Category Archives: Uncategorized

IJSRET Volume 5 Issue 6, Nov-Dec-2019

Uncategorized

Optimizing Profit with the Linear Programming Model in a Manufacturing Industry
Authors:- M.Tech. Scholar Shrikant Desai, Professor Y.P. Ladhe

Abstract:- The study has successfully determined the product mix of Bansal Pipe Industry, Indore. In the process, the optimal quantities of the various PVC pipes to be produced within the study period in order to maximize profit were established. Also the status of the resources and the unit worth of each resource to the objective function were known with respect to varying budget resources and labor time. This is the advantage of going beyond mere knowledge of existing decision making tools to actual practical proof of its workability. The study has shown that linear programming model can be applicable in BIL, Indore. The researcher, through observation, noted that decision making regarding the quantity of shoes to be produced was based on trial and error method which yielded sub-optimal results. Hence, an attempt was made to fill this gap, has demonstrated practical means of developing a working linear programming model to find solution to the problem of sub-optimal results often realized by BIL. Also, the literature reviews in this work have – further affirmed that linear programming model is workable.

A Review on Organic Rankine Cycle (Orc) for Waste Heat Recovery with Different Refrigerant
Authors:- M.Tech. Scholar Rajeev Kumar, Prof. Brijendra Yadav

Abstract:- Rising energy demand due to industrial development, population growth, is pushing the mankind for utilizing more and more conventional energy sources such as coal, oil and gas. There is a need to minimize the use of such types of resources because; it contributes to the global warming, pollution and climate change. Use of alternative sources of energy such as solar, hydro, wind, tidal, geothermal, biofuel, and nuclear are preferable and are

A Survey on Different Adiabatic Logic Circuits for Low Power in Dsm Technology
Authors:- Priya Kumari, Ashish Chouhan, MD Naushad Akhtar

Abstract:- The term ‘adiabatic’ is coined from thermodynamics in which a method where no energy exchange takes place with environment results no dissipation of energy loss. On the other hand in short circuit devices in energy exchange process charge has been transfer between different nodes. Practically, with the use of partial adiabatic operation in the circuit results for the improvement of overall performance of the circuit with complexity. The result is represented in tabular and graphical form. And a comparison is done among all the simulation. After a detailed examination a conclusion has been drawn based on the entire work done and also from the simulation and the result is evaluated. All simulations are carried out using HSPICE at 65nm technology with supply voltage is 1V at 100 MHz frequency, for fair comparison of results W/L ratio of all the circuit is same.

Analysis of Embedded Network Security by Intrusion Detection System
Authors:- Research Scholar Mr. Suresh .B, Associate Prof. & Head Dr. M. Venkatachalam

Abstract:- The term ‘adiabatic’ is coined from thermodynamics in which a method where no energy exchange takes place with environment results no dissipation of energy loss. On the other hand in short circuit devices in energy exchange process charge has been transfer between different nodes. Practically, with the use of partial adiabatic operation in the circuit results for the improvement of overall performance of the circuit with complexity. The result is represented in tabular and graphical form. And a comparison is done among all the simulation. After a detailed examination a conclusion has been drawn based on the entire work done and also from the simulation and the result is evaluated. All simulations are carried out using HSPICE at 65nm technology with supply voltage is 1V at 100 MHz frequency, for fair comparison of results W/L ratio of all the circuit is same.

A Survey on Low Power High Speed Domino Circuit in Low Power VLSI Design
Authors:- MD Naushad Akhtar, Ashish Chouhan, Priya Kumari

Abstract:- Increased number of transistor count and reduced device size is main reason behind scaling and this incorporates leakage current also in other hand battery technology is growing very slowly hence we need low power circuit so that we can enhance overall performance of device. After evolution of CMOS circuit the scientist moved on static and dynamic circuit design. In static CMOS there are various limitations like no. of transistor count, power dissipation, slow speed, hence to overcome these limitation a new circuit pseudo NMOS is used. It exist somewhere between static and dynamic circuit. We have seen that FinFET technology is simulated by BISM4 model using HSPICE at 32nm process technology at 250C with CL=1pF at 100MHz frequency. When CMOS is compared with FinFET for 8 and 16 input OR gate we save average power 15.46%, 21.34% SFLD, 57.37%, 20.12% HSD, 30.90%, 42.46% CKD respectively.

The Effect of Radial Swirl Generator on Reducing Emissions from Bio-Fuel Burner System
Authors:-M.Tech. Scholar Amaresh prasad Sinha, Prof. Poonam Wankhede, Dr. Mohit Gangwar

Abstract:- A liquid bio-fuel burner system with various radial air swirlers attached to combustion chamber of 280 mm inside diameter and 1000 mm length has been investigated. All tests were conducted using crude palm oil as fuel. A radial flow air swirler with curved blades having 50 mm outlet diameter was inserted at the inlet plane of the combustor to produce swirling flow. Fuel was injected at the back plate of the swirler outlet using central fuel injector with single fuel nozzle pointing axially outwards. The swirler vane angles and equivalence ratios were varied. Tests were carried out using four different air swirlers having 45°, 50°, 60°and 70° vane angles. NOx emissions reduction of about 12 percent was obtained at swirl number of 1.911 as compared to 0.780 at the same equivalence ratio of 0.83. In addition, emission of carbon monoxide decreased as the swirl number increased. The results shows that a proper design of air swirler has great effect on mixing process and hence the combustion and emission.

CFD Analysis of Heat transfer in Tube Inserted with Centrally Hollow Narrow Twisted Tapes
Authors:- M.Tech. Scholar Ajay Kumar Roy, Prof. Suresh Kumar Badholiya, Rohit Choudhary

Abstract:- In this study, a new tube insert, named centrally hollow narrow twisted tape, is developed and its effect on the heat transfer enhancement performance of a tube under laminar flow conditions is numerically simulated. The model defines two study variables—hollow width and clearance—and then incorporates the concept of a unilateral twisted tape; the effect of the number of unilateral twisted tapes on the tube heat transfer performance is then examined. The results show that the tube with cross hollow twisted tape inserts has the best overall heat transfer performance for different hollow widths of the tape.

A Review on Heat Transfer Enhancement Analysis of Tube Inserted with Centrally Hollow Narrow Twisted Tapes
Authors:- M.Tech. Scholar Ajay Kumar Roy, Prof. Suresh Kumar Badholiya, Rohit Choudhary

Abstract:- In this study, a new tube insert, named centrally hollow narrow twisted tape, is developed and its effect on the heat transfer enhancement performance of a tube under laminar flow conditions is numerically simulated. The model defines two study variables—hollow width and clearance—and then incorporates the concept of a unilateral twisted tape; the effect of the number of unilateral twisted tapes on the tube heat transfer performance is then examined. The results show that the tube with cross hollow twisted tape inserts has the best overall heat transfer performance for different hollow widths of the tape.

Design and Implementation of Sensor Less Voltage Control Technique for Power Quality in Telecom
Authors:- M.Tech. Student Tamba Rajeswari, Assistant Prof. B.Jagan Narayana, Assistant Professor& Hod V. Sunil Kumar Reddy

Abstract:- In this paper, a three-phase three-switch three-level boost (Vienna) type PWM rectifier is proposed as an active front-end power factor correction (PFC) rectifier for power quality improvement in telecom load. The sensor less voltage control technique is proposed and it does not rely on any input voltage information results in reliable and robust operation. A brief description on the principle of operation and the most advantageous modulation method of the proposed system is discussed. The feasible switching states are identified for the proposed active front-end converter resulting in reduced switching stress and DC ripples. A triangular carrier based control logic is applied and the input current reaches sinusoidal shape without the need of sensing the input voltage. The detailed analysis of front-end PFC converter is carried out by equivalent circuit analysis. Also, the complete loss and efficiency calculation of the converter is explicitly carried out with the help of hardware design guidelines. The performance of the proposed system and its capability to operate satisfactorily in the event of failure of one-phase of the mains is verified through MATLAB Simulation and results obtained are presented. The experimental setup rated for 9 kW is developed in the laboratory to validate the simulation results. From the simulation and hardware results, it is observed and recorded that the power quality parameters are improved and are well within the IEEE, IEC standards.

A Comparison of Tcsc Fact Device Performance and Long Distance Transmission
Authors:- Maneesha Kushwaha, Arun Pachori

Abstract:- The prudent point of view of Flexible AC Transmission System (FACTS) establishment and execution has been an essential issue since origin and expanding each day because of vital, specialized and showcase requirements. The advancement of these issues assumes a significant job in the achievement of any utility and at last minimal effort accessibility of intensity at the client end. This paper exhibits the ideal area of Thruster Controlled Series Capacitor (TCSC) in control framework to limit the transmission misfortune utilizing Particle Swarm Optimization procedure. The reenactments are performed on the IEEE-14 transport framework, IEEE 30 transport framework and Indian 75 transport framework with Newton Raphsonload flow calculation including TCSC.

Review of Image Retrieval using Color Text and Shape Techniques
Authors:- ME Scholar Roshani Yadav, HOD Mr. Kamlesh Patidar

Abstract:- The big digital image databases are yielded by the widespread of smart devices along with the exponential growth of virtual societies. If not fused with efficient Content-Based Image Retrieval (CBIR) tools, these databases can be counter-productive. The introduction of promising CBIR systems had been witnessed last decade which promoted applications in various fields. In this editorial, an analysis on state of the art content-based image retrieval which includes theoretical and empirical work is propounded. This work comprises of publications that cover aspects of research relevant to CBIR area. That is to say, unsupervised and supervised education and combination techniques along with which the low-level image visual descriptors have been reported. Furthermore, challenges and applications that appeared to carry CBIR research have been discussed in this work.

Object Recognition Based on MATLAB
Authors:- Assistant Prof. Vishal V. Mehtre, UG Scholar Shivani Jitendra Khare

Abstract:- This paper describes image processing and its applications using MATLAB. Prime objective of image processing involves extraction of important information from the processed images. By use of this data, description and interpretations can be provided by the machine. Image processing modifies the original image in the desired format (image). And this system provides the users with the hard copy of the image using printer and also allows them to save the file in the desired format with extensions. In our practical life, we find many applications of image processing. One of the best examples in our day to day life is our brain in coordination with our eye which views a lot of images and helps the brain to sense and process information at higher rates and less time. Hence such operations carried out using image processing will help us in greater understanding and vision by development and implementation of image processing. In this paper image processing, object detection, applications of image processing using MATLAB and prospects are discussed.

Design and Implementation Optimization Algorithm for Underwater Acoustic Sensor Network
Authors:- Neha Jamrey, K K Sharma

Abstract:- Underwater Wireless Sensor Networks (UWSNs) contain several components such as vehicles and sensors that are deployed in a specific acoustic area to perform collaborative monitoring and data collection tasks. Tese networks are used interactively between different nodes and ground-based stations. Presently, UWSNs face issues and challenges regarding limited bandwidth, high propagation delay, 3D topology, media access control, routing, resource utilization, and power constraints. In the last few decades, research community provided different methodologies to overcome these issues and challenges; however, some of them are still open for research due to variable characteristics of underwater environment. In this paper, a survey of UWSN regarding underwater communication channel, environmental factors, localization, media access control, routing protocols, and effect of packet size on communication is conducted. We compared presently available methodologies and discussed their pros and cons to highlight new directions of research for further improvement in underwater sensor networks.

Prediction of Compressive Strength of Concrete Using Artificial Neural Network Model
Authors:- M.Tech. Student Sandeep Solanki, Asst. Prof. Mr. Sambhav Gangwal

Abstract:- This study proposes to build a concrete compressive strength development over time (CCSDOT) model by using conventional method combined with the artificial intelligence method. The CCSDOT model performed well in predicting and fitting the compressive strength development in green concrete containing cement, slag, fly ash, and limestone flour. It is concluded that the CCSDOT model is stable through the use of sensitivity analysis. To evaluate the precision of this model, the prediction results of the proposed model were compared to that of the model based on the BP neural network. The results verify that the recommended model enjoys better flexibility, capability, and accuracy in predicting the compressive strength development in concrete than the other models.

Brain Stimulation Game application for children
Authors:- P.S.M Alawatta

Abstract:- Most of the new generation children nowadays are using their parent’s electronic devices as a habit. Addict on to new technologies lead the children away from educational activities. This is affect to the child’s future and main problem is this that the early childhood does not develop on correct way. Considering about this problem the research implemented an educational gaming application based on how to use technologies toward to better future by navigate children to educational activities and reducing time wasting for useless things through the new technologies. Smart Kids is an Unity based gaming application for children of 6 to 10 age category. Prototype methodology used for implement the application. The developed gaming application based on Mathematics and includes many features. The application developed to improve child’s cognitive skills in mathematics and memory development areas. Different game categories used to develop child’s different kind of skills and each category included different levels. The variation of gaming categories will be motivating child to do different sides. When considering about parents, within the busy life style some parents have not time to check child’s skills improvements. As a solution, developed application calculates child’s performance.

Implementation of Queuing Theory Along with Lean Technique in Manufacturing Industry
Authors:- M.Tech. Scholar Bharat, Professor Vipul Upadhayay, Yogesh P Ladhe

Abstract:- This research provides a context for investigating the integration of queuing theory and scheduling approaches with the goal of more effectively solving scheduling problems arising in dynamic environments. In this thesis main objective of research are applied queuing theories in a production line by using an analytical model, using a queuing model to examine performance of a production line, To give information about the studied production line in this case study and To improve both efficiency and performance of workstations. This research work is carried out in Pressroom Industries limited, Bhopal. This industry produces variety of products such as sprocket, spur gear, helical gear and gear housing etc. In this work spur gear manufacturing is taken for study. At first different manufacturing processes (cutting the bar stock, OD turning, center drilling followed by boring, CNC machining, gear hobbling, debarring, keyway slotting and gear grinding) are identified. It is found the cutting, hobbling, drilling and slotting process are bottle neck processes. From the analysis it is found that the setup time of keyway slotting consumes more time. Using SMED concept single pallet is converted to two pallets.

Fem Analysis of Structural Response of Sandwich Beam
Authors:- M.Tech. Scholar Himanshu Kumar Gupta, Asst. Prof. Rakesh Patel, Prof. Vikas S Pagey

Abstract:- Sandwich plate are composite systems having high stiffness-to-weight and Strength-to weight ratios and are used as light weight load bearing components. The use of thin, strong skin sheets adhered to thicker, lightweight core materials has allowed industry to build strong, stiff, light, and durable structures. Due to the use of viscoelastic polymer constituents, sandwich beams can exhibit time-dependent behavior. This study examines the behavior of sandwich plate driven by the varying core thickness and different core stiffness. Finite element (FE) method is used to analyze the overall transient responses, harmonic responses and the static responses of the sandwich systems subject to a concentrated point load at the mid span of the beam. In this study the skin, i.e. the top and bottom layers are made up of aluminum while the core is made up of foam family. The stress and deformation fields are analyzed. The core thickness and core material stiffness was varied keeping the skin thickness constant and the behavior of the sandwich beam is studied under static and dynamic conditions.

Car Damage Detection and Analysis Using Deep Learning Algorithm For Automotive
Authors:- Rakshata P, Padma H V, Pooja M , Yashaswini H V, Karthik V

Abstract:- Images and its processing form a vital part of understanding of the world around us. Therefore incomplete images make it unable for us to detect and analyze the premise of the picture. This is of no use to us, but today’s machine learning platforms are capable of restoring the lost or corrupted parts of such images, making it easier to understand the context behind the scenes and efficiently analyze the pictures taken. In painting Extrapolation can be done by propagation of local structures into the unknown parts, in order to construct the missing part’s one pixel (or patch) at a time, while maintaining consistency with the neighborhood pixels. This application of deep learning is used in the car damage detection and extraction of original features before the incident for timely insurance claims.

Thermal Analysis of Organic Rankine Cycle Based on Different Fluid Type
Authors:- M. Tech Scholar Sanjay Rahangdale, Prof. Kashiram Kadwe

Abstract:- The ORC works with a high molecular mass organic working fluid with the characteristic of having a phase change of liquid to vapour occurring at a temperature which is lower than the phase change of water to steam for a given pressure. The recovery of low grade heat can be achieved using organic fluids. These low grade heat sources can be from biomass energy, solar energy, geothermal energy and industrial waste. This work presents an analysis of organic Rankine cycle (ORC) using R143a, R600a, R134a and RC318 as working fluids under constant external conditions. An EES program has been developed to parametrically compare the first and second law efficiencies and turbine size factor with increase in turbine entry temperature, heat source temperature, and turbine efficiency and pinch point temperature difference.

A Review Article of Composite Drive Shaft Vibration Effects and Methodology
Authors:- M.Tech. Scholar Govind Solanki, H.O.D. Mr. Ganesh Kesheorey

Abstract:- Almost all automobiles (at least those which correspond to design with rear wheel drive and front engine installation) have transmission shafts. The weight reduction of the drive shaft can have a certain role in the general weight reduction of the vehicle and is a highly desirable goal, if it can be achieved without increase in cost and decrease in quality and reliability. It is possible to achieve design of composite drive shaft with less weight to increase the first natural frequency of the shaft and to decrease the bending stresses using various stacking sequences. By doing the same, maximize the torque transmission and tensional buckling capabilities are also maximized. This work deals with the replacement of a conventional steel drive shaft with High Strength Carbon drive shafts for an automobile application.

Quality and Productivity Improvement in Gear Manufacturing Process by using Quality Control Chart and Capability Analysis Including Sampling
Authors:- M.Tech. Scholar Hari Krishnadas Raut, Asst. Prof. Yogesh Ladhe

Abstract:- Increasing productivity and profitability are main objectives of any organization. Many tools and techniques are used to reduce rejections and defects of product. Most of the rejections and defects are occurred due to improper control of quality of product. So use of 7 Quality control tools is best way to reduce rejections and defects of product after analyzing of manufacturing process. Another advantage is increasing customer satisfaction by use of 7 Quality control tools in today competitive market. Based on application of these tools will increase the level of standard products which they require as vision of an organization. The purpose of this work is to discuss the effect of implementation of Total Quality Management (TQM) in manufacturing industry (Shree Gears Pvt. Ltd, Indore). Very few service companies have been able to reap full benefits of TQM. One major reason for its inadequate success is that of trying to implement in service companies techniques that have been successful in manufacturing. In manufacturing, emphasis of TQM is on “zero defects”. Control charts and sampling are the major tools of quality control. However, in services, emphasis is on “zero defections”. Focus is on customer satisfaction and team approach. TQM can boost profits and improve customer satisfaction by reducing defects.

Road Construction in Hilly Region and Their Problem and Solution
Authors:- M.Tech. Scholar Techi Takar, Jitender Kumar

Abstract:- Construction of road is very much important for the transportation of goods and services from one place to another by the mean of roadway network. Road transportation is one of the primary modes of transportation since from the earlier time. The mode of road construction is varies with the geographical feature of the earth such as plain land, mountain terrain, steep and hilly region. It is more easy and accessible to construct a road in plain region as compare to the hilly region.This paper presents the road construction mode in the hilly region as well as their problem and solution with reference to the segment of NH-13 from Sagalee to Midpu (Doimukh). Hilly region comprises of steep mountain terrain, naturally hard rock strata and various turning points which made the road construction very difficult. As the development take place so it is necessary to connect the every corner of the country in order to have a transportation facility easy and accessible in terms of commercial purpose ,business purpose ,health and medical services , education sector etc. Therefore construction of serviceable road in hilly region is very much important for the overall Nation growth. The review study of this paper is to bring the knowledge of road construction problem and their solution of particular hilly region road stretch from Sagalee to Midpu (Doimukh) which is the capital region of Arunachal Pradesh, having stretch length of 74 km.

Implementation of Water Tank Design using Staad Pro Software
Authors:- Sunita Ahuja, Sourabh Dashore

Abstract:- Intensity of the wind is the principal reason for wind caused disaster. Hence constructed structures must be prepared by constructor to fight the impending disaster due to wind by understanding the performance of the structure under wind load. In this study a computational analysis of water tank has been carried to evaluate the performance of elevated water tank under the action wind forces. Since these types of tanks have high mass concentrated at the top height of slender supporting structure and that’s why this type of structures are mainly susceptible to horizontal forces induced by wind. Elevated water tanks have been investigated to analyze the actions of this structure due to wind force by changing different parameters such as capacity, height of stage, terrain category and wind zone. The results presented in this paper will be useful to the designer to understand the effect of various factors as mentioned above on the magnitude of wind force acting on the elevated water tank. Overhead Intze type tank is a form of expanded water tank resting on staging. Bottom part of tank of Intze tank is abounding in flat structure, thus in flat bottom, the thickness and reinforcement is set up to be high. This work aims to study the performance of the Overhead water tank of Intze type having different configuration of staging under the action of basic wind loads in different terrain category.

Review on Nano Particle Based Li Ion Batteries
Authors:- Y. V. Aravind Kumar

Abstract:- Li ion batteries have applications in nanotechnology .Here in this paper we were mainly focused on nonmaterial’s such as CNTs, silicon thinflims, coaxial MnO2/carbon annotate array electrodes ,self assembled TiO2 grapheme and li paper batteries to improve the performance of nanobatteries and storage.

Movie Recommendation Using Principle Component Analysis
Authors:- M.Tech. Scholar Bharti Vishwakarma, Prof. Ashish Tiwari

Abstract:-Recommendation system uses different types of algorithms to make any type of recommendations to user. Collaborative filtering recommendation algorithm is most popular algorithm, which uses the similar types of user with similar likings, but somewhere it is not that much efficient while working on big data. As the size of dataset becomes larger then some improvements in this algorithm must be made. Here in our proposed approach we are applying an additional hierarchical clustering technique with the collaborative filtering recommendation algorithm also the Principle Component Analysis (PCA) method is applied for reducing the dimensions of data to get more accuracy in the results. The hierarchical clustering will provide additional benefits of the clustering technique over the dataset and the PCA will help to redefine the dataset by decreasing the dimensionality of the dataset as required. By implementing the major features of these two techniques on the traditional collaborative filtering recommendation algorithm the major components used for recommendations can be improved. The proposed approach will surely enhance the accuracy of the results obtained from the traditional CFRA and will enhance the efficiency of the recommendation system in an extreme manner. The overall results will be carried out on the combined dataset of TMDB and Movie lens, which is used for making recommendations of the movies to the user according to the ratings patterns created by the particular user.

Review of Worm Hole Attack in WSN
Authors:- M.Tech. Scholar Bharti Yadav, Prof. Shailendra Tiwari

Abstract:-Wormhole attacks can undermine or put out of action wireless sensor networks. In a typical wormhole attack, the attacker be given packets at one point in the network, forwards through a wired or wireless network with take away latency than the network links, and transmits them to a different point in the network. This paper describes a give out wormhole recognition algorithm for wireless sensor networks, which detects wormholes based on the distortions they create in a network. Since wormhole attacks are passive in nature, a hop count technique is used by the algorithm as a explore procedure, renovates local maps in each node, and then uses a diameter element to detect abnormalities reason by wormholes. It can provide the approximate location of wormholes, which is useful in implementing countermeasures this is the main advantage of algorithms.

Predication and Root Selection of Worm Hole Attack in WSN
Authors:- M.Tech. Scholar Bharti Yadav, Prof. Shailendra Tiwari

Abstract:- Sensor Networks (WSN) are often vulnerable to several types of attacks due to its open space deployment and large area of applications. Wormhole is one of such attack, which falls under the category of Denial of Service (DoS). In this attack, an attacker takes control of the network services by developing an overlay tunnel called wormhole channel. In this paper, a mechanism has been proposed by appending extra four-bit information to RREP packets which is known to both sender and receiver; thus, reducing chances of wormhole tunnel. The work is based on AODV protocol and simulated in NS2, which effectively detect illegitimate attack carriers.

Design & Development of Electromagnetic Dynamometer for Testing of FHP Motor: A Review
Authors:- PG Student Rajgonda Shivgonda Patil, Principal S.H.Sawant

Abstract:- Ensuring any kind of Motor Performance as a part of Design Validation of FHP Motor is necessary to know against actual theoretical design of motor verses real test results obtained only through motor testing .Electromagnetic Brake Dynamometer (Eddy Brake Dynamometer ) is best suitable for Testing the Motor as a part of Loading & knowing the results at different torque values which enable us to know various characteristics parameters like Speed verses Torque, Current verses Torque, Input watt verses Torque & efficiency verses Torque as these are Key Motor parameters which should know to Designer or Motor manufacturer before releasing the product to customer cum market . This New Test Rig consisting of Designing, Development & validation of Motor.

Enhancement of PAPR Reduction Using Pso Based Optimization Technique
Authors:- M.E. Scholar Rati Ranjan Kumar , Asst. Prof. Komal Kanojia

Abstract:- A non-constant envelope with high peaks is a main disadvantage of Orthogonal Frequency Division Multiplexing (OFDM). These high peaks produce signal excursions into non-linear region of operation of the Power Amplifier (PA) at the transmitter, thereby leading to non-linear distortions and spectral spreading. Many Peak to Average Power Ration (PAPR) reductions methods have been proposed in the literature. The objective of this review is to give a clear understanding of different techniques to reduce PAPR of the signal.

Gaze PIN entry for Password Authentication
Authors:- Mr.Raghavendrachar S, Soumya Dattatreya Hegde, Varsha Purushotham, VennalaKN, Vidyashree S

Abstract:- Secret identification numbers are widely used for user authentication and security. Authentication of password using PINs requires users to input the PIN physically, which could be vulnerable to password knowing via shoulder surfing or thermal tracking. Authentication of PIN with hands-off gaze based (by closing the eye) PIN entry techniques, on the other hand, there is no physical footprints behind and therefore offer a more secure password entry option, Gaze -based authentication refers to finding the eye location across sequential image frames, and tracking over eye center over time. This paper presents a real-time application for gaze-based PIN entry, and eye detection and tracking for PIN identification using a smart camera.

Social BOT Detection for Twitter Dataset Using GBC Technique
Authors:- M.Tech. Scholar Roshani Singh, Prof. Sumit Sharma

Abstract:- Today, peoples are devoting large amount of time in social networks. As social media network popularity increases day by day, content writer are spamming on these platform for potential benefits of some organizations. Here graph based clustering algorithm was proposed to develop a binary cluster on the basis of serial or sequential action perform by the user. As per series of action social network graph is reduce into spanning tree where highly distance nodes are identified as abnormal behavior. So group of highly distance nodes are consider as the social bots while other are real users. Experiment was perform on real social sequential dataset of twitter. Results were compared on various evaluation parameters and it was obtained that proposed approach has improved all such parameter values as compared to previous approach adopt by researcher.

Survey on Stress Analysis and Design Optimization of A Pressure Vessel using Ansys
Authors:- M.Tech. Scholar Nitesh Katiyar, Assistant Professor Ranjeet Kumar

Abstract:- Pressure vessels are a commonly used device in marine engineering. Until recently the primary analysis method had been hand calculations and empirical curves. New computer advances have made finite element analysis (FEA) a practical tool in the study of pressure vessels, especially in determining stresses in local areas such as penetrations, O-ring grooves and other areas difficult to analyze by hand. This project set out to explore applicable methods using finite element analysis in pressure vessel analysis.

Stress Analysis and Design Optimization of a Pressure Vessel using Ansys
Authors:- M.Tech. Scholar Nitesh Katiyar, Assistant Professor Ranjeet Kumar

Abstract:- Pressure vessel is used to carry liquids such as petrol, kerosene; aviation fuel etc and these fuel tanks are used to transport fuel. Finite element method is a mathematical technique used to design a fuel carrying vessel and performing the stress analysis. The main objective of this paper is to design and analysis of pressure vessel. The designing various parameters of Pressure Vessel checked and designed according to the principles specified in American Society of Mechanical Engineers (A.S.M.E).

Review: Trust in VANET
Authors:- M.Tech. Scholar Divyam Singh, Prof. Shiva Bhatnagar

Abstract:- Vehicular ad-hoc networks(VANETs) expedite those probability change those way individuals experience the readiness of a secured interoperable remote correspondences a that consolidates cars, transports, activity signals, convenient telephones, Furthermore unmistakable contraptions. An opportunity to in any case, VANETs need help exposed against security perils because of developing dependence ahead correspondence, preparing, and control advancements. The surprising security Also security tests acted by VANETs in-enlightened decency data place stock in, mystery, no renouncement, get the opportunity to control, constant operational necessities/demands, availability, What’s greater security confirmation. The enduring quality for VANETs Might an opportunity to be improved Eventually Tom’s scrutinizing tending on completely those two dominant part of the information trust, which is depicted Likewise those examination from asserting regardless for if Furthermore what precisely degree those low down activity information would reliable, Furthermore focus trust, which is depicted Likewise how dependable those center points Previously, VANETs show up with make. In this paper, an assault safe trust association devise might be suggested for VANETs that could recollect What’s more acclimate to malevolent attacks what’s more review those relentless nature of the two information and versant centers On VANETs. Exceptionally, greater part of the information trust might be assessed done light of the information recognized Also gathered beginning with different vehicles; focus trust is reviewed On two estimations, I. E., helpful trust and suggestive trust, which show how at risk a middle cam wood satisfy its comfort what’s more door reliable those proposition beginning with an inside to isolate center points will be, freely. The adequacy Also capability of the recommended symbolization plot might be authorize through far reaching examinations. Those prescribed trust association subject might be relevant with a wide arrangement about VANET demands should overhaul development prosperity, flexibility, and trademark security with pushed ahead unflinching quality.

A Review: Speech Recognition
Authors:- Sunil, Shweta, Tanya Gulati, Asst.Prof.Garima Singh

Abstract:- Speech recognition is the capability of a program to identify words and expression in spoken language and convert them to a binary language so computer system can understand. Each spoken word is split into discontinuous division which include many tones. This paper brief about the speech recognition system and how it’s work and application in day to day life.

Energy Preserve using LEACH protocol in Wireless Sensor Networks
Authors:- M.Tech. Scholar Om Patel, Prof. Shiva Bhatnagar

Abstract:- In the time of new invention Networks many rising and future empower advancements achieve the prerequisites of pervasive correspondence systems. Remote Sensor Networks is a fundamental classification of these best in class advances, the gigantic worries of these systems are vitality proficient and efficient information accumulation. Bunch based directing in WSNs is a colossal answer for upgrade the vitality productivity of the hubs and creative information gathering. Many examinations on organize lifetime and information accumulation have been proposed by the (LEACH) Low Energy Adaptive Clustering Hierarchy conspire that permits the part of the group head turned among the sensor hubs and endeavors to disseminate the vitality utilization through every one of the hubs. The lifespan of WSNs are influenced by the Cluster Head choice; this is often on the grounds that a CH expends additional power than a Cluster (non-CH) hub. Inthis examination think about, a vitality effective bunch head choice in Mobile WSN is proposed, investigated and approved on the premise of remaining vitality and randomized determination of the hub, which is not doled out as a group head in past round. Additionally, the proposed approach demonstrates the noteworthy changes when contrasted and LEACH and a unique Application Specific Network Protocol for Wireless detector Networks conventions regarding vitality utilization of sensor hubs, improved system lifetime and proficient information assembling because of less vitality utilization amid information transmission.

Study of Different Types of Mixer Topologies
Authors:- M.Tech. Scholar Ranjan Patel, Asst. Prof. Priyanshu Pandey

Abstract:- In this paper, a comparative study of different types of mixer topologies is presented. Gilbert cell is widely used as core of the mixer because it provides high conversion gain, good port-to-port isolation and low even-order distortion. It is found that the linearity of mixer is very good for Multi-Tanh technique by incorporating multiple differential trans-conductance stage but it reaches to very low conversion gain whereas, use of current bleeding technique increase linearity and conversion gain of the mixer by adding current source to increase the bias current at the expense of power consumption. A very low value of noise figure can be achieved with the switched biasing technique by replacing current source with parallel connected nMOS transistors but due to use of the transistor in place of tail current source, linearity is degraded and more power is consumed. Folded Cascode Technique is used to reduce DC supply voltage by folding the LO switching stage with pMOS transistors in switching stage but it degrades the noise figure. Bulk-driven technique can be employed to lower down the power consumption by providing the switching action via the gate of LO (RF) and amplification by the bulk of LO (RF) transistors, however it reduces the linearity. High linearity is obtained by using CCPD (Cross coupled post distortion) technique by cancelling of third order derivatives but it decreases the conversion gain and consume more power due to increase in the number of auxiliary transistors. MGTR enables to achieve high linearity by incorporating auxiliary transistor but it decreases the overall conversion gain and increases noise figure of the mixer. So it is observed that there is a trade-off among the performance metrics, i.e., conversion gain, noise figure linearity, and power consumption of the mixer.

Review of Wide Bandwidth Low Power Low Noise Amplifier
Authors:- M.Tech. Scholar Shradha Chouhan, Asst. Prof. Priyanshu Pandey

Abstract:- Recently, Low noise amplifier versatile used in modern wireless communication like Wi-Max, WLAN, GSM, Bluetooth and satellite communication. Low Noise amplifier have important feature like amplify the signal with rejection of noise. Low noise amplifier in modern communication used as filter with amplifier. In recent scenario low noise amplifier available in wide band, single band, multi-band frequency of application. In present days low noise amplifier the also reduces the reflection of signal exist by elements and connecting interface inside the amplifier. Low noise amplifier available with high gain, noise rejection and with less power consumption. In this paper review the work of past decades done in low noise amplifier. Low Noise Amplifier (LNA) is versatile used as a broadband mixer, low noise amplifier, power amplifier and Darlington amplifier, active balunes, multiband amplifier. Today technology required high speed of transmission efficiency with small power consumption and less utilization of elements in proposed amplifier, Low Noise Amplifier (LNA) products full fill all requirement of modern wireless communications, so that review and discussion, future requirement of technology is needed to discuss. In this paper discusses issues of low noise amplifier, its application, issues and recent trends. In this paper review some techniques of Low Noise Amplifier (LNA) to improve perform and surveyed almost all the Possible Work of Past Decades.

Image Encryption using Steganography
Authors:- Srinvas Nishant, Sarath Dasari, Anisha M Lal

Abstract:- steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are digital images. Due to recent developments in steganalysis, providing security to personal contents, messages, or digital images using steganography has become difficult. His paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good stenographic algorithm and briefly reflects on which stenographic techniques are more suitable for which applications.

Published by:

IJSRET Volume 5 Issue 5, Sep-Oct-2019

Uncategorized

Suitability and Performance of Bubble Deck Slab: A
Review

Authors:- Victor Osaze Francis

Abstract:- Slabs are of extreme importance in any structural construction, as they are primary members. However, about 80% of the concrete in the middle of conventional solid slab are of little structural importance. Bubble deck slab (also known as voided slab) is a phenomenon that removes the structurally-inefficient concrete in the middle of slab by replacing it with high-density spherical plastic balls. This solution will solve the problems of high cost, shorter span, longer construction duration, and environmental pollution associated with the use of traditional slab. This review study investigates how bubble deck slab compares with traditional solid slab in everyday use, under loading condition, and consequently making informed recommendations to minimize the inadequacies of the bubble deck slab system.

A Secure Iot Communication against Reactive Jamming Attack in CRN Subtitle
Authors:- Nitesh Yadav, Dr. Abhishek Bhatt

Abstract:- The number of nodes or IoT devices is sense and control the communication. The primary users are more trustworthy than the secondary users, since these are authorized or licensed users. The purpose of CRN is to intellect the spectrum band and identify the free channels which will be used for un-authorized access user or attacker that flooded the unwanted packets to next node or destination node in network. CRN get better the efficiency of spectrum handling, but it also performance degrades due to new security threats with jamming attacks during the spectrum sensing process, which can corrupt the effectiveness of spectrum sensing. In this research we proposed security scheme against packet flooding Jamming attack. The performance is vitiated in high, medium and low jamming probability and applies the proposed scheme to reduces the flooding. The hop count value based on forward and reverse mechanism of detection and provides secure communication in IoT CRN . The reliability of link is equivalent from the forward and reverse path consistency i.e. more in proposed security scheme as compare to with Batch based SA-MAC scheme. The proper packet forwarding in particular link and the reverse and forward is counted properly but correctly, current node are in suspicious. The record value of hop count is based on the packets receiving but heavy flooding is also disturb it at starting connection establishment procedure.

A Review on Efficient Approach for Scheduling Tasks in Cloud Computing Environments
Authors:- Anjali Kumari, Manoj Lipton

Abstract:- Nowadays, Cloud computing is widely used in companies and enterprises. However, there are some challenges in using Cloud computing. The main challenge is resource management, where Cloud computing provides IT resources (e.g., CPU, Memory, Network, Storage, etc.) Based on virtualization concept and pay-as-you-go principle. The aim of this proposed algorithm is to minimize the completion time and cost of tasks, and maximize resource utilization. The performance of this proposed algorithm has been evaluated using Clouds toolkit. It schedules the entire task within a particular deadline while increasing the system performance. The cloud-sim simulator is used for evaluating the task scheduling like file uploading. In this module we have to initialize the performance of this proposed algorithm has been evaluated using Cloud Sim toolkit. It schedules the entire task within a particular deadline while increasing the system performance. Here we propose a VM Placement aims to distribute the dynamic workload smoothly to all the hosts in the cloud to gain an improvement in both the utilization of Resources and the speed of execution time. It allocates the incoming tasks to all available VMs. In order to achieve balancing and avoid congestion.

A Review on Parametric Study and Optimization of H-Type Finned Tube Heat Exchangers using Taguchi Method
Authors:- M.Tech. Scholar Ankit Raj, Asst. Prof. Brijendra Kumar Yadav

Abstract:- In order to improve the heat exchange efficiency and extend surface heat transfer, H-type finned tubes have been widely used in boilers and waste heat recovery in recent years. H-type finned tubes are derived largely from rectangle finned tubes. Because of their unique groove structure on the fin surface, H-type finned tubes have excellent anti-wear and anti-fouling performance.

Parametric Study and Optimization of H-Type Finned Tube Heat Exchangers using Taguchi Method
Authors:- M.Tech. Scholar Ankit Raj, Asst. Prof. Brijendra Kumar Yadav

Abstract:- Fin and- tube heat exchangers are the typical equipment with extended surface and widely used in many engineering applications, such as air conditioning units, compressor intercoolers, boiler economizers, etc. Heat exchangers are widely used in various industries, such as space heating, refrigeration, air conditioning, power stations, chemical plants, petrochemical plants, petroleum refineries and waste heat recovery process. A heat exchanger is a device used to transfer heat between one or more fluids, which may be separated by a wall to prevent mixing or may be in direct contact. In this study, a parametric study is performed to investigate the effects of geometric parameters on the heat transfer characteristic and the flow friction characteristic of H-type finned tube heat exchangers. The effectiveness of various parameters on the objectives is evaluated and the geometric structure of the H-type finned tube is optimized for the best performance using Taguchi method. The results show that fin height, transversal tube spacing and longitudinal tube spacing is statistically significant to the flow performance characteristics of the H-type finned tube. Hence, these three parameters must be firstly considered and paid more attention during the design and optimization of H-type finned tube heat exchangers. Analysis of variance also further validates that intuitive analysis is correct.

Review Thermal Performance Enhancement of Double Pipe Heat Exchanger With Wavy
Authors:- Research Scholar Kundan Kumar, Asst. Professor Sujeet Kumar Singh

Abstract:- In present study, wavy-tape inserts are introduced to help establish swirl flow inside a straight pipe. Three-dimensional models will be created to simulate the flow and heat transfer characteristics inside the pipe with wavy-tape inserts. CFD simulation will be carried out to investigate the effects of different tape angles on the thermal-hydraulic performance of pipe. The effect of wavy strip tabulators with different angles on the NU, friction factor and thermal performance enhancement factor of double tube heat exchanger was studied.

Thermal Performance Enhancement of Double Pipe Heat Exchanger with Wavy Tape
Authors:- Research Scholar Kundan Kumar, Asst. Professor Sujeet Kumar Singh

Abstract:- CFD simulation will be carried out to investigate the effects of different tape angles on the thermal-hydraulic performance of pipe. The effect of wavy strip tarbulators with different angles on the NU, friction factor and thermal performance enhancement factor of double tube heat exchanger was studied. The configuration, gain in heat transfer augmentation, cost in pressure loss, generated swirl flow character, heat transfer enhancement mechanism, optimal geometric parameters and overall thermal hydraulic performance of wavy-tape are successively expounded in this work. It was seen that the results obtained from the simulation for the plain tube are in a good agreement with those predicted by the standard correlations. It is noted that, in this case the discrepancy between the results is less than 9% for Nusse. lt number and 11% for the friction factor. The wavy-tape induces significant swirl flow inside the pipe. Particularly, pairs of tangential vortices are generated on the flanks of the tape. These vortices break the thermal boundary layer and intensify the fluid advection, which consequently lead to highly localized heat transfer enhancement on the pipe surface.

A Review on Optimization of Heat Transfer in Six-Start Spirally Corrugated Tubes using Taguchi Method
Authors:- M.Tech. Scholar Sanjoo Sahani, Professor Poonam Kumar Agade

Abstract:- Heat transfer devices have been used for conversion and recovery of heat in many industrial and domestic applications. Over five decades, there has been concerted effort to develop design of heat exchanger that can result in reduction in energy requirement as well as material and other cost saving. Heat transfer enhancement techniques generally reduce the thermal resistance either by increasing the effective heat transfer surface area or by generating turbulence. Sometimes these changes are accompanied by an increase in the required pumping power which results in higher cost. The effectiveness of a heat transfer enhancement technique is evaluated by the Thermal Performance Factor which is a ratio of the change in the heat transfer rate to change in friction factor.

Optimization of Heat Transfer in Six-Start Spirally Corrugated Tubes using Taguchi Method
Authors:- M.Tech. Scholar Sanjoo Sahani, Professor Poonam Kumar Agade

Abstract:- In this study, a parametric study is performed to investigate the effects of geometric parameters on the heat transfer characteristic, the flow friction characteristic and overall thermal-hydraulic performance of corrugated tube heat exchangers. The effectiveness of various parameters on the objectives is evaluated and the geometric structure of the corrugated tube is optimized for the best overall thermal-hydraulic performance using Taguchi method. The geometric parameters considered in the model include corrugation height and corrugation pitch. The results show that corrugation height have dominant influence on heat transfer characteristic with contribution ratios of 74.79% respectively while corrugation pitch has minor effects.

Development of Fluid Transfer System (FTS)
Authors:- Abutu Joseph, Oluleye, Atinuke Modupe, Oladosu, Lekan Temidayo, Emmanuel, Abakpa James, Lawal, Albert Sunday

Abstract:- In this study, a fluid transfer system was developed using standard design procedure outlined in literatures. The effect of viscosity on the flow rate of a fluid (water) from different sources was also investigated. The development of the system involved design calculations, fabrication of metal base as well as tank guides. Similarly, plumbing of the system was done using polyvinyl chloride (PVC) pipes, gates valves, other pipe fittings and a centrifugal pump. The Reynolds number and the fluid pressure drop was also determined to investigate the nature of fluid flow through the system and the pressure drop in the motion of the transferred fluid respectively. The results showed that the flow through the system is turbulent since the Reynolds number (Re) 4000 (Re = 9160) while fluid pressure drop results indicate that there was more drop in fluid pressure at the longer lengths of pipe compared to the shorter ones. Testing of the system was also conducted sing three sources of water (rain, tap and stream) and the experimental result revealed that rain water has a higher volume flow rate compared to other sources of water with stream water having the least rate of flow.

Human Engineering in Tractor Design- A Review
Authors:- Lecturer, Anil Kumar

Abstract:- In India agriculture is one of the important sectors which provide local employment and have significant contribution in our GDP. The large population in our country needs various types of food and other agriculture products. As the land available with the country for cultivation is limited therefore in order to increase agriculture output we should make best use our available cultivable land using farm equipment’s and implements. Tractor is one of the main reasons which helped to increase productivity of farming sector reducing dependency of our farmers on animals for tillage and irrigation activities. Tractor was one of the main components which helped in making India self-sufficient in producing food items for its large population and creating green revolution in our country. Unwanted accidents involving farm equipment and machinery especially involving tractors continue to happen. One of the reasons for these accidents is driver fatigue and non-implementation of human factors while designing tractors. There are many human factors which enhance the use of tractor in farming activities without any troubles to the driver/ Operator making it easy to use.. This paper will explain the details of those human factors which need to be taken care while designing a tractor.

K-Fold Cross-Validation Machine Learning Approach on Data Imbalance for Wireless Sensor Network
Authors:- Mandvi Tripathi, Ankur Taneja

Abstract:-Machine learning is used to teach machines how to handle the data more efficiently. Sometimes after viewing the data, we cannot interpret the pattern or extract information from the data. In that case, we apply machine learning with the abundance of datasets available. The purpose of machine learning is to learn from the data. Many studies have been done on how to make machines learn by themselves. Data imbalance problem become greatest issue in for machine learning algorithm. Imbalance problem occur where one of the two classes having more sample than other classes. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The minority samples are those that rarely occur but very important. There are different methods available for classification of imbalance data set which is divided into three main categories, the algorithmic approach, data-pre-processing approach and feature selection approach. We will apply on wireless imbalance data to identify correct information. In this research work systematic study for define which gives the right direction for research in class imbalance problem. After apply our K-fold cross validation Technique for imbalance to balance data and a random forest algorithm a classification approach for balanced data we achieved a good accuracy rate percentage.

Comparative Analysis of Multi Leaf Spring and Composite Leaf Spring using Finite Element Method Under Static Loading Condition
Authors:- M. Tech. Scholar Narendra Kumar Verma, Asst. Prof. Mukesh Hemnani, Rakesh Sharma

Abstract:- The work is carried out on the front end multi leaf spring of a commercial vehicle. In this analysis the conventional steel leaf spring is tested for static loading condition and results are compared with a virtual model of composite multi leaf spring. The material used for conventional steel leaf spring is 65Si7 (BIS) and for composite leaf spring E-Glass/ Epoxy. The CAD model of the multi leaf spring is prepared in Solid works 16 and analyzed using ANSYS 16. The FE analysis of the leaf spring has been performed by discretization of the model in infinite nodes and elements and refining them under defined boundary condition. Bending stress and deflection are the target results. A comparison of both i.e. experimental and FEA results have been done to conclude.

A Review on Thermal Performance Analysis of Simple Organic Rankine Cycle with and without Internal Heat Exchanger using EES Code
Authors:- M. Tech. Scholar Vinay Yadav, Asst. Professor Brijendra Kumar Yadav

Abstract:- Energy efficiency and conservation are gaining attention due to increasing trend of greenhouse gas emissions. Increasing energy demand urges the researchers to design energy efficient, environmental friendly and commercially viable systems. Integration of thermal systems (hybrid systems) improves the energy efficiency, fuel utilization factor and reduces the carbon emissions. Integration of renewable energy sources avail the advantage of decentralized applications. The study investigates the effects of internal heat exchanger on the thermo-economic performance of organic Rankine cycle (ORC) configurations based on fluid properties and heat sources.

Thermal Performance Analysis of Simple Organic Rankine Cycle with and without Internal Heat Exchanger using EES Code
Authors:- M. Tech. Scholar Vinay Yadav, Asst. Professor Brijendra Kumar Yadav

Abstract:- In this study, performance of a simple organic Rankine cycle (S-ORC) and organic Rankine cycle with internal heat exchanger (IHX-ORC) have been compared. Two ORC configurations are investigated as follows: S-ORC and IHX-ORC. With respect to different ORC configurations, the first law efficiency, second law efficiency and net work done will be compared under the conditions of different heat source temperatures and heat source flow rates. The effects of working fluid type, heat source temperature domains on the system, thermo-economic performance will be investigated. Furthermore, the effects of pinch point temperature difference in IHX on the IHX-ORC system are analyzed.

A Review on Spectrum Efficiency Improvement for Quasi-Constant Envelope OFDM

Authors:- M. Tech. Scholar Rishabh Shukla, Hod. Dr.Vineeta Saxena Nigam

Abstract:- Benefiting from low peak-to-average power ratio (PAPR), constant envelope OFDM (CE-OFDM) is a promising technique in coherent optical communication. However, the spectrum efficiency of CE-OFDM is only half of conventional coherent optical OFDM, which restricts its application. We proposed a novel quasi-constant envelope OFDM (Quasi-CE-OFDM) scheme with in-phase/quadrature (I/Q) modulator. Furthermore, a phase demodulation scheme based on Taylor series expansion is performed to reduce calculation complexity and avoid phase ambiguity. Simulation results show that the proposed scheme could double the spectrum efficiency effectively without losing the advantage of high nonlinearity tolerance.

Simulation Result of BER and OSNR Performance for Quasi-Constant Envelope OFDM

Authors:- M. Tech. Scholar Rishabh Shukla, Hod. Dr.Vineeta Saxena Nigam

Abstract:- Quasi-Constant Envelope OFDM transmits dual-stream simultaneously to improve the spectral efficiency of Constant Envelope OFDM. It can provide high data rate links and maintain a low PAPR to reduce the distortion caused by the nonlinear power amplifier. Thus, the quasi-constant envelope OFDM is suitable for satellite communication system. However, the carrier frequency offset (CFO) in satellite communication must be estimated and compensated before the demodulation. In this paper a CFO estimation scheme is proposed for quasi-constant envelope OFDM satellite system under additive white Gaussian noise (AWGN) channel. Since the null subcarrier at the transmitter can be considered as the prior information at the receiver, this null subcarrier can be used to estimate the CFO through phase demodulator and inverse discrete Fourier transform (IDFT) module at the receiver. Mathematical analysis reveals that the ideal estimation range of normalized CFO is nearly half of the size of IDFT under AWGN channel. Simulation results show that the proposed scheme performs well at moderate and high signal-to-noise ratio (SNR) conditions.

Grid-Connected Pv Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel , Professor Pragati Priya ,
Professor Manju Gupta

Abstract:-In the last decade solar power technologies became less costly and additional efficient, that have created it to an attractive resolution, being cleaner and additional environmentally friendly energy resource than traditional ones like fossil fuels, coal or nuclear. yet, a PV system continues to be rather more expensive than traditional ones, because of the high producing prices of PV panels, however the energy that drives them -the lightweight from the sun- is free, offered nearly everyplace and can still be present for many years, long in spite of everything non-renewable energy sources are depleted. One in every of the main benefits of PV technology is that it’s no moving components. Therefore, the hardware is very robust; it’s a long time period and low maintenance necessities. And, most significantly, it’s one resolution that gives environmentally friendly power generation. The efficiency of economic PV panels is around 15-20%. Therefore, it’s important that the power created by these panels isn’t wasted, by using inefficient power electronics systems. The efficiency and reliability of each single-phase and 3 part PV inverter systems is improved using transformer less topologies, however new issues related to escape current and safety need to be dealt with.

A Review on Grid-Connected Pv Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel , Professor Pragati Priya ,
Professor Manju Gupta

Abstract:- The need for cleaner surroundings and also the continuous increase in energy desires makes localized renewable energy production more and additional necessary. This continuously-increasing energy consumption overloads the distribution grids in addition because the power stations, so having a negative impact on power availability, security and quality [1]. One among the solutions for overcoming this can be the Distributed Generation (DG) system. dg systems using renewable energy sources like solar, wind or hydro, have the advantage that the ability is made in shut proximity to wherever it’s consumed. This manner the losses because of transmission lines aren’t present.

Fabrication of Al 7068 Reinforced with Tur Husk Ash (THA) and Alumina Hybrid Metal Matrix Composite by Powder Metallurgy and Evaluating Its Microstructure and Mechanical Properties
Authors:- Mohammed Amair Sohail, Associate Prof. B.S.Motgi, Prof. Dr. G.K. Purohit

Abstract:- The applications of metal matrix composites are increasing day by day due to high strength to weight ratio. The hybrid aluminum composites can be considered as an outstanding material where high strength and wear-resistant components are of major importance, predominantly in the aerospace and automotive engineering sectors. In the present work , Al7068 reinforced with tur husk ash(THA) and Al2O3 hybrid metal matrix composite is prepared from sintering of mechanically alloyed powder (ball milling) in powder metallurgy process. Different combinations of compositions (Al7068 reinforced with 0%,4%,8%,12% 0F THA and Al2O3) were taken with total 16 combinations. Hardness was found to be increasing with increasing percentage of Al2O3 but was decreasing with increasing percentage of THA. The microstructure of the composites was studied.

Dc Micro grid Monitoring and Protection
Authors:- Veerpratap Meena, Dr. Vinay Pant

Abstract:- With the proliferation of distributed energy resources (solar, fuel cell, etc.) and DC loads, the installation and deployment of DC microgrid is seeking more attention in the contemporary paradigm of power system evolution. DC microgrid adds advantage of overall system efficiency increase due to decrease in the conversion losses and ohmic losses. Also, energy storage components are directly connected to the DC bus with the help of bidirectional converters, thus increasing the reliability of the system. However, this stochastic integration of renewable and dynamic operations of controlling poses protection problems for the DC microgrids. The main challenge in DC micro grid protection and control operations is the lack of standards and guidelines. The fault clearing time is also affected due to the lack of inertia and resistive of nature of the network. There is no zero crossing in DC system which affects the operation of the circuit breaker for fault isolation. The presented state-of-art is focused on identification of types of fault protection device, challenges in the DC microgrid system, architecture of DC microgrid controller strategies and different protection techniques are also discussed. This paper review various types of parameter estimation techniques are discussed in detail to improve the protection scheme. Superimposed current based unit protection scheme, protection using the oscillation frequency and transient power, and parameter estimation approach are help to determine the fault location and type of fault.

Investigation of Microstructure and Mechanical Properties of Hybrid Composite Aluminum 7068 Reinforced with Tur Husk Ash (THA) and Silicon Carbide (Sic)
Authors:- Shaikh Mohammad Tayyab Raza, Associate Prof. B.S.Motgi, Prof. Dr. G.K. Purohit

Abstract:- This paper deals with the fabrication of Al-7068 composites manufactured by powder metallurgy route reinforced with different weight percentages of tur husk ash (THA) and SiC A low pressure of 400 MPa was applied for compacting the composites and sintered at a temperature of 720oC for three hour. TG and XRD analysis of tur husk ash (THA) was done to obtain its chemical composition. SEM and EDX analysis was done to study the micro-structural behavior. Hardness and compression test were carried out. The hardness has been improved by adding the weight percentage of SiC but seems to be crash by adding the weight percentage of tur husk ash (THA). The compressive strength was found to be varying.

E-Mail Spam Classification Using Long Short-Term Memory Method
Authors:- M.E. Scholar (CSE) Shripriya Dongre, HOD (CSE) Prof. Kamlesh Patidar

Abstract:- In recent years, the single-modal spam filtering systems have hade high detection rate for text spamming. To avoid detection based on the single-modal spam filtering systems, spammers in jet junk information into the multi-modality part of an email and combine them to reduce the recognition rate of the single-modal spam filtering systems, there by implementing the purpose of evading detection.In view of this situation,a new model called text based data set module architecture based on model fusion (MMA-MF) is proposed, which use a text based dataset fusion method to ensure it could effectively filter spam whether it is hidden in the text. The model fuses a Convolution Neural Network (CNN) model and a Long Short-Term Memory (LSTM) model to filter spam. Using the LSTM model and the CNN model to process the text parts of an email separately to obtain two classification probability values, then the two classification probability values are incorporated into a fusion mode lt identify whether the email is spam or not. For the hyper parameters of the MMA-MF model, we use a grid search optimization method to get the most suitable hyper parameters for it, and employ a k-fold cross-validation method to evaluate the performance of this model. Our experimental results show that this model is superior to the traditional spam filtering systems and can achieve accuracies in the range of92.64–98.48%.

Review Paper on Analysis & Conduction of Certificate Examination in Cloud Environment
Authors:- Prof. C.U Chauhan, Priyanka Gupta, Snehal Gondane, Omeshwari Bobade, Roshan Gabhane, Sachi Gedam

Abstract:- Traditional Exam cell activity mostly includes a lot of manual paper work. The aim of the project is to build a centralized system. So that all the examination activities can be done effectively and efficiently for both students and admin . The final system would constitute a computerized module aimed at replicating offline exam cell process. The system is a new concept which came into existence because of a large amount of data being on paper. The automated system for exam cell department will benefit both the students as well as exam cell department staff to easily handle the entire task related to exam cell in contrast to the existing manual system. This system will make the procedure of exam cell in an organized manner. The admin can also generate the Transcripts and Letter of Recommendation, and can also verify, confirm the photocopy and revaluation of each applied student by using the CLOUD COMPUTING Technology.

Grid Tied One Megawatt Solar Photovoltaic Power Plant at Bhopal: A Feasibility Study
Authors:- M.Tech Scholar Lalit Kumar Goel, Prof. (Dr) Mukesh Pandey, Associate Prof. Dr Anurag Gour

Abstract:- With about 300 clear and sunny days in a year, the calculated solar energy incidence on India’s land area is about 5000 trillion KWh per year. India is densely populated and has been blessed with high solar insulation; it is a best combination for harnessing solar power. The way India is tapping the solar energy, the country is already a leader in solar power generation. In the solar energy sector, large projects have been proposed, and a 34,000 km2 area of the Western Desert has been earmarked for solar power projects, sufficient to generate 500 GW to 2,000 GW. Ministry of New and Renewable Energy(MNRE) has released the Jawaharlal Nehru National Solar Mission (JNNSM) Phase 2 Draft Policy, our Government is planning to install 10GW of Solar Power, and of this planning, 4 GW is under the central govt scheme and the remaining 6GW under state govt schemes.

Heart Rate Measurement using The Change of Color of Skin over Time Due To Blood Flow
Authors:- Soumyadip Chattopadhyay

Abstract:- Heart Rate is an important medical parameter in case of maintaining one’s health. There are some apps available in the market that can calculate the heart rate of a person by using a Smartphone camera. No external pulsometers are required. But, these applications also consists of different issues in measuring proper pulse, like motion, noise in capturing the video, premature ventricular contraction and many more. Also some human errors like low or high pressure on the mobile camera, misplacement of finger over the camera leads to countable amount of error in measurement of Heart Rate. In our case of study, we have developed an application using existing algorithms that can cut down these errors up to an extent and gives the user almost error less Pulse of him or her by using the video of change of color of skin over time. We have captured video to get the PPG using smart phone and used tan 1st order Butterworth (IIR) band pass filter with frequency domain analysis and Hann windowing for leakage reduction.

Production of High-Strength Concrete by Utilizing Volcanic Pumice Waste in KSA, Jazan Region: Particle Size Effect
Authors:- Abdullah M. Zeyad, Saeed A. Al-Qahtani, Hussain A. Al-Shehri

Abstract:- Volcanic areas are scattered in several areas of Saudi Arabia. This spread contributes to the diversity of the sources of volcanic substances and their chemical structures. This study assesses the use of volcanic pumice powder (VPP) obtained from volcanic residues in the western region of Saudi Arabia to produce high-strength concrete (HSC). Chemical analysis reveals that these volcanic residues consist of 76.01% pozzolanic materials. The VPP was used to replace part of the cement content of HSC, and the effects of replacing 10% and 20% of the cement mass with VPP on HSC properties were studied. In particular, the effects of granules measuring 4.96 µm (4VPP) and 63.6 µm (60VPP) in size were observed. The compressive strength, flexural strength, indirect tensile strength, porosity, and water absorption rate of the samples were determined after 7, 28, and 90 days of curing. The compressive strength of HSC samples containing 10% (4HSC10) and 20% (4HSC20) 4VPP improved by 12.0% and 16.6% compared with those of 60HSC10 and 60HSC20, respectively, after 28 days of aging. Water absorption decreased when the main particle size was 4 mm compared with that when the main particle size was 60 mm. The water absorption rate decreased by 12% after 28 days of curing when 20% of the cement mass was replaced with 4VPP.

Estbt- Enhance Secure Trust Based Transmission for Mobile Ad-Hoc Network
Authors:- Shailendra shrivastava, Sushma Kushwaha

Abstract:- Mobile Ad-Hoc network is most popular in current scenario but when this network popular increased as well as so many attacked or unauthorized access increased. In this article will analysis about secure and trust based communication. In any case, constructing a trust model that receives recommendation by different hubs in the system is a testing issue because of the danger of dishonest recommendation like bad-mouthing, ballot-stuffing and collusion. The attacks caused by badly behaving nodes when increasing recommendations in the existing trust models. A recommendation based trust model demonstrate with a protection plan, which uses clustering technique to powerfully filter out attacks related to dishonest recommendations between certain time in view of number of cooperation, similarity of data and closeness between the hubs. The model is observationally tried under a few mobile and separated topologies in which hubs encounter changes in their neighborhood prompting regular course changes. The experimental investigation exhibits vigor and precision of the trust demonstrate in a dynamic MANET condition. This model can be extended by weighting recommendations based on time and location to mitigate the influence of location and time dependent attacks.

Classifying Vehicle Activity Patterns from Iot Device & Remote Monitoring System
Authors:- M.Tech. Scholar Prachi Pandey, Asst. Prof. Ankur Taneja

Abstract:- By using the Internet of Things Technology can greatly enhance the performance, monitoring and maintenance of the vehicle. In this paper analysis is based on the Implementation of new cost effective methodology based on IoT to monitor vehicle health remotely for performance evaluation. This will facilitate preventive maintenance, fault detection, historical analysis of the vehicle in addition to real time monitoring. In this paper analysis The vehicle consist of onboard GPRS module which collect the CAN data from the CAN device fitted on the vehicle and send it to the remotely located server. Second phase work focus on Monitoring the temperature of the vehicle system avoid sparking of the vehicle and also providing the fuel consumption & Battery information of display and third phase of implementation using of GSM Module when vehicle is provide the unusual activity & driver is facing any problem then it give message to the owner of vehicle. In this proposed IoT system that allows the owner to monitor the data provided by the sensors available on a vehicle, and to control processes automatically, anytime and anywhere using cloud system analysis. We are Using Support-Weight Approach for classification of IoT Data, after that we compared some parameter like Computation Cost, Computation Time, Accuracy etc.

Parking System for Smart City using Internet of Thing
Authors:- M.Tech. Student Monika Bijore, Asst. Prof. Monika Raghuwanshi

Abstract:- – Recently parking has become a serious issue and even worse, because of the increasing number of automobiles everywhere. In this paper we propose an IoT based guidance for user as well as Upcoming self-driving vehicles to search parking space for the vehicle. it also help user to choose the right vehicles to travel according to the parking spaces available to the destination point. it provides an intelligent guidance to the user, user can choose their travelling vehicle as two wheelers, four wheelers or public transport according to the traffic density. It aims to develop an intelligent parking guidance system. which reduces difficulty in conventional parking system. The system can monitor the state of every parking slot by deploying a sensor node on the slot. Accordingly, sensor senses the status of parking slot and sends status to central node server controller. The controller unit collects the data from all sensor node and upload to the server using http protocol where user can check the parking status from anywhere using internet and any browser. The system can also integrate with the artificial intelligence network like google assistance and self-driving car. Google assistance assist user to choose right vehicle according to the traffic density and parking space available at the destination point. User can simply see the space available by clicking in google map of their destination building or social parking.

A Study on Design of Single Sided Linear Induction Motor and Controlling with Voltage Source Inverter Fed Convertor
Authors:-M. Tech. Scholar S. Venkata Sai Kumar

Abstract:- Now-a-days, Linear Induction Motors are widely used, in many industrial applications like transportation, conveyor systems, actuators, material handling, pumping of liquid metal, and sliding door closers, etc. The advantages of linear motor is that it requires no mechanical rotary-to-linear converters, high efficiency and economical. The linear induction motor is very useful at places requiring linear motion since it produces thrust directly and has a simple structure, easy maintenance, high acceleration/deceleration and low cost. Linear Induction Motor is basically a rotating squirrel cage induction motor opened out flat. Instead of producing rotary torque from a cylindrical machine it produces linear force from a flat one. The stator of the linear induction motor acts as the primary and the rotor of the linear induction motor acts as the secondary of linear induction motor. As a result, the stator is built with steel laminations and rotor is built with conductor sheet and black iron. The single sided linear induction motor construction is easy and low cost. The working principle of single sided linear induction motor is same as the conventional induction motor. In the secondary eddy current is generated due to an induced EMF. The EMF is induced because of relative velocity between travelling magnetic flux and secondary. The thrust force or linear force is produced due to interaction between travelling flux and eddy current. In this paper, a single sided linear induction motor design parameters are analyzed and prototype has been designed and motor will be control with Voltage Source Inverter Fed Convertor.

Grid Tied One Megawatt Solar Photovoltaic Power Plant at Bhopal: A Study on Performance Analysis Including Efficiency Calculation
Authors:- Research Scholar Lalit Kumar Goel, Prof. (Dr) Mukesh Pandey, Assistant Prof. Dr Anurag Gour

Abstract:- The growing energy demand in developing nations has triggered the issue of energy security. This has made essential to utilize untapped potential of renewable resources. India is focusing on development of its own sources of energy. For PV panels, the efficiency of converting solar energy to electricity is around 7%.Average solar radiation incident over India varies from 4kWh/day – 7 kWh/day. Grid connected PV systems have become the best alternatives in renewable energy at large scale. Performance analysis of these grid connected plants could help in designing, operating and maintenance of new grid connected systems. A 1MW photovoltaic grid connected plant commissioned at Bhopal is one of the commercial solar power plants with the site receiving a good solar radiation of 5.61 kWh/m2/day and annual temperature of about 31.2 oC . The plant is designed to operate with a fixed tilt. In this study the solar PV plant aspects along with its annual performance is elaborated.

A Review on Implementation of Queuing Theory Along with Lean Technique in Manufacturing Industry
Authors:- M.Tech. Scholar Bharat, Professor Vipul Upadhayay, Yogesh P Ladhe

Abstract:- Within the combinatorial scheduling community, there has been an increasing interest in modeling and solving scheduling problems in dynamic environments. Such problems have also been considered in the field of queuing theory, but very few research take advantage of developments in both areas, and previous surveys on dynamic scheduling usually make no mention of queuing approaches. In this research, we provide an overview of queuing theoretic models and methods that are relevant to scheduling in dynamic settings.

Automobile Technology A Study of Past, Present and Future
Authors:- Md. Shakil Hossain

Abstract:- This paper highlights the journey of automobile technology since the very beginning of invention to the present, also discuss the future development of this technology. Automobile technology is always of interest to those people who like to know and get touched with new invention of engineering. This paper can help one to recognize the development in vehicle technology for the past, present, and future. Lot of changes happened in automobile technology since 19th century, when the first radio controlled vehicles were designed. In the subsequent decades, automotive electric cars appeared which were powered by battery and embedded circuits in the roads. By the middle of last century, automotive cars were having approximately same electronic systems shown one by one. Various semi-autonomous type set up in modern cars such as lane keeping, automatic braking and adaptive cruise manage are based on such systems. It is forecasted that most companies will start fully autonomous vehicles by the coming of next decade. The future of autonomous vehicles is an ambitious era of safe and comfortable transportation.

Smart Sugarcane Crop Growth Monitoring System using IOT and Image Processing
Authors:- Someshwar Terkar, Saurabh Shinde, Sushma Potdar, Neha Chavan, Ms. K.S. Jadhav

Abstract:- Agriculture is the most important sector of an Indian economy. Sugarcane is the main source of sugar in India and holds a prominent position as a cash crop. People uses conventional way for the farming. Conventional way requires more human power. Around 55% people in India has been engaged in agriculture but only 15% goods we get from the agriculture. Though there is a large area under cultivation, we don’t get maximum yield. The fact that most of our farmers have the lack of proper knowledge makes it even more erratic. A large portion of farming and agricultural activities are based on the predictions, which at times fail. Due to this, farmers have to bear huge losses. Since we know the benefits of proper irrigation and soil nutrients in the growth of sugarcane crop, such parameters can’t be ignored. Diseases occurred to the sugarcane plant can affect the yield of sugarcane. Sothe “Smart sugarcane crop growth monitoring system based on IOT and image processing” is one of the best way to increase crop yields.

Data and Components Availability
Authors:- Atharva Manoj Kulkarni

Abstract:- Agriculture is the most important sector of an Indian economy. Sugarcane is the main source of sugar in India and holds a prominent position as a cash crop. People uses conventional way for the farming. Conventional way requires more human power. Around 55% people in India has been engaged in agriculture but only 15% goods we get from the agriculture. Though there is a large area under cultivation, we don’t get maximum yield. The fact that most of our farmers have the lack of proper knowledge makes it even more erratic. A large portion of farming and agricultural activities are based on the predictions, which at times fail. Due to this, farmers have to bear huge losses. Since we know the benefits of proper irrigation and soil nutrients in the growth of sugarcane crop, such parameters can’t be ignored. Diseases occurred to the sugarcane plant can affect the yield of sugarcane. Sothe “Smart sugarcane crop growth monitoring system based on IOT and image processing” is one of the best way to increase crop yields.

A Survey on Different Techniques of Static and Dynamic Load Balancing
Authors:- Ph.D Scholar Vinod Patidar, Dr. Shiv Shakti Shrivastava

Abstract:- As cloud computing have number of issues related to security, bandwidth efficiency, large information handling, load balancing, etc. Load balancing implies distribution of the workload to node or servers or assets with the goal that one can accomplish maximum utilization of resources, reduce execution time, increase system throughput and so on. This paper gives a concise study of cloud based service balancing methods proposed by different researchers. Here various features of service are detailed for the load balancing and planning. Different sorts of requirement of load balancing was additionally talked with their significance and limitations. So according to the module as well as steps used in techniques classification of load balancing algorithms are done with a comprehensive and comparative understanding of existing literature.

A Survey on Techniques and Features of Document Classification
Authors:- Ph.D Scholar Vinod Sharma, Dr. Shiv Shakti Shrivastava

Abstract:- Traditional information retrieval methods become inadequate for increasing vast amount of data. Without knowing what could be in the documents; it is difficult to formulate effective queries for analyzing and extracting useful information from the data. This survey focused on some of the present strategies used for filtering documents. Starting with different types of text features this paper has discussed about recent developments in the field of classification of text documents. This paper gives a concise study of methods proposed by different researchers. Here various pre-processing steps were also discussed with a comprehensive and comparative understanding of existing literature.

A Survey on Intrusion Detection System Techniques and Features for Identification
Authors:- Ph.D Scholar Raj kumar Pandey, Dr. Shiv Shakti Shrivastava

Abstract:- The intrusion detection systems (IDSs) are essential elements when it comes to the protection of an ICT infrastructure. Intrusion detection systems (IDSs) are widespread systems able to passively or actively control intrusive activities in a defined host and network perimeter. Recently, different IDSs have been proposed by integrating various detection techniques, generic or adapted to a specific domain and to the nature of attacks operating on. In this paper survey was done on the various techniques of intrusion detection system where some of supervised and unsupervised intrusion detection techniques are discussed. Here methodology of various researchers is explained with their steps of working. Different types of attacks done by the intruders were also discussed.

Design and Development of Text-Image Watermarking Based on Integer Wavelet Transform (IWT) and Discrete Cosine Transform (DCT)
Authors:- PhD Scholar Arpana Bhandari, Associate Professor Dr. Shailja Shukla, Professor Dr. Rajiv Shrivastava, Asst. Professor Dr. Vijay Bhandari

Abstract:-This paper investigates Text-images still has a great importance, despite the spread of electronic texts. Text-images are protected using digital watermarking. This paper proposes a watermarking method applied to text images. This method integrates two transforms: integer wavelet transforms (IWT) and discrete cosine transforms (DCT). For the watermark embedding, IWT is performed on the cover image and DCT is applied to the low frequency sub-band LL. The watermark image is inserted in the lower to medium DCT coefficients to achieve a high degree of robustness and imperceptibility. Experiments using different English text-images are performed to evaluate the proposed method in terms of imperceptibility and robustness. Results show that the proposed method has higher imperceptibility compared to other existing methods applied to English text-images. Also, the proposed method provides good robustness results, especially against compression and noise..

Smart Home Automation Technique using Unsupervised Machine Learning Algorithm
Authors:- Nikhil, Amit Sahni, Rishav Kumar Thakur

Abstract:-Smart home mechanization technique is getting highly considered these days because its wide selection of uses like security system, controlling home appliances, entertainment system, lighting etc. Large quantity information is accumulated from the past good home expertise by the user however these information isn’t absolutely used, but currently because of development of huge information and machine learning technologies these prediction is also accustomed manufacture a very intelligent system. Regarding this paper proposes user behavior prediction formula (UUBP) that uses a artificial neural network(ANN) and tells a couple of new and advanced conception of forgetting issue to contend with the shortcomings of previous algorithm. This formula shows high-learning ability and wants minimum human intervention. This formula may contend with the user influence and outdated records. UUBP formula shows more robust performance then different algorithms.

Comparative Analysis of Traffic Classification Algorithms in Deep Learning
Authors:- Goddeti Mallikarjun, A. Srinish Reddy, J. Manikandan

Abstract:- Traffic classification is an important algorithm to a wide range of applications from QoS provisioning and billing in ISPs to security-related applications in firewalls and intrusion detection systems. Port-based, information packet scrutiny, and classical machine learning ways in which area unit used extensively inside the past, but their accuracy has declined due to the dramatic changes in Internet traffic, particularly the increase in encrypted traffic. With the proliferation of deep learning ways, researchers have recently investigated these ways for traffic classification and according high accuracy. In this article, we tend to introduce a general framework for deep-learning-based traffic classification. We gift usually used deep learning ways and their application in traffic classification tasks. Then we have a tendency to discuss open issues, challenges, and opportunities for traffic classification.

Advanced Smart Road Deformation Detection System
Authors:- Reetu Jain, Aarav Amit Akali, Jai Jariwala, Tanay Nistala

Abstract:- Aging roads and poor road-maintenance systems resulted many potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly to find the location a data base as to be developed, which requires a specific pothole-detection system that can collect pothole information at low cost and over a wide area. However, pothole repair has long relied on manual detection efforts causing loss of time and money to government. Thus, in this paper, we introduced a pothole-detection system using a commercial “Road sepoy”. The proposed system detects potholes using vision-based tracking system and MATLAB algorithm specifically designed to work with road sepoy camera giving us accurately in real-time environment. Geo-mapping the pothole in google maps helps the exact location.

Automated Vehicle Identification and Toll Tax Collection
Authors:- Anwar A. Shaikh, Akshay B. Raskar, Sagar R.Sonne, Omkar S.Lalge, Prof. K.S. Jadhav

Abstract:- The ANPR (Automatic Number plate Recognition) system is based on image processing technology. It is one of the necessary systems designed to detect the vehicle number plate. In today’s world with the increasing number of vehicle day by day it’s not possible to manually keep a record of the entire vehicle. With the development of this system it becomes easy to keep a record and use it whenever required. The main objective here is to design an efficient automatic vehicle identification system by using vehicle number plate. The system first would capture the vehicles image as soon as the vehicle reaches the security checking area. The captured images are then extracted by using the segmentation process. Optical character recognition is used to identify the characters. The obtained data is then compared with the data stored in their database. The system is implemented and simulated on MATLAB and performance is tested on real images. This type of system is widely used in Traffic Control Areas, Tolling, Parking Area etc. This system is mainly designed for the purpose of security system.

A Survey on Cigs Solar Cell Technology
Authors:- Asst. Prof. J. Dinesh Kumar, Associate Prof. S. Prince Immanuel Alexander, Asst. Prof. G. Lavanya

Abstract:- Thin film solar cells are favorable because of their minimum material usage and rising efficiencies. The three major thin film solar cell technologies include amorphous silicon (α-Si), copper indium gallium selenide (CIGS), and cadmium telluride (CdTe). In this paper, the evolution of each technology is discussed in both laboratory and commercial settings, and market share and reliability are equally explored. The module efficiencies of CIGS and CdTe technologies almost rival that of crystalline solar cells, which currently possess greater than 55% of the market share. α-Si is plagued with low efficiency and light-induced degradation, so it is almost extinct in terrestrial applications. CIGS and CdTe hold the greatest promise for the future of thin film. Longevity, reliability, consumer confidence and greater investments must be established before thin film solar cells are explored on building integrated photovoltaic system.

A Review Article of Transportation Vehicles Routing Scheduling using Genetic Algorithm
Authors:- Kshitij Singh Chouhan, Professor Vinay Deulkar

Abstract:- The paper proposes a technique for the development of ‘‘optimal’’ transit route networks (for example, a bus route network) given the information on link travel times and transit demand. The proposed method, unlike previous techniques, primarily uses optimization tools for the development of the transit route network—the reliance on heuristics is minimal. In the proposed method, genetic algorithms, an evolutionary optimization technique, is used to develop the ‘‘optimal’’ set of routes. Results show that the proposed procedure performs better than the existing techniques.

A Survey on Optimization Techniques of Spectrum Sensing and Allocation in Cognitive Network
Authors:- Vivek Banerjee, Dr. Rajneesh Kumar Karn

Abstract:- Cognitive radio network increase spectrum as non-licensed users get chance to transfer their data. Hence IOT devices get dynamic access to the spectrum by sensing channel data. Spectrum sensing is a key enabler for cognitive radios technology in network implementation. Spectrum sensing identifies idle spectrum and provides attentiveness about the sensing radio environment. In this paper, a survey of the CRs technology is presented. Different papers of the spectrum sensing techniques are reviewed. Here paper has summarize techniques adopt by researchers to increase the detection rate, in different environment of ideal and real situation. Spectrum allocation algorithm also discuss as utilization depends on allocation as well. Comparison of sensing technique with their issues is tabularized. Paper has explained various evaluation parameters for comparison of spectrum sensing techniques..

Published by:

Journal on Civil Engineering Topics

Uncategorized

IJSRET is an online platform which gives a way to scholars, researchers to share their research paper/review paper/survey paper in the field of civil engineering. There is no doubt that the demand and the need of engineers who are expertise in this field is increasing day by day. As the demand is increasing so the improvement is also required along with it. So, for an improvement we have created this platform in which a researcher and a scholar can find an number of civil engineering topics to publish their research paper or they can suggest if they have something new related. They can submit their paper by selecting submit option, they can also check the publication charge by clicking on check publication charges, after that their paper will be published within 3-4 days after the complete analysis of their research paper by our team.

Submit Your Paper  / Check Publication Charges

One can publish their journal by selecting the links given below –

Spark your career with IJSRET PUBLICATION

From then above ideas of topics of a journal, if a researcher haven’t find any according to their findings and research so, they can directly contact us or they can also leave a feedback for us. Our team will consider your topics if it is suitable. Through this platform a researcher can spark their career by publishing their research paper.</p?

Published by:

Research Paper Publication Sites

Uncategorized

Websites having valid ISSN number can publish papers on there portal. So scholars who are looking for research paper publication sites can cross check for valid publication house by the presence of eight digit number. Each of publication media has its own format for presenting there content to the globe with signature of its site like name, logo, ISSN number, etc. Sites for publishing research papers should be at-least three year old have papers in each volume and issue. It should be attentive for young researcher as well. Junior researchers who are new in this field of publication can read following point to filter good publication media.

  1. Valid E-ISSN number
  2. Good impact factor from reputed organizations.
  3. Global indexing
  4. Highly responsive for author in there paper submitting, publishing.
  5. Reviewer team for fast response

Submit Your Paper  / Check Publication Charges

Research paper publishing sites providing all above services are good journals. Scholars who are initializing their work can consult with mentor for the same for selection of international journal. One should cross check relevant content other paper on the site as this increase the journal relevance with the publishing site.

Published by:

International Journal of Scientific Research Impact Factor

Uncategorized

Impact factor is a parameter to judge a journal site means journal having high impact factor is good while lower is not so. International Journal of scientific research impact factor are good sites to publish there research paper. Here number of agencies provide impact factor to journals base on the paper content, readers, downloads, etc. Each have its own set of rules. Some of agencies provide this value between 0-10, 0-100, etc. All International journal have various set of indexing and impact factor which confuse a lot for the young researcher, so journals having following points are considered as better journals.

a. Atleast Four year old International Journal
b. Each volume and Issue should have papers
c. Good set of reviewer team
d. Provide Digital certificates after publication
e. Paper should visible with complete content on site
f. Journal validation like ISSN number should be clearly mention.

Submit Your Paper  / Check Publication Charges

So scholars who are searching international journal of scientific research impact factor can read this article and remain updated from sties showing high impact factor with very less number of volumes. Research should confirm publication charges as well before submitting paper as some of journal do not mention those which result in waste of time.

Published by:

IJSRET Volume 5 Issue 4, Jul-Aug-2019

Uncategorized

Energy Systems Management of Low Impact Manufacturing of Milk
Authors:- Osiatuma O. Samuel, Gabriel G. Ojo, James O. Akinyoola, Aderinsola M. Olawumi, Ifeoluwa E. Elemure, EstherI. Adetayo

Abstract:- Milk producers are productive by world standards, and average agricultural productivity has increased significantly in recent years. This is achieved by increasing land use for livestock, improving pastures and feeding management, and increasing machinery, agrochemicals and irrigation areas. Also, farms are often located in beautiful environments that are frequently visited by members of non-agricultural communities, and farms can be found in receiving areas that supply water to the landfill in the city. High rates of environmental concerns within the Community Life cycle analysis has been widely used in the assessment of industrial production systems and has increased interest in the implementation of agricultural production in recent years. This focuses on the initial assessment of the life cycle of the milk production system concerning energy management used in farms milk. Problems related to life cycle assessment methods and methods used in the application of high-level agricultural production systems with the energy required.

Implementation on Low Power and Less Area Multiplier Using Adder
Authors:- M.Tech. Scholar Sarvesh Mani Pandey, Asst. Prof. Anil Khandelwal

Abstract:- The main intention of the paper is to use booth multiplier algorithm for designing the binary multiplier with the help of Ripple carry adder. The reason for using the booth’s algorithm is that, using booth’s algorithm we can reduce the number of partial products during multiplication. The adder here we have used is ripple carry adder. This adder has a very simple architecture and is very easy to implement. As here we are dealing with high bits, If we see overall including the adder and booth’s algorithm we get a binary multiplier which has comparatively high speed because of less partial products and less power consumption because of the adder architecture we have used. The results are obtained by executing VHDL code in Xilinx 14.1 ISE ripple + booth2514 used out of 63400 power dissipated in the design 0.42WA And Total Delay 8.042the area occupied by the intended by calculating the number of LUTs used out of total available LUTs. Here in the intended the number of LUTs used is 1895 out of 63400 LUTs available. Design summary also gives other important information related to intend.

Experimental Analysis of Convective Heat Transfer from Plate Fin Array on a Exhaust Pipe of EGR System
Authors:- A.P.Bagal, Dr. J.H. Bhangale

Abstract:- In this research, experimentally investigate convection heat transfer of Exhaust Gas Recirculation system with an array of square fins and fin spacing of 10, 20, and 30 mm and fin height 5mm,10 mm,15 mm. By changing the surface temperature by varying the input power of the heating element.To measure the temperature of various points on each EGR. We used six thermocouples and measured its temperature under the steady-state condition. In addition, average natural heat transfer coefficient increases to a certain value and then decreases when fin spacing increases. In Exhaust Gas Re circulation system Nitrous Oxides are formed at higher Temperature. This Nitrous Oxides are Very harmful For Environment. To Improve Heat transfer Characteristics of EGR pipe by placing Fins at different spacing and height such that it reduces temperature of Exhaust gases so that it helps in reducing Nox pollutants from Diesel Engines. For this Purpose we used fins with 10mm spacing & height 5 mm, 20 mm spacing & height 10mm and spacing 30 mm &height 15 mm and heat transfer like convection heat transfer coefficient and convection heat transfer rate are observed.

A Review on Low Power and Less Area Multiplier Using Adder
Authors:- M.Tech. Scholar Sarvesh Mani Pandey, Asst. Prof. Anil Khandelwal

Abstract:- Speed of the multiplier is highly dependent upon the number of partial products generated and the adder architecture used to add these partial products. The main intention of the paper is to use booth multiplier algorithm for designing the binary multiplier with the help of Ripple carry adder. The reason for using the booth’s algorithm is that, using booth’s algorithm we can reduce the number of partial products during multiplication. The adder here we have used is ripple carry adder. The viper here we have utilized is swell convey snake. This snake has an extremely straightforward engineering and is exceptionally simple to actualize. As here we are managing high bits, If we see generally speaking including the viper and stall’s calculation we get a twofold multiplier which has nearly rapid on account of less halfway items and less power utilization as a result of the snake engineering we have utilized.

Investigation on Aerodynamic Performance of Elliptical and Secant give Nose Cones
Authors:- Danish Parvez, Sonia Chalia

Abstract:- In this paper, the computational and experimental approach was used to study the aerodynamic performance of elliptical and secant ogive nose cone profiles. The aerodynamic characteristic’s such as pressure, coefficient of pressure, axial velocity, total drag, dynamic pressure etc. for the secant and elliptical nose cone profiles were illustrated for low subsonic speeds for the same length to diameter ratio. Simulation were carried out with inlet velocity of 25 m/s, calculated for zero angle of attack to demonstrate the flow behaviour around the nose cone profiles. The data obtained from the computational analysis of the nose cone shapes was compared with the experimental data obtained from the wind tunnel analysis in order to find out the deviation. It was found out that the elliptical nose cone experienced less skin friction drag in comparison to secant ogive. Also, the velocity near the trailing edge in case of secant ogive was found out to be more when compared to elliptical nose cone. After comparing both the nose cones on the basis of coefficient of drag, skin friction drag and total drag experienced by the body, elliptical nose cone was found to be most efficient amongst the two.

Review on Properties of Concrete Using Silica Fume and Met kaolin as Partial Replacement of Cement
Authors:- Research Scholar Sukhendra Mani Tiwari, Asst. Prof. Sumit Rajak, Asst. Prof. K.G Kirar

Abstract:- The replacement of cement by various mineral admixtures as supplementary cementing materials for concrete has gained a global attention in recent years. This replacement becomes efficient not only by increasing the strength and durability of the concrete but also reduces the usage of the ordinary cement thereby curtailing the environmental hazardous due to cement manufacturing industries. This paper reviews the work carried out on the use of silica fume (SF)and Metakaolin (MK) as supplementary cementing materials for the partial replacement for cement. The literature demonstrates that both Silica Fume and Met kaolin are effective and causes significant improvement in various properties of the concrete in both fresh and harden state.

Experimental Investigation on Properties of Concrete Using Silica Fume and Met kaolin as Partial Replacement of Cement
Authors:- Research Scholar Sukhendra Mani Tiwari, Asst. Prof. Sumit Rajak, Asst. Prof. K.G Kirar

Abstract:- This experimental investigation is carried out to study the different strength characteristics of concrete with partial replacement of cement with Silica Fume and Metabolic. In this investigation cement of M25 grade of concrete is replaced with Silica Fume and Metakolin in different percentage as 5%, 10% and 15%. Experimental analysis of addition of Silica Fume and Metakolin in concrete has been done. Strength of concrete was determined by performing compression test (150mm x 150mm x 150mm) size cube, split tensile test (150mm diameter and 300mm length cylinders) and flexural strength (100mm x 100mmx 500mm) size beam.

Software Defined Data Center [SDDC] Concepts
Authors:- Logesh Rajendran

Abstract:- Data center is a facility built with IT equipment’s and support infrastructures, which enables an organization to delivery IT services. Data center predominantly contains compute, storage, networks interconnecting entire physical equipment’s using a communication network and this equipment’s helps businesses to organize, process, store, and retrieve large amount of data. Virtualization and Cloud have significantly impacted the data center infrastructures particularly in the network infrastructure. There are many additional demands in today’s data centers where the devices and applications are increasing. This paper explains the technology of server virtualization, storage virtualization and network virtualization present in the modern data center which is termed as Software Defined Data Center (SDDC).

Pure Water a Way to Get better Future Cloud Sucker Skyscrapers Pure Water’s Mine the Skyscrapers
Authors:- Gurveer Singh

Abstract:- This is the technique of getting pure water for fulfilling the various use of human needs. This technique is based on the principle of suction machine. This technique uses the cloud sucker machine within the skyscraper at some height from the ground. The cloud sucker machine is used for in halting the clouds from the sky. This is the easiest and the cheapest way of getting pure water in huge quantity for human needs. The use of skyscraper in modern era for getting water from the clouds is the biggest deal. As from the stone age to now we all depends on ground water but now when there is deficiency in ground water or when the ground water table goes on deceasing day by day may cause problem of deficiency of pure water for human need and may cause draughts. This innovation is better way of getting pure water in easiest way without any treatment and this innovation produces electricity from water without any water ponging method. This is the way to increase & protect the ground water table and water sources .There’s no need to purifying the sea water with costly method when the nature gives us lots of pure water on ground and in the sky also in the form of clouds.

A Survey on Demand side Management Various Requirements and Techniques
Authors:- Navin Kumar Sah, Prof. Ashish Bhargayah

Abstract:- Electricity demand in India is steadily increasing as electrical loads grows and largely due to population growth, as well as due to government subsidies which may lead to prices much lower than actual production cost. This growth represents a challenge that requires India power generation Company to invest huge amounts of money every year, for the construction of additional generation capacity along with the reinforcement of transmission network to meet the consumption growth. Also the demand varies frequently throughout the day, causing a waste of a large part of the energy. So the optimum solution lies in altering the load shape in order to have a better balance between customer’s consumption and power generation companies. Here detail survey of different demand side management (DSM) techniques was study. Here paper gives a brief review of research conduct by various other researchers in this field of DSM. Explanation of working architecture was also done.

Evaluation and Identification of Android Networking Libraries
Authors:- Jaydevi Bhade, Prof. Himanshu Yadav

Abstract:- Every single person in our population has mobile and most of the work doing through mobile phone. Now expansion of internet, mobile technology becomes more popular. For this android development has really charm for us. This research is study of different networking libraries used in mobile for network communication. Therefore, there are lots of open source network libraries that app developers use on a daily basis for development. In Old days, networking in android was a frightening. At this time the problem is find out which solution fits for better android app projects development necessities. Thus, android developers face the tendentiousness of selecting an appropriate network library for their specific mobile application. To reduce the challenge, this paper proposes an empirical method for bench marking, which includes a comprehensive study of selected libraries and a selection of representative metrics. This paper has four android networking libraries Http Client, Volley, Retrofit and Fast Android Networking are selected for study analysis. This research examines these libraries and find which library is suitable for developers as their necessities so that they provide better experience to mobile app users.

An Audit, Assessment and Cost Analysis of Road Accident for Road Safety at Selected Stretch of NH-52
Authors:- M.Tech. Scholar Juber Khan, Asst. Prof. Himanshu Bhardwaj, Prof. Dr. Bharat Nagar

Abstract:- Road traffic accident in India is taken as an event, not a evil event, it has a huge loss to country’s human, health and economical crises. Road traffic accident have great impact on individuals, communities and nation. This is leading cause for massive cost to frequent overburden healthcare system, productivity and prosperity with deep social and economic loss. The natural causes are due to the act of god and cannot be prevented but on the other hand road accidents are caused by the manmade environment and can be controlled WHO reports says that 1.24 million people suffered from road traffic accident i.e. 3400 person daily worldwide, and it is 1st leading cause for death in 15 -29 years age person. More than 90% of accident occurs in low-middle income countries, without any action it will leads to 1.9 million in 2030. In India, According to the MORTH report, road accidents on National Highways, State Highways and Other Roads are 30.4%, 25.0% and 44.6% respectively of the total road accidents. Reports also prevails that the number of accidents is more in rural area than urban develop area. This study comprises of finding cost of accident with respect to social and economical loss of nation so that I could give recommendations to minimize the risk and severity of accidents in study area, by analyzing the road safety features, and accident analysis using data and various research for achieving “BARSIALS ZERO ROAD ACCIDENT VISION 2020”.

Endoscopic Image Enhancement using Blind Denoising
Authors:- Snehal Pawar, Amarsinh Deshmukh, Rahul Mulujkar

Abstract:- Biomedical images such as endoscopic images, retina, MRI, X-ray plays important role in the analysis and diagnosis of the internal body structure. Endoscopic image is used during pregnancy, plastic surgery, orthopedic surgery, spinal surgery etc. to examine internal body structure. Endoscopic images are corrupted with various types of noise. The noisy image results into inaccurate diagnosis and thus the endoscopic image denoising is essential. In this paper a method known as blind denoising has been used to improve the visual quality of the images. In the proposed method we first estimate the noise level in the image obtained. Now having known the noise level we apply BM3D algorithm to denoise the endoscopic image. By the proposed method it is found that the PSNR of the test image is improved. The enhanced image will help the doctors for accurate diagnosis.

Enhancement of Free Convection Heat Transfer from Horizontal Rectangular Fin Array with antagonistic space& Stepped Rectangular Notch
Authors:- PG Student P.S.More, N.G.Narve, Emiritus Prof. N.K.Sane

Abstract:- Heat transfer thanks to free convection of air from compensative, full rectangular fin array are investigated through an experiment. For study purpose short fin array has been designated that show single chimney flow pattern. Middle portion of fin array becomes in effective thanks to vaso constrictor distinction between getting in to air &fin surface. Therefore in gift study, middle portion is removed by cutting rectangular notch and more wherever more recent air are available contact with fin expanse. Results are obtained over vary of spacing from 12mm to 25mm and warmth input from 25W to 100W. Length & height of rectangular fin array was unbroken constant. Comparison has been created between full, compensative rectangular fin arrays. it’s found that full rectangular fin array performed higher of course.

Implementation of Crowd Surveillance Iot System by Using Digital Image Processing Algorithm
Authors:- Research Scholar Sanjay Singh, Asst. Prof. Adesh Srivastava

Abstract:- Determining the size of crowd in real time is a major research area these days. The input regarding the crowd size to the security managements may serve a greater cause of safety. The manual detection of the crowd size from the CCTV by monitoring the video by human is accurate but it requires 24X7 continuous monitoring the video, which is not possible if the guard is observing more than one video. So the automatic detection of the crowd size will beneficial. The contribution of this thesis is in the field of crowd counting. Size of crowd is a important clue of a present scenario, therefore the maximum existing peoples counting methods have utilized the important scenario to count the existing crowd. Great challenge is to obtain an efficient method for crowd density now days. In this thesis, a novel approach is proposed which is based on local image features, which are specific to individuals and groups within a scene, so the total crowd estimate is the sum of all group sizes. An extensive analysis shows that local features consistently outperform holistic features. This thesis proposes a novel visual representation called textures of optical flow which captures the properties of motion patterns in crowded environments by applying traditional textural features directly to an optical flow field. Results demonstrate that the proposed approach outperforms existing algorithms on benchmark anomaly detection sequences. In order to bring an automated solution to this problem, we propose a novel approach.

K-Fold Cross-Validation Machine Learning Approach on Data Imbalance for Wireless Sensor Data:-A Review
Authors:- M. Tech. Scholar Mandavi Tripathi, Asst. Prof. Ankur Taneja, Asst. Prof. Lakhan Singh

Abstract:- Machine learning is used to teach machines how to handle the data more efficiently. Sometimes after viewing the data, we cannot interpret the pattern or extract information from the data. In that case, we apply machine learning with the abundance of datasets available. The purpose of machine learning is to learn from the data. Many studies have been done on how to make machines learn by themselves. Data imbalance problem become greatest issue in for machine learning algorithm. Imbalance problem occur where one of the two classes having more sample than other classes. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The minority samples are those that rarely occur but very important. There are different methods available for classification of imbalance data set which is divided into three main categories, the algorithmic approach, data-pre-processing approach and feature selection approach. We will apply on wireless imbalance data to identify correct information. In this research work systematic study for define which gives the right direction for research in class imbalance problem. By review on K-fold cross validation algorithm we indentify problem as well as we will work on this solution to estimate the skill of the model on new data.

Green Synthesis of Silver Nanoparticles and the Detection of Urea in Milk Sample by Spectrophotometric Method Using Silver Nanoparticles
Authors:- Sadhan Jyoti Dutta

Abstract:- Synthesis of silver nano particles(AgNps) and the development of silver nanoparticles(AgNps) has been done using the green synthesis method. Tea extract(Camelia sinensis) has been used as the reducing agent(bioreductor) due to its presence of antioxidant property(Catechin compounds) which will help to reduce silver nitrate(AgNO3) to silver nanoparticles. The Ferrous Reducing Antioxidant Power(FRAP) assay was used to determine the antioxidant power of the plant extract(tea). Accordingly, the plant extract(tea) was added to the silver nitrate(AgNO3) solution to form silver nanoparticles (AgNps) and also citrate-capped AgNps. These two types of AgNps were then characterized with the help of UV-Vis Spectroscopy. The silver nanoparticles that were developed were then used for the detection of urea present in milk which is used as an adulterant to increase the protein content in milk. For this purpose, whey protein was prepared from milk using centrifugation and filtration, thus separating whey protein from casein. Stock samples were prepared by adding AgNps and citrate-capped AgNps to the whey protein with and without urea as contaminant. Visual changes were observed in the contaminated samples and also the change in absorbance was observed with the help of UV-Vis Spectrophotometer.

Automation in Fire Protection System Using Internet of Thing (IoT): A Review
Authors:- Vikash Kumar Singh, Lakhan Singh

Abstract:- In current scenario we all want automation in every important work like water saving, Electrical power saving fire protection system etc. By using Internet of thing we can achieve automation from anywhere or remotely. IoT is an important sector which deals with the data distribution and internet usage over the component communication. Fire is unpredictable situation and very dangerous if it happens. So, it is important to detect and act fast before the condition get worst. In this paper, we will study about an IoT based Fire Alerting System for buildings which can detect fire as early as possible using various sensors, act accordingly without any human interaction and send related information through IoT. In this Review paper will analysis of fire protection system and their solution.

Green Supply Chain Management with Artificial Intelligence Based Optimization
Authors:- Dhananjay Kumar Yadav, Mr. Kamlesh Gurjar

Abstract:- Green supply chain management is one kind of modern management patterns which changes the relationships between the traditional environment government and enterprise development, its development has the important influence on promoting the enterprise and society’s sustainable development. According to the circular economy theory and the structure of traditional supply chain, this paper constructs the green supply chain’s system structure based on the circular economy, which includes four cycles from small to large and from partial to whole as follows: Reuse cycle, Remanufacture cycle, Recycle, And analyzes the viewpoint that the own activity of human being only could pursue the semi-closed circulation, the completely closed macro cycle could only be realized by the union with nature, then proposes the way how to implement the green supply chain management in our country based on the idea of circular economy.

A Review On Multi Storied Building By Changing Different Shapes of Shear wall For Zone IV & V Under Plain And Sloping Ground Condition
Authors:- M. Tech. Scholar Shriya Chandrakant Agrawal, Prof. Pratiksha Malviya

Abstract:- In the seismic design of buildings, reinforced concrete structural walls, or shear walls, act as major earthquake resisting members. Structural walls provide an efficient bracing system and offer great potential for lateral load resistance. The properties of these seismic shear walls dominate the response of the buildings, and therefore, it is important to evaluate the seismic response of the walls appropriately. In this present study, main focus is to determine the solution for shear wall location in multi-storey building. Effectiveness of shear wall has been studied with the help of four different models. Model one is bare frame structural system and other three models are dual type structural system.

Big Data -The Future of the Next Big World
Authors:- Mohammad Azhar

Abstract:- Big data analytics has come out as a new important field of study for both researchers and practitioners, demonstrating the significant demand for solutions to business problems in a data-driven knowledge-based economy. Additionally, empirical studies examining the impacts of the nascent technology on organizational performance, especially the influence of organizational culture each type of organizational culture – hierarchy, clan, adhocracy, and market – has impacts on each Big V of big data. The framework suggests that firms, influenced by their organizational culture, have different views on how important each Big V’s should be. The study argues that organizations should develop, nurture, and maintain an adhocracy organizational culture that has a positive impact on each of the five Big V’s to harness the full potential of big data.

Digital Examination through Web Services
Authors:- M.Tech. Scholar Shaik Reshma, Asst. Prof. Shaik Nyamathulla

Abstract:- Digital examination through web services project is a web portal that is developed or implemented using ASP.Net and Database. It is helpful for the learners to practice different mock examinations from this site. In the present generation number of the entrance examinations for higher education’s like EAMCET, PGECET, GRE, GATE, government examinations like SSC CHSL, CGL, Bank job examinations, etc. are conducted through the online system. It will helpful for learners to practice different mock examinations from this website. Though there were already online existing examinations, no other service is providing the functionality of re-examination at the time of practice and there is no opportunity of logging out at the middle of the exam and re-starting from that particular question whenever logged in. This Digital Examination through Web Services provides these additional services and generates the report analysis of the user at every attempt. By this, it is providing the user to overcome their mistakes and get domain knowledge effectively. The Digital Examination service has two modules. They are the Admin and the Users. Admin can create an exam, prepare questions, and manage users. Each exam has a subject name and the system allows adding the questions of different types for exams by the admin. It also allows setting many exams. Here Admin could change the user details. User can take the exam and can track exams he has taken. While taking the exam, one question is to be displayed at once. There is no previous button. During exam progress, it displays the number of questions completed and the number of questions remained. Service allows the user to continue from the same question later if the user stops in the middle. Thus, it helps the students to ought to register with the application, choose interesting courses, and participate in the test digitally.

Evaluation of Android Networking Libraries
Authors:- Jaydevi Bhade, Prof. Himanshu Yadav

Abstract:- Every single person in our population has mobile and most of the work doing through mobile phone. Now expansion of internet, mobile technology becomes more popular. For this android development has really charm for us. This paper deal with networking libraries used in mobile for network communication. Therefore, there are lots of open source network libraries that mobile developers use on a daily basis for development. At this time the problem is find out which solution fits for better android app projects development necessities. Thus, android developers face the tendentiousness of selecting an appropriate network library for their specific mobile application. To reduce the challenge, this paper proposes an empirical method for benchmarking, which includes evaluation of selected libraries and a selection of representative metrics. Here we have four android networking libraries Http Client, Volley, Retrofit and Fast Android Networking are selected for evaluation. This paper examine these libraries and find which library is suitable for developers as their necessities so that they provide better experience to mobile app users.

Effect Of V-Cut Out Ratio On The Performance Of Flow And Heat Transfer Enhancement In A Horizontal Pipe
Authors:- Shailesh Pandey, Abhishek Arya

Abstract:- In this work, forced convection heat transfer through a horizontal pipe built-in with/withouttwisted tape-inserts is numerically studied under a uniform heat flux condition. Water is used as aworking fluid. The governing equations are numerically solved in the domain by a finite volumemethod (FVM) using the Realizable κ–ε (RKE) model. The computational results are performedfor a range of the Reynolds number (4000≤ Re≤ 12000), the twisted ratio 4. Two type of twisted tape which inserts across a circular pipe(P-TT) and (V-cut) are carried out. The influence of these parameters on the local, average Nusselt Number and the thermal performances were examined with a plain pipeunder similar conditions. The results show that the average Nusselt number and friction factorrise as the twisted ratio rise for any value of Reynolds number. Furthermore, thermal performance factor tended to increase with increasing Re and decreasing tape twist ratio. Obviously,the (V-cut) twisted- tape and (P-TT) twisted tape with TR = 4 gave a higher mean thermal performance factor (1.974 and 1.745) than that with TR = 4, respectively. In the proposed work we used three different cut ratios are 0.6, 0.8, 1, and 1.25 and get the better heat transfer factor on 1.25 cut ratio.

Optimization of Energy in Wireless Sensor Networks
Authors:- M.Tech. Scholar Priya Yadav, Assistant Prof. Mukesh Pathela

Abstract:- The stated goal was to achieve the maximum utilization of the resources offered by the set of nodes that forms the network, allowing simultaneously sending reliably and efficiently all types of content through them, and mixing conventional IP data traffic with multimedia traffic with stringent QoS and QoE requirements. Using the information gathered in the previous phase, we have developed a network architecture that improves overall network performance and multimedia streaming. In parallel, it has been designed and programmed a communication protocol that allows implementing the proposal and testing its operation on real network infrastructures. In the last phase of this thesis we have focused our work on sending multimedia in wireless sensor networks (WSN). Based on the above results, we have adapted both the architecture and the communication protocol for this particular type of network, whose use has been growing hugely in recent years.

A Survey on Various Features and Techniques of Social Bot Detection
Authors:- M.Tech. Scholar Rishi Tiwari, Prof. Amit Ganguli

Abstract:- This paper presents the study of various methods for detection of fake profiles. In this paper a study of various papers is done, and in the reviewed paper we explain the algorithm and methods for detecting fake profiles for security purpose. The main part of this paper covers the security assessment of security on social networking sites. This paper give a brief survey of social bot detection challenges. Here features of fake profiles are collect. Hence paper reveals the potential hazards of malicious social bots, reviews the detection techniques within a methodological categorization and proposes avenues for future research.

Human Face & Emotion Recognition Using Deep Neural Networks Based On Local Binary Patterns
Authors:- V. Bharath Kumar Reddy , T. Venkataramana , K. Suresh

Abstract:- Facial expressions play a major role in Face Recognition Systems and image processing techniques of Human computer Interface. There are several techniques for facial features selection like Principal Component Analysis, Distance calculation among face components, Template Matching. This algorithm describes a simple template matching based facial feature selection technique and detects facial expressions based on distances between facial features using a set of image databases. For interactive human computer interface (HCI) it is important that the computer understand facial expressions of human. With HCI the gap between computers and humans will reduce. The computers can interact in more appropriate way with humans by judging their expressions. There are various techniques for facial expression recognition which focuses on getting good results of human expressions. Most of these works are done on standard databases of foreign origin with six (Neutral, Happy, fear, Anger, Surprise, Sad) basic expression identification. We propose Zernike moments based feature extraction method with support vector machine to identify eight expressions including Disgust, and Contempt.

“Studies on Benzene & Toluene Pollutant & Their Removal by Vedic Yagya Over Meerut Area of Delhi NCR”
Authors:- Dr. Nidhi Rani, Abhishek Kumar Singh

Abstract:-In this paper, the practical work was carried for a duration approximately two years. Sampling of Benzene and toluene was carried Monthly basis & 24 hours twice in a month & data was collected. The present study is very useful to regulatory authorities & administration to understand problems of air pollution in the Meerut area of NCR & helpful in prevention of Air Pollution. Benzene & Toluene are considered as a characteristic of the carcinogenic and toxic contaminants of ambient air quality of Meerut. Benzene and toluene are carcinogenic and hazardous to biotic life and no safe level of exposure can be recommended. In Meerut City, the residential area, commercial and industrial area during four seasons at 3 different locations viz. summer, Monsoon, Post monsoon & Winter. Variations in levels of Benzene & Toluene were observed during these seasons. This paper also gives brief knowledge about effects of VadicYagya (hawan) on pollutants & their removal reaction between pollutants & environment.

A review of gear power transmission optimization by using genetic algorithm
Authors:- Aarti Jaiswal, Prof. Ganesh Kesheorey

Abstract:- This Review Paper gives the information about Bending and Contact Stress Analysis of Helical Gear. Thus, this review paper mainly focus on the ANSYS, MATLAB finite element methods and AGMA standards for computation of bending and contact stress on a root of helical gear. In this paper the bending stress and contact stress of the gear tooth are examined and are to be one of the main contributors for the failure of the gear in a gear set. Thus, the analysis of stresses has become popular as an area of research on gears to minimize or to reduce the failures and for optimal design of gears. Authors have use various Approaches and means to conclude their main objective of finding out the contact stresses and gear failure causes in static condition using Finite Element Analysis, AGMA Standards MATLAB. This review paper contains theoretical, numerical and analytical methods for the helical gear pair analysis.

Traffic Flow Control by using Ann Based Designing Toll Plaza Configuration
Authors:- ME Student Shubham Soni, Prof. Vinay Deulkar

Abstract:- Computer simulation is one of the popular approaches to the design of toll plazas. Toll plaza configurations such as toll collection methods, number of toll booths, and types of vehicles have been studied in the literature. Traffic flow types can be another influential factor when designing toll plazas, especially in case that traffic flow information is not available, but only the estimate of traffic volumes. Few studies have reported the effect of traffic types on toll plaza performances. In this article, aANN simulation method is used to analyze the sensitivity of toll plaza performance for different types of traffic flow. Two traffic patterns, deterministic and probabilistic traffic flow, is considered. This study is based on a proposed project for building a toll Plaza in the indirectly. The estimated future traffic counts for the toll bridge are used to study the difference between the two traffic patterns.

Reduction Power Loss in 33 Bus Systems with Improvement of Power Quality
Authors:- M.Tech. Scholar Haripratap Yadav, Assistant Professor Abhay Solanki

Abstract:- Penetration of distributed generation (DG) units in distribution network has increased rapidly stimulated by reduced network power loss, improved bus voltage profile, and better power quality. Appropriate size and allocation of DG units play a significant role to get beneficial effects. The objective of this study is to demonstrate a simple and fast technique to determine appropriate location and size of DG units. A voltage stability indicator (VSI) is derived which can quantify the voltage stability conditions of buses in distribution network. According to VSI, vulnerable buses of the network are arranged rank-wise to form a priority list for allocation of DG units. To determine the size of DG units, a feed forward artificial neural network is prepared in MATLAB environment (The Math Works, Inc., Massachusetts, USA). The effectiveness of the proposed methodology has been tested on a 52-bus radial distribution network. After appropriate allocation of DG units, voltage profiles of most of the buses are increased significantly. The results also indicated that the total loss of the distribution network has reduced by nearly 76.39%, and voltage stability conditions of buses are improved considerably. Voltage stability conditions of bus-10, bus-20, and bus-33 are raised by 23.16%, 29.23%, and 37.64% respectively.

Tag Based Recommender System for Scholarly Data
Authors:- Mohit Kumar, Prof. Shilpa Verma

Abstract:- Recommender Systems are being used nowadays in every field online and they help to play an important role in user/customer satisfaction and attraction. The motivation to write this article comes from the struggles that a research scholar goes through while finding the perfect paper to read. In this article, the aim is to generate recommendations to the users by eliminating the cold start problem. This paper works on finding a suitable article for the user by keyword matching from user profile and existing data set. Various different bibliometrics have been used in this article to apply the underlying method for generating a similarity index for the documents. The method of tf-idf score calculation has been used to find the similarity between the keywords the user is interested in and the keywords that occur in the content of a certain article. The scores were calculated for each document by finding the relevance between the user keywords and paper keywords to find level of relevance of the documents and hence generate the recommendations accordingly

Pso Based Power Loss Reduction in Ac-Dc Systems
Authors:- M.Tech. Scholar Suraj Kumar Kushwaha, Asst. Prof. Abhay Solanki

Abstract:- This paper presents a new optimization approach for solving the economic operation with consideration of wind, solar, micro-turbine, fuel cells, battery and load in an energy system. mathematical models of each micro source and the system model of the micro-grid economic operation are established, and the system model is solved by improved particle swarm optimization (pso) algorithm. the best output of each micro source and energy storage unit and the lowest operating cost comparing by improved pso is compared with the traditional pso. the matlab simulation indicates the high speed and accuracy of the improved pso, and verifies the effectiveness of the model..

Managing Data Truthfulness and Privacy Preservation in Data Markets
Authors:- M.Tech. Student J. Janardhanam, Asst. Prof. K.Suresh, Asst. Prof. K. Suresh

Abstract:- As a important business model, various online data platforms have developed to meet society’s requirements for person-specific data, where a service provider catches information from data providers and then suggestions value-added data services to data users. However, in the data trading layer, the data users encounter an important problem, i.e., how to check whether the service provider has accurately gathered and processed data? Moreover, the data givers are frequently opposed to sharing their sensitive individual data and original identities to the data users. In this paper, we propose TPDM, which proficiently associations Truthfulness and Privacy preservation in Data Markets. TPDM is structured inside in an Encrypt-then-Sign method, by partially homomorphism encryption and identity-based signature. It concurrently helps batch verification, data processing, and outcome verification, while maintaining identity protection and data confidentiality. We also instantiate TPDM with a profile matching service and a data-sharing service, and broadly assess their presentations on Yahoo! Music evaluations dataset and 2009 RECS dataset, correspondingly. Our study and assessment out comes show that TPDM reaches various excellent features while acquiring little calculation and communication overheads when establishing large-scale data markets.

SSSC FACTS Device in Reactive Power Flow Solution
Authors:- M.Tech.Scholar Divya Jaiswal, Assistant Prof. Abhay Solanki

Abstract:- This paper describe the reactive power flow solution based BBO to amend the performance of the power system. Biogeography-based optimization is incorporating flexible AC transmission systems (FACTS). Static Synchronous Series Compensator (SSSC) is type of FACTS device used in this paper. In this BBO Store best parent solution and apply mutation and migration process on remaining parents to produce best fitted child sets. This paper define the problem of optimal power flow solution is very severe in modern interconnected transmission system the control of reactive and real power has to be fast to insure that the system remains stable under all condition of operation. The use of thyristor based controllers enable a transmission system to be flexible using SSSC FACTS is a series connected FACTS controller. The proposed BBO method gives better solution quality compared to particle swarm optimization with static synchronous series compensator facts device. The simulation results show that the proposed BBO algorithm is effective, fast and accurate in finding the optimal parameter settings for FACTS devices to solve OPF problems. BBO algorithm is tested on IEEE 14-bus with SSSC FACTS device gives better solution to enhance the system performance.

Distribution Transformer Condition Monitoring System Using Artificial Intelligence
Authors:-M. Tech. Scholar Sakshee Naiwal, Asst. Prof. Abhay Solanki

Abstract:- Distribution transformer is an important asset in distribution network. Its operation and control are important aspects which determine the reliability and quality of power supply. A remote condition monitoring system for distribution transformer is discussed here. Different parameters are acquired and processed in remote terminal unit. This communicates the data to the operator end using internet. According to parameter values, health index of a transformer is found out at the operator end interface. Analysis is based on health index. This system is different from power transformer condition monitoring systems in condition monitoring techniques used and communication. A cheaper system is designed which precisely evaluates the health status of a transformer. The test results are taken from a specially designed transformer.

Enhancement of PI Voltage Controller Performance Based on Self-Excited Induction Generator STATCOM
Authors:-M. Tech. Scholar Rahul Kumar, Asst. Prof. Deepak Bhataniya

Abstract:- Principal objective of this paper is to investigate the behavior of STATCOM against SVC controller by setting up new control parameters. Essentially, STATCOM, and SVC linear operating ranges of the V-I and V-Q as well as their functional compensation capabilities have been addressed to meet operational requirement with certain degree of sustainability and reliability. Hereby, the other operating parameters likewise transient stability, response time, capability to exchange real Power and Power Losses have also been addressed in STATCOM against SVC control models. In addition to that, STATCOM-Controller’s pragmatic response has been identified and determined reliability level to maintain full capacitive output current at low system voltage. Therefore, it indicates that STATCOM device has more effectiveness than the SVC in improving transient stability (first swing).

Design and Implementation of Wind-Solar Hybrid Power Generation System
Authors:-M.Tech. Scholar Akshay Chouhan, Asst. Prof. Deepak Bhataniya

Abstract:- The ongoing upsurge in the interest of PV (AC/DC SMART GRID) frameworks is because of the way that they produce electric power without hampering nature by straightforwardly changing over the sun oriented radiation into electric power. Anyway the sun oriented radiation never stays consistent. It continues changing for the duration of the day. The need of great importance is to convey a consistent voltage to the network regardless of the variety in staggered inverter. We have planned a circuit to such an extent that it conveys steady and ventured up dc voltage to the heap. We have examined the open circle attributes of the PV exhibit with variety in staggered inverter levels. At that point we coupled the PV exhibit with the lift converter so that with variety in burden, the changing info current and voltage to the converter pursues the open circuit normal for the PV cluster intently. At different disconnection levels, the heap is shifted and the comparing variety in the info voltage and current to the lift converter is noted. It is noticed that the changing info voltage and current pursues the open circuit qualities of the PV exhibit intently.

Enhancement of Performance Speed Control of DC Motor Using Chopper
Authors:-M. Tech. Scholar Manish Yadav, Asst. Prof. Lavkesh Patidar

Abstract:- The speed of separately excited DC motor can be controlled from below and up to rated speed using chopper as a converter. The chopper firing circuit receives signal from controller and then chopper gives variable voltage to the armature of the motor for achieving desired speed. There are two control loops, one for controlling current and another for speed. The controller used is Proportional-Integral type which removes the delay and provides fast control. Modeling of separately excited DC motor is done. The complete layout of DC drive mechanism is obtained. The designing of current and speed controller is carried out. The optimization of speed controller is done using modulus hugging approach, in order to get stable and fast control of DC motor. After obtaining the complete model of DC drive system, the model is simulated using MATLAB(SIMULINK).The simulation of DC motor drive is done and analyzed under varying speed and varying load torque conditions like rated speed and load torque, half the rated load torque and speed, step speed and load torque and stair case load torque and speed.

An enhancement HVDC Transmission System
Authors:- M.Tech. Scholar Mritunjay Kumar, Asst. Prof. Abhay Solanki

Abstract:- The advantage of parallel ac-dc power transmission for the improvement of transient and dynamic stability and damp out oscillations have been established. Present paper proposes a simultaneous ac-dc power flow scheme through the same transmission line to get the advantages of parallel ac-dc transmission to improve stability and damping oscillations as well as to control the voltage profile of the line by controlling the total reactive power flow. Only the basic idea is proposed along with the feasibility study using elementary laboratory model. The main object is to emphasize the possibility of simultaneous ac-dc transmission with its inherent advantage of power flow control. Control methods based on selective harmonic elimination pulse-width modulation (PWM) techniques with fuel cell system offer the lowest possible number of switching transitions and improve the voltage level in SAF transmission system. This feature also results in the lowest possible level of converter switching losses. For this reason, they are very attractive techniques for the voltage-source- converter-(VSC) based high-voltage dc (HVDC) power transmission systems.

Computerized Segmentation and Recognition of Brain Tumor in MRI Using Genetic Algorithm
Authors:-M. Tech Scholar N. Viswavadha Reddy, Asst. Prof. & HOD P. Bhanu Prakash Reddy

Abstract:- Nowadays Image processing is the best developing and inspiring field. MR images act as the main source for the development of a classification system. Recognition of a brain tumor is a very collective disease in the current state of health care society. Image segmentation is used to remove the abnormal tumor portion in the brain. Segmentation of brain tissue in the magnetic resonance image (MRI) is very significant for identifying and presence of outlines of the brain tumor. The extraction, identification, and segmentation of affected area from the MR images of the brain are substantial but it is a time-consuming task for the medical experts. To overcome this drawback, it is most important to use computer-aided methods. To improve the accuracy and efficiency of medical image segmentation procedure, the proposed tumor segmentation is built on an adaptive threshold algorithm. Deep learning CNN classifier used to compare the test and trained data and produces the result for tumor. The proposed system results have been estimated and validated based on accuracy, sensitivity, and specificity. The detection, extraction, and classification of MR brain images are done by using MATLAB.

Classifying Vehicle Activity Patterns from IOT Device: A Survey
Authors:-M. Tech Scholar Prachi Pandey, Asst. Prof. Ankur Taneja

Abstract:- In this work, the Internet of Things Technology can greatly enhance the performance, monitoring and maintenance of the vehicle. In this paper analysis is based on the Implementation of new cost effective methodology based on IoT to monitor vehicle health remotely for performance evaluation. Information from the sensors is transmitted via the mobile radio network. The vehicle consist of onboard GPRS module which collect the CAN data from the CAN device fitted on the vehicle and send it to the remotely located server. Second phase work focus on Monitoring the temperature of the vehicle system avoid sparking of the vehicle and also providing the fuel consumption & Battery information of display and third phase of implementation using of GSM Module when vehicle is provide the unusual activity & driver is facing any problem then it give message to the owner of vehicle. This will facilitate preventive maintenance, fault detection, historical analysis of the vehicle in addition to real time monitoring. In this paper we analysis the different vehicle parameters via remote monitoring system.

Vehicle Number Plate Recognition System Using Morphological Operations
Authors:-M. Tech. Scholar Y. Harika, Asst. Prof. & HOD, P. Bhanu Prakash Reddy

Abstract:- The vehicle number plate recognition system depends on image processing technology. It is one of the most fundamental systems invented to identify the vehicle number plate. In today’s environment with the developing quantity of vehicle day by day, it’s not potential to manually hold a document of the whole vehicle. With the growth of this vehicle number plate recognition system, it enhances simple to hold a document and manage it whenever needed. The main purpose is to compose an effective vehicle number plate recognition system by using a vehicle number plate. The method first would obtain the image of the vehicle number plate as soon as the vehicle reaches the safety checking region. The obtained images are extracted by applying the segmentation process. Visual character recognition is employed to recognize the signs, numbers, and letters. The method is executed and simulated on MATLAB and performance is examined on original images. This kind of method is extensively utilized in Traffic control regions, toll gates, parking zone, etc. This system is essentially planned for the view of the protection policy.

A Glimpse: Comparison of Fog Computing and Cloud Computing
Authors:-Mr. Rakesh Kumar PGT (IT)

Abstract:- The term fog computing was coined by Cisco in 2014, so it is new platform and environment for the public. Nowadays, Fog and cloud computing are interconnected. Fog computing is also known as fogging. In nature, fog is closer to the earth than clouds; in the era of technology, it is just the similar, fog is closer to end-users, bringing cloud capabilities down to the ground. Fog Computing is an extension of cloud computing which is used broadly. This paper is generally consists of comparison of fog computing and cloud computing.

Historical Survey on Software-Defined Networking
Authors:-Juhi Roshan, Abdullah Mahmood

Abstract:- Technology advancement in terms of networking is urging computer networks for high accessibility, bandwidth, ubiquitous and dynamic management. The information and communication technologies, therefore, demand new challenges to the future internet. The traditional networking approaches are non-error-prone and cumbersome, and they can’t utilize the capability of the physical network infrastructure to its fullest.

Human Face Detection & Segmentation Based on Local Binary Patterns in Computer Vision
Authors:-M. Tech Scholar Vayalpad Murali, Asst. Prof. & HOD P. Bhanu Prakash Reddy

Abstract:- Face identification is a biometric software application able to identifying or testing a person by matching and examining patterns based on the person’s facial outlines. The face detection system is exciting research topics in the area of robotic vision. Various algorithms have been introduced to resolve any queries related to changes in the environment and flash situations. In this investigation, we present a novel algorithm for face recognition. The proposed system utilizes the well-known local binary patterns (LBP) algorithm and K-means clustering for face segmentation and supreme likelihood to analyses the amount of data. This proposed paper is producing effective face identification i.e. feature extraction and face identification system using local binary patterns (LBP) method. It is a texture-based algorithm for face verification which describes the texture and shape of images. The pre-processed image is broken into small pieces from LBP histograms are produced and then concatenated into a particular feature vector. This feature vector represents an active role in the representation of the face and is used to estimate similarities by measuring the distance among Images. This paper shows the principles of the technique and implementation to perform face identification.

Assessing Factors Affecting Income Diversification of Rural Households FagitaLokomaWoreda, Awi Zone, Ethiopia
Authors:-Feleke Shitu (BSc.), Advisor Alemayehu A. (MSc.), Associate Prof. M.Senapathy (Ph.D.)

Abstract:- This research was conducted on assessing factors that affect income diversification of rural households in FagitaLokoma district. Thus, the general objectives of the study was to examine factors that affect income diversification’s of the rural household’s and more Specifically; to analyze the factors that affect rural household’s level of income diversification and to identify determinants of level of income diversification.Multistage sampling technique was used; and the samples of 50 households were interviewed. Both descriptive and econometric analysis was made so as to achieve the objectives. As far as the extent of income diversification is concerned, about 48% of the sample households were found to diversify income whereas the majority(52%) were not diversify their income. The major reason,among others, for this might be land size, fertility of land, sex of respondents, age of respondents, etc. The study has revealed that households with large land size were less in income diversification when compared with those households with small land size. Moreover, relatively old people were found to diversify their income more than young people. Similarly, male headed households have high tendency to diversify income when compared with female headed households. The result of Binary LogitRegression Model has shown that six variables have significantly affected income diversification. Thus, sex of the household heads and primary occupation has negatively affected income diversification whereas age, land fertility, land size, and market access have positively affected income diversification. As market is crucial and important criteria in order to diversify income so the government has given the special protection and control of the market activities. Government should empower women in non/off-farm activities because sex was significant variable. Rural household should improve fertility of the land by using organic and inorganic fertilizer.

Simulation of Real and Reactive Power Flow Assessment with Facts Devices Connected to Transmission Lines
Authors:-M Tech Scholar Vikash Kumar Yadav, Asst. Prof. Neeraj Kumar Kumawat

Abstract:- The changeless objective in the field of electrical power networks is to discover better approaches for transmission and distribution of power as far as minimum cost and reliability. Due to explosive growths in the power demand, deregulation and distributed generation facilities, these systems are possible to be exposed to stability problems ever than before. The interline power flow controller (IPFC and UPFC) is one of the most recent age flexible AC transmission system (FACTS) controller used to control power flow of multi transmission lines. The fundamental control for the IPFC is with the end goal that the series converter of the UPFC controls the transmission line real/reactive power flow and the shunt converter of the (IPFC and UPFC) controls the bus voltage/shunt reactive power and the DC connect capacitor voltage. On account of the basic connection, any inverter inside the (IPFC and UPFC) can transfer real power to some other and accordingly encourage real power move among the lines of the transmission system. Since each inverter can give reactive compensation, the (IPFC and UPFC) can do a overall real/reactive power compensation of the whole transmission system. This ability makes it conceivable to even out both real/reactive power stream between the lines, move power from over-burden to under stacked lines, compensate against reactive voltage drops and comparing reactive line power and to expand the viability of the compensating system against system transients. In addition, a simulation model was brought and applied to two transmission line (11KV/6.6KV) and compare their results without UPFC and IPFC, with UPFC and IPFC ( Thyristor model) and UPFC and IPFC (IGBT and MOSFET).

A Review on Face Recognition Using SIFT Feature Extraction
Authors:-M-Tech Scholar Purnima Prakash Pathak, Asst. Prof. Anil Khandelwal

Abstract:- A facial recognition system is a computer application capable of identifying a person from a digital image or a video frame from a video source. One of the ways to do this is by relating particular facial features from the image and a face database. Recently Face recognition has received a lot of attention in biometrics, computer vision and network multimedia information access. Various methods are used for it. Comparison of various face recognition techniques has been done by several people. But so far no technique exists which has shown satisfactory results under all conditions. The system proposes new approach in extension with local binary pattern called DRLBP. By using these methods, the category recognition system will be developed for application to image retrieval. The category recognition is to classify an object into one of several predefined categories. The discriminative robust local binary pattern (DRLBP) is used for different object texture and edge contour feature extraction process. It is robust to illumination and contrast variations as it only considers the signs of the pixel differences. The proposed features retain the contrast information of image patterns. They contain both edge and texture information which is desirable for object recognition, the simulated results will be shown that used discriminative robust local binary pattern has better discriminatory power and recognition accuracy compared with prior approaches.

A Review Article of Hexagrid and Diagrid System in Multi Storey Buildings
Authors:-M.Tech. Scholar Deepak Laata, Asst. Prof. Mayank Mehandiratta

Abstract:- The advancement of technology and development of economy of the world have brought the new era of tall buildings. The most efficient building system for high rises has been the tube-type structural systems. Now-a-days, a particular structural system called a diagrid system has caught the attention of engineers. In order to improve the efficiency of tube-type structures in tall buildings, as both structural and architectural requirements are provided well, a new structural system, called “Hexagrid”, is introduced in this study. It consists of multiple hexagonal grids on the face of the building. However limited academic researchers have been done with focus on the structural behavior, design criteria and performance assessment of this structural system.

A Review on Analysis of Thermodynamic Performance of A Cascade Refrigeration System for Refrigerant Couples of R22/R404a, And R744/R404a
Authors:-M-Tech Scholar Mudasir Ul Islam, Prof. Sujeet Kumar Singh

Abstract:- The study of cascade refrigeration system. Cascade refrigeration system is the combination of two refrigeration cycle for maximum refrigeration effect can be obtained. In this system series of single stage vapor compression system are thermally coupled with the evaporator of HTC and condenser of LTC, this combination is known as cascade. This system is developed to achieve temperature up to -20°C for the applications like cold storage in malls and stores and in blood banks. The working fluid in system are R22 (LTC) and R134a (HTC), these particular refrigerant s are used due there suitable difference in boiling point for the desirable outcome from the system. These fluids are harmless to environment and GWP and ODP is negligible and do not violate the kyoto protocol. COP, work done, Refrigeration effect are the parameters studied from the system.

Implementation of Face Recognition Using SIFT Feature Extraction
Authors:-M-Tech Scholar Purnima Prakash Pathak, Asst. Prof. Anil Khandelwal

Abstract:- The main motive to design to recognize Automatic Face Recognition is the ability of person’s and identity based on facial characteristics. One of the ways to do this is by comparing selected facial features from the test image and a facial database. Usually, the face image of a test subject is matched to the gallery data using a one-to-one or one-to-many scheme. The one-to-one and one-to-many matching are called verification and identification, the feature extraction on the other hand is usually applied to obtain the relevant facial features such as face regions, variations, angles or measures etc. from the data. This phase has other applications like facial feature tracking or emotion recognition. Selection of suitable features plays a crucial role in the performance of the face recognition algorithm This phase involves a comparison method, a classification algorithm and an accuracy measure.

Analysis of Thermodynamic Performance of A Cascade Refrigeration System for Refrigerant Couples of R22/R404a, and R744/R404a
Authors:-M-Tech Scholar Mudasir Ul Islam, Prof. Sujeet Kumar Singh

Abstract:- This study presents a comparative analysis of thermodynamic performance of cascade refrigeration systems(CRSs) for refrigerant couples R22/R404a and R744/R404a to discover whether R22 and R744 is a suitable substitute for R404a. The discharge temperature, coefficient of performance(COP), exergy loss (X) and exergy efficiency (ɳ) are chosen as the objective functions. The operating parameters considered in this paper include condensing temperature, evaporating temperature in both high-temperature cycle (HTC) and low temperature cycle (LTC). The results indicate that overall R22-R404A has a better performance than R744-R404A in cascade refrigeration system.

Review of Medication Plan for Patient data using Block Chain Technology
Authors:-M. Tech. Scholar Harsha Gupta, Asst. Prof. Shailendra Tiwari, Tanmay Jain

Abstract:- This paper helps to prospect the block chain technology and smart contracts to build private ness and aware of applications. The main focal point is on medication plan containing doctors instructions that are built on smart contracts of block chain ,it is just an illustrations use case, but the outcome can be transmitted farther where the evidence of reliability is required and where the careful data is being allotted. Why the medication plan are in requirement of digitalization and why block chain technology is fitting technology for executing such an administration are the first problem to be presented being new and unaware of IT construct the block chain technology is described. After that a design is offered to resolve the issue.

Smart Grid Simulation Diversification of Demand Side Power Management
Authors:-M.Tech. Scholar Sheetal Mangal, Assistant Professor Neeraj Kumar Kumawat

Abstract:- The main objective of this thesis is to propose and develop a flexible simulation framework to study the behaviors and impacts of smart grid enabled household appliances. This proposed simulation framework should be accurate enough to reflect the general or average behaviors of traditional patterns of energy consumption. It should be designed to be flexible to allow expansions for other purposes, such as a study of the integration of renewable energy sources. It should be scalable to enable metro scale and also precise individual household simulations. it is desirable to have a smart grid centric test/simulation platform that is multipurpose and easy to expand to meet different needs. Whether developers need to evaluate the results of their product, or utility companies want to examine the effects of changing price profiles, it is beneficial to have a simulation framework that already implements the general energy consumption model, supply model, and information communication model.

Simulation Analysis on Integrated Control and Protection System for Photovoltaic Microgrids
Authors:-M.Tech. Scholar Gaurav Dilip Shirore, Asst. Prof. Dr. Prabodh Kumar Khampariya

Abstract:- The microgrid has shown to be a promising resolution for the integration and management of intermittent renewable energy generation. This paper appearance at vital problems surrounding microgrid control and protection. It proposes an integrated control and protection system with a hierarchical coordination control strategy consisting of a complete operation mode, a grid-connected operation mode, and transitions between these 2 modes for a microgrid. This approach provides a lot of reliable and strong grid because the systems will supplement one another. However, protection and control in a much meshed power network setup may be a challenge. this is often because a meshed microgrid has a lot of interconnections.

Three-Layer Privacy Preserving Cloud Storage Scheme in Fog Computing
Authors:-M. Tech. Scholar M. Rajani, Asst. Prof. B. Sai Sreenivas Rao, Asst. Prof. T. Sujilatha

Abstract:- Cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive. With the explosive growth of unstructured data, cloud storage technology gets more attention and better development. However, in current storage schema, user’s data is totally stored in cloud servers. In other words, users lose their right of control on data and face privacy leakage risk. Traditional privacy protection schemes are usually based on encryption technology, but these kinds of methods cannot effectively resist attack from the inside of cloud server. In order to solve this problem, we propose a three-layer storage framework based on fog computing. The proposed framework can both take full advantage of cloud storage and protect the privacy of data. Besides, Hash-Solomon code algorithm is designed to divide data into different parts. Then, we can put a small part of data in local machine and fog server in order to protect the privacy. Moreover, based on computational intelligence, this algorithm can compute the distribution proportion stored in cloud, fog, and local machine, respectively. Through the theoretical safety analysis and experimental evaluation, the feasibility of our scheme has been validated, which is really a powerful supplement to existing cloud storage scheme.

Predicating Early Reviewers Based on Their Rating Behaviors for Product Marketing on Websites
Authors:-M.Tech. Scholar Nandaluri Ahalya, Asst. Prof. M.Reddi Durga Sree, Asst. Prof. & HOD K. Suresh

Abstract:- Online reviews have become an essential source of data for users before making a notified buying choice. Initial surveys of stock manage to have a great impression on consequent product purchases. In this paper, we consider the initiative to study the behavioral aspects of advanced reviewers into their posted reports on a few real-world extensive e-commerce platforms, i.e., Amazon and Yelp. In particular, we classify product lifetime into three sequential stages, specifically beginning, bulk and stragglers. A customer who has posted a report in the opening stage is granted as an advanced critic. We quantitatively define advanced critics based on their grading behaviors, the usefulness scores obtained from others and the association of their reviews with product demand. We have noticed that (1) an early reviewer points to specify a greater average rating score, and (2) an advanced reviewer tends to post much more worthy reviews. Our analysis report of stock reviews also suggests that advanced reviewers’ grades and their received helpfulness scores are possible to influence product demand. By observing the review posting method as a multiplayer racing game, we introduce a unique margin-based embedding standard for the advanced critic prediction. Great experiments on two various e-commerce datasets have explained that proposed strategy exceeds the number of competitive baselines.

Published by:

Journals to Publish Research Papers

Uncategorized

In starting phase of Scholars life writing papers is tough task while selection of journals to publish research papers is an more complex decision. So mentor or guide need to filter some of journals for their young researchers. As content or quality of research was not excellent but promotion of those candidates need some publication, this increase there confidence and moral as well. Hence journals to publish research papers for those beginners should have following quality:

Submit Your Paper  / Check Publication Charges

 

  1. Journal should have good impact factor.
  2. Journal should be at-least three to four year old.
  3. Publish paper in international journal only.
  4. Journal team can assist scholar at various level for final publication.
  5. Communication or response time should be less.
  6. Reviewer comment can increase the quality of paper and knowledge of student for nourishing there writing skills.
  7. Publication fees should be low.
  8. Journal should provide publication digital certificates.

 

Hence scholar can confirm above points for selection of international journals for paper publication. Once these criteria get conformed than only submit paper in that journal. It was desired that journal can publish paper in 2 to 3 days, but good journals takes 5-7 days for these as review process take time. So patience of this is highly required.

Published by:

Publication Fees for Journals

Uncategorized

Research journals are categorize into two class paid and unpaid journals while to get fast response from the journals student look for paid journals. Hence publication fees for journals plays an important role when people look for publication. Here it was required that following criteria should be present in these journals.

1. Journal should mention publication cost clearly.
2. Number of authors for different slab of fees.
3. Number of pages in that fee.
4. Certificates are free or not.
5. Review process time.
6. Publication time after acceptance
7. Formatting of document is done by journal or author need to submit paper in format.

Submit Your Paper  / Check Publication Charges

So student/ Author who are looking for publication fees for journals can look for above points before selecting any journal for final submission. It was observed that mentor also have confusion where to publish research paper for there scholars but when above points are clear by Journal team than selection get easy and fast.

Published by:

IJSRET Volume 5 Issue 3, May-Jun-2019

Uncategorized

An Overview of Deep Q Learning
Authors:- Bhavesh Dhera, M. Mani Teja, G. Yashwanth Reddy

Abstract: – This paper gives a bird’s eye view of Reinforcement Learning, an area under Artificial Intelligence. It starts with the history of reinforcement learning and its traditional models then goes on to delve deeper into one of the modern algorithm called Deep Q-Learning. It is aimed at discussing the intuition behind Deep Q-Learning and ways to implement it. Also discussed are various aspects to overcome drawbacks of Q Learning.

A K- Nearest Neighbors’ based on Clustering for High Performances and High Volumes of the Data
Authors:- Vijayalakshmi. K, Associate Prof. Priya .M

Abstract: – A new classification method is presented which uses clustering techniques to augment the performance of K-Nearest Neighbour algorithm. This new method is called Nearest Cluster approach, [NC]. In this algorithm the neighbour samples are automatically determined using clustering techniques. After partitioning the train set, the labels of cluster centers are determined. For specifying the class label of a new test sample, the class label of the nearest cluster prototype is used. Computationally, the NC method of KNN is faster than the k-means with 2 times. Also the clustering techniques leads to find the best number of neighbours based on the nature of feature space. The proposed method is evaluated standard sales dataset. Experimental results show the excellent improvement both in accuracy and the time complexity in comparison with the KNN method. Many clustering algorithms have been developed to address the problem of very large data size as well as for high dimensional data. This algorithm have their own disadvantages but they are often impractical when the data is large in both aspects. The proposed system uses the KNN algorithm based clustering so the KNN queries can be evaluated with minimum seconds.

Virus-Detection Processors in Mobile Device Using an Adaptively Dividable Dual Port Bi-TCAM
Authors:- Asst. Prof. S. Mubeena, Asst. Prof. K. Vairaperumal

Abstract: – A Network security for mobile devices is in high demand because of the increasing virus count. Since mobile devices have limited CPU power, dedicated hardware is essential to provide sufficient virus detection performance. A TCAM-based virus-detection unit provides high throughput, but also challenges for low power and low cost. In this paper, an adaptively dividable dual-port BiTCAM (unifying binary and ternary CAMs) is used to achieve a high-throughput, low-power, and low-cost virus-detection processor for mobile devices. The dual-port BiTCAM is realized with the dual-port AND-type match-line scheme which is composed of dual-port dynamic AND gates. The dual-port designs reduce power consumption and increase storage efficiency due to shared storage spaces. In addition, the dividable BiTCAM provides high flexibility for regularly updating the virus-database. The BiTCAM achieves a 48% power reduction and a 40% transistor count reduction compared with the design using a conventional single-port TCAM.

Android Phone Protection System
Authors:- M. Tech. Scholar Shipra Joshi, Asst. Prof. Rahul Sharma

Abstract: – Today, everyone necessarily requires a smart phone. There are tremendous amount of possibilities and numerous scopes witnessed in different areas of the mobile world. With this rapid growth in mobile services the researchers are alarmed about the security threats and are working upon it by securing the infrastructures which support the online-interface and other distributed services. In this paper, we discuss about secure android application on android phone. The objective is to provide such services which can secure customers’ android devices. This data security methodology of cell phones is quite novel.

TFET Based DPA Resistant Secured Adiabatic Logics for Energy Efficient and Secure hardware
Authors:- Vrushali Gandla, Kasthuri Thilagam, Anil Srikanth

Abstract: – Adiabatic logic is one of the design techniques for designing energy- efficient hardware. Low-power mobile devices such as RFID tags and WSNs that employ cryptographic modules are susceptible to differential power analysis (DPA) attacks. The secret information stored in these hardware devices can be explored by side channel effects. A Secured Quasi-Adiabatic Logic (SQAL) has been proposed in designing Differential Power Analysis (DPA)-resistant and energy-efficient hardware. SQAL shows improvement over all other existing DPA resistant adiabatic logic in terms of energy dissipation and area-overhead. However, the drawback is, SQAL suffers from non-adiabatic energy loss during the evaluation of the outputs. To minimize the non-adiabatic loss, we propose a Symmetric Pass Gate Adiabatic Logic (SPGAL).To validate our proposed logic, we have evaluated the energy dissipation of the individual secure adiabatic logics; proposed CSSAL, secure adiabatic logic, symmetric adiabatic logic, 2N-2N2P. Furthermore, this work delves into the implementation of 2*2 multiplier operation using TFET at 0.3v. The bit parallel multiplier implemented using SPGAL saves up to 80% energy as compared to SQAL.

Reproductive Technology: A Doorway That Changes Women’s Live
Authors:- Research Scholar Mukesh Kanaujiya

Abstract: – Reproductive technology plays an important role in women’s life because, Infertility can be considered a health problem according to the World Health Organization’s broad definition of health – “Health is a state of complete physical, mental and social well-being and not merely the absence of disease or infirmity. Statistics show that almost Three million infants have been delivered using Assisted Reproductive Technology in the last 30 years, all over the world. Infertility in the global can have severe and interrelated social, economic, and health-related consequences for women. Infertility often produces a sense of isolation, resentment and anger which can lead to a vicious circle of cutting oneself off from social support networks: Infertile couples experience a difficult dilemma, particularly around holiday time or important family events. The infertile couple is caught in an emotional bind. They already feel isolated from most of the world. The new reproductive technologies provide a good basis for the study of changing perceptions of nature because the field to a large degree consists of stories of de-naturalisation and re-naturalisation. A very simple illustration is how the very term for these technologies over time has gradually shifted from artificial reproductive technologies (that is to say de-naturalisation) to assisted reproductive technologies (indicating a re-naturalisation). The latter term indicates that the intervention of medical technology is meant to restore the body to its natural state. This Paper aims to find out the importance of new reproductive technology and its impact on woman and society.

Stone Matrix Asphalt Based Flexible Pavement
Authors:-Asst. Prof. Shriram P Marathe, Sakshar S Huddar

Abstract: -stone matrix asphalt (sma) was originally developed in europe as an impervious/highly durable wearing surface for bridge decks. based on its performance history, split matrix asphalt began to be used as a surface layer for roadways carrying heavy truck traffic throughout Germany and other european countries. today, it is the pavement surface of choice where long-term performance and durability is needed. in this study various research works on sma have been reviewed, out of which, sma study using crmb-55 as binder, major influence of fibers on sma, the sma using different filler, properties of sma, use of carbon fiber and glass fiber, study of sma using coir fiber and pineapple fiber are investigated.

Inequality Concerning the Polar Derivative of a Polynomial
Authors:- Jahangeer Habibullah Ganai, Anjna Singh

Abstract: – For the present paper, we will give a correct proof of Lp-inequality concerning the polar derivative of a polynomial with restricted zeros. We will also extend Zygmund’s inequality to the polar derivative of a polynomial.

Experimental Investigation on Water Hyacinth Ash as a Supplementary Cementing Material
Authors:-Ashima Manoj, Aleena, Eldho Saju, Sujitha S

Abstract: – Concrete is an important construction material consists of cement, coarse aggregate, fine aggregate and water. Among these ingredients cement is the major constituent and it is one of the major producers of carbon dioxide into atmosphere while manufacturing cement. To reduce carbon dioxide emission cement is replaced as a supplementary cementing material by water hyacinth ash. Experimental investigations are done to evaluate the effect of water hyacinth ash in the replacement of cement. For this M30 grade of concrete is used. In which cement is replaced with water hyacinth ash by 0%, 5%, 10% and 15% by weight of cement and cast cubes and cylinders with varying proportion. And also study how it affects properties of concrete like workability, compressive strength and split tensile strength. The casted specimens are removed from the mould after 24 hours, cured and tested for 7, 14 and 28 days. The tested results are compared with ordinary concrete and water hyacinth ash replaced concrete. Finally evaluate the effect of water hyacinth ash on various strength properties of M30 concrete.

Eco-friendly concrete produced through alkali activation by Utilizing Industrial Wastes
Authors:- Asst. Prof. Shriram P Marathe, Prof. R Mithanthaya, Basaveshwara G V

Abstract: -The development of new, sustainable, low-CO2 construction materials is essential if the global construction industry is to reduce the environmental footprint of its activities, which is incurred particularly through the production of Portland cement. One type of non-Portland cement that is attracting in particular attention is based on alkali-aluminosilicate chemistry, including the class of binders that have become known as geopolymers. This review discusses the synthesis of alkali-activated binders from blast furnace slag, calcined clay (metakaolin), and fly ash, including analysis of the chemical reaction mechanisms and binder phase assemblages that control the early-age and hardened properties of these materials, in particular initial setting and long-term durability. Perspectives for future research developments are also explored and also discuss about the various investigations carried out on alkali activated (Geopolymer) concrete produced using industrial byproducts which otherwise considered as waste disposal products.

Energy Efficiency Reliability and Availability of Real Time Task in Cloud Based Environment
Authors:- B. Artinie, Asst. Prof. Dr. T. Nirmalraj

Abstract:-Green computing is the study of Designing, Manufacturing, Engineering and deposing of computing device in a way that reduces their environmental infects. Green computing also called as Green Technology is the environmentally responsible use of computers and related resources. Search practices include the implementation of Energy-Efficient central processing units (CPU), servers and peripherals as well as reduced resource consumption and proper disposal of electronic waste (E-waste).In existing system they focus on the problem of energy consumption when providing fault tolerance. Xia et al focus to find out the scheduling solution for minimizing the network power consumption of down link C-RAN. Bertossi et al considers both backup over booking and deallocation to reduce system overhead. These works are designed for homogenous systems and not suitable for heterogeneous system. In our proposed system the work as been done on dynamic energy-efficient fault-tolerant scheduling for real time task. Both energy conservation and fault tolerant is considered while meeting the real time requirement. We first analyze the CPU schedulability of real time task and also find out the weather condition to reduce the energy consumption. Our work brings substantial improvement in energy efficiency and task guarantee ratio. Our proposed system shows excellent performance in energy consumption based on the CPU scheduling and weather condition.

EADP: Enhanced Authentication using Novel Dynamic Password
Authors:- Sarthak Gupta, Virat Singh Chauhan

Abstract:- In today’s modern age of Internet, gifted by technology, for verification of user, Password is used. Password is a collection of different characters exists in ASCII code (Text Based) or set of different control signal which is generated based on biological impression of human being (Biometrics). Existing work shows that both Text based password and Graphical password suffer socio-economic problems and internal security issues. By considering this issue, a new security method, Enhanced Authentication scheme using Dynamic Password (EDAP), has been proposed with two-fold; first fold uses Ratings (of Color or Alphabets) for user verification and the second fold uses mathematical matrix for dynamic password generation. In every login of session, user feeds new password, which is completely shielded from various attacks.

Sign Language Translator Using CNN Model
Authors:- Diniya A J, Arathi Remesh, Dona Jose, Jasmi Davis

Abstract:- As the web has developed it has become a place where people interact. They post opinions, modify and enhance each other’s contributions and share information.The problem we are investigating is sign language recognition through supervised feature learning. With the technological trend in man-machine interfaces and the machine intelligence, exploiting these powers has become a challenge in many fields. In particular, it was observed that the body gesture-based interactions of human to human and human to machine are rapidly increasing, especially in the area of sign language interpretation. Statistics strongly suggest that the population of deaf and mute people is on the rise and there is a need to train more people the American Sign Language (ASL) to bridge the gap. Furthermore, the electronic devices such as TVs, PCs, PDAs Robots, cameras, etc. are advanced and built toread users gestures and respond to their commands. Therefore, it is of a great interest to try to conduct research in this area and propose efficient and effective solutions for man-machine gesture-based interaction. Here we propose a system for the automatic recognition of American Sign Language gestures. A series of image and vector processing operations are used in order to transform a visual hand gesture into a spoken letter, display the text and convert the received voice back into text providing a two-way communication.

Reasons to Reduce Our Reliance upon Crude Oil Based Internal Combustion Engines
Authors:-Elavarasan G, Kannan M, Karthikeyan D

Abstract:- Crude Oil based Internal Combustion Engines (ICE) have taken the major role in our country’s transport, energy supply system and various appliances. This paper gives complete detail about not only our dependence upon the crude oil but also why we need to reduce the usage of it. Currently, there are more than 1.2 billion automobiles present in the road which are the basic sources of pollution that result in serious damage to the environment. It is noted that the certain harmful gases were formed as a by-product due to the variation in the engine combustion process and were released to the atmosphere through the exhaust pipe which causes serious effect to the human health; they were Hydrocarbons (HC), Nitrogen Oxides (NO), Carbon monoxide (CO) & Particulate Matter (PM).This paper also gives the complete situation about the crude oil energy scenario in India and the disadvantages of using it.

Seismic irregularity: A validation on the regularity index of tall structure
Authors:- M. Tech. Scholar Aakash Verma, Asst. Prof. Suhail Qureshi

Abstract:- As there is an economic boom there is an increasing demand for infrastructure in order to accommodate the requirement. As this will lead to high demand for all structures with multiple housing units that is not only spacious but also visually appealing. This leads to the various kinds of irregularity that has been prescribed in IS 1893 and these various irregularities forces the building to deviate from their expected behavior. The aim of this paper is to review the previous works on the irregularity of structure and the various indexes that can be helpful to the standardization of the behavior the structure because of seismic activity.

Design and Fabrication of Hydraulic and Mechanical Crane Lift
Authors:- S. Santhosh Kumar

Abstract:- A Simple hydraulic – mechanical Movable crane is necessary mobile equipment for lifting and moving heavy loads used in small scale manufacturing and production industries. Due to the growing of small scale industry based on the current policy of the Government, the demand of load lifting equipments has increased. To deal with such a challenge, we have come up with the brilliant concept of designing and manufacturing a simple and affordable mobile floor crane which we hope will solve the problem of lifting equipments and minimizing manufacturing costs by reducing manpower. The idea of designing and manufacturing a hydraulic-mechanical movable floor crane was best concept among the three major concepts that were initially generated. The manufacturing of the product will involve fabrication works by using hollow section steel materials. Some other parts like tires, hydraulic Jack and motors fitted in the hollow section structure.

5 Pen Pc Technology
Authors:- Krithika. S

Abstract:- The 5 pen pc technology is under developing stage which includes five functions in a single object. It consists of cpu pen, communication pen, led projector, digital camera, virtual keyboard. It was first designed by TOUR ICHIHASH and was created by Japanese company NEC and the corporation and they displayed a conceptual of 30,000 dollars prototype of p-ISM. It is connected with one and another with wireless technology and as a whole it is connect to the cellular data or internet through mobile phones.

Rheological Study of Performance Enhancement of Ubakala Clay for Use as Drilling Mud
Authors:- Alison F.N., Nwanekezie, M.N., Osoka, E.C

Abstract:- This work studied the performance enhancement of Ubakala clay for use as drilling mud. A sample of Ubakala clay was used for this research. The clay sample was collected, processed and beneficiated with varying concentrations of soda ash (0-6wt %). Experiments were conducted to determine the viscosities of the control and clay-soda ash mixture at different curing time intervals (0-8hours), temperatures (30OC-90OC) and speed of agitation (200rpm-600rpm). Response surface methodology, with the aid of MATLAB statistical toolbox was used to perform a statistical study and optimization of the data obtained from the study. The MATLAB curve-fitting toolbox was also used to determine the rheological model that best fit the beneficiated clay and its control. The result revealed that soda ash concentrations, temperature, curing time and their interactions terms are significant variables in the statistical model with temperature being the most significant term, while time is the least significant term. The rheological study of the process showed that the Bingham plastic model appropriately described the performance of the clay samples as it gave the best fit for most of the samples (71.67%) studied, based on the value of the adjusted R2. The graphical representation of the control showed a decreasing rate in viscosity within the required range of speed of agitation unlike those of the clay soda ash mixture. Further work on Bingham model shows that an optimum predictive value of yield stress occurs for a curing time of 8hours, temperature of 900C and soda ash concentration of 5.183wt% are the operating parameters for enhancing the performance of Ubakala clay sample for use as a drilling mud.

A Review Rumors Detection on Twitter Using Machine Learning Techniques
Authors:- M. Tech. Scholar Monu Waskale, Prof. Pritesh Jain

Abstract:- In this period, web based life stage are progressively utilized by individuals to pursue newsworthy occasions since it is quick, simple to get to and modest similarly. In spite of the expanding utilization of web based life for data and news assembling, its tendency prompts the development and spread of gossipy tidbits i.e., data that are unconfirmed at the season of posting, which may makes genuine harm government, markets and society. Along these lines, there is need of compelling framework for distinguishing bits of gossip as ahead of schedule as conceivable before they generally spread. Viable framework should comprise of four parts: Rumor location, gossip following, position grouping, and veracity arrangement. Loads of work has been done in later segment while less work in segment talk identification. In this way, presently we should take a shot at gossip location. In this paper, we will condense endeavors done till now around there. A large portion of existing techniques identifies from the earlier bits of gossip, i.e., predefined gossipy tidbits. So it is required to have robotized gossip discovery strategy which recognizes new developing gossipy tidbits viably and as ahead of schedule as could reasonably be expected.

A study of GFRA products made with scrap plastic and glass for asphalt pavement road in Mongolia
Authors:- Khulan Altankhuyag, Associate Prof.Yi-Ching Chen, Badmaanyambuu Narantsetseg

Abstract:- The world’s population grows day by day, the technological developments and people’s needs are increasing environmental issues are increasing. Recycling and production of waste products in recent years is highly demanded. In this study commonly used in our country, absorbed in the environment for long periods of time, recycling of scrap glass and plastic was studied and the possibilities for producing roads and construction materials were studied. PEGS (PolyEthylene glass scrap) and PPGF (Polypropylene glass fiber) picked, the tests were carried out to improve the properties of the asphalt mixtures, the main material of the road construction. The hot asphalt mixture added the additives, then will determine the physical and mechanical characteristic of the additive and non-additive asphalt mixtures laboratory test by Marshall method. Then observations will determine the rutting 3m width and 50m length at the test area for 6 months. Further, it is necessary to develop a detailed analysis using modern laboratory tools to improve testing methods.

A Comparative Study on Multistoried Building by Time History Analysis Method for Nepal Earthquake
Authors:- Anu Shekhar , Subhankar Manna, Dona Chatterjee

Abstract:- Nonlinear time history analysis is known for simulating structural behaviour under severe earthquake more proper than other methods. The present paper mainly studies seismic response of four building models of variable heights with constant base dimensions under ground motion records of Nepal earthquake 2015 which are modelled and analysed using STAAD software. The results of the study are discussed and compared in terms of accelerations and displacements versus time plots and seismic response such as base shear, bending moment, storey drift shows a similar trend of variation with increase in height of the building.

A Systematic Review on K-Means Clustering Techniques
Authors:- Swagita Dwivedi, Prof. Lalit Kumar P.Bhaiya

Abstract:- Number of data points are grouped together to form a cluster. Data of same class are grouped together. K-Means clustering is most essential and fundamental clustering technique through which data centers are analyzed. K-means is most broadly used algorithm for clustering with known arrangements of median points. It is likewise called as nearest neighbor clustering. Beforehand, a different endeavor has been done to improve the performance of k-means algorithm. The result of improved k-means has extraordinary performance improvement for little to medium size of data. Be that as it may, for vast and exceptionally expansive amount of data, k-means fall behind. This paper reviews different methods and techniques used in literature and its advantages and limitations, to analyze the further need of improvement of k-means algorithm.

Secure and Efficient Commercial Data Retrieval in Cloud Computing
Authors:- Kummari. Ilayaraja, A. Uday Kishore

Abstract:- In Cloud computing, cloud customers can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. The fact that data owners and cloud server are no longer in the same trusted domain may put the outsourced unencrypted data at risk. It follows that sensitive data has to be encrypted prior to outsourcing for data privacy. However, data encryption makes effective data utilization a very challenging task given that there could be a large amount of outsourced data files. Also outsourcing data to the cloud causes loss of control over data on a data owner’s part. This loss of control over data is further intensified with the lack of managing users’ access to the data from practical cloud computing perspectives. We address these challenging issues, a privacy-preserving data search Scheme is proposed, and that can support both the identifier -based and feature-based product searches. Specially, two novel index trees are constructed and encrypted, that can be searched without knowing the plaintext data. Data user is enabled to create queries to retrieve data by the Data user query. The index value is attached to every data and it is stored in the cloud. If the user wants to retrieve the data from cloud then the given index value is to be matched with the index value.

Intelligent Traffic Monitoring System Using IOT
Authors:- Mukund Vaidya, Satish Matsagar, Mayur Mandavkar, Prof. D. S. Nath

Abstract:- Accurate and timely traffic flow information is important for the successful deployment of intelligent transportation systems. Over the last few years, traffic data have been exploding, and we have truly entered the era of big data for transportation. Existing traffic flow prediction methods mainly use shallow traffic prediction models and are still unsatisfying for many real-world applications In this paper, we are presenting the system by which we are able to get the correct information of real time traffic density without totally relying on the conditions like mobile gps as such. We are able to get an information about the rain as well as pollution level of the desired path. This system will help to increase the precise prediction and understanding of traffic as well as atmospheric conditions of the area.

Rumors Detection on Twitter Using Machine Learning Techniques
Authors:- M. Tech. Scholar Monu Waskale, Prof. Pritesh Jain

Abstract:- Location systems of malignant substance, for example, spam and phishing on Online Social Networks (OSN) are regular with little consideration paid to different kinds of low-quality substance which really impacts clients’ substance perusing background most. The point of our work is to identify low-quality substance from the clients’ viewpoint continuously. To characterize low-quality substance conceivably, Expectation Maximization (EM) calculation is first used to coarsely order low-quality tweets into four classifications. In light of this starter think about, an overview is cautiously intended to assemble clients’ feelings on various classifications of low-quality substance. Both immediate and backhanded highlights including recently proposed highlights are recognized to portray a wide range of low-quality substance. We at that point further consolidate word level examination with the distinguished highlights and fabricate a watchword boycott lexicon to improve the recognition execution. We physically mark a broad Twitter dataset of 100,000 tweets and perform low quality content discovery continuously dependent on the described noteworthy highlights and word level investigation. The consequences of our exploration demonstrate that our technique has a high precision of 0.9711 and a decent F1 of 0.8379 dependent on an irregular woodland classifier with continuous execution in the discovery of low-quality substance in tweets. Our work in this manner accomplishes a positive effect in improving client involvement in perusing internet based life content.

Application of Regression Analysis and Artificial Neural Network in Construction Project
Authors:- Anjana T

Abstract:- Project can be defined as a sequence of unique, complex, and attached activities having one goal or purpose and that must be completed by a specific time, within budget, and according to specification. Success of construction projects depends mainly on success of performance of a project. Project performance is predicted mainly based on the four performance metrics i.e., schedule and quality performance. This study is carried out to identify the factors affecting the performance of construction project and their significance on the schedule, and quality performance. The next objective of this research is to develop regression models and neural network models to predict schedule performance and quality performance.

A Machine Learning based Embedded Criminal Face Identification System for Residential Security
Authors:- Pruthvi Ski, Prithviraj Hiremath, Pavan Kumar S, Nimmanapalli Sai Abhijith Reddy

Abstract:- With an extremely arousing and increasing number of criminal activities in and around our surroundings, it has become very difficult to protect ourselves and live in such an environment.This project model helps in evaluation of such entities in real time and provides us rapidly fast and accurate satisfactory conclusions in order to classify the entities (faces) based on the pre-trained dataset, with advancement in technology like Machine Learning, we are able to come up with designing and embedding this highly reliable real time image recognition model with already existing visual devices and also design a dedicated device for the same purpose. YOLO (You Only Look Once), real time Object Detection and Classification model is used for faster results which helps in detecting any face familiar with respect to the trained dataset with criminal record, which can be further reported to the responsible authorities.

Time Cost Risk optimization in construction Using ant colony Algorithm
Authors:- Lakshmi C R

Abstract:- Construction planners often face the challenge of optimum resource utilization to compromise between different and usually conflicting aspects of projects. Time, cost and risk of project delivery are among the crucial aspects of each project with both client and contractor striving to optimize the project duration and cost concurrently. Studies have been conducted to model the time–cost relationships, ranging from heuristic methods and mathematical approaches to genetic algorithms. Emergence of new contracts that place an increasing pressure on maximizing the quality of projects while minimizing its time and cost, require the development of innovative models considering risk in addition to time and cost.. Besides time and cost of activities, every resource utilization option will yield a specific performance quality according to the involved. The optimization of trade-off between these time, cost and risk parameters is done using Multi-Objective Ant Colony Optimization technique. The optimization program was run for a number of giving weight age for the parameters. The total time, cost and risk for the project when executed in various combinations of alternatives were taken the trade-off between the parameters are analyzed.

Production of Biodiesel from spent cooking oil and Oxidative stability Improvement using Onion scale extracts
Authors:- Anusi, M.O., Oyoh, K.B., Osoka E.C., Ojukwu, P.U., Igboko, N.

Abstract:- The need for a clean and cheap source of energy is ever increasing in our world today. Biodiesel has become a topic of interest for some time and researches are still on-going on how to obtain cheaper feedstock for biodiesel production. Moreover, there is need to improve the oxidative stability of biodiesel which is a measure of its shelf life, seeing that biodiesel is biodegradable. This research work considers the production of biodiesel from a cheap and viable feedstock; spent cooking oil. The feedstock was subjected to acid etherification reaction which reduced its free fatty acid level from a value of 2.16% to 0.9% which is suitable for biodiesel production. A transesterification reaction catalyzed by Sodium Hydroxide was carried out on the oil at 60OC, using a methanol to oil ratio of 6:1 for a period of 60 minutes. The biodiesel yield was 89.4% and the product was subjected to physicochemical characterization which showed that its properties closely approximate the standard values. Furthermore, the ethanolic extract obtained from waste onion scales were introduced into some of the biodiesel after which the acid and peroxide values were monitored for a period of seven weeks. The results obtained showed that the onion extract was able to fairly inhibit the rate of increase in the acid and peroxide values of the biodiesel produced which are parameters that were used to measure the oxidative stability of biodiesel and hence its shelf life. It was therefore concluded that onion extract is a viable natural antioxidant for improving the oxidative stability of biodiesel and hence its shelf life.

Prevention of Voter Fraud using Block chain
Authors:- Asst. Prof. Uma Tomer, K.Swapnil, Nishkarsh Bareja

Abstract:- Voter Fraud without a doubt has been catastrophic at so many levels. The wrong leader makes a wrong decision which starts a domino effect of bad decisions thereby affecting the nation. The aim here is to establish trust between the citizens of the nation and their elected leaders from various political parties. ‘Bit coin’ has lately been the buzzword, but the real buzzword should have been ‘Block chain’. Block chain runs on the basic philosophy of Trust and Security which are the core essentials of a voting system in a democratic country. Here, we introduce an effective concept to solve the major issue of voter frauds in our country. This concept is not only bound to our country – India but also applicable to every country across the globe.

Catalytic Peroxide Oxidation for Detoxification Of Organic Waste
Authors:- Neena Saju, Lipin K.V, Reshma Tomy, Princy Paulose

Abstract:- Voter Fraud without a doubt has been catastrophic at so many levels. The wrong leader makes a wrong decision which starts a domino effect of bad decisions thereby affecting the nation. The aim here is to establish trust between the citizens of the nation and their elected leaders from various political parties. ‘Bit coin’ has lately been the buzzword, but the real buzzword should have been ‘Block chain’. Block chain runs on the basic philosophy of Trust and Security which are the core essentials of a voting system in a democratic country. Here, we introduce an effective concept to solve the major issue of voter frauds in our country. This concept is not only bound to our country – India but also applicable to every country across the globe.

Performance Analysis of SISO-OFDM Architecture for Wireless Applications using VLSI Technology
Authors:- Dr. R. Umamaheswari, Ramya Princess M, Dr. P.Nirmal Kumar

Abstract:- Novel technologies have started emerging as an evolution of wireless communication standards, and corresponding low cost devices are key to follow this trend in order to achieve better quality of service (QoS) and support large amount of users that can communicate simultaneously. Orthogonal Frequency Division Multiplexing (OFDM) is believed to be the key technology to meet all these demands. OFDM is a form of frequency division multiplexing with the special property that each tone is orthogonal to each other with every tone. OFDM has overcomes most of the problems with FDM and TDM. In many broadband communication technologies, OFDM modulation techniques are normally preferred. VLSI technology has now made progress in the region of small area and power. The proposed architecture is developed using Verilog HDL and implemented in altera cyclone IV E. The performance evaluation has been made in relation to latency, area and power.

Delay less Process to Reduce Impulse Noise By Design of Superlative Wavelets
Authors:- Gundluru Ganesh, Assistant Prof. K. Bala Murali, Assistant Prof. Pradeep Kumar K

Abstract:- Expulsion of motivation commotion from discourse in the wavelet area has been observed to be extremely compelling due to the multi-determination property of the wavelet change and the simplicity of evacuating the driving forces in that space. A basic factor that influences the execution of the drive evacuation framework is the viability of the motivation detection calculation. To this end, we propose another strategy for outlining orthogonal wavelets that are advanced for distinguishing motivation commotion in discourse. In the technique, the qualities of the drive commotion and the hidden discourse flag are considered and a raised operation timization issue is figured for inferring the ideal wavelet for a given help measure. Execution examination with other surely understood wavelets demonstrate that the wavelets outlined utilizing proposed technique have much better motivation location properties..

Proactive System for Real-Time Safety Management In Construction Site
Authors:- Neethu P

Abstract:- The purpose of this paper is presenting a new advanced hardware/software system, boasting two main features: first it performs real time tracking of workers‟ routes in construction sites; then it implements an algorithm for preventing workers to be involved in hazardous situations.

Economic Assessment of Ground water Pollution With Special Reference to Tirupur District
Authors:- Associate Prof. P. Geetha, Research Scholar R. Anbuselvi

Abstract:- The disposal of effluents on land has become a regular practice for some industries. Industries located in Tirupur district, Tamilnadu dispose their effluents on land and the farmers of adjacent farmland have complaint that their shallow open-well get polluted and also salt content of the soil started buildings slowly. This study attempts to capture the environmental and socio-economic impacts of an industrial effluent irrigation in different industrial location at Tirupur District, through primary surveys and secondary information. The continuous application of polluted groundwater for irrigation has also resulted in rising salinity in soil. To some extent, farmers are coping with the problem by cultivating salt-tolerant crops and/or by using other sources such as river water for irrigation. The study specifically focused on how groundwater affects irrigation and drinking water in Tirupur District. This study is descriptive and exploratory in nature. With the descriptive design, the researcher plans to gain more information about a phenomenon within a particular field of study by examining the characteristics of a specific single population. Exploratory study would provide an in-depth exploration of a single process. The finding of the study emphasized the need for assessing the water quality and make efforts to improve the water quality. It is recommended that farm households should be given opportunity to participate in mechanization of agriculture, and rural development programmers which would enhance their new livelihood activities and living standard is initiated and encouraged.

A Review Articles of Booth Multiplier
Authors:- Divya Rathore, Asst. Prof. Priyanshu Pandey

Abstract:- The aim of this paper is give the review of different type of implementation of multiplier has been studied. Multiplier has important role in DSP, microprocessor and microcomputer applications. In this paper booth algorithm is used to design the multiplier but it suffers many limitations such that number of partial products increases, so, area, height and latency is also increases. In this review paper we analyzed modified Booth algorithm to design the multiplier so that the partial product is going to be decreases. Different type of algorithm are also explained which are used for addition operation of multiplier. In the latest designs of VLSI, power dissipation is a main advantageous to reduce it.

Test-Based Stress and Short-Term Risk-Taking Behaviour in older Adolescents
Authors:- Srishti Roy

Abstract:- Previous studies have indicated a correlation between stress and risk-taking in adolescence. Exposure to constant stress can lead to an increase in cardiovascular problems in the long run. This study takes a group of late adolescents (first-year university) and subjects them to the Trier Social Stress Test (TSST) and the Balloon Analogue Risk Test (BART) to observe a correlation between test-based stress and risk-taking. 41 participants, were divided into 2 groups (experimental and control). The test results indicate that the experimental group had higher stress levels (indicated by heart rate) and showed higher short-term risk-taking behaviour (indicated by BART).

strong>Implementation Barriers of Green Building Design In Indian Construction Sectors
Authors:- Arthana P

Abstract:- Constructions of sustainable buildings are the mostly occurring in India but for these green buildings they are so many problems will be occurred. For the problems we want to do the questionnaire survey and then to find the drivers for growth of green development and to reduced consumption of materials, energy, water by green building design elements. This research explains how green building is slowly becoming more accepted but it is not occurring fast enough and it needed to be finding out the barriers that slowing down the adoption. The various factors, which becoming the barricades to the successful implementation of the green building in Indian construction industry are identified through the comprehensive study of the literatures. The identified problems are framed as a questionnaire and survey conducted over various construction organizations. The collected data were statistically analyzed through SPSS software and the results were examined.

Improvement Productivity in Balancing Assembly Line by Using Pso Algorithm
Authors:- Deepak Solanki, Mr.Kamlesh Gurjar­

Abstract:- Assembly line balancing plays a crucial role in modern manufacturing companies in terms of the growth in productivity and reduction in costs. The problem of assigning tasks to consecutive stations in such a way that one or more objectives are optimized with subject to the required tasks, processing times and some specific constraints, is called Assembly Line Balancing (ALB) The present study also describes KANBAN withdrawal Methodology for production time period of 0.6 minutes only for single stage Assembly line. The study also determines the maximum number of iterations in PSO, which finds the final economical costing over other parameters, variable demands and number of workers. The Simulation Tool MATLAB (2015a) has been used to design Simulink model of balancing parallel Assembly line and for Graphical Analysis of each product.

On Regular Fuzzy Soft Graphs
Authors:- B. Akilandeswari

Abstract:- In this paper, regular fuzzy soft graphs, and totally regular fuzzy soft graphs are examined. Total degree of a fuzzy soft graph is introduced. Theorems for Regular fuzzy soft graphs and totally regular fuzzy soft graphs are introduced. A necessary condition under which they are equivalent is provided. Some properties of regular fuzzy soft graphs and totally regular fuzzy soft graphs are studied.

Financial Fraud Detection with Anomaly Feature Detection on credit card
Authors:- M Anjaneyulu, Asst. Prof. A. Uday Kishore

Abstract:-The most traditional payment approach is a credit card or debit card for online in today’s world; it will supply money less shopping at every shop across the world. It is the more and most suitable way to do online shopping, paying bills, and performing other related tasks. Hence the risk of fraudulent transactions using a credit card has also been increasing. In the existing credit card fraud detection processing system, the fraudulent transaction is detected after the transaction is done. This kind of illegal activities involves complex networks of business, enterprise and financial transactions, which makes it difficult to detect the fraud entities and discover the features of fraud by issuing authorities. Fortunately, trading, business transaction network and features of entities in the network can be constructed from the complex networks of the trade and financial transactions. The trading or business transaction network announces the interaction between entities, and thus anomaly detection on business networks can expose the entities involved in the fraud activity. However, most of the existing methods focus on transaction networks or features information separately, which does not use the information. In this paper we propose a novel credit card fraud detection framework based on Fraud Behaviour which reflects the cardholders’ transaction habits using data mining techniques and we propose a novel fraud CoDetect, which can leverage both network information and feature information for financial fraud detection .

A Trend toward Virtualization and Cloud Services
Authors:- R. Manoj Kumar Banita

Abstract:- Cloud Computing technology has played a significant role and revolutionized the IT industry by delivering IT resources as a Service. Recent studies demonstrate how Cloud Computing can handler sources and overcome the challenges faced by offering high flexibility and cost-effectiveness. One such essential concept is ‘virtualization’. In this work, we present an overview of recent research efforts developing different virtualization models for Cloud Computing based environments and classify these different approaches briefly describing them. In addition, we evaluate the approaches based on limitations, benefits, overall performance criteria such as salability and effective and efficient use of cloud resources and management.

Review Paper on Determination of Heat Transfer Coefficient through Condensation
Authors:- Kajal S. Tayade, Mayuri B. Rohane, Anuja A. Vihulekar, Prof. Dhiraj Kumar K. More

Abstract:- Condensation is the process of conversion of a vapour or gas into liquid, which plays a key role in the system such as air conditioning, power plants, refrigeration, reactor safety, aerospace and desalination. Environmental and economic pressures are driving the need to design increasingly efficient systems. As a result, we need to increase our understanding about condensation. In this paper various research papers have been reviewed, which gives the information about the designing of the condensers and methods to achieve the Condensation Heat Transfer Coefficient and the various factors affecting on it.

Pavement Evaluation Studies Using Asphalt Concrete and Bituminous Mix
Authors:- Vikas Singh, Manish Kesharwani

Abstract:- now day’s highway pavement, bridges,parking, and other commercial structures becoming functionally deteriorating due to repeated of vehicular load and effect of climatic condition. non-destructive testing methods are desirable to evaluate existing flexible pavement. in the study consisted of two tasks: during visual inspection of the existing pavement failures. second, investigated the actual causes of these failures. in the found that most of the damaged pavement sections suffered from severe cracking and rutting failures. in the structure evaluation of flexible pavement in the deflection is measure by benkelman beam. functional evaluation of pavement is like roughness, rutting, crack, patch, potholes, and ravelling. the present study is to carry out the flexible pavement condition index survey studies by irc 81-1997.

Implementation and Design of Xilinx based Booth multiplier
Authors:- Divya Rathore, Asst. Prof. Priyanshu Pandey

Abstract:- Multiplication in hardware can be implemented in two ways either by using more hardware for achieving fast execution or by using less hardware and end up with slow execution. The area and speed of the multiplier is an important issue, increment in speed results in large area consumption and vice versa. Multipliers play vital role in most of the high performance systems. Performances of a system depend to a great extent on the performance of multiplier thus multipliers should be fast and consume less area and hardware. This idea forced us to study and review about the Booth’s Algorithm, modified Booth’s algorithm and its radix-2, radix-4, radix-8 forms.

Simultaneous Localization and Mapping on a Quadcopter
Authors:- Preeti Keshava Lakmapur, Rakshith B H, Rakshitha S R, Shiva Prasad K S, Asst. Prof. Pushpalatha S

Abstract:- Simultaneous Localization and Mapping (SLAM), in robotics, is the computational problem of constructing or updating a map of an unknown environment while simultaneously keeping track of a robot’s location within it. In an outdoor environment, GPS is used to address such issues to track the robot’s location in a map. But in cases like indoor environment or when the GPS is unavailable, SLAM comes into picture. The paper aims to implement Visual-SLAM using Kinect camera on a quadcopter. The Visual-SLAM algorithm has been implemented on x86_64 architecture-based intel core i7 processor on a laptop with Ubuntu 12.04 running as the host OS. The algorithm uses Kinect camera that has both RGB camera and an Infrared Depth camera to obtain the pictures and depth information of the frame. In addition to this OpenCV and several ROS packages like Octomap Server, eigen, cv bridge etc. has been used to support its functionality. The front-end of the algorithm takes care of the observations being made by the robot while the back-end builds a 3D map using these observations and localizes the robot within it. This paper hence provides a 3D map of an unknown environment using kinect camera on a quadcopter (Jatayu).

Detection of Flame and Fire Startle Using Zigbee Protocol
Authors:- Assistant Professor Jayaraman. K

Abstract:-Nearly all our buildings and workspaces are protected against fire breaks, which may occur due to some fault in the electric circuitries and power sources. The immediate alarming and aid to extinguish the fire in such situations of fire breaks are provided using embedded systems installed in The buildings. But as the area being monitored against such fire threats becomes vast, these systems do not provide a centralized solution. For the protection of such a huge area, like a college campus or an industrial park, a centralized wireless fire control System using Wireless sensor network technology is developed The system developed connects the Two dangers prone zones of the campus with a-central control room through a Zigbee communication interface such that in case of fire break in any of the building, a direct communication Channel is developed that one lies out of reach of the central node. And with the help of the signal received in the control room, the exact building where the fire break occurred is identified and fire extinguishing is done.

A Review on Yield Prediction of Various Techniques and Features
Authors:- Neha Sharma

Abstract:- Agriculture is one of the major revenue producing sectors of India and a source of survival. Various seasonal, economic and biological factors influence the crop production but unpredictable changes in these factors lead to a great loss to farmers. This paper presents a survey on the various models used for crop yield prediction. So this paper focuses on this problem of increasing the size of the data. Here various approaches adopt by researchers are detailed with their field of accuracy for prediction. Some of issue related to the papers is also discussed. Techniques of knowledge extraction and storage were discussed in this work. Here details of feature required to analyze the crop yield are present with there calculation and requirements.

An Enhanced Precision-Mitigated Area Parallel Architecture for 3D Multilevel Discrete Wavelet Transform
Authors:- Lone Hameem Ul Islam, Azra Bilal, Prabhat Singh Lakhwal

Abstract:- The paper presents parallelism-based architecture of executing 3D multi-level DWT (discrete wavelet transforms), that is efficient video frames and image algorithm of compression. The proposed architecture is one of the first parallelism along with pipelined architecture of 3-D DWT without group of image restriction. This architecture produced high throughput, reduced referencing of memory completely in temporal section, low latency and low consumption of power due to fetching of single row data flow, compared with those of previous reported works. This paper displays an enhanced precision mitigated area parallelism-based design for the unified implementation. The proposed architecture has been effectively implemented on Xilinx Virtex-VI series field-programmable gate array, offering a speed of 416 MHz, making it reasonable for real-time compression even with large frame dimensions. Besides, the architecture is completely scalable beyond the present coherent Daubechies filter bank. The proposed solution might be designed as lossy or lossless compression, in the field of 3D image compression framework, as indicated by the need of the client.

Motion Following Camera With Face Tracking
Authors:- Ankit Yadav, Shubham Mhabdi, Rishabh Singh

Abstract:- There was a day when we faced a problem of adjusting a large area such as banks, offices and even household CCTVs to cover complete area, this CCTVs are fixed and to ensure there is no blindspot multiple CCTVs are used for surveillance. This gave us our problem definition of the project. The plan is to create a Camera base that will rotate the camera in the direction any random person will move. Thus, any movement within its given radius camera basewill rotate in same direction. Our intention is to use Image Processing to detect motions and instruct Arduino to respond accordingly, the Arduino will instruct motors to rotate accordingly and Camera will capture people randomly . The purpose of this project is to design a camera module which when detecting motion starts following moving object and track the face.

Scrutiny on Fine Semi Totally Continuous Functions in Fine Topological Space
Authors:- M. Vijayalakshmi, T.Shivasankari

Abstract:- The properties of new class of functions, namely fine totally continuous function, fine semi totally continuous function and fine totally semi continuous functions in fine topological space are analyzed in this paper. The relation of these functions with already existing well known functions are studied.

Optimal Power Allocation for OFDM-Based Cognitive Radio with Improved Genetic Algorithm (IGA)
Authors:- Ms. Sandhya Mishra

Abstract:-The power allocation is a very important factor in OFDM based cognitive radio. In current trend of research focus on the maximization of power allocation for the transmission of user data. For the maximum utilization of power used various optimal and sub optimal process are used. In optimal and suboptimal used under layer, over layer and joint under layer and over layer model in cognitive radio. During the transmission, induction of interference is a major issue inside of the primary user. For the minimization of interference value used improved genetic algorithm. The improved genetic algorithms reduce the value of interface and achieve the maximum throughput of the transmission. The proposed algorithm deal in concern of dual threshold values for the selection of fairness in cognitive radio users. The proposed algorithms simulated in MATLAB environments and measure some standard parameters against joint methods of OFDMA. The proposed algorithms give very fair result, instead of previous models of cognitive radio.

Performance of MIMO-OFDM based on integrated encoding transmitted using VLC and SS-SAMP based channel estimation for 5G networks
Authors:- Tabassum Nisar, Lone Hameem Ul Islam, Asst. Prof. Rashmi Raj

Abstract:-Orthogonal Frequency Division Multiplexing (OFDM) is a multiple carrier system. It can decrease the symbol rate thereby reducing the power consumption of the system. It can also able to increase the bandwidth and capacity of the channel which ultimately increases the speed of the system. The key idea is to implement MIMO-OFDM in VLC to get maximum data rate transmission and improve the performance. In the paper, STBC-SM had been proposed for high data rates and high spectral efficiencies has led to the development of spatial multiplexing systems, with SS-SAMP algorithm for channel estimation. BER, NMSE and PAPR parameters has been calculated for the performance evaluation of the proposed technique.

An Environment for Supporting Collaboration of Distributed Team
Authors:- Abhishek Gaikwad, Ankita Chikhale, Shrutika Satav, Vrushali Pol

Abstract:- To implement the project various services and platforms are used by the developer’s team in order to interact with each other and to share the resources required for the project. the team needs to learn a new software tool to carry out each activity and learn each tool; it becomes too difficult to remember when the team uses more number of tools. in this project, we have integrated all the functionalities with some additional features. using this tool will lead to increase in efficiency and productivity of the distributed team. all the data of the teams project is stored at a central database which is located on cloud, hence the data will be available anytime anywhere. all the functionalities in this tool are well organized and we are trying to implement the user friendly interface. the team will be connected consistently and will have real time interaction with each other. the focus of our project is to the support a small developer’s team interaction while developing the software. the primary function is to share information about project-related activities. the information sharing enables members to make quick decisions about project actions and goals. the developer’s team can participate in real time and create software; also they can make constant changes to the code and release new versions of their software.

Wide Band Micro strip patch antennas by using inverted U shape for S- Band and C – Band Applications
Authors:- Amit Kumar Mishra, Prof. Dhruv Singh Thakur

Abstract:- In this paper a Wide Band Micro strip antennas for S- C Band is presented. In this work by using inverted U shape slot is used for impedance matching. FR-4 dielectric constant material is used for enhancement in impedance bandwidth. Simulation of antenna was completed in IE3D Simulator, for validation return losses, axial ratio, and gain of antenna considered. The parameter of a proposed antenna is satisfied by required limits. So it is suitable for S-C- Band applications.

On Irregular Fuzzy Soft Graphs
Authors:- B. Akilandeswari

Abstract:- In this paper, irregular fuzzy soft graph , totally irregular fuzzy soft graphs ,neighbourly irregular fuzzy soft graphs, neighborly total irregular fuzzy soft graphs, highly irregular fuzzy soft graphs and highly total irregular fuzzy graphs are introduced. A condition under which neighborly irregular and highly irregular fuzzy graphs are equivalent is provided. Some results on neighbourly irregular fuzzy graphs are established. Some properties of irregular fuzzy soft graphs studied.

Investigation of Different Designs of Artificial Neural Network for Maximum Power Point Tracking of Grid Connected PV System
Authors:- Mahmoud N. Ali

Abstract:- This paper aims at increasing the PV system efficiency through the design of the Artificial Neural Network (ANN) for maximum power point tracking (MPPT) of grid connected PV systems. The main effective factors for efficiency increase is to design an accurate tracker of maximum power point. Some conventional methods, such as the perturb-and-observe (P&O) and the incremental conductance (IC), are widely used for MPPT. The artificial intelligence can substitute these conventional methods to produce a precise MPPT system. The artificial neural network (ANN) is investigated, in this paper, to compare between different designs to maximize the output dc power of PV array. One hidden layer with different number of neurons, two hidden layers and a modified criterion for improving the learning process are the proposed designs of ANN for MPPT. The IC method is used as a base case to be compared for the clarification of the improvement achieved using the ANN as an MPP tracker.

Third Party Auditing In Cloud Storage
Authors:- Akshay Bhonde, Bipin Kumar, Bilal Momin, Prathamesh Shete, Asst. Prof. Sulbha Ghadling

Abstract:-Remote data integrity checking (RDIC) enables an cloud server, to provide a proof to a verifier that it is really storing data owner’s data securely. A lot of RDIC protocols have been proposed in the literature, but most of the constructions are complex key management, which rely on expensive public keys infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, a new construction of identity-based (ID-based) RDIC protocol by making use of cryptographic primitive to reduce the system complexity and the cost for establishing and managing public key authentication framework in PKI-based RDIC schemes. It is an ID-based RDIC security model, which includes security against a malicious cloud server and zero knowledge privacy against a third party verifier. The ID-based RDIC protocol doesn’t leak any information of the stored data to the verifier during the RDIC process. The new construction is proved to be secure enough against the malicious server in the generic group model and achieves zero knowledge privacy against a verifier. Immense security analysis and implemented results demonstrates the proposed protocol is provably secure and practical in the real-world applications.

Mechanical Properties and Biocompatibility Evaluation of Medical Implant using Metal Injection Moulding Process
Authors:- Mohd Afian Omar, Norhaslina Johari

Abstract:-Metal Injection moulding (MIM) is an advanced near net shape forming process for high quality of complex shapes combined with high properties of materials. For economic reasons, it is necessary to have demand for a large quantity of parts. This paper presents the attempt to manufacture metallic implants particularly fracture fixation plates for orthopedic applications for commercial purposes by MIM process. Furthermore, the in vitro and in-vivo evaluation also has been conducted.The stainless steel powder with the median particle size of 16 µm and a binder consisting of major fraction of palm stearin and a minor fraction of polyethylene were mixed at 160°C using a sigma-blade mixer for one hour to prepare the feedstock of the fracture fixation plates. The medical implant component was injection moulded using 80 ton metal injection moulding machine with the nozzle temperature of 200°C. Prior to sintering, the specimens were debound using a combination of solvent extraction and thermal pyrolysis method. The specimens were then sintered under vacuum. The properties of the fracture fixation plates such as physical appearance and densities were presented and discussed. Furthermore, the in vitro biocompatibility and preliminary in-vivo study on the fracture plates produced also been carried out.

Efficient Artificial Neural Network Based Approach for Software Fault Identification
Authors:- Karandeep Kaur

Abstract:-Software Fault prediction is designed to predict error prone software modules by using some of the underlying attributes of a software project. It is usually performed training a prediction model using project attributes added to the failure information of a known item and then using the prediction model to predict the failure of the unknown item. In this work, a adaptive-neuro-fuzzy system based algorithm was created to effectively address this issue and assess the execution of neural utilizing software fault dataset at different parameter settings utilizing different execution estimation methods. The examination used data assembled from the software fault database of programming bug data. The results show that the Adaptive Neural Networks strategies regards to anticipating programming weakness tendency can be used to identify bugs effectively.

GSM Based Security Automation System for Building Entry Management
Authors:- Nishad Joshi, Nikita Virkud

Abstract:-“Security experts agree, security means prevention.” And prevention means detecting the security risk outside before it becomes a security threat to people and assets inside. Residential buildings and big housing complexes often become the scene for a number of unwanted events and small / big crimes, for many reasons. One way to protect your assets and personnel within the building from such threats, is to have effective and easy to use automated entry management system to screen visitors and restrict unauthorized entries. The paper is based on GSM technology which is used for visitor entry management that can be developed to replace traditional manual visitor registration.

User-Service Rating Prediction By Exploring Social Users’ Rating
Authors:- Vijaylaxmi R Patil, Poorvi Kalyani, Sindhu. B, Anusha. D Vaidya

Abstract:-A Recommended system or a Recommendation system is a subclass of information filtering system that seeks to predict the “rating” or “preference” a user would give to an item. Collaborative Filtering Algorithm is one of the techniques in recommendation systems, which we use in our daily life. It is a method of making automatic predictions by collecting users taste, interest and grouping them into one similar category. In this paper, collaborative filtering algorithm based on user interest and rating difference is proposed. Initially rating difference factor is added to the traditional algorithm. In the second step, user interest will be calculated. And in the final, both the rating difference and user similarity are weighted together to get the final item.

Development and Implementation of a Voice Portal Builder Using Next Generation Networks Technology
Authors:- Sonal P G, Prof. Rakshitha Kiran P

Abstract:- Walk application, which is designed in a dynamic fashion, acts as a platform for users to build their own personal voice portal, much that people can have access to information at anytime and anywhere over a telephone. VTalk application has the space of improvements.

Performance Comparison of Feature Selection Algorithm in Opinion Data Mining
Authors:- Akrati Shrivastava

Abstract:- To determine the opinion of any person experiencing any services or buying any product the usage of Sentiment Analysis, is a common practice in the field of text mining. It is a process of using computation to identify and categorize opinions expressed in a piece of text. Individuals post their opinion via reviews, tweets, comments or discussions which is our unstructured information. Sentiment analysis gives a general conclusion of audits which benefit clients, individuals or organizations for decision making. The primary point of this paper is to compare different feature selection algorithm to identify the maximum accuracy in different type of dataset. It is an approach to determine two or more methodologies collation. The fundamental commitment of this paper is to experiment whether combined use of feature Selection and existing classification methodologies can yield better accuracy.

Nano Totally Semi Open Maps in Nano Topological Space
Authors:- P. Karthiksankar

Abstract:- The theory of Nano topology [3] proposed by Lellis Thivagar and Richard is an extension of set theory for the study of intelligent systems characterized by insufficient and incomplete information. Aim of this paper is we introduced in Nano totally open maps in Nano topological space and also studied about Nano semi totally open Maps and Nano totally semi open maps in Nano topological space.

Security Concerns of Cloud
Authors:- PG Scholar Mamatha R, Asst. Prof. Mahendra Kumar B

Abstract:- Cloud Computing is the practice of using a network of remote servers hosted on the internet to process, manage and store data rather than a local server or a personal computer. Or cloud computing could be the method for delivering information technology service is where resources are obtained from the internet through web based tools as application. Organizations use cloud in a variety of different service models such as Saas, Paas and Iaas which are deployed using deployment models public, private and hybrid.

Business Model of Buy and Sell Properties Web Application
Authors:-Veeresh B Kambar, Kavya T C, Prof. Mahendra Kumar B

Abstract:- The project entitled “PORTAL TO SELL BUY PROPERTIES ONLINE” is a portal to directly sell buy properties online. The project encapsulates a platform where people can directly sell or buy properties. People can upload their property details along with pricing, configuration, location and other related details. The properties will be listed in the platform which are uploaded by the sellers. The buyers can view the properties along with the related details and they can contact the seller. The platform comes with different tariffs for both buyers and sellers. The system is extremely helpful for the organization or manufacturers that can publish , alter their properties and their own data and administrator screen records of all of them . The project is designed completely on dynamic platform where every property is dynamically uploaded. The admin is provided with the admin dashboard to monitor and control the commercials and as well as to regulate the property posts on the platform.

Social Network for International E Commerce
Authors:- Rakesh H S

Abstract:- Foreign trade for common people was impossible in earlier days but now with the help of e-commerce it is possible for common people to buy foreign goods. Our web application “Social Network for International Ecommerce” is mainly built to achieve this. Which is purely meant for international trade or buying or selling of foreign goods via social network here any seller who has registered with the social network can sell a product and any customer who is registered with the social network can order that product? There are a few items which are interesting and are accessible at specific places in few countries. There are a lot of items which are not accessible in the neighbourhood market and to get them one needs to travel abroad. It isn’t achievable to head out abroad to buy them. As an answer, the platform is prepared where the explorers can post their travel details and individuals who wish to get any item conveyed in that course they will put forth the demand. Like wise, individuals can straightforwardly post the items for which others can offer and through the online auction, the item can be sold. The platform comes with a registration process with a unique profile for each user and product upload feature along with online chat functionality. It eliminates geographical boundaries completely. Our web-application provides an exciting e-commerce platform that allows users to purchase international goods and products directly from travelers.

Preterm Birth Prediction Using EHG Signals
Authors:- Anju S, Mohamed Bedeeuzzaman

Abstract:- The delivery of the baby is a physiological process. Uterine contraction is one of the most vital indications in the labor development. Electro hysterogram (EHG) is an efficient approach for tracking uterine contraction. We analyse the EHG signals to predict the preterm labor by applying Feature Extraction followed by classification. EHG signals obtained from open dataset (300), which contains 262 records for women who delivered at term and 38 who delivered prematurely. This paper discusses feature extraction methods such as RMS, Mean frequency, Variance, Standard deviation, Mean absolute deviation, Inter quartile range of uterine electromyography are used to detect term and preterm data and followed by LDA, KNN and SVM classifier. The selection of best classifier provides best accuracy. LDA provides 92.5% accuracy, KNN provides 88.6% accuracy and SVM provides 93.8% accuracy. SVM classifier has more accuracy compared to other two classifiers and maximum accuracy is provided from the combination of IQR and MAD.

Counter Attacks as Self-Defense
Authors:- Vanamala Sairam, Prof. Mahendra Kumar B

Abstract:- The poor state of security on the Internet calls for more effective ways to protect networked systems from attacks. One solution is to be able to counter attack with offensive capabilities. With attacker information available, companies find themselves in a dilemma – counter attack for immediate self-defense, retaliate for furred deterrence, inform the appropriate law enforcement authorities. or do nothing. We examine justi&otion for the hack back SPY-defense and deterrence arguments in the context of current technology and legal frame work. This paper extends discussion of issues surrounding using offensive capabilities for defensive purposes to the civilian/commercial Internet context beyond information warfare.

Sleep Disorders Classification Using Discrete wavelet Transform Technique
Authors:- Jayalakshmi K V, Asst. Prof Anjan Kumar B S, Prof. H N Suresh

Abstract:- Electroencephalogram (EEG) is a non-invasive test which is used to measure electrical activity in the brain. EEG is mostly found in cognitive science, neuroscience and physiological research. Numerous research and techniques were developed for analyzing the neural dynamics of EEG signal. This proposed paper discusses various techniques for understanding Neuro physiology in the brain during sleep. To classify the different sleep disorders with respect to neuro-electric data, the Psychological and clinical effects of sleep are concise, incorporated, and discussed. The author proposes an Innovative method in order to calculate and visualize the time-frequency representations for the EEG data being collected during sleep. In this paper we concentrated on classification of sleep disorders like insomnia, bruxism, narcolepsy and nocturnal frontal lobe epilepsy and estimation of the parameter like Power, RMS, Standard deviation, Variance, MSE of Sleep disorder.

A Review Article of Pso Based Power Loss Reduction in Ac-Dc Systems
Authors:- Suraj Kumar Kushwaha, Asst. Prof. Abhay Solanki

Abstract:- Particle Swarm Optimization (PSO) has become one of the most popular optimization methods in the domain of Swarm Intelligence. Many PSO algorithms have been proposed for distributed generations (DGs) deployed into grids for quality power delivery and reliability to consumers. These can only be achieved by placing the DG units at optimal locations. This made DG planning problem solution to be of two steps namely, finding the optimal placement bus in the distribution system as well as optimal sizing of the DG. This paper reviews some of the PSO and hybrids of PSO Algorithms formulated for DG placement being one of the meta-heuristic optimization methods that fits stochastic optimization problems. The review has shown that PSO Algorithms are very efficient in handling the DG placement and sizing problems.

A Comparative Analysis of More Stable Sssc To Connected Both Side Motor Load
Authors:- Divya Jaiswal, Asst. Prof. Abhay Solanki

Abstract:- The concept of reactive power compensation technologies. By means of reactive power compensation techniques, reactive power is controlled in such a way that the performance of electric power system gets improved. This is gives the brief idea about the principles of operation, design characteristics of various types of compensators etc. These compensation techniques are used to change the performance of AC transmission & distribution systems as per the need. The compensators enhance the stability of the AC system by increasing the maximum active power that can be transmitted. By managing the line reactive power, the working of overall electric power system can be enhanced. In the case study, after implementing series and shunt compensation techniques in the system, results are shown for comparison. This can be achieved by FACTS controllers. Static Synchronous Series Compensator (SSSC) is a series connected FACTS controller, which is capable of providing reactive power compensation to a power system. The output of an SSSC is series injected voltage, which leads or lags line current by 90°, thus emulating a controllable inductive or capacitive reactance. SSSC can be used to reduce the equivalent line impedance and enhance the active power transfer capability of the line. In this series compensation provided by an SSSC is considered.

A Review Article of Reduction Power Loss in 33 Bus System With Improvement Of Power Quality
Authors:- Haripratap Yadav, Asst. Prof. Abhay Solanki

Abstract:- The concept of reactive power compensation technologies. By means of reactive power compensation techniques, reactive power is controlled in such a way that the performance of electric power system gets improved. This is gives the brief idea about the principles of operation, design characteristics of various types of compensators etc. These compensation techniques are used to change the performance of AC transmission & distribution systems as per the need. The compensators enhance the stability of the AC system by increasing the maximum active power that can be transmitted. By managing the line reactive power, the working of overall electric power system can be enhanced. In the case study, after implementing series and shunt compensation techniques in the system, results are shown for comparison. This can be achieved by FACTS controllers. Static Synchronous Series Compensator (SSSC) is a series connected FACTS controller, which is capable of providing reactive power compensation to a power system. The output of an SSSC is series injected voltage, which leads or lags line current by 90°, thus emulating a controllable inductive or capacitive reactance. SSSC can be used to reduce the equivalent line impedance and enhance the active power transfer capability of the line. In this series compensation provided by an SSSC is considered.

Ethical Hacking and Penetration Testing Using A mini computer
Authors:- Meghana K R, Associate Professor Suma S

Abstract:- This paper is dedicated to the field of network and info-communication defense along the cyber security platform to take a closer look at what is now known as “ETHICAL HACKING”, in order to define, analyze, discuss and resolve some of the most common and widely spread threats and their functionalities according to which vulnerabilities are currently at hands in most threat incidents and try to come up with new techniques to more effective resolve such problems.

A Review Article of Solar and Wind Hybrid Power Generation System
Authors:- Akshay Chouhan, Asst. Prof. Deepak Bhataniya

Abstract:- Hybrid sun powered PV and wind age framework become appealing arrangement specifically for remain solitary applications. Joining the two wellsprings of sunlight based and wind can give better unwavering quality and their half and half framework turns out to be progressively prudent to keep running since the shortcoming of one framework can be supplemented by the quality of the other one. The coordination of half breed sun oriented and wind control frameworks into the matrix can further assistance in improving the general economy and dependability of inexhaustible power age to supply its heap. Correspondingly, the joining of cross breed sun oriented and wind control in an independent framework can lessen the size of vitality stockpiling expected to supply nonstop power. Sun oriented power age frameworks utilize either photovoltaic& 39;s or concentrated sun based power. The concentration in this paper will be on the photovoltaics type. Nitty gritty portrayals of the various advances, material science and nuts and bolts of PV can be found in numerous course books and papers, for example, Kurtz brought up that ten years back the concentrator cell was just ~30% effective contrasted and over 40% today with the possibility to approach half in the coming years. Si cells have efficiencies of 26% and multifunction III-V-compound cells have efficiencies above 45% (48% in the research center) as pointed out in reference. PV modules produce yields that are resolved fundamentally by the dimension of episode radiation. As the light force expands, photocurrent will be expanded and the open-circuit voltage will be decreased. The productivity of any photovoltaic cell diminishes with the expanding temperature which is non-consistently conveyed over the cell. The sun oriented yield power can be smoothed by the appropriation of sunlight based power in various geological regions. Power from sun powered PV and concentrated sun based power plants is essentially costly and requires critical drop in expense or change in arrangements by either financing or driving the utilization of these advancements to have the option to accomplish noteworthy market infiltration.

A Review Article Distribution Transformer Condition Monitoring System Using Ann
Authors:- Sakshee naiwal, Asst. Prof. Abhay solanki

Abstract:- Distribution transformer is an important asset in distribution network. Its operation and control are important aspects which determine the reliability and quality of power supply. A remote condition monitoring system for distribution transformer is discussed here. Different parameters are acquired and processed in remote terminal unit. This communicates the data to the operator end using internet. According to parameter values, health index of a transformer is found out at the operator end interface. Analysis is based on health index. This system is different from power transformer condition monitoring systems in condition monitoring techniques used and communication. A cheaper system is designed which precisely evaluates the health status of a transformer. The test results are taken from a specially designed transformer.

A Review Article of Speed Control of Dc Motor Using Chopper
Authors:- Manish Yadav, Asst. Prof. Lavkesh Patidar

Abstract:- This paper deal with various method of speed control of DC Motor and literature review on speed control of DC motor is presented. DC motors are widely used in industry applications, robotics and domestic appliances because of its low cost and less complex control structure and wide range of speed and torque. So wide range of position control is required. Proportional Integral Derivative (PID) controller is used in industries for wide number of applications .The tuning of PID controller parameters is very important for desired out response there is so many techniques for tuning of PID controller.

Seismic Vertical Irregularity And Its Correlation With Regularity Index
Authors:- M. Tech. Scholar Aakash Verma, Prof. Suhail Qureshi

Abstract:- As there is an economic boom there is an increasing demand for infrastructure in order to accommodate the requirement. As this will lead to high demand for tall structures with multiple housing units that is not only spacious but also visually appealing. This leads to the various kinds of irregularity that has been prescribed in IS 1893 and these various irregularities forces the building to deviate from their expected behavior. The aim of this paper is to review the previous works on the irregularity of structure and the various indexes that can be helpful to the standardization of the behavior the structure because of seismic activity.

A Review Article of Statcom Mid Point Voltage Regulation
Authors:- Rahul Kumar, Asst. Prof. Deepak Bhataniya

Abstract:- This paper reviews the development of static synchronous compensator (STATCOM), and analyzes the structure of its main circuit, its working principles and control strategies. At last, this paper comes to a conclusion of technical characteristics of STATCOM and outlook of its development trends. Fast acting STATCOM, a representative of FACTS family, is a promising technology which is extensively used as state-of-the-art dynamic shunt compensator for reactive power control in transmission and distribution system. STATCOM controller employs various solid-state converter topologies, magnetics configurations, control algorithms, and switching techniques and so on. The development of STATCOM controller has been well reported in literature with its versatile application in power system. Thus deep investigation of STATCOM from the perspective of its intelligent control and the configuration of STATCOM’s main circuit is valuable.

A Review Article of Vsc Based Hvdc Loss Less Transmission Line
Authors:- Mritunjay Kumar, Asst.Prof. Abhay Solanki

Abstract:- Beginning with a brief historical perspective on the development of High Voltage Direct Current (HVDC) transmission systems, this paper presents an overview of the status of HVDC systems in the world today. It then reviews the underlying technology of HVDC systems, and discusses the HVDC systems from a design, construction, operation and maintenance points of view. The paper then discusses the recent developments in HVDC technologies. The paper also presents an economic and financial comparison of HVDC system with those of an AC system; and provides a brief review of reference installations of HVDC systems. The paper concludes with a brief set of guidelines for choosing HVDC systems in today’s electricity system development.

Experimental Investigation of Mechanical Properties of Al-Sic-Mgo2 FGM
Authors:- Md.Hafees, M.Nithin, K.Satyanarayana, Asst. Prof. PNS.Srinivas

Abstract:- Functionally Graded Material (FGM) defines a unique variety of advanced material in the category of composite materials which has variation in properties as per volume ratio. it is used in wide variety of applications and it is expected to decrease the cost of the material processing and also the manufacturing processes. In our work we focussed to produce FGM by powder metallurgy processes followed by sintering process and also applying material specific processes. Research studies are mainly focussed on the processing and applications of functionally graded materials. New processing routes for metal-matrix functionally graded materials (FGMs) and structures through combinations of powder metallurgy are described. Pure Aluminium of 98% purity with 150 microns size with good fluidity and corrosion resistance is taken as matrix material and Silicon carbide, magnesium oxide are considered to be the reinforcing agents and Zinc sterate is opted as the bonding agent. The specimens are blended elementally using compaction machine followed by sintering through tubular furnace using Aluminium, silicon carbide, magnesium oxide and zinc stearate. The specimens are then tested for their mechanical properties and after then the suitable material is to be selected in the above combined mixtures.

To Check the Concrete Strength by Using Combination of Burnt Brick And Recycled Aggregate
Authors:- Megha M Mane, Dr. Sanjay Kulkarni

Abstract:- Concrete has captured almost entire construction industry and its ingredients such as cement, manufacture of cement and bricks consume large quantities of natural resources and fuel with C02 to the green house gases resulting in global warming. Therefore, under such critical scenario of shrinkage of natural aggregates resource and ever increasing pressure to reduce construction costs and further construction & dismantling of old structure producing heavy debris needing disposal has made it necessary to invert, discover & think of other alternatives for replacement of coarse aggregate. The present paper aims with to check the concrete strength by using combination of burnt brick and recycled aggregate. To use normal burnt brick as replacement to conventional normal aggregate in different proportions. Brick aggregates & Recycled aggregate can fully or partly replace the conventional coarse aggregate to produce M20 concrete. M20 grade concrete mix with different proportions are carried out using over-burnt, normal burnt brick aggregates. Physical proportions of cement, fine aggregate & normal aggregate, normal burnt brick aggregates, over-burnt brick aggregates, Recycled aggregate are carried out. Cube compressive strength test & split tensile test are carried out for 7 & 28 days. An attempt has been made using brick aggregate & Recycled aggregate concrete to replace normal aggregate concrete. Fine aggregates were replaced with pre-soaked light weight aggregates, vermiculite in this case by 5%, 10% and 15% as internal curing agents.

Drug Analysis Embedded Word
Authors:- Sharmila Thakur

Abstract:- Expertly endorsed prescription abuse is one of the speediest creating general healthcare issues in the usa.to tackle this pandemic, there is no improvement in separating the authority and cases of abuse of both illegal medication and expertly approved medicines, as compared to one falling on a survey prosperity record. our basic objective in this article is to demonstrate how hoods use web-based life, e.g., twitter for altered control of illegal prescription and expertly suggested abuse of medication. we use ai procedure is for a modified request. that can recognized tweet that are normal for drug abuse. that can recognize the ordinary tweet for drug abuse. we assembled tweets related with comprehended illegal and expertly endorse drugs. we physically remarked on 3000 tweets that are most likely going to be related to drug abuse. at a ton of collections, our preliminary requires a gander, and a choice tree classifier word2vector algorithm clustering algorithm and the logistic algorithm beat other for deciding if tweets contain signs of medication misuse. this altered represent considers twitter’s usefulness in analyzing abuse cases as a result diagram, and exhibits the feasibility of medicine abuse acknowledgement system structure that can strategize wide volume data from a neighboring coherent source of internet system administration.

Enhancing Data Security Using Encryption and Splitting Technique over Multi-Cloud Environment
Authors:- M. Tech. Scholar Brijendra Singh, Asst. Prof. Sushil Sharma

Abstract:- Now days cloud computing become one of the main topic of IT and main point is cloud data storage security. Cloud computing is the fastest growing technology. This technology provides access to many different applications. Cloud computing is used as data storage so data security and privacy issues such as confidentiality, availability and integrity are important factor associated with it. Cloud storage provides user to access remotely store their data so it becomes necessary to protect data from unauthorized access, hackers or any type of modification and malicious behavior. Security is an important concern. The meaning of data storage security is to secure data on storage media. Cloud storage does not require any hardware and software management. it provide high quality applications. As we proposed the concept of cloud data storage security strategy capable to overcome the shortcomings of traditional data protection algorithms and improving security using steganography, encryption decryption techniques, compression and splitting technique adoptable to better security for the cloud. We have developed a desktop application through which user can share data. This paper enhanced advance security goal for cloud data storage.

Cryptography in Database Security
Authors:- Santhosh M L, Seema A M, Supriya T R, Associate Prof. Dr. Suma S

Abstract:- This is the time where Internet is ruling the world. Anyone who uses internet do not encourage the hackers or anyone who are irrelevant to read our messages or get our data. The need for this secured transaction of data is not a new concept, it was needed even when messenger used to carry messages across the town. Our important and private things are on the internet. It may be our banking related data, private images, etc. which is a threat to our privacy. Therefore, security is as important as the internet in the world. The security can be ensured for all our activities and communication through cryptography. Cryptography which is used as a method of security is not a new concept. This method is very ancient.

Simulation of A Modified Perturb and Observe Algorithm for A Photovoltaic System Connected To The Grid
Authors:- Noumsi Damien Brice, Ifeanyi B. Ezugwu, Oladjo M. Comfort

Abstract:- The power output of the solar array is dependent upon the irradiance, temperature and internal properties of the materials used to make solar cells. These factors contribute to the position of the Maximum power point. Changes in atmospheric conditions affect directly the output of the solar panel. Therefore, there is a need to track the Maximum power point to ensure that the system delivers the maximum power and the losses are reduced at any given time despite the change in temperature and irradiation throughout a day. The maximum power point tracking(MPPT) of the PV output for all sunshine conditions is a key to keep the output power per unit cost low for successful PV applications. Several techniques have been proposed for maximum power point tracking. The most commonly used technique for MPPT is the perturb and observe technique. It is known that the P&O method exhibits erratic behavior under rapidly changing irradiance level that causes incorrect or slow maximum power tracking. The Modified P&O (MP&O) method was proposed to solve this problem by decoupling the PV power fluctuations caused by hill-climbing process from those caused by irradiance changing. MATLAB was used to simulate the Perturb and observe and the modified perturb and observe techniques. The main aim will be to track the maximum power point of the photovoltaic module so that the maximum possible power can be extracted from the photovoltaic. The algorithms utilized for MPPT are generalized algorithms and are easy to model or used as a code. The algorithms are written in m files of MATLAB and utilized in simulation where the values of the irradiance and temperature were chosen based on the average values in Benue State. The solar cell is modeled using SIM Power Systems blocks. The results obtained clearly show that the conventional perturb and observe algorithm used in the overall system fails to track the maximum power point as the duty cycle goes below the lowest limit (0.4) while the system using the modified perturb and observe algorithm tracks the maximum power point at all time; it can also be seen that the system using the modified perturb and observe method has a stable voltage, current and power output as compared with the system using the conventional perturb and observe method when the irradiance and temperature are suddenly varied.

A Review on Process Parameter Optimization in EDM
Authors:- Anugrah Srivastava, Jeetendra Mohan Khare, Pushpendra Kumar

Abstract:- electrical discharge machining performance is generally evaluated on the basis of material removal rate (mrr), tool wear rate (twr), relative wear ratio (rwr) and surface roughness (sr). the important edm machining parameters affecting to the performance measures of the process are discharge current, pulse on time, pulse off time, arc gap, and duty cycle [9]. a considerable amount of work has been reported by the researchers on the measurement of edm performance on the basis of mrr, twr, rwr, and sr for various materials. several approaches are proposed in the literature to solve the problems related with optimization of these parameters. it is felt that a review of the various approaches developed would help to compare their main features and their relative advantages or limitations to allow choose the most suitable approach for a particular application and also throw light on aspects that needs further attention. in view of above, this paper presents a review of development done in the optimization of edm related process parameters.

Blockchain for India
Authors:- Narasimha Dixit S, Medha R Hegde, Dr. Suma S

Abstract:- With the realization of block chain’s Importance and its implementations and Applications, the world is set to move towards a More Block chain cantered functionality.In this Research paper, we see why block chain is Important for the world and why India should Move towards creating a more block chain Friendly environment.

A Review on Approach for Shortest Path in Multiagent Distributed Scenario Using AOMDV and Tree Topology
Authors:- M. Tech. Scholar Sangita Kumari, Prof. Ratan Singh

Abstract:- The basic purpose of the work is to develop most likely shortest path for routing. Also to perform the classification task by means of a distributed data fusion based on tree topology in a multi-agent context. As tree topology better describes interaction among static sensors and cyclic structure better describes interaction among mobile units. The objective of the sensor network is to perform this classification task by means of a distributed data fusion based on tree topology.

Review of Digital Image Watermarking Techniques
Authors:- M. Tech. Scholar Rahul Bairagee, Asst. Prof. Megha Gupta

Abstract:- Digital watermarking techniques have been developed to protect the copyright of multimedia objects such as text, audio, video, etc. So, we have proposed a hybrid Image watermarking technique which takes the advantages of different transforms like DWT, DCT, SVD and Arnold Transform, which enhances more security and provides robustness to the watermark. In this paper method, image is divided into several groups of frames, and one of the frames is selected where watermark will be embedded. Before embedding watermark in a selected frame it will be pre-processed with Arnold Transform which will provide security to it. The selected plane of Image are decomposed using DWT and high frequency band HH, middle frequency bands LH, HL are transformed with DCT. The DCT coefficients are SVD transformed which are embedded with corresponding transformed coefficients of watermarks along with Arnold Transform. The embedded watermark is extracted with inverse process of embedding. The proposed algorithm is tested with various Image sequences using MATLAB 2017a. The distortion quality of original image and watermark is controlled by the Peak Signal to Noise Ratio, Signal to Noise Ratio and Mean square error of the watermarked frame with original frame.

Gesture Based Object Recognition Technique using Wireless Camera
Authors:- Sanketh Hegde K.R, Santhosh Sortur, Divya M.D.

Abstract:- In this proposal we present an operational vision framework for constant discovery and tracking of human movement. The framework catches monocular video of a scene and recognizes those moving items which are naturally human. In which the moving body discovery is the most significant piece of the article movement examination, the object is to identify the moving human body from the foundation picture in video arrangements, the human body following and conduct understanding, its powerful location assumes a significant job. Article movement examination concerns the discovery, following and acknowledgment of human practices from picture successions including individuals. This paper exhibits another calculation for recognizing moving items from a foundation scene to distinguish moving article dependent on foundation subtraction. We set up a dependable foundation to recognize the item. From that point onward, morphological separating is connected for the evacuation of clamour and to fathom the foundation interference trouble. Shape highlight and Gabor highlight of the item is removed. This technique demonstrates that the proposed framework runs quickly, precisely.

Feature Selection Using Iterative Dichotomiser 3 Technique FOR Digital Image Water Marking
Authors:- M. Tech. Scholar Rahul Bairagee, Asst. Prof. Megha Gupta

Abstract:- The quick development of the Internet in the previous years has quickly expanded the accessibility of advanced information, for example, sound, pictures and recordings to general society. As we have seen in the previous couple of months, the issue of ensuring sight and sound data turns out to be increasingly essential and a great deal of copyright proprietors are worried about securing any unlawful duplication of their information or work. Some genuine work should be done so as to keep up the accessibility of mixed media data. Highlight extraction and order based computerized water checking is new territory of research in flow security assurance and copyright strategy. Around there of research different creators utilized element extraction method, for example, wavelet change work and for arrangement reason utilized help vector machine. During the time spent element based water checking strategy include extraction is most critical part and the characterization relies upon chosen highlight. In this paper proposed novel computerized water checking strategy dependent on whole number wavelet change with quality based order procedure. For the choice of highlight quality utilized RBF work. The determination of quality relies upon separated element by whole number wavelet change. The proposed technique recreates in MATLAB programming and tried some rumored assault, for example, commotion assault, share assault and interpretation assault. Our observational assessment result indicates better execution in pressure of DWT water stamping system.

Training an Agent to Play a Game using Reinforcement Learning
Authors:- Harsh Chhablani, Mohit Karangiya

Abstract:- In this project, we have made a racing game and also train an ML agent to play it, at the end of which it has learnt how to avoid collision with obstacles along the path and reach a goal destination. The resultant AI can then be used to implement intelligent transport systems, driverless cars and assign variable speed limits to the driver for efficient fuel usage. The ML agent was trained by using virtual sensors and raycasting methods using the Unity Engine which recently has acquired integration with Machine Learning.

Poisson distribution Based Weighted Probabilities Model for Outlier Detection
Authors:- Rashmi Rohitas, Prof. Ruchi Dronawat

Abstract:- Outliers may be due to random variation or may indicate something scientifically interesting in this. In this proposed approach use evolutionary based similarity to computing likelihood values for each local data behavior in the feature space and applies Poisson distribution approach for probabilistic classification on probabilistic-based learning framework. This approach gives a bird eye over data files that concentrate over dynamic nature of log files. Proposed methodology applies Poisson distribution approach for probabilistic classification on high dimension and unstructured file. As audit log is an unstructured file having. Large number of attribute with high dimension distribution probability is better for high dimension and unstructured data class.

Gender Discrimination And Academic Achievement of Female Students In Some Selected Senior Secondary Schools In Karu Local Government Area, Nasarawa State, Nigeria
Authors:- Idaa A.J., Ph D. Ugbede Abdul

Abstract:- The purpose of the study was to find out the impact of gender discrimination on the academic achievement of female student; the study was carried out using five Junior secondary schools in Karu LGA, Nasarawa State as case study ex-post facto research design was used for the study. Finding revealed that by overall performance, male students performed much better as compared to their female counterparts. Results shows, teacher’s negative attitudes and behaviors and, time wasting among girls, inadequate facilities, teacher’s dissatisfaction and lack of motivation in girls, irregular attendance to school by girls, low persistence and inferiority complex exhibited by female students were the factors responsible gender differences. According to the findings, the study recommends that; Training in gender sensitive techniques through workshops for teachers to change their attitudes and behaviours, parental involvement in encouraging girl children, as well as government effort to help schools acquire basic learning facilities, were among the recommendations arising from the study.

A Review on Machine Learning Approach on Data Imbalance for wireless Sensor Network
Authors:- Reshma Lakra, Prof. Ruchi Dronawat

Abstract:- Machine learning is used to teach machines how to handle the data more efficiently. Sometimes after viewing the data, we cannot interpret the pattern or extract information from the data. In that case, we apply machine learning with the abundance of data sets available. The purpose of machine learning is to learn from the data. Many studies have been done on how to make machines learn by themselves. Data imbalance problem become greatest issue in for machine learning algorithm. Imbalance problem occur where one of the two classes having more sample than other classes. The most of algorithm are more focusing on classification of major sample while ignoring or mis classifying minority sample. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The minority samples are those that rarely occur but very important. There are different methods available for classification of imbalance data set which is divided into three main categories, the algorithmic approach, data-preprocessing approach and feature selection approach. We will apply on wireless imbalance data to identify correct information. In this paper systematic study for define which gives the right direction for research in class imbalance problem.

Water Pollution Monitoring using Internet of Things: a Survey
Authors:- Vijaya Kumar P

Abstract:- In urban and rural areas, there is lot of pollution happing in water by ingredient of unwanted chemical like fluoride, chlorine, lead, mercury, arsenic, DDT, pesticides etc. and unwanted dust adding into it, this will impact on the health of the humans and animals too. Fresh and clean water is very limited in the world which is useful for agriculture, industry and for general uses. Discharge of poisonous chemicals, over-pushing of aquifers, long series spreading of pollutants and contamination of water bodies, like lake, ponds, sea with substances that motivate algal growth are few today’s main causes of water quality degeneration. All these causes are monitoring and controlling using some chemical sensors and ubiquitous sensor networks, these sensors will transform the chemical information with range of concentration of specific components to total component analysis and sensor network will connects all other networks with smart sensors, those sensors will take information from physical environment and compute that collected information using some built-in predefined functions for the detection of exact input for processing data.To all these problems we are surveying the existing works which monitor the turbidity of water using Turbidity sensor. In our system the sensor is dipped in to the water where there is more pollution. The sensor is detached to the microcontroller, it’s acts like the main function of system. The controller is connected to relay, which controls the gate of water valve. Once the purify data collect it is send to the cloud. In our project we use blynk server for IoT, whenever data is collected, it starts to plot the data on graph.

Heat Transfer Performance Analysis for Double Pipe Heat Exchanger Using Double Helical Tape Insert
Authors:- M.Tech. Scholar Narendra Kumar Suryawanshi, Prof. Bittu Pathak

Abstract:- Now a days for enhancing the convective heat transfer in various industries such as thermal power plants, chemical processing plants, air conditioning equipment, refrigerators, petrochemical, biomedical and food processing plants heat exchangers are employed with twisted-tape inserts have widely been applied. By employing, twisted tape insert bring together swirl into the fluid flow which subsequently interrupts a thermal boundary layer on the tube surface. In the present study, the measurement of the flow pressure drop in the annulus-side was conducted at the same time as the heat transfer measurements to demonstrate the influence of employing the continuous HTI in the annulus of the DPHE at different operating conditions.

Smart sorting method of grains using a colour sensor
Authors:- Ifeoluwa E. Elemure, James O. Akinyoola, Aderinsola M. Olawumi, Abiodun E.Amoran, Edwin A. Oshin, Temitope V. Adebanwo

Abstract:-This article presents a model construction of a computer system that recognises and sorts cowpea grains from unwanted particles. A high-speed, low-cost and image-based sorting device was used in detecting and separating cowpea grains from other particles having slight colour differences or defects. The device is a linear combination of the colour image sensor with a Field-Programmable Information Integration Technology of Gate Array (FPGA). The elaborated digital system applies filters to the images through the colour sensor TCS3200, which performs the detection of the grains. A neural network system was used for the automatic recognition of the Cowpea grains for an industrial information application. This was achieved through the implementation of software EasyEDA with Arduino programming process, which allows moving from a qualitative to a quantitative paradigm with the use of different mathematical tools and artificial intelligence. This enhances the speedy process of recognition and sorting of cowpea grains. A success rate of (90.67 ± 3.13)% was achieved in colour recognition, which is much higher than previously developed image inspection systems and highly promising for use in an automatic sorting system in the manufacturing industry.

A Review on Heat Transfer Augmentation Techniques for Double Pipe Heat Exchanger
Authors:- M.Tech. Scholar Narendra Kumar Suryawanshi, Prof. Bittu Pathak

Abstract:-This article presents a model construction of a computer system that recognises and sorts cowpea grains from unwanted particles. A high-speed, low-cost and image-based sorting device was used in detecting and separating cowpea grains from other particles having slight colour differences or defects. The device is a linear combination of the colour image sensor with a Field-Programmable Information Integration Technology of Gate Array (FPGA). The elaborated digital system applies filters to the images thNow a days for enhancing the convective heat transfer in various industries such as thermal power plants, chemical processing plants, air conditioning equipment, refrigerators, petrochemical, biomedical and food processing plants heat exchangers are employed with twisted-tape inserts have widely been applied. By employing, twisted tape insert bring together swirl into the fluid flow which subsequently interrupts a thermal boundary layer on the tube surface. warm execution of warmth exchangers can be improved by warmth move augmentation techniques. Tape addition is one of the aloof warmth move augmentation technique and utilized in most extreme warmth move application, for instance, cooling and refrigeration systems food processes. Therefore various enhancement techniques have been reviewed.

Biometric Identification with Human Ear
Authors:- Sanket Patil, Parth Garge

Abstract:-In this computer-driven era, identify theft and the loss or disclosure of data and related intellectual property are growing problems. We each have multiple accounts and use multiple password or an ever-increasing number of computers and web sites. The concept of authentication verifying is central to all “security” that the user is who he claims to be. Biometric promises to verify the person on the basis of his physiological or behavioral characteristics. By using biometrics it is possible to conform or establish an individual’s identity on “who he/she” rather than by “what he/she possesses” (e.g. An id) or “what he/she remembers”(e.g. A password) biometrics has many ways of identification under it – eye, finger printing ,voice iris, face, etc. several reasons account for this trend: first ear recognition does not affect from some problems associated with other non contact biometrics . Such as face recognition. shape and features are unique for each person and invariant with age and structure of the ear is fairly stable and robust to change in facial expressions . It is most promising candidate for combination with the face in the context of multipose face. In this paper we propose to discuss different method of ear detection and recognition using 2d and 3d technique.

A Review of Distributed Cooperative Localization Of Sensor Network
Authors:- M.Tech. Scholar Aamir Khan, Prof. Manoj Singh Tomar

Abstract:-The technique of finding physical co-ordinates of a node is known as localization. importance of localization arises from the need to tag the sensed data and associate events with their location of occurrence. location information of a sensor node can be obtained by using gps. but, installing gps in every node is not a feasible solution. this is because: (i) sensor nodes are deployed in a very large number. installing gps at every node will increase the cost as well as size, (ii) gps consume power, which will eect the network lifetime. moreover, location cannot be pre-programmed as it is un-known where nodes will be deployed during their operational phase.

Mini Home Automation Embedded System Device Using ESP8266
Authors:- Jagrut Jadhav

Abstract:- Home Automation has a wide scope for this Generation. In this wide scope, home automation technology is playing a major role in the world of automation. This article is fully based on low cost and reliable embedded system which can be connected to any appliances and can operate that appliance remotely using Android based Smart phone application. Using this technology the central hub complexity for connection of the server to multiple devices and concealing the wires can be eliminated .And also it would be very helpful by providing a simple plug and play device which can be connected easily to any appliance to fulfill user needs in home. The proposed systems consist of android mobile, ESP 8266 , voltage regulators and a relay circuit. We use Wi-Fi technology to monitor the device because of its accuracy, range and instant connectivity. This device connects the home appliances with a very ease of installation and it is user friendly..

A Review of Flash Crowd Handling In P2p Live Video Streaming Systems
Authors:- M.Tech. Scholar Mahazbeen Khan , Prof. Rahul Pandey

Abstract:- Home Automation has a wide scope for this Generation. In this wide scope, home automation technology is playing a major role in the world of automation. This article is fully based on low cost and reliable embedded system which can be connected to any appliances and can operate that appliance remotely using Android based Smart phone application. Using this technology the central hub complexity for connection of the server to multiple devices and concealing the wires can be eliminated .And also it would be very helpful by providing a simple plug and play device which can be connected easily to any appliance to fulfill user needs in home. The proposed systems consist of android mobile, ESP 8266 , voltage regulators and a relay circuit. We use Wi-Fi technology to monitor the device because of its accuracy, range and instant connectivity. This device connects the home appliances with a very ease of installation and it is user friendly.

An Automated CNC Machine
Authors:- Supriya Firangi, Megha B S

Abstract:- With the advancement of technology, demand for computer numerical control(CNC) plotter machines in educational institutions and laboratories rapidly rising. The networking of objects which have the connectivity that enables them to communicate independently with one another via the internet. This project aims to develop the model of CNC plotter machine which is able to draw a circuit layout on PCB or any other solid surface using the electronic component. Initially the user needs to convert any image file or text file into G-code using inkscape software and then feed it to machine using processing software. Arduino Uno with an atmega328p microcontroller is used as the control device for this project. The microcontroller convert G-code into a set of machine language instruction to be sent to the motor driver of the CNC plotter. The main objective of project is to design and implement a CNC plotter machine which will be able to draw a PCB layout on a solid surface. A plotter is a 3D controlled 2D plotting machines which uses a pen to draw text or image on any given solid surface with complex line drawings. The machine will have three motors to implement the X,Y and Z axis. A servo motor will be used along the Z axis for positioning the pen which will go up and down. CNC technology has major contribution in industries. CNC machine are main platform in the contribution of good quality products in industries. The main aim of this project is to reduce time consumed for plotting and it r educes human involvement which eventually reduces rate of error and also increases the production.

A Review on Energy Efficient Algorithm For Reliable Routing of Wsn
Authors:-M. Tech. Scholar Munna Kumar, Prof. Rahul Pandey

Abstract:- Wireless sensor networks (WSN) are key components of systems of systems (SoS) since they can be integrated in complex assemblies in order to respond to current societal issues such as the aging of the population, the optimization of natural resources and the reduction of carbon footprint. Typically, kinematic sensors can be used to remotely supervise elderly patient, humidity sensors can be deployed to control field irrigation for a more sustainable agriculture, and connected vehicles will help to optimize the management of urban traffic while limiting pollution.

A Review on Deep Image Compression Using Machine Learning Technique
Authors:- M.Tech. Scholar Yusra Fatema, Prof. Manish Sahu

Abstract:- In computer science, image processing is any kind of signal processing for which the input is an image sets such as photographs or frames of video; the output of image processing can be an image. It can also be a set of characteristics or a set of image related parameters. Image-processing techniques mostly involve treating the image as a two-dimensional signal and it constitutes applying various signal-processing techniques to the image. In this work processing includes different forms of information processing where the input is an MRI image. Image processing techniques are mostly derived from the signal processing techniques application in the domain of images.

Brain Tumor Detection using MRI and CT Image
Authors:- M.Tech. Scholar Gajendar Kumar, Associate Prof. Chandrashekhar Kamargaonkar

Abstract:- It is very important to detect brain tumor at right time in brain tumor diagnosis. We are using image fusion for CT and MRI images. Image fusion is use to get more information for brain tumor diagnosis. Resultant fused image of CT and MRI images will improve accuracy of tumor detection. MRI and CT scan images are very useful in tumor disease diagnosis. Brain image is easily degraded by noises. For noise minimizing and enhancing the image quality we use discrete wavelet transform method. It provides enhances image quality. Here we are using image fusion method and morphological image processing for increasing image intensity. Image segmentation used to detect tumor portion accurately and indicate about growing area of tumor.

A Review on Multi-User Beam forming for Sum-Rate Maximization in Frequency Selection Mimo-Mc-Cdma System
Authors:- M.Tech. Scholar Priyanka Kumari, Asst. Prof. Akhilesh Patel

Abstract:- Today’s wireless communication requires high data rate and good quality, which is possible only if the received signal is not affected by channel impairments. The diversity combining schemes are applied to combine the multipath received signals of a diversity reception device into a single improved signal. These schemes are applied at the receiver to mitigate the effect of channel fading on the received signal to obtain the signal with maximum signal to noise ratio (SNR).

Effect of Mechanical Properties on Palm Sprout Shell Ash Reinforced With Al-6061 Alloy Metal Matrix Composites
Authors:- PG Student Ram Babu Matta, Prof. Ravindra Babu P, Associate Prof. J A Ranga Babu

Abstract:- Technological advancement is progressing in geometric progression to meet the industrial/commercial requirements of design engineers hybrid properties are inevitable. These hybrid properties are substantially ameliorated than that of individual constituents. The properties of any new generation material are highly influenced by their homogeneity in composition. Stir-casting is one of the promising techniques to produce the components at homogeneous mixing of constituents. In the present work, in order to improve the mechanical properties like impact strength, hardness, density and wear resistance of aluminium (6061) – reinforced with palm sprout shell ash at different weight proportions. Current work is ambition to examine that influence of reinforcement of palm sprout shell ash on mechanical properties of aluminum alloy and composites prepared by stir casting technique. The samples are manufactured by varying the weight percentage of reinforcement by 1, 2 and 3 wt%. The micro structural characteristics of composites are studied by using optical microscope. Mechanical properties such as impact strength, hardness are studied and compared the results with base Aluminium alloy results.

A Review on Reliable and Energy-Efficient Routing Protocol in Dense Wireless Sensor Networks
Authors:- M.Tech. Scholar Yaseera Fatema, Prof. Deepti Agrawal

Abstract:- Based on the geographical information, REER’s design harnesses the advantage of high node density and relies on the collective efforts of multiple cooperative nodes to deliver data, without depending on any individual ones. We first select reference nodes (RNs) between source and sink. Then, multiple cooperative nodes (CNs) are selected for each RN. The reliability is attained by cooperative routing: each hop keeps multiple CNs among which any one may receive the broadcast data packet from the upstream hop to forward the data successfully. The distance between two adjacent RNs provides a control knob to trade off robustness, total energy cost and end-to-end data latency.

The Forecast with Nanotechnology in Electrical Power Systems Engineering A Study
Authors:- Dr. Sardar Ali, Reshma Sultana Husna

Abstract:- Nanotechnology is the learning of particularly minute constitutions, having size of 0.1 to 100 nm. Nano medication is a comparatively new ground of science and technology. Brief enlightenment of various types of pharmaceutical nano systems is given. Categorization of nano materials based on their aspects is given. An application of Nanotechnology in various grounds such as physical condition and medication, electronics, energy, environment and Electrical Power Systems etc. In this paper Electrical power systems is presented in detail. Nanotechnology is one of the best ever developing grounds in research and technology. The main concentration of nanotechnology is not electrical power Systems engineering but there were a group of potential functions to develop electrical, mechanical, thermal or chemical properties of electric power equipments. Repeatedly the financial features are grave out, but also a higher efficiency or a reduction of losses forecasts this novel technology and a winning manifestation in power systems engineering. In this paper the state of the art in nanotechnology, the option and claims in electric power systems engineering were examined. On the one offer novel materials for conductors and on the other dispense innovative insolents and varnish for insulators were taken into description. The intends for giant voltage insulation systems were to make bigger the lifetime, to optimize the life succession charges, to reduce the maintenance expenses, and to decrease the size or weight and to increase the efficiency. As an instance of a sensible function of nanotechnology the effects of a test progression with nano-coated ceramic insulators were at hand. The nano-coating was applied on the pottery surface and the extended term constancy was tested under a thermal and moist cycling process in a atmospheric chamber in natural conditions. As objective decisive factor for the extended term constancy the contact angle was observed by visual measurements in defined time periods. The assessments of the first test results look very victorious; the contact angles of the coated insulators were steadily towering for more than 30 degrees over the whole test period.

Survey on Energy Efficient Clustering and Routing Protocols of Wireless Sensor Network
Authors:- M.Tech. Scholar Rani Mahara, Prof. Pooja Meena, Prof. Chetan Agrawal

Abstract:- The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in a wide range of applications and it has become a hot research area. However, the resource constrained nature of sensors raises the problem of energy. This paper focus on the detailed survey on major clustering techniques. This article strongly examines about the advantages and limitations of different routing protocol with its recent research issues. Here research work carried out by different researcher in this field of WSN is also detailed. This paper summarizes all set of routing algorithms with comparison of on the basis advantage and disadvantages of each algorithm.

Free Convention Heat Transfer Performance Refinement by Using Rectangular Fin Array and Array with Inverted Triangular Notch
Authors:- PG Student R.S.Dange, N.G.Narve, N.K.Sane

Abstract:- Heat sink is considered as thermal device that is convective & semiconducting in nature. Its pure appearance has been designed to get rid of heat from associate electronic element like desktop, sensible phones, Audio video players and fridges. It removes heat from electrical element logic gate, dissipate heat to encompassing medium. However ceaselessly heating of intermediate portion becomes ineffective attributable to heat flow in single chimney flow pattern briefly fin array. Therefore in depth study, middle portion is removed by cutting inverted triangular notch and side wherever more contemporary air are available in contact with fin expanse. Impact on fin obtained by dynamic the parameters of fin like Height and Spacing. Distinction has been created between full, notched rectangular fin arrays. Once the comparison of various parameters of result like average heat transfer coefficients and average Nusselt variety etc. it’s found that notched fin array do higher than full fin array.

Scaled Data Mining Algorithms for Frequent Item sets Mining over Large Scale Data
Authors:- M. Sathish Kumar, Assistant Prof. R. Saravanan

Abstract:-Information Analytics assumes a significant job in the basic leadership process. Bits of knowledge from such example examination offer immense advantages, including expanded income, cost cutting, and improved upper hand. Be that as it may, the shrouded examples of the incessant item sets become additional tedious to be mined when the measure of information increments over the time. Additionally, noteworthy memory utilization is required in mining the shrouded examples of the incessant item sets because of a substantial calculation by the calculation. Hence, an effective calculation is required to mine the shrouded examples of the incessant item sets inside a shorter run time and with less memory utilization while the volume of data increases over the time period. This paper reviews and presents a comparison of different algorithms for Frequent Pattern Mining (FPM) so that a more efficient FPM algorithm can be developed.

A Review on Lte Downlink Schedulers Algorithms In Open Access Simulation Tool Sns 3 And Lte Sim
Authors:- M. Tech. Scholar Ajaharulla Khan, Prof. Akhilesh Patel

Abstract:-There has been a huge increase in demand towards improving the Quality of Service (QoS) of wireless services. Long Term Evolution (LTE) is a development of the Third-Generation Partnership Project (3GPP) with the aim to meet the needs of International Telecommunication Union (ITU). Some of its aspects are highlighted as follows: increase in data rate, scalable bandwidth, reduced latency and increase in coverage and capacity that result in better quality of service in communication.

A Review on Distributed Sequential Estimation Applying Localization In Wireless Sensor Network
Authors:- M.Tech. Scholar Pravin Kumar Sah, Manoj Singh Tomar

Abstract:-Remote sensor systems (WSN) are accepting a great deal of consideration from both the hypothetical and application sides, in perspective on the numerous applications spreading over from natural observing, as a device to control physical parameters, for example, temperature, vibration, weight, or toxin focus, to the checking of common frameworks, for example, streets, spans, structures, and so on [1]. Some new regions of utilizations are rising quickly and have incredible possibilities. A field that is gaining more and more interest is the use of WSN’s as a support for smart grids. In such a case, a WSN is useful to: i) monitor and predict energy production from renewable sources of energy such as wind or solar energy, ii) monitor energy consumption; iii) detect anomalies in the network.

Experimental Investigation of Free Convection Heat Transfer from Horizontal Rectangular Fin Array with Compensatory Area & Rectangular Notch
Authors:- PG Student P.R.Tulsankar, N.G.Narve, N.K.Sane

Abstract:-Heat transfer due to free convection of air from compensatory, full rectangular fin array have been investigated experimentally. For study purpose short fin array has been selected which show single chimney flow pattern. Middle portion of fin array becomes ineffective due to low temperature difference between entering air & fin surface. So in present study, middle portion is removed by cutting rectangular notch and added where more fresh air come in contact with fin surface area. Results have been obtained over range of spacing from 12mm to 25mm and heat input from 25W to 100W. Length & height of rectangular fin array was kept constant. Comparison has been made between full, Compensatory rectangular fin arrays. It is found that full rectangular fin array performed better as expected.

Use of Particle Swarm optimization for Improvement in Wireless Communication Systems
Authors:- Priyanka Narware, Keshav Mishra

Abstract:- The any aspects of the wireless communication are address by the researchers. The many problems of wireless communication system required the use of optimization techniques. Different optimization techniques are used over the time. The particle swarm optimization technique is a proven successful technique for optimization. This technique is successfully used in different area of wireless communication system. In this paper, survey for use of this technique in wireless communication system is discussed. With the evolution of new generation of wireless communication system, the use of optimization technique becomes significant.

An Overview of Position Based Routing Protocols
Authors:- M. Tech. Scholar Rajesh Kharte, Assistant Professor Dheeraj Shringi

Abstract:- The any aspects of the wireless communication are address by the researchers. Mobile Ad-Hoc Network is remote system comprise of gathering of versatile hubs that changes its topology very soon and correspondence between portable hubs depends on the remote connections .since the MANET works in powerful condition with no fixed framework and topology, so steering the information bundle between versatile hubs is testing and significant assignment. This paper centers a short outline of the directing conventions that utilizations position data to decide the area of goal hub just as its neighbor hub. By the utilization of area administrations and sending techniques, it gives dependable just as productive steering for specific applications.

Thermodynamic Analysis of Organic Ranking Cycle using EES Solver
Authors:- M. Tech.Scholar Anshul Dhamecha, Prof. Pooja Tiwari

Abstract:- The development of the world today has largely been achieved through the increasingly efficient and extensive use of various forms of energy. Over the past decades, the growth in energy consumption around the world has shown that fossil fuel energy source alone will not be capable of meeting future energy demands. The purpose of this study is to parametrically analyze and compare the first law efficiency, second law efficiency and turbine size factor of the ORCs using R143a, R600a, R134a and RC318 as working fluids. A computer program in Engineering Equation Solver (EES) has been developed to simulate the thermodynamic performance of the tested working fluids under various heat source temperatures.

Natural Convection Heat Transfer from Rectangular Fin Array with Compensated Rectangular Semi Circular Notch
Authors:- PG Student A.A.Pawar, Principal N.G.Narve, Emeritus Prof. N.K.Sane

Abstract:- Heat transfer due to natural convection of air from compensatory, full rectangular fin array have been investigated experimentally. For study purpose short fin array has been selected which show single chimney flow pattern. Middle portion of fin array becomes ineffective due to low temperature difference between entering air & fin surface. So in present study, middle portion is removed by cutting rectangular notch and added where more fresh air come in contact with fin surface area. Results have been obtained over range of spacing from 12mm to 25mm and heat input from 25W to 100W. Length & height of rectangular fin array was kept constant. Comparison has been made between full, Compensatory rectangular fin array. It is found that compensated array gives better result as expected.

Cfd Analysis of Combustion Process Of 4-Stroke Diesel Engine With Blended Fuels
Authors:- Shubham Singh, Dr. Aseem C Tiwari

Abstract:- In current study investigation was done on the proper mixing of chemical species and the combustion of dual fuel (Diesel + Methanol + Ethanol) with various blend grades. Present study used one conventional and other is Alternate fuels due to challenges in power sector. A cylindrical combustor burning (Diesel + Methanol + Ethanol) in air is studied using the eddy-dissipation model in ANSYS (Fluent). Our main objective of the study is to analyze the dual fuel combustion model. Result shows that methanol participation in combustion process causes an increase in peak pressure value. The net Turbulent Kinetic energy is at its peak at the nozzle, away from the nozzle the turbulence increases. The pollutant emissions (Carbonic oxides) are decreasing in higher percentage of alternate blends as compare to the lower one that shows the complete combustion rate is increased. In current work Ethanol and Methanol can be used as an Alternate fuel which is cheaper in cost and easily available as compare to the conventional fuels.

Forecasting of Heart Disease using Hybrid Algorithm
Authors:- M. Tech. Scholar Neha Soni, Asst. Prof. Namrata Bhatt

Abstract:- In medicinal sciences forecast of Heart sickness is most troublesome undertaking. In India, fundamental driver of Death are because of Heart Diseases. The passings because of coronary illness in numerous nations happen because of work over-burden, mental pressure and numerous different issues. It is found as fundamental reason in grown-ups is because of coronary illness. Along these lines, for distinguishing coronary illness of a patient, there emerges a need to build up a choice emotionally supportive network. Information mining order systems, to be specific Modified K-means and SVM are broke down on Heart Disease is proposed in this Paper.

Experimental Investigation of Horizontal Rectangular Fin Array with Rectangular Triangular Notch and With Augmentation of Heat Transfer Area
Authors:- PG Student B.S. Mane, Principal N.G.Narve, Emeritus Prof. N.K.Sane

Abstract:- Heat transfer due to free convection of air from notched, compensatory, full rectangular fin array have been investigated experimentally. For study purpose brief fin array has been selected which show single chimney flow pattern. Middle element of fin array will become ineffective due to low temperature distinction between getting into air & fin surface. So in existing study, middle portion is removed by way of cutting rectangular notch and introduced where extra sparkling air come in contact with fin surface area. Results have been acquired over vary of spacing from 12mm to 25mm and heat enter from 25W to 100W. Length & top of rectangular fin array used to be saved constant. Comparison has been made between full, Compensatory & notched rectangular fin array. It is determined that notched array carried out better as expected.

LCHA-SMOTE Machine Learning Approach on Data Imbalance for wireless Sensor Network
Authors:- Reshma Lakra, Ruchi Dronawat

Abstract:- Machine learning is used to teach machines how to handle the data more efficiently. Sometimes after viewing the data, we cannot interpret the pattern or extract information from the data. In that case, we apply machine learning with the abundance of datasets available. The purpose of machine learning is to learn from the data. Many studies have been done on how to make machines learn by themselves. Data imbalance problem become greatest issue in for machine learning algorithm. Imbalance problem occur where one of the two classes having more sample than other classes. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The minority samples are those that rarely occur but very important. There are different methods available for classification of imbalance data set which is divided into three main categories, the algorithmic approach, data-pre-processing approach and feature selection approach. We will apply on wireless imbalance data to identify correct information. In this research work systematic study for define which gives the right direction for research in class imbalance problem. After apply our Low Cost High Accurate Synthetic Minority Over-sampling Technique for imbalance to balance data and a random forest algorithm a classification approach for balanced data we achieved a good accuracy rate percentage.

Study of Air Convection Heat Transfer from Horizontal Rectangular Fin Array with Circular Notch
Authors:- PG Student H.S.Yadav, Principal N.G.Narve, Emeritus Prof. N.K.Sane

Abstract:- Natural convection Heat transfer because of air from notched, compensatory, full rectangular fin array have been investigated experimentally. For study purpose short fin array has been selected which show single chimney flow pattern. Middle portion of fin array becomes ineffective due to low temperature difference between entering air & fin surface. So in nearby study, mid portion is removed by cutting circular notch and added where more fresh air come in contact with fin surface area. Results have been obtained over range of spacing from 12mm to 25mm and heat input from 25W to 100W. Length & height of rectangular fin array was kept constant. Comparison has been made between full, Compensatory & notched rectangular fin array. It is found that notched array performed better as expected.

Use of Moth Flame Optimization for improvement in wireless communication systems
Authors:- Swati Parmar, Keshav Mishra

Abstract:- Wireless communication networks are progressively more complex. Cell site architectures and infrastructure have evolved over five generations of technology. The quantity of traffic they support is overwhelming. Base station and microwave antenna technologies have evolved to contest the amplified usage demand. The many problems of wireless communication system required the use of optimization techniques. Different optimization techniques are used over the time. The moth flame optimization technique is a proven successful technique for optimization. This technique is successfully used in different area of wireless communication system.

Smart Phone Accidents Prevention System
Authors:- Varun Walimbe

Abstract:-In the past few years , Smart Phones have become very popular all over the world. Almost each and every person from any corner of the world have smart phone with them. They have become essential part of lives. However with beauty of technology these smart phones have also become a reason for lots of road accidents (sometimes eventual death) In this paper I am presenting a system which will prevent the dangerous and life threatening accidents due to smart phones . This system will help in reducing the number of accidents every year due to smart phones.

Enhancement in Cognitive Radio Network Relay Based Selection Path Using Fuzzy Logic
Authors:- M.Tech. Scholar Akhilesh Kumar, Prof. Tejraj

Abstract:-Cognitive Radio has been invented to provide wireless communications with efficient radio spectrum utilization. The secondary users (SUs) can therefore, access opportunistically licensed band by sensing spectrum holes without interfering with primary users (PU) or keeping the interference, if it happens below a tolerable threshold. Main functions of cognitive radio are: Spectrum sensing, spectrum management, spectrum mobility and spectrum sharing. This research focuses on sensing and spectrum access optimization in cooperative multi-hop cognitive radio networks. In a cooperative spectrum sensing, nodes located in their vicinities can experience spatially correlated fading and it leads to a degraded detection performance. In the research proposes a novel scheme for cooperative spectrum sensing on distributed cognitive radio networks. A fuzzy logic rule – based inference system is proposed to estimate the presence possibility of the licensed user’s signal based on the observed energy at each cognitive radio terminal. The estimated results are aggregated to make the final sensing decision at the fusion center. Simulation results show that significant improvement of the spectrum sensing accuracy is achieved by our schemes.

A Review on Thermal Investigation of Open-Cycle Gas-Turbine Power-Plant with Regenerator
Authors:- M.Tech. Scholar Rahul Singh, Asst. prof. Bittu Pathak

Abstract:- This intensive parametric study was conducted based on the fundamental of thermodynamics and gas turbine relations considering the effect of the operation conditions (ambient air temperature, regeneration effectiveness and compression ratio). It was found that adding regeneration to the simple gas turbine cycle results in an increase in the thermal efficiency of cycle. It was also found that including regeneration in gas turbine cycle results in an increase in the output power of the cycle, and it results in a decrease in the exhaust gas temperature. The effect of the regeneration effectiveness was also predicted. It was found that increasing of regeneration effectiveness results in an increase in the output power of the cycle. It was also found that the cycle thermal efficiency increases with increasing of the regenerative effectiveness. The effect of ambient air temperature was also predicted. Increasing of the ambient air temperature results in a decrease in the thermal efficiency of the cycle.

A Review of Balancing Assembly Line Using Pso Algorithm
Authors:- Deepak Solanki, Mr.Kamlesh Gurjar

Abstract:-Assembly lines are special flow-line production systems which are of great importance in the industrial production of high quantity standardized commodities. Recently, assembly lines even gained importance in low volume production of customized products (mass-customization). Due to high capital requirements when installing or redesigning a line, its configuration planning is of great relevance for practitioners. Accordingly, this attracted attention of plenty researchers, who tried to sup-port real-world configuration planning by suited optimization models (assembly line balancing problems). In spite of the enormous academic effort in assembly line balancing, there remains a consider-able gap between requirements of real configuration problems and the status of research. To ease communication between researchers and practitioners, we provide a classification scheme of assembly line balancing. This is a valuable step in identifying remaining research challenges which might contribute to closing the gap.

Thermal Investigation of Open-Cycle Gas-Turbine Power-Plant With Regenerator
Authors:- M.Tech. Scholar Rahul Singh, Asst. Prof. Bittu Pathak

Abstract:- This study aims to investigate the effect of regeneration on the output power and the thermal efficiency of the gas turbine power plant. The effect of ambient air temperature, regeneration effectiveness, and compression ratio on the cycle thermal efficiency was also investigated. To study the effect of compression ratio, turbine inlet temperature, air to fuel ratio, and ambient temperature on the performance of gas turbine cycle power plant. To analyze the effects of operation conditions on the power output and efficiency by the energy-balance utilizing Energy Equation Solver (EES) software. To simulate the cycle using EES.

Published by:

IJSRET Volume 5 Issue 2, Mar-Apr-2019

Uncategorized

Sensor Based Automatic Fertigation System
Authors:- S. MuthuKumar, M.Naveenraja, V. NaveenKumar, Dr. S.RajaRanganathan

Abstract: – In sensor based automatic system, the irrigation and the fertilizer supplying system can be automated. Our project comprises of two modules irrigation system and the fertilizer supplier system. In irrigation system, the moisture of the soil can be found using the moisture sensor which can be fixed at the different parts of the farm land. For the crops planted, the required water content can be varied with types. Based on the sensor values obtained from the land, the controller will regulate the required amount of water quantity to the crops. This will terminate the motor when the required level reached. In the fertilizer supply system, the fertilizer content present in the soil can be found using the PH sensor fixed at the farm lands. This will find the nutrient content found in the soil. This will supply the fertilizer to the soil based on the sensor values which can be fixed at the farm lands. This will reduce the over watering and over fertilizer supplying to the crops. As the required quantity of water and fertilizer will be supplied to the crops, this will increase the productivity of the crops and improve the texture of the soil.

Predicting Diabetes in Medical Datasets Using Machine Learning Techniques
Authors:- M.Tech. Scholar Arvind Aada, Prof. Sakshi Tiwari

Abstract: – Healthcare industry contains expansive and delicate information and should be taken care of all around cautiously. Diabetes Mellitus is one of the developing amazingly lethal maladies everywhere throughout the world. Medicinal experts need a dependable forecast framework to analyze Diabetes. Distinctive AI methods are helpful for analyzing the information from differing points of view and synopsizing it into profitable data. The openness and accessibility of enormous measures of information will almost certainly give us helpful learning if certain information mining systems are connected on it. The principle objective is to decide new examples and after that to decipher these examples to convey huge and valuable data for the clients. Diabetes adds to coronary illness, kidney malady, nerve harm and visual deficiency. So mining the diabetes information in productive way is a urgent concern. The information mining strategies and strategies will be found to locate the suitable methodologies and systems for proficient grouping of Diabetes dataset and in removing important examples. In this investigation a restorative bioinformatics examinations has been cultivated to anticipate the diabetes. The R programming was utilized as digging device for diagnosing diabetes. The Pima Indian diabetes database was obtained from UCI storehouse utilized for investigation. The dataset was considered and broke down to fabricate compelling model that foresee and analyze the diabetes ailment. In this examination we plan to apply the bootstrapping resembling method to upgrade the exactness and after that applying Naïve Bayes, Decision Trees and k Nearest Neighbors’ (kNN) and think about their execution.

Analysis and Research of System Security Based on Android
Authors:- M. Tech. Scholar Ronak Jain, Prof. Sakshi Tiwari

Abstract: – Android is a savvy versatile terminal working stage center on Linux. Be that as it may, because of its open-source programming and programmable structure character, it drives the Android framework helpless against get infection assaults. This paper has profoundly inquired about from the Linux framework security system, Android-explicit security instruments and other assurance components. Also, on this premise, Android gadgets have accomplished firmly watched on ordinary state. With the goal that aggressors cannot utilize the portion module or center library to get most elevated access consent and be assaulted. In the mean time, to additionally reinforce the security of Android gadgets, it empowers them to appropriately deal with the high-hazard danger. This paper likewise fortified interruption identification framework (HIDS) in light of the host so as to identify noxious programming and reinforce the Android framework level access control.

Analysis of the Impact of Clear Air Atmospheric Conditions on Propagation Loss at Microwave Frequencies
Authors:- Ezeh, Ikechukwu H., Onwuzuruike, V. Kelechi

Abstract: – In the paper, the analysis of the impact of clear –air atmospheric conditions on propagation loss at microwave frequencies is presented. Particularly, the study focused on the impact of variation in point refractivity gradient on multipath fade depth based on the International Telecommunication Union (ITU) recommendation P.530-17 quick planning applications method. The point refractivity gradient depends on the vertical profile of the primary radio climatic parameters, namely, atmo spheric temperature, pressure and relative humidity. Accordingly, the Nigerian Meteorological Agency (NIMET) Radiosonde dataset of the atmospheric temperature, pressure and relative humidity for 2014 in Cross River state were used in the study. The twelve months (2014) Radio sonde dataset of the atmospheric temperature, pressure and relative humidity at the ground level and at height of 65 m above ground were used to compute the refractivity (N) and point refractivity gradient (dN1) for each of the 12 months along with the annual average values of N and dN1. The results show that the ITU annual average value of dN1= –400 is over 200 % of the annual average value of -131.86 obtained from the locally measured data. For each of the 12 months multipath fade depth is computed using the point refractivity gradient obtained in the study along with parameters of a 10 km case study microwave link. The results show that at the frequency of 8 GHz and percentage of time Pw (%) of 0.01 % that a given fade depth is exceeded in the average worst month, the maximum fade depth of 18.95865 dB occurred in October whereas the lowest fade depth of 14.10459 dB occurred in April. Also, the multipath fade depth is inversely proportional to the point refractivity gradient. Furthermore, the result for the multipath fade depth at Pw = 0.01 % and frequencies of 8 GHz , 16 GHz and 28 GHz for the 12 months shows that multipath increase with frequency and the ITU dN1 value continues to maintain the highest multipath fade depth in each of the frequencies considered. Also, the result for the multipath fade depth at the frequency of 16 GHz and Pw of 0.001 %, 0.01 % and 0.1 % for the 12 months shows that multipath decrease with Pw and the ITU dN1 value continues to maintain the highest multipath fade depth in each of the Pw values considered. The ideas presented in this paper is relevant to microwave communication link designers as it enables them to determine the appropriate fade margin that can be specified to accommodate the multipath fade depth that can occur in a given link.

Zigbee Based Routing Security on Home Automation
Authors:- M.Tech.Scholar Amol Ramdas Kasar, Prof. Sakshi Tiwari

Abstract: – Mechanization is a huge field and now daily can be actualized anyplace relying on the application. ZigBee convention IEEE 802.15.4 remote standard can be utilized to set up system for some particular application reason. ZigBee based home robotization remote sensor system can be executed with little starting expense and can be valuable to control fans, lights and other home apparatuses which activity can be controlled with the assistance of a microcontroller. The home computerization can be helpful system for physically incapacitated people just as seniority individual and a similar system can be utilized to control mechanical applications too.

A study on real-time low-quality content detection on Twitter from the users’ perspective
Authors:- M.Tech. Scholar Garvesh Joshi, Prof. Sakshi Tiwari

Abstract: -Location systems of malignant substance, for example, spam and phishing on Online Social Networks (OSN) are regular with little consideration paid to different kinds of low-quality substance which really impacts clients’ substance perusing background most. The point of our work is to identify low-quality substance from the clients’ viewpoint continuously. To characterize low-quality substance conceivably, Expectation Maximization (EM) calculation is first used to coarsely order low-quality tweets into four classifications. In light of this starter think about, an overview is cautiously intended to assemble clients’ feelings on various classifications of low-quality substance. Both immediate and backhanded highlights including recently proposed highlights are recognized to portray a wide range of low-quality substance. We at that point further consolidate word level examination with the distinguished highlights and fabricate a watchword boycott lexicon to improve the recognition execution. We physically mark a broad Twitter dataset of 100,000 tweets and perform low quality content discovery continuously dependent on the described noteworthy highlights and word level investigation. The consequences of our exploration demonstrate that our technique has a high precision of 0.9711 and a decent F1 of 0.8379 dependent on an irregular woodland classifier with continuous execution in the discovery of low-quality substance in tweets. Our work in this manner accomplishes a positive effect in improving client involvement in perusing internet based life content.

Design and Implementation of Internet of Things Based Smart Mirror Using Raspberry Pi
Authors:- Prof.Dhanashree R. Patil, Apurva S. Ghayalkar, Sayali N.Patil, Shweta P. Patil, Pavan P. Patil

Abstract:- In this paper, we describe the design and development of a futuristic mirror that offers simplified and customizable services to the home environment. .It is a small contribution towards smart home. The mirror interface provides users with the versatility needed for better management and integration of daily tasks. On a par with the recent advances in the Internet of Things standards and applications, the mirror is designed to enable residents to control the household smart appliances and access personalized services. The proposed system is set apart from others for its provision of various customized information services for user profile generation.

Fast Image Dehazing Method Based On Homomorphism Filtering and Contrast Enhancement
Authors:- Neeta Joy, Asst. Prof. Jyothi Johnson

Abstract:- Images captured via camera in the bad weather conditions like hazy or foggy ones would result in degradation of images. This is mainly due to the scattering of atmospheric light. This could lead to the deterioration of the image due to the scattering of atmospheric particles and due to the presence of haze. In this paper, a fast algorithm for single image dehazing is proposed using the homomorphism filtering and then using the contrast enhancement technique. Firstly, to accurately measure the atmospheric light an additional channel method is proposed based on quad-tree subdivision. Here the average grays and gradients are used as assessment criteria. Secondly, after finding the atmospheric light portion in the input image filtering is being applied. For this, homomorphism filtering technique is used. This is a generalized technique for both signal and image processing, involving a nonlinear mapping to a different mapping to a different domain in which linear filter techniques are applied, followed by mapping back to the original domain . At last the haze-free image is obtained as the result of atmospheric scattering model. Numbers of both subjective and objective evaluations are being done with the aid of experiments which shows that this algorithm can clearly and naturally recover the image, with at most clarity at the edges where there is sudden changes in the depth of field. Here the algorithmic time complexity is the linear function of the image size. This has advantages in the running time my maintaining balance between the running times and processing.

Commutation Torque Ripple Reduction in BLDC motor Using M-SEPIC Converter
Authors:- K. ThangaPushpam, S. Radhika, I. TamilSelvi, M. VinothKumar, S. Nagaraj

Abstract:- The paper presents new power converter topology to suppress the torque ripple reduction due to the phase current commutation of brushless DC motor. The modified sepic converter is used in a converter circuit it has high static gain for a given duty cycle and step –up-output. Cuk converter has produce the inverted output. The M-SEPIC is a modification of the basic SEPIC. It is superior to the opposite converters each in terms of the input current, purity and potency. It shows very little overshoot or ringing. And also the switching loss is reduced and has low THD value than Cuk converter so it has high static gain and increased efficiency. The theoretical analysis and framework, using MATLAB/ Simulink environment, are given to illustrate the proposed method and the performance is compared with conventional system. And the experimental results are provided for verification of the BLDC drive system.

Design and Implementation of Quad copter
Authors:- Gaurav Gadge, Ankita Ledey, Sourabh Pawer, Gulshan Balpande

Abstract:- The paper presents new power converter topology to suppress the torque ripple reduThis paper presents the design and implementation of an aerial surveillance quad copter for search and rescue application. The aim of this research is to develop a real-time, compact and cost effective drone that will be capable of search and rescue operation and the class is intended to provide the student with both theoretical and practical knowledge in the areas of electronic engineering and design, system integration hardware programming, and control system design and implementation. The frame of the quad copter was made up of very light glass fiber to ensure stability while flying and also to reduce weight of the overall material. The entire design generated a compact and low cost surveillance quad copter with weight of approximately 1.50 kg; which can take photographs from environments with the aid of the onboard mounted camera. Live streaming was done with the help of laptop during fight.

Crop Prediction System
Authors:- Ruchira Nerkar, Bhakti parkhe, Sanjana Bhandure Prof. Bhushan Chaudhary

Abstract:- In recent years, different emerging technologies and applications were introduced for information technology, and now the information technology has become huge part of our day to day life. Especially for agriculture, the yield prediction is very popular among farmers these days. This may contribute to the proper selection of crops for their agricultural development activities based on a farmers experience on a particular field and crop. In earlier stage yield prediction system used data mining techniques in order to predict the crop, analyzed, fertilize and what on. And now-a-days agricultural forecast is becoming more complex and more difficult due to global warming and abnormal weather. To carry on this tasks farmer needs a building of an effective agricultural yield forecasting system on real time. So, crop prediction system is the most fundamental system, which gives soil temperature, soil moisture, humidity, air temperature, of the soil. This helps farmer to analyze which crop should be cultivated, with respect to atmosphere. In this project we use Arduino Uno board to control the entire task which is introduced in programming. And firstly the system is mounted on a particular place in the farm after that the supply is connected to switch board (extension board) and then by switching on the supply it will start and by identifying the parameter’s by the sensors it will displayed on the 16 x 2 LCD screen on system or else by using the router the user can also access the system from anywhere to check the parameters. This system is smart in a technology and will help the future digital world to be more advanced by this system the farmer would get a clear vision about which crop should be cultivated and suitable for the weather.

Analysis of Classification Algorithms using Machine Learning
Authors:- M. Tech. Scholar Soniya Rathore, Asst. Prof. Ankur Taneja, Asst. Prof. Lakhan Singh Sisodiya

Abstract:- In this work our main focus is on regression which is one of the most important methods in machine learning algorithm. Regression is a statistical approach that is used to find the relationship between variables. It is basically used to predict the outcome from the given dataset. In this work we will discuss the regression algorithms which are available in machine learning algorithm and propose one algorithm that will have less train error and test error as compared to other existing algorithm. The accuracy measure will be in the form of train and test error.

Oxcy Business Suite Application Using CRM,ERP and Supply Chaining For Small and Middle Scale Company
Authors:- Asst. Prof. S. Malarvizhi, M. Shivaranjani, M. Vidhya

Abstract:-Business suite application is depends upon two main things called Enterprise resource planning and Customer relationship management. By using this two methods we can improve both customer and enterprise growth. This application is specifically developed for small and middle scale Companies. Here we also used sorting algorithm, supply chaining method.

A Survey on Robust Intrusion Detection System Methodology and Features
Authors:- M. Tech. Scholar Jyotsna Purohit, Asst. Prof. Jayshree Boaddh, Asst.Prof. Akrati Shrivastava

Abstract:- To improve network security different steps has been taken as size and importance of the network has increases day by day. In order to find intrusion in the network IDS (Intrusion detection system) systems were developed which were broadly classified into two category first was anomaly based and other was misuse based. In this paper survey was done on the various techniques of intrusion detection system where some of supervised and unsupervised intrusion detection techniques are discussed. Here methodology of various researchers are explained with their steps of working. Different types of attacks done by the intruders were also discussed.

A Hybrid Digital Water Marking Technique Based on Feature Selection Using Integer Wavelet Transform Function and Decision Tree
Authors:- M. Tech. Scholar Namrata Joshi, Associate Professor Kapil Shah

Abstract:- The quick development of the Internet in the previous years has quickly expanded the accessibility of advanced information, for example, sound, pictures and recordings to general society. As we have seen in the previous couple of months, the issue of ensuring sight and sound data turns out to be increasingly essential and a great deal of copyright proprietors are worried about securing any unlawful duplication of their information or work. Some genuine work should be done so as to keep up the accessibility of mixed media data. Highlight extraction and order based computerized water checking is new territory of research in flow security assurance and copyright strategy. Around there of research different creators utilized element extraction method, for example, wavelet change work and for arrangement reason utilized help vector machine. During the time spent element based water checking strategy include extraction is most critical part and the characterization relies upon chosen highlight. In this paper proposed novel computerized water checking strategy dependent on whole number wavelet change with quality based order procedure. For the choice of highlight quality utilized RBF work. The determination of quality relies upon separated element by whole number wavelet change. The proposed technique recreates in MATLAB programming and tried some rumored assault, for example, commotion assault, share assault and interpretation assault. Our observational assessment result indicates better execution in pressure of DWT water stamping system.

Solar and Wind Hybrid Agricultural Automation Using Iot
Authors:- Asst. Prof.V. M. Dhumal, Payal Sathawane, Mayuri Mahadule, Priyanka Dharmik, Lokesh Moundekar

Abstract:- Agriculture was the augmentation in the rise of sedentary human civilization. Farmers are unaware of technology and lots of efforts are being made by farmers to enhance the productivity. So to overcome this problem we propose a system based on Internet of things to make smart agriculture by modernizing the current traditional methods of agriculture. The main aspect of this project is that system could automatically work according to obtained measurement values and send regular updates and alerts about the farm conditions to owner’s mobile phone and also alternatively controlled via designed website for better understanding of field. In addition to this , demand for electricity is increasing day by day ,which cannot be fulfilled by non- renewable energy sources. So hybrid renewable sources are use to fulfill this energy demand. These sources combines wind turbines and solar system to generate electricity.

Location of Power Burglary in Customers Consumption Utilizing Exception Discovery Calculation
Authors:- Dr. RamaPraba, S.Sangeetha, V. Aishwarya, M. Keerthana

Abstract:- Progressed Metering Infrastructure (AMI) is a centre piece of Smart-lattice, which is in charge of gathering, estimating and breaking down vitality utilization information of clients. The improvement of this system has been conceivable gratitude to the development of new data and correspondence innovations. In any case, with the entry of these advancements, new issues have emerged in the AMI. One of these difficulties is the vitality robbery, which has been a noteworthy worry in conventional power frameworks around the world. To confront these difficulties, datasets of power utilizations are broke down to distinguish interlopers. Conventional systems to identify interlopers incorporate the utilization of AI and information mining approaches. here, we break down the possibility of applying anomalies discovery calculations for upgrading the security of AMI through of the identification of power burglary. We investigate the exhibitions of different existing exception discovery calculations on a genuine dataset (purchaser vitality use). The outcomes demonstrate the achievability of utilization exceptions calculations in the security of AMI and furthermore the adequacy of the utilization of these techniques in the power utilization datasets for robbery identification.

Enhanced Architecture Design for Tri Layer Communication Using Communal Micro blog Information
Authors:- M. Tech. Scholar Anu Joy

Abstract:- Initially and as usual the user can sign up in the social network. While signing up in the social network, the user need provide all the personal and educational information for the user profile. After creating the social network account, the users may search for new friends and they may chat with the friends, the advanced micro blogging information considers only the public data and public chats. A micro data array will be created for the user. The micro array consists of the entire user’s most important information only. Automatically the micro array details will send and search through the E-Commerce application. Here the artificial neural network will works as a third party agent and the agent will retrieves all the recommended products, as micro blogging information. A panel will be design in the social network for displaying the recommended product details. All the displayed products will be more relevant to the user’s profile. The generated micro blogging information contains an alphanumerical characters like (A34#ULKNELRL*!). The micro blogging information has been generated using Artificial Neural Network (ANN) and Advanced text categorization. This micro blogging information will reduce the time of data retrieval from social network to ecommerce application. The same architecture has been enhanced for new channels, here three news channels taken for the consideration. And this is the third tier among the two tiers. As mentioned above the same micro blogging information generated for news channels also. Here the only the relevant news for the user will be displayed, so that they can quickly go through the news updates. In added with search options also provided for other news information like, user can search the news area wise, city wise and state wise. All the information will be shown in a single window.

Pond Maintaining Bot
Authors:- Nagarjun J, Ragavi N, Shunmitha K, P.Vidhyalakshmi

Abstract:- Water is a basic need for all living being. Hence, it is important to maintain the cleanliness and hygiene of water. The work has been carried out by considering the current situation of our national rivers which are dump with crore litres of sewage and loaded with pollutants, toxic materials, debris etc. The Government of India has taken charge to clean rivers and invest huge capital in many river cleaning projects. There is a need to incorporate technology such that cleaning work is done efficiently and effectively. Mechanisms used for design is such a way that it collects the waste which floats on water bodies and the collected waste can be easily disposed. This design cleans wastes found such as plastic wastes, garlands, bottles and other wastes found floating on water. In this project, a bot is used which will float on the water bodies. RF Transmitter and Receiver are used to move the bot and to collect the waste. The collected waste is stored in the storage unit. Design calculations are made to float the bot in water. The bot is made up of Poly Vinyl Chloride in order to have light weight and consists of Direct Current motor, Fish pump and Arduino.

Semantic Analysis for Predicting Movie Reviews
Authors:- Abitha K S

Abstract:- Film audits are evaluations of the tasteful, stimulition, social and social benefits and noteworthiness of a current film or video. Audits have a tendency to be short to medium length articles, frequently composed by a solitary staff essayist for a specific distribution. For film industry, online survey of basic gatherings of people assumes an essential job. On one hand, the great remarks of a motion picture can pull in more groups of onlookers by and large. Then again, the great remarks don’t fundamental mean high box income and bad habit section. Despite the fact that audits are normally genuinely ”speedy takes” on a motion picture, they can, in a few cases, be extensive, substantive, and exceptionally canny. Here we built up a model to perform nostalgic examination onthe motion picture surveys and foresee whether it is a positive or negative audit.

Vehicle Ignition Locking System Using Fingerprint with Gsm Module
Authors:- Asst . Prof. Venkatesh Munagala, Jagadeesh Gade, Vinay Reddy Mekka, Anudeep Kurganti, Sravan Kumar Kunchala

Abstract:- Biometric systems have overtime served as robust security mechanisms in various domains. Fingerprints are the oldest and most widely used form of biometric identification. A critical step in exploring its advantages is to adopt it for use as a form of security in already existing systems, such as vehicles. This research work focuses on the use of fingerprints for vehicle ignition, as opposed to the conventional method of using keys. The prototype system could be divided into the following modules: fingerprint analysis software module that accepts fingerprints images; hardware interface module and the ignition system module. The fingerprint recognition software enables fingerprints of valid users of the vehicle to be enrolled in a database. Before any user can ignite the vehicle, his/her fingerprint image is matched against the fingerprints in the database while users with no match in the database are prevented from igniting the vehicle. Control for the ignition system of the vehicle is achieved by sending appropriate signals to the parallel port of the computer and subsequently to the interface control circuit. The developed prototype serves as an impetus to drive future research, geared towards developing a more robust and embedded real-time fingerprint based ignition systems in vehicles.

An Implementation of Fpga Based Smart Meter For Home Energy Management
Authors:- K. Banumathi M.Tech. Asst. Prof., A. Thameem Ansari, R. Thinesh Kumar, L. Vignesh

Abstract:-Home Energy Management (HEM) for Smart Grid focuses on the power management on consumer side, where home appliances can be monitored and controlled to balance and optimize the power supply and consumption. Among various applications of Smart Grid technologies, Home Energy Management is probably the most important one to be addressed. HEM basically consists of smart meters, smart appliances and advanced control systems. The fundamental task of the HEM system is improving energy efficiency, data measurement, and transmission. The real-time consumption data gathered from each appliance of home are measured and transferred to a data concentrator and back to the utility and view of power consumption data and electricity pricing can be enabled in smart meter. Smart meter initiatives seek to enable energy providers and consumers to intelligently manage their energy needs through real time monitoring, analysis, andcontrol. In this paper the new architecture of FPGA implementation of Home Energy Management for Smart Grid is developed. It estimates the energy consumption of appliances by measuring the voltage, current drawn by the appliances. The other function such as price predictor, communication to the consumer can also be performed in this architecture.

Assessment of Thermal Performance of Closed Loop Pulsating Heat Pipe: Review
Authors:- Nilesh D. Gedam, Harshu A. Bhimgade, Surendra S. Nagpure

Abstract:- In this paper, the effect of different orientation and an internal diameter of pipe on the thermal performance of Closed Loop Pulsating Heat Pipes (CLPHPs) has been studied experimentally. Simultaneously other major parameters that affect the system dynamics include the volumetric filling ratio of the working fluid, input heat flux and the total number of turns has been observed. An experimental set-up of CLPHPs made of copper tubes of different internal diameters heated by constant temperature water bath and cooled by constant temperature water-ethylene glycol mixture (50% each by volume) is used to study the thermal performance with the fixed number of turns in the evaporator. The working fluids employed are water, ethanol, and R-123. The results indicate a strong influence of gravity and the number of turns on the performance. The thermo-physical properties of working fluids affect the performance which also strongly depends on the boundary conditions of pulsating heat pipe operation.

Home automation using Google assistant
Authors:- Dhiraj Rathore, Akash Vasule, Pankaj jharbade, Vivek Bhise, Nilesh Mishra

Abstract:- Home automation is a important aspect we will have in future so here we are designing a simple home automation
System in low cost so that we can help in changing the old technology of manual switches. This technology costs so badly in today’s world around 2000rs to 5000rs so we have made some small adjustments and used it with google assistant which gets a significant reduction in cost of the home automation. we can interact with Google assistant and it can search on internet, schedule events, set alarms, control appliances, etc. This service is available on smart phones with Google Assistant and it is free to use. our project hardly costs 1000rs for 4 manual switches I hope everyone will like it.

Study on Brain Abnormalities Using IoT
Authors:- M .Tech. Scholar Arpitha M S, Manogna D Raj, Asst. Prof. Deepika

Abstract:- It is important to understand the mechanisms of learning disabilities in order to evaluate electroencephalography (EEG) parameters. Diagnosis of abnormalities is one of the major continuously ongoing researches in medical science field. Brain Computer Interface for controlling elements commonly used at home. It includes EEG device needed to acquire signals associated to the brain activity. To understand the complex behavior of brain EEG is very effective tool. IoT revolution has made health care more advanced by narrowing gap between medical condition and the response from specialist. This paper mainly presents an idea related to brain by reforming the existing access control system detecting medical conditions and getting timely response from doctors in case of emergency.

A Review Paper on Automatic Power Factor Detcetion and Correction
Authors:- Shailendra Singh, Sahil Chauhan, Mukesh Chaurasiya, Sarvesh Kumar, Rupesh Kumar

Abstract:- The conception of conserving electrical energy is not new to us,it is widely recognized that electrical energy is being wasted in many forms , such as copper loss, iron loss but these are hard to compensate. Because of the fact that most loads are inductive in nature reactive energy is wasted. So, the required energy is can be utilized in which the energy can have the major correction to form a power factor In simple words power factor can be defined as how far the energy provided has been utilized. And in technical terms it is defined as the ratio of active power to the apparent power .In this paper we do a study of a proto type for automatic power factor correction using some capacitor bank which helps in increasing the power factor which is done by reducing reactive power. In this project load power factor can be increased by Arduino microcontroller. Current and voltage transformer are also used for sampling of the circuit current and voltage for measuring the power factor.

Impact of Co-curricular activities on leadership Qualities of UG students
Authors:- Rubeena

Abstract:- This study to investigated the impact of co-curricular activities on leadership qualities. college graduates recognized as a community leader we’re selected from Government degree college of Nizamabad district. The study was delimited to sports, Elocution, debates, essays and athletic. The sample of 450 students was selected. Data were collected by questionnaire of leadership qualities which was developed by researcher. The data was analyzed by using statistical techniques mean, standard deviation, Pearson coefficient of correlation, and t-test. On the basis of data analysis was found that co-curricular activities how significant impact on leadership qualities of undergraduate students.

Digital Donation Box
Authors:- Prof. D.G.Wadnare, Sarika Pathare, Pratibha Pandit Pratiptsangam Sinha, Neha Waghmar

Abstract:- The now a day’s people go to temples and donates lots of money to temple. The devotees don’t know the exact money, the temple have. Even the government don’t have the data of amount the temple have. This leads to generate in black money. In the current donation box the man power is used to count the money and the money is not counted accurately. And the money is also at risk of being stolen. People also donate fake money which is accidently counted by the workers of temple this will lead to improper counting of money. The current donation box has no security provided. The temple people don’t know that how much amount is there in the donation box, so they have to open the donation box frequently for counting the money. So to solve all these problem we have come with a solution of digital donation box. In our project the money is immediately shown on the website of the temple and on LCD screen of the donation box. This will lead to reduction in black money. In our project no use of man power is required because money is automatically counted by our project.in our project fake coin detection is also there, this will help to reduce in fake coin cases.

Object Detection & Tracking Based Holistic Approach Using SIFT
Authors:- K.V. Kavin

Abstract:- Crowd behavior detection is very promising area of research these days in field of computer vision and artificial intelligence. A novel framework based algorithm has been proposed in this research paper which focuses three key elements of moving crowd [i] Dynamics based appearance of the crowd [ii] Temporal Spatial deviation based anomaly [iii] Intrinsic interaction based deviation flow change . This framework deals with micro as well as macro level anomaly detection using SIFT techniques in structured & Semi-Structured crowd. This proposed framework out performs several existing state of art techniques being used for anomaly detection.

Question Generation using NLP
Authors:- Kaksha Mhatre, Akshada Thube, Hemraj Mahadeshwar, Prof. Avinash Shrivas

Abstract:- In this paper, we have proposed a method to question generation using coreNLP and tree regular expressions for parse tree manipulation. In addition to this we have used spaCy for named entity recognition to recognize entities for question word identification.

Fake Review Management
Authors:- Asst. Prof. B. Ravi Kumar, K. Prabhu, S. Swarup Teja

Abstract:- Today’s, everyone is buy a products in online shopping carts without see a product in physically they buy a product based on the reviews of a buyers, but in online shopping carts any one can provide a review about products, it will be the chance for the spammers to provide a spam reviews about the product in online shopping carts the spam reviews are not identified by the buyer’s so they think the review is genuine and they buy a product, admin only known that review is not a genuine review, in an existing system admin can find the spam reviews but they can’t able to remove the review from the review list, proposed system we can provide a option to remove the spam reviews from the list of review, who will buy the product then they provide review that review is an genuine, one who not buy a product but they provide a review the review will automatically stored in spam review database then admin can remove the review from the list.

Fire and Gas Accident Avoider System
Authors:- Kanchan Marskole, Reena Bodkhe, Shraddha Yadav, Twinkle Thakre, Prof. Meena Sune

Abstract:- The main aim of this project is to monitor for liquid petroleum gas(LPG) leakage to avoid fire accidents, providing house/industry safety feature where the security has been an important issue. The “fire and gas accident avoider system” detects the LPG leakage using a gas sensor, and this system detects the flames by a flame sensor that alert the consumer about that event with GSM module.If due to gas leakage, any fire accident occurred, then the flame sensor will send an alert to the microcontroller and that information also send to the user through GSM module. Any number of consumer mobile number are included while programming the microcontroller in Embedded C language, to which SMS must be send about the gas leakage and fire accident details.The software program for the proposed system is written in the Embedded C language.The fire and gas accident avoider system using GSM system is used to detect any fire, smoke or gas leakage in any premises, building or industry This project is used as a security system in applications like homes, hospitals, hostels, industries. Because of its low power consumption, reliability, portability this system used in other applications like smoke detection. It is very useful in house for detecting LPG gas, which can cause huge loss of property & life.

Effect of Polymer and Micro silica in Preplaced Ballast Concrete
Authors:- Suriya.V, Yogaraj.S, Syed Murtaza Ahmed, Lavan. M

Abstract:- This paper presents the study of Preplaced Ballast (Aggregate) Concrete method in railway track for providing ballast less track. Preplaced Ballast Concrete method employing the injection of cement mortar into voids between preplaced ballast aggregates has recently emerged as a promising approach for the makeover of existing ballasted railway tracks to concrete tracks. This method typically involves the use of a polymer liquid to enhance the durability of the resulting recycled aggregate concrete. However, the effects of the amount of polymer on the mechanical properties of recycled ballast aggregate concrete were not clearly understood. In addition, the effects of the cleanness condition of ballast aggregates were never examined. This study targeted at investigating these two aspects through Ballast samples taken from the track and conducting compression, tensile strength of concrete. The amount of polymer (3%, 6%, 9%) added to the concrete and the test were conducted. The use of a higher polymer ratio improved the microstructure of the interfacial transition zones between recycled ballast aggregates and injected mortar. In order to enhance the compressive strength of concrete, Micro silica (5%, 10%, 15%) were used and the test results revealed the increase in mechanical properties of concrete in Polymer and Micro silica mix. In addition, a higher cleanness level of ballast aggregates generally enriched the mechanical and durability qualities of concrete.

Treatment of Dairy Waste Water Using Stabilization Vessels
Authors:- Jigar Parmar, Joanna John, Prasad Mishra, Sacchit Shah, Asst. Prof. Seema Myakal

Abstract:- Dairy industry is one of the major industries causing water pollution. Considering the increased milk demand, the milk food industries in India is expected to grow rapidly and have waste generation and related environmental problems. Poorly treated wastewater with high levels of pollutants caused by poor design, operation or treatment system creates major environmental problems when discharged to surface water or land. Various pre-treatments methods are available to neutralize the effect. Waste sample from dairy has been experimented on daily basis to calculate “pH, Suspended Solids, Chemical Oxygen Demand, and Biochemical Oxygen Demand”. Various types of locally available chemicals are used to study and analyze the treatment of dairy waste water.

Segmenting and Replication of Data in Cloud for Protection and Maximum Throughput
Authors:- Reshma R, Asst. Prof. Vijay G R

Abstract:- The information is being redistributing to outsider into the distributed computing requires the security to be done while getting to. Be that as it may, while giving the security there comes the execution issues which should be taken to be thought, to expand the execution of the cloud alongside secure information getting to the new SRDCPM technique has presented. SRDCPM procedure manages the separating the information among the hubs of the cloud as, the principle information is being appropriated more than a few hubs while getting to the client must give the label an incentive from that label esteem the sub information partitioned among hubs is being followed by making T-way and is being recovered from fundamental hub. In any case, in this idea the information put away early might be put away again this can be progressed by evading the information which is now present in the cloud consequently execution is expanded while recovering or downloading the required information by the client.

New Generation Cursor and Video Control System
Authors:- Aakash Jadhav, Malik Tamboli, Prashant Gore, Sagar Pachkhande, Shivraj Pattanshetti, Prof B.D. Jitkar

Abstract:- This paper proposes an innovative method to interact with computer system. The proposed system is based on image processing technology. The objective is to create a virtual mouse system and a mechanism for controlling video play-pause option automatically with the help of face detection. The system uses web camera to interact with the computer in a more user friendly manner. Various mouse actions such as cursor movement left click and right click operations are performed based on the colour which is detected by the system.

Study of Scheduling In Microsoft Project Software
Authors:- Shubhashree P. Deshmukh, Akshay V. Sagale, Dr. Manish M. Bais

Abstract:- Planning and scheduling are important task in construction projects. In this project, scheduling in Microsoft (MS) Project software, was undertaken. For planning and scheduling work huge amount of paperwork is required, which makes the management very burdensome. These problems can be solved using project management software which helps to give a planned approach to planning. This analysis was done because of their comparable technical features and to evaluate on the basis of the function to manage the project. Each software had many benefits; MS Project also scored best in terms of easy to use. In this study, a case of an apartment building has been taken to display how proper planning and scheduling is done using MS project.

Greenhouse Environment Monitoring System Based on Wireless Sensor Network
Authors:- Asst. Professor Deepika, Bhanushree V K, Spoorthi P

Abstract:- As an important agricultural infrastructure, greenhouse plays an important role in the development of modern agriculture to supply proper environment for plants. The wireless sensor network has the advantages of simple structure, high efficiency, low cost, safety and reliability compared with the existing wired monitoring technology. This paper describes a design of greenhouse environment monitoring system based on wireless sensor network, the system integrates detection, wireless communication, alarm, display, control and other functions into one, using temperature and humidity sensor SHTll and light intensity sensor BH1750 for data monitoring, using CC2530 as microprocessor, man-machine interface is realized by using Lab VIEW software. The system is mobile and flexible, strong expansibility, low cost, low power consumption, flexible operation, the experiment proved that the system measurement accuracy, control stable operation. It can satisfy the demand of the greenhouse monitoring.

A Study on Patient Health Monitoring Using Iot
Authors:- Shafiya S, Ashwini M C, Asst. Prof. Deepika

Abstract:- IoT is Internet of Things. The Internet of Things refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other Internet-enabled devices and systems. These devices are used in various application fields to make our day to day life comfortable. These days frequent monitoring of health is very important for every individual in order to stay healthy. The various advances in Health monitoring using Iot, sensors, Arduino, Raspberry Pi etc are discussed in the paper.

Digitally Automated Incubation System For Complete Seed Germination
Authors:- K.A. Bhosale, S.A. Sawant, P.R. Hasolkar, S.S. Jadhav, B.B. Gayali, V.T. D’souza

Abstract:- Ongoing period has brought upon a noteworthy worldwide sustenance lack because of the climatic changes on the planet. So as to manage this issue of worldwide sustenance lack individuals must need to grow a sensible arrangement of vegetables and different harvests utilizing distinctive methodology and artificially controlled framework yields more products contrast with open field development since the microclimatic parameters that determine crop yield are persistently inspected and controlled to guarantee that an ideal environment is made. This research paper addresses and endeavors to determine a few issues that are looked by plants guardian utilizing the engineering methodology so he/she could stay fulfilled even when he/she physically away for a long time because the automated the system will take care of everything in the absence. This automated framework works utilizing sensors and actuators, which are controlled by microcontroller, monitor and deals with each ecological parameter required for the sound development of plants.

Extending Capability of Air Drones in Military
Authors:- Vibhor Rajawat

Abstract:- Giant AI and robotics leaps, drones and intensive defence hacking systems are no longer limited to science fiction films. Although the current systems are not advanced like the hand of Tony Stark, with each passing day, AI’s defence applications are seeing rapid progress. Unmanned Aerial Vehicles (UAVs) contribute significantly to the warfare capability. UAV’s assumption is that piloted, remotely piloted, and autonomous vehicles have advantages and disadvantages in military activities and vary in different levels of conflicting situations. This article shows the drones and their use possibilities. A drone is powered by batteries, which is the big drawback because after a few minutes of flight it is exhausted, causing the drone to fall on the ground. Military drones differ in size and driving mode from civil / civilian drones. This then includes fundamental legal perspectives to be taken into account when designing UAVs. Two extreme cases of drones and their companion robots have been shown.

Different kinds of Web Crawler
Authors:- Vishakha

Abstract:- A Web crawler is an Internet bot which helps in indexing the web. It crawls one page at a time through a website until all pages has been indexed. Web crawler helps in collecting information about a website and the links related to them. A web crawler is defined as mechanized program that accurately scans through Internet pages and downloads any page that can be reached by links A Web crawler is also known as a Web spider, automatic indexer or simply crawler. Nowadays finding the relevant information over millions bytes of data is very difficult. For this task we need to use efficient crawler so that it can give us best result within minimum time. This paper basically focused on the discussing different crawlers with their efficiency.

Motor control using DTMF
Authors:- Tanushree Patel, Jyoti Hazare, Tinkeshwari Bamne, Sangeeta Barde, Prof. Mukesh Sana

Abstract:- This venture chips away at the rule of DTMF tone order so got from any telephone to remotely switch and control electrical burden, for example, farming siphon, household and modern burdens and so forth. In businesses, the heaps are spread over an extensive region and in this manner, working these heaps is an extremely troublesome undertaking. In horticultural fields additionally, siphons and different burdens are associated over a substantial zone and henceforth it is troublesome for the rancher to work every one of the heaps and also for house hold loads. Thus to overcome these problems, the proposed system has been designed which uses DTMF technology to control the loads remotely.

Ψgs-Irresolute Functions in Topological Spaces
Authors:- J. Sona, N. Balamani

Abstract:- The aim of this paper is to introduce a new class of irresolute functions called ψgs-irresolute functionsin topological spaces. Also we study some characterizations of ψgs- irresolute functions.

Cathodic Protection to Reinforcements
Authors:- Chirag Patidar, Sajjan Singh Gujjar, Shubham Mishra Vivek Dubey, Asst. Prof. Pankaj Jadhav

Abstract:- Corrosion in the reinforcement is one of the major cause for cracks in structure. Usually beams are provided with slab at the top, so top of the beam is not exposed to environment. Bottom of the beam are exposed to atmospheric conditions and if the cover to reinforcement is insufficient, then corrosion of reinforcement takes place. These cracks generally appear near the side face of the beam near the bottom reinforcement along its length. Corrosion in reinforcement can cause expansion of reinforcement bars due to which cracks are formed. In severe cases it can be prevented by good quality control during its construction by providing Cathodic Protection. Cathodic Protection has been widely used in ship building and underground pipeline.

Research Paper Casa Automatics an Automated Home System
Authors:- B. Tech. Scholar Arjun Sehgal, Dr. Neha Agrawal

Abstract:- Home automation system achieved great popularity in the last decades and it increases the comfort and quality of life. In this paper an overview of current and emerging home automation systems is discussed. Nowadays most home automation systems consist of a Smartphone and microcontroller. A smart phone application is used to control and monitor the home appliances using different type of communication techniques. While the potential benefits of smart home technology are widely recognized, a lightweight design is needed for the benefits to be realized at a large scale. We introduce the CASAS “Smart Home automation system”, a lightweight smart home design that is easy to install and provides smart home capabilities out of the box with no customization or training. We discuss types of data analysis that have been performed by the CASAS group and can be pursued in the future by using this approach to designing and implementing smart home technologies. Technology is a never ending process. To be able to design a product using the current technology that will be beneficial to the lives of others is a huge contribution to the community. It presents the design and implementation of a low cost but yet flexible and secure cell phone based home automation system. The design is based on a standalone Arduino BT board and the home appliances are connected to the input/ output ports of this board via relays. The communication between the cell phone and the Arduino BT board is wireless. This system is designed to be low cost and scalable allowing variety of devices to be controlled with minimum changes to its core. To develop a Bluetooth based home automation system with Arduino UNO Board and an Android application. Remote controlled home automation system provides a simpler solution with Android application technology. Remote operation is achieved by any smart phone/Tablet etc., with Android OS, upon a GUI (Graphical User Interface) based touch screen operation.

The role of mobile technology in improving Food productivity in sub-Saharan Africa
Authors:- O. Akinpelumi

Abstract:- With the increasing need to improve food productivity in meeting the growing population’s food demandin sub-Saharan Africa. This essay takes a look at how rising acceptance of mobile technology in this region is been leveraged using SMS and USSD service features, in addressing critical issues facing small-holder farmers. These mobile service features are fully explained and the resulting technical solutions proffered by indigenous agri-tech start-ups to such farming challenges like inadequate access to information, financial transaction and supply chain issues are also discussed.

A Review Article Development of Embedded System For Functional Electrical Simulator
Authors:- Anila Sheikh, Mr. Kshitij Singhal

Abstract:- A virtual prototyping system is constructed by replacing real processing components with component simulators running concurrently. The performance of such a distributed simulation decreases drastically as the number of component simulators increases. Thus, we propose a novel parallel simulation technique to boost up the simulation speed. In the proposed technique, a simulator wrapper performs time synchronization with the simulation backplane on behalf of the associated component simulator itself. Component simulators send null messages periodically to the backplane to enable parallel simulation without any causality problems. Since excessive communication may degrade the simulation performance, we also propose a novel performance analysis technique to determine an optimal period of null message transfer, considering both the characteristics of a target application and the configurations of the simulation host. Through intensive experiments, we show that the proposed parallel simulation achieves almost linear speedup to the number of processor cores if the frequency of null message transfer is optimally decided. The proposed analysis technique could predict the simulation performance with more than 90% accuracy in the worst case for various target applications and simulation environments we have used for experiments.

A Review of Human Facial Expressions Recognition Methodologies
Authors:- Naila Sheikh, Mr. Kshitij Singhal

Abstract:- At present, researches on gestures at home and abroad mostly focus on the study of the hand, and there is less research on facial gestures. Based on the premise of multi-channel human-computer interaction and the rapid development of artificial intelligence, facial gestures based on facial features are proposed. Firstly, the definition of facial gestures and the recognition of facial gestures, as well as the introduction of facial gesture processing, are analyzed. Then facial detection technology based on Face and a set of interactive gestures based on facial features are designed according to the detected facial features, to achieve the interaction with the computer. Finally, a facial gesture application is implemented in Java language and the facial gesture technology is tested and analyzed. The results show that facial gestures are more conducive to hands-on disability for people with disabilities to more easily interact with computers and reduce the burden on their hands.

Images Retrieval using Hybrid Features Mechanism
Authors:- M.Tech. Scholar Alok Kumar Prajapati, Asst. Prof. Deepak Pancholi

Abstract- To recover vital pictures from a divergent gathering by utilizing visual questions as inquiry contentions are the exhausting and significant open issues. In this paper the scholars have referenced the structures and executions of a straightforward yet successful Content-Based Image Retrieval (CBIR) framework. The hues, surfaces and the shapes highlights are the imperative pieces of this framework. With the three principle ensuing looking advances the seeking winds up staggered. Such propounded frameworks are exceptionally one of a kind as they think of one as highlight at each progression and utilize the aftereffects of the past advance as the contribution for the following coming advance in staggered design while in the prior techniques every one of the highlights are joined on the double for the single-level hunt of a normal CBIR framework. The propounded strategy is extremely basic and agreeable to receive. The recovery evaluation of the propounded technique is valuated utilizing bi-benchmark datasets for a picture characterization. The above arrangement of strategies indicates extremely great outcomes as far as improvement in recovery characteristics, when contrasted and the writing. In proposed work we get exactness like between 68.15 % to 94.86% in utilized diverse highlights.

IoT Based Smart E-Learning System Using Machine Learning
Authors:- Shinde Swapnil S., Bansode Mithilesh M., Jadhav Pandurang B., Pawar Rohit P.

Abstract- The smart e-learning system is a web application which establishes an environment between web application server and end users. This project is developed using machine learning and IoT .using this web-application user can stream the videos live and access the files stored on the server. The medium to access the recourses is internet. This E-learning System is Beneficial to the Distance Education.

Design and Implementation of a Robot for Maze-Solving using Wall Following Algorithm
Authors:-K.Surya Teja, Koyi Rajesh, M. Gopi Krishna, CH.Pavan Naga Sai

Abstract- Maze solving robots in the past had great impact in robotics which is based on decision making algorithm, the main result of this project is to detect the objects and it should avoid them for colliding. if the object in on right and front then it should turn left, if the object is on left and front then it should turn right, if the object is on front and left and right then it should go back or stop there. Not only turning here we have decided to display the output in LCD if it turns right ,right is displayed in Lcd and also same for left, back, front, stop. By doing this project we can solve the daily problems very quickly.

Survey on Big Data Concepts, Technology, Applications and Challenges
Authors:-Asst. Prof. Sapna S. Kaushik

Abstract- Big data is a new driver of the world economic and societal changes. Incredible amounts of data is being generated by various organizations like hospitals, banks, e-commerce, retail and supply chain, social media and smart phones, Internet of Things and cloud computing etc. by virtue of digital technology . While the data complexities are increasing including data’s volume, variety, velocity and veracity, the real impact hinges on our ability to uncover the `value’ in the data through Big Data Analytics technologies. The voluminous data generated from the various sources can be processed and analyzed to support decision making. Analysis of these massive data requires a lot of efforts at multiple levels to extract knowledge for decision making. Big Data Analytics is the process of examining large amounts of data (big data) to discover hidden patterns or unknown correlations. A key part of big data analytics is the need to collect, maintain and analyse enormous amounts of data efficiently and effectively. Analyzing Big Data is a challenging task as it contains huge dispersed, diverse and complex file systems which should be fault tolerant, flexible and scalable. There is an immense need of constructions, platforms, tools, techniques and algorithms to handle Big Data. The technologies used by big data application to handle the massive data are Hadoop, Map Reduce, Apache Hive, HBase,HDFS – Distributed File System.

IoT Based Delivery Boys Safety Control and Bike Analyzer
Authors:-Harshith H., Lokesha G.N, Kishor Kumar R., Mrs. Deepika

Abstract- Two wheelers are widely used than other form of vehicles due to its low cost and simplicity. Most of the time rider doesn’t like to wear helmet which could be result in fatal accidents. Drunken driving and Drowsy driving are the major factors for such road accidents. Some statics shows that 35% of the accidents are caused by two wheelers and in that 60% of the two wheeler accidents are caused due to lack of consciousness, drunken driving and not wearing helmet. The primary concern of all riders is safety. From above, taking in to consideration the safety of delivery boys who works for online business travels across areas using two wheelers, where safety of bike rider counts. Hence to track the activities of such rider and to provide safe riding this paper has been proposed. This paper aims for avoidance of accidents and develop helmet detection system. The proposed system is an intelligent/safety helmet. A module affixed in the helmet, such that, the module will sync with the module affixed on bike and will also ensure that biker has worn Helmet. Additional feature of accident avoidance detection module will be installed on the bike.

Road Detection and Segmentation from Aerial Images using a CNN based System
Authors:-V. Chinnapu Devi, V.Tarun Sai, M. Narendra Kumar, Y. Pavan Kumar Reddy, S.L.Viswanath Naidu

Abstract- This paper proposes a system architecture based on deep convolutional neural network (CNN) for road detection and segmentation from aerial images. These images are acquired by an unmanned aerial vehicle(UAV) . The algorithm for image segmentation has two phases: the learning phase and the operating phase. The input aerial images are decomposed in their color components, preprocessed in Matlab and next partitioned in small boxes of dimension 33 × 33 pixels using a sliding box algorithm. These boxes are considered as inputs into a deep CNN. The CNN was designed using MatConvNet and has the following structure: four convolutional layers, four pooling layers, one ReLu layer, one full connected layer, and a Softmax layer. The whole network was trained using a number of 2,000 boxes. The CNN was implemented using programming in MATLAB on GPU and the results are promising.The CNN output gives pixel by pixel information on what category each falls into (ROAD/NON-ROAD).Road pixels are labeled with “1’s”(white) and non-road pixels are labeled with “0’s”(black). The proposed system has the advantage of processing speed and simplicity from the previous sytem which has a less speed and complexity.

Comparative Study on Microarray Data Analysis Techniques of Machine Learning
Authors:-M.Tech. Scholar Sanjay Kumar Sharma, Asst. Prof. S.R. Yadav

Abstract- Machine learning models has been applied for prediction and prognosis of disease development and it become an irrevocable part of microarray data analysis aimed at betterment of the subsequent therapy and management of patients. The application of machine learning models for accurate prediction of survival time in cancer disease on the basis of clinical data is research work of the presented study. The paper discusses an approach to the problem in which the main factor used to predict survival time is the originally developed tumor-integrated clinical feature, which combines tumor stage, tumor size, and age at diagnosis. Two datasets from corresponding liver cancer studies are united by applying a data integration approach based on horizontal and vertical integration by using proper document-oriented and graph databases which show good performance and no data losses. Aside from data normalization and classification, the applied machine learning methods provide promising results in terms of accuracy of survival time prediction. Clustering has been used extensively as a vital tool of data mining. A neuro-fuzzy method is proposed in this research for analyzing the gene expression data from microarray experiments. Analysis of gene expression data leads to cancer identification and classification, which will facilitate proper treatment selection and drug development. The proposed approach was tested on three benchmark cancer gene expression data sets. Experimental results show that neuro-fuzzy method can be used as an efficient computational tool for microarray data analysis. The neuro-fuzzy classification system, which is based on a built clustering algorithm reached recognition rates than other classifiers. Gene expression data sets for liver cancer were analyzed in this research. A training and test data set for each cancer was used to analyze the quality of the genes. Use of computational methods to predict Gene Regulatory Networks (GRNs) from gene expression data is a challenging task. Many studies have been conducted using unsupervised methods to fulfill the task; however, such methods usually yield low prediction accuracies due to the lack of training data. In this research work, semi-supervised methods have been proposed for GRN prediction by utilizing two machine learning algorithms, namely support vector machines (SVM) and random forests (RF). The semi-supervised methods make use of unlabeled data for training. Inductive and transductive learning approaches has been investigated, both of which adopt an iterative procedure to obtain reliable negative training data from the unlabeled data. Then semi-supervised methods are applied to gene expression data of Escherichia coli and Saccharomyces cerevisiae, and evaluated the performance of the methods using the gene expression data. This analysis indicated that the transductive learning approach outperformed the inductive learning approach for both organisms. However, there was no conclusive difference identified in the performance of SVM and RF. Experimental results also showed that the proposed semi-supervised methods performed better than existing supervised methods for both organisms.

Partial Replacement of Cow Dung With Cement
Authors:-Hardik H. Chauhan, Swarupanand V. Munj, Harsh M. Rawal, Jay P. Patil, Prof. Mrunalini Deshmukh

Abstract- This research project presents the result on the study for the use of Cow Dung Ash (CDA) as partial replacement in production of concrete. The experiments were designed to study the effects of adding Cow Dung Ash (CDA) in various percentages by weight (10%, 13%, 16% and 20%) of cement and cure for the periods of 7, 14, and 28 days respectively before testing for the Compressive strengths. It also involves determination of setting time, Bulk Density, and Workability of Cow Dung Ash in various percentages by mixing with Portland cement. The Compressive test results are 22.00 N/mm2, 20.22 N/ mm2, 19.55 N/mm2, 13.78 N/mm2 and 12.13 N/mm2 for 0%, 10%,13%, 16% and 20% replacement of cement with CDA respectively at 28 days. The Workability results gives 112mm, 127mm, 130mm, 72mm and 80mm respectively for 0%, 10%, 13%, 16% and 20% replacement of cement with CDA. Test results indicated that the consistency limits increased up to an optimum content and decreased further with the increase in the % of CDA in cement. CDA has an advantage that offers lightness of weight and low thermal conductivity, Cow Dung Ash concrete is recommended for use only when a thirteen percentage (13%) of Cow Dung Ash is added.

Automated Human Action Recognition System Using Machine Learning
Authors:- Sagar Goyal, Susmitha Shereef

Abstract- Human action recognition is an important research topic, nowadays because of security and safety constraints. An action recognition is helpful in gesture recognition, posture detection, video surveillance and many more important activities that are desirable in today’s world. Action recognition can help in reducing the criminal acts or in detecting any kind of that activity at correct time so that appropriate action against that activity can be taken. There are various conventional action recognition methods that recognize actions in a video directly which can often give incorrect results because analyzing videos directly requires great speed in detection of actions. However, detecting images is much simpler and easier job to do. So, we convert an input videos into static image frames for easy analysis and interpretation of actions. There are many problems in current action recognition methods which face deficiency in labelled videos or some methods use lot of labelled videos in training dataset that further face the problem of over-fitting the training data and inaccuracy in detecting actions in online testing dataset. Hence, in this project, we use a semisupervised learning approach to make a balance between labelled and unlabeled videos and utilizing both simultaneously that overcomes the problem of overfitting the data and also provide the best results in least amount of time. The experimental results show that our action recognition method works for online testing dataset and gives accurate results with very good performance and is better than any other action recognition method.

Extraction of Metadata and it’s Parsing for PubMed articles
Authors:- Aarti Mete, Priyanka Kanthale, Pritam Bhaye, Rahul Subhedar, Mrs. Shafali Gupta

Abstract- Most of the data is in the form of articles and papers. Identifying the important articles form the millions of available papers is a need for today. Metadata extraction returns hidden information from the documents that are not in structured form to the one with semi – structured or standard form. This useful information contains authors, title, ID’s, etc. about the article. Metadata is data (information) that is supposed to provide information from other data. This information is the basic information that can be further useful for the analysis of article.The extraction of metadata and the technique of parsing it have been discussed further.

A Review on Analysis of Data Search Scheme for Secure Information Retrieval in Cloud Computing
Authors:- M.Tech. Scholar Nitin Kumar Sahu, Asst. Prof. Anuj Kumar Pal

Abstract- Today’s businesses want it all: secure data and applications accessible anywhere from any device. It’s possible with cloud technology, but there are inherent challenges to making it a reality. What can enterprise businesses do to reap the benefits of cloud technology while ensuring a secure environment for sensitive information? Recognizing those challenges is the first step to finding solutions that work. . Increasingly numerous companies plan to move their local data management systems to the cloud and store and manage their product information on cloud servers. An accompanying challenge is how to protect the security of the commercially confidential data, while maintaining the ability to search the data. In this paper we are analysis of different securities scheme for encryption of item information and also for data search scheme in cloud computing.

Study of Rubber Dam
Authors:- Siddharth Soni, Manjunath Pai, Nandini Singh, Pankaj kumar Yadav, Asst. Prof. Mrunalini Deshmukh

Abstract- Rubber dams are inflatable and deflatable hydraulic structure. Thousands of rubber dam have been installed worldwide for various purpose: irrigation, power generation, tidal barrier, environmental improvement, flood control and recreation. The newest material in the construction of water structures in recent years, is the rubber material that is widely used in the construction of short dams or dams. The simplicity and flexibility of the rubber dam structure has proven reliability and are the key consideration in its wide scope of application. The estimation of rubber dam is based on personal communications with the expert of manufacturers and the practitioners of the subject areas as well as case studies of already constructed rubber dam in India install for the purpose other than hydropower. It is recommended to use inflated weir in small hydropower projects which is being cost effective and also energy efficient. Rubber dam is a new technology which control water in flexible way. Average life cycle cost of Imported rubber dam and life cycle cost of Indian rubber dam is about 3 times more than the cost of Indian rubber dam. In this paper we are going to study the working of Rubber Dam and conventional dam and compare the cost of both the dam. And based on the study, will conclude whether Innovation of Rubber dam is cost effective and useful or not.

Sentiment Analysis for Understanding Students Learning Experiences: A Survey

Authors:- ME Aaquib Multani, Assistant Professor Atul Agrawal

Abstract- Social media allows the creation and interactions of user created content. Social medium places include Facebook, Twitter etc. Student’s casual discussion on social media focused into their educational experience, mind-set, and worry about the learning procedure. Now days, Social media craze is mounting to heights of success for every individuals. The amount of social media data provides chances to understand students’ experiences, but their methodological difficulties to use social media data for educational purpose. Therefore, there is need to identify students’ emotions by analysis of their sentiments. In this survey paper, we discuss about the sentiments analysis and their patterns. Additionally, we proposed an approach for predicting sentiments of user specifics and classifying them in to ‘negative’ or ‘positive’. We are implementing this method on JAVA environments using “Twitter” dataset..

Disease and Cure Prediction in Crops Using Neural Networks Authors:- Prathyusha Mukkarla, Prof. Asha, Phani Deepthi Yarlagadda

Abstract- Social media allows the creation and interactions of user created content. Social medium places include Facebook, Twitter etc. Student’s casual discussion on social media focused into their educational experience, mind-set, and worry about the learning procedure. Now days, Social media craze is mounting to heights of success for every individuals. The amount of social media data provides chances to understand students’ experiences, but their methodological difficulties to use social media data for educational purpose. Therefore, there is need to identify students’ emotions by analysis of their sentiments. In this survey paper, we discuss about the sentiments analysis and their patterns. Additionally, we proposed an approach for predicting sentiments of user specifics and classifying them in to ‘negative’ or ‘positive’. We are implementing this method on JAVA environments using “Twitter” dataset..

Pothole Repair by using PET (Polyethylene Terephthalate) and Zyco Therm Authors:- Amol Bhosale, Siddhesh Katkar, Shubham Shinde, Suraj Shrivastav, Deepika Bhulla, Mrunalini Deshmukh, Neha Badiger

Abstract- In India, Most of the pavements are of flexible pavement as they are economical compared to rigid pavements but its maintenance causes more trouble and also increase cost of flexible pavement construction. Bitumen and aggregates being an important aspect of the flexible pavement from cracking and deterioration of the pavement. . Bitumen acting as a binding material in the pavement when mixed with the Polyethylene Terephthalate (PET) and ZycoTherm (upgraded version of ZycoSoil) brings more stability to the roads and helps ion resisting the forces from the vehicles. Hence in this study different test is to be done regarding more stable and effective proportions to be used between bitumen and plastic waste comprising of Marshal Stability test, Ductility test, Penetration test and Softening point test for Bituminous mix and Bitumen.

An Advanced ETL Technique for Error Free Data in Data Warehousing Environment
Authors:- Marzana Ifat Moly, Ovijit Roy, Md. Alomgir Hossain

Abstract- A large store of data accumulated from a wide range of sources within a company and used to guide management decisions. Data Warehousing is one of the common words for last 10-20 years, whereas Big Data is a hot trend for last 5-10 years. Now we are trying to find out that how the ETL process work with the Data Warehouse and how to manage after transform the data into data warehouse. ETL is the stand for extract, transform and load. This is a very new concept for Data warehouse. Many of know about the ETL but it’s just a theoretical concept. So we try to find out how ETL works with Data warehouse. And we try to build a prototype of ETL and that’s ETL design include in this paper.

Concrete Containing Crumb Rubber and Slag Cement
Authors:- Dinesh Choudhary, Jayashri Poojary, Khushboo Shukla, Abhishek Singh, Prajakta Mukadam

Abstract- The treatment, utilization and disposal of scrap tyre rubber is major environmental issue. Up till now only small quantity of scrap tyreis recycled and remaining is dump, ignited and landfill. The manufacturing growth rate of tyre is increasing at a very fast rate. One of the possible solutions for the reuse of scrap type rubber is to incorporate it into concrete in the form of crumb rubber by replacing some of proportion of the coarse aggregate. This project study has been conducted by replacement of aggregate with crumb rubber and replacement of whole quantity of cement with slag cement. Addition of crumb rubber is done by 3%, 5%, 7% of total weight of coarse aggregate. After casting and curing, compressive strength and flexural strength test had been performed to find strength of the concrete and behavior of the concrete under the test has been studied.

Green Supply Chain Management with Artificial intelligence based optimization
Authors:- Dhananjay Kumar Yadav, Mr. Kamlesh Gurjar

Abstract- Green supply chain management (GSCM) has become a topic of interest for both business leaders and academic researchers alike. Over the last decade or so, the GSCM literature has grown considerably. Although sufficient literature exists about various aspects and facets of GSCM, earlier works and reviews have a limited focus and narrow perspective. This paper presents a comprehensive integrated view of the published literature of GSCM so as to facilitate further study, practice and research. First, we introduce the different definitions of GSCM and its’ development. Second, we focus on reviewing the research on GSCM’s decisions and models. Finally, we discuss the limitations of existing research on GSCM and indicate future research opportunities.

Object Detection and Classification Using Yolo
Authors:- Naman Mittal, Akarsh Vaidya, Asst. Prof. Shreya Kapoor

Abstract- The cutting edge world is encased with monstrous masses of computerized visual data. Increment in the pictures has asked for the improvement of hearty and effective article acknowledgment procedures. Most work announced in the writing centers around skilled systems for item acknowledgment and its applications. A solitary article can be effectively recognized in a picture. Various items in a picture can be recognized by utilizing distinctive article locators all the while. The paper examines about article acknowledgment and a technique for different item identification in a picture.In spite of the fact that various systems have been proposed with the end goal of picture acknowledgment, Convolutional Neural Network or CNN, is a method which has had the capacity to effectively take care of the picture acknowledgment issue productively.We demonstrate YOLO, a way to deal with item recognition. Earlier work on item discovery re purposes classifiers to perform location. Rather, we outline object location as a relapse issue to spatially isolated bouncing boxes and related class probabilities. A solitary neural system predicts bouncing boxes and class probabilities legitimately from full pictures in a single assessment. Since the entire discovery pipeline is a solitary system, it very well may be upgraded start to finish straightforwardly on identification execution.

Study and Analysis of Disputes
Authors:- Rohit V. Shewale, Ranjit Kumar Elumalai, Dilip S. Shirivastav, Abhijeet Jaiswar, Prof. Basweshwar Bansode

Abstract- Unforeseen circumstances, prompting debate, are an ordinary element of every construction industry since conditions experienced are typically unique in relation to those arranged or anticipated. Construction disputes emerge because of a series of components that consolidate in different approaches to deliver differences, disagreements and lastly dispute. These dispute might be of different nature like technical, money related or quality related, time related, or staff related, etc. Since, conflict and disputes are the reason of stress on the grounds that an well planned construction project cannot run smoothly, efficiently because of these problems. Therefore it is essential to oversee them for better and proficient finish of projects. The research methodology is based on questionnaire survey primarily focusing on Indian construction projects. This paper will help to find out major causes of disputes and is relied upon to be assistance for the management of the same.

Cloud Based Secured Locker
Authors:- Shilpashree P.S, Abhishek Kumar Tiwari, Ashutosh Prakash, Saurabh Kumar Singh

Abstract- In the modern era, security plays a significant role. Every individual has valuable accessories like gold, jewellery or cash. It is not enough to have these accessories, but security of this is very important, for this purpose some people prefers to keep them in bank lockers. Still it is common to hear or read in news that some fake person accessed the locker of another person and have stolen their accessories. In order to deal with this type of frauds, verification of the person who wants to use the locker is very important. In this project, advance secured system is designed which will make sure the authentic access of the locker overcoming all the misuses. For this purpose, it is better to have unique password technique through the OTP verification and use of biometric verification which is more effective, secured and fast. If an unauthorized user tries to breach the locker, the alarm signal would be raised to notify the security guards. The owner is also notified by sending the snapshot of unauthorized user to authenticated email id. In this system locker will have a wireless module which connects to the Internet and communicates with the user and admin through internet from anywhere in the world. The main objective of this project is to embed a locking system in the door consisting of two step with locking positions, controlled by the user and admin using android app and burglar alert system when someone tries to open the locker manually.

Lung Cancer Detection Using Digital Image Processing and Artificial Neural Networks
Authors:- M. Tech Scholar Shubham Bhardwaj, Asst. Prof. Shalini Bhadola, Asst. Prof. Kirti Bhatia

Abstract- Cancer detection is generally carried out manually by trained professionals and these techniques are majorly helpful in the advanced stage detection, also it involves a very tedious procedure and highly dependent on the given individual. This introduces the high possibility of human error in the detection process which necessitate an automated process. Hence, this paper aims at early detection of cancer through an automated process to minimize human error and making the process more accurate and hassle-free. In the proposed work, image processing algorithms and artificial neural network have been employed to design an automated process for early stage detection of lung cancer. In today’s world ,image processing methodology is very rampantly used in several medical fields for image improvement which helps in early detection and analysis of the treatment stages ,time factor also plays a very pivotal role in discovering the abnormality in the target images like-lung cancer ,breast cancer etc. this research focuses upon image quality and accuracy. image quality assessment as well as improvement are dependent upon enhancement stage where low pre-processing techniques are used based upon gabor filter within Gaussian rules; thereafter the segmentation principles are applied over the enhanced region of the image and the input for feature extraction is obtained, further depending upon the general features, a normality comparison is made .in the following research the crucial detected features for accurate image comparison are pixel percentage and masking labeling. In this research we have done classification based upon artificial neural networks which is more satisfactory than other current classification methods.

Optical Oscillator Using HEMT
Authors:- Aditya Tiwari, Praveen Singh, Akshay Singh

Abstract- The existing processors have lower frequencies due to which multitasking operations and all the high end software which require more processing power cannot be performed efficiently. so the main task is to build a processor which has higher frequency of operation for which we need a device which can work on higher frequency and high electron mobility transistor is one such device which works on higher frequency relative to other devices, so with the help of hemt we will be designing an optical oscillator which can work on high frequency end the simulation of this oscillator will be performed on visual tcad software. here we will check the response of the oscillator by simulating it on the software so that a desired frequency can be obtained and the device can be fabricated so that multitasking operations can be achieved easily

Controlling Set Top Box using Hand Gestures
Authors:- Deepti Gupta, Yash Goel, Neeraj Sharma

Abstract- Controlling the T.V set top box has been done through an infrared remote control since its inception but with the growth in smart technology all around us our control can be more interactive and easy by the use of hand gestures. Main motive behind this gesture based remote control is to remove the constraint of a handheld device. This hand gesture based remote control will also be useful for people with disabilities as compared to traditional handheld remote in which a key has to be pressed to control the STB which can cause muscle strain to people with physical disability whereas a simple gesture will not cause such strain and will also make it easier for them to control their T.V effortlessly. This system will be built on Arduino microcontroller board and use Ultrasonic sensor to detect hand gesture and an infrared LED to transmit the decoded signal to the Set Top Box.

Providing Security and Privacy for communication in Vehicular Cloud Computing
Authors:-Patil Nilochana, P. Kavitha

Abstract- Vehicular cloud computing (VCC) uses unused vehicle storage and computing resources to collaboratively provide end users such as drivers and passengers with traffic management, road safety and infotainment services. It is a hybrid technology that enhances the use of vehicle resources and is capable of performing complex computing tasks that a single vehicle cannot handle. Despite the appealing benefits of sharing resources among unfamiliar vehicles, there are severe threats to security and privacy in VCC. In this paper, we identify security goals for VCC interoperability and provide an authentication key agreement (AKA) framework for VCC. Specifically, to design a reliable AKA with strong safety guarantees for VCC, we present the research challenges and open issues first. Then we propose a secure and efficient message access control and authentication scheme in VCC. For message sharing, a hierarchical, Cipher Policy Attribute Based Encryption (CP-ABE) technique is used to ensure that vehicle whose persistent or dynamic attributes satisfy access policies can access the broadcast message with equipped cloud. Finally, to illuminate the further directions of research on AKA for VCC, several interesting issues are discussed.

Smart Grid Load Balancing Using Renewable Resources and Genetic Algorithm
Authors:- Research Scholar Manish Verma, Asst. Prof. Ashish Sethiya, Asst. Prof. RP Kumawat HOD

Abstract- With increase in load Smart Electrical Grids are required for proper distribution of electrical load. Here this balancing is not straight switching because of random electric requirements. Considering these facts work has focus on developing a smart grid for balancing the renewal load distribution, by using genetic algorithm. Here propose work will utilize Teacher Learning Based optimization algorithm, where two phase learning is done. Here proper set of solar or wind mill generators are assigned for fulfilling particular load requirement is estimate by this genetic algorithm. In this work proper fitness function was used where distance of source plant is also consider for loss of power dissipation and reduce it. This work increases the resource utilization with minimum loss. Experiment was done on real dataset from authentic datasets and result shows that proposed work is better as compared to previous other approaches n various evaluation parameters.

Computer Interfaced Smart A.I Battle Field Tank
Authors:- ME Scholar S. Alaguganesan, Asst. Prof. D. Siva Kumar

Abstract- As the potential for disastrous consequences from threats increases in prevalence, the speed which such cyber threats can occur presents new challenges to understandings of self-defence. This paper first examines the prevention of threats nations could face. It next looks at existing concepts of self-defence with particular focus on anticipatory and pre-emptive self-defence, and then moves to a review of the underlying criteria which govern the right to resort to such actions. Highly sophisticated electronic sensors attached to the tank’s hull will project images of the surrounding environment back onto the outside of the vehicle enabling it to merge into the landscape and evade attack. The electronic camouflage will enable the vehicle to blend into the surrounding countryside in much the same way that a squid uses ink to help as a disguise. Unlike conventional forms of camouflage, the images on the hull would change in concert with the changing environment always insuring that the vehicle remains disguised.

A Review on Different Face Spoof Detection Techniques in Biometric Systems
Authors:- M. Tech. Scholar Kanika kalihal, Asst. Prof. Jaspreet Kaur

Abstract- Biometric systems are increasingly used in different security systems for the last few years. Fingerprints, Iris recognition, face recognition systems have grabbed attention from academicians and researchers all over the world. But there are certain issues associated with these systems that make them vulnerable. One such issue is the spoof attack in which an impostor attacks the system by presenting a printed photograph of the genuine user to the system. These attacks compromise the security of the system and therefore need to be addressed. This paper presents an overview of different techniques that are used in face spoof detection and discussed parameters that are used to evaluate the performance of different face spoof detection techniques.

Design and Implementation of Smart Sensor Integrated Chair For Medical Diagnosis
Authors:- ME Scholar M. Kiruthika, Asst. Prof. K. Abhirami

Abstract- With the design of an Internet of Things (IoT) and telemedicine based health monitoring system- The Smart Chair. Sensors and associated hardware needed to monitor the vital physiological parameters of the human body are available on the chair, thereby leading to the idea of a Smart Chair. It enables the subject to be seated in a relaxed posture during the acquisition of physiological signals from various sensors attached to his/her body. The raw signals from the sensors are processed digitally by an onboard microcontroller and analyzed for any common abnormalities in the health parameters of the subject. The results are then transmitted to a personal computer. The data can be viewed at any later time by a doctor’s computer that is connected to Internet. The Smart Chair also sends an SMS with all the health details to a remote doctor’s phone in case of an emergency, thus facilitating telemedicine in rural areas. The key focus of the presented work is to propose the design of a chair that will be useful and easily affordable by the people of developing nations who have limited access to proper healthcare facilities. The results Presented show that the proposed system is definitely a low cost affordable solution for IoT based telemedicine system, as compared to existing systems.

A Review of Android Security System
Authors:- M. Tech. Scholar Shipra Joshi, Asst. Prof. Rahul Sharma

Abstract- Android operating system uses the permission-based model which allows Android applications to access user information, system information, device information and external resources of Smartphone. The developer needs to declare the permissions for the Android application. The user needs to accept these permissions for successful installation of an Android application. These permissions are declarations. At the time of installation, if the permissions are allowed by the user, the app can access resources and information anytime. It need not request for permissions again. Android OS is susceptible to various security attacks due to its weakness in security. This paper tells about the misuse of app permissions using Shared User ID, how two factor authentications fail due to inappropriate and improper usage of app permissions using spyware, data theft in Android applications, security breaches or attacks in Android and analysis of Android, IOS and Windows operating system regarding its security.

Data Sharing With CP-ABE to Data Owner-Side And Cloud-Side Access Control For Encrypted Cloud Storage
Authors:- M. Tech. Scholar Diguvasadum Deepika, Asst. Prof. G.Varaprasad, Asst. Prof. Karamala Suresh

Abstract- People support the great power of cloud computing, but cannot completely trust the cloud providers to host privacy-sensitive information, due to absence of user-to-cloud controllability. To ensure confidentiality, data owners outsource encrypted data instead of plaintexts. To distribute the encrypted files with other users, Ciphertext-Policy Attribute-based Encryption (CP-ABE) can be utilized to carry out fine-grained and owner-centric access control. But this does not adequately become make safe against other attacks. Many earlier schemes did not grant the cloud providers potential to verify whether a downloader can decrypt. Therefore, these files have to be available to everyone accessible to the cloud storage. A malicious attacker can download thousands of files to launch Economic Denial of Sustainability (EDoS) attacks, which will mostly consume the cloud resource. The customer of the cloud service bears the expense. Besides, the cloud provider serves both as the accountant and the payee of resource consumption fee, lacking the transparency to data owners. These concerns should be resolved in real-world public cloud storage. In this paper, we propose a solution to secure encrypted cloud storages from EDoS attacks and provide resource consumption accountability. It uses CP-ABE schemes in a black-box manner and complies with arbitrary access policy of CP-ABE. We present two protocols for different settings, followed by performance and security analysis.

Analysis of Classification Algorithms using Machine Learning
Authors:- M. Tech. Scholar Soniya Rathore, Asst. Prof. Ankur Taneja, Asst. Prof. Mahesh Patidar

Abstract- In this work our main focus is on regression which is one of the most important methods in machine learning algorithm. Regression is a statistical approach that is used to find the relationship between variables. It is basically used to predict the outcome from the given dataset. In this work we will discuss the regression algorithms which are available in machine learning algorithm and propose one algorithm that will have less train error and test error as compared to other existing algorithm. The accuracy measure will be in the form of train and test error.

Effect Reinforcement of Boron Carbide and Silicon Carbide on AA 2024 Hardeness
Authors:- Arnav Singh, S M Uruf Nezami, Sadaf Kamaran Ali, Ankit Kr. Yadav, Asst. Prof. Rahul Malik, Asst. prof. Vishal Sharma

Abstract- Aluminum matrix composites are emerging as advance engineering materials due to their strength, ductility and toughness. The aluminum matrix can be strengthened by reinforcing with hard ceramics particles like silicon carbide and boron carbide etc. In the present study, an effort is made to enhance the mechanical properties like tensile and hardness of AMCs by reinforcing 2024 Al matrix with boron carbide and silicon carbide particles by stir casting route. It is observed that by adding 5% reinforcement our hardness Brinell hardness as well as Rockwell hardness becomes 119 BHN and 49 HRB & further adding 10% reinforcement our hardness Brinell as well as Rockwell hardness is 185 BHN and 97 HRB respectively.

Application of Influence Function for calculation of Mining Subsidence and Displacement Prediction
Authors:- Nabyendu Neogi

Abstract- In the present world underground mining is carried out hundreds of meter deep from the surface and creating voids after mining out minerals and coal, these minerals were previously bearing the load of the surrounding strata, but due to the voids created after extractions, cracks are formed in the immediate roof, and these cracks travel to the surface causing the surface strata to come down and cause subsidence. This is a brief study on the estimated calculation of mine subsidence of a mine using mathematical influence function by which we divide the underground mining area into several annular rings and find out the effect of these area on the surface and plot a subsidence profile and hence the displacement calculation due to the void created in the mined-out spaces. From the subsidence profile of the mine area we can not only predict the extent of area which is going to subside but also with how much vertical displacement and thus saving life and livelihood.

Snake Game for Android
Authors:- Tushar Tokas, Karan Arneja, Sparsh Goel

Abstract- This project is aimed at creating a version of the snake game for android devices which can not only serve as a means of entertainment but also as a means to understand the development of technology in the past two decades from when the snake game was first popularized on Nokia devices. Even in the original snake game, there was multiplayer facility available provided that two devices were present and connected via an infrared connection. It presents a simple means to compare the technology used then and now, such as the difference in programming languages, algorithms and electronic devices. Traditional methods of creating Snake game usually include the use of coding languages to create an Engine and the main game, but this project implements use of script-free software to create the software. This is made possible by software called Clickteam Fusion. Clickteam Fusion is a game engine that uses an event based system instead of coding. The game helps get a good grasp of Clickteam Fusion as well, so new games can be made with this new understanding of modern technology.

Published by: