, modulus of elasticity were studied.

Foot over Bridge Random Vibrational Analysis for Diffrent Slab Material
Authors:- PG Student J. P. Pawar, Prof. R. S. Patil, Dr. G. R. Gandhe (H.O.D)

Abstract:- Damping performs essential function in format of vibrational resistant structures, which lower the changeof the shape when they are subjected to lateral loads or vibrational load. In the existing study the deck of bridge is check for various materials like MS steel plate, RCC slab, and aluminum and MS plate composite deck. The important challenge of a structure is to endure the vibrationalloads on deck slab. In order to reduce structuralvibration has been used. The bridge is modeled in ANSYS 2019 and modeled with different material of deck. After the study results show foot over bridge having 100 mm thick slab shows better result than having composite sheet or having MS sheet as deck slab.

A Comparative Analysis of Optimization Techniques
Authors:- M. Tech.Scholar Palac Gupta

Abstract:- Regression testing is an important process during software development. For the purpose of reducing the number of test cases and detecting faults of programs early, this paper proposed to combine test case selection with test case prioritization. Regression testing process has been designed and optimization of testing scheme has been implemented. The criterion of test case selection is modify impact of programs, finding programs which are impacted by program modification according to modify information of programs and dependencies between programs. Test cases would be selected during test case selection. The criterion of test case prioritization is coverage ability and troubleshooting capabilities of test case. There are various optimization techniques available. This review explains about the different optimization techniques on the basis of their evolution, methodology, performance and applications.

Literature Review on Pharmaceutical Industry in India Comparison of Post Reform and Pre Reform Period and Policy
Authors:- Ph.D. Scholar Vinod Kumar Gupta, Professor Dr. Rajesh Gupta

Abstract:- The extant literature dealing with the impact of TRIPS agreement on Indian pharmaceutical industry takes the whole country as a unit of analysis, but the present study is unique in the sense that it takes into account the regional aspects of Indian pharmaceutical industry, based on various reports and unit-level data of Annual Survey of Industries since 1991 to 2011. In the year 2005, Indian pharmaceutical industry came under the obligation of Trade-Related Aspects of Intellectual Property Rights (TRIPS); Simultaneously, Indian pharmaceutical firms were also required to comply with Good Manufacturing Practices of World Health Organisation (WHO-GMP). The descriptive evidences depicted that with the introduction of TRIPS and WHO-GMP number of firms and man-days employed declined across the states during the introductory period of TRIPS; whereas net value added and gross capital formation remained constant for the same period. But in the post-TRIPS period most of the states reported greater performance, especially in terms of net value added and gross capital formation.

Review on Management of Hospital Waste in an Efficient Manner
Authors:- Ph.D. Scholar Vijay Kumar Bhardwaj, Professor Dr. Sandeep Kumar

Abstract:- This is a review paper which is prepared from the surveys of hospitals and research studies. Hospital waste management in the world is a strict discipline and does occupy a serious place in the management of health care sector. The management of hospital remaining requires its removal and disposal from the health care establishments as hygienically and economically as possible by methods that all stages minimizes the risk to public health and to environment. Health care waste can be dangerous, if not done properly. Poor management of healthcare waste exposes health labors, waste handlers, and the community to the toxic effects of wastes generated from health activity. The disposal of these wastes could also lead to environmental problems. This article intends to describe various health care wastes and its controlling, as creating good practices for proper handling and disposal of health care waste is an important part of the health care delivery system. The aim of this paper is to highlight the present condition of medical waste and a review on scientific method of hospital waste management. Biomedical waste is identified under many terminologies like hospital waste, healthcare waste etc., which are generated due to long or short term care of persons. Various health care establishments are the minor and major source of these types of wastes. Biomedical waste may be primarily classified as Hazardous and Non Hazardous wastes. Further, the biomedical waste is categorized by WHO and also under The Biomedical Waste (Management & Handling) Rules, 1998, India. According to previous studies the quantum of waste generated in a health care establishment depends on the Income of the country, type of Hospital, Region etc. Biomedical wastes are highly infectious and can be a potential source for transmission of diseases if not properly managed. Hence, a proper management procedure has to be adopted to safely dispose the wastes to safe guard the public health and Environment and a stringent regulation have to be imposed on the health care establishments before and after it is approved for execution. Further, the hospital staffs are at high risk of being infected by these biomedical wastes, therefore, the occupational health and safety can be recommended to be a component of biomedical management plans with qualified personnel in Hospitals.

A Project Report on Risk Return Portfolio Analysis with Reference to Securities Market
Authors:- Shaik Asif Basha, Asst.Prof. Dr. C. Mallesha

Abstract:- Successful investment requires a careful assessment of the investment’s potential returns and its risk of loss. A firm’s risk and expected returns directly affect its share price. In real-world situations, the risk of any single investment would not be viewed independently of other assets. New investment must be considered in light of their impact on the risk and return of the portfolio of assets. In traditional financial analysis, investment management tools allow investors to evaluate the return and risk of individual investments and portfolios. Usually, higher the risk, higher the returns and lower the risk, lower the returns. However, a general understanding of this phenomenon is not sufficient to make appropriate decisions relating to investments. A more quantifiable analysis is required to understand the investment.Thus the following study discusses the analysis of portfolio risk and returns.

Energy Saving System
Authors:- Shivpujan Yadav, Mrs. Rupali Shekokar

Abstract:- In todays the basic problems in any country is wastage of electricity. If we change our behavior and try to avoid the wastage of electricity then we can save more electricity. By saving electricity we can earn money by selling those electricity to our surrounding countries. And by efficient way of using electricity we can bring down the cost of our electricity bill. In this paper, I have design a system which is saving energy. I have design this system for schools, colleges etc. Only authorized person can enter into the classroom. There are two options present for students and teachers to use lights and fans in the classroom. First one is manually by switch and second one is automatically by detecting the position of person in the room lights and fans will be on.. When there is nobody present inside the classroom then automatically all electrical appliances will be off.

Awareness and Practice of Biomedical Waste Management
Authors:- Ph.D. Scholar Vijay Kumar Bhardwaj, Prof. Dr. Sandeep Kumar

Abstract:- Healthcare is an important area of human care. The very process of modern healthcare is also ridden with risk and unhealthy practices. One of this is Bio Medical Waste generation in treatment of human beings; apart from other species. This Bio Medical Waste generation warrants proper Bio Medical Waste management. Bio Medical Waste is defined as waste that is generated during the diagnosis, treatment or immunization of human beings and is contaminated with patients body fluids such as syringes, needles, dressings, disposables, plastics and microbiological wastes. Proper disposal of hospital waste is of paramount importance because of its infectious and hazardous characteristics. Therefore the Government of India promulgated the Bio Medical Waste Rules in 1998 and it became mandatory for all the hospitals to follow the above rules and the standards laid down under the statutory regulations. Healthcare is vital and hospitals are considered to be healers and protectors of health and wellbeing. But the waste generated from treatment and diagnosis can be hazardous, toxic and even lethal because of their high potential for disease transmission. The present study consists of BMW management practices like Segregation, Treatment and Disposal, Waste Handling Safety Measures and Waste Administration that are followed in healthcare facilities. It focuses on the waste management practices of the respondent healthcare facilities on the basis of type of hospital, bed capacity, bed occupancy, amount of waste generation and number of waste handling workers. Besides, the study extends to see the impact of demographical factors on waste management practices. From the related questions regarding `segregation practices`, ‘treatment and disposal practices, ‘waste handling safety measures’ and ‘waste administration’ scores were calculated. Further, based on quartiles, scores are categorized into 3 components viz., Low, Moderate, High for assessing the respondent HCFs view on the waste management practices in the HCFs. The data collected for this study was processed by using SPSS Version 19.0. Descriptive statistical tools like percentages, means and standard deviation and analytical tools like Chi-square, t-test, one way ANOVA, Correlation and Regression are used to test the significant association and impact between characteristics of HCFs and Waste Management Practices.

Awareness and Practice of Biomedical Waste Management
Authors:- Ph.D. Scholar Vijay Kumar Bhardwaj, Prof. Dr. Sandeep Kumar

Abstract:- Healthcare is an important area of human care. The very process of modern healthcare is also ridden with risk and unhealthy practices. One of this is Bio Medical Waste generation in treatment of human beings; apart from other species. This Bio Medical Waste generation warrants proper Bio Medical Waste management. Bio Medical Waste is defined as waste that is generated during the diagnosis, treatment or immunization of human beings and is contaminated with patients body fluids such as syringes, needles, dressings, disposables, plastics and microbiological wastes. Proper disposal of hospital waste is of paramount importance because of its infectious and hazardous characteristics. Therefore the Government of India promulgated the Bio Medical Waste Rules in 1998 and it became mandatory for all the hospitals to follow the above rules and the standards laid down under the statutory regulations. Healthcare is vital and hospitals are considered to be healers and protectors of health and wellbeing. But the waste generated from treatment and diagnosis can be hazardous, toxic and even lethal because of their high potential for disease transmission. The present study consists of BMW management practices like Segregation, Treatment and Disposal, Waste Handling Safety Measures and Waste Administration that are followed in healthcare facilities. It focuses on the waste management practices of the respondent healthcare facilities on the basis of type of hospital, bed capacity, bed occupancy, amount of waste generation and number of waste handling workers. Besides, the study extends to see the impact of demographical factors on waste management practices. From the related questions regarding `segregation practices`, ‘treatment and disposal practices, ‘waste handling safety measures’ and ‘waste administration’ scores were calculated. Further, based on quartiles, scores are categorized into 3 components viz., Low, Moderate, High for assessing the respondent HCFs view on the waste management practices in the HCFs. The data collected for this study was processed by using SPSS Version 19.0. Descriptive statistical tools like percentages, means and standard deviation and analytical tools like Chi-square, t-test, one way ANOVA, Correlation and Regression are used to test the significant association and impact between characteristics of HCFs and Waste Management Practices.

Indian Pharmaceutical Industry, Strategies and Challenges in India, Comparison of Post Reform and Pre-Reform Period
Authors:- Ph.D. Scholar Vinod Kumar Gupta, Professor Dr. Rajesh Gupta

Abstract:- The pharmaceutical manufacturing, especially in countries like India, is in addition to playing an important economic and social role directly related to many health related issues. It is a science-based industry, a symbol of development of science, technology or information, provides service chance for different population levels and has supply significantly to the overall growth of the Indian industryThe principle of this study is to examine presentation and future trends of the Indian pharmaceutical industry in the period before and after the reform. By analyzing data from the pharmaceutical industry, you can understand market trends, the new and emerging companies in the industry and the industry’s expenses and profitability. The analysis of such data provides guidance for monitoring market environment, which in turn can help future investment decisions. In addition, it also helps to track different developments related to certain diseases (such as cardiovascular, anti allergic, etc.).In addition, psychiatry also highlights the legal aspects (patent law) or rations related to the commerce. The study also suggests discussing a specific area within the pharmaceutical industry, the therapeutic area. Therefore, the proposed research includes recognized pharmaceutical manufacturing activities currently in use, including the API industry, formulations, and important therapeutic areas. The researchers outlined the Indian pharmaceutical industry and its evolution from almost non-existent to one of the global generic drug suppliers.

Movie Recommendation using Clustring Technique
Authors:- M. Tech Scholar Pooja Relan, Asst. Prof. Avinash Pal (HOD)

Abstract:- Recommendation system uses different types of algorithms to make any type of recommendations to user.Collaborative filtering recommendation algorithm is most popular algorithm, which uses the similar types of user with similar likings, but somewhere it is not that much efficient while working on big data. As the size of dataset becomes larger than some improvements in this algorithm must be made. Here in our proposed approach, we are applying an additional hierarchical clustering technique with the collaborative filtering recommendation algorithm also the Principal Component Analysis (PCA) method is applied for reducing the dimensions of data to get more accuracy in the results. The hierarchical clustering will provide additional benefits of the clustering technique over the dataset and the PCA will help to redefine the dataset by decreasing the dimensionality of the dataset as required. By implementing the major features of these two techniques on the traditional collaborative filtering recommendation algorithm the major components used for recommendations can be improved. The proposed approach will surely enhance the accuracy of the results obtained from the traditional CFRA and will
enhance the efficiency of the recommendation system in an extreme manner. The overall results will be carried out on the combined dataset of TMDB and Movielens, which is used for making recommendations of the movies to the user according to the ratings patterns created by the particular user.

Modeling of a Hybrid Energy System Connected System
Authors:- M.Tech. Scholar Sumit Kumar Mehta, Asst. Professor Mithilesh Gautam

Abstract:- In integrated micro-grid, PV system is usually controlled to operate in the maximum power point tracking (MPPT) mode. The battery energy storage system is operated in constant power charging or discharging mode. In order to provide an integrated energy system connected to grid Depending on individual energy requirements, the Integrated Energy System can be an add-on to an existing energy source (an integrated solution) to reduce fossil-fuel consumption or a stand-alone for complete fossil fuel displacement. Through extensive integration of energy infrastructures it is possible to enhance the sustainability, flexibility, stability, and efficiency of the overall energy system. This concept together with the cost reduction, technology development, environmental awareness, and the right incentives and regulations has unleashed the power of the sun. And all system result will be carried out by matlab simulation is proposed for isolated micro grids with renewable sources.In the presented technique, the pitch angle controller is designed for wind turbine generator (WTG) system to smooth wind power output. The proposed strategy is tested in a typical isolated integrated micro-grid with both PV and wind turbine generator.

Review on Diagnosis of COVID-19 from Chest CT and X-Ray Images Using Deep Learning Algorithms
Authors:- Vishwas V (M.Tech.), Dr. Kiran Gupta Professor

Abstract:- As we all know , the world has been in a cocoon this whole year, and we have only now begun to step back into normalcy. COVID-19 outbreak was announced as a Global Pandemic by WHO on 11 March 2020 by which time the Global tally of infected people was at 114,243 and the deaths at around 4302. Due to the absence of specific therapeutic drugs or vaccines for the novel COVID-19, it is essential to detect the disease at its early stage and immediately isolate the infected person from the healthy population. Recent findings obtained using radiology imaging techniques suggest that such images contain salient information about the COVID-19 virus. Application of advanced artificial intelligence (AI) techniques coupled with radio-logical imaging can be helpful for the accurate detection of this disease. The objective of this paper is study the diagnostic value of CT and x-ray images and compare their efficiency against RT-PCR and also, to compare and analyse existing deep learning models for classification of Covid pneumonia from regular pneumonia and no pneumonia.

Enhanced the Security through Asymmetric Based RSA Algorithm
Authors:- Mahendra Kumar Choudhary, Ravinder Singh

Abstract:- In the last some decades we are using the internet in our daily communication. We are sending our non-secret as well as secret data using internet. So there is a chance that our data can be leaked of hacked by someone or some unauthorized person or party. So we can try to secure our data with the help of cryptography.The proposed work is using an old symmetric algorithm that is play fair with some modification and RSA that is asymmetric algorithm also. As we know the symmetric key algorithm is using the same time for encryption and decryption.The problem of key exchange problem I used here RSA algorithm.

Heart Disease Prediction using Data Mining Technique
Authors:- Shivangi Agrawal, Asst.Prof. Ashish Tiwari(HOD)

Abstract:- ECG is the most common and basic test performed on patients to detect anomalies in the heart. As a result of the ECG, 10 to 20 minutes of continuous patient heart data were collected and printed as a 1D plot. We have developed a program that extracts a continuous data set from the ECG machine and analyzes the data and extracts various ECG wave functions. First we divide the data by Wavelet decomposition. Then the data is reconstructed to 4 levels, removing noise from the signal. At the same time we detect important components of ECG wave, which are P wave, QRS complex and T wave. Electrocardiogram (ECG) is an important diagnostic tool for assessing cardiac arrhythmias in clinical practice. In this process, we present a deep learning-based convolutional neural network structure that was previously trained in a general data set of signals transmitted to perform automatic diagnosis of ECG arrhythmias by classifying ECG patients under similar cardiac conditions. The main goal of this process is to implement a simple, reliable and easy to use deep learning technique to classify two different selected conditions in the heart category. The results showed that cascading deep learning with conventional SVM was able to achieve very high performance. All this work is done by MATLAB simulation.

Movie Stats: Sentiment Analysis of IMDB Reviews and Tweets of a Movie Using Naïve Bayes Classifier
Authors:- Deep Rahul Shah

Abstract:- Sentiment analysis, also referred to as opinion mining or emotion extraction is the classification of emotions within textual data. This technique has been widely used over the years to determine the sentiments, emotions within a particular textual data. I have designed a way where we as a user can view the real time sentiment analysis of movie reviews and tweets regarding a certain movie. I built a Sentiment Analysis model with an accuracy of 98.7 % and an F1 score of 0.99, which means the model is nearly 99% as accurate as a human in analyzing the Sentiment of the text. Many websites are providing you lengthy reviews, which makes it quite boring to read it, so the proposed system shows the real-time chart and sentiment analysis of the tweets and movie reviews in a user- friendly way. This is what makes MovieStats unique.

IOT based Air and Sound Pollution Monitoring System
Authors:- Roja K, C. Santhosh Kumar, P. Anlet Pamila Suhi

Abstract:- The pollution of air and sound is increasing abruptly. To bring it under control its monitoring is majorly recommended. To overcome this issue, we are introducing a system through which the level of sound and the existence of the harmful gases in the surroundings can be detected. The growing pollution at such an alarming rate has started creating trouble for the living beings, may it be high decibels or toxic gases present in the environment leaves a harmful effect on human’s health and thus needs a special attention.

Survey on “Laxmanrekha-Woman Safety And Alert System
Authors:- Samruddhi Kute, Jayshree Gupta, Pratiksha Sonawane,
Surabhi Sonawane, Girija Chiddarwar

Abstract:- Every day, every woman, young girls, mothers and ladies from all walks of life are struggling to be safe and protect themselves from the roving gaze of the horribly insensitive men who molest assault and violate the dignity of women on a daily basis. The streets, public transport, public places in particular have become the dominion of the hunters. Due to these atrocities that women are subjected to in the present scenario, a smart security wearable device for women based on Internet of Things is proposed. This device is extremely portable and can be activated by the victim on being assaulted just by the click of a button that will fetch her current location and also capture the image of the attacker via camera. The location will be sent to predefined emergency contact numbers or police via smart phone of the victim thus preventing the use of additional hardware devices/modules and making the device compact. Crime against women lately has become problem of each nation round the globe many countries try to curb this problem. Preventive are taken to scale back the increasing number of cases of crime against women. A huge amount of knowledge set is generated per annum on the idea of reporting of crime. This data can prove very useful in analyzing and predicting crime and help us prevent the crime to some extent. Crime analysis is a neighborhood of importance in local department. Study of crime data can help us analyze crime pattern, inter-related clues and important hidden relations between the crimes.

Review and Analysis on Behaviour Based Safety in Renewable (Wind) Energy Project
Authors:- Rajendra Singh Gour, Ms. Nisha Kushwaha

Abstract:- It is projected that in up to 82 per cent of Work-related accidents, workers, Behaviour in the form of acts or comissions is a major contributory factor. Such behaviour can lead for many pre-existing factors to come together in a Potential Severe or Lost Time event. There are several reasons why workers engage in at-risk‟ behaviour at work. Health and safety in the workplace is influenced by a number of factors, from the organisational atmosphere through management attitude and commitment to the nature of the work or task and the personal attributes of the individual. Safety- related behaviour in the workplace can be improved by addressing these major influences. One way to improve safety performance is to introduce a behavioural based safety process that identifies and strengthens safe behavior and reduces unsafe behaviour. Behaviour-based safety is the “application of science of behaviour change to real world safety problems” or “A process that creates a safety partnership between management and employees that continually focuses people’s attentions and actions on theirs, and others, daily safety behaviour.” Behavioural safety processes are not a „quick fix‟ and it is important not to overlook fundamental elements. Organisations should start by concentrating on strategies and systems –assessing and improving management and operational aspects, training, design and so on. First researched in the 1970s in the US, the behaviour-based safety approach emerged in UK organisations in the late 1980s and is now widely used in a variety of sectors in the UK. IOSH has produced this guidance to introduce the background and basic principles of implementing a process which systematically addresses behavioural safety. The methods described are based primarily on observation, intervention and response as ways of changing behaviour.

A Literature Review of Supplier Selection for Construction Project
Authors:- M. Tech. Scholar Sanket D. Alone

Abstract:- This paper is about the selection of supplier for materials required in a construction project. Apart from making a proper schedule of the project for marking the start and completion dates of the project, for optimizing the cost of the project, material supplier is very important from the quantitative as well as quantitative point of view. In order to make an adequate suppliers selection use different criteria depending on the specific case. The supplier selection process deploys an enormous amount of a firm’s financial resources and plays crucial role for the success of any organization. The main objective of supplier selection process is to reduce purchase risk, maximize overall value to the purchaser, and develop closeness and long-term relationships between buyers and suppliers.

Optimising Headway using Communication Based Train Control system
Authors:- Student Amit Shrivastava, Prof. Anshuj Jain, Prof. Ankit Tripathi

Abstract:- In most of the previous researches the grade of automation 3 i.e. (GOA 3) has been analyzed for Direct Train Operation i.e. DTO mode while the focus of this proposed is to analyze the feasibility for the Grade of Automation 4 i.e GOA 4 which implements the Unattended train operation i.e. UTO Mode. In this specification the current Headway used by most of the Metro Rails is 120 sec. The comparison of signaling system of conventional Railways and the CBTC system in Metro Railways is also been included in this work and how the upgraded version have affected the capacity and efficiency of the mass transit system.

Analysis of Fly Ash and Hypo-Sludge Combination for Brick Manufacturing
Authors:- M. Tech. Scholar Prateek Chourawar, Asst. Prof. Aviraj Singh Gabbi

Abstract:- Hypo sludge is one of the waste from the paper industries which cannot be recycled hence a subsequent solution has to be found out to dispose these waste. Previous research work suggests that hypo-sludge can be used as replacement for the cement in concrete. So this work planned to use hypo sludge as an ingredient for bricks manufacturing and performing tests. Experiment is done on various set of mixing proportion of the material where different number of days samples are utilize for the examination of various properties of the brick. Results shows that proposed work has achieved good set of strength with increase in percentage of Fly-Ash and Hypo-Sludge. It was obtained that density of dry compacts decreases with increase in weight percentage of Fly-Ash and Hypo-Sludge. As the dry compacts are immersed in water at 1100C -1800C, then through capillary action voids are filled and it becomes hard and the porosity is eliminated. As a result of which the compacts become dense and finally the density increases with increase in Fly-Ash and Hypo-Sludge content. it is clear from SEM micrographs that 75 wt. % FA blend composite has splits which prompt decrement in compressive quality.

Study of Horse Manure with Fly Ash Ingredients in Brick Fabrication
Authors:- M. Tech. Scholar Neelesh Kumar Deshmukh, Asst. Prof. Raviraj Singh Gabbi

Abstract:- Research works are not directed on manufacturing of the bricks from natural waste however the current pattern of reusing organic waste has extraordinary effect on building material industry. A few research works have done to discover the substitution of bond in concrete. This examination work is on an arrangement to utilize one such natural waste i.e. horse manure into the bricks fabricating. Fly-ash bricks have officially demonstrated their significance as the ordinary bricks gives hardness to the ground water. This gives a rule that the horse manure can likewise be utilized as a part of bricks fabricating if its quality is satisfactory with in the farthest point. Five diverse weight rates of Fly ash and horse manure with (70%, 60%, half, 40% and 30%) and (10%, 15%, 20%, 25% and 30%) were taken individually. These syntheses were mixed completely by hand mixing, to get a homogenous mix. Distinctive pieces of Fly ash remains alongside horse manure were kept in three diverse little size containers.

A Survey on Security of Clouds and Trust Model Techniques
Authors:- Sidharth Mohan, Asst. Prof. Jayshree Boaddh , Asst.Prof. Jashwant Samar

Abstract:- Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud computing. However, this sole feature of the cloud computing introduce many security challenges which need to be resolved and understood clearly. This paper gives a detailed survey on IAAS security issues. As virtual machine should be secured to handle data and maintain privacy. Methods proposed by various scholars are explained which directly or indirectly enhance the security of cloud. Paper has list some of trust techniques developed by researchers for identifying any malicious machine.

MRI Image Segmentation and Classification Using KFCM and Convolution Neural Networks
Authors:- M.Tech. Scholar Nayan Pure, Asst. Prof. Ashish Tiwari

Abstract:- The unlimited and uncontrollable growth of cells can cause human brain tumors. Correct treatment and early diagnosis of brain tumors are essential to avoid permanent damage to the brain. In medical image diagnosis, tumor segmentation and classification schemes are used to identify tumor and non-tumor cells in the brain. The automatic classification is a challenging task which utilizes the traditional methods due to its more execution time and ineffective decision making. To overcome this problem, this research proposes an automatic tumour classification method named as Hybrid Kernel based Fuzzy C-Means clustering – Convolution Neural Network (Hybrid KFCM-CNN) method. The algorithm identifies the position of tumor in brain MRI as they are mostly preferred for tumor diagnosis in clinic. The proposed method also crops tumor region from segmented image and way growth of tumor and help in treatment planning. It also provides important information about location, dimension and shape of brain tumor region with no exposing the enduring to a high ionization radiation. The size of tumor is calculated in term of number of pixels. Similarly the primary brain tumor is considered into Benign and malignant type on MRI brain images, based on accuracy, sensitivity, specificity in MATLAB simulation.

Distribution Planning Model for Water from Different Sources
Authors:- PhD Student Tichaona Goto, Lecturer Iris Shiripinda, Endowed Chair Prof.Fanuel Tagwira, Anthony Phiri (Director)

Abstract:- Urbanization in Africa is characterized by insufficient basic infrastructure, particularly in high density areas. There is need to come up with a model which takes a comprehensive approach to urban water services and viewing water supply as a component of integrated physical system. The purpose of this study is to critically look at demand based planning model for the distribution of water from different locally available sources in the high density suburb of Budiriro as an option of supplying water for gardening, sewage system, drinking and other domestic uses to the residents. This model provides a method of integrating different sources of water to supply water according to use. The model will bring relief on water demand since the use of water from hand dug wells and Rainwater harvesting is another virgin source of water which can be exploited fully. The blending of water from different sources to come up with quality water is one of the thrusts of the model. The model provides future forecasts and scenario planning, but effective water demand should have a planning for integrated water management of the different water sources.

A Review on Low Power and Delay of Ripple Carry and Carry Look Ahead Adders
Authors:- Amit Chaturvedi, Dr.Vikash Gupta

Abstract:- Now a days in the world of VLSI Technology, the word low power consumption is only possible with the concept of Reversible logic design. Reversible concepts will attain more attraction of researchers in the past two decades, mainly due to low-power dissipation and high reliability. It has received great importance due to because of there is no loss of information, while we are processing the data from input to output. Moreover, the power dissipation is also very less and ideally it should be zero. So the concept of reversible design will become more dominant in the low power VLSI design. This paper focuses on the implementation of 4, 8, 16 and 32 bits of highly optimized area efficient Ripple carry adder (RCA) and Carry look ahead (CLA) adders. Finally, we can prove that the Carry look ahead adders are so fastest among all the previously existing designs. All these processes will be Simulated & Synthesized on the ISE Xilinx 14.7 software.

Role of Emotional Intelligence on Our Immune System during Pandemic Situations
Authors:- Research Scholar Mrs. Padmashree G.S, Asst. Prof. Dr. Mamatha.H.K

Abstract:- COVID 19, a global pandemic, which first started in Wuhan city of China in December 2019, spread to different countries across the globe. The effect of the disease in terms of mortality and morbidity are manifold like death, depression, loss of income, anxiety, and migration. Vaccine has been formalized and life is getting normalized, but we are left with questions on what makes human beings susceptible and how can we build our immunity not only physically but also mentally. One such attempt is improving the Emotional Intelligence of people. This article is an attempt to understand the impact of Emotional Intelligence on the Immune System of the human body and how emotional intelligence, if understood and developed properly can help ward off many of the negative consequences of these type of pandemics. In this article, a review has been done on how the domain of Emotional Intelligence (EI) can help tackle this pandemic on an individual as well on the collective level. This is shown by discussing the relationship that EI has on the Immune System. Beginning the discussion from the interaction of Immune system with the environment, this article speaks about the influence of EI on Genes and Placebos which in turn impact the immune system.

Solar Connected Igbt Switch to Enhance Superconducting Magnetic Energy Storage System (Smes) for High Power Dc Application
Authors:- Iqrar Ahmed Ansari, Deepak Pandey, Rahul Singh

Abstract:- A superconducting magnetic energy storage (SMES) system includes a high induction coil that can act as a constant source of direct current. A high temperature SMES (HTS) unit connected to an energy system can absorb and store active and reactive energy from this system and release these powers in this system during demand periods.

A Review on Generation of Electricity from Solar Power Plant
Authors:- M. Tech. Scholar Amar Pratap, Prof. Madhu Upadhyay, Sagar Tomar

Abstract:- The aim of the article is to study of the operating modes basis of distributed solar power plants, power consuming storage and power filtering devices using simulation tools. and energy efficiency assessment of local microgrid on the change of the concept of developing modern power engineering is conditioned by growing interest in renewable energy sources The most rapid pace of the development among low-power distributed renewable energy sources is presented by private solar power plants, which operate both autonomously, and can be integrated into the industrial network which is designed to solve two key tasks – performing the function of the backup power supply in the autonomous operating modes of the system and the alignment of the load profile, that is, the elimination of daily peaks and failures in power consumption. The implementation of these functions, combined with the installation of power active filters will minimize losses in the line and elements of ESS and it will be perform on MATLAB simulation.

Designing and analysis of Microgrid Implementation with Solar Photovoltaic Power Plants
Authors:- M. Tech. Scholar Amar Pratap, Prof. Madhu Upadhyay, Sagar Tomar

Abstract:- Solar energy is a renewable energy that is found abundantly in nature. It is green energy that can be utilized throughout day, therefore maximum energy has to capture from the panel. MPPT algorithm is incorporated to capture maximum energy. A multilevel inverter is a power electronic converter that synthesizes a desired output voltage from several levels of dc voltages of dc voltages as inputs. With an increasing number of dc voltage source, the sinusoidal waveform is obtained by the output voltage, while using a fundamental frequency-switching scheme. The advantage of multilevel inverter is very small output voltage, results in higher output quality and lower switching losses. This paper proposes a MPPT controller based solar power generation system, which consist of dc/dc converter and multilevel level inverter. In solar photovoltaic power generation systems, photovoltaic panels take a large amount of cost, if improve the use of photovoltaic battery and transform the solar battery plate absorption power into alternating current for use by the user as much as possible, will save a lot of money. Based on the equivalent circuit of solar cells, this paper analyzed the characteristic curve of solar cells through the MATLAB simulink model.

Detection of Brain Tumor
Authors:- Jigisha Kamal, Raunak Kolle, Varshini P

Abstract:- A study conducted by the “New England Journal of Medicine” for brain tumor revealed that more than half the cases diagnosed were delayed for a year or longer. This low percentage of correct diagnosis by physical practitioners was astonishing with an average pre-diagnostic symptomatic interval (PSI) being 60 days with a parental delay of 14 days and a doctor’s delay of 30 days. This meant, there existed a delay of almost 104 days in the diagnosis. Among the diagnosed brain tumors only 33% of them were diagnosed by the end of the 1st month after the onset of first signs and symptoms. Physical segmentation of the MRIs by a radiologist is often a monotonous and prolonged process. A viable solution is a Deep Learning aided brain tumor detection and segmentation from brain MRIs. The detection of brain tumor from the magnetic resonance images is an extremely important process for deciding the right therapy at the right time.

Literature Survey on Power Quality and Voltage Flicker Reduction using D-STATCOM
Authors:- Dharmendra Kumar, Prof. Abhishek Dubey

Abstract:- Now-a-days, the most important discussing topic in the world of powersystems is maintenance of power quality The power quality improvement is one of the interesting topics among researchers groups. And they all focused on power quality improvement in power system. In this literature survey paper we are study so many papers written by different researchers. Study and analysis of DSTATCOM and its uses and advantages in power system. .

Smart Dustbin Application Using IOT with GSM
Authors:- Student Jaya Priya. A, Asst. Prof. Dr. N.Shunmuga Karpagam

Abstract:- With increase of population, the scenario of cleanliness with respect to garbage management is degrading tremendously. In city, there are many public places where we see that garbage bins or dustbins are placed but are overflowing. This creates unhygienic condition in the nearby surrounding. Also creates ugliness and some serious diseases, at the same time bad smell is also spread and it degrades the valuation of that area. To avoid such situation we come up with a project called “Smart Dustbin” which is a GSM based Garbage and waste collection bins overflow indicator system for Smart Cities. Over main motivation behind this project is the ongoing campaign Swachh Bharat Abhiyan (Clean India Movement) launched on October 02, 2014 at Rajghat, New Delhi, by the Prime Minister of India Narendra Modi which is India’s largest ever cleanliness drive to clean the streets, roads and infrastructure of the country’s 4,041 statutory cities and towns. In this paper, smart bin constructed on a microcontroller-based platform, which is interfaced with GSM modem, and ultrasonic sensor that detects the presence of human on a particular distance. Once the garbage reaches the threshold level, ultrasonic sensor will trigger the GSM Modem, which will continuously alert the required authority until the garbage in the dustbin is squashed. Once the dustbin is squashed, people can reuse the dustbin. At regular intervals dustbin will be squashed. Once these smart bins are implemented on a large scale, by replacing our traditional bins present today, waste can be managed efficiently as it avoids unnecessary lumping of wastes on roadside. Foul smell from the rotten wastes that remain untreated for a longer time, due to negligence of authorities and carelessness of public may lead to long-term problems. Breeding of insects and mosquitoes can create nuisance around promoting unclean environment. This may even cause dreadful diseases.

Propeller Hub Repair With Cold Spray Technology (CST Process)
Authors:- Dupally Naval Venkata, Narasimha Kishore Yadav

Abstract:-The current process of the repair by Cold Spray Technology is the restoration of the Aircraft Propeller components and Hub is one of the dynamically stressed components containing aluminum and its alloys and these are the perfect components for the cold spray applications. This application is based on the material of the component that is manufactured and can be repaired with. Most of these cold spray repairing materials are pretreated according to the manufactured material or alloys. Most of the material or metals selected for the cold spray application are compared with the physical, chemical, and mechanical properties of the manufactured components. To optimize the perfect spray bond the closest parameters are subsequently selected, the spay material is applied, and the component is repaired with help of Helium and nitrogen to replace the affected area with spraying powder. Then after the spray, the component is machined in the way it was new and according to OEM standards. This process can be worked on not only Aircraft components, but also any metals used in mechanical, automotive, aerospace, oil and gas, and many other industries where metals need repair and restoration of the damaged area.

E-Waste Management
Authors:- Prof. Kharde Ashwini Ganpat, Prof. Prashant Sanpat Kale, Prof. N. M. Garad, Prof. A. S. Shirsath

Abstract:-Electronic waste, e-waste, e-scrap, or waste Electrical and Electronic Equipment (WEEE) describes discarded electrical devices. There is a lack of consensus as to whether the term should apply to resale, reuse, and refurbishing industries, or only to product that cannot be used for its intended purpose. Informal processing of electronic waste in developing countries may cause serious health and pollution problems, though these countries are also most likely to reuse and repair electronics. Some electronic scrap components, Such as CRTs (Cathode Ray Tubes), may contain contaminants such as lead, cadmium, beryllium, or brominated flame retardants. Even in developed countries recycling and disposal of e-waste may involve significant risk to workers and communities and great care must be taken to avoid unsafe exposure in recycling operations and leaching of material such as heavy metals from landfills and incinerator ashes. Scrap industry and USA EPA (United States Environmental Protection Agency) officials agree that materials should be managed with caution, but many believe that environmental dangers of used electronics have been exaggerated.

Challenges at the Time of Covid-19, and Innovation to Combat with Situation
Authors:- Sandeep Kumar, Unsa Fatima, Ranju Shah, Upma Gupta

Abstract:-21st century was moving ahead in a pleasant way. Suddenly it was hit by the pandemic, Covid-19, which changed the life of everybody. Offline mode was transformed by the online mode. The platforms such as Google Meet, Webex, Zoom helped in a tremendous way to connect people and also to complete their work from the available resources at home.E- commerce was atits boom during this period and those who grabbed the opportunities initial- ly were awardedconsequently. On thecontrary,those who were operating in physical mode were severely hit. Foronline education,Courser,Byjus are working to help the students in their respected fields ofwork. This paper will cover the technological aspects during COVID-19.

Aadhar Based Fingerprint Electronic Voting Machine
Authors:- Bhakti Salvi, Mrs. Rupali Shekokar

Abstract:- The main aim of the voting is to express their thoughts related to choose your government, political leader, citizen initiatives and so on. It is an important task for the election team to conduct fair voting in respective country. Every country spent lot of money to make election without any fraud and rampage free. But, in current situation it has become very normal for some sources to make illegal voting that may lead to a result contrary to the actual judgment of the people [2]. We refer some paper and design one machine to solve the above problem. By taking help of biometric system (finger print scanning) will make this project more secure and trustable. Biometric system has been increase speed of the system and accuracy. It also provide the security to system, avoid fake and duplicate voting etc. System uses to identify the user is thumb impression and Aadhar card number. Because as we know that Aadhar card is government trusted identification card and thumb impression of every person on the earth (human being) has unique pattern. Thumb impression increase security in the system, and that is the main task of this system, increase security. In this, as a pre-polling step create database consisting of the Aadhar card number and thumb impressions of all the eligible voters. At the time of elections, the thumb impression and Aadhar card number of a voter is entered as input to the system [1]. And then, that database records compared with the entered thumb impression and Aadhar card number. If that entered pattern and Aadhar card number matches with the database of the thumb impression and Aadhar card number respectively, grant permission to cast a vote. And in case any repetition in vote and if pattern doesn’t match with the records of the database present in system, for that particular person permission to cast a vote is denied and system not go for next step, it come out from processes. And in other case the pattern match but Aadhar card number doesn’t match with the records present in system, for that particular person also permission to cast a vote is denied and system not go for next step, it come out from processes. To cast a vote must is to match both Aadhar card number and finger print of that particular person, than and than only system allow for next step (For voting). As per voting going on counting has been done paralleled. This system maintenance cost is less and overall cost for complete election process is very less.

Underground Fault Cable Detection Using Wireless Technology
Authors:- P.G. Scholar Manjula V, Asst. Prof. P. Sumathi, HOD. P. Anlet Pamila Suhi

Abstract:- Detecting fault cable system proposes fault location model for underground power cable using microcontroller. Fault location models are to determine the distance of underground cable fault from base station in kilometers. This project uses the simple concept of ohm’s law. When any fault like short circuit occurs, voltage drop will vary depending on the length of fault in cable, since the current varies. A set of resistors are therefore used to represent the cable and a dc voltage is fed at one end and the fault is detected by detecting the change in voltage using a analog to voltage converter and a microcontroller is used to make the necessary calculations so that the fault distance is displayed on the LCD display.

Determination of Unsaturated Hydraulic Conductivity and Diffusivity as a Function of Moisture Contents and Soil Suctions
Authors:- ADAMU Cornelius Smah, UDOJI Braveson Obiefo, EKOJA Omeyi Faith, SALIHU Buhari Salam, IKYAPA Tertese Peter, BELLO Sikiti Garba

Abstract:- This study on unsaturated hydraulic conductivity and diffusivity of a soil was conducted at Agricultural engineering experimental plot, Ahmadu Bello University, Zaria. Experimental conductivity was carried out from five profile pits with samples taken from (15, 30, 45 and 60cm) depths. The saturated conductivity (Ks) was first determined in the laboratory using the constant head method, the gravimetric moisture contents were estimated in the laboratory using the pressure plate extractor by applying the required suctions at (0, 0.1, 0.3,1,5,10 and 15) bars. The bulk densities of the samples collected were also estimated. The volumetric moisture contents were determined by multiplying the gravimetric moisture contents with their corresponding bulk densities. Jackson’s model of 1973 was applied to determine the unsaturated hydraulic conductivity at each moisture content using the formula Ki =Ks(θi/θs) (∑_(j=i)m⌊(2j+1)-2i)φj-2⌋)/(∑_(j=1)m⌊(2j-1)φj-2⌋). The soil suction and the volumetric moisture contents were related to K(φ)=〖aφ〗mm and K(θ)=bθm . Where K is the degree of saturation or unsaturation. φ is the volumetric moisture content and θ is the soil suction head, a, b are the empirical constants while m and n are constants for the measure of the steepness. Mualem Van Gunatchen model of 1976 predicted a formula which was used in determining the hydraulic diffusivity by multiplying the conductivity to the differential of this relationφ=aθm. Major findings of this study revealed that the value of the diffusivity as a function of volumetric moisture content decreases down the profile pit, this could be as a result of the existence of materials in the soil with increase in the suction. The coefficient of determinant (R²) decreases down the profile, it was also observed that the bulk density (B) and Porosity affect the hydraulic conductivity (Ks) and diffusivity (D) of the soil on site.

A Review Article of PV Based Power Generation and Power Quality Improvement Using SSSC Power Compensation
Authors:- Amarkant Shukla, Dr. Arvind Kumar Sharma

Abstract:-In this paper we investigate the controlling and enhancing power flow in a transmission line using a Static Synchronous Series Compensator (SSSC). The Static Synchronous Series Compensator is used to investigate the device in controlling active and reactive power as well as damping power system oscillations in transient mode. The SSSC device is equipped with SOURCE ENERGY to absorb or supply the active and reactive power to or from the line. Various IEEE bus systems have been stabilized using this FACTS device. The results are obtained by simulating the various power systems in MATLAB/SIMULINK.

Railway Track Crack Detection System Using Arduino Microcontroller and Gps Notification
Authors:- P.G. Student Aruna A, Asst. Prof. P. Anlet Pamila Suhi (HOD)

Abstract:- The Indian Railways has one of the largest railway networks in the world, criss- crossing over 1,15,000 km in distance, all over India. However, with regard to reliability and passenger safety Indian Railways is not up to global standards. Among other factors, cracks developed on the rails due to absence of timely detection and the associated maintenance pose serious questions on the security of operation of rail transport. A recent study revealed that over 25% of the track length is in need of replacement due to the development of cracks on it. Manual detection of tracks is cumbersome and not fully effective owing to much time consumption and requirement of skilled technicians. This project work is aimed towards addressing the issue by developing an automatic railway track crack detection system. This work introduces a project that aims in designing robust railway crack detection scheme (RRCDS) using TSOP IR RECEIVER SENSOR assembly system which avoids the train accidents by detecting the cracks on railway tracks. And also capable of alerting the authorities in the form of SMS messages along with location by using GPS and GSM modules. The system also includes distance measuring sensor which displays the track deviation distance between the railway tracks.

A Review on Thermal Design Analysis of Piston Using RSM Method
Authors:- M.Tech Scholar Rajat Singh, Prof. Brijendra Kumar Yadav

Abstract:- A piston is a component of reciprocating IC-engines. Piston is the component which is moving that is contained by a cylinder and was made gas-tight by piston rings.A mathematical model is formulated based on the simulation result values of total deformation, stress and first ring groove temperature. The Piston during the working condition exposed to the high gas pressure and high temperature gas because of combustion. At the same time it is supported by the small end of the connecting rod with the help of piston pin (Gudgeon pin). The gas pressure given 20 Mpa is applied uniformly over top surface of piston (crown) and arrested all degrees of freedom for nodes at upper half of piston pin boss in which piston pin is going to fix. The statistical ‘‘Design-Expert” software has been usedto study the regression analysis of simulation data and to drawthe response surface plot. The statistical parameters were estimatedby using ANOVA. The objective of the study is to minimize the mass. The optimum combination of the influencing parameters for the mass can be found using Response Surface Method.

Thermal Design Analysis OF Piston Using Rsm Method
Authors:- M. Tech. Scholar Rajat Singh, Prof. Brijendra Kumar Yadav

Abstract:- A piston is a component of reciprocating IC-engines. Piston is the component which is moving that is contained by a cylinder and was made gas-tight by piston rings. A mathematical model is formulated based on the simulation result values of total deformation, stress and first ring groove temperature. The Piston during the working condition exposed to the high gas pressure and high temperature gas because of combustion. At the same time it is supported by the small end of the connecting rod with the help of piston pin (Gudgeon pin). The gas pressure given 20 Mpa is applied uniformly over top surface of piston (crown) and arrested all degrees of freedom for nodes at upper half of piston pin boss in which piston pin is going to fix. The statistical ‘‘Design-Expert” software has been used to study the regression analysis of simulation data and to draw the response surface plot. The statistical parameters were estimated by using ANOVA. The objective of the study is to minimize the mass. The optimum combination of the influencing parameters for the mass can be found using Response Surface Method. It is found that Height of top land and crown thickness has a dominant effect on total deformation, stress, mass and first ring temperature and The optimal piston mass is determined at height of top land = 2 mm and Crown thickness= 10 mm is 174.43 g.

Renewable Energy Based Power Generation Systems
Authors:- M.Tech. Pooja Vaishya, Prof. Barkha Khambra

Abstract:- The microgrid has shown to be a promising solution for the integration and management of intermittent renewable energy generation. This paper looks at critical issues surrounding microgrid control and protection. It proposes an integrated control and protection system with a hierarchical coordination control strategy consisting of a stand-alone operation mode, a grid-connected operation mode, and transitions between these two modes for a microgrid. To enhance the fault ride-through capability of the system, a comprehensive three-layer hierarchical protection system is also proposed, which fully adopts different protection schemes, such as relay protection, a hybrid energy storage system (HESS) regulation, and an emergency control. The effectiveness, feasibility, and practicality of the proposed systems are validated on a practical photovoltaic (PV) microgrid. This study is expected to provide some theoretical guidance and engineering construction experience for microgrids in general.

A Review Article of Power Management in Pv-Battery-Hydro Based Stand Alone Microgrid
Authors:- Sumit Singh, Vivek Anand

Abstract:- This works mainly on a Power Management System for a micro-grid system powered by a hybrid power generation system consisting of frequency control, power control, power management and solar photovoltaic (PV)- battery-hydro based micro-grid (MG) load. Therefore, power and frequency control allows for the balance of active energy and auxiliary services such as active energy support, source of current harmonics reduction and voltage reduction harmonics where common encounters.

Published by: