Category Archives: Uncategorized

IJSRET Volume 4 Issue 6, Nov-Dec-2018


Research on optimization of sand Moulding process
Authors: Manoj Bhandari, Mayank Sharma

Abstract:-Casting is a manufacturing process in which molten metal or liquid is converted into desired shape for its application in different fields like automobile parts, firefighting parts, valve parts, electrical equipment. The solid parts received after the whole process is known to be casting .This process have been known for thousands of years and is one of the most popular and simplest method of casting that allows products to be generate at reasonable cost at manufacturing industry. In order to meet the overgrowing demand of the consumer industry need to produce large amount accurate products at suitable time so the companies are trying every possible means In order to done casting most of them are using hit and trial method to casting. That results involvement of error, time consumption and loss of cost in the process of casting .Origination of casting defects is one of limitation that is need to be consider as to diminish the effect of defects in the final casting product. Defects like gas porosity, shrinkage, mold material defects. As to determine the optimum condition for sand casting is challenging task. In order to find out optimum condition as to acquire minimum defects for best possible results. Selection of material and process is very important task which we have to keep in mind. Selection various parameters like grain size of 300 and 600 mics ,moisture content of 26 % and 28 % as to produce the sand moldings and test the sample for tensile and compressive strength is key method of our working .In this project we have taken 4 samples with different condition of operation in the end made an comparison between them to find the optimized result . The results indicated that the selected process parameters significantly affect in improving casting defects like gas porosity, shrinkage in foundry lab. This paper illustrates the optimizing the process parameters of sand casting process including optimum levels and the case study are done in foundry lab. The result obtained in the experiment demonstrate that smaller grain size particles with medium level of moisture(300 mics sand & 28% water content) delivers optimum results for casting.

Magnonic Holographic Memory
Authors: Gunjan, Tushar Karmakar

Abstract:-Data storage has been fundamental part of the computing from the beginning. The technology for data storage has been evolving along other side over areas of computing technology. As these other areas of technology have developed the need for bigger and fastest storage has been evident. To meet the need for better storage new technologies are constantly being developed as the old technologies reaches its physical limits and become outdated. Holographic memory has received attention in recent years as a technology that can provide very large storage density and high speed. Information is recorded in holographic medium through interface of two coherent beams of light .We refer to information carrying beams as signal beam and interfering beam as reference beam. The resulting interference pattern causes an index grating (the hologram) to be written in the material. When hologram is to subsequently illuminate within one of the original reference beams, light is diffracted from the grating in such a way that the signal beam is reproduce. Many holograms can be multiplexed within the same volume of the material by angle, fractal, wavelength, and phase code; multiplexing. Holographic memory can read and write data in parallel allowing for much higher data transfer speeds. Unlike conventional storage media such as magnetic hard disks and CD-ROM’s which can access only 1 bit at a time, each access of a holographic memory yields an entire data page-more than a megabit at a time. Holographic random access memory design leads to the implementation of compact and inexpensive memory modules that can be used to construct large read-write memories.

A Study of Gulbarga(Kalaburagi) City(Karnataka), India
Authors:Mala Ramesh Ramchandra rao, Dr. K.Vijakumar

Abstract:-The maintenance of healthy nature is an integral part of urban planning. Well maintained greenery contributes immensely to various sectors and forms income generating program me, thereby enhances property value. Gulbarga is popularly known as a ‘Cement Kashi & Bowl Of Pulses’. The buildings in the city are architecturally beautiful and are endowed with well-maintained parks, open spaces One of the adverse effects of rapid and relative unplanned growth is heavy encroachment leading to the problem of shrinking green space and City Corporation resources are inadequate to fully meet the basic domestic needs of the city’s green spaces. Gulbarga has a total of 248 parks in addition to a large number of institutional open spaces and avenue plantations. The main objective of cultivation and management of trees is their contribution to the physical, social and economic well being of the urban community. The city has a only one Lake-Sharnabasaveshwar Lake, That Add To The Beauty And Environmental Value Of The City. This Lake Is Popular Picnic Spot and Is Frequented By Nature Lovers. The Sewage Water Increases The Capacity Of Local Lake During Monsoon.

Trends in Nursing Education
Authors: Asst. Prof. Beulah Jasmine Rao

Abstract:-Nursing is dynamic by its own way and this dynamism give rise to various trends. Sound empirical knowledge is the base of nursing as in any other profession. This knowledge is the base for all the innovations which in turn evolve as trends in nursing. The trends in nursing education are the cornerstone for the dynamic nature of nursing profession. The article outlines various trends in nursing education with reference to India. The trends are organized under the areas of Curriculum Innovations, Technology & Nursing, Student Population, Clinical Teaching Learning Process, Evaluation System, Quality Assurance, Knowledge expansion & Modes of Education.

Identity based Data Sharing and Profile Identifying For Healthcare Applications in Cloud Storage
Authors: M.Tech.Scholar D.Param Jyothi, Asst. Prof.T. Venkataramana, Asst. Prof. Karamala Suresh

Abstract:-Online social networks (OSNs) have become popular around the world due to its openness. Although cryptographic techniques can provide privacy protection for users in OSNs. Cloud computing and social networks are change the way of healthcare by providing real-time data sharing in a cost-effective manner. However, data security issue is one of the major goals to the extensive application of mobile healthcare social networks (MHSN), since health information is considered to be extremely sensitive. In this paper, we introduce a secure data sharing and profile matching scheme for MHSN in cloud computing. The patients can outsource their encrypted health records to cloud storage with identity-based broadcast encryption (IBBE) technique, and allocate them with a group of doctors in a secure and efficient manner. We then present an attribute-based conditional data re-encryption construction, which permits the doctors to convert a cipher-text into a new cipher-text of an identity-based encryption scheme for specialist without leaking any sensitive information. Further, we provide a profile matching mechanism in MHSN based on identity-based encryption with equality test, which helps patients to find friends in a privacy-preserving way, and achieve flexible authorization on the encrypted health. Moreover, this mechanism reduces the computation cost on patient side.

On Electric Power Supply Chain Model For Three Different Tariff Customers in South East Nigeria
Authors: Osisiogu, U. A., Okafor, C. N.

Abstract:-The study proposed a new model of electric power supply chain networks in the Nigeria situation for three different tariff category customers. The network allows for multiple power generators, transmission, and distribution, retailing and demand customers. The supply chain network introduces retailing of power from distributors to demand customers. We derived the optimality conditions of the decision- makers and proved that the governing equilibrium conditions satisfy a variation inequality problem. The variation inequality problem for a single power generator, single transmission, single distributor, single retailer and a demand customer was used to illustrate the method. The multi start optimization method was used to solve the inequality using specified start up value obtained from the Nigerian Electricity Regulatory Commission (NERC) for residential customers with single phase supply with single meter with consumption on 50KWH and below (R1) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors ; for customers with single phase supply with single phase meter with consumption above 50KWH (R2S) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors ; for customers with three phase supply with three phase meter with consumption below 45KVA (R2T) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors, The result of the analysis showed that the least cost of power regardless of the category of customer is N 469.15 while the highest cost is N 473.32. It found that the highest shadow price was N 978.93 for R1 customers while the least was N 928.61 for R2T customers.

A Survey on Internet of Things
Authors: Research Scholar Deepika. N, Professor Dr.M. Anand

Abstract:-The study proposed a new model of electric power supply chain networks in the Nigeria situation for three different tariff category customers. The network allows for multiple power generators, transmission, and distribution, retailing and demand customers. The supply chain network introduces retailing of power from distributors to demand customers. We derived the optimality conditions of the decision- makers and proved that the governing equilibrium conditions satisfy a variation inequality problem. The variation inequality problem for a single power generator, single transmission, single distributor, single retailer and a demand customer was used to illustrate the method. The multi start optimization method was used to solve the inequality using specified start up value obtained from the Nigerian Electricity Regulatory Commission (NERC) for residential customers with single phase supply with single meter with consumption on 50KWH and below (R1) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors ; for customers with single phase supply with single phase meter with consumption above 50KWH (R2S) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors ; for customers with three phase supply with three phase meter with consumption below 45KVA (R2T) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors, The result of the analysis showed that the least cost of power regardless of the category of customer is N 469.15 while the highest cost is N 473.32. It found that the highest shadow price was N 978.93 for R1 customers while the least was N 928.61 for R2T customers.

Need Ride Friend Carpooling and Chat Using Android System
Authors: I. Piranavanath, Mathula. T

Abstract:-One in every five people in the world has a Smartphone. Use of Smartphone is increasing day by day. The aim of this system is to user using carpooling with messaging android app in the smart phone. This project is about creating a social media application to explore the uses of augmented reality which can be used to improve the user experience in social media. Through the application the users will be able to rate live locations like restaurants, supermarkets, Shopping malls, Arcades and also free places and save live memories in a virtual world created by the augmented reality application. This is going to be very interesting because this social media has these enormous features. The user will feel more lively. They can do useful things through this social media. This will be an android platform. Assume a user wants to go to a place. User can search that place through our social media. Then user will get the list of ratings which were given by his friends. Also when user reaches a place, user can switch on the camera and by our augmented reality application the user can see the friends lively in that specific area. The project will use cloud storage to have a database of the users. It will use Google maps Application program interface (API) in order to get the users locations to the exact point. This application also can understand when the user is entering as well as exiting the place. So while exiting the place the user will get a feedback form to be filled. So that, it will help the user to rate the driver ride.

Structural Properties of Pr1-xSrxFeO3 materials
For Solid Oxide Fuel Cells

Authors: Padigela Srinivas Reddy, V. Prashanth Kumar, Suresh Sripada

Abstract:-Pr1-xSrxFeO3 (0≤x≤0.6) is a cathode material, which are set up by sol-gel method. In the example the powders are framed in the scope of 6000C – 7000C. The Sol-Gel is unit for the examples; these described as single stage GdFeO3 kind of perovskite structure utilizing powder XRD. For the example the Orthorhombic distortion diminishes with expanding x esteem. The decrease of pseudo cubic cross section steady is down to earth with Sr content. The crystallite measure for undoped test is in the range 25nm to 30nm and 55nm to 60nm as-incorporated and burn powders individually. The weight reduction is 3% to 26% and in augmentation of x esteem the weight reduction is diminished for as-synthesized powders.

IOT Based Secured Smart Home Automation System Using Raspberry Pie
Authors: Ansari Huzaifa, Ansari Affan, Shaikh Mohammed Ahmed, Shaikh Adeen Shaikh, Mohammed Ashfaque

Abstract:-This documentation presents a home automation system implemented using the Raspberry pi. This paper is a proof of project for a home that can be controlled remotely through the use of device. A controlled home like this can make life more convenient and also safer. The device monitoring aspect of this project demonstrates the ability of being able to know what is going on with different systems at home which can be used for control and safety. For example, the state of some sensors for intruder detection and the state of different devices like fans or lights at home. It is also demonstrated using a few motors, how one can control different systems at home using the Internet. So, a virtual “switch” available in the cloud UI can be toggled to turn on/off a fan at home. This project has a large scope and can be accommodate with many other systems like smart electronic appliances at home. This documentation describes the project implementing the basic framework to achieve such a connected home. It gives a combination of use of hardware and software in the current implementation of the project, future improvements and scope. This project also adds a CCTV camera at the door for intruder detection.

Review of Prediction of Product Recommendation Using Clustering Technique and Voting Scheme
Authors:M. Tech. Scholar Versha Patel, Asst. Prof. Pritesh Jain

Abstract:- On the Internet, the place the number about Decisions might overpower, there will be need will channel, organize Also adequately pass on vital information so as on alleviate those issue of larger part of the information over-burden, which require made a plausibility issue will enormous numbers Internet client. Recommenders methods work out this issue by glancing through enormous volume for quickly made lion’s share of the information on outfit client with redo substance and administrations. This paper examines the different angles and possibilities for particular expectation procedures secured close by suggestion methods set up with serve concerning delineation a compass to Scrutinize and act in the field of proposal strategies.

Review of Study of Stock Market Prediction
Authors:M.Tech.Scholar Sachine Kumawat, Asst. Prof. Pritesh Jain

Abstract:- OSecurities trade conjecture incorporates predicting future estimation of association stock or other cash related instrument traded on an exchange. Distinctive sorts of trading ought to be conceivable in securities trade. It could be at this very moment trading or even whole deal trading anyway if someone can envision the regard or class of that component, it can yield incredible return for the endeavor done. Going before improvement of automated world, markers continued using paper work procedures like essential and particular examination. Distinctive important particular markers like SMA, EMA, and MACD saw to be uncommonly valuable yet with the happening to PC headways and computations, estimate moved into mechanical area. Specialists started fabricating desire structure using Neural Network, Support Vector Machine, Decision Trees, and Hidden Markov Model. Figure precision really improved using algorithmic methodology. This overview covers diverse traditional as well as developmental data burrowing systems used for securities trade desire.

Identity-based Data Auditing and Hiding for Secure Cloud Storage
Authors:M.Tech. Scholar R. Haritha, Asst.Prof. M. Reddi Durga Sree, Asst.Prof. Karamala Suresh

Abstract:- Cloud computing is one of the significant developments that utilizes progressive computational power and upgrades data distribution and data storing facilities. With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing is proposed to guarantee the integrity of the data stored in the cloud. In some common cloud storage systems such as the electronic health records system, the cloud file might contain some sensitive information. The sensitive information should not be exposed to others when the cloud file is shared. Encrypting the whole shared file can realize the sensitive information hiding, but will make this shared file unable to be used by others. How to realize data sharing with sensitive information hiding in remote data integrity auditing still has not been explored up to now. In order to address this problem, we propose a remote data integrity auditing scheme that realizes data sharing with sensitive information hiding in this paper. In this scheme, a sanitizer is used to sanitize the data blocks corresponding to the sensitive information of the file and transforms these data blocks’ signatures into valid ones for the sanitized file. These signatures are used to verify the integrity of the sanitized file in the phase of integrity auditing. As a result, our scheme makes the file stored in the cloud able to be shared and used by others on the condition that the sensitive information is hidden, while the remote data integrity auditing is still able to be efficiently executed. Meanwhile, the proposed scheme is based on identity-based cryptography, which simplifies the complicated certificate management. The security analysis and the performance evaluation show that the proposed scheme is secure and efficient.

Prediction of Diabetes Mellitus Using Data Mining Techniques A Review
Authors: M.Tech.Scholar Varsha Rathour, Asst.Prof. Pritesh Jain

Abstract:- Data mining strategies are utilized to discover intriguing examples for restorative finding and treatment. Diabetes is a gathering of metabolic illness in which there are high glucose levels over a delayed period. This paper focuses on the general writing review identified with different information digging strategies for foreseeing diabetes. This would assist the specialists with knowing different information digging calculation and technique for the expectation of diabetes mellitus.

Review Paper of Corresponding job on Multi-core Processors
Authors:-M.Tech.Scholar Anil Malviya, Assistant Professor Mr.Pritesh Jain

Abstract:- Multi-focus processor advancement has been enhanced awesomely and it is sensibly extraordinary in execution than single focus processors in this way having the ability to engage estimation concentrated nonstop applications with correct arranging confinements. By and large standard multiprocessor nonstop arranging is stick to Sequential models which slight intra-undertaking parallelism while Parallel models, for instance, Open MP have the ability to parallelize specific areas of assignments, thusly provoking shorter response times when possible. In this paper diverse research papers have been assessed and are named Sequential Real-Time Task based Research and Parallel Real-Time Task based Research. Furthermore unique strategies, for instance, attempted part frameworks, arranging methodologies and systems used are considered for differentiating progressing errand booking in multi-focus processors.

Secure VANET Using Trust Management System
Authors:-M.Tech. Scholar Rakesh Mukati, Asst. Prof. Mr. Pritesh Jain

Abstract:-Sooner rather than later we realize that vehicles will speak with one another to make Vehicular specially appointed system and gives the idea of wise transportation framework. In this paper we displayed the survey of security in VANET. Thusly, a few specialists spoke to the attacks and arrangements in vehicular correspondence we investigated a portion of the security issues and proposed answers for defeated it. We talked about the requirement for hearty Vehicular Ad hoc organizes, which is unequivocally subject to their security and protection highlights. This paper will audit the current attacks in VANET in the point of view approach of security. We likewise gave the arrangements to the specific attack in VANET.

Control of Statcom to Enhance Stable Power System Operation
Authors:-M.Tech.Scholar S. Reddiah Raju, Asst. Prof. P., Asst.Prof. V.Sunil Kumar Reddy

Abstract:-In this paper, two control methods namely adaptive voltage control method and d-q axis control method are proposed to ensure proper operation of static synchronous compensator (STATCOM) to provide an efficient and effective means of controlling power system stability. In the aforesaid control methods PI controller has been used to regulate the constant DC link voltage in the DC link capacitor as well reactive power, grid voltage and current. The simulations are conducted in MATLAB/SIMULINK platform. The performance of the STATCOM is investigated both for normal state and disturbances of the power system network. The obtained results ensure that the STATCOM with the mentioned controller has performed well to maintain power system stability by controlling both bus voltages and reactive power in the power system network.

A Survey of Load Balancing in Cloud Computing
Authors:- M. Tech. Scholar Komal Malakar, Assistant Professor Pritesh Jain

Abstract:-Load Balancing is basic for productive activities in circulated situations. As Cloud Computing is developing quickly and customers are requesting more administrations and better results, stack adjusting for the Cloud has turned into an extremely fascinating and vital research zone. Numerous calculations were recommended to give proficient components and calculations to doling out the customer’s solicitations to accessible Cloud hubs. These approaches intend to upgrade the general execution of the Cloud what’s more, give the client all the more fulfilling and effective administrations. In this paper, we explore the diverse calculations proposed to resolve the issue of load adjusting and undertaking planning for Cloud Processing. We talk about and contrast these calculations with give a review of the most recent methodologies in the field.

A Comparative Study of Delay-Tolerant Network And It’s Various Methods
Authors:- Rohit Hirvey, Ranjan Thakur

Abstract:-Currently the applications along with the research work on the domain of delay-tolerant network has now become very famous these days. Within the delay-tolerant-network there are few storage space is available in each node. Therefore in the absence of the links on the nodes the packets may be stored within the storage space. Delay-tolerant-network is capable to enable the services for communication within the unreachable and mostly in unfriendly areas. Actually the delay-tolerant-network forwarding-algorithms may route the traffic towards the specific nodes to increase the delivery rate and reduces the delays, whereas the traffic required raising these nodes that are now become not useful. In this paper, represent the review on the architecture of the delay-tolerant-network which is discovered at with the some features of the Delay-Tolerant-Mobile-Network routing=protocol within the delay-tolerant-network’s problems.

Analysing of Impact of Code Refactoring on Software Quality Attributes
Authors:-Himanshi Vashisht, Asst. Prof. Sanjay Bharadwaj, Sushma Sharma

Abstract:-Code refactoring is a “Process of restructuring an existing source code.”. It also helps in improving the internal structure of the code without really affecting its external behavior”. It changes a source code in such a way that it does not alter the external behavior yet still it improves its internal structure. It is a way to clean up code that minimizes the chances of introducing bugs. Refactoring is a change made to the internal structure of a software component to make it easier to understand and cheaper to modify, without changing the observable behavior of that software component. Bad smells indicate that there is something wrong in the code that have to refactor. There are different tools that are available to identify and remove these bad smells. Software has two types of quality attributes- Internal and external. In this paper we will study the effect of clone refactoring on software quality attributes.

Review of Image Retrieval System Using Three Level Searching
Authors:-M. Tech. Scholar Saloni Verma, Asst. Prof. Sachine Mahajan

Abstract:-The enormous advanced picture databases are yielded by the across the board of shrewd gadgets alongside the exponential development of virtual social orders. If not combined with effective Content-Based Image Retrieval (CBIR) apparatuses, these databases can be counter-profitable. The presentation of promising CBIR frameworks had been seen a decade ago which advanced applications in different fields. In this publication, an investigation on best in class content-based picture recovery which incorporates hypothetical and observational work is propounded. This work contains distributions that cover parts of research significant to CBIR territory. In other words, unsupervised and administered instruction and mix strategies alongside which the low-level picture visual descriptors have been accounted for. Moreover, difficulties and applications that seemed to convey CBIR explore have been examined in this work.

Survey Paper of Wireless Sensor Network
Authors:-M.Tech. Scholar Akshay Gupta, Asst. Prof. Megha Singh

Abstract:-In recent years there is a quick advancement in the field of Wireless sensor network. This paper gives brief introduction of Wireless sensor associate with its applications in the field of condition, structure checking, keen home watching, Industrial application, prosperity, military, vehicle recognizable proof, blockage control and RFID tag. With movement in WSN, little and simplicity sensor centers end up available, which have limits of Wireless correspondence, recognizing diverse sorts of biological conditions and data getting ready. There are different sorts of coordinating traditions depending on application and framework designing. Guiding traditions give route in the framework and capable multi-skip correspondence. WSNs can be found in various applications like normal native and military by and large which get a handle on enemy interference area, challenge following, calm watching, living space checking, fire acknowledgment and cutting edge.

Dissolved Gas Analysis of Transformer
Authors:-Viral R Avalani, Kishan V Dave

Abstract:-The Dissolved Gas Analysis has been widely used by utilities throughout the world as the primarily diagnostic tool for transformer maintenance. The gas generated in mineral oil of power transformer can be monitored by all conventional methods, online DGA system and by application of various Artificial Intelligence practices. Assessment techniques for judging power transformer conditions and lifespan has been eye-catching. Dissolved Gas Analysis (DGA) has proved to be useful tool for diagnostic of incipient and potential faults in power transformers. This paper discusses pros and cons of the various DGA methods in practice and also deals with an experimental investigation carried out to study relation between gas generation and partial discharge. In the second part, a fuzzy logic based interpretation method (FLI), which is based on fuzzy set theory is described and implemented as an improved DGA interpretation method that provides higher reliability and precision of the fault diagnostics.

Published by:

Wire Transfer / Telegraphic Transfer Details


Dear Author: Kindly use below transaction details for the “Wire Transfer / Telegraphic Transfer”. Transfer amount is mention in your acceptance mail.

Correspondent Bank Details
  • Bank Name: YES Bank
  • Account Number: 011961900001439
  • IFSC Code: YESB0000119
  • Branch Address: MP NAGAR Zone 1 BHOPAL M.P. India
Further Credit To
  • Beneficiary Name:Deng Infotech solutions Pvt LTD
  • Beneficiary Account No: 011961900001439
  • Purpose: Paper / Article Publication Charges
Published by:

Call For Paper International Journal


International Journal IJSRET invite researcher of Science and Engineering field to submit their latest review paper or research paper or study paper or letter or implementation paper. Here Editor has call for paper international journal publication under following points:

  • Paper or article should have innovative title with latest research area content.
  • Paper must have good content with deep understanding of topic
  • Paper should not be highly plagued
  • Proper reference should be used in the paper
  • Papers written in English language are invited

Submit Your Paper  / Check Publication Charges

Paper publication sites when Call for Paper International Journal

Number of question present in authors mind are list below with their answer.

Q1. Validity of international journal?

Ans: Type 8 digit number ‘2395566X’ of journal on www.portal.issn .org, you can get validity and year of publication Open website

Q.2 Impact factor of journal?

Ans: 3.24 is impact factor

3 Review time after submission?

Ans: Normally it takes 3 to 4 days.

4 Jounal Processing fees ?

Ans: Check Journal Processing fees:

5 Jounal paper submission?

Ans: Submit paper through:

6 Journal Increase processing fees as per number of author?

Ans: No, journal do not increase processing fee. Its constant.

7 Journal Increase fees as per number of pages?

Ans: No, journal do not increase processing fee. Its constant.
Published by:

Best Journals To Publish Research Papers


In order to find the research validity of any field researcher publish paper on Journal. But this take to other confusion of finding the best journals to publish research papers. So scholars who have just start there research carrier need to check following points of an journal and find that either journal is good or not.

  • Journal should have ISSN number (It’s a 8 digit Id)
  • Journal should have high Impact factor obtain from various resource
  • Journal should be at-least three year old
  • Journal should Journal should have proper submission form with Email-Id
  • Journal should have reviewer list
  • Journal should have valid Payment Gateway (People ask for person account payment is not good)
  • Communication should be responsive by email or chat
  • Journal should have copyright form and Paper format

Submit Your Paper  / Check Publication Charges

So how can one come to know about this:

Open this site and type 8 digit number of journal: www. portal. issn .org, you can get validity and year of publication.

Be aware of journal who show improper indexing by images or just type name of good indexes only. So Best Journals To Publish Research Papers have following links

Published by:

IJSRET Volume 4 Issue 5, Sep-Oct-2018


Development of Secure Image Transposal Algorithm Using 16 *16 Quantization Table
Authors: Vijay Bhandari, Dr. Sitendra Tamrakar, Dr. Piyush Shukla, Arpana Bhandari

Abstract:–Computerized picture scrambling can make an picture into a totally diverse good for nothing picture amid modification,and it is a preprocessing amid stowing away data of the computerized picture, which too known as data camouflage.Picture scrambling innovation depends on data cover up innovation which permits non-password protection computation for data cover up.Data stowing away innovation driven to a insurgency in the fighting of organize data,since it brought a arrangement of unemployed combat computations,and a part of nations pay a part of considerations on this zone. Organize data fighting is an imperative portion of data fighting, and its center thought is to utilize open organize for private data transference.The picture after scrambling encryption computations is chaotic,so aggressor cannot disentangle it.A few made strides advanced tidemarking innovation can apply scrambling method to alter the dispersion of the mistake snippet in the picture to move forward the strength of computerized tidemarking innovation.Arnold scrambling computation has the highlight of effortlessness and periodicity, so it is utilized broadly in the computerized tidemarking technology.

Enhancement of Thermal Plant Efficiency by Using Double Pipe Heat Exchanger
Authors: M. Tech. Scholar Indrajit Patidar, Asst. Prof. Nilesh Sharma

Abstract:–The heat exchanger section of a thermal power plant uses water as a coolant, which is incapable of extracting the low grade heat input in the heat exchanger section. This results in loss of a major chunk of heat energy from the thermal power plant. However, with the use of a proper coolant in the heat exchanger section, it is possible to utilize the heat available in the heat exchanger. This can be done by introducing a secondary cycle for energy generation along with the conventional primary cycle. Isobutane, with its appropriate physical properties, proves to be a good coolant in the secondary cycle for energy extraction from the low grade heat available in the heat exchanger section. The efficiency of a conventional thermal power plant can be improved from 80% to around 87 – 87.65% by incorporating this change. Although, the paper details the improvement of efficiency in a thermal power plant, same methodology can be used in any steam operated power plant, such as in nuclear power plants, in geothermal power plants, or in solar thermal electric power plants. The improvement in efficiency leads to lesser burden on non-renewable resources, such as coal and nuclear fuel, and also lowers the pollution effects on the environment. Proper practical implementation of the proposed model has the potential to revolutionize the energy generation paradigm of the world.

A Study of Customer Satisfaction with Business-To-Business Customers Model
Authors: Shashanka. B. K

Abstract:– Most benefit looking for associations are at last kept running by cash and the specific retail stores are the same in that. In retail markets the customers are the hotspot for benefits and organizations trying to procure them are continually growing new techniques keeping in mind the end goal to get the aggressive edge that baits the customers in to their stores. At the point when a company offers products and services that satisfies the requirements of the customer and produces extra esteem, satisfaction and saw quality appropriately then the company has the best possibilities for progress. High customer satisfaction is one focused edge a company can have and one reason why it is such a critical piece of a company’s methodology and has seen such a large number of researches and concentrates after some time is its association with gainfulness. The customers for the situation company X comprise of ordinary family unit purchasers and business-to-business customers. X conducts periodical studies that measure the satisfaction of the ordinary family unit buyers yet no research have yet been done to quantify the satisfaction of the business customers. This research will in this manner give new information to X and the aftereffects of this study can be valuable to the company for increasing better outcomes. As per this study the B2B customers are somewhat happy with the services and products of X. The desires for the customers were likewise met great. The most noteworthy factor for the B2B customers to visit in X was observed to be the area of the company, which had a definitive impact to the expenses for the customers.

Comparison Study of Flash & Fire Point of Bio-diesel Produced by Mustard and Soya Bean Oil
Authors: Asst. Prof. Mahesh Chand Saini, Mayank Sharma, Manoj Bhandari, Md. Nazwazish

Abstract:–Consumption of fossil fuel is increasing day by day that results decrease in amount of fossil fuels present on earth. After 30-40 years these sources are in danger of extinction so as to meet the requirement of human beings there is a need of using the alternative source of fuels. One of them which cause as alternative fuel that is derived from the vegetable oils and fatty acids. It is a key source as an alternative fuel. The process of biodiesel production is completed by the trans-etherification process and it is the chemical reaction between oil and alcohol in the presence of catalyst which results separating bio-diesel and glycerin. The process is completed in 2-4 hours and also depends upon the type of vegetable oil. Properties of Bio-diesel are also depends on the used oil. This paper illustrates the comparison between Soya bean and mustard oil Bio-diesel which is followed by different parameter such as Flash & Fire Point. Various ratios of blends of Bio-diesel (5%, 10%, 15%and 20%) are taken. Both edible and non-edible oil are used for producing the bio-diesel.

A Review of Methods of Analysis and Mitigation of Landslide
Authors: Emmanuel Arinze, Paul Chibundu Enyinnia, Aju Daniel Ekan, Anthony Chibuzo Ekeleme

Abstract:–Cities around the world that are located on a hilly and mountainous areas are always faced with the challenge of landslide, which can be disastrous and always result to loss of life and properties when it happens, and large expenditures are being incurred by Governments on the investigation, design and implementation of mitigation and preventive measures to reduce the likelihood of the loss of life and economic losses due to landslides. Landslide analysis can be based on hazard or susceptible. The formal is based on evaluation of probability of a landslide failure within a specified period of time and within a given region, while the later is based on classifying the region into several successive classes with different potentials of landslide. Based on the forgoing this paper is focused on the review of landslide hazard analysis and mitigation. There are four ways to a modern landslide hazard analysis which include Inventory approach, Heuristic approach, Statistical approach and Deterministic approach. Mitigation of landslide is based on the type of landslide, the different types of landslide has its own mitigation method which was discuss in this paper type by type. The four approaches can be applied for regional landslide hazard mapping. All the approaches have their shortcomings. The inventory analysis require a lot of maps which require interpretation, the heuristic analysis require a long- period landslide data, which may be insufficient in length of historical records, incompleteness in inventory and a possible mixing of extreme events, the statistical approach looks better as comparing with the weakness of the other three approach, but there still are some further development needed to predict landslide.

Reversible Image Data Embedding using Modified Histogram Feature
Authors: M. Tech. Scholar Kanchan Sahu, Asst.Prof. Pravin Malviya

Abstract:–With the increase in the digital media transfer and modification of data is very easy. So this work focus on transferring data by hiding in image. In this work carrier image was used to hide data where Low Frequency Region was utilized. Here whole data hiding is done by modified by using histogram feature shifting method. This approach was utilized to the point that hiding information and image can be effectively recovered. Investigation is done on genuine dataset image. Assessment parameter esteems and demonstrates that proposed work has keep up the SNR, PSNR values with high security of the information.

An Improved Approach for Tracking in Maneuvering Target Environment
Authors: M. Tech. Scholar Umesh Kumar Ahirwar, Asst. Prof. Nitin Choudhary

Abstract:–A Modern sensor networks, we need most important parameter is Self-organizing capacity for tracking maneuvering (non-constant) targets. for performance gained lot of attention to point out the control and coordination problem in self-organizing sensor network environment used flocking based methods. In this paper we are these type two well-known algorithms, namely, the Flocking and the Semi-Flocking algorithms. Although these two algorithms have demonstrated promising performance in tracking linear target(s), they have deficiencies in tracking maneuvering targets. Flocking algorithm is applied for tracking the target in maneuvering environment. In this paper we are analyzing the performances of flocking-based algorithms, both with and without the proposed approach, are examined in tracking both linear and maneuvering targets. Experimental results demonstrate how flocking algorithm yields better tracking of maneuvering targets, and how applying flocking concept on the target tracking process to improves the quality of tracking and increases the speed of convergence.

A Review on Different Algorithms for Tracking in Maneuvering Target Environment
Authors: M. Tech. Scholar Umesh Kumar Ahirwar, Asst. Prof. Nitin Choudhary

Abstract:–Self-organizing capacity is the most important need of modern sensor networks; particularly for tracing or tracking maneuvering (non-constant) targets. In this paper we presented the different technique of maneuvering Tracking algorithm & also we are proposing which technique is best for this tracking system. In this research brief literature review of different existing algorithm for maneuvering tracking system and proposed a system for maneuvering tracking system for modern sensor network.

Digital Image Retrieval Using Annotation, CCM and Histogram Features
Authors: M. Tech. Scholar Shalinee Jain, Asst. Prof. Sachin Malviya

Abstract:– As the quantity of web clients are expanding every day. This work concentrate on the retrieval of pictures by using the visual and annotation characteristics of the images. In this work two kind of features are utilized for the bunching of the picture dataset. So Based on the comparability of annotation, CCM and histogram components of the picture bunches are made. For bunching here genetic approach was utilized. Here client pass two kind of queries first was content while other is image, this assistance in choosing suitable cluster for retrieval of picture. Analysis was done on genuine and artificial set of pictures. Result demonstrates that proposed work is better on various assessment parameters as contrast with existing strategies.

Development of Safety and Productivity Correlation for A Rolling and Wire Drawing Factory
Authors: M. Tech. Scholar Kamal Shukla, Asst. Prof. Vijay Shankul

Abstract:– The work productivity of workers in a company is affected by several factors, one of which is occupational safety and health program and there is a significant effect of safety and health program on work productivity of workers either simultaneously or partially. A poor safety standard primarily originates from the belief that safety and productivity are mutually exclusive objectives, one eating away the other. But in practice they are correlated. The knowledge of exact nature of dependence of productivity with safety and health in industry is `therefore highly significant in the context of production. In this project safety and productivity are the two parameters have been focused and the mutual correlation between the two has been analyzed on the basis of the data obtained from the industries various department of safety and productivity and has been presented in the tabulated form by using the data with respect to safety and productivity. The developed correlation is a functional relation between total factor productivity and safety elements and cost of production. Hence, the developed correlation can be used to predict total factor productivity (TFP) from the knowledge of the values of input safety elements and planned cost of production.

Garbage Management for Smart Cities Using Internet of Things
Authors: M. Tech. Scholar Anjali Urmaliya, Dr. Neeraj Shukla

Abstract:– Garbage Management of smart city using “Internet of Things”. In our daily life we produce a lot of waste or garbage as last few years witnessed a tremendous rate of population, and it’s also important to manage that garbage properly generated by peoples. By using Internet of things it will easy to manage all the garbage. I will use some IOT devices for the management of garbage of smart city, smartly. The Devices that will make it complete are “Arduino Uno, Raspberry Pi, ESP8266, MQTT Protocol. It Is will also support the “Swachha Bharat Abiyan” campaign by Prime Minister Of India. The purpose of the mission is to cover all the rural and urban areas of the country to present our country as an ideal country to the world. Waste Management is one of the primary things to solve the problem that the world faces to developing country. The main aim of the work is to develop a smart intelligent garbage alert system to for proper management of garbage.

Controller Analysis of Reaction Wheel System for Counter Torque
Authors: Ye Min Htay, Thu Thu Aung

Abstract:– This work addresses the reaction wheel system (RWS) for a Nano satellite and simulator which shows the function of it. The object is to design flywheels that counteract the disturbance torques experienced by satellite in the harsh space environment and to stabilize the platform of simulator. The performance of reaction wheels is analyzed to achieve the stable for system. The satellite and simulator utilizes three reaction wheels as actuators. The controller is designed to change the rotational speed of reaction wheels to adjust the satellite and simulator in the desired position. The mathematical model of reaction wheel system using angular kinetic equation is developed. Control theory is then applied for a required response that deals with both non linarites in equations and disturbance sources. Simulation of closed loop system shows that all desired specification of closed loop (rising time, settling time and steady state error) are robustly satisfied.

Probing the Effect of Parameters of Wire-EDM on Cutting Speed and Surface Integrity for D2 Steel
Authors: Nitin Kumar, Dinesh Panchal, Naveen Gaur

Abstract:– The indent of alloy steel of high toughness, hardness and strength is proliferating in present era of materials .These materials are used for typical Purpose. As difficulty is encountered in machining of these materials by traditional methods of machining. Wire cut EDM is used to machine them. It has been become an important machining process because it avails an effective way out for generating components made of materials like titanium, zirconium and complex shapes , which are rather difficult to attain by other machining methods. Due to large number of process parameters and responses, a lot of researches have tried to optimize this process. A remarkable amelioration in process efficiency may be obtained by optimization of parameters which recognize the region of censorious process control factors which leads to required response ensuring a lower cost of production.

A Survey on various Techniques of Energy Management in Wireless Sensor Network
Authors: M.Tech.Scholar Prakash Kumar Singh

Abstract:– The availability of sensor devices allow a wide variety of applications to emerge. However, the resource constrained nature of sensors raises the problem of energy: how to maximize network lifetime despite a very limited energy budget. This paper gives a concise study of WSN (Wireless Sensor Network) energy balancing methods proposed by different researchers. Different sorts of requirement of protocols for managing WSN was additionally talked with their significance and limitations. In this study as per working steps of techniques are categorized, so a comprehensive and comparative understanding of existing literature was detailed.

A Survey on Online Social Network Based User Community Identification Techniques and Features
Authors: Asst.Prof.Raju Sharma

Abstract:– As the amount of web customers are extending each day. Presently a user connecting the social personality over the distinctive web-based social networking stages is of basic significance to business intelligence. In this paper, a survey of similarity based user community detection methodologies were discussed for finding the exceptional arrangement of users. Here different features of the social user profiles were identified as per there requirement. So current issues are summarized in the paper for the solution of the work.

GSM Based Gas Leakage Detection System
Authors: Mohit Nankani, Vinay Nagrani, Ajay Mandliya, Jemila Rani

Abstract:– Gas leakage is a major problem with industrial sector, residential premises and gas powered vehicles like CNG (compressed natural gas) buses, cars. One of the preventive methods to stop accident associated with the gas leakage is to install gas leakage detection kit at vulnerable places. The aim of this paper is to present such a design that can automatically detect and stop gas leakage in vulnerable premises. In particular gas sensor has been used which has high sensitivity for propane (C3H8) and butane (C4H10). Gas leakage system consists of GSM (Global System for mobile communications) module, which warns by sending SMS. However, the former gas leakage system cannot react in time. This paper provides the design approach on both software and hardware.

A Study of the Learning Curve of the Japanese Keyboard on Smartphone
Authors: Muhammad Suhaib

Abstract:– Japanese (Nihongo) is an east Asian Language, extensive use of Chinese character called KANJI and Phonetic Characters called KANA (hiragana and katakana). Many people assume Japanese Keyboard on smartphone is difficult to use that’s why I decide to conduct study to determine how easy to learn Japanese Keyboard for new users. Two user with no experience with Japanese keyboard on smart phone were asked to enter some Japanese sentences as fast as they can at least 20 times and same thing was asked to experienced users as well.

Dominance of Artemisia community and Stragalus community in arid area of Iran:True or not?
Authors: Reza E. Owfi

Abstract:– As mentioned in the most of the relevant sources, in other parts of the arid regions of Iran the dominance of theArtemisiaand Astragaluscomunity may vary from an Astragalus species to another species of it, whether individually or in combination. Here are two previous researches on vegetation coverage in two regions of Iran which are located in a group of arid areas and on the other hand, have a large distance from each other: Catchment area of farm Haj Hassan in Yazd province and Maharloo Lake in Fars Province. After examining the two researches, the results of these studies were evaluated and, in the end, analyzed the information obtained from the above studies, which indicates the validity of the aforementioned claim.

Social Security’s Allowances in Nepal and Its Impact on Rural Economy Evidence From Chandrapur Municipality Rautahat
Authors: PhD. Scholar Kirti Raj Subedi

Abstract:– Social security’s allowances program (SSAP) is being popular day by day in Nepal. Nepal’s national social protection program (SPP) aims to control multidimensional deprivations, life cycle risks, and providing people with a basic minimum livelihood. Nepal has launches many social protection program. Nepal have five social security’s allowances program (SSAP) include five schemes targeting: Children of Dalit under-five years of age , Widows and single women over 60 years of age , People with disabilities , Senior citizens over 70 years of age (over 60 years of age in the case of Dalit) , Highly marginalized indigenous ethnic groups (Janajatis). Theses SSAP schemes are managed by the Department of Civil Registration (DoCR) under the Ministry of Federal Affairs and General administration (MoFAGA), and delivered through local governments.The UN has proposed in Sustainable Development goal (SDG) to provide social security’s for all by 2030. (world Bank, 2015).The developing countries are introducing social security’s allowances program with large range with different modalities. Nepal has expending on social security’s 2.3 % of its Gross domestic Product (GDP). Nepal governmenthas providing more than 89 social security’s allowances schemes to the citizens through the various ministry.
Social protection is inevitable for the better lifestyle to the pro poor and the political support also highly acceptable in Nepal but the economic condition and the paying capacity of the government is very low so here is a matter to diabetes how much , to hum should pay by the government. Nepal has just successfully complete the election of three tier government. The social security’s allowances only manage by the federal government and some social protection scheme lunched by the local government. Nepal has several social protection schemes but they have not adequate in term of cash transfer. Lack of integrated social protection policy the cost of government is growing up to manage the social protection program.

Improvement in Cloud Storage Auditing with Verifiable Outsourcing of Secure Key
Authors:M.Tech.Scholar Tanuj Sharma, Asst.Prof. Lakhan Singh, Asst.Prof. Ankur Taneja

Abstract:– Presentation Cloud registering is a current mechanical advancement in the processing field in which for the most part centered around outlining of administrations which can be given to the clients in the same route as the fundamental utilities like nourishment, water, gas, power, and communication. Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been proposed to protect data from those who do not have access. In Existing system, there are following associate problems which are worked on our proposed work AES-256 is quite common and easily available for hacker activity in case it desire to break. Highly indexed data structure is not taken in the Existing system. In this paper we are using a stander SHA-2 algorithm for message key generation and for data encryption used optimized Bluefish algorithm after the completed of these process we also find the proxy server in cloud system. For simulation we used cloudsim a java based simulator.

Analysis of Tuberculosis Surveillance Tools at the Ministry of Health:The Case for Computerise/Mobile Surveillance Systems
Authors:Bernard Rotich

Abstract:– Tuberculosis (TB) is a major global health concern, causing nearly ten million new cases and over one million deaths every year. In Kenya, it remains a major cause of morbidity and mortality affecting a substantial percentage of the population. Early detection of TB through surveillance is an effective intervention measure against Tuberculosis. [The general objective of the study was to investigate how TB Surveillance is done in Kenya. The specific objectives of the study were to: establish the current challenges facing TB Surveillance system, review current state of TB surveillance systems, identify the requirements for TB surveillance system, design and develop a mobile integrated prototype system for TB surveillance Qualitative data was analysed to provide a deeper understanding of user requirements of the system which then were used to design and develop a TB surveillance system using Prometheus agent design methodology. The system was implemented on PHP, MySQL for database and Java Agent Development Framework for multi-agent platform. The designed TB surveillance system enabled the medical practitioner to interact with the patient. The tests included the use of mobile phones to capture data from the remote centres. Usability and functionality tests were performed which indicated that the application was an effective surveillance and responsive tool. Finally the study concluded by pointing out the keys areas of future improvements on the existing system and recommendations for future research.

Digital Energy Meter and Fuel Theft Detection Using PIC Microcontroller
Authors:A Jemila Rani

Abstract:– Today’s world haveso many techniques for measurement of any quantity al fuel.Fuel meter areanalog so that we trying to make it digitized to show the fuel value digitally. In our project we show the amount of fuel present in fuel tank digitally .Also fuel theft is a problem in all over world. In our undertaking we demonstrate the measure of fuel present in fuel tank carefully .Also fuel burglary is an issue in all over world. In our venture if fuel gets robbery then instant message will send to proprietor of bicycle likewise ringer influences commotion so proprietor of bicycle to get mindful. In conventional vehicle framework fuel burglary of bicycle can be maintained a strategic distance from.

Power Generating Low Cost Green Electric Vehicle
Authors:Riddik Adhikari, Subrata Mondal

Abstract:– It is low cost much more efficient than present electric cars. We took the concept of Tesla cars and hybrid car concept for our low cost electric vehicle. We have used the motor generator concept. The vehicle will run on green energy and will emit no harmful gases. Moreover it is an eco-friendly concept. It has no complicated machinery so that the maintained cost is less compared to other ICE (Internal combustion Engine) vehicle. We will replace ICE with Motor generator concept which will help in propulsion of car. Hybrid car are popular in these days but the main drawback is that Hybrid are not eco-friendly as it has ICE along with electric motor, battery and several other electrical components. This concept will be more efficient as compared to other electric, ICE and Hybrid vehicles. Having more millage it will be more efficient than present electric cars which will make this concept the best. Last but not the least the importance of the car is that efficiency will not much more difference with respected to loaded and unloaded condition of the car.

Image Optimization and Segmentation by Selective Fusion in K-Means Clustering
Authors: D. Malathi M.E., Asst.Prof.A.Mathan Gopi

Abstract:– We present a simple, reduced-complexity and efficient image segmentation and fusion approach. It optimizes the segmentation process of colored images by fusion of K-means clusters in various color spaces, in order to finally get a more reliable, accurate and a non-overlapped image. The initial segmentation maps are produced by taking a local histogram of each pixel and allocating it to a bin in the re-quantized color space. The pixels in the re-quantized color spaces are clustered into classes using the K-means (Euclidean Distance) technique. K-means clustering tends to find clusters of comparable spatial extent, while the expectation-maximization mechanism allows clusters to have different shapes and a selective fusion procedure is followed to reduce the computational complexity and achieve a better-segmented image. The parameters considered for selection of initial segmentation maps include entropy, standard deviation, and spatial frequency etc. The performance of the proposed method is analyzed by applying on various images from the Berkeley image database. The result aims at developing an accurate and more reliable image as compared to other methods along with reduced complexity, processing time and hardware resources required for real-time implementation

Image Optimization and Segmentation by Selective Fusion in K-Means Clustering
Authors: M.Tech.Scholar Sonam Shrivastava, Asst.Prof. Priya Jha

Abstract:– As the digital world is growing with various kind of data like text file, image, video. Out of those image plays an important role in different field such as remote sensing, social media, etc. The degradation in image quality may be attributed to absorption and back-scattering of light by suspended underwater particles. Moreover, as the depth increases, different colors are absorbed by the surrounding medium depending on the wavelengths. So maintain the image quality is done by Digital image processing on various issues. This paper give a brief survey of haze and underwater image enhancement techniques for various condition. As environment condition vary from time to time by the presence of fog, dust, water. Image analysis features are describe in this paper with there requirements.

Synthesis Characterization and application of Resins Obtained from Agricultural Waste to Remove Cu (II) from Waste Water
Authors: Mohammad Azam, Dr.Gulrez Nizami, Nida Tanveer,Mohammad Arshad, Sheela

Abstract:– The objective of the work is to a removal of the heavy metal ion of Cu(II) from the wastewater of different industries such as mining and, smelting, plating, brass manufacture, petroleum refining, electroplating industries and Cu- based agrichemicals. In this work, some waste agriculture materials are used as the adsorbent for the elimination of copper particle from the wastewater of Copper plants. Some agricultural materials like rice straw, rice bran, rice husk, rice hyacinth roots, coconut shell and, neem leaves were crushed in roll crusher and then grinded to prepare powdered material and then dried in an oven, then it was used as a copper adsorbent in different pH solutions of copper wastewater. Their resulted solutions were measured by FTIR and some other techniques.

A Review of Factors of Cost Overrun in Developing Countries
Authors: Ijaz Ahmad Khan

Abstract:– The accomplishment of any improvement activities is as well as its convenient fruition within the targeted on funds, with the simplest attainable fine and setting is of great concern. Price invades are perceived as leading confinement in varied development enterprises of developing nations. To take a look at price overwhelm in development endeavor is commonplace worldwide and therefore the development venture in developing nations is not any exemption. Price overwhelm is while not question one in all the most problems in building ventures. The explanations of improvement rate overwhelm might vary from nation to country due to the truth of the amendment in political, cash connected, social, and ecological conditions. This example is extra serious in developing nations wherever these overwhelm a moment surpasses (100%) of the wander planned expense. To dodge price overwhelm, the essential and very central advance is to acknowledge and build up the explanations and factors up to speed for price invades. Thus, this paper is planned to make up the various factors up to speed for improvement rate overwhelm in making international areas which is able to fill in because the manner by that ahead for future add adapting to those invades. This work could be a diagram of the clarifications of the speed invade in several building countries because it has been seen that {each} one in all the clarifications aren’t like each trip in developing worldwide are as albeit a number of them are regular like terrible administration, vacillation of texture prices incorrect texture gauges and monetary fame of the temp.

Total Factor Productivity and Gross Value Addition In Services Sector of India From 2000 To 2010
Authors: Dr. Manish Tongo

Abstract:– Service sector of India has lately played a role of igniter so far as growth rate of GDP is concerned. Post globalization, Service sector alone emerged as a largest contributor to the GDP of India. Earlier by default an agrarian economy of India took a drastic turn and service sector today has occupied a driver’s seat in steering the growth of India economy. This divergence from a product economy to service economy has not only accelerated the growth of India but it certainly has elevated the brand image of India across the world. It won’t be out of place to mention here that before globalization of Indian economy the image of India in the eyes of the developed nation was far more negative than one could conceive of.

A Survey on Frequent Pattern Rules Techniques for Privacy Preserving mining
Authors: M.Tech. Scholar Shivani Pandey, Asst.Prof. Monali sahoo

Abstract:– Information sharing among the organizations is a general movement in a few zones like business advancement and showcasing. As portion of the sensitive rules that should be kept private might be revealed and such revelation of sensitive patterns may impacts the benefits of the organization that possess the information. Consequently the principles which are sensitive must be covered before sharing the information. In this paper to provide secure data sharing sensitive rules are perturbed first which was found various techniques are discussed. Here techniques of privacy data mining was also detailed.

Automatic Irrigation System on Sensing Soil Moisture Content Using PV and GSM
Authors:Rohith Chilumula, Rahul Peddibhotla

Abstract:-Agriculture and Gardening works are not trivial. There is a wide range of crops and plants and many varieties of each plant or crop. Various plants and crops have different requirements for water, fertilizers and sun. Soil ripeness for any strain or planting society is for the most part made a decision by the level of supplements and dampness in it. Various occasions and nursery workers are not ready to sustain the dirt with enough compost or water, while ordinarily just you do it.This undertaking is to encourage ranchers and nursery workers keep up control of the dirt dampness level

Speed Synchronization of DC Motors by Using Microcontroller
Authors: Karthik Reddy Solipuram, Nennuru Gopala Krishna Reddy

Abstract:-In this venture, another control approach for ongoing pace synchronization of numerous enlistment motors amid speed increasing speed and load changes is produced. The control technique is to settle speed following of every motor while synchronizing its movement with other motors’ movements so differential speed blunders among various motors merge to zero. In industry many procedures required speed synchronization of more than one motors required all the while. Speed control of motor is imperative particularly in the fields including mechanical applications, apply autonomy, material factories, and so on. In all these application motor speed synchronization is animate in transport line driven by different motors. Sudden changes in load cause chasing and oscillatory conduct in DC machine. This conduct can be unsafe to the procedure. There are such a variety of strategies which is utilized for controlling the DC machines. Among all these strategy ace slave synchronization is a broadly utilized method. The ADC is accessible in microcontroller chip which make criticism circle. A driver circuit is utilized to drive the motor. In this strategy, the direction of motor’s speed is accomplished by changing the voltage of the motor which is balanced by the obligation cycle of PWM.

Facial Detection Based on K-means and Local Binary Patterns
Authors: M.Tech. M. Muralidhar Reddy, Asst.Prof. G.Varaprasad, Asst.Prof. Karamala Suresh

Abstract:– Face detection and recognition are challenging research topics in the field of computer vision. Several algorithms have been proposed to solve lot of problems related to changes in environment and lighting conditions. In this research, we introduce a new algorithm for face identification or detection. The proposed method uses the well-known local binary patterns (LBP) algorithm and K-means clustering for face segmentation and maximum likelihood to classify output data. This method can be summarized as a process of detecting and recognizing faces on the basis of the distribution of feature vector amplitudes on six levels that is, three for positive vector amplitudes and three for negative amplitudes. Detection is conducted by classifying distribution values and deciding whether or not these values compose a face.

Security and Privacy Issues in EHR Systems Towards Trusted Services
Authors:M.E. G.Kavita, Asst.Prof. K.Bala

Abstract:-As of late saw an across the board accessibility of electronic medicinal services information record (EHR) frameworks. EHR were produced during the time spent treatment in therapeutic focuses, for example, healing facilities, centers, different establishments. With the end goal to enhance the nature of social insurance benefit, EHR could be shared by an assortment of clients, so noteworthy security ought to be delivering to make EHR commonsense. EHR framework not totally settled out the protection challenges. In this paper an orderly writing survey was led the protection issue in EHR and make sense of the utilized security models. Additionally a novel Context-mindful Access Control Security Model (CARE) is proposed to catch the situation of information interoperability and bolster the security basics of human services frameworks alongside the capacity of giving fine-grained get to control.

Reverse Logistic Management in Construction
Authors:Mr. Anish Kanti Bera

Abstract:-Reverse logistics in construction refers to the movement of products and materials from rescued buildings at a new construction site. Given the various facets of the reverse logistics series, there is a large number of studies, but there is no systematic review of literature on this important topic applicable to the construction industry. Therefore, the purpose of this study is to integrate the fragmented body of knowledge on reverse logistics in the construction, with the aim of promoting the concept among the stakeholders of the industry and the wider construction community. Through qualitative meta-analysis, the study synthesizes the findings of previous studies and presents some of the tasks required by industry stakeholders to promote this concept in the context of real interest. First, the research and terminology tendency for reverse logistics has been introduced. Second, it detects the main advantages and constraints of reverse logistics in construction, while providing some tips for using these benefits and reducing these constraints. Finally, it provides future research direction based on the review. Unlike the manufacturing context, due to inadequate RL literature in the construction sector, this could be one of the reasons. Consequently, the knowledge of RL and its applications in the construction sector is limited. To solve this issue, this study attempts to identify and highlight the fundamental aspects of the RL concept, which dramatically affects its adoption and implementation through an integrated review of literature.

Relationship between Stock Prices and Rupee Dollar Parity in India
Authors:Prof. Anchit Jhamb, Ms. Swati Aggarwal

Abstract:-The dynamic linkage between rate of exchange and stock costs has been subjected to extensive analysis for over a decade and attracted goodly attention from researchers worldwide throughout the Asian crisis of 1997-98. The difficulty is additionally necessary from the perspective of recent massive cross-border movement of funds. In Bharat the difficulty is additionally gaining importance within the liberalization era. With this background, the current study examines the causative relationship between returns available market and forex market in Bharat. victimization daily knowledge from March 1993 to December 2002, so to found that causative link is mostly absent although in recent years there has been sturdy causative influence from exchange come back to forex market come back. The results, however, are tentative and that is the needfor any in-depth analysis to spot the causes and consequences of the findings.

Intelligent Spam Detection Microservice with Serverless Computing
Authors:Prachi Mahajan, Snehal Bhoite, Asst.Prof.Abhijit Karve

Abstract:-Today for personal and business purpose most of the users uses email as one of the most important source for communication. The use of email is increasing day by day without being affected by alternative ways of communication such as social networking sites, SMS, mobile applications, electronic messages. As frauds using email classification is increasing due to extensive use of emails, it becomes very important issue to classify mails as fraud or normal mails. The Intelligent Spam Detection System (ISDS) provide automatic way to classify emails as SPAM i.e. fraud mail and HAM i.e. normal mail using multiple machine learning algorithms.

An Analysis of Land Use & Land Cover Mapping Using Geo- Spatial technology A case study of Pat watershed in Jhabua District, Madhya Pradesh, India
Authors:Chetan Singh Hada, Bahul Kumar Vyas, Jyoti Sarup, Dr.D.C. Gupta

Abstract:-Remote Sensing (RS) as an immediate assistant to field, as of late assuming an essential job in the examination and assessed the regular asset in any piece of the world. Quickly changes in land utilize and arrive cover, arrive utilize are regularly thought to be indistinguishable, they are fairly very unique. Land cover might be characterized as the biophysical earth surface, while arrive utilize is frequently formed by human, financial and political effects on the land. Remote Sensing, coordinated with Geographical Information System (GIS), give and helpful instrument to examination of land utilize and arrive cover changes at a territorial level. The geospatial innovation of RS and GIS holds the potential for opportune and cost compelling assessment5 of common assets. The systems have been utilized extensively in the tropics for creating valuable data on backwoods cover, vegetation compose and arrive utilize changes. Accordingly, we have been utilized RS and GIS to contemplate arrive utilize arrive cover changes in Pat watershed, Jhabua region, Madhya Pradesh, India covering a region of around 817.93sq/km. In this view the present work has been taken up to contemplate and evaluate a portion of the regular assets and ecological capability of study territory which is falling in the Survey of India toposheets No: 46I/8, 46I/12, 46J/5 and 46J/9. Under this investigation three topical maps, for example, area delineate, guide, and land utilize and arrive cover maps were readied. The land utilize and arrive cover examination on the investigation region has been endeavored dependent on topical mapping of the zone comprising of developed land, Agricultural land, Forest, Waste land and Water bodies utilizing the satellite picture. The examination presumes that there is a fast development of developed region. Land utilize and arrive cover data, when utilized alongside data on other normal assets, similar to water, soil, hydro-geomorphology, and so on. will help in the best land utilize arranging at the full scale and small scale level.

A Review Article of Micro Grid Power Boosting Technique
Authors: M.Tech.Scholar Chandra Kant Sharma, Prof. Pragati Priya

Abstract:-Energy, especially alternative source of energy is vital for the development of a country. In future, the world anticipates developing more of its solar resource potential as an alternative energy source to overcome the persistent shortages and unreliability of power supply. In order to maximize the power output the system components of the photovoltaic system should be optimized. For the optimization maximum power point tracking (MPPT) is a Promising technique that grid tie inverters, solar battery chargers and similar devices use to get the maximum possible power from one or more solar panels. Among the different methods used to track the maximum power point, Perturb and Observe method is a type of strategy to optimize the power output of an array. In this method, the controller adjusts the voltage by a small amount from the array and measures power, if the power increases, further adjustments in that direction are tried until power no longer increases. In this research paper the system performance is optimized by perturbs and observes method using buck boost converter. By varying the duty cycle of the buck boost converter, the source impedance can be matched to adjust the load impedance to improve the efficiency of the system. The Performance has been studied by the MATLAB/Simulink.

Water Quality mapping using Remote Sensing and GIS- a case study of Pampawa Watershed in Jhabua Dist, Madhya Pradesh, India
Authors:Chetan Singh Hada, Bahul Kumar Vyas, Jyoti Sarup, Dr.D.C. Gupta

Abstract:-Groundwater serves as the main sources of water in the urban environment, which is used for drinking, industrial and domestic purposes and often, it is over exploited. Now these days, the groundwater is facing terrorization due to anthropogenic activities. In this study, groundwater sample collects in pre and post monsoon seasons for total 56 villages from 61 predetermined bore wells and open wells representing Pampawa Watershed in Jhabua District, Madhya Pradesh, India. The water samples analyzed for physico-chemical parameters like TDS, Chloride, Fluoride, pH, Hardness and Turbidity using standard techniques in the laboratory. Also, geographic information system-based groundwater quality mapping in the form of visually communicating contour maps was developed using ArcGIS-version 10.1 software to delineate spatial distribution in physicochemical characteristics of groundwater samples.

Removal of Calcium and Magnesium ions from Ground Water in the Jaffna Peninsula, Sri Lanka by using Chemically Modified RiceHusk
Authors:Anushkkaran. P, Asharp Sharmec. G, Mazenod Denorth .V.A

Abstract:-Water hardness due to the calcium and magnesium ions in groundwater have been a devastating effect to the freshwater in the dry zone in Sri Lanka, mainly in the Jaffna peninsula. Jaffna peninsula depends on ground water as there are no other freshwater sources and the rain fall is not sufficient. Study on the removal of calcium and magnesium ions using rice husk (RH) as a low-cost adsorbent was investigated in groundwater of calcium and magnesium ions in the Jaffna peninsula, Sri Lanka. This study was conducted to evaluate the ground water quality and removal of hardness. Fifteen wells were selected in different regions in Jaffna peninsula for ground water samplings. Impact of operational conditions, such as the dosage amount of rice husk and contact time were analyzed for chemically modified rice husk. Here we used HCl and NaOH to modifying the rich husk by chemically at pH 4 and pH 8 respectively. Statistical analysis revealed that the highest removal of Ca2+ and Mg2+ ions are at pH 4, adsorbent dosage 10 g/L water and 30 minutes of settling time.

Solar PV – Battery Storage with DVR for Power Quality Enhancement

Authors:K.Venkatrami Reddy, P. Chinnaiah, V.Sunil Kumar Reddy

Abstract:-The consumption of electric power is very high due to high invention and more number of non-linear loads. The most of the loads are nonlinear loads, causes the harmonic electric currents in the system. These harmonic currents in turn create system resonance, capacitor overloading, decrease in efficiency, voltage magnitude changes. Power quality has become an increasing concern to utilities and consumers. The power transmitting in a distribution line is needed to be of very high quality. One of the major power quality issues is considered in the distribution system called Voltage sag and it can mitigate with the help of dynamic voltage restorer (DVR). In this paper, Focusing on the new integration of solar PV-Battery based Dynamic Voltage Restorer is implementing in the distribution system to meet the required power and for power quality enhancement. Solar photovoltaic with boost converter is implemented by incremental conductance method to track the Maximum power. The performance of solar photovoltaic, Battery with Dynamic Voltage restorer is simulated under dynamic conditions of the load in MATLAB-SIMULINK software.

Published by:

Publish Research Paper


As young researcher always get trouble for there first paper to publish on International journal. So this article help those researcher to publish research paper. Here we describe each step since from paper writing to final publishing. So you question for

How to publish research paper is resolve?

  • Researcher Need to cover following points in paper (Title, Abstract, Introduction, Literature survey, Problem Identification, Proposed Work, Results, Conclusion References)

  • Check for unique title as similar title may be rejected by journals.

  • Check Plagiarism of the paper by any software, try to reduce plagiarism below 18%.

  • Prepare paper in format like content and heading font size should be same.

  • Select journal as per your mentor suggestion.

  • Submit paper through selected journal website.

  • Check publication cost of the journal.

  • Ask for digital certificate cost or number of author cost.

  • Check minimum number of paper length for publication in mention fees.

  • Wait for acceptance letter once you submit paper.

In this way one can submit paper on journal for publication of research / survey paper.

Submit Your Paper  / Check Publication Charges



how to publish a paper
how to publish research paper
Published by:

IJSRET Volume 4 Issue 4, July-Aug-2018


Modern Manufacturing and Automation Technology Approach for Rubber to produce Tire and Safety With Pollution Control Guide
Authors: Hitender Chhikara, Asst. Prof. Vikas Kumar, Prof. Sanjay Kumar, Research Scholar Vinay Singh

Abstract:–Tire or Tyre Automotive Industry has emerged as an important field of research under manufacturing and automation technology with environment pollution factors in the last few years. Vehicle Tire Automotive Industry is a set of processes that seek to change the automotive market pattern of knowledge processing to enhance both it and its outcomes. Tire Industry is a core concept involving manufacturing and automation technology and various management practices working for the betterment of the Automotive Industry market are becoming more knowledgeable about technology intensive; they are hiring “minds” more than the hands. The tire industry has become one of the critical approaches for the automotive market as a manufacturing sector and business scenarios. So that many definitions and history of describing a vehicle tire, manufacturing and automation technology Industry has been discussed in the first chapter. A literature review of the process has been discussed in the chapter second. The process is affected by various factors that support and hinders the automotive Industry. These factors were implemented in small and medium levels of the working of technology for tire manufacturing process and their importance has been found out in the research. These factors were mentioned in the chapter third. A Modern Manufacturing & Automation Tire Technology, under in process, today used the latest machines technology for manufacturing of tires with help of automation technology. These factors are mentioned in chapter fourth. In chapter five, tire terminology is very important factors discussed for tire performance and accuracy for working on the road or off-road. A tire is depending on raw- material based upon natural, synthetic rubber and others material, so these materials mentioned in chapter six. The tire is related to rubber, in that case, recycling time many types of pollution work in at surrounding, these concepts discussed in chapter seven. It was the first rubber tire developed in the 1800’s after the analysis and various important factors related to work performance. The important parameters are identified and self-interaction matrixes proposed with the help of Interpretive Technology structure modeling which evaluates the inhibiting power of these parameters. This index can be used in the comparison of different factors responsible for manufacturing processes. Eight chapter of the research includes concluding Remarks of the study, Limitations of the study and Scope of the future work.

Modern Manufacturing and Automation Technology Approach for Rubber to produce Tire and Safety With Pollution Control Guide
Authors: M.Tech.Scholar Sanjay Patware, Asst. Prof. S.S. Gawande

Abstract:–The microprocessors in the modern era are propelled by high speed, small area and low power circuits. Dynamic logic circuits are used for high performance and high speed applications. Wide OR gates are used in Dynamic RAMs, Static RAMs, high speed processors and other high speed circuits. In spite of their high performance, dynamic logic circuit has high noise and extensive leakage which has caused problems for the circuits. To overcome these problems Domino logic circuits are used which reduce sub threshold leakage current in standby mode and improve noise immunity for wide OR gates. High noise sensitivity is the result of sub threshold leakage current that flows through the evaluation network. With the advancements in CMOS manufacturing process to scale down into the ultra deep sub-micron regime, the leakage current becomes an increasingly more important consideration in VLSI circuit design. According to the simulations in HSPICE at 90nm and 65nm CMOS technology, the proposed circuit shows the improvement of Average power consumption upto for 8 input OR gate 30% compared existing domino logics. This control circuit produces small voltage at the source of the pull down network in the standby mode. It improves the noise immunity of the domino circuits. The performance of these circuits has been evaluated by HSPICE using a BSIM4.

Modern Manufacturing and Automation Technology Approach for Rubber to produce Tire and Safety With Pollution Control Guide

Authors: Ganesh B. Salomi Ch., Prof. Sri Rami Reddy D

Abstract:–Carbonate producing bacteria have attracted lots of interest as promising natural, environmental friendly novel technique to the improvement of concrete characteristics. Considerable research has been conducted on utilizing microbial induced carbonate precipitation to mitigate several concrete problems such as crack repair, reduction and modification of porosity and permeability. Furthermore, bacterial carbonate precipitation has shown positive influence on compressive strength improvement of concrete. In general, cracks in the concrete structures are early signs of distress which have to be diagnosed properly otherwise the repair of same crack takes place again and again causing loss of time and money. This led to the evolution of self healing concrete. Self Healing Concrete is a term that is used for cement-based materials that repair themselves after the material or structure gets damaged due to some sort of deterioration mechanism. The vast literature review indicated that self healing mechanism can be achieved in various ways, by using certain polymers or by the use of certain species of bacteria. Self healing concrete prepared by using bacteria is called Bio-concrete. There are three approaches for bio-concrete, namely, autogenous, vascular, and capsule-based self-healing. Based on these factors, the present study attempted to interpret the efficiency of Bacillus subtilis as a self healing agent and to study the change in the properties of concrete due to the addition of this species. In the view of this, the primary objectives of this study were to analyze the healing capacity of Bacillus subtilis and the effect of its addition on the compressive strength of concrete. Basic tests such as sieve analysis, determination of specific gravity, compression tests on concrete and serial dilution technique were also performed.

Experiential Investigation on the Stabilization of Expansive Soil with Lime

Authors: San San Myint

Abstract:–Subgrade is an important component in the pavement structure. The performance and durability of pavement also depends on type of subgrade soil and its engineering properties. Expansive soil is one of the major soil deposits of Myanmar. In this research, expansive soil is taken from East and West sides of Mandalay-Madayar Road. Based on Atterberg limit values and particles size analysis, the group symbol of research soil is CL according to Unified Soil Classification System (USCS). The plasticity index of research soil is about 25% and has high degree of expansion. Stabilization is needed for research soil to reduce the expensive potential. Lime increases the optimum water content for compaction, which is an advantage when dealing with wet soil and also increases the strength of clayey soil. In this study, stabilization of expansive soil has been carried out using lime. The plasticity index decreases with increase in lime content which varies from 24.66 to about 10.95 in East side and from 26.5 to about 10.64 in West side. This shows that the degree of expansion decreases to low range when increase in lime content. From the unsoaked CBR test results, the CBR values for natural soil in east and west sides are 44.5 and 20 respectively. When expansive soil treated with lime, the peak value of CBR occurs at 3% and 7% of lime in east side of soil and the CBR value decreases as increase in addition of lime in west side of soil. Therefore, the both sides of soil are suitable for sub- base material in dry condition.Keywords- –Bio concrete, bacteria, bacillus subtilise, Polymers, carbonate producing bacteria.

Augmented & Virtual Reality in Iris Recognition A Modern Approach

Authors: M.Tech.Scholar Rajat Verma, Harshita Mishra

Abstract:–Today, the humanity is living in the domain of technology. This is clearly depicted in this paper. A view to technology is illustrated in this paper. The structure of an eye is also mentioned in this paper. Augmented and Virtual Reality concepts are also mentioned in this paper. All this will certainly contribute in the research sector of biometric dimension. The recognition sector can be of any kind that includes speaker, iris etc. It is expanding at a tremendous rate and also contributing in the dimension of research.

An Innovating Methodology for Measuring The Effective Implementation of OHSMS (Occupational Health And Safety Management System) in Small and Medium Scale Industries

Authors: PG Scholar Saurabh Tiwari, Asst.Prof. Vivek Shukla

Abstract:–The small and medium scale enterprises(SME) have immense growth in the recent years due to the social and economic development of the country, but the safety aspects followed in the SME are very poor, and it becomes highly risky to the employees life, so safety aspects in SME requires huge amount of improvement. In this thesis we propose behavior of small and medium scale industry for safety management. The first target of the industries has to improve the implementation of Occupational Health and Safety Management Systems, especially for small and medium enterprises (SMEs). Safety investments are uncompetitive if compared to other investments, especially for SMEs, due to responsibility attribution management that does not guarantee the exemption of responsibility in the case of unpredictable accidents and to an insufficient incentive policy for enterprises, virtuous in safety investments. For SMEs safety investments are un-profitable also because the individual SME has no real perception of accident risks due both to difficulties in assessing and monitoring the real risk and to the small number of employees. The project has introduced an index (Efficacy Index) to objectively quantify the effective implementation of an Occupational Health and Safety Management System (OHSMS). The paper shows how the index can be practically applied to a company and what kind of information can be collected and processed to determine the effective implementation of the OHSMS. It helps to reduce the accident rate and incident rate of SMEs, highlighting the safety awareness in SMEs from the management level to the employee in order to improve the safety management in SMEs.

Automatic Alcohol Detection and Vehicle Controlling System for Prevention of Road Accidents

Authors: Sunkavalli Raviteja, Aluru Jawahar, P Harsha Vardhini, Y Thejaswi

Abstract:–Our paper proposes a new design to control the fatal road accidents caused due to the drunken drivers with the help of automatic alcohol detection and vehicle controlling unit (ADVCU). Now-a-days, most of the detection model’s senses alcohol but unable to control the vehicle automatically. Here, we developed a new design which prevents the movement of vehicle when the driver was detected with consumption of alcohol. The proposed system determines the amount of alcohol consumed by the driver and if it exceeds the permissible limit, the vehicle will be automatically stopped for stipulated time and message along with vehicle location will be sent to concerned personnel. For this purpose, we have used breath-analyser (MQ3), ATMEGA 328P microcontroller, NEO-7M GPS, SIM 800L GSM Module. The breath analyser senses the level of alcohol present in the breath of driver and acknowledges to Microcontroller. If it is beyond the limit then ATMEGA 328P will drive the signal to GSM, GPS modules and immediately bike engine will be stopped and location from the GPS module will be sent to the person concerned through text message from GSM module.

Natural Language Processing (Nlp) : A Comprehensive Study

Authors: M.Tech. Scholar Rajat Verma

Abstract:–we the people, are living in this modern era of Artificial Intelligence. This is clearly depicted in this paper. The combination of lexical, syntactic, semantic usage in the domain of social networking which is an application of NLP is also mentioned in this paper. Turing Test is also mentioned in this paper. The individual functionalities of lexical, syntactic and semantic analysis is also illustrated in this paper. These all features will clearly increase the usage of all 3 will bring a better tomorrow in the field of Natural Language Processing.

Assessment of Toxicity Index and Consequence Analysis using Aloha in Pharma Industry

Authors: M.Tech. Scholar Rahul Parmar, Asst.Prof. Vivek Shukla

Abstract:– Chemicals are highly hazardous in nature. Starting from the initial stage of manufacturing till the storage of raw chemicals is dangerous to human life. This study has been done in pharma industry where the workers are exposed to hazardous chemicals such as chlorine dioxide, hydrogen peroxide, methanol and the same. The physical and chemical properties of the chemicals are studied. The second step is Checklist analysis where the needed data are gathered which are going to be used for further steps. At next step, to select a highly hazardous chemical, Toxicity Index Calculation is used to rank the chemicals based on the data collected from checklist. After the selection of the hazardous chemical, the next step is to find out what is the next event going to happen if there is a release. For which, Event Tree Analysis (ETA) is used in this step. The next step after finding the final event from ETA is to find the how it is dispersed into atmosphere and how much distance it covered. It can be easily found out using the ALOHA Dispersion Software. The next step is human health and safety loss calculation using the distance found out by software and compensation amount gathered from law. The final step is to make the precautionary & preventive measures to avoid the toxic dispersion into atmosphere and the emergency preparedness should be prepared for what should be done during the toxic release.

Electric Wheel using Non Rotating Tri Spoke

Authors: Shoeb Muzaffar Khan, Sayyad Asef Bashir, Sayyed Sohel Mushiroddin, Vasil Bhisti, Prof.P.D.Kulkarni

Abstract:–The main motto of this review paper is to present the idea and design of electric wheel. There are many electric vehicles are present in market but the innovative thing about our project is the position of all components like motor, battery, controller, generator fixed in wheel. Traveling plays the very important role in human being .as we go forward the need of vehicle increases day by day which in turn increase the now there is need of another substitution of petrol based vehicle which should be durable, efficient, time taking for traveling should be less and also it should be economical and easily available as compared to present transportation and traveling system.

Implemented Image Processing operationsusing Python

Authors: M.Tech. Scholar Rajat Verma

Abstract:–In today’s modern world, many programming as well as scripting languages are present. Python is one of them which has made its dimension particularly clear that it will rule the scenario of computer science. Many popular websites like Google, YouTube and Yahoo all uses the scripting language python. Python is high level language which is closer to the user rather than the machine. The concepts of Object Oriented Programming is clearly mentioned in this paper. Hand Tracking, Eye tracking and face blurring is also mentioned in this paper. Edge detection in Video and image cartooning is also mentioned in this paper. Calibrating and estimating Output is also mentioned in this paper. Maze solver is also there in this paper. This all will definitely contribute to research sector in some extent.

Analysis of Risk and occupational Hazards in Foundry

Authors: M.Tech. Scholar Sailesh Choudhary, Asst.Prof.Vivek Shukla

Abstract:– Foundry business is taken into account to be a high risk space since it contains the venturous operations. manu factory operation use extraordinarily hot temperature method and enormous quantity of nephrotoxic mud and warmth square measure discharged. The processes utilized in metal casting square measure terribly uproarious. inexperienced sand manufactory manufacture endless pollutants within the surroundings – each operating and close surroundings. throughout the operations, staff might doubtless scraped and plagued by unhealthiness issues. Assessing and dominant the chance is completed in step with the aspects of activity health and safety in manufactory. HIRA study was done to spot the hazard in manufactory business. it had been found that Heat, Dust, Noise and activity square measure the main hazards. Heat stress calculation was done. it’s finished with appropriate management live to scale back major hazards found.

Perfect Semi Complete Graphs

Authors: N. Abdul Ali, M. Shajahan, S.Selvaraj, A.Dhanasekaran

Abstract:– As perfect semi- complete graphs play a vital role in tacking defense problem, a complete study of these graphs gives as overall view to apply them in our practical problems. In this paper a further study about perfect semi-complete graph is made. Path connector set, Edge path connector set, Perfect semi complete graphs are introduced and discussed.

A Study on Normality of Meromorphic Functions

Authors: M.Phil.Scholar Sreejil. K., Rajakumari. N.

Abstract:– A heuristic principle attributed to Andr´e Bloch and P. Montel says that a family of holomorphic functions is likely to be normal if there is no nonconstant entire function with this property. We discuss this principle and survey recent results that have been obtained in connection with it. We pay special attention to properties related to exceptional values of derivatives and the existence of fixed points and periodic points, but we also discuss some other instances of the principle.

Topological Groups and Different Types of Measures

Authors: M.Phil.Scholar Suma Joseph, Dr.B.SenthilKumar

Abstract:– Applying Haar’s Measure theory to probability theory to understand and generalize the uniqueness of invariant measure in the situation of risk and uncertainty. If T is finite topological group and X be subgroup of T then µ(X)|µ(T).

A Study on Unique Factorization an Integral Domain

Authors: M.Phil.Scholar Suja Joseph, Dr.B.Senthilkumar

Abstract:– We take a broad view the notion of “unique factorization domain” in the spirit of “half-factorial domain”. We show that new generalization of UFD implies the now well known notion of half factorial domain. As a consequence, we discover that the one of the normal axioms for unique factorization domains is union scientiouslyred undant.That is, we interested in factoring numbers in integral domains so we have to scrutinize distribution, and so this post will begin with a fairly cursory look at the properties of distribution. Then we will introduce the crucial ideas of units and associates. (In the integers, ±1 are units and ±n, for any fixed n, are associates).

A Study on Distance Pattern of Vertices in a Graph

Authors:M.Phil.Scholar Jeffy Johnson, B. Amutha

Abstract:– This paper discuss about the distance pattern of vertices in a graph. The distance between two vertices is the basis of the definition of this graph parameter. There are several distance related concepts and parameters. We also present several fundamental results on open distance pattern uniform graphs and open distance pattern uniform number of a graph.

A Survey on Robust Image Watermarking Techniques and Different Applications

Authors: M.Tech. Scholar Kanchan Sahu, Asst.Prof. Pravin Malviya

Abstract:– Image Watermarking is used for copyright protection, authentication and ownership of the intellectual property. Visual cryptography is technique in which secret data is decomposed into number of shares and distributed to participants, So that only participants can read that data. Image Visual Cryptography is used to keep the data private from unauthorized users. Here detail survey of different image watermarking techniques used by various researcher are detailed. Various properties of the image data hiding was explained.

Fuzzy Based Electric Springs for Distributed Voltage Control
Authors: Asst.Prof.V.Sunil Kumar Reddy, M.Tech.Scholar E.Subramanyam

Abstract:– Electric spring which was developed recently has become the effective means of enhancing the load voltage regulation and stability of the system. This paper deals about the use of electric spring for distributed voltage control. The basic idea behind this is to maintain the constant voltage across the critical (C) loads by varying the power consumption of non-critical (NC) loads with the help of electric springs. A comparison is made between distributed voltage control using electric spring and general single point STATCOM control in terms of reactive power handling capability noncritical load voltage variation.A low-voltage single-phase power system with different types of loads has been built for the realization of electric springs. Simulation results show the effectiveness of electric springs in maintaining good voltage regulation and lead to demand side response.

Study of user’s behaviour in Structured E-Commerce Websites
Authors: M.Tech.Scholar B. Thejaswini, Asst.Prof.Reddi Durga Sree, Karamala Suresh

Abstract:– Online shopping is becoming more and more common in our daily lives. Understanding users’ interests and behavior is essential in order to adapt e-commerce websites to customers’ requirements. The information about users’ behavior is stored in the web server logs. Nowadays, the growth of World Wide Web has exceeded a lot with more expectations. The internet is growing day by day, so online users are also rising. The interesting information for knowledge of extracting from such huge data demands for new logic and the new method. Every user spends their most of the time on the internet and their behaviour is different from one and another. Web usage mining is the category of web mining that helps in automatically discovering user access pattern. Web usage mining is leading research area in Web Mining concerned about the web user’s behaviour. In this paper emphasizes is given on the user behaviours using web server log file prediction using web server log record, click streams record and user information. Users using web pages, frequently visited hyperlinks, frequently accessed web pages, links are stored in web server log files. A Web log along with the individuality of the user captures their browsing behaviour on a website and discussing regarding the behavior from analysis of different algorithms and different methods.

A Study on Normality of Meromorphic Functions and Discrete Exceptional Sets
Authors: M.Phil.Scholar Sreejil. K., Rajakumari. N.

Abstract:–We consider a class of Normality of meromorphic functions, denoted by K in this paper, which are meromorphic outside a compact and countable set Q (f), investigated by P. Bolschin his thesis in 1997. The set Q (f) is the finish of isolated indispensable singularities. We review main definitions and properties of the Fatou and Julia sets of functions in class K. It is studied the role of Q (f) in this context. Following Eremenko it is defined escaping sets and we prove some results related to them. For instance, the dynamics of a function is extended to its singularities using escaping hairs. We give an example of an escaping hair with a wandering singular end point, where the hair is contained in a wandering domain of f ∈ K.

Analysis of Performance Metric of FinFet Based SRAM Cell
Authors: M.Tech.Scholar Meenakshi, Raghwandra Singh

Abstract:– For molecules to be used as components in molecular machines, methods that couple individual molecules to external energy sources and that selectively excite motion in a given direction are required. Significant progress has been made in the construction of molecular motors powered by light and by chemical reactions, but electrically driven motors have not yet been built, despite several theoretical proposals for such motors. Here we report that a butyl methyl supplied molecule adsorbed on a copper surface can be operated as a single-molecule electric motor. Electrons from a scanning tunneling microscope are used to drive the directional motion of the molecule in a two-terminal setup. Moreover, the temperature and electron flux can be adjusted to allow each rotational event to be monitored at the molecular scale in real time. The direction and rate of the rotation are related to the chiralities of both the molecule and the tip of the microscope (which serves as the electrode), illustrating the importance of the symmetry of the metal contacts in atomic-scale electrical devices.

Health Risk Assessment of Heavy Metals in Water Samples from Hand Dug Wells in isoko Local Government Areas, Delta State, Nigeria
Authors: K. Emumejaye , Solomon U. Edogho

Abstract:– Water is of major importance and is intensively exploited for domestic and industrial uses. Some hand dug wells in Isoko South and North local government areas of Delta State were analyzed for heavy metals using the Atomic Absorption Spectrophotometer (AA320N). For the samples analyzed, Iron, zinc, nickel, chromium and lead concentration range were 0.001 – 0.743mg/l, 0.001 – 0.105mg/l, 0.001 – 0.050mg/l, 0.001 – 0.062 and 0.001 – 0.053mg/l respectively. All water samples were within the WHO and SON permissible limits and fit for drinking with the exception of few wells. Also, the estimated health quotient for Fe, Zn, Ni, Cr, and Pb were less than the safety threshold of 1 except Fe in sample from well2 in Oleh that is 3. Although, these values are relatively low, exposure through the regular consumption of well water in the study area over a long period of time may pose potential health issues to the population. It is recommended that relevant authorities should help to enlighten the people on the necessity for treatment of the water before they can be used for drinking and domestic purposes.

Optimization of a LED Heat Sink using Multi Objective Genetic Algorithm and Computational Fluid Dynamics
Authors: M.Tech.Scholar Suresh Babu, Manjunatha A, Dr.M.Shivashankar, Vijay Kumar Mishra

Abstract:– Light Emitting Diode (LED) devices generate excessive heat during its operation, dissipation of this heat to surroundings is essential for efficient operation of LED unit. Excess of heat from LED unit is dissipated by Heatsink (fins). The volume of the Heatsink should also be as minimum as possible to suit the compact design structure of modern electronic component. In order to obtain the optimal structure size of Heatsink, multiple geometric design parameters that influence the performance of Heatsink are analysed by combining the evolutionary algorithm with computational fluid dynamics. The influences of the geometric variables on the two objective functions are first analysed by commercial code CRADLE scSTREAM through the various samples of design parameters generated by the design of experiments with the help of commercial optimization code EOopti. Using the surrogate model and Multi-Objective Genetic Algorithm (MOGA) the Pareto-optimal solutions are generated. The competitive relationship between the objective functions is depicted in the Pareto front. The values of objective functions obtained from the Pareto front are validated with numerical analysis. The results obtained are within 5% of numerical error. The Pareto solution of objective function values, LED temperature of 65.2474ᵒ C and Heatsink volume of 4.53492 x 10-5 m3 is found to be better solution to the application among the Pareto solutions, which has better trade-off relationship with both the objectives.

Analysis of Customer’s behavior in E-commerce website
Authors: M.Tech.Scholar M. Bhavana, Asst.Prof. T.Venkatarammana, K. Suresh

Abstract:– Online shopping is becoming more and more common in our daily lives. Understanding users’ interests and behaviour is important in order to adapt e-commerce websites to customers’ requirements. The information about customers’ behaviour is stored in the web server logs. The analysis of such information has focused on applying data mining techniques where a rather static characterization is used to model users’ behaviour and the sequence of the actions performed by them is not usually considered. Therefore, incorporating a view of the process followed by users during a session can be of great interest to identify more complex behavioural patterns. To address this problem, this paper proposes a linear-temporal logic model checking approach for the analysis of structured e-commerce web logs. By defining a common way of mapping log records according to the e-commerce structure, web logs can be easily converted into event logs where the behaviour of users is captured. Then, different predefined queries can be performed to identify different behavioural patterns that consider the different actions performed by a user during a session. Finally, the usefulness of the proposed approach has been studied by applying it to a real case study of e-commerce website. The results have identified interesting findings that have made possible to propose some improvements in the website design with the aim of increasing its efficiency.

Test Suite Minimization and Parallel Scheduling
Authors:M.Tech.Scholar Shammi, Asst.Prof.Nitin Bansal

Abstract:– Testing is a vital but luxurious task vital for the assembly of elevated quality software. As such, there is outstanding possible for each useful method that enables the detection of extra faults alongside manipulated software assessing funds. One assessing strategy is to orient the assessing regimen concerning concrete, attainable criteria. Regression assessing is one of the vital maintenance hobbies, but it needs a outstanding deal of period and effort. Often, software firms have pressures alongside period and budget, so luxurious and time-consuming regression assessing might be a main burden for them. To vanquish these design and cost-related concerns alongside regression assessing, countless researchers have counseled assorted price competent regression assessing methods in particular, examination case prioritization methods have been actively learned because they furnish appealing benefits, such as flexibility for testers who demand to adjust their assessing efforts for the manipulated period and budget. The Counseled Examination case Minimization methods endeavor to design examination cases in an killing order according to given criterion. The main intention of this Minimization is to rise the likelihood that if the examination cases are utilized for regression assessing in the given order, they will extra closely encounter the goal than they should if they were gave in a little supplementary order.

Disruptive Analysis of opportunities for block chain and Distributed Ledgers in Telecom Industry
Authors: Deepanshu Rathi, Sushant Kumar, Suraj Singhal, Shivjeet

Abstract:– Block chain technology has huge opportunities in many industries and contexts. To a large degree, its trajectory will be driven by sectors like Financial services, international shipping and healthcare. But that will bring along telecoms with it – and there are also numerous signs of “grassroots” effort by the communications industry, especially when linked to new areas such as IoT.This fragmentation of effort also means that multiple vendors, integrators and block chain platforms (private, but also potentially public block chains) are likely to be relevant.

Assessment of Heavy Metal Concentration in Surface Water in Evwreni Town, Delta State
Authors: B.T.Sawere , K. Emumejaye

Abstract:– This study was designed to determine the concentration of heavy metals in samples of surface water collected randomly from within and around Evwreni Town, Delta state. Ten samples of the surface water were collected and taken to the laboratory for physicochemical properties analysis. The pH value ranged between 6.0 to 6.5. the Conductivity, between 106 to 217µs/cm, TDS was 61.3 to 87.9 and TH ranged between 84.1 to 143. The heavy metal concentration were as follows: Pb ranged from 0.001 to 0.005,Cu from 0.3 to 0.5, Fe from 0.4 to 0.9, Zn 0.2 to 0.6, Cr5 0.01 to 0.05 Co. from BDL to 0.04 and Ni from 0.01 to 0.04. All the concentration values for the heavy metals were lower than the set maximum acceptable concentration by WHO.

An Improve Revocation Mechanism Using Public-Key Concept with Validation for Delay Tolerant Networks (DTN)
Authors: M.Tech.Scholar Ritika Ujjainiya, Khandelwal

Abstract:– Delay –disruption Tolerant networks are sparse wireless network which is recently being used by the existing /current network for the purpose to connect devices or the underdeveloped area of the world that works in challenging environment. Network security protocol is always required in any of the secure area, such as military. Delay-disruption Tolerant networks are sparse wireless network which is recently being used by the existing /current network for the purpose to connect devices or the underdeveloped area of the world that works in challenging environment. Network security protocol is always required in any of the secure area, such as military. In DTN there majority of time does not exist the total path from resource to target which is leads to the difficulty of how to route the packet in such environment. Routing in such network is very difficult and for that different routing protocols are developed. In this work we discuss about various routing Strategy. DTN requires mechanism to authenticate messages at each node before forwarding it in the network. So, certificate revocation lists (CRLs) being distributed in DTN network will need to be authenticated and validated for issuer certificate authority (CA) at each node. In this study we work on CRL and update public-key collision in hash table is replaced by secure hash function algorithm SH2 with proper validation by CA. and improve network packet delivery ratio, average latency and throughput. For implementation we use the one simulator.

A Survey on Privacy Preserving Mining Features and Techniques
Authors: M.Tech.Scholar Deepa Agarwal, Asst.Prof. Jayshree Boaddh

Abstract:– The daily use of the word privacy concerning secure data sharing and analysis is commonly imprecise and should be dishonest. The branch of study that embody these privacy considerations are referred as Privacy Preserving Data Mining (PPDM). So these papers focus on this problem of increasing the robustness of the data. Here various approaches adopt by researchers are detailed with their field of security. Some of issue related to the papers is also discussed. Various approaches of association rule mining are explained for finding the or hiding the hidden information as.

A Study on Satisfaction level of Recruitment Training and Development programmes practiced among faculty members with special reference to T.john group of institutions, Bangalore
Authors: Saniya Bahar, Associate Professor Dr.Soniya K

Abstract:– The present study investigates that the Recruitment, Training and Development and its impact towards Job Satisfaction with special reference to T John Group of Institutions, Bangalore. The Recruitment, Training and Development are the elements of Human Resource Management which is predominantly worried about individuals at work and with their relationship inside the association. Enrollment is the way toward drawing in people on an auspicious premise, in adequate numbers and with fitting capabilities. Occupation fulfillment might be characterized as a pleasurable positive enthusiastic state coming about because of the evaluation of one’s activity or employment encounters. It is in this manner vital to have a decent comprehension of a person’s aggregate identity and esteem framework so as to comprehend and portray his/her activity fulfillment. The Training and Development programs insufficiencies in representatives. Preparing makes the representatives flexible. Preparing is the nerve that does the trick the nerve of familiar and smooth working of work which helps in improving the nature of work life of representatives and hierarchical improvement as well. Improvement is a procedure that prompts subjective and additionally quantitative headways in the association, particularly at the administrative level; it is less worried about physical aptitudes and is more worried about information, qualities, mentalities, and conduct notwithstanding particular abilities. Thus, improvement can be said as a ceaseless procedure while preparing has particular regions and goals. Along these lines, each association needs to examine the part, significance and focal points of Recruitment, Training and its positive effect on Development for the development of the association.Preparing suggests valuable advancement in the hierarchical intentions in ideal improvement of nature of work life of the representatives. These sorts of preparing and advancement programs help in enhancing the workers conduct and disposition towards the activity and furthermore inspire their resolve. Thus, the recruitment procedures practiced in the organization and the behaviour and attitude of the HR executive towards the applicants, the training and development programmes of the selected applicants/employees are important aspects which are needed to be studied and focused on from the organizational perspective. This paper focuses and analyses the literature findings on the job satisfaction of the faculties based on the HR Department’s contact with them, the satisfaction level of attending the different training programmes held at T. John Group and the participation and its impact on the faculties for various development programmes.

Internet of Things (IoT) Challenges and Applications
Authors: Asst.Prof.Rohit Tiwari, Asst. Prof. Monika Kohli

Abstract:– The Internet can be taken as a prodigious amalgamation of the powers of a system having Hardware and Software, as they say, you may like it or dislike it, but you cannot ignore the Internet. The Internet is said to be one of the most remarkable inventions of its time and it is the most used form of intercommunication, be it person to person or person to the machine. But there is one more form of intercommunication, getting popular nowadays, is Machine to Machine, wherein machines at both sides are not explicitly supervised by a person at that very time. The Internet of Things (IoT) is behind the evolution of this very form of intercommunication and also works as the backbone technology for the same. This research paper is an effort by the researchers to put some light on some of the most fundamental aspects of this phenomenal technology known in the world of technology, as the Internet of Things (IoT).

A Study on Topological Groups and Haar Measures
Authors: M.Phil.Scholar Suma Joseph, Dr.B.Senthil kumar

Abstract:– Compact right topological groups arise in topological dynamics and in other settings. Following H. Furstenberg’s seminal work on distal flows, R. Ellis and I. Namioka have shown that the compact right topological groups of dynamical type always admit a probability measure invariant under the continuous left translations; however, this invariance property is insufficient to identify a unique probability measure (in contrast to the case of compact topological groups). We amplify on the confirmations of Ellis and Namioka to show that a right invariant probability measure on the compact right topological group G exists provided G admits an appropriate system of normal Subgroups, that it is uniquely determined and that it is also invariant under the continuous left translations. Using Namioka’s work, we show that G has such a system of subgroups if topological centre contains a countable dense subset, or if it is a closed subgroup of such a group.

Investigation of the Bike Wheel Rims With Modified loop Wheel Reinvents
Authors: M.E.Scholar Shweta R. Chandure, Dr. S. M. Kherde

Abstract:– In today’s world, Bicycles are the most favorite choice when it comes to causes like health, pollution, and environment. Several researches have been done in order to make the ride comfortable. Distinctive sorts of cycles have been produced for different applications like Commuter Bikes, Mountain Bike, and Racing bicycle. This undertaking report introduces the Loop wheel which is outlined to such an extent that the suspension framework is coordinated inside wheel for higher stun engrossing execution and better comfort. Loop wheels offer you a smoother ride. Circle wheel springs are generally comprised of a steel material precisely created to offer ideal pressure and horizontal soundness and quality and strength. The three circles in each wheel work along as a self-amending framework. This spring framework between the center point and the edge of the wheel gives suspension that constantly acclimates to uneven landscape padding the rider from anomalies in the street wheel. The spring design allows the torque to be exchanged easily between the center point and the edge. In this project report loop wheel manufactured using C20 steel material and the analysis is done on ANSYS Workbench R15 to determine the stress developed during forces acting on wheel, maximum deflection, principle stresses.

Development of an Efficient and Secure Image Transposal Algorithm Using 16 *16
Quantization Table

Authors: Vijay Bhandari, Dr.Sitendra Tamarkar, Dr. Piyush Shukla

Abstract:– In later a long time, different mystery sharing plans for computerized pictures have been created in arrange to advance communication security. Past strategies in the writing have made endeavours efforts endeavours to accomplish the merits properties for a great mystery picture transposing such as execute (k,n) limit, basic recuperation, no pixel development, the produced covert image are important, the arrange of pictures is elective and lossless recuperation of the mystery image. To the leading of our information, no past mystery sharing scheme accomplishes all the over properties with great quality of important pictures. In this paper, we proposed puzzle image montages based on data stowing away hypothesis to make stride the quality of important pictures with lower computation and great expansibility.In the light of, the proposed plans have the important points of lossless and elective arrange recuperation and no pixel development expansion extension development.This is observing with past advance appear the execution of the planned conspires. The calculations displayed permit distinctive aligned of protection for the data covered up in the covering-documen.

An Online Based Question and answer system in Cloud Environment
Authors: M.Tech.Scholar P. Thilothama, Asst.Prof. K. Suresh

Abstract:– Question and Answer (Q&A) systems play a fundamental role in our daily life for information and knowledge sharing. Users post questions and choose questions to answer in the system. Due to the rapidly growing user population and the number of questions, it is not likely for a user to stumble upon a question by chance that they can answer. Also, humanity does not encourage all users to provide answers, not to mention high quality answers with a short answer. The major objective of this manuscript is to develop the performance of Q&A systems by dynamically forwarding questions to users who are proficient and willing to answer the questions.Social Q&A leverages the social network properties of common-interest and mutual-trust relationship to identify a reader through friendship, who are more likely to answer the question, and enhance the user security. We also improve Social Q&A with safety measures and efficiency enhancements by protecting user privacy and identifies, and retrieving answers automatically for recurring questions. We describe the architecture and algorithms, and conducted complete large-scale simulation to evaluate Social Q&A in comparison with other methods. Our results suggest that social networks can be leveraged to improve the answer quality and reader’s waiting time. We also designed a real web application of Social Q&A, and analyze the Q&A behavior of real users and questions from Social Q&A system.

A Survey on Image Retrieval Approaches with Features Utilization
Authors: M..Tech.Scholar Shalinee Jain, Asst.Prof. Ravi Gedam

Abstract:– Image search refers to finding the precise images related to the user inquiry. Image re-ranking is an efficient way for web-based image search. In image re-ranking, users' intention is captured by one-click on the query image. This assists in providing better search results to the users. This paper presents survey of various techniques which are used for image identification was utilized uptil now is condensed with benefits and drawbacks of these prior proposed work. Here various visual image features are also explained for relevant image detection. Firstly it introduces the object queries which
gives result images specific to some kinds of objects and retrieval models.

A Review Transformer soft Computing Ann, Svm and Genetic Algorithem
Authors: M.Tech.Scholar Sanjay Varfa, Prof.Khushboo Nagar

Abstract:– Transformer soft computing has a very important in the power system such as energy consumption demand Soft computing (ECDF) and peak Transformer Soft computing (PLF). It is a useful tool for a unit commitment and fuel reserve planning in power system. The Transformer demand is depended many variables like industrial index, consumer price index, fuel price, salary index, money exchange, temperature, humidity, and wind speed. Transformer forecast can be classified into four differential types. Very short term Transformer soft computing have period time in a minute, it is importance for real time operation. Short-term Transformer soft computing have period time in a minute to three months, it is importance for unit commitment and operation. Mid-term Transformer soft computing have period time in three months to three years, it is importance for fuel reserve planning and unit commitment. Finally, Long- term Transformer Soft computing have period time in three years to not over fifteen years, it is importance for generation and power plant planning. In this research will offer the energy consumption demand forecasts. It is a very important for fuel reserve planning and unit commitment in power system.

Privacy Protection and Intrusion Avoidance for Patient Medical Data Sharing in Cloud Computing
Authors:M.Tech.Scholar B.Siva Kumar Reddy, Asst.Prof.K. Suresh, Asst.Prof.K. Suresh

Abstract:– With the popularity of smart electronic devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing chain of medical data mainly includes data collection, data storage and data sharing, etc. Traditional healthcare system often requires the delivery of medical data to the cloud, which involves users’ sensitive information and causes communication energy consumption. Practically, medical data sharing is a critical and challenging issue. Along these lines in this paper, we develop a novel human services framework by using the adaptability of cloudlet. The elements of cloudlet incorporate security assurance, information sharing and interruption location. In the phase of information accumulation, we initially use Number Theory Research Unit (NTRU) technique to scramble client’s body information gathered by wearable gadgets. Those information will be transmitted to close-by cloudlet in a vitality productive form. Also, we introduce another trust model to assist clients with selecting trustable accomplices who need to share put away information in the cloudlet. The trust demonstrate additionally causes comparable patients to speak with each other about their illnesses. Thirdly, we partition clients’ therapeutic information put away in remote billow of healing facility into three sections, and give them appropriate insurance. At long last, keeping in mind the end goal to shield the medicinal services framework from malignant assaults, we build up a novel cooperative interruption discovery framework (IDS) strategy in view of cloudlet work, which can viably keep the remote social insurance huge information cloud from assaults. Our examinations show the viability of the proposed conspire.

Evaluation of Hazards by Event Tree Analysis and Assessment of Toxicity Index using Aloha In Pharma Industry
Authors: M.Tech.Scholar Rahul Parmar , Asst.Prof.Vivek Shukla

Abstract:– Chemicals are highly hazardous in nature. Starting from the initial stage of manufacturing till the storage of raw chemicals is dangerous to human life. This study has been done in pharma industry where the workers are exposed to hazardous chemicals such as chlorine dioxide, hydrogen peroxide, methanol and the same. The physical and chemical properties of the chemicals are studied. The second step is Checklist analysis where the needed data are gathered which are going to be used for further steps. At next step, to select a highly hazardous chemical, Toxicity Index Calculation is used to rank the chemicals based on the data collected from checklist. After the selection of the hazardous chemical, the next step is to find out what is the next event going to happen if there is a release. For which, Event Tree Analysis (ETA) is used in this step. The next step after finding the final event from ETA is to find the how it is dispersed into atmosphere and how much distance it covered. It can be easily found out using the ALOHA Dispersion Software. The next step is human health and safety loss calculation using the distance found out by software and compensation amount gathered from law. The final step is to make the precautionary & preventive measures to avoid the toxic dispersion into atmosphere and the emergency preparedness should be prepared for what should be done during the toxic release.

A Review Article of FPGA ALU Unit Design Based on GA
Authors: M.Tech.Scholar Sakshi Samaiya, Asst. Prof. Anupreksha Jain

Abstract:–The paper primarily deals with review for the construction of arithmetic Logic Unit (ALU) using Hardware Description Language (HDL) using Xilinx Vivado 14.7 and implement them on Field Programmable Gate Arrays (FPGAs) to analyze the design parameters. ALU of digital computers is an aspect of logic design with the objective of developing appropriate algorithms in order to achieve an efficient utilization of the available hardware. Speed, power and utilization of ALU are the measures of the efficiency of an algorithm. In this paper, we have simulated and synthesized the various parameters of ALUs by using VHDL on Xilinx Vivado 14.7 and Basys 3 Artix 7 FPGA board.

Distance Based Accident Avoidance System Using Arduino
Authors: M.Tech.Scholar Shraddha Boshat, Asst. Prof. K. Priyanka Sahu, Asst. Prof. Shubham Yadav

Abstract:–In this paper, we present another system in car innovation about how to forestall street mishap on India in these we keep 10 meter remove between one vehicle and another vehicle, with the goal that the vehicle don’t crash or cause any activity issue. The point of the framework is to avert mischances mostly because of not knowing the accompanying separation (i.e., 5m) between one vehicle and another vehicle. The proposed framework contains a thought of having security while turning around a vehicle, recognizes any question inside the accompanying separation, and presentations the separation between one vehicle and another vehicle to the driver utilizing LCD. We have utilized ultrasonic sensors to distinguish any vehicle on both front and posterior of our vehicle. This framework is additionally utilized as a part of vast crane which is principally worked in harbor zone. On the off chance that the auto achieves 10 meter, green shading light will gleam. At 8 meter separate yellow shading light will shine. When it achieves 5 meter remove red shading light will gleam. The separation is likewise demonstrated to the vehicle driver. By this proposed framework the security is kept up on swarmed zones and in vehicle turning around process.

A Review Article of Instrumental Amplifier 16 Bit Pipelining ADC
Authors: M.Tech.Scholar Meenu Jain, Asst. Prof. Anupreksha Jain

Abstract:–Analog to digital converter is the important component in signal processing and communication system. It is a mixed system which converts the analog signals into the digital signals for transformation of sensor data. There are many types of ADC’s available such as pipeline ADC, successive approximation ADC, delta sigma ADC etc. In present day CMOS technology the flash ADC is composed by utilizing the dynamic method, it reduces the power, and delay. A flash ADC is extremely valuable for fastest speed operations when it is compared with the other ADC architectures. Comparator and Encoder are vital part of flash ADC. This paper presents review of Efficient Low Power High Speed Flash ADC Techniques.

Measure the Dynamics of Malaria Transmission Using Entomological Approaches at Natitingou, Northern-East of Benin
Authors: Yadouleton Anges, Aïkpon Rock, Klotoe-Jean Robert, Agbanrin Ramziyath, Tchibozo Carine, Ahissou Fabrice, Houndeton Geraldo, Agolinou Achaz, Kpodo Edwige, Kpodjedo Jeanne, Akogbeto Martin

Abstract:–To evaluate the level of malaria transmission at Natitingou Northern-East of Benin, a cross sectional entomological study was carried out from April 2016 to March 2017 in urban and rural areas of this city. Adult mosquitoes were collected in both areas by Human Landing Catch and Indoor Pyrethrum Spray Catches (PSC). Entomological parameters like the human biting rate (HBR ; the number of mosquitoes biting a person during a given time period (bites/p/t, time being night, month or year); the Circunsporizoite protein (CSP) rate (CSP; the proportion of mosquitoes found with Plasmodium falciparum CSP over the total number of mosquitoes tested and the Entomological Inoculation Rate (EIR; the number of infective bites of anopheline per person per unit of time (bi/p/t) and calculated as the product of the HBR by the CSP rate) were evaluated in the city. A total of 21,018 mosquitoes were collected between April 2016 and March 2017. Culex Spp was the dominant and represented 82.08%. Anopheles spp which contributed to malaria transmission represented 17.09%. The remaining (0.8%) were Aedes spp and Mansonia spp populations. Moreover, the highest bites of An. gambiae s.l. during the rainy season was found in August at urban (33.75bites/p/n) and rural (25.83 bites/p/n) but, there is no significant different between the average HBR of An. gambiae s.l. in urban area (11.41 bites/p/n) and in the rural area (8.21 bites/p/n) (P>0.05). Transmission was high during the rainy season (June to November) and low during the dry season (December to May) and was vehicled by An. gambiae Colluzzi (65%). and An. arabiensis (35%). The EIRs were significantly higher in the dry season in urban area (0.125bi/p/n) than in rural area (0.021 bi/p/n) (P < 0.05). However, during the rainy season, there was no significant difference between the EIRs from urban and rural areas (P > 0.05). These findings showed that malaria is permanent at Natitingou both in urban and in rural area and was vehicle by An. Coluzzi and An. Arabiensis. These results will be useful to implement a strategy against malaria in this city.

A Review Article of Various old Methods to Improve Thermal Plant Efficiency
Authors: M. Tech. Scholar Indrajit Patidar, Asst. Prof. Nilesh Sharma

Abstract:–This research paper analyses the operational parameters of a thermal power plant to improve effectively& efficient running of the machine while ensuring a degree of compliance with statutory regulations. This study aims to identify the operational gaps associated with running operational parameter in power plant process. It is focused to detect a different thermodynamic variable involved, being multivariate and automatic. For variation of each one of this operational parameters, performance calculations are find out to configure a database of energy variation. The variable data sets now can be used as assessment criteria based on detecting deviations from a reference system that has been updated during plant-performance tests. Although the most important outcome is the highly precise and valuable information that will be obtained on the live operating mode, leading to a head improvements in the cycle efficiency and achieved in the overall control system of the thermal plant. The main aim is to detect any abnormality, reacting as quickly as possible to return the plant to a normal operation mode at best efficient manner.

Factorization in Integral Domains
Authors: M. Phil Research Scholar Suja Joseph, Dr. B. Senthil kumar

Abstract:The M-evaluated spaces R = M Rm, which are nearly Schreier are classified under the suspicion that the fundamental conclusion R of R is a root augmentation of R, where M is a without torsion, commutative, cancellative monoid. For the situation that D[M] is a commutative monoid area it is demonstrated that if M funnel shaped and D[M] ⊆ D[M] is a root augmentation, at that point D[M] is nearly Schreier if and just if M and √D are nearly Schreier. On the off chance that R = Æ[nx] is a request in a quadratic augmentation field $( d) of $, it is demonstrated that the conditions; R[X] is IDPF; R[X] is inside factorial; R[X] is nearly Schreier; R[X] ⊆ R[X] is a root expansion; and each prime divisor of n likewise partitions the discriminant of the augmentation K/$; are equal conditions.

A Comparative Chemical Analysis of Phyto-chemicals Content of Green Cabbage and Red Cabbage
Authors: Nida Tanveer, Gulrez Nizami, Mohammad Azam, Mohammad Arshad, Sheela, Farman Ali, Shifa Rehman Merajuddin

Abstract:–Cabbage is very grandly essential vegetables in the whole world. It becomes into the Brassicaceae family. In this investigation of phytochemical, comparative study of red cabbage and green cabbage were carried out. Some phytochemical were present in both red cabbage and green cabbage while some phytochemical were absent. The phytochemical analysis of red cabbage powder extracts indicated with exist certain phytochemical compound. Some phytochemical in powder extracts such as saponin, tannin, flavonoids, glycosides, and alkaloid were present in a large amount and phytosterols found in only methanol extract. In the analysis of red cabbage juice tannin, phytosterols, flavonoids, and alkaloid were present in each extract of red cabbage juice but the glycoside was present in methanol extract and saponin was found in methanol extract and water extract. The phytochemical detection of green cabbage powder and juice extracts confirmed that the phytochemical is found in a small amount. The phytochemical analysis of green cabbage and red cabbage powder or juice founded that the Phytochemicals were present a small amount in green cabbage as compared with red cabbage. The phytochemical analysis of green cabbage juice and water revealed that the phytochemicals were present in a small amount as compared with red cabbage.

A Study on Only Kind of Real Number an Integral Domain
Authors: M. Phil Research Scholar Suja Joseph, Dr. B. Senthil kumar

Abstract:We take a broad view the notion of “unique factorization domain” in the spirit of “half-factorial domain”. We show that new generalization of UFD implies the now well known notion of half factorial domain. As a consequence, we discover that the one of the normal axioms for unique factorization domains is unconscientiously redundant. That is, we interested in factoring numbers in integral domains so we have to scrutinize distribution, and so this post will begin with a fairly cursory look at the properties of distribution. At that moment we willpower bring in the crucial ideas of units and acquaintances. In the Real number, 1 are units and n, for any fixed n, are associates.

Centrally Suspended Cage-less Differential Gearbox
Authors: Jay Ghodke, Mihir Gajendragadkar, Deepesh Dubey, Ishwari Dighe

Abstract:In the 21st century, the technological advancements are at its peak. Considering the automobile industry, vehicles with better performance parameters are at our disposal compared to the former vehicles and their technologies. The centrally suspended cage-less differential gearbox is one such innovation which aids the performance of the vehicles like improved cornering efficiency, reduced weight, equal torque distribution and elimination of uneven centre of gravity compared to the conventional differential gearbox. In this study the theoretical designs of the gearbox were obtained using standard design formula. The CAD models were designed on CATIA V5. The models were analysed using ANSYS workbench. After obtaining satisfactory results, manufacturing of the gearbox assembly was carried out.

Published by:

International Journal of Mechanical Sciences, Journal of Engineering and Applied Sciences


Submit Your Paper  / Check Publication Charges

This journal provide Provide High impact factor for the publish papers as reach of this journal is good. Here researcher not only publish paper but also used papers of this journal for there references. So its an international journal of mechanical sciences where students / scholars from Mechanical branch include thermal, automobile, material science etc. This IJSRET journal accept paper from other branch  also so its an journal of engineering and applied sciences as well. As number of researcher submit and publish paper in these field of mechanical sciences and engineering.


So we call all researchers / students to find and submit there research work of mechanical sciences of engineering and applied sciences to come on IJSRET for following reasons:

  • We provide fast publication process.
  • Live support in paper submitting by chat / emails.
  • Instant payment option through our website from various sources of national and International researchers.
  • Quick response for each submitted paper by forwarding to respected reviewer.
  • Provide proper guideline for improving the quality of the paper as well.
  • Do paper formatting at journal end only.

So we call people who are looking for

International Journal of Mechanical Sciences, Journal of Engineering and Applied Sciences to come and publish papers.

Published by:

IJSRET Volume 4 Issue 3, May-June-2018


Privacy Preserving and Identity Based Public Auditing of Data in Cloud

Authors:M.Tech Scholar G.Sivagama Sundari, Asst. Prof. Rakhe eBhure

Abstract:–Distributed storage framework gives facilitative record stockpiling and sharing administrations for circulated customers. To address uprightness, controllable outsourcing, and starting point inspecting worries on outsourced records, it propose a personality based information outsourcing (IBDO) plot furnished with alluring highlights beneficial over existing recommendations in securing outsourced information. To begin with, the IBDO conspire enables a client to approve committed intermediaries to transfer information to the distributed storage server for her sake, e.g., an organization may approve a few representatives to transfer documents to the organization’s cloud account controlledly. The intermediaries are distinguished and approved with their unmistakable characters, which wipes out entangled endorsement administration in common secure dispersed processing frameworks. Second, the IBDO conspire encourages extensive reviewing, i.e., the plan not just allows normal trustworthiness evaluating as in existing plans for securing outsourced information, yet in addition permits to review the data on information root, sort, and consistence of outsourced documents. Security investigation and trial assessment demonstrate that the IBDO conspire furnishes solid security with attractive proficiency.

An Efficient Feature Verification in Image Matching

Authors:Kusuma S (M.Tech), Prof. Kalaimathi B

Abstract:–In present era, verifying the correlation between two features is essential in preventing the disasters such as copy attacks. In this paper, image processing technology applicable in extracting and verifying the image features is discussed. Existing methods which are employed for verification are found to be computationally expensive. Thus an enhanced RANSAC (Random Sample Consensus) algorithm for effective verification of features is employed. It is a multistep line towards verification. Firstly, it involves extraction of features using SURF (Speeded Up Robust Feature) descriptor with RGB color concept. Secondly, verifying the features of images through a match by choosing multiple descriptors in random and thus promoting effective timeliness. The employed method can process huge collection of images of a particular dataset.

Design of a Reversible Central Processing Unit components using Verilog HDL

Authors:M.Tech. Scholar Asra Jabeen, Asst Prof. Pooja M

Abstract:–Balanced mapping from contribution to outcome is the fundamental condition for a reversible computational model traveling starting with one condition of dynamic machine then onto the next. Presumably, the greatest inspiration to examine reversible advances is that, it is thought to be the best powerful approach to upgrade the energy effectiveness than the ordinary models. The examination on reversibility has demonstrated more prominent effect to have colossal applications in rising advances, for example, Quantum Computing, QCA, Nanotechnology and Low Power VLSI. In this paper, we have acknowledged novel reversible engineering segments of Central Processing Unit (CPU). The Central Processing Unit (CPU) is the essential part of a PC that procedures direction. It runs the working framework and applications, continually getting contribution from the client or dynamic programming programs. It forms the information and produces outcome, which may store by an application or showed on the screen.

A Novel Sleep Switch leakage Mitigation technique in DSM Technology

Authors:M. Tech. Scholar Jaya Nigam, Asst. Prof. S.S. Gawande

Abstract:–This paper proposes new technique ON OFF based domino and examines with inputs and clock signals combination in 32nm technology with footerless domino circuit for reduced leakage current. In this technique a p-type and an n-type pass transistor logic are introduced between the pull-up and pull-down network and the gate of one is controlled by the source of the other. Therefore the main focus in proposed work is given into the noise immunity of the circuit. The problem of leakage current here is optimally solved by the keeper transistor logic. In the proposed work two keeper transistor terminologies is taken into account which gives better performance in delay variability which is a big concern for high performance circuit application. The proposed circuit technique for AND2, OR2, OR4 and OR8 circuits reduces the active power consumption by 50.94% to 75.68% and by 64.85% to 86.57% at low and high die temperatures respectively when compared to the standard dual threshold voltage domino logic circuits.

A Survey on Home Automation Systems

Authors:M.E.Scholar R. Rajalakshmi

Abstract:–Internet of Things (IOT) is nothing but connecting different real world objects to provide proper communication, synchronization, and inter-connecting between various devices or physical appliances is also known as “Things”. The Home Automation System (HAS) is extension of current activities performed inside the home and this Home Automation System (HAS) can be developed easily now a day’s, because of powerful computational devices and wireless sensor network(WSN), to provide user friendly and cost fairly home automation system. In Home Automation System (HAS), different technologies like WiFi, Bluetooth and Zigbee are used for communication, and different devices like smart phone, tablet and laptop used for controlling various appliances. In this paper we detailed a survey on different home automation systems considering parameters like type of communication, cost, technology and efficiency of system. A comparative analysis of home automation system is done. In future this system may have high demand and usage for automation of the “Things”. Using Home Home Automation System (HAS) our home will be smart home that can operate without any physical interference of human being.

An Artificial approach to Classify Text Document by Utilizing Clustered Terms

Authors:M. Tech. Scholar Shivangi Pandey, Prof. Deepak Tomar

Abstract:–As the web clients are expanding, so advanced information on servers are increasing, this draws researcher from content mining field to upgrade different services. As different issues are emerge on the server, for example, information dealing, security, support, and so on. In this paper article characterization is recommended that group the document in proficient way. Here Error back propagation artificial neural network was used for the grouping. Proposed approach characterizes the information on the premise of text document features where preparing of neural network is perform by binary contribution of the content. While in testing stage content archives are order according to neural network output. Investigation is perform on genuine and in addition artificial dataset. Result demonstrates that Proposed work is better when compared with past work on various assessment parameters.

A Study on the Strength Behavior of Concrete by Partial Replacement of Cement with Cotton Plant Ash

Authors:Asst. Prof. M. Bhuvaneswari

Abstract:–Cement is widely noted to be the most expensive constituents of concrete. The entire construction industry is in search of a suitable and effective waste product that would considerably minimize the use of cements and ultimately reduces the construction cost. This paper describes the research into use of agricultural wastes in concrete through the development of concrete in corporation cotton plant ash(CPA) as a partial replacement for ordinary Portland cement(OPC). It gives the scope to utilize CPA for civil construction works as a partial replacement for cement so as to keep the environment green and also seeks to optimize the benefits of using CPA in concrete as a replacement for large proportions of cement. Different cotton plant ash (CPA) concretes were developed by replacing 10%, 20%, 30% and 40% by weight of ordinary Portland cement with CPA for M20 grade concrete. The results indicated that the substitution of cement with CPA in Concrete production was relatively possible not exceeding 10% having good compressive strength, Performance and durability. There was a sharp decrease in compressive strength beyond 10% of CPA substitution. The test results indicate that replacing proportions of cement with 10% CPA would provide improved strength and a most cost effective solution.

Analyze the Mechanical Properties of Pervious Concrete by Using Titanium Dioxide (Tio2)

Authors:Asst. Prof. M. Bhuvaneswari

Abstract:–In many developed countries, the use of pervious concrete for the construction of pavements, car parking and driveway is becoming popular. The pervious concrete is produced by using titanium dioxide (TIO2). This concrete are tested and its properties, such as compressive strength, spilt tensile strength, and water permeability. The most important properties of pervious concrete is drainage facility through permeability. Pervious concrete is a concrete containing with or without fine aggregate (no fines concrete); it consists of coarse aggregate and cement paste. It seems pervious concrete would be a natural choice for use in structural application. It consumes less raw material than normal concrete (no sand), it provide superior insulation value when used in walls and through the direct drainage of rain water its help to recharge ground water in pavement application by using the titanium dioxide.

Study the Strength of Concrete Made Using Glass Powder as Partial Replacement of Cement

Authors:Asst. Prof. Brajesh Kumar Suman

Abstract:–Climate change or global warming is caused by emission of green house gases such as carbon dioxide, methane, ozone, water vapor to the atmosphere among them carbon dioxide play important role to enhance the global warning about 65% .The world wide cement industry contributes about 7% of green house gas emission to environment. Keeping in mind to address ecological impacts related with cement manufacturing there is a need to create alternative binding material for concrete therefore broad research is on going in to the utilization of cement replacement utilizing many waste materials. Efforts have been made in concrete to utilize waste glass as partial replacement of coarse, fine aggregate and cement. In present study glass powder is used as a partial replacement of cement in concrete and compared with conventional concrete. To accomplish cement is replaced by glass powder from 0 to 30% at an interval of 10 and tested for its compressive strength. Results show the compressive strength increases at 10% replacement of cement with glass powder.

A Survey on Various Techniques and Features of Sentiment Analysis

Authors:M. Tech. Scholar Arunes Pratap Singh, Asst. Prof. Manisha Patel

Abstract:–As the digital data increases on servers different researcher have focused on this field. The field of sentiment analysis, in which sentiment is gathered, analyzed, and aggregated from text, has seen a lot of attention in the last few years. The corresponding growth of the field has resulted in the emergence of various subareas, each addressing a different level of analysis or research question. In this paper text sentiment analysis was detailed by various techniques of researchers. Here diverse attributes for the text sentiment analysis is explained in detailed with their necessities as attribute vary as per text study.

An Seller in E-commerce Online Website

Authors:Ampattu Sajo Thomas, Anwar Sayyed

Abstract:–To become a seller in an Online Website, first we need to decide an Store Name and which Product should be sold. Amazon would be an best Online website for selling. To Create an Seller Account in Amazon, we need to have the required documents with us such as Gumasta License , GST or VAT number and a Current account for the transactions in any Bank. As the Seller Account in created, we need to upload our product to the website with the help of the catalogue template provided to us by the Amazon. The Account provides us an choice of selling like an Happy Seller and Non- Happy Seller. In Happy Seller the Amazon is also known as FBA- Fulfillment By Amazon and it will take care of all the responsibilities from the Seller like Order fulfillment, delivery, return and refund and Rating as well. In Non-Happy Seller, the Seller has to take care of all the responsibilities of order fulfillment, Delivery, Return and Refund and Ratings as well. Ratings of an Account is based on Customer Feedback, Customer Messages, Late Shipment, Order defect rate.

Behaviour of Skirted Footing Resting on Sea Sand

Authors:Dr. Mariamma Joseph, P.G. Scholar Anju. A.S

Abstract:–To understand the vertical load carrying capacity of soil and in order to solve the combined load carrying problems it is very much necessary to study the relationship between vertical load and its corresponding vertical displacement in soil. Structural skirts hold good as an alternative method of improving the vertical load carrying capacity and reducing the settlement of footing resting on soil. Structural skirts are being used underneath shallow foundations of offshore structures for many decades due to their stability advantages and due to its ease of installation. These foundations are economical, as they lead to cost saving through reduction in materials and in time required for installation. These type of foundations have been used for a considerable period to increase the effective depth of the footing in marine areas and other situations where water scouring is a major issue. In this project work, a series of vertical load test was conducted for different relative density and different skirt length to diameter ratio .Tests were conducted on circular footing placed centrally on sea sand filled tank with and without skirts in different combinations of height and diameters. From the various set of data’s obtained, comparison was made between the results of unconfined case and confined case.

Wastewater Treatment by Root Zone Technology Option for Domestic Waste

Authors:P.G. Scholar Surekha Thorat, Asst. Prof. V. V. Sasane

Abstract:–Root Zone Bed System is one of the lowest cost methods to treat wastewater. With the help of this system we can treat the Non-Point sources with the best results. To achieve this goal, we have to divide the Non-Point sources into constructing channels within the river bank followed by root zone bed or if the NonPoint Sources is coming from natural nalas we can provide this system within its Channel. For model practice, I have prepared reactor on which I have developed the root zone bed and have lab analysis of rector output on a number of parameters. Flow rate and Detention time are the two factors on which channels are to be designed. Therefore, I am changing the flow rate and finding out the change in parameter with respect to detection time. Planting Colacassia and Canna plant. Both plant get nearly same result but we can use planting as per requirement. The optimization is when we get better results with maximum flow. I have got satisfactory results for the detention time of Three days, Seven days and Fifteen day. With the help of this data I have designed the root zone bed system for the domestic wastewater. Coat of root zone technology is small as compared to conventional system.

Comparative Study of RCC Building Considering Effect of Braced Wall Line

Authors:M.Tech Scholar Shailesh B Pahilwan

Abstract:–The effects of the introduction of steel plate shear walls in buildings, on the bending moments, the shear forces, axial loads of the beams and columns and the story drifts are mainly observed. This is because of the fact that the mechanism of shear resistance by the steel shear walls is entirely different than that of the RCC shear walls. Some multistory buildings with SPSWs are analyzed by the equivalent static method as given by the IS 1893 (Part 1): 2002. The strip model as suggested by the code of Canada and the researchers is used to model the steel shear wall using the popular FEA software, the SAP 2000. The strips in the strip model are modeled using the frame element.

Analysing Various Security Attacks in Remote Sensor Networks

Authors:Er. Himanshi Vashisht, Associate Professor Sanjay Bharadwaj, Sushma Sharma

Abstract:–A remote sensor networks is a recent advancement of technology of computer networks and electronics. Its sensing technology in combination with its processing power and wireless communication makes it productive for its abundant exploitation in the near future. A remote sensor arrangement generally, contains sensors, actuators, memory, a processor. The nodes in this network are not connected to a central node, and are self-managing. They are not connected to a specific network topology, practise multi-way routing, preserving the integrity and confidentiality of data, and are robust making them highly applicable for military applications. With development in such applications, security of data has become a crutial need keeping in mind that the end goal is to ensure that the touchy and confidential informationis also included. These networks are prone large number of disastrous attack or hacks such as Sybil, Wormhole, Sinkhole, etc. that threaten data flow or may have a motive to disrupt the entire network. The assault becomes even more viable when the attacker incorporates itself on the way of information flow. In this context, we analysis security aspects of the remote sensor networks like requirements, classifications, and type of attacks etc., in this survey paper.

Analysis of RCC Building Considering the Effect of Variation in Thickness of Steel Plate Shear Wall

Authors:M.Tech Scholar Shailesh B Pahilwan

Abstract:–The effects of the introduction of steel plate shear walls in buildings, on the bending moments, the shear forces, axial loads of the beams and columns and the story drifts are mainly observed. This is because of the fact that the mechanism of shear resistance by the steel shear walls is entirely different than that of the RCC shear walls. Some multistory buildings with SPSWs are analyzed by the equivalent static method as given by the IS 1893 (Part 1): 2002. The strip model as suggested by the code of Canada and the researchers is used to model the steel shear wall using the popular FEA software, the SAP 2000. The strips in the strip model are modeled using the frame element.

An NFC Featured ATM Cards with Biometric for Secure Transactions

Authors:Asst.Prof.Mrs.Vandana, M. Tech. Scholar Ms.Swetha Y

Abstract:– With the payment cards such as Debit and Credit cards usage becoming more common and rapid so are the number of ways to exploit the vulnerabilities associated with them and have become common target for cyber criminals. Moreover, the customer goes through the experience of a laborious process of interacting with the customer care center and to do the necessary errands thus increasing the turnaround time to achieve the end goal that is, to get the payment card blocked or to get a replacement card. This document comprising of a Near Field Communication (NFC) device that can be used as a potential solution to overcome the transaction liabilities (brute force attack, shoulder surfing, skimming of ATM cards etc.) involved in using the payment cards. An additional feature involving blocking/deactivating ATM cards is achieved using QR code technology for authentication scheme.

A Novel Low Power 11T SRAM Design Cell in Nanometer Regime

Authors:M.Tech.Scholar Rahul Baghel, Suresh S Gawande

Abstract:– Now a day’s low power SRAMs have become a critical component of many VLSI chips. This has especially true for microprocessors, where the demanding on chip cache sizes are growing with each generation to bridge the increasing divergence in the speeds of the processors and the main memory. Simultaneously, power dissipation has been becoming an important factor to recognise due to the increased integration and operating speeds, as well as due to the explosive growth of battery operated applications. This proposed 11T SRAM has been compared with standard 6T SRAM and existing 9T SRAM (with bit-interleaving capability) in term of Power consumption, Delay and Power Delay Product (PDP) at various supply voltages as 1.8V, 1.6V and 1.4V. For the stability analysis SNM (Static Noise Margin) also analyzed at the supply voltage 1.8V. The proposed 11T SRAM proves to be better in terms of power and PDP at all the supply voltages. At 1.8V power saving by the proposed design is 73.88% and improvement in PDP is 71.53% compared to standard 6T SRAM cell and significant improvement is observed at other supply voltages also. In term of stability the proposed design proves better as compare to existing circuits.

Security Analysis and Implementation of Private Cloud Infrastructure using Cloud Stack

Authors:Jitendra singh

Abstract:– In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Big companies like Amazon, Google, Microsoft etc., expand their market by adopting Cloud Computing systems which enhance their services provided to a large number of users. However, security and privacy issues present a strong barrier for users to adapt into the Cloud. This research investigates the security features and issues of implementation of cloud platforms using Cloud Stack. The goal was to identify security weakness in terms of Authentication and Identity Management (IAM), and Data Management. Base on the findings, specific recommendations on security standards and management models have been proffered in order to address these problems. These Recommendations if implemented, will lead to trust in cloud computing systems, which in turn would encourage more companies to adopt cloud computing, as a means of providing better IT services.

Self Generative Electric Vehicle

Authors:Asst.Prof.B.Ponkarthika, Dr.E.Kaliappan, Asst.Prof.V.Vijeesh

Abstract:– Transportation accounts for about one-fifth of global energy use and passenger vehicles account for about ten percent of energy-related carbon dioxide emissions. During the last few decades, environmental impact of the petroleum-based transportation infrastructure, along with the fear of peaking oil prices, has led to renewed interest in an Electric transportation infrastructure. Electric Vehicles (EVs) differ from fossil fuel-powered vehicles. The way electricity is consumed in EVs can be generated from a wide range of sources such as solar power, tidal power and wind power or any combination of these. The generated electricity may then be stored on board by using a battery, flywheel, or super capacitors. EVs include road and rail vehicles, surface and underwater vessels, electric aircraft and electric spacecraft. As it is well known one of the drawbacks of these electric vehicles is their driving range. The driving range can be increased with the help of Self-generation and Regeneration operation. Regenerative braking system replaces the traditional braking system in cars as the traditional braking system produces more heat during braking. Therefore the Regenerative braking system ensures high capability of energy storage in braking conditions and under normal operation.

A collision-Mitigation cuckoo hashing scheme for large scale storage systems

Authors:Asst.Prof. Mrs.Kavyashree .C, M.Tech.Schalor Bhagyalakshmi H N

Abstract:– Cloud computing systems consume an outsized quantity of system resources; it’s still difficult to get correct results for question requests in a real-time manner. Due to space inefficiency and high complexity hierarchical addressing schemes fail to meet the wants of real time queries. So as to support real-time queries, hashing based information structures are widely utilized in constructing the index due to constant-scale addressing complexity and fast query response. Unfortunately hashing based information structures cause low space utilization, as well high latency risk of handling hashing collisions. Traditional techniques used in hash tables to deal with hash collisions include open addressing, chaining and coalesced hashing. Cuckoo hashing addresses hashing collisions via simple “kick-out” operations, which moves items among hash tables during insertion, rather than searching the linked list (i.e. hierarchical addressing).

Experimental Investigation on Behaviour of Natural Fibre Concrete (Sisal Fibre)

Authors:Asst.Prof. N.Saravanan, M.Buvaneshwari

Abstract:– Fibre reinforced concrete contains discontinuous discrete fibers along with cement, water, fine, coarse aggregate. Sisal fibre is generally used as the natural discrete fibres. It is extracted from the leaves of sisal plant. The concrete with sisal fibres are called as Sisal Fibre Reinforced Concrete (SFRC). The sisal fibre reinforced concrete can enhance many of the engineering properties of the basic materials, such as fracture toughness, flexural strength and resistance to fatigue, impact, thermal shock and spalling. In this project work, the general properties of the composites are described in relation to fibre content, length, strength and stiffness. The mix is designed for M30 grade concrete with w/c ratio of 0.52 .The mix ratio 1:1.92:3.24 is arrived as per IS code.10262:2009. The sisal fibre of 50mm length and 4 to12 μm. Diameter is used. The specimens are prepared by adding fibre content of 0.5%, 0.75%, 1.0%, 1.25%, 1.5% and 2% volume of concrete. Further specimens are to be cast for 2.5 % Volume of concrete. A total of 15 cubes, 15 cylinders, 15 prisms are cast for SFRC in addition to 3 cube, 3 cylinder and 3 prism specimens for conventional concrete. The Hardened concrete properties of cast specimens after 7 days of curing is tested and the results are compared with conventional concrete. The strength properties of SFRC is found to increase with increase in fibre content upto 1.5%. The results are yet to be found for fibre percentage above 1.5% whose casting is under progress. After that Optimum percentage of sisal fibre content will be founds.

A Review Article of Balancing Assembly Line Using Particle Swarm Optimization Algorithm

Authors:Asst.Prof.Prakash Girwal, M.Tech.Scholar Nikhil Porwal

Abstract:– This review article presents the application of particle swarm optimization (PSO) algorithm for the simple assembly line balancing problem, SALBP-I. A new indirect encoding method for the solution of SALBP-I is developed to keep the feasibility of operation sequence. The particle that represents a feasible operation sequence is based on a smallest position value rule. Given the defined by a particle, the optimal assignment of the operations to the workstations is identified by an optimum seeking procedure with polynomial-time complexity. Then PSO is employed to find the optimum efficiently in the search space comprising the optimal assignments associated. The PSO algorithm is tested on a set of problems taken from the literature and compared with other approaches. The computation results show the effectiveness of the algorithm.

Novel Forced Stack based Power-on-Reset circuit for low energy application

Authors:M.Tech. Scholar Ishika Raj, Mr. Ashish Raghuwanshi

Abstract:–This novel article describes both the function of Power-on Reset (POR) and the strategies for low energy application, when used with dual-supply SoC’s. The article demonstrates why to avoid discrete PORs and PORs internal to processors. It concludes with explanations of voltage sequencing, voltage tracking, and reset sequencing. Design of a low-energy power-ON reset (POR) circuit is proposed to reduce the energy consumed by the stable supply of the dual supply static random access memory (SRAM) using FET devices, as the other supply is ramping up. The proposed design is based on stacking of pull-up and pull-down transistor in push-pull output stage also called sleepy approach to reduce the energy consumption of POR circuit. Proposed design offers 0.1735µs delay which is 8.2% lower than POR-LE while offers 1.2% higher power dissipation than POR-LE. But the multiplication of power and delay (is also called energy) is 7% smaller than POR-LE.

Chemical Reduction of Cu Nanoparticles on Tio2 Project Report

Authors: Sathiyanarayanan. D

Abstract:–The experiment focuses on the chemical reduction of Cu nanoparticles on TiO2 by using NaBH4 as a reducing agent. The experiment includes observation of the coat formed under the influence of various concentrations of CuSO4 on the same amount of TiO2. In this experiment, TiO2 is of known quantity (300mg) is added to 100ml of water and stirred. This is then followed by the addition of CuSO4. The solution of TiO2 and CuSO4 is then kept is ice bath and titrated against freshly prepared NaBH4 solution of known quantity, drop by drop while continuous stirring using a magnetic stirrer. Once the titration is complete, the solution is stirred with a magnetic stirrer for about 3 hours. The experiment is carried out for varying quantities of CuSO4. The final Cu coated TiO2 nanoparticles were subjected to XRD and the intensity with respect to the 2 theta and the absorbance with respect to wavelength was recorded. The alternative method to the reduction technique is the photo reduction which can be used to achieve similar coating. These coated nanoparticles can be further used in the procedure of separation of hydrogen from water.

A Survey on Smart Grid Load Balancing Techniques and Challenges

Authors: Asst.Prof.Ravi Kumar Rajalwal, Dr. Sameena Elyas Mubeen, Priyanka Shrivastava

Abstract:–The electric grid is radically evolving into the smart grid, which is characterized by improved energy efficiency of available resources. Here detail survey of different techniques of grid management for load balancing was discussed. This paper work presents an extensive survey of the existing load balancing techniques proposed so far. These techniques are applicable for various systems depending upon the needs of the computational Grid, the type of environment, resources, virtual organizations and job profile it is supposed to work with. Each of these models has its own merits and demerits which forms the subject matter of this survey. A detailed classification of various load balancing techniques based on different parameters has also been included in the survey.

Classification of the Brain Tumor Using PCA And PNN Classifier

Authors: Ms. Priyanka Suresh Avate

Abstract:–The proposed strategy gives thought regarding the characterization of cerebrum tumor write by utilizing PNN classifier and gives the kind of the tumor thus. Here we will utilize mind attractive reverberation pictures (MRI) as the information database. In the wake of utilizing different clamor expelling channels we will utilize picture division strategy to appropriately acquire the area of enthusiasm from the MRI mind picture. The Morphological activities are additionally done to evacuate some commotion parameters after division. The probabilistic neural system (PNN) classifier and standard part examination (PCA) is utilized to characterize the cerebrum tumor write. This classifier gives quick processing outcome when contrasted with other grouping techniques. The execution of the PNN classifier was assessed regarding preparing execution and arrangement exactnesses. Probabilistic Neural Network gives quick and exact grouping and is a promising instrument for characterization of the tumors

Fabrication of nano-fibrous silk scaffold for NTE (Neural Tissue Engineering)

Authors: M.Tech.Scholar Vipul Kumar, Shalini Priya

Abstract:–Tissue Engineering is a promising and emerging area in the field of medical science for treatment of irreparable injuries. It works in synchronization of scaffold and living entity. Silk has favorable characteristics to be used as a scaffold material. Scaffold made up of silk can provide better scope for treatment of neural disorders and injuries through the implications of basic principles of NTE (Neural Tissue Engineering).

Improvement Productivity in Balancing Assembly Line by using Pso Algorithm

Authors:M.Tech.Scholar Nikhil Porwal, Prof. Prakash Girwal

Abstract:–Assembly line balancing plays a crucial role in modern manufacturing companies in terms of the growth in productivity and reduction in costs. The problem of assigning tasks to consecutive stations in such a way that one or more objectives are optimized with subject to the required tasks, processing times and some specific constraints, is called Assembly Line Balancing (ALB). This research work focuses on optimization of product cost, Assembling time and Production Completed order with the help of PSO 30 days and 26 days data sets of a production industry. The present study also describes KANBAN withdrawal Methodology for production time period of 0.6 minutes only for single stage Assembly line.

An Overview of Cloud Computing

Authors:Harshad M. Kubade, Dr. Pallavi M.Chaudhari, Dr.Archana V.Potnurwar

Abstract:– Tissue Engineering is a promising and emerging area in the field of medical science for treatment of irreparable injuries. It works in synchronization of scaffold and living entity. Silk has favorable characteristics to be used as a scaffold material. Scaffold made up of silk can provide better scope for treatment of neural disorders and injuries through the implications of basic principles of NTE (Neural Tissue Engineering).

Determination of Heavy Metals in Ground Water of Raigarh District (C.G.)

Authors:M.Phil. Scholar Ram Kumar Mali, Asst. Prof.Rashmi Verma

Abstract:– The quality of water is important consideration is suggest criteria of purity of water. Water Quality is one of the most important concerns. Quality of water is an important criterion for evaluating the suitability of water for drinking and irrigation. Metal contamination in water is a major component in the determination of water quality. The heavy metals levels up to ppb levels in drinking water quality may cause savior health problems and also cause cancer. In this study, we made an attempt to know the concentration of six heavy metals in ground water in different locations of Raigarh District up to ppb levels. For this study, 4 groundwater samples were collected in April 2017 and preserved by addisamplesbdrops of nitric acid. These samples were subjected to analysis for four elements like Cd, Pb, Cu, Zn and Fe by using Atomic Absorption Spectroscopy (AAS) (Laniyan et al.). The concentrations of these metals in the study area were compared with drinking water quality limits are given by the World Health Organization (WHO), 4th edition in 2011.

Study on Strength Parameters of Concrete by Using Plastic Waste as Partially Replacing Course Aggregates

Authors:Asst.Prof. Rudresh A N, Shoib Kha, Yogesh R, Ravikiran S Sagar, Mahesh P

Abstract:– The rapid industrialization and urbanization in the country leads lot of infrastructure development. This process leads to several problems like shortage of construction materials, increased productivity of wastes and other products. In this project waste plastics is used as partial replacement of course aggregates by increasing 0%, 2%, 4%, 6% and 8%.In this project fly ash is replaced by 35% of cement to this concrete to enhance the strength and workability of it. Tests was conducted on course aggregate, fine aggregates, cement and plastic to determine their physical properties. Casted concrete were tested for its compressive strength, tensile strength at 3, 7 and14 days. Concrete cylinders and beams were casted and tested for their strength after 28th day of curing of concrete as respective to the partially replaced plastic with coarse aggregates.

Utilization of Functional Fabric Fasteners

Authors: Ikra Salim

Abstract:– Fasteners simply a device which is used to affixes two or more gadget together.” This paper is based on experiments that shows, how effective use of functional fasteners in decorative way. Fasteners basically have a very functional role in a garment and used to close placket opening in proper way. Hook & Eye, button & buttonhole, snaps are some examples. In addition, other Fasteners serve as electric element to garment. Moreover It prominent the area of dress. The best example of decorative fasteners are frog, brooches, safety pins etc. This kind of fasteners close the placket opening on temporary basis along with create an emphasis in a garment. It is very obvious that such fasteners may easily designate the focal point in an outfit but, the functional fasteners can also perform tremendously in aesthetic way and with the help of them we can execute admirable product as well. The main purpose of functional fasteners are used to secure placket opening strongly but, here the interesting feature is that it can be used for making jewelry and surface ornamentation of garment. I know it is quite difficult to imagine how zipper fasteners can converted into beautiful necklace, finger ring , earring etc. but it’s possible. so, there are numerous ideas which has its own peculiarity and uniqueness.

A Review on Delay Tolerant Network Security Routing Protocol

Authors: M.Tech.Scholar Ritika Ujjaniya, Asst.Prof. Tanvi Khandelwal

Abstract:– Delay –disruption Tolerant networks are sparse wireless network which is recently being used by the existing /current network for the purpose to connect devices or the underdeveloped area of the world that works in challenging environment. Network security protocol is always required in any of the secure area, such as military. In DTN there majority of time does not exist the total path from resource to target which is leads to the difficulty of how to route the packet in such environment. Routing in such network is very difficult and for that different routing protocols are developed. In this Survey paper we discuss about various routing Strategy and at the end compared the different routing protocol with their various performance metrics.

Published by: