Category Archives: Uncategorized

IJSRET Volume 7 Issue 2, Mar-Apr-2021


Strength Analysis by Utilization of Plastic PET Bottles In Concrete Material
Authors:-Priyanka Yadav, Mr. Anuj Verma

Abstract:-Plastic waste disposal in the environment is a big problem since it is impossible to biodegrade and has a broad footprint. Plastic recycling was practiced on a wide scale in India. Recycling from various sources accounts for up to 60% of industrial and urban plastic waste. Recently, plastic waste has been studied as a possible replacement for a portion of the current concrete aggregates. In this study, trials and measurements were carried out in order to evaluate the effectiveness of waste plastic reuse in concrete building. Waste plastic was used to partially replace sand in 0 percent, 1 percent, 2 percent, 3 percent, 4 percent, and 5 percent of concrete blends. The concrete cubes were tested at room temperature. Slumping and compression are needed for these measurements. This study ensures that reusing plastic waste as a substitute for fine concrete aggregates will result in lower material costs while still addressing the waste disposal problem.

A Review of Mechanical Properties of Fly Ash Based Geo-Polymer Concrete Used As Paver Blocks
Authors:-Awdhesh Kumar, Anuj Verma

Abstract:-The world is facing the challenges of climate changes due to the increase in CO2 emissions. Cement production is one of the biggest contributors to CO2 emissions due to combustion processes that require high temperatures. The new development in building construction showed that fly ash based Geopolymer concrete can be as structure materials to reduce or even eliminate ordinary Portland cement concrete. This paper presented the research results of fly ash based geopolymer concrete mechanical properties, like the compressive strength, flexural strength, and Elastic Modulus.Paver block is often used in alternative functions, such as those in street as well as other areas of building. So far, roof tiles and paving bricks are the only products to have been manufactured at the lab-scale. Future studies could focus on the investigation of other mechanical and durability properties of the optimum formulations, in order to find applications in the manufacturing of a variety of building materials.

A Review of Bamboo/Jute/PLA Biodegradable Composite
Authors:Subhash Kumar, Dr. Anil Kumar, Mr Amit Sharma

Abstract:-Biodegradable polymers can potentially be combined with natural fibers to produce biodegradable compositematerials. In this work, PLA (Polylactide) was used in combination with Jute fabric to generate bio-composite by compression molding technique. Various mechanical characterizations like tensile, flexural and impact properties of bio-composite were determined. The result from mechanical testing showed that use of Jute fabric with PLA, increases the tensile strength and tensile modulus, why the flexural modulus is reduced. Scanning electron microscopy (SEM) investigation also showed good bonding between the Jute fabric and PLA as there were no air voids. Water absorption results reported increase in weight of the bio-composite for 24 hrs conditioned time. The findings of this work create the scope of use of the Jute fiber/ fabric for making fully biodegradable composites for potential application as architectural interiors in building construction sector. The developed composites were also used as the replacement for mica sheets for the table top, chairs, door panels and many more.

A Review of Solar Energy Based Heat and Power Generation Systems
Authors:M. Tech. Pooja Vaishya, Prof. Barkha Khambra

Abstract:-The microgrid has shown to be a promising solution for the integration and management of intermittent renewable energy generation. This paper looks at critical issues surrounding microgrid control and protection. It proposes an integrated control and protection system with a hierarchical coordination control strategy consisting of a stand-alone operation mode, a grid-connected operation mode, and transitions between these two modes for a microgrid. To enhance the fault ride-through capability of the system, a comprehensive three-layer hierarchical protection system is also proposed, which fully adopts different protection schemes, such as relay protection, a hybrid energy storage system (HESS) regulation, and an emergency control. The effectiveness, feasibility, and practicality of the proposed systems are validated on a practical photovoltaic (PV) microgrid. This study is expected to provide some theoretical guidance and engineering construction experience for microgrids in general. The utilization of solar energy based technologies has attracted increased interest in recent times in order to satisfy the various energy demands of our society. This paper presents a thorough review of the open literature on solar energy based heat and power plants. In order to limit the scope of the review, only fully renewable plants with at least the production of electricity and heat/hot water for end use are considered. These include solar photovoltaic and solar thermal based plants with both concentrating and non-concentrating collectors in both solar-only and solar-hybrid configurations.

Disease Prediction System in New Normal
Authors:Sonal Shilimkar, Pratiksha Thosar, Prajakta Dharade, Ayushi Patel4, Asst. Prof. Varsha Pimprale

Abstract:-In this disease prediction system follows normal rules. The system is designed such that to provide a facility predicting disease from given reports. Report can be in the form of image (MRI, x-Ray, mammography, etc). Or in the form of input parameters like numerical value came with the result of reports. The system will take input from the user for a specific disease the system will follow image processing techniques to process and extract results from images. The result will be provided to a user. The system will also suggest nearby specialists for the detected disease.

Study on Concrete Properties under Acid Attacks
Authors:- Racharla Nageswara Rao, Asst. Prof. DMS Nageswara Rao

Abstract:-Acidic attack on concrete imparts unique set of injury mechanisms and manifestations compared to other durability problems with concrete. vitriol attack limits the service lifetime of concrete elements and, thus, leads to increased expenditures for the repair or in some cases replacement of the entire structure. To date, there’s lack of standardized tests for specifically evaluating the resistance of concrete to vitriol attack, which has caused great variability, for instance in terms of solution concentration, pH level/control, etc., among previous studies during this area. Accordingly, there are conflicting data about the role of key constituents of concrete (e.g. supplementary cementitious materials [SCMs]), and uncertainty about building codes’ stipulations for concrete exposed to vitriol. Hence, the primary objective of this thesis was to assess the behaviour of an equivalent concretes, prepared with single and blended binders, to incremental levels (mild, severe and really severe) of vitriol solutions over 36 weeks. The test variables included the sort of cement (general use [GU] or Portland limestone cement [PLC]) and SCMs (fly ash, silica fume and nano-silica). The severe (1%, pH of 1) and really severe aggression (2.5%, pH of 0.5) phases caused mass loss of all specimens, with the latter phase providing clear distinction among the performance of concrete mixtures. The results showed that the penetrability of concrete wasn’t a controlling factor, under severe and really severe damage by vitriol attack, whereas the chemical vulnerability of the binder was the dominant factor. Mixtures prepared from PLC performed better than that of counterparts made up of GU. While the quaternary mixtures comprising GU or PLC, fly ash, silica fume and nanosilica showed the very best mass losses after 36 weeks,binarymixturesincorporatingGUorPLCwith ash had rockbottom masslosses. Several studies reported that the improved chemical resistance of alkali-activated materials (AAMs) over concrete supported Portland cements. However, AAMs have technical limitations, which could deter its widespread use in cast-in place applications. These limitations include need for warmth curing, slow setting, and slow strength development, which could be mitigated by further improving the reactivity of AAMs during early-age with nanoparticles; however, this area remains largely unexplored. Hence, the second objective of this thesis was to develop innovative sorts of AAMs-based concrete [alkali activated ash (AAFA), alkali activated slag (AAS) and their blends incorporating nanosilica] and evaluate their resistance to 2 different vitriol exposures over 18 weeks for potential use in repair of concrete elements susceptible to acidic attack. While AAFA specimens, produced without heat curing, experienced rapid ingress of the acidic solution and a big reduction within the bond strength with substrate concrete, ash based AAMs comprising slag and or nanosilica (AAFA-S and AAFA-S-NS) had improved performance thanks to discounting the ingress of acidic solution and continued geopolymerization reactivity. Comparatively, specimens from the slag group exhibited high levels of swelling, internal cracking and mass loss thanks to chemical deterioration. The general results suggest that AAFA-S and AAFA-S-NS mixture, without heat curing, could also be a viable option for repair applications of concrete elements in acidic entrainments, but field trials are still needed to further verify their performance.

Experimental Study on Presence of Calcium Exchange Capacity on the Properties of Expansive Soils
Authors:- Sunkara Suresh, Asst. Prof. A. Sarath Babu

Abstract:- This research work presents the efficacy of salt and ash as an additive in improving the engineering properties of Black cotton soil which is expansive soil. Salt of 1%, 2% and three were mixed with black cotton soil utilized in the laboratory experiments. The ash percentages of 20% and 30% were used for compare the results obtained with salt percentages. The effectiveness of the salt and ash tested by conducting unconfined compressive strength and swelling pressure test. The unconfined compressive test has finished curing period of seven, 14, and 28 days to match the results with 0 days unconfined compressive strength. The soil samples were subjected to wet and dry cycles and observed that increase of unconfined compressive strength and reduction of swelling pressure. The results were obtained from salt mixes soil sample after wet and dry cycles has better strength, less swelling pressure and fewer swelling index.

Strength and Behavior of Concrete by Partial Replacement of Fine Aggregate with Recycled Plastic
Authors:- Nithisha Nalluri, Asst. Prof. A. Sarath Babu

Abstract:- Considering quick improvement of individuals in nations like India the discarding Solid waste is an immense issue in our bit by bit life. Distinctive waste materials are made from social event measures, association associations and normal strong squanders. The developing consideration about nature has enormously added to the worries related with ejection of the made squanders. Strong waste association is one of the critical typical worries on the planet. With the insufficiency of room for land filling and because of its always expanding cost, squander use has gotten an engaging decision instead of ejection. Among the waste material, plastic is the material that is the significant worry to by a wide margin the majority of the ordinary impacts. Examination is being done on the usage of waste plastic things in cement. The utilization of waste things in strong makes it prudent, yet besides helps in reducing removal issues. The movement of new improvement materials utilizing reused plastics is essential to both the unforeseen development and the plastic reusing adventures. Reuse of waste and reused plastic materials in solid blend as a characteristic neighborly improvement material has pulled considering specialists advancing occasions, and unlimited appraisals revealing the direct of cement containing waste and reused plastic materials have been scattered. This paper sums up an extensive survey on the evaluation articles on the utilization of reused plastics in strong dependent on whether they administered concrete containing plastic totals or plastic filaments. Moreover, the morphology of cement containing plastic materials is to clarify the impact of plastic totals and plastic filaments on the properties of cement. The properties of cements containing virgin plastic materials were additionally examined to build up their similitudes and contrasts with concrete containing reused plastics. Solid shape, chamber and segment were casted taking 0% to 40% of plastic as halfway substitution of fine total and pursued for 28days of compressive quality, flexural quality and split adaptability of cement.

Response of Shear Wall in Open Storey Building under Seismic Excitation
Authors:- Shaik Mohammed Imran, Asst. Prof. D.C. Anajaya Reddy

Abstract:- The Open Ground Storey buildings are very commonly found in India due to provision3 for considerably needed parking lot in urban areas. However, seismic performance of this sort of buildings is found to be consistently poor as demonstrated by the past earthquakes. A number of the literatures indicate that use of shear walls may enhance the performance of this type of buildings without obstructing the free movement of vehicles within the parking zone . This study is an effort during this direction to review the performance of Open Ground Storey buildings strengthened with shear walls during a bay or two. additionally thereto , the study considers a special scenarios of Open Ground storey buildings strengthened by applying various schemes of multiplication factors in line with the approach proposed by IS 1893 (2002) for the comparison purpose. Study shows that the shear walls significantly increases the bottom shear capacity of OGS buildings however the comparative cost is slightly on the upper side.

Analysis of Credit Card Fraud Detection in Data Mining using Various Classifier Techniques
Authors:- Research Scholar Sachin Jain, Professor Dr. Rohit Kumar Singhal

Abstract:-The data mining is the technique which can mine useful information from the rough data. The prediction analysis is the technique of data mining which can predict new things from the current data. The classifications techniques are generally applied for the prediction analysis. This research work is based on the prediction of the credit card fraud detection. The various techniques are proposed by the authors for the credit card fraud detection. The technique which is proposed the study in the different paper is based on the conventional neural networks in which system learns from the previous experiences and drive new values.

Analysis of Software Project Cost Estimation using Functional Point
Authors:-Research Scholar Sunil Kumar, Professor Dr. Rohit Kumar Singhal

Abstract:-Effort estimation has been used for planning and monitoring project resources. As software grew in size and complexity, it is very difficult to predict the development cost. There is no single technique, which is best for all situations. A careful comparison of the results of several approaches is necessary to produce realistic estimates. The use of workforce is measured as effort and defined as total time taken by development team members to perform a given task. It is usually expressed in units such as man-day, man -month, and man-year, which is a basis for estimating other values relevant for software projects, like cost or total time required to produce a software product.

Study and Analysis in HEART DISEASE ANALYSIS USING K-Nearest Neighbor Classifier
Authors:- Research Scholar Wasim Akaram, Professor Dr. Rohit Kumar Singhal

Abstract:- Data mining refers to analysis of complex data. The prediction is the process of determining what will happen next. Recently, various techniques have been applied for the prediction analysis. A SVM technique is applied to the prediction analysis. The technique divides data into training and testing stages. The first class of test data is for the most part related to the individuals who have little to no risk of having a heart disease . The second class of test data all have risk-of-heart-disease levels above 50%. This research work proposes to improve this existing method using decision tree classifier. The proposal would improve accuracy and reduce the execution time.

A Review on Design Considerations for a Bidirectional Dc/Dc Converter
Authors:- M.Tech. Scholar Alka Tanwar, Asst. Prof. Mithilesh Gautam

Abstract:- Recently the use of renewable energy resources has been increased to save the environment and remaining fossil fuel and the requirement of storing the energy is also increased. In many applications like electric vehicles the need of interfacing of energy storage with load and source is increased for a reliable and efficient system. Bidirectional dc to dc converter is the main device used to interface the Battery and super capacitor as a storage device to increase the system reliability A conventional buck-boost converter can management the power flow in one direction only but power can flow in both the direction in bidirectional converter. Bidirectional dc-dc converters are the device for the purpose of step-up or step-down the voltage level with the capability of flow power in either forward directions or in backward direction. Bidirectional dc-dc converters work as regulator of power flow of the DC bus voltage in both the direction. In the power generation by wind mills and solar power systems, output fluctuates because of the changing environment condition. the basic knowledge and classification of bidirectional dc to dc converters on the basis of galvanic isolation, the comparison between their voltage conversion ratio and output current ripple along with various topologies researched in recent years are presented in this paper. Finally, zero current and zero voltage soft switching schemes and phase shifted controlling techniques are also highlighted.

Classification of Brain tumour in MRI images using BWT and SVM classifier
Authors:- M.Tech. Scholar Nisha Tomar, Asst.Prof. Ashish Tiwari

Abstract:- The improvement in medical image dispensation is increasing in an incredible manner. The speed of increasing ailment by method of reverence to various types of cancer and other related human exertion pave the way for the increase in biomedical research. as a result giving elsewhere and analyzing these medical descriptions is of high significance for scientific diagnosis. This work focus on the stage effectual categorization of brain tumour descriptions and segmentation of exist illness images employing the planned mixture bright techniques. The challenge as well as objectives lying on design of mark extraction, characteristic collection in addition to image classification and segmentation for medical images are discuss The tentative results of intended method contain been appraise and validate for arrangement in addition to superiority examination on magnetic clatter brain images, based on accuracy, sensitivity, specificity, and dice comparison directory coefficient. The experimental marks achieved 91.73% accuracy, 91.76% specificity, and 98.452% sensitivity, demonstrating the efficiency of the proposed method for identify normal and nonstandard tissues from intelligence MR images.

Dynamic Brain Tumor Image Detection Using Median Filter and Genetic Algorithm
Authors:- M.Tech. Scholar Shivi Joshi, Prof. Shalini Sahay

Abstract:- Processing of MRI image for detection of disease in human body was done manually by heath specialist. But most of machine develops automation for the same, so researchers are working in this field to improve the accuracy of detection. This paper has proposed the brain tumor detection algorithm in MRI images. Due to the dynamic nature of tumor in any part of brain sculpture genetic algorithm was used for tumor detection. Proposed tumor detection model use Teacher Learning Based Optimization genetic algorithm which classify image pixel into two regions first was tumor and other was non tumor portion of brain. So no need of training for the detection of tumor from image is required. Use of median filter increase detection accuracy with gray scal image input in fitness function. Real image brain tumor dataset was taken for testing of algorithm. Result shows that proposed model has improve the precision, recall, f-measure evaluation parameters as compare to previous approaches.

Gesture Recognition for User Interaction
Authors:- Anshul Joshi, Harsh Gupta, Srija Nagabhyru

Abstract:- With the massive influx and advancement of technologies there is a scope for us to interact with our systems in the best possible way. One such technology would be Gesture based Human Computer Interaction. So our system makes use of HCI which would help us interact without touching the screen. It is a well known fact that two dimensional user interfaces are everywhere, but with the increasing popularity of Extended Reality (XR) we require a better, more sophisticated three dimensional user interface.

Prediction of Earthquake Magnitude Based on the Clusters in Sulawesi Island, Indonesia
Authors:-Fachrizal Fajrin Aksana*, Andi Azizaha, Enggar Dwi Prihastomob

Abstract:- In this paper, we present an earthquake magnitude prediction model based on similar earthquake locations. To classify the earthquakes that occurred in Sulawesi Island, we use the K-Means clustering method to group the earthquakes based on the longitude and latitude of the earthquake. Support Vector Regression and Random Forest Regressor are proposed model to predict the magnitude in each cluster based on the longitude, latitude, and depth of the earthquakes. The data of past earthquakes are obtained from the USA Geological Survey and Meteorology, Climatology and Geophysical Agency of the Republic of Indonesia (BMKG). The optimal number of clusters is determined by the elbow method is 3. The prediction results show that the most accurate prediction model is Random Forest Regressor when the clustering approach is used.

Emotion Recognition Using Face Detection
Authors:- Amit Badave, Shivani Oswal, Siddharth Atre, Prof. Shilpa Khedkar, Vivek Alhat, Prof. Bhagyashri More

Abstract:- Human-machine interaction is one of the most important aspects of computing. Automatic emotion recognition has been an active topic for research since the last decade. Analyzing unique patterns of human emotions will help machines to understand humans better. Face detection and emotion recognition can be used in several application areas. It can be used in real-time monitoring, security and in gaming applications. In recent years, deep learning has provided a whole fresh approach to understanding and process real-time data. It provides effective methods and algorithms to process images, audio, video, and metadata. In this paper, we propose a system that aims to classify human emotions in different categories such as happy, sad, neutral, disgust, ange and fear. It bases our paper upon the idea of using different techniques of machine learning such as neural networks, haar cascade, principal component analysis (PCA), and facial features extraction to classify human emotions.

Survey on Secure Transactions Using Facial Identification
Authors:- Assistant Professor A.Porselvi, M.E, Anusha S, Meena P, Nishitha K

Abstract:- The rise of technology brings into force many varieties of tools that draw a bead on a lot of client pleasure. There’s associate degree pressing would like for up security in banking region. During this survey, we tend to discuss banking transactions exploitation facial identification. This subject has relevance to facial idea exploitation bank dealing. The processed info passes through the information of banks and payment systems. If facial identity is matched then dealing can be finished. The event of such a system would serve to safeguard customers and money establishments alike from intruders and identity thieves. The combined biometric options approach is to serve the aim each the identification and authentication.

Use Cases of Blockchain with Big Data
Authors:- Ms. Pratima Keni

Abstract:- Big data means data which is stored in massive amount of storage. Big data is high- volume, high-velocity and high-variety of data which is cost effective and help us to take any decision. Block chain is nothing but data which is stored in block and connect that data with each other through the block. Most recent transaction data which is added to block. This is also known as peer in chain. Blockchain which is the trending technology in today’s world. In this research paper we are dealing with what are the advantages when big data and blockchain are two big technologies are come into the picture. Basic Introduction of this paper which is explains in Section I. Section II talks about what is big data. Section III tells about What are the issues of Big data analytics. Block chain basic information which is explain in Section IV. Use Cases of Big data with Blockchain which is explain in section V.

Haar Cascades On Face Mask Detection
Authors:- Chinmay Patil

Abstract:-Coronavirus disease 2019 has affected the world seriously. One major protection method for people is to wear masks in public areas. Furthermore, many public service providers require customers to use the service only if they wear masks correctly. However, there are only a few research studies about face mask detection based on image analysis. Object detection is an important feature of computer science. The benefits of object detection are however not limited to someone with a Doctor of Informatics. Instead, object detection is growing deeper and deeper into the common parts of the information society, lending a helping hand wherever needed. This paper will address one such possibility , namely the help of a Haar-cascade classifier.

Analysis of Major Cenrifugal Pumps Failures (With Application to Irrigation Pumps in Sudan)
Authors:- Mohamed Yagoub Adam, Hassan Khalifa Osman, M. I. Shukri

Abstract:-Centrifugal pumps are one of the most widely used pumps in the world, with a wide range of applications, from the petroleum industry to the transportation of irrigation water. Despite the extensive use of pumps, few component failures cause severe degradation of pump performance and increase downtime, which adversely affect production. Therefore, in order to minimize downtime and improve pump reliability and availability, these pumps must be carefully controlled, diagnosed, maintained or replaced before a catastrophic pump failure occurs. This study investigated the major faults found in centrifugal pumps, especially in Sudan’s irrigation pumps. In this study, we analyzed the problems faced by pump failures causing yield loss at the level of all privatization and parastatal pump schemes operating under government license, government pump stations in the four national government owner agricultural schemes (New Halfa, Rahad, Suki and Gezira & Managil), by using statistical methods. Results show that, at the technical level of the system, a probabilistic method based on the evolution of the pump state enables us to carry out preventive interventions; when the component reaches the degradation zone, it leads to an increase in periodic system intervention. For equipment, whose system schedule set in advance by the manufacturer cannot effectively meet the maintenance requirements; the mathematical model based on failure linearization can correct or even optimize the maintenance plan. Through our own investigation, we have concluded that it is necessary to change the structure of the maintenance cycle of the irrigation pumps under consideration. In this study, the feasibility of preventive maintenance based on reliability and conditional maintenance was verified. The results obtained are contributions to meet the reliability goals pursued by irrigation pumps.

Study of On-Line Monitoring Technology on the Transmission Line
Authors:- M.Tech.Scholar Manmay Banerjee, Asst. Prof.Sachin Kumar

Abstract:- This paper presents a ground-breaking thought of overhead T/L web based checking. Mainly premise of this paper is to secure the tons of exploration con-ducted by generation and distribution engineers & another serious T/L secure activity observing framework is working with effectively. Moreover, we are trying to utilize fake impartial organization for analysis models, to demonstrate the plausibility and adequacy for the serious T/L secure activity framework.

Blind – Sight: Object Detection with Voice Feedback
Authors:- A. Annapoorani, Nerosha Senthil Kumar, Dr. V. Vidhya

Abstract:- Computer vision deals with how computers can be made to gain high-level understanding from digital images or videos. It seeks to automate tasks that the human visual system can do. Humans glance at an image and instantly know what objects are in the image, where they are, and how they interact. An estimate of 285 million people is visually impaired worldwide, stated by WHO. The proposed Blind Sight-Object Detection with Voice Feedback is a computer vision-based application that leverages state of the art object detection techniques. These are employed to detect objects in the vicinity. You Only Look Once (YOLO): Unified, Real-Time Object Detection a new approach to object detection is deployed in this proposed work. YOLO has 75 Convolutional Neural Network (CNN). Image classification techniques are used to identify the features of the image and categorize them into their appropriate class. The COCO dataset used in this project consists of around 123,287 hand labelled images classified into 80 categories. This wide set of data is used to describe spatial relationships between objects and their location in the environment. In addition, an Indian currency recognition module is developed to identify the denominations. The text description of the recognised object will be sent to the Google Text-to-Speech API using the gTTS package. Voice feedback on the 1st frame of each second will be scheduled as an output to help the visually impaired hear what they cannot see.

Convolutional Neural Network Based Facial Expression Recognition
Authors:- M.Tech. Scholar Ramchandra Solanki, Asst. Prof. Vijay Yadav

Abstract:- We see the importance of facial expression recognition in different applications. To do such task the traditional feature extraction is used which involves in complex processing. Previously various deep neural networks have been used for this task; as well it can be replaced by some improved methods. So, in this paper we have proposed a system for face recognition which uses the convolutional neural network (CNN) along with the detection of the edges of image. The proposed workflows in two steps in the first the normalization of the facial expression in the image is done, secondly the convolution is done for the extraction of the edges in images. After this the maximum pooling method is used for the dimensionality reduction. At the end the classification of the facial expression is done and the Softmax classifier is used for this classification and the face expression is recognized. The facial expression recognition experiment is done on the Fer-2013 dataset. The results obtained from the proposed approach gets a face recognition rate up to 92.45% for the used dataset. The given method works with lesser number of iterations for the recognition and the system provides approx 1.5 times fast execution as compared to the SDSRN algorithm..

A Review: Improvement of Link Permanency
Authors:- M. Tech. Scholar Bharti Chouhan, HOD Avinash Pal

Abstract:- Vehicular Ad hoc Networks (VANET) are highly mobile wireless ad hoc networks that provides communication between vehicles. As a promising technology it plays an important role in public safety communications and commercial applications. Due to the rapidly changing of topology and high-speed mobility of vehicle, routing of data in vanet becomes a challenging task. One of the critical issues of VANETs are frequent path disruptions caused by high-speed mobility of vehicle that leads to broken links which results in low throughput and high overhead. This paper argues with how to maintain the reliable link stability between the vehicles without any packet loss using two separate algorithms besides position, direction, velocity and digital mapping of roads. In this paper we propose a reliable position-based routing approach called Reliable Directional Greedy routing (RDGR) which is used to obtain the position, speed and direction of its neighboring nodes through GPS and as well as the well-known Ad-Hoc On-Demand Distance Vector (AODV) which includes vehicles position, direction, velocity with link stability. This approach incorporates potential score-based strategy, which calculates link stability between neighbor nodes for reliable data transfer in this paper we use both RDGR and AODV approach in order to provide reliable link stability and efficient packet delivery ratio even in high-speed mobility and changing of topology.

News Classification System Based on Area
Authors:- Prof. Krishnanjali Shinde, Prachi Prajapati, Sakshi Tagalpallewar, Ruchita Bacchuwar

Abstract:- – In 21st century the internet is filled with loads of news articles, there is a pressing need to classify news according to the requirements of an individual. People are generally more interested what is going on, in their immediate surroundings. News has a vital role in the society. Most people read news every day to keep up with the latest information and trends. The information could be anything, from technology, disaster, politics, even the affair of the celebrities. After they absorb the information and understand it, it will be used by the people as a reference to their ideology and decision making. With the help of technology advancements, news disseminates relatively quick across the globe. Using the internet, people can send information from another side of the world in under a second. Because of this, almost any kind of information such as knowledge, idea, entertainment, and news from the people can easily spread to the community. With the development of the web, and ton of internet sites that provide similar information and data. So, users often discover it hard todecide that of those websites will offer thespecified information inside the foremost valuable and effective way.

Behaviour of Combined Piled Raft Foundation in Clayey Soil
Authors:- S. Lakshmi Prabha

Abstract:- In situations where a raft foundation alone does not satisfy the design requirements, it may be possible to enhance the performance of the raft by addition of piles, the use of a limited number of piles, strategically located, may improve both the ultimate load capacity and the settlement and the differential settlement performance of raft. This paper discusses the philosophy of using piles as settlement reducers and considering interaction effects. In this method the raft is considered as a plate supported by a group of piles. To verify the reliability of the proposed method, a 5 storied RCC structure is analysed in SAP 2000, considering the guidelines given in chapter 56 of ICE manual of geotechnical engineering (volumeII) and Theoretical manual for pile foundation by US Army corps of Engineers (ERDC/ITL TR-00-5).

Optimize Piston Durability by Coating Layer of Tungsten Carbide
Authors:- Student of M.Tech. Nitesh Kumar, Gouraw Beohar(HOD), Assistant Professor Anshul Jain

Abstract:- This coating enhance piston durability on layer of 0.20 to 0.25µm which explore that after all testing on Coated piston minimum coating thickness which has been coated will be 0.20 µm whereas maximum thickness of coating which has been coated on piston will be 0.25 µm . There are various result which shows that these layer are efficient during long run .These layer also having less absorption capacity of heat results in maximum heat energy transform into work due to this exhaust will be less. The most expensive way to reduce fuel consumption is to develop more efficient fire engines. Today, about 40-45% of gasoline is converted into useful energy, while the remaining thermal energy is converted into heat. One of the possible solutions of decreasing heat losses from the engine is by insulation of piston coated with Tungsten carbide; all possible measures of improvements are in the scope of interest. Therefore this master thesis was carried out. The theoretical study was focused on about appropriate materials, industrial applications and the state of the art research in the area of coating. Sample prototypes and material samples were coated using a thickness of 0.5 µm to 0.25 µm and coated with Tungsten Carbide powder coating. Heat flux, Shear stress, Elastic strain, and total deformation are measured for each coating. The integrated pistons have been tested in a single cylinder engine, to ensure the strength of the thermal barrier. Due to the negative impact on piston the combustion process and the overall efficiency of piston, were obtain .A trend showing a decrease in heat loss with an increase in the coating of the layer was observed. During both load and thermal cycling tests of different thickness of Tungsten Carbide powder coating such as 0.05 µm, 0.1 µm, 0.15 µm, 0.20 µm, 0.25 µm, and 0.3µm. The temperature and stress field of piston are resolved using ANSYS (Version 18) software. The optimum result obtained to acquire minimum heat loss during combustion and obtained no deformation during high heat in general 150 cc Aluminum alloy piston, the best result obtained on coating piston with 0.25 µm with Tungsten Carbide powder coating.

Acoustic Steam Leak Detection System
Authors:- R. Saravanan M.E.,Ap/Eee, R. Balambika , R.Chelvadharani , A. Divyadharshin

Abstract:- The boiler tube failure is occurring frequently in thermal power plants. Boiler tube leakage is the significant reason for blackout of units and age misfortune in warm influence plants. Location of boiler tube leakage is a significant factor for power plant working as roughly 60% of boiler outages are because of tube leaks. Power plant engineers must cautious about boiler tube puncher so that further damages to pressure parts such as water wall tubes and headers, super heater tubes, re-heater tubes, and furnace refractory may be avoided. Boiler tube leaks have even been known to prompt to bending damage and deformation of the entire boiler. The costs of repair, substitution, and maintenance due to secondary damage can be maximum. There are several solutions are available to identify the boiler tube leakages such that analyzing the make-up water, survey of tube thickness and fitting sensors inside the boiler. The compact solution is fitting sensors inside the boiler. Here, we are using piezoelectric sensor to detect the tube leakages. There are two types of sensors available which are airborne sensor and structure borne sensor. Airborne contains a genuine microphone, which is totally insensitive to vibration. Structure borne is Piezo- electric based sensors can measure sound generated by a leak in the boiler structure by either acoustic frequencies or ultrasonic frequencies. The airborne sensor is used in acoustic steam leak detection system. The Acoustic Steam Leak Detection (ASLD) system works on the principle of detecting the sound waves emanating from the steam leak, processing the same and then indicating the quantum of steam leak and the location. When a leak is detected by a change in the sound patterns, alarms are activated and the fault is localized. By using these methods the leak is detected and the many secondary damages were avoided.

Design and Deflection Analysis of Deck Slab
Authors:- Kapil Mohaliya, Sourabh Dashore (HOD)

Abstract:- Steel-Free Deck Composite Bridges system has been investigated during the past two decades. The concept is totally new and innovative. The new structural system enables the construction of a concrete deck that is totally devoid of all internal steel reinforcement. Traditionally, reinforced concrete bridge decks are designed to sustain loads in flexure. The new innovative bridges with steel-free decks develop internal compressive forces “internal arching” which leads to failure by punching shear at substantially higher loads than the flexural design load. Five composite bridges have been recently constructed in Canada adopting this new concept.

CFD Analysis of Tubular Heat Exchanger with Ribbed Twisted Tapes for Heat Exchanger Enhancement
Authors:- M.Tech. Scholar Vinita Kapse, Prof. Sharvan Vishwakarma

Abstract:- A heat exchanger is really a system that transfers heat between two or more fluids. The fluids can also be single-phase or two-phase, so they can be isolated or in close contact, depending on the form of exchanger. In this study, two twisted ribbons are inserted into another heat exchanger tube and heat transfer is studied. The aim of both the ongoing project is to figure out how fast heat transfers in a circular tube with entangled ribbons. The Reynolds (Re) number as well as the geometry of tube is the parameters of concern. For the first case, diameter of tube is taken 50.8 mm and length 1000 mm. For the second case the diameter is increased and length is kept constant, diameter is constant and length is increased for third case, and for fourth cases both length and diameter is increased. It is found that with the increase in both length and diameter of tubes, the heat transfer is increasing, pressure drop is decreasing by 56%, Nusselt number (Nu) is decreasing by 72% and the thermal enhancement factor is increasing by 12%. It can be concluded that the increase in diameter results in decrease in heat transfer while increase in length is preferable for increase in heat transfer rate. Hence, among the selected four designs, the fourth case with diameter=80mm, and length=3000 mm is the most preferable one.

An Iot Based Modern Street Light System for Energy Efficient and Energy Auditing with Fault Identification System
Authors:- Asst. Prof. R. Rubanraja, M. Kanimozhi, M. Mahalakshmi, K. Mounika, V. Suruthipriya

Abstract:- Today’s modern world people preferred to live the sophisticated life with all facilities. The science and technological developments are growing rapidly to meet the above requirements. With advanced innovations, Internet of Things (IoT) plays a major role to automate different areas like health monitoring, traffic management, agricultural irrigation, street lights, class rooms, etc., Currently we use manual system to operate the street lights, this leads to the enormous energy waste in all over the world and it should be changed. In this survey we studied about, how IoT is used to develop the street lights in the smart way for our modern era. It is an important fact to solvethe energy crises and also to develop the street lights to the entire world. In addition, with the study on Smart Street lighting systems we analysed and described different sensors and components which are used in Iot environment. All the components of this survey are frequently used and very modest but effective to make the unswerving intelligence systems.

A Model for Sentimental Analysis of Twitter Data in Hindi Polarity: A Study
Authors:- Suraj Prasad Keshri1, Neelam Sahu2

Abstract:- This research explores real-time feelings of analysis. Twitter / WhatsApp posts are based in Hindi, with a sense of classification on a three-way scale, negative, positive and natural. The efficiency of various methods such as speech (POS) tagging and part of the stop word extract are compared and WordNet is proposed to improve the Hindi Sentimental Word. The current work of analysis on sentiment has been done in mining. There are resource-rich languages such as English; while data in Indian languages is still relatively low web content in languages like Hindi has grown rapidly over the past few years. In addition, as the length of social media increases, WhatsApp has become a hotbed of user content on platforms such as Twitter and Facebook SA of tweets made in English. There is not an analysis of similar data in Hindi. In this paper, we perform real-time SA on a live stream of Hindi tweets. Twitter social media application is a popular site Forum to share opinions of millions of people there are users on a variety of topics. The Analysis and opinion mining websites are rich sources of data for sentiment. A Twitter user can often use hash tags, then the same tag is used to group similar posts. A group of people can become a hash tag trend Attract a special discussion to as many people as possible to participate in it.

Privacy-Preserving Zero Knowledge Scheme for Attribute-based Matchmaking
Authors:- Solomon Sarpong

Abstract:- Making friends with common attributes is a characteristic of some persons. This characteristic is also extended to matchmaking on social networks. In some of the existing matchmaking protocols, the users are match-paired without considering the number of attributes they have in common. Furthermore, the bane of the existing proposed matchmaking protocols has been how to preserve the users’ privacy and this has been considered as the key security issue for such applications. In order to prevent malicious users from gaining extra information, the attributes in this protocol will be certified. Hence, certification authority ensures that, a user actually possesses the input attributes and binds them to him/her. With the use of certified sets and zero knowledge proofs, users can adequately find a matching-pair whilst keeping his/her input set private. Furthermore, in this proposed protocol, a person can find a best match among potential candidates by finding the one who has the maximum number of common attributes. At the end of the protocol, the match-pair can exchange their attributes without any other person knowing the number or the type of attributes they have in common.

Structural Investigation of Agricultural UAV
Authors:- E.Akshaya Chandar, Adesh Phalphale, Sourav Ghosh, Sanket Desai

Abstract:- UAV Technology has improved exponentially in the last few cycles, and we can discuss its importance as new resolutions to all challenging queries that include managed services on a unique land that a computer can make floating above it. It covers UAV that produces agricultural projects like spraying, an examination of products for vast hectare fields. Structural analysis is the purpose of the consequences of pressures on concrete buildings and their elements. The structural analysis applies applied mechanics, materials science, and applied mathematics to measure a structure’s deformations, internal forces, stresses, support reactions, accelerations, and stability. The analysis results verify a structure’s fitness for use, often precluding physical tests. This report presents the results of structural analysis of the Agricultural Unmanned Aerial Vehicle in compliance with the requirements of DGCA. The analysis includes the Strength of Materials approach to determine loads (Shear Force and Bending Moments) which is utilized for further analysis using the Finite Element Analysis (FEA) approach. Commercial FEA software ANSYS is used for this purpose. The static structural analyses of the UAV are performed under different load conditions. The consequences of these researches show that the planned construction is safe within the flight envelope. This paper lays the structural analysis framework, which could as a source for additional temporary separation. The products can be increased additional to effective reports like Crash Test, sloshing examination of Fuel tanks, Etc. to mimic real-time events. This paper is required to showcase the structure’s authenticity (hypothetical load circumstances compelling) for certification determinations and vibration endorsement from DGCA.

Enhancing Air Pollution Predicton Using Artificial Neural Network with XG Boost Algorithm
Authors:- Assistant Professor Christina Rini R, Aishwarya N, Meenakshi G, Saranya M

Abstract:- Air pollution has become a major public health concern in recent years. Despite substantial improvements in overall air quality in recent years, India remains the third most polluted country according to the latest edition of the World Air Quality Report [1]. The release of gases into the air that are harmful to human health and the environment is referred to as air pollution. Lung cancer, cardiovascular disease, respiratory disease, and metabolic disease have all been linked to high concentrations of fine particulate matter with a diameter less than 2.5 m (PM2.5). Experimental research with various machine learning algorithms has yielded promising results in the field of air pollution prediction. Predicting air quality by determining concentrations will assist different departments, including governments, in alerting people who are at high risk, reducing complications. An improved air pollution prediction approach based on the XGBOOST and ARTIFICIAL NEURAL NETWORK algorithms is used to forecast air quality. Our goal is to look into a machine learning-based approach for air quality forecasting using the AQI index and get the best results possible. In addition, we compare the performance of different ML algorithms from the dataset with the use of a GUI to predict air quality bycharacteristics.

Localization of Partial Discharge in a Transformer Winding Using Ladder Network – A Review
Authors:- Tejal Dixit, Vivek Anand

Abstract:- The Detection of the location of partial discharge in the windings of power transformers has always been considered a challenging task because of the convoluted structure of the winding. There are several methods proposed for the localization of partial discharge in the transformer winding. In this paper, we have concluded a detailed study on detecting the partial discharge using a ladder network to compute the response of a partial discharge in a winding of a transformer. The algorithm for two separate winding sections that are along and across the winding is computed. A response is calculated at the winding neutral terminal.

A Study on Proximate Analysis of Chicken Intestine and Chicken Skin
Authors:- Asst. Prof. Mohammad Saydul Islam Sarkar, Student Md. Saiful Islam

Abstract:- In the present study, percentage of protein, fat, moisture, ash and carbohydrates of poultry by product was studied. For this analysis poultry by product were collected from dining and restaurant. For chicken intestine the intestine percentage of protein, fat, moisture, ash and carbohydrate was 68.28%, 8.64%, 7.37%, 4.33% and 11.40% respectively. For chicken skin the percentage of protein, fat, moisture, ash and carbohydrate was 22.16%, 47.64%, 9.2%, 11.14% and 10.86% respectively. Percentage of protein was more in intestine than skin. Percentage of fat content was more in skin than intestine. Percentage of moisture content was similar between intestine and skin. Percentage of ash content was more in skin than intestine. Percentage of carbohydrate content was similar between intestine and skin.

COVID – 19 Detection Using Medical Imaging and Health Parameters
Authors:- Aditya Raute, Alisha Punwani, Siddhesh Hadkar, Heramb Kulkarni, Asst. Prof. Lifna C.S.

Abstract:- This research paper focuses on the use of advanced technology in confluence with readily available machinery to create a testing environment for COVID-19 that is more efficient, accurate, and has a higher reachability. This paper aims to develop a unique algorithm for detection of COVID-19 based on chest X-Rays, in combination with the patient’s medical information including symptoms, age, bloodwork, and possible contact with someone infected with the virus. This proposal will especially be instrumental in locations with inadequate medical staff, and can drastically reduce the diagnosis time that is otherwise required.

Excessive Retardation in Concrete
Authors:- P.Senthamil Selvan

Abstract:-Setting time of concrete has vital role in the construction process. Retarders are used where early setting of concrete is not required and when higher retention period is needed to place the concrete. Chemical composition of retarder is formulated to stop the hydration temporarily to delay the initial set of concrete. Once the effect of retarder wears off initial set will begin and hardening will develop. Use of concrete as a construction material depends upon the fact that it is plastic in fresh state and gets hardens subsequently with considerable strength. This change in physical properties is due the hydration process which is irreversible. This reaction is gradual, first stiffening of concrete and then development of strength which continues for a long time. The rate of reaction primarily depends on the cement property, concrete mix, and use of mineral and chemical admixtures. It is observed from study that delayed setting of concrete has impacted only early compressive strength of concrete but later strength at 28days remains unaffected by delayed setting of concrete.

Factors Affecting Water Absorption in Hardened Concrete
Authors:- P. Senthamil Selvan

Abstract:Concrete can absorb moisture because of its porous nature. When ambient relative humidity is high, concrete will absorb moisture from the air. When relative humidity is low, water will evaporate from the concrete in to the ambient environment. This absorption of moisture by concrete causes dampness in roof slabs and when concrete is more porous dampness will be higher. Porosity in concrete especially in roof slabs is caused by following several factors; Poor mix proportion, Poor compaction and laying, Curing regime, Poor construction practices.And dampness in roof slab which is primarily absorption of moisture by concrete is caused by following factors; Porosity of concrete, Relative Humidity, Surface area of element, Exposure period of wetting and drying.

A Review Article of thermal Analysis of Shell and Tube Heat Exchanger Using Artificial Neural Network
Authors:- Dhananjay Kumar, Asst. Prof. Deepak Solanki

Abstract:This review explains the effective utilization of artificial neural network (ANN) modeling in various heat transfer applications like steady and dynamic thermal problems, heat exchangers, gas-solid fluidized beds etc. It is not always feasible to deal with many critical problems in thermal engineering by the use of traditional analysis such as fundamental equations, conventional correlations or developing unique designs from experimental data through trial and error. Implementation of ANN tool with different techniques and structures shows that there is good agreement in the results obtained by ANN and experimental data. The purpose of the present review is to point out the recent advances in ANN and its successful implementation in dealing with a variety of important heat transfer problems. Based on the literature it is observed that the feed-forward network with back propagation technique implemented successfully in many heat transfer studies. The performance of the network trained were tested using regression analysis and the performance parameters such as root mean square error, mean absolute error, coefficient of determination, absolute standard deviation etc. The authors own experimental investigation of heat transfer studies of tube immersed in gas-solid fluidized bed using ANN is included for strengthening the said review. The results achieved by performance parameters shows that ANN can be used reliably in many heat transfer applications successfully.

Security in ad-hoc network using encrypted data transmission and Steganography
Authors:- Prof. Ravindra Ghugare, Ankita Patil, Ajay Jha, Dhiraj Kuslekar

Abstract- Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost. Thus users can reduce the maintenance and burden of local data storage. Meanwhile, once data goes into cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. Hence, efficient and effective methods are needed to ensure the data integrity and confidentiality of outsource data on untrusted cloud servers. Thepreviously proposed protocols fail to provide strong security assurance to the users. In this paper, we propose an efficient and secure protocol to address these issues. Our method allows third party auditor to periodically verify the data integrity stored at CSP without retrieving original data. To compare with existing schemes, our scheme is more secure and efficient.

Design; Construction and Evaluation of Engine Operated Rotary Tiller
Authors:- Tamiru Dibaba, Rabira Wirtu, Wasihun Mitiku, Teklewold Dabi

Abstract- Currently, as Ethiopia is importing most of the agricultural mechanization technologies, including power tillers, there are significant shortages for using powered farm machineries in the country. Thus, this activity was initiated to design and construct an engine operated rotary power tiller locally and test performances. Accordingly, the design of this machine was based on the total specific energy requirements which carried out for an L-shape rotary tiller blade through using mathematical model. This rotary tiller was operated by 10 hp motor engine out of this 2.25 hp of the power was used to dig the soil. The performance of the machine was evaluated in terms of theoretical field capacity, actual field capacity and field efficiency on clay soil. The results indicated that the theoretical field capacity, the actual field capacity and the field efficiency was 0.146 ha/hr., 0.134 ha/hr. and 91.78 % respectively at 1.11 g/cm3 soil bulk density and 30.3 % soil moisture content. The soil mean clod diameter after pass through by rotary was 0.127 mm. But, the designed rotary tiller requires some improvement on operation system as writing on recommendation parts before demonstration.

Robot for Defense & Security with IOT
Authors:- P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N, HOD. Dr. Narasimhamurthy M S

Abstract- This Project is an IR & camera-based security system or robot for protected areas & borders, which senses the Intruders, trespassers and transfer video to other end. The robot to be built is going to have an IR Sensor which senses any intruders / trespassers and will activate the alarm as well as switch on the guns. The robot will also be capable of shooting the intruder when he cross the border, the bullet shall also be equipped with a GPS facility so that incase if the intruder tries to escapes he can be tracked with devices or smart phone. The robot will also activate the Camera, which will start capturing the live video and transmit the same to the receiver end, the smart phone. It will trigger the alarm and the data will be transferred to the mobile device.

Published by:

Google Scholar Journals


Know the Process of Selecting Compatible Google Scholar Journals

Submit Paper Now

Article Processing Charges

Finding the right journal from the Google scholar journal list is not an easy task. Only a genuine and appropriate audience can understand the importance of your research. But many researchers get depressed and finally publish a paper in any journal in lieu to get at least their paper to publish but this is a wrong strategy. Due to their particular act, they lose the impact that their research would lose. IJSRET would like to mention some important parameters that every researcher should check in a journal before he wishes to publish their paper there.

Stay Away from Predators and Advertisements 

These days as the researchers are more and more eager to publish their papers many journals are taking advantage of their condition and taking high charges from them for publishing their work. You have to stay away from them as they would try to contact you or advertise their services on the internet. It is very easy to start a journal and it just needs a domain, a registration and a well-built impressive website to attract the researchers. You should stay away from all such journals and find quality Google Scholar Journals.

Never get confused with Impact Factor of any Journal

Many researchers often get impressed by knowing the impact factor of any journal. By this, they measure the prestige of any journal and wish to publish their paper in such journals. You should also know the fact that the impact of any journal is different for different areas of study. For example, a journal having an excellent impact on electronics research but can have an average or poor impact in the medical domain. So you should check that the journal that you have selected has a high impact factor in that particular area in which your research lies. These were some of the common ways to determine good Google Scholar Journals.

Published by:

Journal of Advanced Scientific Research


A Guide to How to Select the best journal of advanced scientific research

It is a difficult task to select a journal of advanced scientific research after a researcher has completed his laborious work. The process is complex because one has to seek such a journal that matches his domain of work. One should also check the expectation level of the journal before submitting also. IJSRET would like to guide such researchers in selecting a suitable journal-

Submit Paper Now

Article Processing Charges

Tips to Select journal of advanced scientific research

# Make a List of Available journals

It is necessary to develop some knowledge about the journals available as per your requirement or that lies in your research area. You can consult your friends, colleagues, or professor for this or can browse through the internet.

# Know the Journal Impact

The rank of the journal and its readers play an important role in determining the impact of any journal. Submitting your paper in a low-impact journal will degrade the quality of your research and your work will not be visible to the audience that you wished for. Visiting the website of your selected journal will provide you with such information about the journal.

# A Journal Should Match your need

The subject area which the journal covers is also one of the important factors that one should look for. This helps in finding suitable readers who will admire your work. Also, you should check their editorial policies and the practices which the journal follows along with their reviewing process and the time they take for publication. For this, you have to check the instructions that they give to authors and it is present in nearly all the journals on their website.

After you have completely satisfied with any journal of advanced scientific research, you can proceed further with the publication process.

Published by:

Journal of Materials Science


Importance of Journal of Material Science 

Scholars working in the field of material science really work hard, as preparing samples is a tough task. Chemical composition of different materials for specific product requirement is a deep study of science.  We would like to share some of the advantages of choosing this field to make the researchers realize this unique and trending field. As the name suggests it is the study of properties of material and knowing its boundaries in different environmental conditions so that one can profitably use such products in day-to-day application.

Submit Paper Now

Article Processing Charges

Advantages of Choosing Material Science as a Subject

  • It is an interesting area of study and also contains multiple disciplines within it
  • There is a lot of potential in this area as per job and career is concerned
  • Researching in the material science field will lead to better career growth and chances to settle abroad.

Material science is all about knowing the property of the material or creating new material from the current to help in the advancement of science. Industries these days are falling short of researchers of material science and often look for a capable researcher who helps them by providing them with advanced knowledge. There are many sub-branches of material science in which one can proceed with the research. For example materials in electronics where one can proceed to study the behavior of silicon chips, transistors, etc, and manipulate the materials to make their products better. In short, the subject is best in itself and no one can deny this.

 IJSRET is one of the best journals of materials science in which researchers can easily publish their work without any problems as we provide fast and reliable service to our customers.

Published by:

Peer Reviewed Journal List


IJSRET is one of the leading journals in peer reviewed journals list in India. It accepts work from several engineering scholars, researchers, lecturers, and subject experts. Journal provides both free and paid publication process on several subjects such as civil, mechanical, electronics, machine learning, etc. Through the journal, authors can maximize the chance to get their work read by the new audience in the entire world.

Submit Paper Now

Article Processing Charges

Advantages of Publishing in peer reviewed journal:

  • It is a good way to get your work checked by experts so that you will get aware of the validity of your work.
  • It also provides you with feedback reports by which you can learn about the improvement that can be done on the research paper before publication.
  • Sometimes there is a multi-level of peer reviews that give their expert reviews in some of the peer reviewed journals list in India, which is further better to improve the quality of the paper.
  • Majority of researchers voluntary likes to publish their work in such peer reviewed journal to authenticate their work.

Apart from the advantages, there are some disadvantages with such peer-review process such as-

  • It causes a delay in collecting the shreds of evidence related to research to authenticate a paper
  • It is a time-consuming process and causes a delay in the publication of any research paper.
  • It is not 100% effective as several journals have a low standard of the peer review process and they can publish a low-quality paper by mistake.

Many journals often charge more money just for the reason they had a peer review committee.

Published by:

where can I publish my research paper


Research publish journals is a medium to get worldwide access to your paper. Your paper will be reviewed by several experts throughout the world. So if you are thinking of where can I publish my research paper for free here are some of the answers to it. Choosing the right journal is important and gives a huge impact on your work. Choosing a journal that is not relevant to your work will fail all your months and years of hard work. Before publishing your paper it is better to follow these steps

  • Get your paper to cross-check by some colleague, friend, or professor to eliminate the typo, grammatical, spellings, and punctuation errors
  • After this revise your paper again according to the comments made by your reviewers
  • Prepare a manuscript according to the chosen journal’s needs and requirement
  • Now if you feel everything is done submit your paper
  • You have to be patient and never panic after you have submitted your journal and are waiting for approval

Submit Paper Now

Article Processing Charges

where can I publish my research paper?

IJSRET is one of the leading publications Journal and answers the question of where can I publish my research paper in INDIA, they will meet all your requirements. We offer paper publishing services to researchers, scholars, students, etc at a nominal cost. We also solve the queries of our customers as we have 24*7 chat support. Here some of the domain from which we publish the paper-

  • Electronics
  • Computer Science
  • Civil
  • Machine Learning,
  • Nanotechnology
  • Civil
  • Electrical Topics
Published by:

IJSRET Volume 7 Issue 1,Jan-Feb-2021


A Review of Intrusion Detection Systems
Authors:- Subhash Waskle, Associate Prof. Avinash Pal

Abstract:- An intrusion detection system (IDS) is devices or software’s that are used to monitors networks for any unkind activities that bridge the normal functionality of systems hence causing some policy violation. This paper reviews some of the intrusion detection systems and software’s highlighting their main classifications and their performance evaluations and measure.

Tapping into Geothermal Technology to Boost Electricity Supply in Nigeria
Authors:- Alabi A.A., Adeleke B.S. , Adekanmbi, A.O., Fawole T.G.

Abstract:- It is no more news that attention of humanity has shifted to the generation of energy through renewable energy sources. This paper is based on how Nigeria can tap into the use of geothermal technology other than other renewable energy sources to generate electricity using of the two available geothermal resources (hydrothermal and petrothermal) in available locations. Through hydrothermal plants the heat received from geothermal resources are converted to electricity. This is a technology that if efficiently utilized, can go a long way to make Nigeria electricity challenge a thing of the past.

Segregating Spammers from Social Digital Platform by Genetic Algorithm
Authors:- Rahul Kumar, Dr. Avinash Sharma

Abstract:- Presence of online Social digital platform in human life from past few decade influence advertiser to place their product in different style. Some of digital marketing companies plays a giant role for promoting a product, service, thought, etc. to social digital users. Digital platform do not want to lose their control so spammer who work professionally to promote a brand need to identify ad remove from the platform. This paper has work in this field of online social spammer detection by developing a unsupervised algorithm which identify the user class (Spammer or real) as per sequential behavior done. Proposed work utilized a intelligent water drop genetic algorithm for segregating the users into desired class. Some of digital platform inherent features of the user profile were used for finding the fitness class of the user to the corresponding class of user. Experimental work was done on real twitter dataset and comparison of proposed model was done with existing method of spammer detection. Results shows that proposed model has increased the accuracy of spammer detection.

An Evaluation of the Role Played By The Head Of School In The Delivery Of Quality Education In Zimbabwean Day Secondary Schools: A Case Study Of Guruve District
Authors:- Laison Jairus Kavumbura

Abstract:- Quality education is a critical phenomenon for the provision of quality human resources in any country. Quality education focuses on learning which strengthens the capacity of children to act progressively on their own behalf through the acquisition of knowledge in useful skills. Quality in terms of school products implies school graduates who are not just literate or numerate, but graduates who add value to their families, communities as well as nation through the knowledge, skills and morals they acquired from the school system. In Zimbabwe the parents, government and employers place a very high premium on the quality of education that schools provide to their learners. Certain schools are shunned because of their perceived low standards and yet others are sought after by many parents and students due to the quality of learning perceived to obtain in them. Quality therefore is about high standards of achievement by pupils in all spheres. Quality does not come about like manna from heaven. It is brought about in an organisation deliberately through the leadership process. This article draws on a quantitative enquiry on the role played by heads in the delivery of quality education in Zimbabwean Secondary schools. The study adopted the descriptive survey design. The target population included all secondary school teachers in Guruve district which has a teacher population of plus minus 18000 teachers. Random sampling was used to arrive at a sample of 200 respondents who were made up of 120 males and 80 females. All the information was collected through a questionnaire which had both close-ended and open-ended questions. Descriptive statistical analysis was used to interpret the data. The study revealed that heads did not encourage attendance by pupils to all lessons, there was inadequate provision of stationary and learning equipment and that supervision of learning was not adequately done by the heads. The study also reveals that heads were not results focused in their operations. The study recommends that heads of schools should be equipped with skills and knowledge in the field of leadership and management so that they promote quality education in their schools. Heads should also prioritise supervision of instruction and provision of adequate teaching/learning materials.

A Glass Fiber Compressive Strength Prediction Using Artificial Intelligence (ANN)
Authors:- Madhav Shrivastav, Prof. Sourabh Dashore

Abstract:- Concrete, being widely used, is the most important building material in civil engineering. Concrete is a highly complex material, which makes modeling its behavior a very difficult task. Many attempts were taken earlier to develop suitable mathematical models for the prediction of compressive strength and flexural strength of different concretes. Those traditional methods have failed to map non-linear behavior of concrete ingredients. The present study has used artificial neural networks (ANN) to predict the compressive strength and flexural strength of glass powder concrete. The ANN model has been developed and validated in this research using experimental strength data of different mixes. The artificial neural networks (ANN) model is constructed trained and tested (in MATLAB. For study models were developed. Strength was modeled in ANN model as a function of input data collected by the experimental result in laboratory. In this study, an attempt was also made to develop a multiple regression model for predicting strength (in EXCEL) as it is being used largely by researches in prediction. Finally, this model was used to predict the strength of concrete for different different days.

A Review of Glaucoma Detection Techniques
Authors:- Arkaja Saxena, Associate Prof. Avinash Pal

Abstract:- Glaucoma is one of the main causes of blindness today. It is basically a group of eye diseases that leads to the optic nerve damage and arises mostly due to the increases in the Intraocular Pressure (IOP) within the eyes. The early detection as well as diagnosis of this disorder is very important as at the later stages it leads to complete loss of vision.In this paper we reviewed different glaucoma detection procedures by digital image processing of fundus of eye. This paper also proposes a very simple method for the screening of glaucoma.

Concept Maps: Let’s Organize Your Speech
Authors:- Nirumala Rothinam, Hadidah Abdul Rahman

Abstract:- This research was to observe the effectiveness of concept maps in enhancing Matriculation students’ speaking ability in terms of organization and content. The specific objective of this research is to identify if concept maps could be an effective educational tool to improve students’ speaking scores according to the Malaysian University English Test (MUET) speaking scoring guideline. Participants of this research consist of 24 one-year Science program students. Data collections were done through pre-test and post-test. Data were analysed using descriptive analysis. Results of the analysis established that all the 24 participants showed an increase in the speaking scores after the intervention using concept maps. The research indicated that concept mapping is effective in supporting the organization of thoughts and content to produce verbal output thus producing a positive correlation between the use of concept maps and scores for participants’ speaking assessment.

A Review of Recommendation Techniques
Authors:- M. Tech. Scholar Pooja Relan, Asst. Prof. Avinash Pal

Abstract:- On the Internet, the place the number about
Decisions may be overwhelming, there will be necessity will filter, prioritize Also effectively convey important data so as on allay those issue of majority of the data overload, which need made an possibility issue will huge numbers Internet user. Recommenders techniques work out this issue by looking through huge volume for rapidly created majority of the data on furnish user with customize content and services. This paper investigates the separate aspects and potentials for distinctive prediction techniques clinched alongside recommendation techniques in place with serve concerning illustration a compass to Scrutinize and act in the field of recommendation techniques.

Digital Social Platform BOT User Detection Features and Techniques
Authors:- M.Tech. Scholar Kritya Gorowara, Asst. Prof. Jayshree Boaddh, Asst. Prof. Jashwant Samar

Abstract:- Digital platforms in these days has its own place as a tool for getting more social. This attract many publisher to push there content to relevant audience. As time and labor were optimize by computer programs, so this posting of content is done by BOTs which are program. Many of social platform schedule some programs which detect those BOT user and remove from the network. This paper has summarized BOT detection techniques proposed by various researchers as per different social media platforms, users. As per type of social media platform features were also change and various common features were list in the paper for increasing the understanding of BOTs in the network. Some of evaluation parameters were also formulize which help to compare different BOT detection algorithms.

A Survey on Digital Image Retrieval Technique and Visual Features
Authors:- M.Tech. Scholar Astha Singh, Asst. Prof. Jayshree Boaddh, Asst. Prof. Jashwant Samar

Abstract:- Digital platform based services increases content on servers and retrieval of relevant information depends on data matching algorithms. Out of different type of data image plays an crucial role for various document proof, study, analysis, diagnosis. Hence retrieval of relevant image as per requirement is very important. This paper has summarized various image retrieval techniques proposed by authors for reducing the execution time and improving the relevance of the indexed image as per user query. Paper has list image features used by different scholars for finding the visual similarity between images. Content based image retrieval was done by two type of query first was visual and other was text, paper has list all type of retrieval techniques.

Variables Influencing Food Wastage and Rapid Composting Techniques of Food Waste in Malaysia
Authors:- Nurafiqah Izzati Zafriakma, Faeiza Buyong

Abstract:- – Rapid generation of food waste has become a major concern in municipal solid waste management (MSW) in Malaysia that are practically poor and unstructured. Food waste has significant adverse effects on food security, the environment and the economy, making it a significant problem that needs critical response. The current method in disposing of the waste in a landfill negatively impact human being and environmental safety. Food waste is a material produced when food is purchased, prepared and consumed. Based on the previous studies, it was found that there were variables that influence the number of food waste produced from each individual. Meanwhile, the current treatments used to treat food waste is time-consuming and unable to cope with the amount of incoming waste generated daily. Therefore, this study intended to identify the factors that influence the generation of food waste in Malaysia with the aim of analysing methods to reduce the amount of current or future food waste produced by rapid reduction techniques of composting.

Melanoma classification on Dermoscopy images using Transfer learning with CNN architectures
Authors:- Aaron Hill, Robert Collins, Joseph Morgan

Abstract:- Incidence rate of malignant melanoma has increased from the past two decades but the mortality that comes with it has stabilized. Early detection of melanoma was critical in the past as we do not have effective therapies and detection methodologies. State of the art classifiers based on CNNs are proved efficient to classify images of skin cancer more better than dermatologists and has provided more effective lifesavingdiagnosis, as now a days skin cancers can be detected in early stages. In this paper we will talk about classification of skin cancer using convolutional neural networks and transfer learning. We looked out for papers in Google scholar, PubMed, Google Scholar, Research Gate, Web of Science databases for original research papers and review papers. The papers that has sufficient reports with proofs has been taken into consideration.

Speech Recognition
Authors:- Bhuvan Taneja, Jones C J, Rohan Tanwar

Abstract:-Speech is a simple and effort less approach of communication amongst humans, but in this day and age humans are not restricted to connecting to one another but even to the various machines in their lives. The most essential being the computer. So, this communication approach or technique can be used for connecting humans and computers. This inter play is done by interfaces, this area being titled the Human Computer Interaction (HCI). The following paper gives an general outline of the principal meaning of Automatic Speech Recognition (ASR) which consists an essentialarea of artificial intelligence and it ought to be taken into consideration in course of any connected research (Categoryof vocabulary size ,speech, etc.). It also offers synopsis of essential research applicable to speech processing in the pastfew years, along side the overall scheme of our project that should be taken into account as aaddition of data in this field of study and to finish it off by mentioning about certain improvements that as it may be in further works.

The Efficacy of Risk-Assessment Score for Early Screening of Diabetes Mellitus Among Bangladeshi Adults
Authors:- Zaher Ahmed, Dr. Iftekhar Hasan

Abstract:-The chronic metabolic disorder diabetes mellitus (DM) is a fast-growing global problem with huge social, health, and economic consequences. Studies support the utilization of risk-assessment scoring systems in quantifying individual’s risk for developing T2DM. Thus, using a simple risk-assessment scoring system for early screening of T2DM among Bangladeshi adults will be beneficial to identify the high-risk adults and thus taking adequate preventive measures in combating diabetes. The aim of the study is to evaluate the efficacy of a risk-assessment scoring system for early screening among Bangladeshi adults for developing T2DM. A cross-sectional observational study was carried out to evaluate the efficacy of risk-assessment scoring system in the outpatient department (OPD) of Medicine, Barishal Medical College & Hospital, Barishal, Bangladesh from June 2020 to November 2020 among randomly sampled 323 adult Bangladeshi male and female subjects. With written informed consent, the Finnish Diabetes Risk Score (FINDRISC) questionnaire was used to collect the data including demographic characteristics and different risk factors. In this study, both non-modifiable and modifiable risk factors showed statistically significant association with the FINDRISC among Bangladeshi adults(p<0.05). Among 323 subjects, a total of 28.12% had slightly elevated diabetes risk score (DRS). A total of 16.05% had moderate DRS and 8.48% had very high DRS. There was a significant association among FINDRISC with history of previous high blood glucose, and treated hypertensive Bangladeshi adults. This study predicts that 24.53% of the Bangladeshi adults may develop moderate to high risk T2DM within the consecutive 10 years. This study clearly demonstrates that FINDRISC scoring system can work reasonably well as screening tool, detecting undiagnosed T2DM in the general population. People with high risk of DM should be referred for early intervention and changes to a healthy lifestyle and primary prevention to prevent or delay the onset of T2DM.The findings may help the health care professionals to substantiate the possible improvement in glucose metabolism and lifestyle changes, and better convince people at high risk of T2D to take action towards healthier lifestyle habits.

Big Data Security Challenges and Prevention Mechanisms in Business
Authors:- Anusha Dissanayake

Abstract:-Sensitive data analytics have reached gradually a smart area in the business world over the past few years. Various research has emphasized the importance of this field in augmenting the business performance in the industry. Excessive collection of data is making harmful effects on human beings. These data are extremely vulnerable for outsiders thanks to their hidden value. Big data gives us more advantages to make progress in many fields including business. It improves the competitive advantage of companies and to add value for many social and economic sectors. Sensitive data sharing brings new information security and privacy challenges. Earlier technologies and methods are no longer appropriate and lack performance when applied in a big data context. This research focuses on investigating the challenges and providing viable solutions to minimize the risk of the threats of user data.

Assessment of Waste Management Techniques from Palm Oil Producing Industry: A Case Study of Nigerian Institute for Oil Palm Research (Nifor) Benin City
Authors:- Olawepo B. B., Smart Bello, Diamond Blessing, Ajayi A. S., Eriakha E. C.

Abstract:- Oil palm (Elaeisguineensis) is one of the most important economic oil crops in Nigeria. As of early 1900, Nigeria was producing all palm oil sold in the world market. Nigerian Institute for Oil Palm Research (NIFOR) is an International Center of Excellence in Palms and Shea Research and Development. It is a common sight to see decayed and overflowing solid and liquid waste dumps all over most palm oil producing industries. The objective of this study is to assess the technique for waste management in NIFOR. Primary data through interview and secondary data from literatures and periodicals were used. The survey reveals that most wastes generated are converted into useful means. The POME (Palm oil mill effluent) is converted into organic fertilizer through the process of composting, the EFB (Empty fruit bunch) is used for erosion control and for increasing soil water retention capacity, and the PKS (Palm kernel shell) is used as a source of fuel for boilers and sterilizers. It is therefore recommended that the government and management of NIFOR should increase environment awareness programme for all staff to save cost and create less environmental degradation while vigorously involving the people in all facets of environmental management.

Design, Fabrication and Testing of a Cocoa Depodding Machine
Authors:- Smart Bello, Olawepo B. B., Diamond Blessing, Suleiman A. I.

Abstract:- The project involves the design of a cocoa depodding machine, to eliminate drudgery experienced by local farmers using manual method of pod breaking. The basic features of the machine are the frame, feeding trough, shaft, stationary blade, rotating blade, rotating drum, chain, and electric motor. The machine operates on the principle of compressing the pods against the stationary blade to break it and separate the pods from the beans. As the blade rotates, it pushes the pods towards the stationary blade, which cuts the pods and transfers it to the separation chamber. As the drum rotates the beans are separated from the pods through the rotating sieve while the pod goes out through the discharge outlet. The machine is powered by 1hp three phase electric motor. The machine has an efficiency of 36%, a capacity of 500kg/hr. The depodding machine can be used by local farmers in rural areas for small scale cocoa processing.

Martial Arts and Combative Program of the Philippine Military Academy Cadet Corps Armed Forces of the Philippines: An Assessment
Authors:- Jayson L. Vicente

Abstract:- The young men and women of PMA CCAFP are bred to be front liners and last line of defenseduring war and times of peace as such, they must be equipped with the most practical and most effective combat ready Martial Arts and Combative skills to effectively fulfil their duty,as well as to protect and safeguard themselves to continue serving the people and their country. This study shall assess the current Martial Arts and Combative Program of the PMA CCAFP using descriptive methodology by interviews and floating questionnaires. The current Martial Arts and Combative Program of the PMA CCAFP with all of the subjects involved are more sports inclined rather than combat equipped. Picking the best from each subject used in the program, this study seeks to recommend improvements or create a better Martial Arts and Combative Program that will satisfy the objective of producing Martial Arts combatant graduates. A good Martial Arts and Combative Program for PMA is essential to prepare them on what lies ahead which is unforgiving and no rules to pacify threat.

Identification of New Cloud Computing Approach for User Authentication and Protection
Authors:- Research Scholar Nipun Sharma, Prof. Dr. Rohit Kumar Singhal

Abstract:- Cloud computing is the very attractive technology area in the current era due to its cost effective, flexible and portable services. Cloud computing is basically a business model which provides services related to Information Technology on demand over network. It offers on demand network access to the pool of shared resources with minimal management effort and service provider interaction. When the services of Cloud Computing are used, the major issue arises, that is security. To tackle with these kinds of issues, Cloud Provider must have sufficient control to provide security. There are different-different provisions available with service provider to handle such kinds of above security issues. Intruders can affect files stored in the cloud or messages of users by intercepting. There is required to provide security to files or messages by means of encryption techniques.To prevent attacks like chosen plain text attack, chosen cipher text attack, denial of service attack.

Determination of Seat Design Prameters Based on Ergonomics
Authors:- Shubham Kadam, Amit Nagarkar, Siddhesh Sawant, Pratik Khopade, Prof. Dhiraj Kumar K. More

Abstract:- Automotive seat design has been always challenge for engineers because design parameters for automotive seats are complex. Three design objectives comfort, safety, and health need to be satisfied simultaneously and measurement of this objectives are difficult because of such factors as user subjectivity, seat geometry, occupant anthropometry and amount of time spent sitting. This paper describes various methods of comfort analysis of off-road car vehicle seat which is based on different criteria like fit parameters related to anthropometric measurements, feel parameters and support parameters defined with respect to seated posture.

Current Issues and Challenges of Online Learning Approach due to Pandemic Outbreak of Coronavirus (Covid-19)
Authors:- Hosalya DeviA/P Doraisamy

Abstract:- The pandemic outbreak of novel coronavirus (COVID-19) recently since March 2020 has constrained many people in the world to opt for a different lifestyle, a new way of work as well as an alternative way to learn. Before the COVID-19 pandemic, the face-to-face traditional class is the most common and favorable learning approach among the students, teachers, parents, academic institutions, and the Ministry of Education. However, online learning has become a famous and well-known resolution around the world after the movement control order is enforced. The online mode of learning has many issues and challenges. Both students and teachers require more time to adapt to online learning because the majority of them are still trying to explore the new technological innovation and techniques to use in the online learning process. In the future, a mixture of the mode of learning would be one of the selections for the academic institution, especially a higher learning institution.

Production of Bioplastics from Banana Peels
Authors:-Jaikishan Chandarana, P. L.V. N Sai Chandra

Abstract:- Plastic offers a variety of benefits, in a variety of shapes, such as sheets, panels, film, which can all be flexible as the application requires. However, use of too many plastics results in massive harmful effects. It takes longer time to degrade which is estimated about 500 years to degrade and will become toxic after decomposed. The objective of this study is to produce biodegradable plastic from banana peels as a substitute for the conventional plastic and to prove that the starch in the banana peel could be used in the production of the biodegradable plastic. The strength of the film was determined using the elongation test by comparing the biodegradable film with a control film and a synthetic plastic. In the soil burial degradation test, the intensity of degradation was tested for all three types of film and the biodegradable film degraded at a rapid rate compared to control film while the synthetic plastic did not degrade at all. Based on all the testing that was carried out, the biodegradable film from banana peel is the best and ideal overall compared to the control and synthetic plastic. The tensile strength for sample keeps increasing when the residence times are increased from 5 minutes to 15 minutes and reaches a maximum at 15minutes and then starts decreasing when the time is increased to 20 minutes. This suggests that the optimum hydrolysis time is 15 minutes for this sample set Bioplastic film can sustain the weight near about 2 kg and which have enough tensile strength. The bioplastic prepared from banana peels that can be used as packaging material or as a carrying bag. Glycerol is added as plasticizer that increases its flexibility.

A Genetic Algorithm Approach for the Solution of Economic Load Dispatch Problem
Authors:- M.Tech. Scholar Siddhartha Tiwari, Prof. Dr. Dwarka Prasad

Abstract:- In this paper, comparative study of two approaches, Genetic Algorithm (GA) and Lambda Iteration method (LIM) have been used to provide the solution of the economic load dispatch (ELD) problem. The ELD problem is defined as to minimize the total operating cost of a power system while meeting the total load plus transmission losses within generation limits. The application of Genetic algorithm (GA) is to solve the economic load dispatch problem of the power system. The effectiveness of the proposed algorithm has been demonstrated on two different test systems considering the transmission losses. GA and LIM have been used individually for solving two cases, first is three generator test system and second is ten generator test system. The results are compared which reveals that GA can provide more accurate results with fast convergence characteristics and is superior to LIM.

Expansion in Kernel PCA Approach for Face Recognition
Authors:-Asst. Prof. Ritu Nagila, Asst. Prof. Ashish Nagila

Abstract:- Principle component analysis (PCA) technique is most populating technique of statistics in field of face recognition. Today, numerous extension of PCA is exiting like improved PCA, Fuzzy PCA, Incremental PCA, and Kernel PCA. Kernel PCA (KPCA) is most popular techniques in face recognition in non liner categories. Till date not desirable extensions are accessible. This paper is proposed a novel approach of KPCA. Experiments have been done on ORL database. Proposed method obtained highest recognition rate as 98.6%.

A Review on Lossless Data Compression Techniques
Authors:- Rahul Barman, Sharvari Deshpande, Prof. Dr. Nilima Kulkarni, Shruti Agarwal, Sayali Badade

Abstract:- Data is being generated at an exponential rate in every sector of the world. This much amount of data can prove to be very costly in terms of data storage, transfer speed and infrastructure. Due to this many industries have shifted their focus on cloud-based storage technology. Lossless data compression is one of the important approaches to solve the problem of excessive storage consumption, maintaining data integrity, transfer efficiency and achieving higher streaming speed. Lossless data compression refers to the process of modifying and converting the bit structure of data such that it consumes less storage space and provides near loss of original data. There exists different algorithms and techniques for performing the compression on different types of data formats. This paper identifies different lossless data compression techniques in existence and a conclusion is drawn based on these identified methods. Comparative analysis has been made of different algorithms used in various referenced papers. It describes the future scope and application of compression algorithms in several fields.

Experimental Study on Strength and Durability of Concrete By Partial Replacement of Cement, Fine And Coarse Aggregate using Corn Cob Ash, C&D Waste Recycled Sand and Bethamcherla Stone with Addition of Steel Fibers
Authors:- M.Tech.Scholar Badiga Siva Bhavyank, Asst. Prof. K V Madhav

Abstract:- Main objective of this project is to reduce the usage of cement, fine aggregate and coarse aggregate and improve the strength of concrete by using steel fibers. In this study we will investigate on the strength characteristics and durability properties of concrete with CORN COB ASH (CCA), CONSTRUCTION & DEMOLISION (C&D) WASTE RECYCLED SAND and BHETAMCHERLA STONE (BS) and addition of STEEL FIBERS. Replacement of CCA, C&D Sand and BS are about 0%, 5%, 10%, 15% and 20% respectively by weight of Cement, Fine Aggregate and Coarse Aggregate. The obtained optimum % of CCA, C&D Sand and BS are investigated. Then with that optimum % of CCA, C&D Sand and BS obtained are used to produce concrete.. Then the steel fibers will be added to the optimum % of CCA, C&D Sand and BS concrete and to conventional concrete in the % of 0%, 1%, 1.5%, and 2% by the weight of cement. Mechanical properties at 7,14,28 days will be investigated. Then investigations will be carried out for Percentage loss in compressive, split tensile and flexural strengths, Percentage loss of weights by considering the Durability tests such as acid attack test and alkaline attack test at the age of 28 and 90 days. The grade of concrete is M25.

A Review Study on Theoretical Investigation of Hydrogen Production Methods
Authors:- Pramod Panta, Mohit Pandita, Nitin Kumar, Sudhir Singh

Abstract:- This paper present the sustainable, green and zero-carbon emission method of hydrogen production. Depending upon the source of energy used to generate the hydrogen the methods are classified like solar energy, thermal energy, photo-electric. The different process to generate the hydrogen are analyzed and compared in it which give the brief and important description of green and zero-carbon emission method.

Realizing the Benefits of RPA in the Legal Field
Authors:- Shital Gopal Shetkar

Abstract:-Robotic Process Automation (RPA) is finding many valuable uses in the legal field. Legal work is often repetitive and document-intensive, which makes it suited to RPA. Automation enables law firms and legal departments to speed up routine processes, saving time and reducing errors. As a result, attorneys and other staff members can focus on more critical tasks. RPA also helps with compliance. This paper examines how legal organizations are realizing the benefits of RPA, based on reviews of Ui Path by members of IT Central Station.

Sentiment Analysis of Twitter Data by Making use of Machine Learning Algorithm
Authors:- ME Scholar Kratika Patidar, HOD. Kamlesh Patidar

Abstract:- Individuals utilize online media for amusement, bringing data, news, business, correspondence and some more. Not many such online media applications are Facebook, Twitter,WhatsApp, Snapchat, etc. Twitter is one among the miniature publishing content to a blog site. We are utilizing Twitter predominantly because it has acquired a great deal of media consideration. The content composed is alluded to tweets, where an average person can tweet or compose their hearts out. We would be bringing immediate reactions from the general population also. Thus, the information is all the more ongoing. The initial step is to get the tweets on a specific plan utilizing python language code, followed by the cleaning cycle; at that point comes the making of the sack of words. Later these packs of terms are given as a contribution to the calculations. Finally, after preparing the estimates, we will be getting the sentiment of general society on that system.

Pectin Extraction from Orange Peels by Using Organic Clay
Authors:- Dr. Supriya Pratap Babar

Abstract:- The present work addressed to the development of the method which is the part of the process needed for the extraction of biopolymer like pectin from the orange peel, which is the waste of orange juice processing industry. Pectin is used by pharmaceutical industry, food industry and also widely used in cosmetics, herbal medicines, manufacturing of soaps. In this method we have used the organic clay as mineral acid instead of strong concentrated acid. These results demonstrated, that the pectin yield was affected by pH. At the low pH for red clay (4.3) maximum yield (4%) of pectin was obtained.

Customer Churn Prediction in Telecommunication
Authors:- Pooja Mahanth Bhagat

Abstract:- Procurement and the maintenance of customers/clients are the top most concerns in the present business world. The quick increment of market in each business is prompting higher endorser base. Therefore, organizations have understood the significance of holding the close by clients. It has gotten compulsory for the specialist co-ops to diminish beat rate on the grounds that the carelessness could be come about as productivity decrease in significant viewpoint. Agitate expectation helps in recognizing those clients who are probably going to leave an organization. Media transmission is adapting to the issue of truly expanding agitate rate. Data mining procedures empower these media transmission organizations to be furnished with viable strategies for lessening stir rate. The paper audits 61 diary articles to study the upsides and downsides of prestigious Data mining procedures used to assemble prescient client beat models in the field of media transmission and in this manner giving a guide to scientists to information amassing about Data mining strategies in telecom.

A Review of an Extensive Survey on Audio Steganography Based on LSB Method
Authors:-Hariom Dudhwal, Asst. Prof. Jayshree Boaddh, Asst.Prof. Jashwant Samar

Abstract:- There is issues and challenges regarding the security of information in transit from senders to receivers. The major issue is the protection of digital data against any form of intrusion, penetration, and theft. The major challenge is developing a solution to protect information and ensure their security during transmission. In audio steganography, the cover is an audio and the secret information can be a text file, an image, or an audio. In this work, some audio steganography techniques are explored taking cover audio in WAV and MP3 format. WAV files produce integer samples and MP3 files give floating point numbers as samples. The secret information considered is the text file, the image, and the audio. The embedding and extracting algorithms of the different audio steganography techniques are discussed in this examination. This work presents a survey of literature on MP3 Steganography Based on Modified LSB Method.

A Review Study on Neuro Evolution
Authors:- Reeba Mehmood Khan

Abstract:- With the steady improvement in the field of artificial intelligence and information technology, the part of evolutionary algorithms is likewise booming. There is a need to raise these ideas in-order to broaden the sky-lines amongst newbies. Neuro Evolution is an integral part of artificial intelligence and machine learning wherein it centers around evolutionary algorithms in order to create artificial neural networks. This is a procedure that utilizes the entire parcel of biology and assists with developing and constructing artificial intelligence-based evolutionary algorithms. It is a branch which takes motivation from the evolution of the biological nervous system and attempts to incorporate it with the innovation ace “artificial intelligence”. This paper focuses on the fundamental understanding of what neuro evolution is and what is it doing here, how can it work and get implemented, how are neuro evolution and artificial intelligence working inseparably and furthermore it attempts to raise the algorithmic working alongside the significant applications that neuro evolution presents.

Study on Quality of School Life of Working Students
Authors:- Manit B. Dapadap, Jhon Edcel Calites

Abstract:- This study aims to contribute to developing knowledge and understanding of the phenomenon of school life quality for working students by taking the students’ perspective on what they perceive as positive or/and negative about their school life. The study was conducted among working students at Tacloban National Agricultural School. A semi-structured interview guide was used to get information about students’ experiences as working students. The main study is qualitative, using a phenomenological approach. Five students from junior and senior high were selected for in-depth interviews. Parents of the students, as well as the advisers, were interviewed for triangulation. The collected data were analyzed according to the phenomenological thematic analysis. Findings revealed that students are involved in many activities, and most of them work to assist their families and finance their education. How work influences, their education seems to depend on their perception of their work, whether they like it or not, and to what extent it is an obligation. One strategy to lift the quality of the school life of working students is to listen to the students’ voice. The study emphasizes the teacher as the leading resource contributing to the quality of school life for the students. Positive communication must be encouraged between students and teachers to raise awareness of the conditions of working students. To secure the quality of the school life of the working students, the school should come up with strategies that offer education within special needs, particularly in the delivery and assessment of competencies. Further, a strong partnership between the school and the community should be established to increase understanding of the working students’ condition and contribute to improved quality of school life.

A Survey of Real Time Deep Learning Based Object Detection
Authors:- Ahmad Ismail

Abstract:- The importance of artificial intelligence manifests in all of our life’s aspects, robotics, self-driving, surveillance, agriculture, transportation, medicine, space, and military. Deep learning is the paramount core for AI applications; especially object detection, localization, and tracking. The convolutional neural networks make momentum regarding the aforementioned topics. The architecture in this field varied from the fine-grained to the real-time models. Meanwhile, the fine grained models produce the maximum possible accuracy; it consumes time on the other side, real-time models are featured with speed, but it provides less accuracy.In this paper, we will review start-of-the-art models being used for near real-time object detection and tracking, then introduce our approach; an accurate real-time object detector and tracker.

A Review Article of Image Fusion Technique Using Wavelet Transform
Authors:- P.G. Scholar Pushpa Yadav, Asst. Prof. Hemant Amhia

Abstract:- In this thesis various methods for lossless Image fusion of source image data are analyzed and Discussed. The main focus in this work is lossless Image fusion algorithms based on context modeling using tree structure. The central aspect in context modeling is different context templates, which are based on discrete Cosine transform coefficients, local gradients and intensity of samples in the image. This work includes research on how to use DDCT context tree structure, prediction modeling and probability assignment in lossless image fusion based on context modeling technique. The main advantage over current methods is increasing effectiveness of image fusion and developing new lossless Image fusion methods based on context modeling for different type grayscale images: medical, astronomical, noisy natural images.Due to the increasing requirements for transmission of images in computer, mobile environments, the research in the field of image fusion has increased significantly. Image fusion plays a crucial role in digital image processing, it is also very important for efficient transmission and storage of images. When we compute the number of bits per image resulting from typical sampling rates and quantization methods, we find that Image fusion is needed. Therefore development of efficient techniques for image fusion has become necessary .This paper is a survey for lossy image fusion using Discrete Cosine Transform, it covers JPEG all format of image fusion algorithm which is used for full-color still image applications and describes all the components of it.

Diabetes Prediction Technique Using Ensemble Classification
Authors:- Research Scholar Akanksha Mishra, Dr. Prof. Rohit Kumar Singhal

Abstract:- Data Mining can be defined as a technology using which valuable knowledge can be fetched out from the massive volume of data. The big patterns can be explored and analyzed using statistical and Artificial Intelligence in big databases. Many researchers are implementing data mining techniques in the field of bioinformatics. Bioinformatics can be defined as a science of storing, fetching, arranging, interpreting and using information obtained from biological series and molecules. Prediction can be defined as a statement about future event on the basis of present situation. This work focusses on diabetic prediction with machine learning algorithms. The diabetic prediction has various steps. A voting-based classifier is devised in this research to predict diabetes. The performance for the diabetic prediction is optimized up to 2 percent using proposed algorithm.

Modeling and Simulation of Inverter Based Photovoltaic Power Generation System for Various Applications
Authors:- Aasha Rahangdale, Santosh Kumar

Abstract:- The use of new efficient photovoltaic solar cells (PVSCs) has emerged as an alternative measure of renewable power. Owing to their initial high costs, PVSCs have not yet been a fully attractive alternative for electricity users who are able to buy cheaper electrical energy from the utility grid. A photovoltaic array (PVA) simulation model is developed in Mat lab-Simulink GUI environment. The model is developed using basic circuit equation of the photovoltaic (PV) solar cells including the effects of solar irradiation and temperature changes. The new model was tested using a directly coupled ac load via an inverter. Test and validation studies with proper load matching circuits are simulated and result are presented. The Total harmonic distortion in output voltage with filter is 2.16 % which is under the IEEE standard.

A Review on Energy Efficiency of Microgrid Implementation with Solar Photovoltaic Power Plants
Authors:- M.Tech. Scholar Deepak Kumar Dhote , Dr. Samina Elyas Mubeen (HOD)

Abstract:- The aim of the article is to study of the operating modes basis of distributed solar power plants, power consuming storage and power filtering devices using simulation tools. and energy efficiency assessment of local microgrid on the change of the concept of developing modern power engineering is conditioned by growing interest in renewable energy sources The most rapid pace of the development among low-power distributed renewable energy sources is presented by private solar power plants, which operate both autonomously, and can be integrated into the industrial network which is designed to solve two key tasks – performing the function of the backup power supply in the autonomous operating modes of the system and the alignment of the load profile, that is, the elimination of daily peaks and failures in power consumption. To meet the demand of the next generation power system, renewable energy resources can be the fuel of choice because it is easily available, free of cost, environment-friendly, and the renewable energy-based generation is cost effective in all manners. There are several types of renewable energy resources such as solar, wind, geothermal, tides, and biomass. In this paper, the concentration is limited to the solar energy resources, solar plants, and storage system to provide required power support.

A Vehicles for Open-Pit Mining with Smart Scheduling System for Transportation Based on 5G
Authors:- Atianashie Miracle Atianashie., Michael Opoku

Abstract:- 5G connectivity, big data, and artificial intelligence, open-pit intelligent transport systems based on autonomous cars have become a trend in the construction of smart mines with the advancement of IoT technology. Traditional open-pit mining systems, which often cause vehicle delays and congestion, are controlled by human authority. In an open-pit mine, several sensors are used to operate unmanned cars. We enhance vehicle tracks and, using big sensor data, build an efficient, intelligent transport system. Based on large amounts of data, such as vehicle information, vehicle GPS data, production plan data, etc., a multi-object, intelligent scheduling model of open-pit mine unmanned vehicles were developed to reduce transportation costs, total unmanned vehicle time, and the rate of content fluctuation. The current output of the open-floor mine is reliable. The next thing we use to solve our planning problem is artificial intelligence algorithms. To improve the convergence, distribution, and diversity of the classic, rapidly non-dominated genetic trial algorithm, to solve limited high-dimensional multiobjective problems, we propose a decomposition-based restricted genetic algorithm for dominance (DBCDP-NSGA-II).

Energy Efficiency of Microgrid Implementation with Solar Photovoltaic Power Plants
Authors:-M.Tech. Scholar Deepak Kumar Dhote , Dr. Samina Elyas Mubeen (HOD)

Abstract:- The utilization of solar energy as a solar power plant can be a potential power plant to be developed. One of the problems in the solar power plant system is the power instability generated by the solar panels because it relies heavily on irradiance and relatively low energy conversion efficiency. To solve this problem, the Maximum control of Power Point Tracking (MPPT) is required by the Perturb and Observe (P&O) methods. This P&O MPPT control makes solar PV operate at the MPP point so that the solar PV output power is maximized. However, the MPPT P&O control that works at the MPP point makes the output voltage to the load is also maximum that causes overvoltage. The MPPT mode works when the solar PV output power is smaller than the reference power to maximize solar PV output power The aim of the work to design the distributed solar power plants, power consuming storage and power filtering devices using simulation tools. and energy efficiency assessment of local micro grid on the change of the concept of developing modern power engineering is conditioned by growing interest in renewable energy sources The most rapid pace of the development among low power distributed renewable energy sources is presented by private solar power plants, which operate both autonomously, and can be integrated into the industrial network which is designed to solve performing the function of the backup power supply in the autonomous operating modes of the system and the alignment of the load profile, that is, the elimination of daily peaks and failures in power consumption. The implementation of these functions, combined with the installation of power active filters will minimize losses in the line and elements of ESS and it will be perform on MATLAB simulation.

A Comprehensive Overview of WLAN Security Attacks
Authors:-Yeshwanth Valaboju

Abstract:- Wireless communication has broken the constraint individuals utilized to have also in addition to wired innovation. The right to gain access to provider network without being bound, versatility while accessing the Internet, boosted consistency, as well as adaptability, are an amount of the variables steering the wireless LAN modern-day technology. Different other variables that contribute to the impressive development of Wireless Area Networks(WLANs) are lessened setup time, enduring cost discount rates, and likewise instalment in difficult-to-wire areas. Wireless LANs level of popularity has performed the growth as a result of the fostering of the IEEE 802.11 b spec in 1999. Over the last couple of years, wireless LANs are widely set up in a location like company, federal authorities bodies, health care centres, colleges and also building atmosphere.

Risk Analysis of Putting Attacks into Perspective and Conducting a Vulnerability Assessment
Authors:- Bhagya Rekha Kalukurthi

Abstract:-In various other to prevent unauthorized use risk set up via vulnerable wireless accessibility areas, Wired Matching Personal privacy – a low-level files shield of encryption physical body– was developed for wireless security purposes. WEP protocol protects link-level information throughout wireless transmission in between consumers along with access to aspects. It carries out indeed certainly not give end-to-end security, nevertheless merely for the wireless area of the link. Wireless security is an authentic barrier for network managers and also particulars security managers similar. Unlike the wired Ethernet LANs, 802.11-based wireless LANs broadcast radio-frequency (RF) records for the customer terminals to pay attention to. As a result, anybody along with the right resources can quickly take hold of and also move wireless signs if he is in fact within a selection.

VLSI Architecture for 8-bit Reversible Arithmetic Logic Unit based on Programmable Gate
Authors:- M.Tech.Scholar Sameer Suman, Dr. Anshuj Jain(HOD)

Abstract:- Reversible computing spans computational models that are both forward and backward deterministic. These models have applications in program inversion and bidirectional computing, and are also interesting as a study of theoretical properties. A reversible computation does, thus, not have to use energy, though this is impossible to avoid in practice, due to the way computers are build. It is, however, not always obvious how to implement reversible computing systems. The restriction to avoid information loss imposes new design criteria that need to be incorporated into the design; criteria that do not follow directly from conventional models.In this paper, investigate garbage-free reversible central processing unit computing systems to physical gate-level implementation. Arithmetic operations are a basis for many computing systems, so a proposed the design of adder, sub tractor, multiplexer, encoder and work towards a reversible circuit for general circuit are important new circuits. In all design implemented Xilinx software and simulated VHDL text bench.

Artificial Hand using Embedded System Involve Arm Processor and Sensors
Authors:- Nishanth B

Abstract:- In this work, Many of the people misfortune their hand, for example, mishap, the aid of the amputee, and incapacitated people their life. The artificial hand is low weight and simple compact smaller confined and includes a connection force framework. Artificial hands, which consolidate mechanical plan and established framework multi-modular sensor framework are blanketed detecting everyday and sheer strength. A human hand shape and the capacity of having a take care of utilizing getting a cope with on and grasping items. The artificial hand is a fabricated acrylic cloth that has produced the usage of aluminum and iron respectively. The microcontroller is generally essential in synthetic palms.EMG sensor is interfaced with the top appendage receive the signal from people The palm stayed void and gives sufficient space to a miniature siphon. Due to oneself adjusting highlights of the hand’s several items can be gotten a manage close by. This empowers the improvement of a less weight prosthetic hand with high usefulness Embedded system is a mixture of hardware using a microprocessor and an appropriate software program in conjunction with additional mechanical or different digital components designed to perform a selected assignment. Embedded gadget locations a vital role in this prosthetic hand additionally called an artificial hand Microcontroller and microprocessor places an important role in all types of control applications in prosthetic hand we are using an adhesive substance to deal with light-weight materials It supports weight up to 4kg.

Criminal Activities Predictive Analysis Using Data Mining Techniques
Authors:- Meenu Rai, Bhawana Pillai

Abstract:- Data mining is the extraction of knowledge from large databases. One of the popular data mining techniques is Classification in which different objects are classified into different classes depending on the common properties among them. Machine learning are widely used in Classification. This paper proposes a data mining technique which applies an enhanced existing machine learning Algorithm to detect the suspicious criminal activities. An improved decision tree Algorithm with enhanced feature selection method and attribute- importance factor is applied to generate a better and faster Decision Tree. The objective is to detect the suspicious criminal activities and minimize them. This paper aims at highlighting the importance of data mining technology to design proactive application to detect the suspicious criminal activities.

A Review on Fiber Reinforced Concrete Using Glass Fiber Reinforced Concrete (GFRC)
Authors:- Abdul Rasheed, Asst. Prof. Anuj Verma, Asst. Prof. Mohd Rashid

Abstract:- Plain concrete possess very low tensile strength, limited ductility and little resistance to cracking. Internal micro cracks are inherently present in concrete and its poor tensile strength is due to propagation of such micro cracks. Fibers when added in certain percentage in the concrete improve the strain properties well as crack resistance, ductility, as flexure strength and toughness. Mainly the studies and research in fiber reinforced concrete has been devoted to steel fibers. In recent times, glass fibers have also become available, which are free from corrosion problem associated with steel fibers. The present paper outlines the experimental investigation conducts on the use of glass fibers with structural concrete. CEM-FILL anti crack, high dispersion, alkali resistance glass fiber of diameter 14 micron, having an aspect ratio 857 was employed in percentages , varying from 0.33 to1 percentage by weight in concrete and the properties of this FRC (fiber reinforced concrete) like compressive strength, flexure strength, toughness, modulus of elasticity were studied.

Foot over Bridge Random Vibrational Analysis for Diffrent Slab Material
Authors:- PG Student J. P. Pawar, Prof. R. S. Patil, Dr. G. R. Gandhe (H.O.D)

Abstract:- Damping performs essential function in format of vibrational resistant structures, which lower the changeof the shape when they are subjected to lateral loads or vibrational load. In the existing study the deck of bridge is check for various materials like MS steel plate, RCC slab, and aluminum and MS plate composite deck. The important challenge of a structure is to endure the vibrationalloads on deck slab. In order to reduce structuralvibration has been used. The bridge is modeled in ANSYS 2019 and modeled with different material of deck. After the study results show foot over bridge having 100 mm thick slab shows better result than having composite sheet or having MS sheet as deck slab.

A Comparative Analysis of Optimization Techniques
Authors:- M. Tech.Scholar Palac Gupta

Abstract:- Regression testing is an important process during software development. For the purpose of reducing the number of test cases and detecting faults of programs early, this paper proposed to combine test case selection with test case prioritization. Regression testing process has been designed and optimization of testing scheme has been implemented. The criterion of test case selection is modify impact of programs, finding programs which are impacted by program modification according to modify information of programs and dependencies between programs. Test cases would be selected during test case selection. The criterion of test case prioritization is coverage ability and troubleshooting capabilities of test case. There are various optimization techniques available. This review explains about the different optimization techniques on the basis of their evolution, methodology, performance and applications.

Literature Review on Pharmaceutical Industry in India Comparison of Post Reform and Pre Reform Period and Policy
Authors:- Ph.D. Scholar Vinod Kumar Gupta, Professor Dr. Rajesh Gupta

Abstract:- The extant literature dealing with the impact of TRIPS agreement on Indian pharmaceutical industry takes the whole country as a unit of analysis, but the present study is unique in the sense that it takes into account the regional aspects of Indian pharmaceutical industry, based on various reports and unit-level data of Annual Survey of Industries since 1991 to 2011. In the year 2005, Indian pharmaceutical industry came under the obligation of Trade-Related Aspects of Intellectual Property Rights (TRIPS); Simultaneously, Indian pharmaceutical firms were also required to comply with Good Manufacturing Practices of World Health Organisation (WHO-GMP). The descriptive evidences depicted that with the introduction of TRIPS and WHO-GMP number of firms and man-days employed declined across the states during the introductory period of TRIPS; whereas net value added and gross capital formation remained constant for the same period. But in the post-TRIPS period most of the states reported greater performance, especially in terms of net value added and gross capital formation.

Review on Management of Hospital Waste in an Efficient Manner
Authors:- Ph.D. Scholar Vijay Kumar Bhardwaj, Professor Dr. Sandeep Kumar

Abstract:- This is a review paper which is prepared from the surveys of hospitals and research studies. Hospital waste management in the world is a strict discipline and does occupy a serious place in the management of health care sector. The management of hospital remaining requires its removal and disposal from the health care establishments as hygienically and economically as possible by methods that all stages minimizes the risk to public health and to environment. Health care waste can be dangerous, if not done properly. Poor management of healthcare waste exposes health labors, waste handlers, and the community to the toxic effects of wastes generated from health activity. The disposal of these wastes could also lead to environmental problems. This article intends to describe various health care wastes and its controlling, as creating good practices for proper handling and disposal of health care waste is an important part of the health care delivery system. The aim of this paper is to highlight the present condition of medical waste and a review on scientific method of hospital waste management. Biomedical waste is identified under many terminologies like hospital waste, healthcare waste etc., which are generated due to long or short term care of persons. Various health care establishments are the minor and major source of these types of wastes. Biomedical waste may be primarily classified as Hazardous and Non Hazardous wastes. Further, the biomedical waste is categorized by WHO and also under The Biomedical Waste (Management & Handling) Rules, 1998, India. According to previous studies the quantum of waste generated in a health care establishment depends on the Income of the country, type of Hospital, Region etc. Biomedical wastes are highly infectious and can be a potential source for transmission of diseases if not properly managed. Hence, a proper management procedure has to be adopted to safely dispose the wastes to safe guard the public health and Environment and a stringent regulation have to be imposed on the health care establishments before and after it is approved for execution. Further, the hospital staffs are at high risk of being infected by these biomedical wastes, therefore, the occupational health and safety can be recommended to be a component of biomedical management plans with qualified personnel in Hospitals.

A Project Report on Risk Return Portfolio Analysis with Reference to Securities Market
Authors:- Shaik Asif Basha, Asst.Prof. Dr. C. Mallesha

Abstract:- Successful investment requires a careful assessment of the investment’s potential returns and its risk of loss. A firm’s risk and expected returns directly affect its share price. In real-world situations, the risk of any single investment would not be viewed independently of other assets. New investment must be considered in light of their impact on the risk and return of the portfolio of assets. In traditional financial analysis, investment management tools allow investors to evaluate the return and risk of individual investments and portfolios. Usually, higher the risk, higher the returns and lower the risk, lower the returns. However, a general understanding of this phenomenon is not sufficient to make appropriate decisions relating to investments. A more quantifiable analysis is required to understand the investment.Thus the following study discusses the analysis of portfolio risk and returns.

Energy Saving System
Authors:- Shivpujan Yadav, Mrs. Rupali Shekokar

Abstract:- In todays the basic problems in any country is wastage of electricity. If we change our behavior and try to avoid the wastage of electricity then we can save more electricity. By saving electricity we can earn money by selling those electricity to our surrounding countries. And by efficient way of using electricity we can bring down the cost of our electricity bill. In this paper, I have design a system which is saving energy. I have design this system for schools, colleges etc. Only authorized person can enter into the classroom. There are two options present for students and teachers to use lights and fans in the classroom. First one is manually by switch and second one is automatically by detecting the position of person in the room lights and fans will be on.. When there is nobody present inside the classroom then automatically all electrical appliances will be off.

Awareness and Practice of Biomedical Waste Management
Authors:- Ph.D. Scholar Vijay Kumar Bhardwaj, Prof. Dr. Sandeep Kumar

Abstract:- Healthcare is an important area of human care. The very process of modern healthcare is also ridden with risk and unhealthy practices. One of this is Bio Medical Waste generation in treatment of human beings; apart from other species. This Bio Medical Waste generation warrants proper Bio Medical Waste management. Bio Medical Waste is defined as waste that is generated during the diagnosis, treatment or immunization of human beings and is contaminated with patients body fluids such as syringes, needles, dressings, disposables, plastics and microbiological wastes. Proper disposal of hospital waste is of paramount importance because of its infectious and hazardous characteristics. Therefore the Government of India promulgated the Bio Medical Waste Rules in 1998 and it became mandatory for all the hospitals to follow the above rules and the standards laid down under the statutory regulations. Healthcare is vital and hospitals are considered to be healers and protectors of health and wellbeing. But the waste generated from treatment and diagnosis can be hazardous, toxic and even lethal because of their high potential for disease transmission. The present study consists of BMW management practices like Segregation, Treatment and Disposal, Waste Handling Safety Measures and Waste Administration that are followed in healthcare facilities. It focuses on the waste management practices of the respondent healthcare facilities on the basis of type of hospital, bed capacity, bed occupancy, amount of waste generation and number of waste handling workers. Besides, the study extends to see the impact of demographical factors on waste management practices. From the related questions regarding `segregation practices`, ‘treatment and disposal practices, ‘waste handling safety measures’ and ‘waste administration’ scores were calculated. Further, based on quartiles, scores are categorized into 3 components viz., Low, Moderate, High for assessing the respondent HCFs view on the waste management practices in the HCFs. The data collected for this study was processed by using SPSS Version 19.0. Descriptive statistical tools like percentages, means and standard deviation and analytical tools like Chi-square, t-test, one way ANOVA, Correlation and Regression are used to test the significant association and impact between characteristics of HCFs and Waste Management Practices.

Awareness and Practice of Biomedical Waste Management
Authors:- Ph.D. Scholar Vijay Kumar Bhardwaj, Prof. Dr. Sandeep Kumar

Abstract:- Healthcare is an important area of human care. The very process of modern healthcare is also ridden with risk and unhealthy practices. One of this is Bio Medical Waste generation in treatment of human beings; apart from other species. This Bio Medical Waste generation warrants proper Bio Medical Waste management. Bio Medical Waste is defined as waste that is generated during the diagnosis, treatment or immunization of human beings and is contaminated with patients body fluids such as syringes, needles, dressings, disposables, plastics and microbiological wastes. Proper disposal of hospital waste is of paramount importance because of its infectious and hazardous characteristics. Therefore the Government of India promulgated the Bio Medical Waste Rules in 1998 and it became mandatory for all the hospitals to follow the above rules and the standards laid down under the statutory regulations. Healthcare is vital and hospitals are considered to be healers and protectors of health and wellbeing. But the waste generated from treatment and diagnosis can be hazardous, toxic and even lethal because of their high potential for disease transmission. The present study consists of BMW management practices like Segregation, Treatment and Disposal, Waste Handling Safety Measures and Waste Administration that are followed in healthcare facilities. It focuses on the waste management practices of the respondent healthcare facilities on the basis of type of hospital, bed capacity, bed occupancy, amount of waste generation and number of waste handling workers. Besides, the study extends to see the impact of demographical factors on waste management practices. From the related questions regarding `segregation practices`, ‘treatment and disposal practices, ‘waste handling safety measures’ and ‘waste administration’ scores were calculated. Further, based on quartiles, scores are categorized into 3 components viz., Low, Moderate, High for assessing the respondent HCFs view on the waste management practices in the HCFs. The data collected for this study was processed by using SPSS Version 19.0. Descriptive statistical tools like percentages, means and standard deviation and analytical tools like Chi-square, t-test, one way ANOVA, Correlation and Regression are used to test the significant association and impact between characteristics of HCFs and Waste Management Practices.

Indian Pharmaceutical Industry, Strategies and Challenges in India, Comparison of Post Reform and Pre-Reform Period
Authors:- Ph.D. Scholar Vinod Kumar Gupta, Professor Dr. Rajesh Gupta

Abstract:- The pharmaceutical manufacturing, especially in countries like India, is in addition to playing an important economic and social role directly related to many health related issues. It is a science-based industry, a symbol of development of science, technology or information, provides service chance for different population levels and has supply significantly to the overall growth of the Indian industryThe principle of this study is to examine presentation and future trends of the Indian pharmaceutical industry in the period before and after the reform. By analyzing data from the pharmaceutical industry, you can understand market trends, the new and emerging companies in the industry and the industry’s expenses and profitability. The analysis of such data provides guidance for monitoring market environment, which in turn can help future investment decisions. In addition, it also helps to track different developments related to certain diseases (such as cardiovascular, anti allergic, etc.).In addition, psychiatry also highlights the legal aspects (patent law) or rations related to the commerce. The study also suggests discussing a specific area within the pharmaceutical industry, the therapeutic area. Therefore, the proposed research includes recognized pharmaceutical manufacturing activities currently in use, including the API industry, formulations, and important therapeutic areas. The researchers outlined the Indian pharmaceutical industry and its evolution from almost non-existent to one of the global generic drug suppliers.

Movie Recommendation using Clustring Technique
Authors:- M. Tech Scholar Pooja Relan, Asst. Prof. Avinash Pal (HOD)

Abstract:- Recommendation system uses different types of algorithms to make any type of recommendations to user.Collaborative filtering recommendation algorithm is most popular algorithm, which uses the similar types of user with similar likings, but somewhere it is not that much efficient while working on big data. As the size of dataset becomes larger than some improvements in this algorithm must be made. Here in our proposed approach, we are applying an additional hierarchical clustering technique with the collaborative filtering recommendation algorithm also the Principal Component Analysis (PCA) method is applied for reducing the dimensions of data to get more accuracy in the results. The hierarchical clustering will provide additional benefits of the clustering technique over the dataset and the PCA will help to redefine the dataset by decreasing the dimensionality of the dataset as required. By implementing the major features of these two techniques on the traditional collaborative filtering recommendation algorithm the major components used for recommendations can be improved. The proposed approach will surely enhance the accuracy of the results obtained from the traditional CFRA and will
enhance the efficiency of the recommendation system in an extreme manner. The overall results will be carried out on the combined dataset of TMDB and Movielens, which is used for making recommendations of the movies to the user according to the ratings patterns created by the particular user.

Modeling of a Hybrid Energy System Connected System
Authors:- M.Tech. Scholar Sumit Kumar Mehta, Asst. Professor Mithilesh Gautam

Abstract:- In integrated micro-grid, PV system is usually controlled to operate in the maximum power point tracking (MPPT) mode. The battery energy storage system is operated in constant power charging or discharging mode. In order to provide an integrated energy system connected to grid Depending on individual energy requirements, the Integrated Energy System can be an add-on to an existing energy source (an integrated solution) to reduce fossil-fuel consumption or a stand-alone for complete fossil fuel displacement. Through extensive integration of energy infrastructures it is possible to enhance the sustainability, flexibility, stability, and efficiency of the overall energy system. This concept together with the cost reduction, technology development, environmental awareness, and the right incentives and regulations has unleashed the power of the sun. And all system result will be carried out by matlab simulation is proposed for isolated micro grids with renewable sources.In the presented technique, the pitch angle controller is designed for wind turbine generator (WTG) system to smooth wind power output. The proposed strategy is tested in a typical isolated integrated micro-grid with both PV and wind turbine generator.

Review on Diagnosis of COVID-19 from Chest CT and X-Ray Images Using Deep Learning Algorithms
Authors:- Vishwas V (M.Tech.), Dr. Kiran Gupta Professor

Abstract:- As we all know , the world has been in a cocoon this whole year, and we have only now begun to step back into normalcy. COVID-19 outbreak was announced as a Global Pandemic by WHO on 11 March 2020 by which time the Global tally of infected people was at 114,243 and the deaths at around 4302. Due to the absence of specific therapeutic drugs or vaccines for the novel COVID-19, it is essential to detect the disease at its early stage and immediately isolate the infected person from the healthy population. Recent findings obtained using radiology imaging techniques suggest that such images contain salient information about the COVID-19 virus. Application of advanced artificial intelligence (AI) techniques coupled with radio-logical imaging can be helpful for the accurate detection of this disease. The objective of this paper is study the diagnostic value of CT and x-ray images and compare their efficiency against RT-PCR and also, to compare and analyse existing deep learning models for classification of Covid pneumonia from regular pneumonia and no pneumonia.

Enhanced the Security through Asymmetric Based RSA Algorithm
Authors:- Mahendra Kumar Choudhary, Ravinder Singh

Abstract:- In the last some decades we are using the internet in our daily communication. We are sending our non-secret as well as secret data using internet. So there is a chance that our data can be leaked of hacked by someone or some unauthorized person or party. So we can try to secure our data with the help of cryptography.The proposed work is using an old symmetric algorithm that is play fair with some modification and RSA that is asymmetric algorithm also. As we know the symmetric key algorithm is using the same time for encryption and decryption.The problem of key exchange problem I used here RSA algorithm.

Heart Disease Prediction using Data Mining Technique
Authors:- Shivangi Agrawal, Asst.Prof. Ashish Tiwari(HOD)

Abstract:- ECG is the most common and basic test performed on patients to detect anomalies in the heart. As a result of the ECG, 10 to 20 minutes of continuous patient heart data were collected and printed as a 1D plot. We have developed a program that extracts a continuous data set from the ECG machine and analyzes the data and extracts various ECG wave functions. First we divide the data by Wavelet decomposition. Then the data is reconstructed to 4 levels, removing noise from the signal. At the same time we detect important components of ECG wave, which are P wave, QRS complex and T wave. Electrocardiogram (ECG) is an important diagnostic tool for assessing cardiac arrhythmias in clinical practice. In this process, we present a deep learning-based convolutional neural network structure that was previously trained in a general data set of signals transmitted to perform automatic diagnosis of ECG arrhythmias by classifying ECG patients under similar cardiac conditions. The main goal of this process is to implement a simple, reliable and easy to use deep learning technique to classify two different selected conditions in the heart category. The results showed that cascading deep learning with conventional SVM was able to achieve very high performance. All this work is done by MATLAB simulation.

Movie Stats: Sentiment Analysis of IMDB Reviews and Tweets of a Movie Using Naïve Bayes Classifier
Authors:- Deep Rahul Shah

Abstract:- Sentiment analysis, also referred to as opinion mining or emotion extraction is the classification of emotions within textual data. This technique has been widely used over the years to determine the sentiments, emotions within a particular textual data. I have designed a way where we as a user can view the real time sentiment analysis of movie reviews and tweets regarding a certain movie. I built a Sentiment Analysis model with an accuracy of 98.7 % and an F1 score of 0.99, which means the model is nearly 99% as accurate as a human in analyzing the Sentiment of the text. Many websites are providing you lengthy reviews, which makes it quite boring to read it, so the proposed system shows the real-time chart and sentiment analysis of the tweets and movie reviews in a user- friendly way. This is what makes MovieStats unique.

IOT based Air and Sound Pollution Monitoring System
Authors:- Roja K, C. Santhosh Kumar, P. Anlet Pamila Suhi

Abstract:- The pollution of air and sound is increasing abruptly. To bring it under control its monitoring is majorly recommended. To overcome this issue, we are introducing a system through which the level of sound and the existence of the harmful gases in the surroundings can be detected. The growing pollution at such an alarming rate has started creating trouble for the living beings, may it be high decibels or toxic gases present in the environment leaves a harmful effect on human’s health and thus needs a special attention.

Survey on “Laxmanrekha-Woman Safety And Alert System
Authors:- Samruddhi Kute, Jayshree Gupta, Pratiksha Sonawane,
Surabhi Sonawane, Girija Chiddarwar

Abstract:- Every day, every woman, young girls, mothers and ladies from all walks of life are struggling to be safe and protect themselves from the roving gaze of the horribly insensitive men who molest assault and violate the dignity of women on a daily basis. The streets, public transport, public places in particular have become the dominion of the hunters. Due to these atrocities that women are subjected to in the present scenario, a smart security wearable device for women based on Internet of Things is proposed. This device is extremely portable and can be activated by the victim on being assaulted just by the click of a button that will fetch her current location and also capture the image of the attacker via camera. The location will be sent to predefined emergency contact numbers or police via smart phone of the victim thus preventing the use of additional hardware devices/modules and making the device compact. Crime against women lately has become problem of each nation round the globe many countries try to curb this problem. Preventive are taken to scale back the increasing number of cases of crime against women. A huge amount of knowledge set is generated per annum on the idea of reporting of crime. This data can prove very useful in analyzing and predicting crime and help us prevent the crime to some extent. Crime analysis is a neighborhood of importance in local department. Study of crime data can help us analyze crime pattern, inter-related clues and important hidden relations between the crimes.

Review and Analysis on Behaviour Based Safety in Renewable (Wind) Energy Project
Authors:- Rajendra Singh Gour, Ms. Nisha Kushwaha

Abstract:- It is projected that in up to 82 per cent of Work-related accidents, workers, Behaviour in the form of acts or comissions is a major contributory factor. Such behaviour can lead for many pre-existing factors to come together in a Potential Severe or Lost Time event. There are several reasons why workers engage in at-risk‟ behaviour at work. Health and safety in the workplace is influenced by a number of factors, from the organisational atmosphere through management attitude and commitment to the nature of the work or task and the personal attributes of the individual. Safety- related behaviour in the workplace can be improved by addressing these major influences. One way to improve safety performance is to introduce a behavioural based safety process that identifies and strengthens safe behavior and reduces unsafe behaviour. Behaviour-based safety is the “application of science of behaviour change to real world safety problems” or “A process that creates a safety partnership between management and employees that continually focuses people’s attentions and actions on theirs, and others, daily safety behaviour.” Behavioural safety processes are not a „quick fix‟ and it is important not to overlook fundamental elements. Organisations should start by concentrating on strategies and systems –assessing and improving management and operational aspects, training, design and so on. First researched in the 1970s in the US, the behaviour-based safety approach emerged in UK organisations in the late 1980s and is now widely used in a variety of sectors in the UK. IOSH has produced this guidance to introduce the background and basic principles of implementing a process which systematically addresses behavioural safety. The methods described are based primarily on observation, intervention and response as ways of changing behaviour.

A Literature Review of Supplier Selection for Construction Project
Authors:- M. Tech. Scholar Sanket D. Alone

Abstract:- This paper is about the selection of supplier for materials required in a construction project. Apart from making a proper schedule of the project for marking the start and completion dates of the project, for optimizing the cost of the project, material supplier is very important from the quantitative as well as quantitative point of view. In order to make an adequate suppliers selection use different criteria depending on the specific case. The supplier selection process deploys an enormous amount of a firm’s financial resources and plays crucial role for the success of any organization. The main objective of supplier selection process is to reduce purchase risk, maximize overall value to the purchaser, and develop closeness and long-term relationships between buyers and suppliers.

Optimising Headway using Communication Based Train Control system
Authors:- Student Amit Shrivastava, Prof. Anshuj Jain, Prof. Ankit Tripathi

Abstract:- In most of the previous researches the grade of automation 3 i.e. (GOA 3) has been analyzed for Direct Train Operation i.e. DTO mode while the focus of this proposed is to analyze the feasibility for the Grade of Automation 4 i.e GOA 4 which implements the Unattended train operation i.e. UTO Mode. In this specification the current Headway used by most of the Metro Rails is 120 sec. The comparison of signaling system of conventional Railways and the CBTC system in Metro Railways is also been included in this work and how the upgraded version have affected the capacity and efficiency of the mass transit system.

Analysis of Fly Ash and Hypo-Sludge Combination for Brick Manufacturing
Authors:- M. Tech. Scholar Prateek Chourawar, Asst. Prof. Aviraj Singh Gabbi

Abstract:- Hypo sludge is one of the waste from the paper industries which cannot be recycled hence a subsequent solution has to be found out to dispose these waste. Previous research work suggests that hypo-sludge can be used as replacement for the cement in concrete. So this work planned to use hypo sludge as an ingredient for bricks manufacturing and performing tests. Experiment is done on various set of mixing proportion of the material where different number of days samples are utilize for the examination of various properties of the brick. Results shows that proposed work has achieved good set of strength with increase in percentage of Fly-Ash and Hypo-Sludge. It was obtained that density of dry compacts decreases with increase in weight percentage of Fly-Ash and Hypo-Sludge. As the dry compacts are immersed in water at 1100C -1800C, then through capillary action voids are filled and it becomes hard and the porosity is eliminated. As a result of which the compacts become dense and finally the density increases with increase in Fly-Ash and Hypo-Sludge content. it is clear from SEM micrographs that 75 wt. % FA blend composite has splits which prompt decrement in compressive quality.

Study of Horse Manure with Fly Ash Ingredients in Brick Fabrication
Authors:- M. Tech. Scholar Neelesh Kumar Deshmukh, Asst. Prof. Raviraj Singh Gabbi

Abstract:- Research works are not directed on manufacturing of the bricks from natural waste however the current pattern of reusing organic waste has extraordinary effect on building material industry. A few research works have done to discover the substitution of bond in concrete. This examination work is on an arrangement to utilize one such natural waste i.e. horse manure into the bricks fabricating. Fly-ash bricks have officially demonstrated their significance as the ordinary bricks gives hardness to the ground water. This gives a rule that the horse manure can likewise be utilized as a part of bricks fabricating if its quality is satisfactory with in the farthest point. Five diverse weight rates of Fly ash and horse manure with (70%, 60%, half, 40% and 30%) and (10%, 15%, 20%, 25% and 30%) were taken individually. These syntheses were mixed completely by hand mixing, to get a homogenous mix. Distinctive pieces of Fly ash remains alongside horse manure were kept in three diverse little size containers.

A Survey on Security of Clouds and Trust Model Techniques
Authors:- Sidharth Mohan, Asst. Prof. Jayshree Boaddh , Asst.Prof. Jashwant Samar

Abstract:- Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud computing. However, this sole feature of the cloud computing introduce many security challenges which need to be resolved and understood clearly. This paper gives a detailed survey on IAAS security issues. As virtual machine should be secured to handle data and maintain privacy. Methods proposed by various scholars are explained which directly or indirectly enhance the security of cloud. Paper has list some of trust techniques developed by researchers for identifying any malicious machine.

MRI Image Segmentation and Classification Using KFCM and Convolution Neural Networks
Authors:- M.Tech. Scholar Nayan Pure, Asst. Prof. Ashish Tiwari

Abstract:- The unlimited and uncontrollable growth of cells can cause human brain tumors. Correct treatment and early diagnosis of brain tumors are essential to avoid permanent damage to the brain. In medical image diagnosis, tumor segmentation and classification schemes are used to identify tumor and non-tumor cells in the brain. The automatic classification is a challenging task which utilizes the traditional methods due to its more execution time and ineffective decision making. To overcome this problem, this research proposes an automatic tumour classification method named as Hybrid Kernel based Fuzzy C-Means clustering – Convolution Neural Network (Hybrid KFCM-CNN) method. The algorithm identifies the position of tumor in brain MRI as they are mostly preferred for tumor diagnosis in clinic. The proposed method also crops tumor region from segmented image and way growth of tumor and help in treatment planning. It also provides important information about location, dimension and shape of brain tumor region with no exposing the enduring to a high ionization radiation. The size of tumor is calculated in term of number of pixels. Similarly the primary brain tumor is considered into Benign and malignant type on MRI brain images, based on accuracy, sensitivity, specificity in MATLAB simulation.

Distribution Planning Model for Water from Different Sources
Authors:- PhD Student Tichaona Goto, Lecturer Iris Shiripinda, Endowed Chair Prof.Fanuel Tagwira, Anthony Phiri (Director)

Abstract:- Urbanization in Africa is characterized by insufficient basic infrastructure, particularly in high density areas. There is need to come up with a model which takes a comprehensive approach to urban water services and viewing water supply as a component of integrated physical system. The purpose of this study is to critically look at demand based planning model for the distribution of water from different locally available sources in the high density suburb of Budiriro as an option of supplying water for gardening, sewage system, drinking and other domestic uses to the residents. This model provides a method of integrating different sources of water to supply water according to use. The model will bring relief on water demand since the use of water from hand dug wells and Rainwater harvesting is another virgin source of water which can be exploited fully. The blending of water from different sources to come up with quality water is one of the thrusts of the model. The model provides future forecasts and scenario planning, but effective water demand should have a planning for integrated water management of the different water sources.

A Review on Low Power and Delay of Ripple Carry and Carry Look Ahead Adders
Authors:- Amit Chaturvedi, Dr.Vikash Gupta

Abstract:- Now a days in the world of VLSI Technology, the word low power consumption is only possible with the concept of Reversible logic design. Reversible concepts will attain more attraction of researchers in the past two decades, mainly due to low-power dissipation and high reliability. It has received great importance due to because of there is no loss of information, while we are processing the data from input to output. Moreover, the power dissipation is also very less and ideally it should be zero. So the concept of reversible design will become more dominant in the low power VLSI design. This paper focuses on the implementation of 4, 8, 16 and 32 bits of highly optimized area efficient Ripple carry adder (RCA) and Carry look ahead (CLA) adders. Finally, we can prove that the Carry look ahead adders are so fastest among all the previously existing designs. All these processes will be Simulated & Synthesized on the ISE Xilinx 14.7 software.

Role of Emotional Intelligence on Our Immune System during Pandemic Situations
Authors:- Research Scholar Mrs. Padmashree G.S, Asst. Prof. Dr. Mamatha.H.K

Abstract:- COVID 19, a global pandemic, which first started in Wuhan city of China in December 2019, spread to different countries across the globe. The effect of the disease in terms of mortality and morbidity are manifold like death, depression, loss of income, anxiety, and migration. Vaccine has been formalized and life is getting normalized, but we are left with questions on what makes human beings susceptible and how can we build our immunity not only physically but also mentally. One such attempt is improving the Emotional Intelligence of people. This article is an attempt to understand the impact of Emotional Intelligence on the Immune System of the human body and how emotional intelligence, if understood and developed properly can help ward off many of the negative consequences of these type of pandemics. In this article, a review has been done on how the domain of Emotional Intelligence (EI) can help tackle this pandemic on an individual as well on the collective level. This is shown by discussing the relationship that EI has on the Immune System. Beginning the discussion from the interaction of Immune system with the environment, this article speaks about the influence of EI on Genes and Placebos which in turn impact the immune system.

Solar Connected Igbt Switch to Enhance Superconducting Magnetic Energy Storage System (Smes) for High Power Dc Application
Authors:- Iqrar Ahmed Ansari, Deepak Pandey, Rahul Singh

Abstract:- A superconducting magnetic energy storage (SMES) system includes a high induction coil that can act as a constant source of direct current. A high temperature SMES (HTS) unit connected to an energy system can absorb and store active and reactive energy from this system and release these powers in this system during demand periods.

A Review on Generation of Electricity from Solar Power Plant
Authors:- M. Tech. Scholar Amar Pratap, Prof. Madhu Upadhyay, Sagar Tomar

Abstract:- The aim of the article is to study of the operating modes basis of distributed solar power plants, power consuming storage and power filtering devices using simulation tools. and energy efficiency assessment of local microgrid on the change of the concept of developing modern power engineering is conditioned by growing interest in renewable energy sources The most rapid pace of the development among low-power distributed renewable energy sources is presented by private solar power plants, which operate both autonomously, and can be integrated into the industrial network which is designed to solve two key tasks – performing the function of the backup power supply in the autonomous operating modes of the system and the alignment of the load profile, that is, the elimination of daily peaks and failures in power consumption. The implementation of these functions, combined with the installation of power active filters will minimize losses in the line and elements of ESS and it will be perform on MATLAB simulation.

Designing and analysis of Microgrid Implementation with Solar Photovoltaic Power Plants
Authors:- M. Tech. Scholar Amar Pratap, Prof. Madhu Upadhyay, Sagar Tomar

Abstract:- Solar energy is a renewable energy that is found abundantly in nature. It is green energy that can be utilized throughout day, therefore maximum energy has to capture from the panel. MPPT algorithm is incorporated to capture maximum energy. A multilevel inverter is a power electronic converter that synthesizes a desired output voltage from several levels of dc voltages of dc voltages as inputs. With an increasing number of dc voltage source, the sinusoidal waveform is obtained by the output voltage, while using a fundamental frequency-switching scheme. The advantage of multilevel inverter is very small output voltage, results in higher output quality and lower switching losses. This paper proposes a MPPT controller based solar power generation system, which consist of dc/dc converter and multilevel level inverter. In solar photovoltaic power generation systems, photovoltaic panels take a large amount of cost, if improve the use of photovoltaic battery and transform the solar battery plate absorption power into alternating current for use by the user as much as possible, will save a lot of money. Based on the equivalent circuit of solar cells, this paper analyzed the characteristic curve of solar cells through the MATLAB simulink model.

Detection of Brain Tumor
Authors:- Jigisha Kamal, Raunak Kolle, Varshini P

Abstract:- A study conducted by the “New England Journal of Medicine” for brain tumor revealed that more than half the cases diagnosed were delayed for a year or longer. This low percentage of correct diagnosis by physical practitioners was astonishing with an average pre-diagnostic symptomatic interval (PSI) being 60 days with a parental delay of 14 days and a doctor’s delay of 30 days. This meant, there existed a delay of almost 104 days in the diagnosis. Among the diagnosed brain tumors only 33% of them were diagnosed by the end of the 1st month after the onset of first signs and symptoms. Physical segmentation of the MRIs by a radiologist is often a monotonous and prolonged process. A viable solution is a Deep Learning aided brain tumor detection and segmentation from brain MRIs. The detection of brain tumor from the magnetic resonance images is an extremely important process for deciding the right therapy at the right time.

Literature Survey on Power Quality and Voltage Flicker Reduction using D-STATCOM
Authors:- Dharmendra Kumar, Prof. Abhishek Dubey

Abstract:- Now-a-days, the most important discussing topic in the world of powersystems is maintenance of power quality The power quality improvement is one of the interesting topics among researchers groups. And they all focused on power quality improvement in power system. In this literature survey paper we are study so many papers written by different researchers. Study and analysis of DSTATCOM and its uses and advantages in power system. .

Smart Dustbin Application Using IOT with GSM
Authors:- Student Jaya Priya. A, Asst. Prof. Dr. N.Shunmuga Karpagam

Abstract:- With increase of population, the scenario of cleanliness with respect to garbage management is degrading tremendously. In city, there are many public places where we see that garbage bins or dustbins are placed but are overflowing. This creates unhygienic condition in the nearby surrounding. Also creates ugliness and some serious diseases, at the same time bad smell is also spread and it degrades the valuation of that area. To avoid such situation we come up with a project called “Smart Dustbin” which is a GSM based Garbage and waste collection bins overflow indicator system for Smart Cities. Over main motivation behind this project is the ongoing campaign Swachh Bharat Abhiyan (Clean India Movement) launched on October 02, 2014 at Rajghat, New Delhi, by the Prime Minister of India Narendra Modi which is India’s largest ever cleanliness drive to clean the streets, roads and infrastructure of the country’s 4,041 statutory cities and towns. In this paper, smart bin constructed on a microcontroller-based platform, which is interfaced with GSM modem, and ultrasonic sensor that detects the presence of human on a particular distance. Once the garbage reaches the threshold level, ultrasonic sensor will trigger the GSM Modem, which will continuously alert the required authority until the garbage in the dustbin is squashed. Once the dustbin is squashed, people can reuse the dustbin. At regular intervals dustbin will be squashed. Once these smart bins are implemented on a large scale, by replacing our traditional bins present today, waste can be managed efficiently as it avoids unnecessary lumping of wastes on roadside. Foul smell from the rotten wastes that remain untreated for a longer time, due to negligence of authorities and carelessness of public may lead to long-term problems. Breeding of insects and mosquitoes can create nuisance around promoting unclean environment. This may even cause dreadful diseases.

Propeller Hub Repair With Cold Spray Technology (CST Process)
Authors:- Dupally Naval Venkata, Narasimha Kishore Yadav

Abstract:-The current process of the repair by Cold Spray Technology is the restoration of the Aircraft Propeller components and Hub is one of the dynamically stressed components containing aluminum and its alloys and these are the perfect components for the cold spray applications. This application is based on the material of the component that is manufactured and can be repaired with. Most of these cold spray repairing materials are pretreated according to the manufactured material or alloys. Most of the material or metals selected for the cold spray application are compared with the physical, chemical, and mechanical properties of the manufactured components. To optimize the perfect spray bond the closest parameters are subsequently selected, the spay material is applied, and the component is repaired with help of Helium and nitrogen to replace the affected area with spraying powder. Then after the spray, the component is machined in the way it was new and according to OEM standards. This process can be worked on not only Aircraft components, but also any metals used in mechanical, automotive, aerospace, oil and gas, and many other industries where metals need repair and restoration of the damaged area.

E-Waste Management
Authors:- Prof. Kharde Ashwini Ganpat, Prof. Prashant Sanpat Kale, Prof. N. M. Garad, Prof. A. S. Shirsath

Abstract:-Electronic waste, e-waste, e-scrap, or waste Electrical and Electronic Equipment (WEEE) describes discarded electrical devices. There is a lack of consensus as to whether the term should apply to resale, reuse, and refurbishing industries, or only to product that cannot be used for its intended purpose. Informal processing of electronic waste in developing countries may cause serious health and pollution problems, though these countries are also most likely to reuse and repair electronics. Some electronic scrap components, Such as CRTs (Cathode Ray Tubes), may contain contaminants such as lead, cadmium, beryllium, or brominated flame retardants. Even in developed countries recycling and disposal of e-waste may involve significant risk to workers and communities and great care must be taken to avoid unsafe exposure in recycling operations and leaching of material such as heavy metals from landfills and incinerator ashes. Scrap industry and USA EPA (United States Environmental Protection Agency) officials agree that materials should be managed with caution, but many believe that environmental dangers of used electronics have been exaggerated.

Challenges at the Time of Covid-19, and Innovation to Combat with Situation
Authors:- Sandeep Kumar, Unsa Fatima, Ranju Shah, Upma Gupta

Abstract:-21st century was moving ahead in a pleasant way. Suddenly it was hit by the pandemic, Covid-19, which changed the life of everybody. Offline mode was transformed by the online mode. The platforms such as Google Meet, Webex, Zoom helped in a tremendous way to connect people and also to complete their work from the available resources at home.E- commerce was atits boom during this period and those who grabbed the opportunities initial- ly were awardedconsequently. On thecontrary,those who were operating in physical mode were severely hit. Foronline education,Courser,Byjus are working to help the students in their respected fields ofwork. This paper will cover the technological aspects during COVID-19.

Aadhar Based Fingerprint Electronic Voting Machine
Authors:- Bhakti Salvi, Mrs. Rupali Shekokar

Abstract:- The main aim of the voting is to express their thoughts related to choose your government, political leader, citizen initiatives and so on. It is an important task for the election team to conduct fair voting in respective country. Every country spent lot of money to make election without any fraud and rampage free. But, in current situation it has become very normal for some sources to make illegal voting that may lead to a result contrary to the actual judgment of the people [2]. We refer some paper and design one machine to solve the above problem. By taking help of biometric system (finger print scanning) will make this project more secure and trustable. Biometric system has been increase speed of the system and accuracy. It also provide the security to system, avoid fake and duplicate voting etc. System uses to identify the user is thumb impression and Aadhar card number. Because as we know that Aadhar card is government trusted identification card and thumb impression of every person on the earth (human being) has unique pattern. Thumb impression increase security in the system, and that is the main task of this system, increase security. In this, as a pre-polling step create database consisting of the Aadhar card number and thumb impressions of all the eligible voters. At the time of elections, the thumb impression and Aadhar card number of a voter is entered as input to the system [1]. And then, that database records compared with the entered thumb impression and Aadhar card number. If that entered pattern and Aadhar card number matches with the database of the thumb impression and Aadhar card number respectively, grant permission to cast a vote. And in case any repetition in vote and if pattern doesn’t match with the records of the database present in system, for that particular person permission to cast a vote is denied and system not go for next step, it come out from processes. And in other case the pattern match but Aadhar card number doesn’t match with the records present in system, for that particular person also permission to cast a vote is denied and system not go for next step, it come out from processes. To cast a vote must is to match both Aadhar card number and finger print of that particular person, than and than only system allow for next step (For voting). As per voting going on counting has been done paralleled. This system maintenance cost is less and overall cost for complete election process is very less.

Underground Fault Cable Detection Using Wireless Technology
Authors:- P.G. Scholar Manjula V, Asst. Prof. P. Sumathi, HOD. P. Anlet Pamila Suhi

Abstract:- Detecting fault cable system proposes fault location model for underground power cable using microcontroller. Fault location models are to determine the distance of underground cable fault from base station in kilometers. This project uses the simple concept of ohm’s law. When any fault like short circuit occurs, voltage drop will vary depending on the length of fault in cable, since the current varies. A set of resistors are therefore used to represent the cable and a dc voltage is fed at one end and the fault is detected by detecting the change in voltage using a analog to voltage converter and a microcontroller is used to make the necessary calculations so that the fault distance is displayed on the LCD display.

Determination of Unsaturated Hydraulic Conductivity and Diffusivity as a Function of Moisture Contents and Soil Suctions
Authors:- ADAMU Cornelius Smah, UDOJI Braveson Obiefo, EKOJA Omeyi Faith, SALIHU Buhari Salam, IKYAPA Tertese Peter, BELLO Sikiti Garba

Abstract:- This study on unsaturated hydraulic conductivity and diffusivity of a soil was conducted at Agricultural engineering experimental plot, Ahmadu Bello University, Zaria. Experimental conductivity was carried out from five profile pits with samples taken from (15, 30, 45 and 60cm) depths. The saturated conductivity (Ks) was first determined in the laboratory using the constant head method, the gravimetric moisture contents were estimated in the laboratory using the pressure plate extractor by applying the required suctions at (0, 0.1, 0.3,1,5,10 and 15) bars. The bulk densities of the samples collected were also estimated. The volumetric moisture contents were determined by multiplying the gravimetric moisture contents with their corresponding bulk densities. Jackson’s model of 1973 was applied to determine the unsaturated hydraulic conductivity at each moisture content using the formula Ki =Ks(θi/θs) (∑_(j=i)m⌊(2j+1)-2i)φj-2⌋)/(∑_(j=1)m⌊(2j-1)φj-2⌋). The soil suction and the volumetric moisture contents were related to K(φ)=〖aφ〗mm and K(θ)=bθm . Where K is the degree of saturation or unsaturation. φ is the volumetric moisture content and θ is the soil suction head, a, b are the empirical constants while m and n are constants for the measure of the steepness. Mualem Van Gunatchen model of 1976 predicted a formula which was used in determining the hydraulic diffusivity by multiplying the conductivity to the differential of this relationφ=aθm. Major findings of this study revealed that the value of the diffusivity as a function of volumetric moisture content decreases down the profile pit, this could be as a result of the existence of materials in the soil with increase in the suction. The coefficient of determinant (R²) decreases down the profile, it was also observed that the bulk density (B) and Porosity affect the hydraulic conductivity (Ks) and diffusivity (D) of the soil on site.

A Review Article of PV Based Power Generation and Power Quality Improvement Using SSSC Power Compensation
Authors:- Amarkant Shukla, Dr. Arvind Kumar Sharma

Abstract:-In this paper we investigate the controlling and enhancing power flow in a transmission line using a Static Synchronous Series Compensator (SSSC). The Static Synchronous Series Compensator is used to investigate the device in controlling active and reactive power as well as damping power system oscillations in transient mode. The SSSC device is equipped with SOURCE ENERGY to absorb or supply the active and reactive power to or from the line. Various IEEE bus systems have been stabilized using this FACTS device. The results are obtained by simulating the various power systems in MATLAB/SIMULINK.

Railway Track Crack Detection System Using Arduino Microcontroller and Gps Notification
Authors:- P.G. Student Aruna A, Asst. Prof. P. Anlet Pamila Suhi (HOD)

Abstract:- The Indian Railways has one of the largest railway networks in the world, criss- crossing over 1,15,000 km in distance, all over India. However, with regard to reliability and passenger safety Indian Railways is not up to global standards. Among other factors, cracks developed on the rails due to absence of timely detection and the associated maintenance pose serious questions on the security of operation of rail transport. A recent study revealed that over 25% of the track length is in need of replacement due to the development of cracks on it. Manual detection of tracks is cumbersome and not fully effective owing to much time consumption and requirement of skilled technicians. This project work is aimed towards addressing the issue by developing an automatic railway track crack detection system. This work introduces a project that aims in designing robust railway crack detection scheme (RRCDS) using TSOP IR RECEIVER SENSOR assembly system which avoids the train accidents by detecting the cracks on railway tracks. And also capable of alerting the authorities in the form of SMS messages along with location by using GPS and GSM modules. The system also includes distance measuring sensor which displays the track deviation distance between the railway tracks.

A Review on Thermal Design Analysis of Piston Using RSM Method
Authors:- M.Tech Scholar Rajat Singh, Prof. Brijendra Kumar Yadav

Abstract:- A piston is a component of reciprocating IC-engines. Piston is the component which is moving that is contained by a cylinder and was made gas-tight by piston rings.A mathematical model is formulated based on the simulation result values of total deformation, stress and first ring groove temperature. The Piston during the working condition exposed to the high gas pressure and high temperature gas because of combustion. At the same time it is supported by the small end of the connecting rod with the help of piston pin (Gudgeon pin). The gas pressure given 20 Mpa is applied uniformly over top surface of piston (crown) and arrested all degrees of freedom for nodes at upper half of piston pin boss in which piston pin is going to fix. The statistical ‘‘Design-Expert” software has been usedto study the regression analysis of simulation data and to drawthe response surface plot. The statistical parameters were estimatedby using ANOVA. The objective of the study is to minimize the mass. The optimum combination of the influencing parameters for the mass can be found using Response Surface Method.

Thermal Design Analysis OF Piston Using Rsm Method
Authors:- M. Tech. Scholar Rajat Singh, Prof. Brijendra Kumar Yadav

Abstract:- A piston is a component of reciprocating IC-engines. Piston is the component which is moving that is contained by a cylinder and was made gas-tight by piston rings. A mathematical model is formulated based on the simulation result values of total deformation, stress and first ring groove temperature. The Piston during the working condition exposed to the high gas pressure and high temperature gas because of combustion. At the same time it is supported by the small end of the connecting rod with the help of piston pin (Gudgeon pin). The gas pressure given 20 Mpa is applied uniformly over top surface of piston (crown) and arrested all degrees of freedom for nodes at upper half of piston pin boss in which piston pin is going to fix. The statistical ‘‘Design-Expert” software has been used to study the regression analysis of simulation data and to draw the response surface plot. The statistical parameters were estimated by using ANOVA. The objective of the study is to minimize the mass. The optimum combination of the influencing parameters for the mass can be found using Response Surface Method. It is found that Height of top land and crown thickness has a dominant effect on total deformation, stress, mass and first ring temperature and The optimal piston mass is determined at height of top land = 2 mm and Crown thickness= 10 mm is 174.43 g.

Renewable Energy Based Power Generation Systems
Authors:- M.Tech. Pooja Vaishya, Prof. Barkha Khambra

Abstract:- The microgrid has shown to be a promising solution for the integration and management of intermittent renewable energy generation. This paper looks at critical issues surrounding microgrid control and protection. It proposes an integrated control and protection system with a hierarchical coordination control strategy consisting of a stand-alone operation mode, a grid-connected operation mode, and transitions between these two modes for a microgrid. To enhance the fault ride-through capability of the system, a comprehensive three-layer hierarchical protection system is also proposed, which fully adopts different protection schemes, such as relay protection, a hybrid energy storage system (HESS) regulation, and an emergency control. The effectiveness, feasibility, and practicality of the proposed systems are validated on a practical photovoltaic (PV) microgrid. This study is expected to provide some theoretical guidance and engineering construction experience for microgrids in general.

A Review Article of Power Management in Pv-Battery-Hydro Based Stand Alone Microgrid
Authors:- Sumit Singh, Vivek Anand

Abstract:- This works mainly on a Power Management System for a micro-grid system powered by a hybrid power generation system consisting of frequency control, power control, power management and solar photovoltaic (PV)- battery-hydro based micro-grid (MG) load. Therefore, power and frequency control allows for the balance of active energy and auxiliary services such as active energy support, source of current harmonics reduction and voltage reduction harmonics where common encounters.

Published by:

Phd Paper Publication


Research in any field need validation and publication in a reputed Journal does the same work. A scholar who is looking for Phd Paper Publication can submit in good impact factor journal having indexing in a reputed index provider as well. As per university/college requirement scholars should check criteria of journal scope of publication with language and cost of publication. This article further elaborates Phd Paper Publication Help under the following points:

  1. Check college / University requirement.
  2. Check ISSN number of the portal of ISSN.
  3. Website domain life / year should match date of registration.
  4. Each issue of the journal should have a good number of papers.
  5. Publication ethics should clearly mention the guideline of charges of paper, pages, authors, etc.
  6. Good journal should have a strong reviewer team to provide fast publication.
  7. People should inform their guide/mentor before submission in a journal.
  8. It was desired that the paper should be plagiarism free. So always check plagiarism before final submission of paper.
  9. Author name, designation department name, college name should be check as some time corrections need lot of time as journal avoid author name editing after acceptance.
  10. We suggest Phd Scholar to validate journal from different means by email, chat, virtual monitor for final selection of journal for publication.

Phd Journal Paper is important and plays important role in order to complete or earn a doctorate degree. I again suggest authors to take a review in front of mentor before submission as scholars. A number of issues rises for a phd journal paper once it gets publish like journal not matching the university or college requirement. Sometimes journals do not match the indexing requirement of college or Phd ordinance for the university. Hence to increase a number of publications in the initial phases of doctorate scholar can go with a light journal having a valid ISSN number but later they can approach to the good impact factor and good indexing journal. Publication fees of the journal also need to be check by the author before submission as cost of one paper may range from 30 USD to 1000 USD as per the type of journal. Once paper get submit then reviewer team check plagiarism of the paper which can keep a copy of the paper and failing a journal publication may harm you for rewriting a complete paper. Therefore scholars should always write a paper by its own thought as this never put one in plagiarism trouble. Writing a good paper as per Phd level is always full of valuable content like have an abstract describing the whole content, in short, a relevant introduction matching your paper problem, issues, good literature survey relevant to your objective work, good experimental section which justifies your proposed methodology. Finally conclude with words that scholars who search for how to publish a thesis paper should know that Phd work is hard, so select journal wisely as fees, time, indexing, the impact factor of journal helps you to justify your work.

Published by:

How to Publish A Review Paper


Budding engineers of the nation or worldwide researchers need the journal that can evaluate their hard work of research and manuscript specifically based on their field. As a research starts from the survey so scholar wants to know how to publish a review paper in a good journal. As the point clarifies that, each for the judging and checking the research direction their evaluator. International journal of science and engineering that can select those review articles for publication need to be filtered as per college requirement. Review paper journal selection is a tough task as a variety of journals are found but the specific journal having all the qualities of high impact factor, low publication cost, open access publication, low article processing charges are hard to find.

Submit Your Paper  / Check Publication Charges

While selecting the article review journal for the publishing of the manuscript specially, the paper must be checked by the reviewer team. As the team must be constituted of experts, master or doctorates in the relevant domain f science and engineering with sufficient experience of the evaluation. With all these, there are few more points one should check to know resolve question regarding how to publish a review paper

  • Authorization: the first is to check whether the journal is authorized or not, for this, there must have a unique identification number present to that journal as every specific journal has. Also, this must be old enough to have an identity.
  • Fees: the journal should not charge extra fees for the processes after the registration, that is the publishing fees, accessing fees, certificates cost, extra pages, and extra authors charge.
  • Facilities: the journal must provide the facility of the open-access publication and the printing of the article or in case editing.
  • Certificates: the journal must provide certificates to each author or online certificates to the distant authors.

Releasing: the issuing of the journal must not be quarterly or yearly or half yearly, as the author had to wait too long.

Published by:

IJSRET Volume 6 Issue 6, Nov-Dec-2020


Face Expression Recognition: A Review
Authors:- M.Tech. Student Palak Jain, Assistant professor Anamika Pyasi

Abstract:- Recognition of outward appearances assumes a significant job in many mechanized framework applications like mechanical technology, instruction, man-made brainpower, and security. Perceiving outward appearances precisely is testing. Approaches for explaining FERi(Facial Expression Recognition) issue can be ordered into 1) Static single pictures and 2) Image successions. Customarily, various procedures like Multi-layer Perceptron Model, k-Nearest Neighbors, Support Vector Machines were utilized by scientists for fathoming FER. These techniques removed highlights like Local Binary Patterns, Eigenfaces, Face-milestone highlights, and Texture highlights. Among every one of these techniques, Neural Networks have increased especially ubiquity and they are broadly utilized for FER. As of late, CNNsi(Convolutional Neural Networks) have picked up notoriety in field of profound learning in view of their easygoing engineering and capacity to give great outcomes without prerequisite of manual component extraction from crude picture information. This paper centers around review of different face demeanor acknowledgment methods dependent on CNN. It incorporates cutting edge techniques proposed by various scientists. The paper additionally shows steps required for utilization of CNN for FER. This paper additionally incorporates examination of CNN based methodologies and issues requiring consideration while picking CNN for unraveling FER.

Income Analysis of Census Database Using Pyspark
Authors:- Abhishek R., Pavan Dutt, Sahana S. R., Assistant Professor Dr.M.Sujithra M.C.A,M.Phil,Ph.D, Assistant Professor Dr.P.Velvadivu M.C.A.,M.Phil.,Ph.D.

Abstract:-The data set contains information about every individual’s age, education level and various other features from the census along with the income . The income feature is a categorical feature with two classes i.e., less than 50k dollars or greater than 50k dollars. The problem is to build a machine learning model that could effectively predict the income of people given the input features. Considering the size of the data and the dimension of the data, the model is built using Big Data Techniques.

Review of Machine Learning Algorithm on Cancer DataSet
Authors:- M. Tech. Scholar Animesh Urgiriye, Assistant Professor Rupali Bhartiya

Abstract:-Cancer is a basic disease from numerous years. This prompts demise in the event that it isn’t analyzed at beginning phase. It is a subject of concern on the grounds that genuine treatment of this infection isn’t found till date. Patients having this sickness must be spared if and just in the event that it is found in beginning phase (I and II). On the off chance that it is recognized in last stage (III and IV) at that point possibility of endurance is extremely less. AI and information mining strategy is exceptionally useful method to deal with this issue. AI is exhibiting the guarantee of creating reliably precise appraisals. AI framework successfully “realizes” how to assess from preparing dataset of finished activities. There are different procedures accessible in Machine Learning to foresee the Cancer based on gathered standard datasets. The datasets may have been recorded by web-based media, medical care sites and some different vaults. We have to apply a few classifiers of Machine Learning Techniques on these dataset to recognize the disease in a human. The primary point of the audit is to help the exploration on exact assessment, for example to ease different specialists for pertinent right assessment examines utilizing AI procedures. Our survey recommends that these procedures are serious with conventional assessors on datasets and furthermore show that these strategies are touchy to the information on which they are prepared.

Application of the Analytical Hierarchy Process (AHP) for Geo-Hazards Susceptibility Mapping:Urban Settlement Marquez De León, La Paz.,Mexico.
Authors:-Joel Hirales-Rochin

Abstract:- Geology as a tool to identify areas of geological risk is useful to determine the close relationship between thegeological Space and the sustain able urban development ofacity. Atthenational, regional and local level where the study are a is located, there is a growing need to create new urban areas, but these are not linked to an adequate analys is of the geological environment and the knowledge of the main factors that control risk conditions. The methodology was based on a characterization of the geological, hydro geological and geo mechanical conditions of one of the main urban settlements of the city of La Paz, capital of the state of Baja California Sur., Mexico. Therefore, using the Analytic Hierarchy Process (AHP) methodology it was generateda risk susceptibility map-related in local areas to flood events and landslides. The results represent the first stage of a larger scale project and with this; it is possible to contribute new knowledgeto be used in the most precisezoning of geographic risks, which will allow the state capital a sustainable growth of the population of the city. The improvement of current constructionst and ards and the corresponding zoning to anticipate their development in anorderlymanner.Finally, it is considered that this research´s type (urban settlementscale) provides ananalysis of the risk conditions where the citizen can locate in their community and know their conditions of civil protection, all the opposite of most risk studies that offer large- scale results and only offer a broaderview.

Website Development of Mudis Cooling
Authors:-Professor Jadhav P.D, Akshay Gade, Piyush Pipriye, Pranav Bansod,
Soham Badjate, Mohammed Mustafa

Abstract:- A website or web site is a collection of related network web resources, such as web pages, multimedia content, which are typically identified with a common domain name, and published on at least one web server. Notable examples are,, and Websites can have many functions and can be used in various fashions; a website can be a personal website, a corporate website for a company, a government website, an organization website, etc. A static website is one that has web pages stored on the server in the format that is sent to a client web browser. It is primarily coded in Hypertext Markup Language (HTML); Cascading Style Sheets (CSS) are used to control appearance beyond basic HTML. Images are commonly used to effect the desired appearance and as part of the main content. Audio or video might also be considered “static” content if it plays automatically or is generally non-interactive. A dynamic website is one that changes or customizes itself frequently and automatically. Server-side dynamic pages are generated “on the fly” by computer code that produces the HTML (CSS are responsible for appearance and thus, are static files). There are a wide range of software systems, such as CGI, Java Servlets and Java Server Pages (JSP), Active Server Pages and ColdFusion (CFML) that are available to generate dynamic web systems and dynamic sites The objective of this project is to prepare the static web site for Modi’s cooling, a dealer of cooling electronic appliances such as Air conditioning units, deep freezer, fruit freezer etc. The function of a web site to provide online information to the customer about the product available, the prices address and contact number of the dealer. For design of this web page HTML is used whereas for database and uploading SQL, MYSQL

Seismic Response Study of Multi-Storied Reinforced Concrete Building With Accordion Mass Dampers
Authors:-Mr. P. G. Kadwade, Prof. Zubair Shaikh, Dr G. R. Gandhe

Abstract:- Damping plays important role in design of earthquake resistant structures, which reduces the response of the structure when they are susceptible to lateral loads. There are many different types of dampers in use. In the present study accordion mass dampers (AMD) are used to evaluate the response of RCC buildings. The main task of a structure is to bear the lateral loads and transfer them to the foundation. In order to have earthquake resistant structures, accordion mass dampers (AMD) have been used. The building is modeled in ETAB 2018 and modeled with different location of AMD. After the study results show building having AMD on outer side shows better performance than building having other location of accordion mass damper.

Development of a Healthy Noodles Enriched with the Flavors of Coleus Aromaticus, Mentha, Erythrina Indica
Authors:- Suruthi B., Amutha A.

Abstract:- Noodles have been the staple foods for Asian countries since ancient time. They can be made from wheat, rice and other raw materials such as buckwheat and starches derived from potato, sweet potato and pulses. Normally, wheat noodles is enriched with protein, carbohydrates and fibre content. This study was conducted to add additional nutrients content to the wheat noodles by incorporating the powders of Coleus amboinicus (Omavalli leaves), Mentha (mint leaves) and Erythrina Indica (Kalyana murungai leaves). Omavalli leaves is used in curing cough, cold, stomach problems, indigestion etc. Mint leaves is used for easing queasy stomach, calming stress and anxiety etc. Kalyana murungai leaves is useful for treating cough, cold and is very good for women as it treats many ailments that women regularly face. People use to crush these leaves and eat in the normal mouth or boiled these leaves in the water and from cold, cough or fever. But not everyone like to have this. As we know, noodles is a food, with zero haters. So we have incorporated these flavours in noodles. This noodles is prepared with the composition of 55% wheat flour, 15% omavalli powder, 15% mint powder and 15% kalyana murugai powder.

Upfc Power Compensation with Power Generation Smart Grid
Authors:- Suresh Waskle, Mr. Lavkesh Patidar

Abstract:- The problem of power system to face many problem like as power quality, THD and modern technology to use of FACT Devices, The FACT Device are many types these paper are present of UPFC power stability device oriented. For recent used many technique to improvement of UPFC performance and reduction of THD. We proposed Machine learning technique like as Fuzzy logic and shunt filter with transformer work as controller to controlling of power transient conditions.

A Review: Air Pollution Analysis System Using IOT
Authors:- KulprakashSingh Avatarsingh Mistry, Balaji Khansole Sir

Abstract:- In this paper we are getting to make an IOT Based pollution Monitoring System during which we’ll monitor the Air Quality over a webserver using internet and can display on webpage when the air quality goes down beyond a particular level, means when there are sufficient amount of harmful gases are present within the air like CO2, smoke, alcohol, benzene and NH3. It will show the air quality on webpage so that we can monitor it very easily. The main reason for increasing of pollution level are crop’s remaining burning, emission from the automobile, open defecation of smoke in atmosphere from the industries and burning of garbage openly. Internet of Things (IoT) based pollution system is employed to detect the present level of hazardous gases in the atmosphere. The IoT based pollution system will help us to fetch the info from any location where device is installed. By using the concept of IoT we can use multiple pollution devices at different locations and fetch the data to the web server.

Design and Analysis Of A Upqc Power Flow Control Using Distribution Transformer
Authors:- Bhavsingh Ajnare, Mr. Deepak Bhataniya

Abstract:- Unified power quality conditioners (UPQCs) allow the mitigation of voltage and current disturbances that could affect sensitive electrical loads while compensating the load reactive power. Diverse control techniques have been proposed to evaluate the instantaneous output voltage of the series active power filter of the UPQC but, in most cases, these controllers only can compensate a kind of voltage disturbance.

Construction of Runways by Soil Stabilisation/Recycling Technology Gmr Airport Hyderabad
Authors:- K.Hima Vamsi, K.V Prabhakar Rao

Abstract:- Rajiv Gandhi international airport servers as a important international Airport in south India.The RITES has done a comprehensive study of the Existing Pavement and identified the weak areas. Stabilization has been taken up in those areas. The total area of stabilization work is 7 Lakh Sqm which includes main runway, secondary runway and taxiway. Out of this 7 Lakhs Sqm Approximately 33(2,30,000 Sqm) Approximately 67% (4.70,000 Sqm) for relaying works.

Credit Card Fraud Detection using Autoencoders
Authors:- Saatwik Bisaria, Aryan Aditya Singh, Sarita Yadav

Abstract:- There are certain characteristics of fraudulent transactions that differentiate them from legitimate ones. Machine Learning algorithms recognize patterns in the data points which allow them to detect fraud transactions from legitimate ones, based on thousands of pieces of information, that sometimes may seem completely unrelated to a human being. In Machine Learning, problems like fraud detection are usually framed as classification problems —predicting a discrete class label output given a data observation. Autoencoders are special type of neural network architectures in which the output is same as the input. Autoencoders are trained in an unsupervised manner in order to learn the extremely low-level representations of the input data. These low-level features are then deformed back to project the actual data. An autoencoder is a regression task where the network is asked to predict its input (in other words, model the identity function). These networks have a tight bottleneck of a few neurons in the middle, forcing them to create effective representations that compress the input into a low-dimensional code that can be used by the decoder to reproduce the original input.

Enhanced MalJPEG: A Novel Approachfor the Detection of Malicious JPEG Images
Authors:- Nasla K, Shabna M

Abstract:- In recent year cyber-attacks are increased.The attackers targeting individuals, businesses and organizations. Such attacks usually result in critical harm to the organization, such as the loss and or leakage of sensitive and confidential information. Some non-executable files allow an attacker to run arbitrary malicious code on the targeted victim machine when the file is opened. Millions of people are used images for daily purpose. In some cases, some types of images can contain a malware codes and perform harmful actions. JPEG images are used by almost everyone, from individuals to large enterprises, and on various platforms;Because cyber criminals misuse JPEG image for malicious purpose. In this paper, we design a new method is named as Enhanced MalJPEG. Our system can to detect malicious JPEG images using CNN and machine learning techniques. This method extracts different features from the JPEG file structure and CNN based features from JPEG file and leverages them with a machine learning classifier, in order to discriminate between benign and malicious JPEG images.

RPL: IPv6 Routing Protocol for Low Power and Lossy Networks
Authors:- Shubham Saini

Abstract:- Today, LLn represent most important (interesting) research areas in wireless sensor networks. In which we study about wireless personal area, networks and wireless sensor network these network use to save energy high performance, support traffic network (Pattern). it run on a routing over link layer with restricted frame size and many other. this paper represent protocol performance in smart grid applications based on it.which is design for overcome routing issues in implements to reduces of energy consumptions such as dynamics sending rate of control messages and addressing topologies which is send support not only of traffic pattern but also support traffic following from a gateway node to all other network. this paper focus on Rpl and wireless sensor networks of brief overviews.

A Survey of Adaptive Steganographic Methods
Authors:- Amina S, Mubeena A K

Abstract:- Image steganography is a method used to hide data within an image.The most common image steganographic methods can be divided into three categories namely naive steganography,adaptive and deep learning based embedding.Among these adaptive steganography is the most commonly used practical method naw days.This method not only improves the security of embedding message in an image but also uses efficient steganographic codes.In this paper,we compare various adadptive steganographic method that are currently used and also compare them with the deep learning based methods using various convolutional neural networks.

Study of Hardness and Wear Analysis in AL-SI Alloy (AL-5%SI, AL-11% SI and AL-17%SI) Along With Microstructural Analysis
Authors:- Kajal Shakya, Prof. Krishana Bhushan Patel

Abstract:- In this study, there is an alloying element named as silicon is studied with its effect when varied through Al composition. As silicon is used for making alloy harder and it evident since the last few years there has been a rapid increase in the uses of aluminum-silicon alloys, particularly in the automobile industries, because it has the high strength to weight ratio, high wear resistance along with low density and low coefficient of thermal expansion. Hence, advancements in the field of application make the study of their wear and tensile behavior of utmost importance in this present investigation, Al-based alloys containing5%, 11% and 17% weight of Silicon were synthesized using casting method. Compositional analysis and hardness along with wear analysis performed for different samples of same composition have shown near uniform distribution of Si in the prepared alloys. Study of microstructure has showed the presence of primary silicon. Wear tests were carried out to check whether there will be any change in mechanical property as well as strength ie high hardness with increase in silicon percentage. Wear behavior was studied by using computerized pin on disc wear testing machine. Resistance to wear has increased with increase in silicon amount.

Practical approach for energy audit in Residential building
Authors:-Saurabh Bansal, Asst. Prof. Neeraj Kumar Kumawat

Abstract:- Energy consumption increasing day by day and energy production using conventional sources becomes limited. To reduce this energy consumption and for maximum utilization of energy, energy audit for residential building is playing vital role these days. By adopting this energy audit survey we can minimize the use of energy consumption. The energy audit surveys are mainly done for industries. But now a day’s energy consumption is also increasing in residential building. So it is essential to adopt energy audit surveys for residential buildings too. This paper suggests the ways how we can minimize the losses and reduce the electricity bill for residential building. The paper is also useful for consumers as electrical energy audit survey is explained with procedure.

A Review of Fatigue Detection Techniques
Authors:- Shalu, Nahan Rahman M K

Abstract:- Road accidents are increasing tremendously and accident causing factors include over speeding, violating traffic rules, fatigue driving etc. Fatigue driving is due to inadequate sleep or physical state of driver is not good. Many researches have been taken place for detecting fatigue while driving. This paper describes the methods that already implemented and analyse the best method that is much accurate compared to others. The methods include machine learning, deep learning algorithms. In the algorithms single facial features, multiple facial features, physiological features are used for detection.

Comparative Study Evaluating METEONORM Estimates of Sunshine Duration and air Temperature in Major Cities of Mali
Authors:- Moussa Ibrahim MAIGA, Cheick Oumar SANOGO, Souleymane SANOGO

Abstract:- The successful implementation of renewable energy project relies on the climatic data available in the site. Due to the scarcity of climatic station data, various estimation databases are proposed as an alternative. In this work, we performed an evaluation of METEONORM estimations of sunshine duration and air temperature by comparing them with stations records for some selected cities in the semi-arid zone of Mali, which are Bamako, Nara, Sikasso, Segou and Mopti. The results from the comparative study reveal that the METEONORM estimate of temperature has a very good correlation coefficient with the station record for all the cities. The bias and the root mean square error are very weak and do not exceed 1.5% of the reference values. The results of the sunshine duration show some difference between the two datasets with a maximum bias of 24.73 hours per month and a correlation coefficient that oscillates between 0.76 and 0.98. The semi-arid zone of West Africa being a region with less meteorological data records, it is advisable that METEONORM dataset could be used as an alternative for study energy systems.

LSTM Based Personality Prediction from Social Media
Authors:- Thahira M, Shafna K P

Abstract:- The usage of social media networks are increasing rapidly. Which are used as a platform to share People’s feelings, emotions and experiences etc. This Proposed method predict the person’s behaviour from social media networks. Personality prediction from social media networks are become a challenging task. This method follow the big-five-factor model (OCEAN) namely, openness to experience (O), conscientiousness (C), extraversion (E), agreeableness (A), neuroticism (N) for defining personality. Here the mathematical regular expression operation is used for the data preprocessing. There are three feature selection algorithms such as Pearson correlation coefficient (PCC), information gain(IG) and chi-squared (CHI) method are used for the relevant features. Deep learning neural network such as LSTM is used as a classifier for predicting personality of a person. This Proposed method improves the accuracy of personality prediction compare to other existing system.

Reduction of Iron Oxide using Microwave Irradiation
Authors:- Ravindra Kumar Verma, Prof. Krishana Bhushan Patel

Abstract:- The reduction of iron ore with carbon was investigated using a microwave heating techniques. The heat generated by the reaction mixtures while interacting with microwave, percentage, chemical composition and microstructure of iron produced were studied in detail. The experiments were carried out using 2.45 GHz microwave processor and reaction rates were analyzed at different power ratings: 540, 720 and 900 watts. The maximum reduction in weight obtained was 50.47% at 900 W power supply. The effect of varying the concentration of binders was also studied. Unlike conventional processing the microwave heating was found to be through the absorption of microwaves by reaction mixtures. The microwave processing showed considerable reduction in reaction time increases the yield and also reduces unwanted side reactions. However it showed uneven heating as the heating is due to the distribution of microwave absorbers present in the reaction mixture. Solid state reduction was observed at initial 10-40 minutes and molten iron produced above 40 minutes and the temperature attained was around 8000C. The microwave reduced mixture were characterized using SEM, EDS and XRD technique to find out the reduction of hematite. After the EDS analysis, it was found out that the iron content formed after the reduction process was 46.23 wt %.

An Intelligent Recommendations on Mobile Pose Identification
Authors:- Fahisa Pallikkattil, Asst. Prof. Shabna.M

Abstract:- These days MEMS sensors like accelerometer, gyroscope, and magnetometers are spreading in a wide range of applications due to its smaller size, cheapness and expanding execution. For occasion, smartphones are right now prepared with these kind of sensors. Which may well be utilized to make strides the client involvement of the phone itself or the route functionalities. In this work, these sensor measurements are exploited to provide advanced information about the user bringing the phone. Here proposed an intelligent concept is applying on the mobile web browser. Depending upon the state of the user detected by sensor, the intelligent web browser offer assistance to associate the client and can consequently recognize the textual size estimate and brightness. Light alteration is according to the brightness. These are the applications that we will perform by utilizing our proposed strategy. For the proposed framework a web application is utilized in both server side and user side. The intelligent mobile browser concept offer assistance to associate the recognized information that collected by sensor.

Solvent Extraction Study of Injection Moulded M2 High Speed Steel Using Palm Stearin/Waste Rubber Based Binder
Authors:- M.A.Omar, N. Wahab

Abstract:- Metal Injection Moulding (MIM) has undergone development of various binder systems with the aims of shortening the overall debinding time duration. In the present work, a novel binder system based on waste rubber has been utilised in injection moulding of Molybdenum High Speed Steel (M2 HSS). The feedstock consisted of M2 HSS powder with mean diameter particle size of 16µm and binder which comprised of palm stearin, polyethylene, waste rubber and stearic acid. The moulded part was immersed into n-heptane at 60°C in order to remove the paraffin wax and stearic acid, followed by sintering in a controlled vacuum atmosphere. Results showed that solvent extraction debinding technique allowed complete removal of paraffin wax and stearic acid from the injection moulded part within 2 hours without swelling or distortion of the debound part. Scanning Electron Microscopy observation showed that large pores were formed from the surface to the interior of the debound part during the process. In addition, this technique was found to be suitable to shorten the debinding time, which consequently resulted in a debound part.

Collation: Features Extraction in Text Classification
Authors:- Shireen MT, Nahan Rahaman MK

Abstract:- In the last few years, a difference of deep learning models has been applied to natural language processing (NLP) to improve the ability of computers to understand human speech as it is spoken. NLP helps to analyse, understand, and derive meaning from human language in a smart and useful way. For impressive performance of deep learning methods on challenging NLP processing problems we use some text classification features extraction means that distribution representation for text or words that allows the words with same meaning to have similar representation as real valued vectors in a predefined vector space. In this paper we are comparing the learning technique like Bag of words (BOW), Term frequency-inverse document frequency(tf-idf), word2vec, Glove in word embedding and also explaining the advantage and disadvantage.

Enhanced QR: Approaches for QR Code Embedding Techniques
Authors:- Swathi Krishna P S, Meera K

Abstract:- In recent years, QR codes have grown more widespread in facilitating digital-based commercial scenarios like product promotion, mobile payment, and product information management. These 2D barcodes are square-shaped matrices of dark or light pixels employed to encode and promptly retrieve data utilizing computer devices. According to the international standards, quick response (QR) codes are considered an advancement from older, unidimensional barcodes. Traditional QR codes are reliable and fast to decode but lack aesthetic appearance to demonstrate customers’ visual information. This paper explains various methods of data to embed data QR codes. In order to minimize processing time, the optimization technique considers the mechanics of a standard binarization method, genetic algorithm, etc. These embeddings are suitable with standard decoding and can be applied to any color images with full area coverage.

Design of College Chatbot using Amazon Web Services
Authors:- Dhanush Pakanati , Gourav Thanner , R. Ravinder Reddy

Abstract:- As the mobile and web-based applications have increased rapidly there is a growing need for chatbots. A chatbot helps in easy navigation through a website, simplifies the process of searching information and helps in understanding the needs of the customer. Over the years, the world has seen multiple uses of chatbots implemented in banking and e-commerce platforms. Inspired by these examples, a chatbot for college website can provide various functionalities to the students, lecturers, and visitors. This chatbot can provide information like announcements, quick links to various subjects in the site, account related information for registered users. Students and lecturers can mostly use this to access their college portals to check numerous things like attendance, examination results, assignments deadlines and timetables etc. This deviation from traditional search capabilities through a website can reduce the search time and can make accessing information easier. It also provides an engaging user interaction and imitate real life conversations for the users. Also, such functionalities implemented via cloud are economical and easy to update.

Review Article Improvement Of Power Flow And Voltagestability Using Upfc With Artificial Neural Network In Matlab
Authors:- Bipul vats Khurana. Dr.L.S.Titare

Abstract:- The increasing pressure on the power system increases the complexity that is becoming a concern for the stability of the power system and mainly for transitory stability. To operate the system in the event of faults, Flexible AC Transmission System (FACTS) devices that provide opportunities to control the power and damping oscillations are used. This paper presents the enhancement transient stability of the Multi-Machine power system (MMPS) with Unified Power Flow Controller (UPFC) by using Artificial Neural Network (ANN) controller. Performance the power system under event of fault is investigating by utilizes the proposed the strategy to simulate the operational characteristics of power system by the UPFC using Artificial Neural Network (ANN) controller. The simulation results show the behavior of power system with and without UPFC, that the proposed (ANN) technicality has enhanced response the system, that since it gives undershoot and over-shoot previously existence minimized in the transitions, it has a ripple lower. The use (MATLAB R2014a) in all simulations carried out.

Online Toxic Speech: Automatic Detection Methods and Techniques
Authors:- Asmi P, Sanaj M S

Abstract:- Nowadays, due to the increase of social media individuals are freely to communicate and also to express their thoughts of viewspublicly.It may be a text including blog post, updated status or comments posted on the social media. Some of them misuse the freedom of speech by harass in got hers. With the exponential growth of online communication, the hate speech behavior also goes unchecked to alarming proportion. Speech may be normal, hate or offensive. Hate speech or toxic speech is an antisocial behavior. Thus, it is important to detect and remove the toxic or hate speech from the social media. Which is also a challenging problem. This paper gives a brief explanation about different toxic speech detection methods.

Review: Methods of Steganalysis Of Digital Images
Authors:- Muhsina Jasmin Parapparambil, Haseena P.V

Abstract:- Nowadays cybercriminals excavate malicious data to your devices in different ways. In such cybercrime, the use of steganography needs an effective technique. Cryptography consists of a scrambled message that is not easily understandable. The main aim of steganography is to hide the data or information, by embedding it into an image, audio, video, or text files. So, unauthorized users cannot access the hidden information. The study of steganography is called steganalysis, which is used to detect hidden messages. So, this paper gives a comparative study between different methods used for the steganalysis process. The comparison network is based on digital images. This method is the best challenge for digital forensic investigation.

Reduction of Iron Oxide using Microwave Irradiation
Authors:- Ravindra Kumar Verma, Prof. Krishana Bhushan Patel

Abstract:- The reduction of iron ore with carbon was investigated using a microwave heating techniques. The heat generated by the reaction mixtures while interacting with microwave, percentage, chemical composition and microstructure of iron produced were studied in detail. The experiments were carried out using 2.45 GHz microwave processor and reaction rates were analyzed at different power ratings: 540, 720 and 900 watts. The maximum reduction in weight obtained was 50.47% at 900 W power supply. The effect of varying the concentration of binders was also studied. Unlike conventional processing the microwave heating was found to be through the absorption of microwaves by reaction mixtures. The microwave processing showed considerable reduction in reaction time increases the yield and also reduces unwanted side reactions. However it showed uneven heating as the heating is due to the distribution of microwave absorbers present in the reaction mixture. Solid state reduction was observed at initial 10-40 minutes and molten iron produced above 40 minutes and the temperature attained was around 8000C. The microwave reduced mixture were characterized using SEM, EDS and XRD technique to find out the reduction of hematite. After the EDS analysis, it was found out that the iron content formed after the reduction process was 46.23 wt %.

Impact of Online learning during Covid-19 – An Empirical Investigation
Authors:- Mateen Yousuf

Abstract:- Online education changes the pedagogy and components of conventional teaching. Research conducted on the issues and challenges faced in online teaching learning process have raised many issues in online education. Covid-19 has enabled access to online education to masses which gave rise to new challenges previously unknown to researchers. Review of literature has identified many issues but the research seems to be incomplete. This research aims at identifying the trends, issues and challenges faced by students and teaching instructors during Covid-19 during their access to online education. Issues faced by students and teaching instructors include technical issues, psychological issues, sociological issues, health issues, time management, lack of training, issues related to content and interface of electronic gadgets and educational applications. To mitigate these problems, schools need to provide training to the instructors, rope in psychologists, doctors, health experts and private players to address various genuine concerns. Technical support to instructors must be provided as well help in content development.

Non Orthogonal Multiple Access: A Survey
Authors:- Reshma Ramachandran , Radhika P

Abstract:- The densification of portable organizations should empower the fifth generation (5G) versatile organizations to adapt to the regularly expanding interest for higher rate traffic, improved reliability and reduced latency. Non-Orthogonal Multiple Access (NOMA) has as of late arose as a potential access conspire for the fifth era of portable frameworks. It comprises in exploiting another domain for power domain, user multiplexing, by exploiting the channel gain difference between paired clients on the equivalent subcarrier. User partition is done at the recipient side, utilizing Successive Interference Cancellation (SIC). Thusly, NOMA can expand normal framework throughput by over 30% compared to orthogonal signalling, while additionally improving cell-edge user experience. Additionally, NOMA verifiably fortifies the reasonableness between clients situated in a similar cell, and evades the underutilization of subcarriers experienced when a cell-edge client is planned alone utilizing OFDM. In this paper we are discussing techniques, features of NOMA.

RPL:IPv6 Routing Protocol for Low Power and Lossy Networks
Authors:- Shubham Saini, Tarun Dhiman

Abstract:- Today, LLn represent most important (interesting) research areas in wireless sensor networks. In which we study about wireless personal area, networks and wireless sensor network these network use to save energy high performance, support traffic network (Pattern). it run on a routing over link layer with restricted frame size and many other. this paper represent protocol performance in smart grid applications based on it.which is design for overcome routing issues in implements to reduces of energy consumptions such as dynamics sending rate of control messages and addressing topologies which is send support not only of traffic pattern but also support traffic following from a gateway node to all other network. this paper focus on Rpl and wireless sensor networks of brief overviews.

Analytical Study on Automobile Engine Line Work Stations and Analyze Their Working
Authors:- Anupam Pandey, Prof. Krishana Bhushan Patel

Abstract:- In an automobile assembly line, a series of stations are arranged along a conveyor belt and an automated guided vehicle performs on tasks at each station. Parallel assembly lines can provide improving line balance, productivity and so on. Combining robotic and parallel assembly lines ensure increasing flexibility of system, capacity and decreasing breakdown sensitivity. Although afore mentioned benefits, balancing of robotic parallel assembly lines is lacking – to the best knowledge of the authors- in the literature. Therefore, an observed study is proposed to define/solve the problem of automobile assembly line. The automobile assembly line also tested on the generated benchmark problems for automated guided vehicle/robotic parallel assembly line balancing problem. The superior performances of the proposed algorithms are verified by using a statistical test. The results show that the algorithms are very competitive and promising tool for further researches in the literature.

Use of Open Source Applications in Higher Learning by Prospective Computer Science Teachers in Abubakar Tafawa Balewa University, Bauchi-Nigeria
Authors:- Sadiq Adamu , Jonathan Johnson Kuba

Abstract:- This study investigated the use of open source application in higher learning by prospective computer teachers. Colleges and universities are increasingly aware of the necessity to use technology to meet both the business and academic mission of the institution. Often, open source software (OSS) and Free Source Software (FSS) are seen as viable options for meeting these challenges. Many Institutions are recognizing the importance of the interplay or overlap between FSS and OSS as an important feature for providing high quality teaching and educational experiences. Descriptive survey research design was used, which typically employs the use of questionnaire, sampling random sampling was adopted, where 79 respondents were as the sample size of the study. The finding of the research shows that the prospective teachers of computer education in ATBU are aware of the open source application, but lack of awareness about the uses and benefits of open source software, is a large factor towards less use of open source software. Factors inhibiting the optimal utilization of open source Application by prospective computer science teachers are: Unfamiliarity, Complex licensing situation, backward compatibility issues, Component and architecture incompatibilities and Migration and usage. The Findings of this study serves as the basis for making the following recommendations: Educational institutions should not spend huge money on proprietary software and Universities should replace the proprietary software by open source software for saving the money of license renewal fee, up gradation charges etc. to encourage the use, accessibility and benefits of Open Source Software by student, The school website should be linked to Datamation which highlights a list of open source software related to a particular category such as security, cloud computing, small businesses, big data, games, etc.

Machine Learning Based Defensive Alerting System in a Vehicular Network: A Survey
Authors:- Raseela.KP, Sreevarsha.V

Abstract:- Reckless driving accounts for most of the road accidents, consistent monitoring of reckless maneuver and timely activation of corrective feedback are the best remedial here comes the significance of a defensive alerting system in a vehicular network ,which examines the vehicle throughout whether it showing any reckless behavior in driving ,this timely monitoring duty is reserved for its neighbor vehicle and the neighbor vehicle sends the reckless alert to the road side unit which in turn sends to the cloud server. This cloud server generates warning alerts to approaching neighboring vehicles in that road segment .machine learning algorithms like support vector machine and decision tree are used to classify vehicular datasets .this server client based system implemented in a traffic simulator for evaluation.

Channel Estimation and Beam Squint For Wideband Mmwave Massive Mimo-Ofdm Systems A Survey
Authors:- Vishnu Priya P, Vipin Krishnan C V

Abstract:- Millimeter-wave (mmW) frequencies somewhere in the range of 30 and 300 GHz are another wilderness for cell correspondence that offers the guarantee of significant degrees more noteworthy data transmissions joined with additional increases by means of beamforming and spatial multiplexing from multi component reception. The mix of millimeter-wave interchanges, exhibits with a large number of recieving wires, and little cell calculations is a assembly together of advances that can possibly improve remote access and throughput. The exhibition of multiple input multiple output (MIMO) frameworks is vigorously influenced by pilot contamination. A low-unpredictability channel assessment for mixture millimeter wave (mmWave) frameworks, where the quantity of radio frequency (RF) chains is considerably less than the quantity of reception signal prepared at each handset. The attainable spectral efficiency (SE) of MIMO transmission frameworks with spatial wide band effect structures dependent on discrete fourier transform (DFT) handling, where the base station (BS) has amazing channel state data and baseband preparing is performed by zero-forcing precoding. Transmission plot that abuses the spatial levels of independence from enormous reception apparatus exhibits to amplify the downlink whole pace of user in a heterogeneous organization. With the expanding size of recieving clusters in wideband millimeter-wave (mmWave) interchanges, the actual engendering deferrals of electromagnetic waves bridging the entire exhibit will turn out to be huge and equivalent to the time-domain test period and update channels with a fundamentally limited quantity of preparing and user input in FDD frameworks.

Synthesis, Characterization and Wear Behavior of Co0.5 CrCu0.5 Fe Ni1.5 Al Ti0.4 and Co Cr Fe Ni Al0.25 Ti0.75 High Entropy Alloy (Hea) Prepared by Mechanical Alloying
Authors:- Rajeev Kumar, Prof. Krishana Bhushan Patel

Abstract:- Structure-tribological property relations have been studied for two high entropy alloys (HEAs). Microhardness, room temperature sliding friction coefficients and wear rates were determined for two HEAs: Co0.5CrCu0.5Fe Ni1.5AlTi0.4 and Co Cr Fe Ni Al0.25 Ti0.75. Wear surfaces were characterized with scanning electron microscopy and micro-Raman spectroscopy to determine the wear mechanisms and tribochemical phases, respectively. It was determined that the both HEAs exhibit an excellent balance of high hardness and lower wear rates compared to 440C stainless steel, a currently used bearing steel. This was attributed to their more ductile body centered cubic (BCC) solid solution phase along with the formation of tribochemical Cr oxide and Ti oxide phases, respectively, in the wear surfaces. This study provides guidelines for fabricating novel, low-friction, and wear-resistant HEAs for potential use at room and elevated temperatures, which will help reduce energy and material losses in friction and wear applications.

Study of Microstructure and Hardness Along With Compression Test of Heat Treated Aluminium 2014 Alloy
Authors:- Dharmendra Kumar Kumhar, Prof. Krishana Bhushan Patel

Abstract:- Microstructures, hardness and true stress strain through compression test have been studied for for Aluminium 2014 alloy. Heat treated surfaces were characterized with scanning electron microscopy (SEM) and optical microscopy to determine the mechanisms and phases. It was determined that the heat treated alloy with aging of 3 hours and 6 hours shows an excellent balance of high hardness and lower strain rates compared to non heat treated Al alloy. This was attributed to their more ductile body centered cubic (BCC) solid solution phase along with the formation of Mg2Si phases. The XRD analysis of non heat treated 2014 alloy shows the distribution of Mg2Si in Alloy as a measure element for strengthen the alloy. This study provides guidelines for fabricating novel, high compressive strength, and high hardness Al 2014 alloy for potential use where low weight high strength required.

Online Task Allocation and Flying Control in Fog-Aided Internet of Drones: A Survey
Authors:- Jobin Mathew , Deepa T

Abstract:- Internet of Drones (IoD) networks utilize mist hubs to give processing assets to the postponement touchy assignments offloaded from drones. In IoD networks, drones are dispatched to finish an excursion wherein a few areas of interest are visited. At every area, a robot gathers the ground data, creates figuring assignments and offloads them to the haze hubs for preparing. In our work, we think about both the errand designation (which conveys undertakings to various mist hubs) and the flying control (which changes the robot’s flying velocity) to limit the robot’s excursion fruition time obliged by the robot’s battery limit and assignment consummation cutoff times. We detail this joint streamlining issue as a blended number non-direct programming (MINLP) issue. Regarding the handy situation that the future undertaking data is hard to acquire, we plan an online calculation to give techniques to task assignment and flying control when the robot visits every area without knowing what’s to come. The exhibitions of our proposed online calculation are shown by means of broad recreations.

Electro Chemical Machining Of Micropin Tool by Using Ultrasonic Vibration PolishingAluminium 2014 Alloy
Authors:- Vivek Mishra, Prof. Krishana Bhushan Patel

Abstract:-Micro Electric chemical Machining (MECM) is one of the most efficiently employed non-traditional machining process for cutting hard-to-cut materials & to cut geometrically complex shapes that are difficult to machine by conventional machines. In the present paper reviews is conducted of experimental investigations carried out to study the effect of Electric chemical Machining parameters on material removal rate (MRR), electrode wear (EWR), surface roughness (Ra) and diameteral overcut n corrosion resistant stainless steels. The non-contact machining technique has been continuously evolving from a mere tool and die making process to a microscale application machining alternative attracting a significant amount of research nterests and Electrochemical machining offers several special advantages including higher machining rate, better precision and control, and a wider range of materials that can be machined.

Utilization of Fly Ash in Bitumen And In Flexible Pavements
Authors:- M.Tech. Scholar Asif Ahmad Lone , Assistant Professor Chitranjan Kumar

Abstract:- Flexible pavements with bituminous surfacing are widely used in India. Exponential increase in traffic, overloading of commercial vehicles and significant variations in daily and seasonal temperatures have shown some limitations of conventional bitumen performance.Early developments of distress symptoms like cracking, rutting, raveling, undulations, shoving and potholing of bituminous surfacing have been reported for flexible pavements.A bituminous mixture needs to be flexible enough at low service temperatures to prevent pavement cracking and to be stiff enough at high service temperature to prevent rutting. Bitumen modified with fly ash offers a combination of performance related benefits as the physical properties of the bitumen is improved without changing the chemical nature of it.This paper presents the experimental study carried out conventional bitumen and fly ash modified binder. It has been shown that marshal stability, flow value, ductility, rutting resistance, indirect tensile strength and resilient modulus of the bituminous concrete mix with fly ash modified bitumen is significantly improved.The advantage with fly ash is it is easily available and their cost low and it is a waste material.These additives increase the elasticity, decrease the brittle point and increase the softening point of the bitumen. This, in turn, will alter the properties of the mix in which such modified bitumen is used and these mixes will exhibit greater stiffness at higher temperature and high flexibility at low temperatures.

Product Development Hand Rail Assisting Walking Cane for Physically Aid
Authors:- Bankapalli Vamsi, MD Affan, Kancharana Sohith, Sasubilli Rakesh Rao

Abstract:- One of the basic problems of the user with conventional walking cane is overcoming the balancing problems in congested areas (i.e. Non-spacious regions such as bathrooms, offices, Indian middle class houses, etc.). Even though many research studies have been reported in different fields to increase the independence of users, the question of overcoming these problems always remains a topic of discussion for many researchers. Our project mainly concentrates on the difficulties encountered during walking and to lay for a support to hold on something in non-spacious regions. This idea is truly based on capital involvement to buy different kind of things many a times. Ending up with one tool that can solve our basic needs is better concern. Some time was spent on the project to fix the metrology regarding the dimension, and having a tough sketch the CAD models is done Autodesk fusion 360 and Dassault CATIA software. This structure and mechanism will analyze in Ansys software. All the design parameters of the product were based on the standard design of the walking cane in India. The major part of the project focuses on the proposed design concept and concludes by discussing the physical working model of the proposed design.

A Student Network Model for Image Classification
Authors:- Saleema N P, Sruthy K G

Abstract:- – Nowadays, Convolutional Neural Network achieved remarkable changes in image classification. To obtain the demanding precision of the categorized image we need a high-performance GPU and Huge datasets are necessary for training images. Image classification is computationally very expensive since it requires high-performance hardware devices and memory storage. So to tackle this issue we propose a student network model by utilizing the Knowledge Distillation technique, Let small networks learn from big teacher networks with accuracy compete with teacher networks.There exist many methods for trimming the convolutional neural network and designing a small network. But all these techniques are very expensive and have not achieved great results. The proposed model addresses the aforementioned issues effectively.

Face Expression Recognition : A Review
Authors:- M.Tech. Scholar Vaishali Sharma, Asst. Prof. Vijay Yadav

Abstract:- Recognition of out ward appearances assumes a significant job in many mechanized frame work applications like mechanical technology, instruction, man-made brainpower, and security. Perceiving outward appearances precisely is testing. Approaches for explaining FER (Facial Expression Recognition) issue can be ordered nto 1) Static single pictures and 2) Image successions. Customarily, various procedures like Multi- layer Perceptron Model, k-Nearest Neighbors, Support Vector Machines were utilized by scientists for fathoming FER. These techniques removed highlights like Local Binary Patterns, Eigenfaces, Face-milestone highlights, and Texture highlights. Among every one of these techniques, Neural Networks have increased especially iubiquity and they are broadly utilized ifor FER. As of late, CNNs (Convolutional Neural Networks) have picked up inotoriety in field of profound learning in view of their easygoing engineering and capacity to give great outcomes without prerequisite of manual component extraction from crude ipicture information. This paper centers around review of different face demeanor acknowledgment methods dependent on CNN. It incorporates cutting edge techniques proposed by various scientists. The paper additionally shows steps required for utilization of CNN for FER. This paper additionally incorporates examination of CNN based methodologies and issues requiring consideration while picking CNN for unraveling FER.

Comparative Study on Environmental Pollution through Software Techniques
Authors:-Assistant Professor C.Brintha Malar, Associate Professor K.Siva Sankar

Abstract:- Water pollution is one of the serious threats to the society, as water is the primary need of every organism thriving on earth. It is necessary to control and detect water pollution by assessing the quality of water. However, the production of wastewater is always there and is inevitable. Hence, it is equally important to treat the wastewater in a better way, such that the environment is not affected. The pollution control board has formulated certain standards, which provides the range of values for each pollutant and the feasible discharge locations. Taking these standards as the input for training the system, this work extracts basic statistical features such as mean, standard deviation, entropy and variance for training the classification system. The ensemble classification is incorporated, which includes k-Nearest Neighbour (k-NN), Support Vector Machine (SVM) and Extreme Learning Machine (ELM). The performance of the proposed approach is evaluated in terms of accuracy, sensitivity and specificity. The results of the proposed approach are found to be satisfactory.

A Review : Cyber Warfare
Authors:- Phd Scholar Col Bhim Sen, Dr. F. R. Khan, Dr. S.M. Salim (HOD)

Abstract:- The paper defines that cyber Warfare s a vast topic with various subtopics receiving attention from the research community. It’s a new type of warfare, merely a new weapon that is merged with the traditional conflict. In this generation of mankind, the arrival and the global expansion of the internet is being proved as the fastest and the most powerful technological revolution. Today we are in the situation where we have to decide which governing laws apply to cyber warfare and how much it really applied. Cyber warfare. During research it seemed critical to understand the current situation and the boundaries that are crossed and cyber warfare.

A Review Article ofAnalysis of Islanding Phenomenon in PV Connected System with Protection of Its Effects
Authors:- Manish Kumar, Arun Pachori

Abstract:- The investiture in Distributed Generations (DGs) technologies have begun to monopolies transmission system’s architecture instantaneously after announcing its liberation and deregulation of the energy market to the public. Such movement has propelled vicious competitions among power generation companies to initiate superior innovations in meeting consumers’ needs, administering high power quality yet economical. With the integration of DG technologies, power grid operations have dynamically benefited from such commendable services which apprehend power failures from transpiring; securing power quality, accommodating capricious demand curve, fault compensatory applications and other auxiliary services. Subsequently, the presence of DGs have re-volutionised power grid management to conceive off-grid and self-sustaining criterion where grid/islanding topology adaptations are commonly affiliated.

Prediction of Colon Cancer Using Region Seed Growing Segmentation and Dnn Classifier
Authors:- Asst. Prof. M.V.Crispin, Asst. Prof. T. Anandhan, Asst. Prof. Kpv Pinkey Roshan

Abstract:- To determine the clinical manifestations and optimal management of patients with colorectal cancer (CRC) metastasis advanced malignancy we propose a new predictive modelling by using region seed growing segmentation and classification for predicting the colon cancer disease through continuous monitoring. Here, the region seed growing is used and which is based on transition region extraction for effective image segmentation. Moreover, region seed growing algorithm is used to categorize the transitional region features from the colon cancer image. Inaddition, We used to establish the deep neural network concept for training the image and testing the image with the help of weight estimating classifier.The experiments have been conducted by using the standard images that are collected from database and the current health data which are collected from patient. The results proved that the performance of the proposed prediction model which is able to achieve the better accuracy when it is compared with other existing prediction model.

IOT Based Disease Monitoring System for Apple Orchardin Himachal Pradesh
Authors:- Karuna Sheel, Dr. Anil Sharma

Abstract:- IoT is the technology which has a huge contribution now a days in the diverse application areas. Apple, a cash crop, is one of the fruits which is high in demand throughout the year. Himachal Pradesh secured second largest placein India for apple production. The economy of this state is predominantly dependent on apple cultivation.Fluctuation in climate and weather conditionshave a huge impact on production and quality of apple and plant as well. The success of apple production highly depends on climatic and environmental factor like temperature and humidity. The present study is focusing to design an IoT based system to predict the various diseases and their impact on the apple during the different whether conditions. For this, some popular IoT boards with sensors, and Wi-Fi transreceiver will be used to monitor the data which can be evaluated for further recommendations.

A Review Article of Improvement of Solid Oxide Fuel Power Plant Efficiency Using Power System Topology
Authors:- Raunak Kumar Jha, Dr.L.S.Titare

Abstract:- Fuel cell technology is a relatively new energy-saving technology that has the potential to compete with the conventional existing generation facilities. Among the various Distributed Generation or onsite generation or localized generation technologies available, fuel cells are being considered as a potential source of electricity because they have no geographic limitations and can be placed anywhere on a distribution system. Fuel cells have numerous benefits which make them superior compared to the other technologies. The integration of the fuel cell system is to provide the continuous power supply to the load as per the demand. In this paper, design and modeling of Solid Oxide Fuel cell (SOFC) is discussed for the distributed generation applications. Modeling and simulations are carried out in MATLAB Simulink platform. Solid oxide fuel cells operate at temperatures near these are highly efficient combined heat and electric power. Modeling of SOFC is done by using by using Nernst equation. In that the output power of the fuel cell can be controlled by controlling the flow rate of the fuels used in the process.

Modeling and Optimization of Self-Organizing Energy- Saving Mechanism for Het Nets
Authors:- Mohit Kumar Soni, Prof. Ratan Singh

Abstract:- Smart and versatile wireless devices brings with them, an ever continuing challenge of finding efficient means for resource usage. Scope and avenues for capacity and coverage improvement in cellular networks are constantly explored. Deployment of small cells such as microcells, Pico cells, hotspots, and relays proved an effective solution to improve network coverage and capacity. However, this increase in performance occurs with the cost of deployment and maintenance of additional base stations. Another interesting solution to improve coverage and network capacity is the use of user equipment with relaying support. Currently, mobile devices are equipped with higher processing power and battery life and hence can act as relay nodes in idle slots for nearby users which have lower coverage. This project explores the possibility of user equipment deployed as relays node in heterogeneous networks and analyses the performance improvement for the same. And also analyses the energy efficiency aspect of such communication and show that using user equipment’s as relay helps improving energy efficiency too. Obtained results are verified using extensive simulations.

The Potentiality Examination of Mixture Imitative Resistive System for Infringement Quested Based On Hybrid Belief Function
Authors:- Rajesh Kumar, Prof. Ratan Singh

Abstract:- – The aim of this analysis is the creation and associate build up the system to forestall an organism against each well-known and new attacks, and functions as an adaptive distributed defense system or adaptive artificial system. Artificial Immune Systems abstract the structure of immune systems to include memory, fault detection and adaptive learning. We tend to propose associate system primarily based real time intrusion detection system exploitation supervised learning algorithmic rule. Basically that system or model consists of two layers.
A probabilistic model primarily based T-cell formula that identifies potential attacks, and
A call tree primarily based B-cell model that uses the output from T-cellsalong with feature info to verify true attacks.
The formula is tested on the KDD 99 information, wherever it achieves an occasionalwarning rate whereas maintaining a high detection rate. This can be true even just in case of novel attacks, that may be an important improvement over alternative algorithms.

A Review on effect of positioning of RCC shear walls of different shapes on seismic performance of building resting on sloping ground using STAAD-Pro
Authors:- M.Tech Scholar Ayush Kumar Agrawal, Prof.Nitesh Kushwaha

Abstract:- Reinforced concrete (RC) buildings often have vertical plate-like RC walls called Shear Walls in addition to slabs, beams and columns. These walls generally start at foundation level and are continuous throughout the building height. Their thickness can be as low as 150mm, or as high as 400mm in high rise buildings. Shear walls are usually provided along both length and width of buildings. Shear walls are like vertically-oriented wide beams that carry earthquake loads downwards to the foundation.Properly designed and detailed buildings with shear walls have shown very good performance in past earthquakes. Shear walls provide large strength and stiffness to buildings in the direction of their orientation, which significantly reduces lateral sway of the building and thereby reduces damage to structure and its contents. Shear walls in high seismic regions require special detailing. However, in past earthquakes, even buildings with sufficient amount of walls that were not specially detailed for seismic performance (but had enough welldistributed reinforcement) were saved from collapse. Shear wall buildings are a popular choice in many earthquake prone countries, like Chile, New Zealand and USA.
Keywords: RCC, shear wall, building, earthquake loads

Review of Structural Diagrid in Tall Building
Authors:- M. Tech. Scholar Naveen Rewapati, Asst. Prof. Priyanka Dubey

Abstract:- In the modern world due to overpopulation and decrease in the landmass in the cities the need to make high rise structure is now more prevalent than ever before and hence many solutions like outrigger, shear wall and diagrid are available in the structural stability of high rise. This paper deals with the previous research of on diagrids as an emerging alternative to control the lateral displacement in high rise.

Review of Structural Diagrid in Tall Building
Authors:- M. Tech. Scholar Deepak Birla, Asst. Prof. Ashwin Hardiya

Abstract:- Fiber-reinforced polymer (FRP) materials are used in different configration and techniques for strengthening of Reinforced concrete (RC) elements to ensure their longer service life. Use of FRP material as Externally bonded surface is one of the popular strengthening techniques that consists of bond in FRP material using primer and saturant.

Review of GRPF Strengthen Column
Authors:- M. Tech. Scholar Farooq Khan, Asst. Prof. Ashwin Hardiya

Abstract:- Multiplication in hardware can be implemented in two ways either by using more hardware for achieving fast execution or by using less hardware and end up with slow execution. The area and speed of the multiplier is an important issue, increment in speed results in large area consumption and vice versa. Multipliers play vital role in most of the high performance systems. Performances of a system depend to a great extent on the performance of multiplier thus multipliers should be fast and consume less area and hardware. This idea forced us to study and review about the Booth’s Algorithm, modified Booth’s algorithm and its radix-2, radix-4, radix-8 forms.

RE Wall: A Review On An Innovation In Construction Industry
Authors:- M. Tech. Scholar Salman Shaikh, Assistant Prof. Priyanka Dubey

Abstract:- Retaining Wall has been a structure that has been used from ancient times in order to provide stability to slope of soil and prevent the downhill or mound from landslide. The current thesis gives an insight about the usage of conventional cantilever retaining wall and cantilever Wall with shelf relief. The comparison and analysis has been done manually and in Standard analysis package STAAD – Pro. The difference in results of staad and manual calculation were less than 10%. The moment and the deflection at top of cantilever were observed and noted. The FEM element used to perform the analysis in Staad Pro is Shell element. All the lateral and vertical loads were calculated and assigned to the model with corresponding grade of concrete and Steel.

Study of Different Types of Mixer Topologies
Authors:- M. Tech. Scholar Rohit Kumar Sonkar, Assistant Professor K. K. Sharma

Abstract:- In this paper, a comparative study of different types of mixer topologies is presented. Gilbert cell is widely used as core of the mixer because it provides high conversion gain, good port-to-port isolation and low even-order distortion. It is found that the linearity of mixer is very good for Multi-Tanh technique by incorporating multiple differential trans-conductance stage but it reaches to very low conversion gain whereas, use of current bleeding technique increase linearity and conversion gain of the mixer by adding current source to increase the bias current at the expense of power consumption. A very low value of noise figure can be achieved with the switched biasing technique by replacing current source with parallel connected nMOS transistors but due to use of the transistor in place of tail current source, linearity is degraded and more power is consumed. Folded Cascode Technique is used to reduce DC supply voltage by folding the LO switching stage with pMOS transistors in switching stage but it degrades the noise figure. Bulk-driven technique can be employed to lower down the power consumption by providing the switching action via the gate of LO (RF) and amplification by the bulk of LO (RF) transistors, however it reduces the linearity. High linearity is obtained by using CCPD (Cross coupled post distortion) technique by cancelling of third order derivatives but it decreases the conversion gain and consume more power due to increase in the number of auxiliary transistors. MGTR enables to achieve high linearity by incorporating auxiliary transistor but it decreases the overall conversion gain and increases noise figure of the mixer. So, it is observed that there is a trade-off among the performance metrics, i.e., conversion gain, noise figure linearity, and power consumption of the mixer.

Review of Shear wall in High Rise
Authors:- M.Tech.Scholar Dilip Varvaniya, Asst. Prof. Ashwin Hardiya

Abstract:- In current world scenario with ongoing research for new methodology and techniques to improve the stability of building against seismic and other lateral forces. This paper reviews the effect of frames with and without the shear wall system of simulation conducted by various researchers. Comparison of response of shear wall and RC framed structure will have to be done in future scope of this research work. In order to minimize the damages due to earthquake, shear wall are efficient in terms of cost and effectiveness. On the other hand bracings can absorb great degree of energy which is exerted by earthquake.

Coconut: A Review on a Plentiful Farming Produce
Authors:- M.Tech. Scholar Sandeep Patil, Asst. Prof.Ashwin Hardiya

Abstract:- As there is an economic boom there is an increasing demand for infrastructure in order to accommodate the requirement. As this will lead to high demand for natural construction material and this will deplete them quickly. This paper has been presented in order to give the developers an insight about the usage of alternate material and how it make the whole project structurally and economically feasible. A number of literatures has been reviewed and ultimately the coconut shell has been highlighted for a variety of function such as landfill, light weight concrete and structural concrete. This paper contains a thorough investigation on the application of coconut shell in structural concrete with the percentage of replacement of coconut shell as partially so that natural aggregates usage can be minimized. The experiment has been done in this project has considered 7 days and 28 compressive strength of concrete with no replacement 5%, 10%, 15%, 20% and 25%. The coconut shells are widely available natural material and can be helpful to contribute to the sustainability of the construction.

Review : Important Element in Building: Shear wall vs Brace
Authors:- M.Tech. Scholar Sameer Khan, Asst. Prof. Priyanka Dubey

Abstract:- As new technology are becoming more versatile and commercially available, their usage is also becoming popular in improving the seismic resistance. This paper reviews the effect of shear wall and brace independently on a building for simulation conducted by various researchers.In order to minimize the damages due to earthquake, shear wall are efficient in terms of cost and effectiveness. On the other hand bracings can absorb great degree of energy which is exerted by earthquake.

Challenges of 5G Wireless Technologies
Authors:- M. Tech. Scholar Garima Jain, Dr. Sudhir Agrawal(Dean academics), Prof. Ankit Shrivastava

Abstract:- With the evaluation and simulation of long-term evolution/4G cellular network and hot discussion about new technologies or network architecture for 5G, the appearance of simulation and evaluation guidelines for 5G is in urgent need. This paper analyzes the challenges of building a simulation platform for 5G considering the emerging new technologies and network architectures. Based on the overview of evaluation methodologies issued for 4G candidates, challenges in 5G evaluation are formulated. Additionally, a cloud-based two-level framework of system-level simulator is proposed to validate the candidate technologies and fulfill the promising technology performance identified for 5G.

Implementation and Design of Xilinx Based Booth multiplier
Authors:-M.Tech.Scholar Vinod Kumar Balhar, Asst. Prof. Shiva Bhatnagar

Abstract:- Multiplication in hardware can be implemented in two ways either by using more hardware for achieving fast execution or by using less hardware and end up with slow execution. The area and speed of the multiplier is an important issue, increment in speed results in large area consumption and vice versa. Multipliers play vital role in most of the high performance systems. Performances of a system depend to a great extent on the performance of multiplier thus multipliers should be fast and consume less area and hardware. This idea forced us to study and review about the Booth’s Algorithm, modified Booth’s algorithm and its radix-2, radix-4, radix-8 forms.

Silicon on Insulator Technology Review
Authors:- M.Tech. Scholar Abhishek Soni, Asst.Prof. Shiva Bhatnagar(HOD)

Abstract:- An effort to reduce the power consumption of the circuit, the supply voltage can be reduced leading to reduction of dynamic and static power consumption. This paper introduces one of the greatest future technologies of this decade and that is SOI technology. Silicon-On-Insulator transistors are fabricated in a small (~100 nm) layer of silicon, located on top of a silicon dioxide layer, called buried oxide. This oxide layer provides full dielectric isolation of the transistor and thus most of the parasitic effects present in bulk silicon transistors are eliminated. The structure of the SOI transistor is depicted and is very similar to that of the bulk transistor. The main difference is the presence of the buried oxide it provides attractive properties to the SOI transistor. Power has become one of the most important paradigms of design convergence for multi gigahertz communication such as optical data links wireless products and microprocessor ASIC/SOC designs. POWER consumption has become a bottleneck in microprocessor design. For more than three decades, scientists have been searching for a way to enhance existing silicon technology to speed up the computer performance. This new success in harnessing SOI technology will result in faster computer chips that also require less power a key requirement for extending the battery life of small, hand-held devices that will be pervasive in the future. SOI is a major breakthrough because it advances chip manufacturing one to two years ahead of conventional bulk silicon. The following provides a step-by-step look at the developments leading up to the development of SOI technology.

SVD Based Gesture Detection using Cultural Algorithm for Spectrum Sensing
Authors:- M.Tech. Scholar Rakesh Parmar, Asst.Prof. Shiva Bhatnagar (HOD)

Abstract:- Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. Recent research studied spectrum sensing using energy detection and network cooperation via modeling and simulations. However, there is a lack of experimental study that shows the feasibility and practical performance limits of this approach under real noise and interference sources in wireless channels. This paper presents the development of efficient and reliable spectrum sensing algorithm for cognitive radio network with the help of soft computing techniques. A Cultural Algorithm (CA) optimized model for conventional SVD based spectrum sensing algorithm has been presented.

Review of Wide Bandwidth Low Power Low NOISE Amplifier
Authors:- M.Tech. Scholar Surendra Ningwal, Asst.Prof. K. K. Sharma

Abstract:- Recently, Low noise amplifier versatile used in modern wireless communication like Wi-Max, WLAN, GSM, Bluetooth and satellite communication. Low Noise amplifier have important feature like amplify the signal with rejection of noise. Low noise amplifier in modern communication used as filter with amplifier. In recent scenario low noise amplifier available in wide band, single band, multi-band frequency of application. In present days low noise amplifier, the also reduces the reflection of signal exist by elements and connecting interface inside the amplifier. Low noise amplifier available with high gain, noise rejection and with less power consumption. In this paper review the work of past decades done in low noise amplifier. Low Noise Amplifier (LNA) is versatile used as a broadband mixer, low noise amplifier, power amplifier and Darlington amplifier, active balunes, multiband amplifier. Today technology required high speed of transmission efficiency with small power consumption and less utilization of elements in proposed amplifier, Low Noise Amplifier (LNA) products full fill all requirement of modern wireless communications, so that review and discussion, future requirement of technology is needed to discuss. In this paper discusses issues of low noise amplifier, its application, issues and recent trends. In this paper review some techniques of Low Noise Amplifier (LNA) to improve perform and surveyed almost all the Possible Work of Past Decades.

An Assessment Of Set Back And Step Back Building
Authors:- M.Tech. Scholar Rohit Karoda , Asst.Prof. Priyanka Dubey

Abstract:- India consists of great arc of mountains which consists of Himalayas in its northern part which was formed by on-going tectonic collision of plates Hill buildings are different from those in plains; they are very irregular and unsymmetrical in horizontal and vertical planes, and torsionally coupled. Hence, they are susceptible to severe damage when affected by earthquake ground motion. Such buildings have mass and stiffness varying along the vertical and horizontal planes, resulting the center of mass and center of rigidity do not coincide on various floors.

Numerical Analysis of Air Cooled Condenser using Cfd
Authors:- Research Scholar Pramod Kumar, Assistant Professor Jagdish Saini

Abstract:- In frameworks including heat move, a condenser is a gadget or unit used to gather a substance from its vaporous to its fluid state, reliably by cooling it. thusly, the lethargic warmth will move to the coolant in the condenser. condensers are regularly heat exchangers which have different structures and come in different sizes running from somewhat little to incredibly gigantic present-day scale units utilized in plant structures. air-cooled condensers are utilized in little units like family refrigerators, huge coolers, water coolers, window obliged air structures, split air control systems, minimal bundled compelled air structures, and so forth these are utilized in plants where the cooling load is almost nothing and the rigid proportion of the refrigerant for the pattern of refrigeration is basically nothing. air-cooled condensers are in like way called hover condensers as they are typically made of copper or aluminum contort. air-cooled condensers eat up a practically more noteworthy space than water-cooled condensers.

Tensorflow Based Automatic Personality Recognition Based On Facial, Tone and Resume Analysis
Authors:- Divya Gharaniye, Tejasvini Kale, Gauri Suryavanshi, Prof. Sanjay Jadhav

Abstract:- With the development of artificial intelligence (AI), the automatic analysis of video interviews to recognize individual personality traits has become an active area of research and has applications in personality computing, human-computer interaction, and psychological assessment. Machine learning techniques have led to the establishment of convolutional neural network (CNN) models that can successfully recognize human their personality traits with the use of a camera. In this an end-to-end AI interviewing system was developed using asynchronous video interview (AVI) processing and a TensorFlow AI engine to perform automatic personality recognition (APR) based on the features extracted from the AVIs and the true personality scores from the facial expressions. The main task of this study is to predict the big-five traits personality dimensions from video images by using machine learning techniques and artificial neural networks. In this study, video images and the emotional states of the person obtained from videos were utilized and an artificial intelligence based system was developed to be able to predict automatically the personality traits of a person from videos.

Face Recognition Using PNN Classifier and SIFT Feature Extraction
Authors:- Research Scholar Chitransh Popli, Asst. Prof. Priyanshu Dhameniya

Abstract:- The main motive to design to recognize Automatic Face Recognition is the ability of person’s and identity based on facial characteristics. One of the ways to do this is by comparing selected facial features from the test image and a facial database. Usually, the face image of a test subject is matched to the gallery data using a one-to-one or one-to-many scheme. The one-to-one and one-to-many matching are called verification and identification, the feature extraction on the other hand is usually applied to obtain the relevant facial features such as face regions, variations, angles or measures etc. from the data. The system proposes new approach in extension with local binary pattern called DRLBP and PNN classifier used for classification . By using these methods, the category recognition system has developed for application to image retrieval. The category recognition is to classify an object into one of several predefined categories. The discriminative robust local binary pattern (DRLBP) is used for different object texture and edge contour feature extraction process. It is robust to illumination and contrast variations as it only considers the signs of the pixel differences. The proposed features retain the contrast information of image patterns. They contain both edge and texture information which is desirable for object recognition, the simulated results will be shown that used discriminative robust local binary pattern has better discriminatory power and recognition accuracy compared with prior approaches.

A Review on “Energy-Efficient Spectrum Access in Cognitive Radio
Authors:- M.Tech. Scholar Anita Pandey, Assistant Professor Dr. Shivangini Saxena

Abstract:- In cognitive radio sensor networks (CRSNs), the sensor devices which are enabled to perform dynamic spectrum access have to frequently sense the licensed channel to find idle channels. The behavior of spectrum sensing will consume a lot of battery power of sensor devices and reduce the network lifetime In the next-generation cognitive radio networks, numerous secondary users will share the spectrum resource with the primary users. As it may not be possible to support all the communication rate requirements, there are many supporting sets for the secondary users as long as the communication rates of the primary users are guaranteed? In this paper, we study the maximum feasible set problem to access as many secondary users as possible, under the constraints of power budgets and communication rates in cognitive radio networks. In this interesting issue, the existing literature generally removes a subset of the secondary users so that the remaining users achieve the thresholds with communication rates and power budgets. However, the removal algorithms cause more interference when there are plenty of unsupported secondary users. In this work leverage the spectral radius of the network characteristic matrix as the admission price to access the new secondary user. Then, will design a hybrid access control algorithm to reduce the interference time and approximate the maximum network capacity. Moreover, different supported sets produce the different energy efficiency, even having the same network capacity, while all users require the high communication rates. Numerical results demonstrate that our algorithms will provide the decent energy efficiency under the communication rate constraint the simulation will be perform on MATLAB simulation.

Intrastate Student Migration and Trends: Impact On Urbanisation And Subsequent Migration Behavior
Authors:- Mateen Yousuf

Abstract:-Capital cities in J&K have emerged as hub of education activities and as such students from all over the state migrate to the places seasonally. Srinagar as well as Jammu have emerged as the hub of education where students and aspirants flock to enroll themselves in the institutes of their choice. The availability of large number of teachers, enhanced investment, safety reasons, choice and competition, easily available supplementary and complementary facilities are some of the main reasons why students preferred the urban areas as their ideal choice of education. The objective of this research is to find out the trends of migration of students and teachers from rural to urban places in Kashmir. Various changes that have taken place in time have been observed. The research process involved setting up of focus groups of various stakeholders and discussing the research objectives. The inferences drawn were compared to the hypothesis and compared with the data which was collected through open ended questionnaire. It was found out that parents prefer to send their wards to urban areas to avail various facilities but over the years efforts have been made to setup the same facilities in native towns and villages which was found to have a significant negative impact of growth of educational infrastructure in the urban areas. The trend of shifting to urban areas was found to be positive over the past 30 years. It is recommended that the stakeholders collaborate with government to develop the twin cities in the state of J&K as the hub for education not only among intra-state but inter-state as well.

A Review Articleanalysis of Distribution Grid, Power Loss Reduction and Fault Detection In 33 Bus System Using Optimization
Authors:- Vinay Kumar Gupta, Arun Pachori

Abstract:- Power flow is nothing but the flow of active and reactive power. Power flow analysis is used to determine the steady state operating condition of a power system. In short it is to find the approximate values of various bus voltages, their phase angle, active and reactive power flows through different branches, generators and loads under steady state condition. Newton Raphson methods are generally referred as experience based techniques for solving problem, learning and discovery. Heuristics are simple and efficient rules coded by evolutionary processes. In this Work, ANN, one of such GS have been used to do the power flow analysis in a simple three bus system.

Design and Implementation Low Power Consumption Level Shifter
Authors:- M.Tech. Scholar Kishan Bandil, Professor K. K. Sharma

Abstract:- A voltage level shifter is a circuit which converts low level input voltages to a desired higher level voltage or vice versa as desired, depending upon the system requirements. The major application of a voltage level shifter is in resolving mixed voltage incompatibility. The integrated circuits which are widely used nowadays may have different parts within, which operate at different voltage levels. Most of these circuits were provided with different supply voltage levels which prove to be difficult when the number of supply voltages increases within a single circuit increasing its complexity. Energy efficiency is a primary concern in modern CMOS circuits. Thus level shifters which are capable of converting a single low level voltage to other voltage levels have become useful in circuits having parts operating in multiple voltage domains. In the proposed design, the major aim is to lower the power dissipation and make the circuit faster.

Deep Semantic Image Segmentation using Convolutional Neural Networks for Multi Modal Data
Authors:-Asst.Prof. P Jaganmohan , Asst. Prof. R Suneel Kumar

Abstract:- In this paper, a deep semantic segmentation of aerial imagery based on multi-modal data is discussed. given multi-modal data composed of true orthophotos and the corresponding digital surface models (dsms), we extract a variety of handcrafted radiometric and geometric features which are provided separately and in different combinations as input to a modern deep learning framework. the latter is represented by a residual shuffling convolutional neural network (rscnn) combining the characteristics of a residual network with the advantages of atrous convolution and a shuffling operator to achieve a dense semantic labeling. via performance evaluation on a benchmark dataset, we analyze the value of different feature sets for the semantic segmentation task. the derived results reveal that the use of radiometric features yields better classification results than the use of geometric features for the considered dataset. furthermore, the consideration of data on both modalities leads to an improvement of the classification results. however, the derived results also indicate that the use of all defined features is less favorable than the use of selected features. consequently, data representations derived via feature extraction and feature selection techniques still provide a gain if used as the basis for deep semantic segmentation.

Free Energy Generator Neodium Magnets Repulsion
Authors:- M.Tech. Student Shubham Khatri, Professor Dr. Shailesh Gupta

Abstract:- This thesis is devoted to the design and optimization of magnetic system ,More than 90% world’s power is being generated using electromagnets based on the faraday’s law of electro-magnetic induction. Many new technologies were discovered with time which led a drastic change in the perception of electric energy. But at the same time there is misconception of free energy. Energy becomes free only at a point after which we don’t have to pay for power generation after commissioning the unit. By using the magnetic force of magnets continuous motion (Energy) is generated. We used Neodymium magnets are placed on the outer drum and an inner drum by placing same poles for maximum repultion. Rectangle shaped magnets are placed in such a way that all the north poles or north poles are facing opposite direction.

Artificial Intelligence Based MPPT Algorithm For Grid Connected Solar PV System
Authors:- M. Tech. Student Darshil N Shah, Asst.Prof.Dr. Manisha Shah

Abstract:- On going investigates situated to photovoltaic (pv) frameworks highlight blasting enthusiasm for current decade. for productivity improvement, greatest force point following (mppt) of pv exhibit yield power is obligatory. herein the article, different analytical strategies has been discussed based on ai (artificial intelligence). Conventional mppt techniques provide abridged assembly and execution; also its routine is dishonored after associated through reproduction reasoning techniques are uncertain sense regulator (fl), artificial neuronic grid (ang), flexible nerves- uncertain border structure (fnubs). one of farcical ai based technique which name is flexible nerves uncertain border structure get closer and extra accurate outcome against all the ai based technique and also ordinary systems. likewise, this article demonstrates that the anfis strategy is better in all the ai-based mppt power following plans for low overshoot, high dependability with the higher consistent state condition, and less tedious in yield. as, per this proposed technique to the pv array and applying all kind of conditions to it, effective and enhanced outcome has been arrived.

A Review: Uses of Additives in the Development of Water Treatment Plant Sludge Bricks
Authors:- Nurul Farah Syaheyra Rahmat, Nurul Nadiah Mohd Firdaus Hum

Abstract:- Water treatment plant sludge generation and management has becoming a global problem, leading to increased concern for the environment. Sludge management and recycling into safe building materials have proven as an alternative to waste disposal to reduce environmental and economic pollution. Reused of sludge with additives in brick making industry is a sustainable solution due to increasing demand for bricks in construction works nowadays. This study reviews development of water treatment plant sludge bricks and different additives implemented in brick making process. The study addressed the characteristics of water treatment sludge, the advantages of natural and chemically made additives, as well as the compressive strength and water absorption properties of bricks.

Under Water Imaging by Signal Processing Techniques
Authors:- M.Tech. Nagabathula Ramya, Asst. Prof. Akurathi Gangadhar

Abstract:- SONAR is an acronym for sound Navigation And Ranging. The basic principle of sonar is to use sound to detect or locate objects, typically in the ocean. Sonar technology is similar to other technology such as RADAR (radio Detection And Ranging).Basic radar systems use electromagnetic wave reflections from targets to determine the characteristics of the targets. Synthetic Aperture Radar (SAR) systems use the reflections to produce target images as well. SAR and SAS are an imaging system that produces high resolution images of a scene or target by using motion to synthesize the antenna aperture. While Synthetic Aperture Sonar(SAS) is closely resembles to SAR.In this paper we are demonstrating Synthetic Aperture Sonar (SAS) processing for a point target case. The input raw SAS data is generated and the SAS processing is simulated in Matlab.

Control Strategy for Bidirectional AC-DC Interlinking Converter in AC-DC Hybrid Microgrid Using PV System
Authors:- M.Tech. Scholar Nimesh Upadhyaya, Prof. Madhu Upadhyay

Abstract:- This paper presents optimize energy extraction in photovoltaic (PV) energy systems. The maximum power of the photovoltaic module will change due to changes in temperature, solar radiation and load. To maximize efficiency, the photovoltaic system uses a maximum power point tracker (MPPT) to continuously extract the most power that the solar panel can generate and then pass it on to the load. The overall structure of the MPPT system consists of a DC-DC converter (an electronic device that converts DC energy from one voltage level to another) and a controller. During changes in weather conditions, MPPT uses a tracking algorithm to find and maintain operation at the point of maximum power. Many different algorithms for MPPT have been proposed and discussed in the literature, but most of these methods have disadvantages in terms of efficiency, precision, and flexibility. Due to the non-linear behavior of the current voltage characteristics of the PV module and the non-linearity of the DC-DC converter due to switching, conventional controllers cannot provide an optimal response, especially when dealing with a wide range of shifting line parameters and transients. The purpose of this work is to design and implement a maximum power point tracker using fuzzy logic control algorithms. Fuzzy logic naturally provides an excellent controller for such nonlinear applications. This method also benefits from artificial intelligence methods that can overcome the complexity of modeling nonlinear systems. To make this work a success, Simulink designed and simulated an MPPT system consisting of photovoltaic modules, DC-DC converters, batteries, and fuzzy logic controllers. Perform the characterization of the buck, boost and buck-boost converter to find the most suitable topology for the PV system used. The integrated model of the PV module with the identified converter and battery was simulated in MATLAB to gain the necessary experience to formulate and adjust the fuzzy logic controller. The simulation results show that fuzzy logic.

A Review on Fuzzy Logic Control Based PV Module and Bidirectional Dc-Dc Converter Design
Authors:- M.Tech.Scholar Nimesh Upadhyaya, Prof. Madhu Upadhyaya

Abstract:- This work presents a optimize energy extraction in photovoltaic (PV) energy systems. The maximum power of the photovoltaic module will change due to changes in temperature, solar radiation and load. To maximize efficiency, the photovoltaic system uses a maximum power point tracker (MPPT) to continuously extract the most power that the solar panel can generate and then pass it on to the load. The overall structure of the MPPT system consists of a DC-DC converter (an electronic device that converts DC energy from one voltage level to another) and a controller. During changes in weather conditions, MPPT uses a tracking algorithm to find and maintain operation at the point of maximum power. Many different algorithms for MPPT have been proposed and discussed in the literature, but most of these methods have disadvantages in terms of efficiency, precision, and flexibility. Due to the non-linear behavior of the current voltage characteristics of the PV module and the non-linearity of the DC-DC converter due to switching, conventional controllers cannot provide an optimal response, especially when dealing with a wide range of shifting line parameters and transients. The purpose of this work is to design and implement a maximum power point tracker using fuzzy logic control algorithms. Fuzzy logic naturally provides an excellent controller for such nonlinear applications. This method also benefits from artificial intelligence methods that can overcome the complexity of modeling nonlinear systems. To make this work a success, Simulink designed and simulated an MPPT system consisting of photovoltaic modules, DC-DC converters, batteries, and fuzzy logic controllers. Perform the characterization of the buck, boost and buck-boost converter to find the most suitable topology for the PV system used. The integrated model of the PV module with the identified converter and battery was simulated in MATLAB to gain the necessary experience to formulate and adjust the fuzzy logic controller. The simulation results show that fuzzy logic.

Internet of Thing Based Air Pollution Analysis System Using Sensors
Authors:-ME Student Mistri KulprakashSingh AvatarSingh , Associate Prof. Khansole Balaji

Abstract:- The level of pollution has increased with times by lot of things just like the increase in population, increased vehicle use, industrialization and urbanization which ends up in harmful effects on human wellbeing by directly affecting health of population exposed thereto. so as to watch during this project we are getting to make an IOT Based pollution Monitoring System during which we’ll monitor the Air Quality over an internet server using internet and can trigger a alarm when the air quality goes down beyond a particular level, means when there are sufficient amount of harmful gases are present within air like CO2, smoke, alcohol, benzene and NH3. it’ll show the air quality in PPM and also as on webpage so that we will monitor it very easily. During this IOT project, you can monitor the pollution level from anywhere using your computer or mobile.

Review of Microalgae for Intensified CO2 Fixation & Sustainable Bio-Fuel Production
Authors:- PhD Scholar Manish Sutradhar

Abstract:- Microalgae are the convincing oxygenic photoautotrophic organisms furnished with tremendous potential of performing environmental services and energy recovery to promote carbon neutral bio-economy. There is a major challenge to the global sustainability due to unbalanced production of the CO2. The concentration of CO2 is rising gradually primarily due to human activities such as burning of fossil fuels leads to increase the level of carbon dioxide and has a different ratio of heavy-to-light carbon atoms, so it leaves prominent footprints that instruments can measure. Technologies have thus been developed for enhanced biological carbon fixation. This review briefly examines the current technologies available for enhanced micro algal CO2 fixation and specifically explores eventual production of bio fuels and/or added-value products, with an emphasis on its productivity.

Smart Door Lock Using IOT
Authors:- Student Nirmit Shah, Student Tejas Potekar, Student Shrey Mistry, Asst. Prof. Manish Bhelande

Abstract:- Security has always been a major concern for the households and the office environment. With this consideration, a design and prototype of a keypad-based door lock system has been presented in this paper. This provides tools to enforce reliable logs of system transactions and protect an individual’s right to privacy. Passwords of the authorized users are enrolled and verified to provide access to a facility that is used by multiple users. A user can also be removed and a new user can be enrolled in the system. We have implemented a centralized control system from where we can control who can enter in which rooms and who cannot. It is an Arduino UNO device based flexible working device that provides physical security.

The Application of Weather Forecast using Time Series Analysis
Authors:- Vidhya Vasantrao Sambare, Prof. Arvind Jain

Abstract:- Weather forecasting has been an important application in meteorology and one of the most scientifically and technologically challenging problem around the world. In my study, we have analyzed the use of data mining techniques in forecasting weather. This paper proposes a modern method to develop a service oriented architecture for the weather information systems which forecast weather using these data mining techniques. This can be carried out by using Artificial Neural Network and Decision tree Algorithms and meteorological data collected in Specific time. Algorithm has presented the best results to generate classification rules for the mean weather variables. The results showed that these data mining techniques can be enough for weather forecasting.

Review on Microplastics Abundance in Malaysian Marine Environment
Authors:- Nurul Nadiah Binti Mohd Firdaus Hum, Siti Anisah Binti Zainal Abidin

Abstract:- Microplastics in marine environment posed an alarming threat to aquatic lifeforms, and to human consumers. They are characterized according to their physical appearance (size, shape, colour) and its chemical composition through the types of polymers. However, the study on microplastics in Malaysian marine environment still limited due to few studies conducted. Hence, this study aims to visualize, assess and characterize the microplastics abundance in Malaysian marine environment. Ten years’ duration of literature review (2010 until 2020) was used in this study. For water sample study, the highest microplastics abundance is from coastal area of Pulau Pinang and Langkawi meanwhile, in sediment sample study is from coastal zone at Straits of Johor. Tourisms and industrial are huge contributor on microplastics abundance in Malaysia. Fragment and fiber, dark colours (black, grey) and white showed the most dominant physical characterization of microplastics analyzed. The dominant polymer’s composition is originated from the industry and consumer products.

Wireless Sensor Networks for Distributed Access Control using Priccess Method
Authors:- Asst. Prof. A. Rajiv, Asst. Prof. C. Lakshmi

Abstract:- The Distributed access control allows the network to authorize and grant the permission to user to access the data in Wireless Sensor Network. In terms of providing security and authentication to the Wireless sensor network, our project is created. A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical conditions and to cooperatively pass their data through the network to a main location. The more modern networks are bi- directional, also enabling control of sensor activity. Hence the wireless sensor network is especially creating a high secure environment. Our paper mainly focuses on designing such access control modules for WSNs. It focuses on group sharing too. That is a distributed access control will share the data to all the users in that network whereas it will provide security to the WSN by avoiding a new user to unaccess the data. Sometimes a user does not want to associate his identity to data which he request. Only the data he needs. Because it might helps a new user to know his details while sharing the data. To avoid such issues here in our project we are introducing a query for a group to access the data. Here a single person will act as a leader in a group and he can create a query to sign in. So that the identity of the users will not known by anyone and also the whole group can get the data via this process.

Automatic Glaucoma Detection Using Sobel Edge Detection & Svm Classifier
Authors:-M.Tech.Scholar Akansha Sharma, Asst.Prof.Jayshree Boaddh, Asst.Prof.Jashwant Samar

Abstract:- It is hard to diagnose the glaucoma from single routine test that is why it is supposed as one of the most complex disease for diagnosis. Glaucoma may affect the eyes that reach the deficiency towards either partial blindness or complete blindness. It cannot be treated once it occurred but it can be cured by routine examination. Diagnosing glaucoma on time may save the rest vision but it does not improve the eyesight by treating by any medical experts. An OCT scan is an important test in diagnosing and monitoring glaucoma. Here the system is based on Sobel Edge Detection and Support image processing and classification methods to detect glaucoma by comparing and measuring various parameters of the fundus images of glaucoma patients and general patients.Vector Machine (SVM) Classifier. Sobel can highlight the nerves or blood vessels and segment the fundus optic disc that may or may not affect by glaucoma. On the other hand SVM can classify the affected area or impaired cells that can resulted a better diagnostic system. It is an irregular or polynomial data classification that can work for Iris based fundus images. System acquired 94.45 % of accuracy with minimal false alarm rate and obtains less processing time.

Digital Signature Server Using Elliptic Curve Cryptograpic Algorithm
Authors:- S.B.Sangeetha, Jasmine Sait Mohmmad, Praba.M

Abstract:- Application servers are heavily loaded by performing signature computation Instead of using Application server which act as the tenant to more dedicated proxy called Signature servers called GUESSThus to improve the performance of the GUESS comprehensive implementation of the EDSA is tested against network trafficDigital signatures are encrypted and decrypted using Elliptical curve cryptographic algorithm

A Review of Automatic Glaucoma Detection from Fundus Imaging
Authors:- M.Tech.Scholar Akansha Sharma Asst.Prof. Jayshree Boaddh Asst.Prof. Jashwant Samar

Abstract:- To mographical imaging is a technique through which diagnosis and monitoring can happen with an effective manner. If a disease can be diagnosed in an early stage always been a preference in the field of medical science. Glaucoma is one of the chronical disorder of optic discs in which fluid pressure increases and if it is remain untreated; the patients may lose their vision and even they may pertain total blindness. This disease cannot be cured, early recognition and precautions may protect fundus nerve against serious vision loss. It does not affect instantly, the loss of vision may occurs gradually over a long period. Glaucoma detection involves some measurements like shape and size of optic disc. Here this paper reviewed various researches and concluded that most of the researches are intended to classify the blood vessels for broken vessels detection that signifies the Glaucoma in a better way. Accuracy may degrade due to incorrect or inappropriate masking. An IRIS has some sensitive information that has not to be tampered any how.

Matriculation College Students Evaluation of English Program using the Process Component of CIPP Model
Authors:- R.Nirumala Rothinam

Abstract:- This study aimed to evaluate the Matriculation College English Program using Stufflebeam’sCIPP (context, input, process, and product) evaluation model focusing on the process component. Data was collected through a cippsurvey from42 matriculation students and correlated with their Malaysian University English Test (MUET)trial exam. The CIPP survey sent to students, which had a response rate of 100%, helped to identify the needs of a focus group to obtain better results in MUET. Accordingly, teaching methodology was redesigned to include more visual-audio based learning, student-instructor interaction was increased through face-to-face meetings together with more reinforcement exercises .The results indicated thatwith the new methodology based on the student feedback through the survey, students performed well in the MUET.

Study Report on Failure Analysis of TMT Bar Due to Steel Defects
Authors:- Pramod Kumar

Abstract:- Thermo-mechanical treated (TMT) rebar is used as material for reinforcing concrete structures due to its unique Properties of thermal expansion, ability to bond well with concrete and resist the tensile stress acting on the structure and also steel manufacturing industry has successfully developed a corrosion- resistant variety of rebar for the construction industry. By controlling the proper rolling parameters and water quenching box is required to achieve adequate property. Water quenching box & used billets plays an important role for achieving the final structure and property of the rebars as well the bend properties. Steel quality of the rolled billets are for the production of good surface finish quality TMT bar & also passed in bending of bar. The present paper highlights failure investigation of a failed rebar during bending operations. From micro structural analysis & study of fracture surface it is confirmed that the rebar sample failed in ductile manner due to the steel defects like sub surface blow holes inside the rolled billets originating from thecaster.

Analysis of Performance of Mutual Funds of India
Authors:- Research Scholar Saloni Chauhan, Dr. Suresh Kataria, Dr. Rakesh Dhand Retd. Professor and DSW, HOD Professor

Abstract:- – Among various investment alternatives, mutual funds have emerged as an important investment option among the investors. It is with this fact in mind that present study attempts to analyses the growth and performance of 5 Mutual funds from 2005 to 2015. The performance of selected 20 mutual fund schemes has been analyzed on the basis of risk – return relationship using standard performance evaluation measures. These measures were extensively used in various other studies earlier. So, using these measures, the researcher has attempted to analyze the performance of the selected 20 schemes of the selected mutual funds during the period 2005 to March 2015. Out of these 20 schemes 10 are open ended fund schemes and other 10 are oriented equity fund schemes. The performance of the selected schemes was analyzed in terms of risk-return relationship using the leading performance evaluation measures. In order to calculate return of the selected schemes, the monthly adjusted Net Asset Value data were used for the period from April 2005 to March 2015 The scheme returns are compared with the Fund’s return, Market return. The result of the study shows that as compare to the Market return 50% schemes are earned better return, 50% schemes were riskier. In terms of standard deviation 25% schemes are doing better whereas 75% are risky schemes. In performance of the market ration 10 schemes out of 20 schemes performed the market under various measures. However, the study reported underperformance of the majority of the schemes out of the selected twenty (20) schemes. Gold investment is characterized by a high degree of liquidity. You can trade gold anywhere and anytime. Mutual funds also carry a considerable degree of liquidity as you can encase your mutual fund at the present Net Asset Value. However, you can sell them only in particular segments of the market. It is not possible to sell mutual funds to anyone and anywhere. Both mutual funds and fixed deposits are a popular choice among investors. Each of these financial instruments are unique and provide investors with good returns over a period of time. If you want to invest in either of these financial instruments, it is advisable to make a stern comparison between the two. Here is a list of differences between Mutual Funds and Fixed Deposits. Stock market investing means investing directly in the stocks of the company. Here, you are purchasing the companies listed on the stock exchange with an expectation to earn profits when the price of that stock goes up. On the other hand, a mutual fund is a collective investment that pools together the money of a large number of investors to purchase a number of securities like stocks, FDs, bonds, etc. A professional fund manager manages this fund. When you purchase a share in the mutual fund, you have a small stake in all investments included in that fund. Hence, by owning a mutual fund, the investor participates in gains or losses of the fund’s portfolio. When you buy a bond, you’re essentially lending money to an entity. Generally, this is a business or a government entity. Companies issue corporate bonds, whereas local governments issue municipal bonds.

Grid Connected DFIG system Based on STATCOM and PID Controller
Authors:- M.Tech. Scholar Siddhartha Tiwari, Prof. Dwarka Prasad

Abstract:- In this paper, the relation of electricity production to electricity will affect the quality and reliability of the system. The effects of wind turbines on the quality of electricity in the system are high power, active power, volume change, flicker, harmonics, and power consumption in rotation, which all are measured in accordance with national and international standards. The findings of this paper prove the problem of electrical quality resulting from the installation of a turbine with a power supply. Through MATLAB / SIMULINK, control measures have been proposed to alleviate the problem of electrical quality based on the corners that are connected to STATCOM and PID controller.

Published by: