Category Archives: Uncategorized

IJSRET Volume 6 Issue 1, Jan-Feb-2020

Uncategorized

Comparative Investigation of Aerodynamic Effects on Geometrically Twisted Wing using CFD
Authors:- Moaz Hussain

Abstract:- The main intent of this work is to simulate the aerodynamic effects on different configuration of commercial and delta wing at different angle of twist. This investigation aims to suggest a better aerodynamic configuration for wing to reduce the induced drag formed on wing during flight operation and in-turn improves the efficiency of the UAV. Simulation processes of computational fluid dynamic (CFD) on wing models for medium size high speed UAV, using typical section as NACA 2412 airfoil is been carried out at 1⁰, 2⁰ and 4⁰ twist angle. The twist is provided to adjust pressure distribution henceforth lift distribution along the wing. ANSYS Fluent is used to analyze the pressure distribution on the surface of wing at speed of 0.6 Mach. The lift and drag forces are also determined which were used for calculating the coefficients of lift and drag. The obtained results were used to establish a comparison between aerodynamic performances of all provided models.

Optimization of ART and DC for Scalable MANET
Authors:- M.Tech. Student Nisha Kaithwas, Asst. Prof.Dr.Mehajabeen Fatima, Asst. Prof. Nitesh Kumar

Abstract:- Now days, Ad-hoc network play an important role in our daily lives because of their extensive capability of uses in various fields. Mobile Ad-hoc Networks (MANETs) are very popular network with large number of users and due to development of large scale ad-hoc network; scalability has been one of the issue we need to concentrate. MANETs has a various types of routing protocols. One of the popular routing protocols is AODV (Ad-hoc On-demand Distance Vector) which provide route for communication between nodes. Route maintenance parameters such as ART (Active Route Timeout) and DC (Delete Period Constant) are stores in routing table of nodes. This paper is optimized the value of ART and DC for scalable MANET.

Survey of Force Convection Nanofluid Heat Transfer in The Automotive Cooling System
Authors:- M.Tech. Scholar Subhash Chandra Sah, Asst. Prof. Suresh Kumar Badholiya, Prof. Rohit Choudhary

Abstract:- Now days, Ad-hoc network play an important role in our daily lives because of their extensive capability of uses in various fields. Mobile Ad-hoc Networks (MANETs) are very popular network with large number of users and due to development of large scale ad-hoc network; scalability has been one of the issue we need to concentrate.A wide variety of industrial processes involve the transfer of heat energy. Throughout any industrial facility, heat must be added, removed, or moved from one process stream to another and it has become a major task for industrial necessity. Heat transfer performance of liquids is limited by their low thermo-physical properties compared with those of solids. The primary reason behind adding solid particles less type of fluid is called a Nano fluid. Dispersing solid metallic or non-metallic materials in a base fluid (liquid), such as water, ethylene glycol or glycerol, has become an interesting topic.

Study of Force Convection Nanofluid Heat Transfer in The Automotive Cooling System
Authors:- M.Tech. Scholar Subhash Chandra Sah, Asst. Prof. Suresh Kumar Badholiya, Prof. Rohit Choudhary

Abstract:- The results revealed that the nano fluid (Ag/HEG) with highest concentration of volume 4% has the highest friction factor at all Reynolds numbers. This solution provides promising ways for engineers to develop highly compact heat exchangers and automobile radiators. When adding nano particles to the base fluid, such as water, the potential enhancement of car engine cooling rates could entail more engine heat being removed or a reduction in size of the cooling system. Smaller cooling systems would lead to smaller and lighter radiators, which would benefit almost every aspect of car performance and increase fuel economy.

Secured University Result System using Block Chain Features
Authors:- Patel Zeel Vijaybhai, Golait Shubham Nitin, Birendra Pratap Singh, Prof. S. B. Ahire

Abstract:- Building a system for security of university results that satisfies the transparency of results has been a challenge for a long time. Distributed ledger technologies are an exciting technological advancement in the information technology world. Block chain technologies offer an infinite range of applications benefiting from sharing economies. This paper aims to evaluate the application of block chain as service to implement distributed database systems. The paper felicitates the requirements of building secure system and identifies the technological limitations of using block chain as a service for realizing such systems. The paper starts by evaluating some of the popular block chain frameworks that offer block chain as a service. We then propose a novel database system currently used by universities based on block chain that addresses all limitations we discovered. More generally this paper evaluates the potential of distributed ledger technologies through the description of a case study, namely the process of an election and implementing a block chain-based application which improves the security and decreases the cost of hosting a worldwide application for universities.

A Review on Thermal Performance Analysis of Steam Surface Condenser
Authors:- M.Tech. Scholar Kamlesh Amrute, Prof. Brijendra Kumar Yadav

Abstract:- The steam condenser is one of the important components in a power plant which significantly affect the power generation and performance of unit in terms of heat rate. Deterioration in thermal performance of condenser not only affects the power generation but also thermal performance of unit as a whole. The parameters that are responsible for condenser thermal performance are cooling water (CW) mass flow rate, temperature, heat transfer area, velocity, tube fouling, partially filled water box and air leakage.CW flow rate and condenser pressure changes according to the variation in unit load. The CW temperature at condenser inlet varies according to change in annual temperature cycle of the intake system. During operating condition, the condenser performance is subject to change with variation in exhaust steam and CW parameters. The operating conditions of steam surface condenser are of the great influence on the power generation and the turbine cycle heat rate. At the same time, the operating conditions of the CW system determine the operating condition of the condenser.

Digital Transactions Through BTC
Authors:- Rhytham Negi, Paramjeet Singh, Prof. Latika Kharb

Abstract:- Bitcoin is a digital currency like other digital currency, virtual currency, or electronic money which use to transact the amount (Digital currency) from one person to another. Bitcoin is a peer to peer payment system developed by “Satoshi Nakamoto” in the year 2009. Bitcoin is the decentralized currency, which means there is no middle organization or company keep the log of the transactions. According to the google.com, the current rate 1 BTC is 7,77,671.14 (INR) at time of (September,3,2019 08:27 PM). In the paper, before starting anything about the bitcoin, we need to know that “What the bitcoins are and how they come in existence?”. Then we will study how digital transactions can be done through bitcoin.

A Review on CFD Analysis of Effects of Convergence and Divergence Angles on the Performance of a Nozzle
Authors:- M.Tech. Scholar Vishwajeet Yadav, Prof. Pawan Kumar Tiwari

Abstract:- The convergent – divergent nozzle is the most common type used in rocketry and it works by converting pressure energy from the fuel flow and heat energy from the combustion of fuel into kinetic energy in the form of high exhaust velocity. In the converging section of a rocket nozzle, the exhaust is travelling at relatively low speed (sub-sonic) and it becomes sonic at throat. The compressible exhaust increases until it reaches the exit and it is supersonic in the divergent section. Size and shape of a rocket nozzle is also very important. the converging section starts at the combustion chamber is usually shaped in a way to make sure that flow is not disrupted in any way i.e., the convergence is not too steep and has no harsh edges. Therefore in this paper a review will be done based on research work conducted by scholars.

Traditional Properties Analysis in High Strength Cement Concrete with Intermediate Replacements of Brickbats Powder, Clay Mineral and Calcite in Concrete
Authors:- M. Tech. Scholar- Koritipati Murali, Asst. Prof.M.Venkata Narasaiah, Asst. Prof. L.Gopi Chand

Abstract:- The processing of plain and reinforced cement concrete and utilizing it is sustainable concrete has become an important requirement in the construction industry. To improve environmental properties, several of supplementary cementing and pozzolonic materials are introduced and they are partial replacement of cement in the concrete. In this work we are using blending of three useful materials in this work namely brick bats grind powder, calcite is nothing but marble powder and important mineral of clay that is meta kaolin as partially replacing with cement. The adopted materials are very cheap in nature easily available in construction market using cementing materials are very prone to environment in these days. This dissertation reports the results of fresh and hardened properties of the concrete with partial replacement of these materials, at contrast percentages at different curing periods, various traditional methods and tests are conducted on concrete in fresh stage and hardened stage. Based on the previous citations we expected to get positive results from these partials replacements.

A Comparative Study of Physical and Mechanical Properties of Glass Fiber /Polyester Composite Materials with Natural Fillers
Authors:- M.Tech. Scholar Aamir Gaur, Prof. Amit Kr. Tanwar, Prof. Pankaj Singh

Abstract:- Now-a-days, the natural fibers and fillers from renewable natural resources offer the potential to act as a reinforcing material for polymer composites alternative to the use of glass, carbon and other man-made fibers. Among various natural fibers and fillers like banana, wheat straw, rice husk, wood powder, sisal, jute, hemp etc. are the most widely used natural fibers and fillers due to its advantages like easy availability, low density, low production cost and satisfactory mechanical properties. For a composite material, its mechanical, physical, wear and water absorption behaviour depends on many factors such as fiber content, orientation, types, length etc. Attempts have been made in this research work to study the effect of different natural fillers loading on the physical, mechanical, wear and water absorption behaviour of glass fiber/natural fillers reinforced polyester based hybrid composites. A hybrid composite is a combination of two or more different types of fibre in which one type of fibre balance the deficiency of another fibre or filler. Composites of various compositions with four different fillers loading (5 wt%, 10wt% and 15wt%) and glass fiber loading is constant (20 wt%) with constant matrix material (polyester resin) are fabricated using simple hand lay-up technique. Different natural fillers which used in present research work are chopped banana, rice husk, wheat straw, and wood powder fillers. It has been observed that there is a significant effect of filler loading on the performance of glass fiber/natural fillers reinforced polyester based hybrid composites. TOPSIS a multi-criteria decision making approach is also used to select the best alternative from a set of alternatives.

Deep Reinforcement Learning and Image Processing for AdaptiveTraffic Signal Control
Authors:- Prof. Jameer Kotwal, Harshal Thakare, Dhanashri Wani, Dhiraj Sangale, Abhijeet Walunj

Abstract:- In this paper, a traffic control system is build which can easily keep traffic in control using image processing techniques and deep reinforcement learning is presented. In this method, a camera is used in each stage of the traffic light in order to capture the roads where traffic is bound to occur. Number of vehicles in these images is calculated using image processing tools and different timings are allocated according to the count and based on the model trained using deep reinforcement learning along with a green signal for vehicles to pass. In this paper, we implement an intelligent traffic model that controls the amount of time a for which light runs green, based on the density of cars standing.

Power Efficient and Area Efficient Shift Register using Plused Latches
Authors:- M.Tech. Scholar M.Bharathi, Asst. Prof. Ms. K. Monica, Asst. Prof. Mr. Degala. Dhana Sekhar

Abstract:-This paper introduces a less power and powerful area shift register utilising pulsed latches. The range and power loss are decreased by interchanging flip-flops by pulsed latches. This technique determines the timing problem among pulsed latches by the advantage of many non-extension limited pulsed clock signals instead of the usual single pulsed clock signal. The shift register (SR) applies a little number of the pulsed clock signals by classifying the latches to many sub-shifter registers and applying additional volatile storage latches. A 128-bit shift register (SR) applying pulsed latches was invented utilising a 65nm CMOS method with VDD = 1.0V. The advanced shift register reserved area and power related to the standard shift register with flip flops.

Credi-Crypt: An Unpremeditated Anti-Counterfeiting Method For Credit Card Transaction System
Authors:- M.Tech. Scholar Shaik Fouziya, Asst. Prof. Mr. A.M. Shafeeulla, Asst. Prof. Mr. D. Dhana Sekhar

Abstract:-Data encryption is essential for e-commerce. Here we propose a method for covering sensible credit card data in a random backdrop picture externally the sensible data going presented in unrestricted areas. This paper also proposed to merge the Cryptographic and Steganography technique to implement a good protection solution for credit card transactions. The advanced method appropriates a cryptographic cipher and Arithmetic Coding method to protect data inside a covered picture and later transfer it to the target across the web network. This paper also presents an extra cover for improved protection through the use of the Hamming Code. A complete examination is done to differentiate our method among other famous techniques like DCT and DWT.

Delay Less Process To Over Power Transient Noise by Design Optimal Wavelets
Authors:- M.Tech. Scholar Rajasekhar G, Asst. Prof. Mr. K. Balachandra, Asst. Prof. Mr. Degala. Dhana Sekhar

Abstract:- Expulsion of inspiration upheaval from talk in the wavelet region has been seen to be very convincing due to the multi-assurance property of the wavelet change and the straightforwardness of emptying the main impetuses in that space. An essential factor that impacts the execution of the drive departure structure is the suitability of the inspiration detection computation. To this end, we propose another procedure for sketching out symmetrical wavelets that are progressed for recognizing inspiration uproar in talk. In the procedure, the characteristics of the drive uproar and the concealed talk banner are considered and a raised activity optimization issue is figured for deriving the perfect wavelet for a given assistance measure. Execution assessment with other without a doubt comprehended wavelets exhibit that the wavelets illustrated using proposed method have much better inspiration area properties.

Low Switching Power and Ultra Low Rbl Leakage I0t Sram using Half-Vdd Pre-Charge
Authors:- M.Tech. Scholar Siddavatam Sailaja, Asst. Prof. Mr. M.P. Chennaiah

Abstract:- We offer, in this paper, a novel 10T static RAM block should be a single-ended decoupled read bit line with a 4Transistors read port for reduced power maintenance and leakage reduction. The Read Bit Line is pre-charged at half the block supply voltage and is allowed to load and discharge according to the cached information bit. An inverter, operated by the corresponding data node, i.e QB and combines the RBL to the practical power rails to a transmission way when the read method. Read Bit Line extends to the VDD stage for a read -1 and discharges to the earth level for a read-0. Practical power rails should the equivalent value of the Read Bit Line pre-charging level when the write and the hold mode and are combined to pure supply levels simply while the read method. Dynamic control of virtual rails extensively decreases the Read Bit Line leakage. The advanced 10T block in a commercial 75 nm technology is 2.47× the extent of 6T with β = 2, provides 2.3 x read inactive noise margin and reduces the read power distribution by 60% than that of 6T. The amount of Read Bit Line leakage is reduced by more than three orders of magnitude and ON / OFF is hugely improved compared with the 6Transistors Bit Line leakage. The overall leakage features of 6Transistors and 10Transistors are similar, and aggressive performance is completed.

A Vigorous Image Watermarking using 2 level Dct and Wavelet Packets Denoising
Authors:- M.Tech. Scholar Shaik Shahinthaj, Asst. Prof. Mr. K. Narendra, Asst. Prof. Mr. Degala. Dhana Sekhar

Abstract:- In this paper we present a blind low recurrence watermarking plan on dark level pictures, which depends on DCT change and spread spectrum interchanges strategy. We process the DCT of non covering 8×8 squares of the host picture; at that point utilizing the DC coefficients of each square we develop a low-goals estimate picture. We apply square put together DCT with respect to this estimation picture, at that point a pseudo irregular clamor arrangement is included into its high frequencies. For recognition, we extricate the estimation picture from the watermarked picture, at that point a similar pseudo arbitrary commotion grouping is created, and its connection is processed with high frequencies of the watermarked guess picture. In our technique, higher strength is gotten due to implanting the watermark in low recurrence. What’s more, higher intangibility is picked up by dispersing the watermark’s bit in various squares. We assessed the power of the proposed system against numerous basic assaults, for example, JPEG compression, added substance Gaussian commotion and middle channel. Contrasted and related works, our strategy end up being profoundly safe in instances of compression and added substance commotion, while protecting high PSNR for the watermarked pictures.

Contrivance Management using Arduino and Motion Detector
Authors:- G.Vikram Assistant Professor, Assistant Prof. M.Narendra Prasad

Abstract:- Gadget Control Framework utilizing Arduino and PIR (Inactive Infrared) Sensor can be utilized to turn ON and OFF the lighting framework of domestic naturally or any other framework by identifying the nearness of human. This framework can be utilized in carports, classrooms, staircases, lavatories, etc. where there’s no require of nonstop light but only when there’s a human. Moreover, there’s no have to be stress approximately power bills as the lights get OFF when there’s no human and thus one got to pay the bills as per utilize. This paper proposed as almost programmed contraption control framework which consequently controls the room lights utilizing Arduino and PIR sensor. The most components utilized in this framework are Arduino Uno, PIR sensor and Hand-off Module. Out of these components, the operation of framework primarily depends on PIR sensor which makes a difference in recognizing human nearness.

Optimisation of Machining Parameters in Electrochemical Machining (Ecm) of Aluminium 6082 T87
Authors:- Kailashbalan P, Prof. Sivasubramanian R, Ajith Kumar K, Guru Prasath M, Ranjith S

Abstract:- The main objective is to find the optimal machining condition at which the electrochemical machining of Aluminium 6082 T87 will be done in an highly economical, efficient and in an effective way. The effect of process parameters such as electrolytic concentration and voltage on performance characteristics such as material removal rate (MRR) and surface roughness (SR) during Electro Chemical Machining of Al 6082 T87 was investigated. The microstructure of machined surfaces which reflects the performance of electrochemical machining at various machining parameters was also studied. ANOVA was used to investigate the influence of process parameters on performance characteristics during machining. It was observed that MRR increased with increase in voltage whereas SR decreased.

A Robust Model for Unreliable Cloud by Evaluating Trust Values
Authors:- M. Tech. Scholar Sonanchal Singh, Prof. Sumit Sharma

Abstract:-Trust plays a crucial role in cloud environment to offer reliable services to the cloud customers. It is the main reason for the popularity of services among the cloud consumers. To achieve this, trust should be established between cloud service provider and cloud consumer. Trust management is widely used in online services, E-commerce and social networks. This paper focus on a model that can identify real nodes by its behavior in cloud. Here fuzzy max interval values were evaluate from the transactional behavior of the node in fix interval. By increase in transaction count real node trust value get increase and macilous nodes trust value get decreases. Experiment was done on ideal and attacked environment. Evaluation parameters values shows that proposed model of fuzzy interval trust is better as compared to other existing model of unreliable clouds, for identification of malicious nodes.

A Survey on Various Techniques and Features of Digital Image Data Watermarking
Authors:- Phd Scholar Shweta Singh, Dr. Laxmi Singh

Abstract:-As the computerized world is developing with different sort of information like content record, picture, video. Out of those picture assumes a significant job in various field, for example, remote detecting, internet based life, and so on. So keep up the picture quality is finished by Digital image processing on different issues. This paper gives a concise study of image proprietorship maintenance by information concealing procedures for different type of images. Picture investigation features are portray in this paper with their fundamentals. As watermark information is invisible yet it has to maintain some properties of watermarking which are likewise explain in this paper as they are the best measure for comparing various procedures of watermarking work. Detail discussion of various researcher works was also brief in this paper.

Mental Health
Authors:- Arpan Godiyal, Ashish Choudhary, Puneet Garg, Rishabh Rawat, Mr. Dhyanendra Jain

Abstract:-Background: Mental disorder is one of the most important diseases of which is predicted to increase from 10.5% to 15% until 2020. This study aims to determine various factors influencing the mental health of employees of an organisation.
Methods: We have studied a dataset from 2014 survey which measures attitudes towards mental health and frequency of mental health disorders in the tech workplace.We have applied regression models to analyse that data and draw conclusions.
Results: How mental health of an employee depends on factors like age, gender, family history, leaves etc. Conclusion: In order to improve people’s mental health, it is recommended that healthcare officials may more attention to this matter through implementation of programs such as life skills’ training, stress resistance skills training, and helping individuals to be able to adapt themselves to their life environment.

Bioelectricity generation from agro-industrial waste water using dual-chambered microbial fuel cell
Authors:- Mostafa Abdelshafy Ramadan, Mohamed Hemida Abd-Alla, Usama M. Abdul-Raouf

Abstract:- Bioelectricity production from wastewater beside treatment is the main goal offered by microbial fuel cells (MFCs) technology. This study was demonstrated to evaluating the electricity generated by the double-chamber air-cathodic MFC while reducing pollutants from sugar industry wastewater (SIW). A simple double-chamber MFC was configured with Nafion 117 membrane, and operated without adding any chemical mediators. SIW used as an electron donor and was fed in batch-mode into the MFC for three consecutive operational cycles. While the maximum MFC output voltage in open circuit (OCV) mode was 890 mV after 24 operational days, the closed circuit voltage (CCV) was 340 mV when 550 ohm as external load was applied. From the polarization curve, the maximum power density of 160.16 mW/m2 as power output was observed at a current density of 320.9 mA/m2. The efficiency of the MFC was measured based on columbic efficiency (CE) and chemical oxygen demand (COD) removal rate. While the CE was 46%, the COD removal efficiency reached 85.4%. The anodic biofilm was observed through scanning electron microscopy (SEM). The current study results indicated that SIW microbial communities in the anodic biofilm have the ability to produce bioelectricity using MFC in parallel with the SIW substrate treatment.

Cancer Risk Prediction Models using Svm and Decision Tree
Authors:- M. Tech. Scholar Priya Bharti, Prof. & H.O.D. Ashish Tiwari

Abstract:-Cervical blight and the anticipation of analytic aftereffect are a part of the lot of important arising applications of gene announcement microarray technology with affection sequencing of microRNA. By application reliable and dependable allocation of apparatus acquirements algorithms accessible for microarray gene announcement profiling Data is the key in adjustment to advance the lot of acceptable and accessible predictive archetypal to be acclimated by patient. In this paper, two-machine acquirements algorithms accept been acclimated which are Support Vector Machine (SVM) and Decision Tree for the predictive models of cervical cancer. We analyze and appraise the achievement of these two algorithms in adjustment to apperceive which algorithm has bigger performance. In this study, 714 appearance and 58 samples are acclimated to advance predictive archetypal for cervical blight and our computational after-effects appearance that Decision Tree algorithm beat SVM algorithm with the accurateness of 99.42%. Our Data aswell accentuate the accent of variables, which accord the cogent role in admiration the accident of cervical cancer.

Healthcare Prediction using Hybrid Algorithm
Authors:- ME Scholar Vaishnvee Upadhyay, Assistant Prof. Mahesh Lokhande

Abstract:-In medicinal sciences forecast of Heart sickness is most troublesome undertaking. In India, fundamental driver of Death are because of Heart Diseases. The passings because of coronary illness in numerous nations happen because of work over-burden, mental pressure and numerous different issues. It is found as fundamental reason in grown-ups is because of coronary illness. Along these lines, for distinguishing coronary illness of a patient, there emerges a need to build up a choice emotionally supportive network. Information mining order systems, to be specific Modified K-means and SVM are broke down on Heart Disease is proposed in this Paper.

Implementation of Java Frameworks for Web Applications
Authors:- Saksham Gupta

Abstract:- In this paper represents the web design frameworks as a conceptual methodology to expend the probabilities reuse in Web applications. Firstly I have presented the importance for construction abstract and reusable directional design structures, demonstrating with different kinds of Web information Systems. Hibernate Framework Technology as unique and well-organized resources to take immeasurable databases and also on how to implement persistent features in object-oriented system finished it. It provides a denotation of design patterns and frameworks and discovers the confederation between design patterns and Frame works. Java accepts N-tier framework of MVC Model in platform and uses EJB, Struts WEB Framework and Hibernate technology.

Nfc Based Dual Authentication Access Control System With Biometric
Authors:- M.Tech. Scholar Naresh Kumar Masurkar, Asst. Prof. Priyanshu Pandey

Abstract:-This paper introduces readers to the world of information technology and data security as a part of it. It talks about access control, its components, and levels and types of access control. The paper recognizes the importance of identifying and authenticating any given user in the business areas. Therefore, it gives full attention to biometrics as one of the access control technology and discusses variety and performance of other known techniques; points out the advantages and disadvantages of using them. The paper also presents some real life examples of companies, implementing biometric solutions in their businesses. In this article show how Near Field Communication with biometric authentication with the more security of Server authentication. , it can be connected to the internet using the Ethernet port or by Wi-Fi connectivity. It results in convenience, energy efficiency, and safety benefits leading to improved quality of life. Its futurity, energy efficiency, control over the appliances from any location makes it very handy to use. So, concerning size, power, and price of the Raspberry Pi is qualified for a house-controller.

Magnetic Levitation and its Application on Magnetic Suspension System
Authors:- Kailashbalan P, Asst. Prof. Manivannan C, Ajith Kumar K, Guru Prasath M, Mohammed Muthahar R

Abstract:- The main objective is to study the concept of magnetic levitation and to develop a prototype model of magnetic suspension system using ceramic magnets and to calculate its total energy consumption, total energy reserved as resistive force. The efficiency of magnetic suspension system and hydraulic suspension system were calculated using a standard formula. Comparison was made between the magnetic suspension system and the hydraulic suspension system in terms of their efficiency and energy. The results were proved to be almost similar.

Review Of Cancer Risk Prediction Models
Authors:- M. Tech. Scholar Priya Bharti, Prof. & H.O.D. Ashish Tiwari

Abstract:- We review development, validation, and adaptation of Risk anticipation models to analytic and citizenry practices. We focus on issues in anniversary of these accomplish and the gaps in the acreage beyond the continuum of Risk anticipation archetypal development (many models published); validation (few validated); and accomplishing (even beneath implemented in analytic settings, abundant accomplishing on web sites). Design of models for end users and analytical issues in implementing and evaluating models are addressed with examples from contiguous experience.

Survey Paper on E-Voting System using Blockchain
Authors:- Ayushi Pusadkar, Dhanshri Sawant, Sharvari Prasade, Jay Meshram, Prof. A.S. Kalaskar

Abstract:- To develop an E-voting system in order to achieve privacy, security, transparency by replacing the traditional e-voting system has the potential to minimize the fraud voting. The system will increase convenience for voters. It will make very easy for people with disabilities or who have trouble moving around to vote. It is very quick and private way to vote. This will increase the number of voters since the process does not take up too much of their time of the day. It will help to increase the trust of the people in the government since it is more transparent than the current system. To explore the design of currently available voting protocols, the entities involved in the election, the features they contain, and how secure they are. To examine and understand how block chain technology works as a distributed append- only ledger and show how this aspect of the block chain makes it suitable for electronic voting. To determine the best front-end languages to build this project. To run a comparison of different available technologies that are suited for back-end security work, a database, and a block chain ledger.

A Review: Rumors Detection on Twitter Using Machine Learning Techniques
Authors:- ME Scholar Akanshu Patidar, Assistant Prof. Kapil Shah

Abstract:- In this period, web based life stage are progressively utilized by individuals to pursue newsworthy occasions since it is quick, simple to get to and modest similarly. In spite of the expanding utilization of web based life for data and news assembling, its tendency prompts the development and spread of gossipy tidbits i.e., data that are unconfirmed at the season of posting, which may makes genuine harm government, markets and society. Along these lines, there is need of compelling framework for distinguishing bits of gossip as ahead of schedule as conceivable before they generally spread. Viable framework should comprise of four parts: Rumor location, gossip following, position grouping, and veracity arrangement. Loads of work has been done in later segment while less work in segment talk identification. In this way, presently we should take a shot at gossip location. In this paper, we will condense endeavors done till now around there. A large portion of existing techniques identifies from the earlier bits of gossip, i.e., predefined gossipy tidbits. So it is required to have robotized gossip discovery strategy which recognizes new developing gossipy tidbits viably and as ahead of schedule as could reasonably be expected.

A Review on Impact of Roadway Conditions, Traffic and Manmade Features of Road Safety
Authors:- M.Tech. Scholar Ritu Shingloo, Prof. Shashikant Dhobale

Abstract:- The problem of accident is a very acute in highway transportation due to complex flow pattern of vehicular traffic, presence of mixed traffic along with pedestrians. Traffic accident leads to loss of life and property. Thus the traffic engineers have to undertake a big responsibility of providing safe traffic movements to the road users and ensure their safety. Road accidents cannot be totally prevented but by suitable traffic engineering and management the accident rate can be reduced to a certain extent. For this reason systematic study of traffic accidents are required to be carried out. Proper investigation of the cause of accident will help to propose preventive measures in terms of design and control.

A Review on Effect of Highway Geometric Elemnets on Accident Modeling
Authors:- M.Tech. Scholar Neha Gangwa, Prof. Vinay Deulkar

Abstract:- Road safety is an issue of prime importance in all motorized countries. The road accident results a serious social and economic problems. Studies focused on geometric design and safety aim to improve highway design and to eliminate hazardous locations. The effects of design elements such as horizontal and vertical curves, lane width, shoulder width, super elevation, median width, curve radius, sight distance, etc. on safety have been studied. The relationship between geometric design elements and accident rates is complex and not fully understood. Relatively little information is available on relationships between geometric design elements and accident rates. Although it has been clearly shown that very restrictive geometric elements such as very short sight distances or sharp horizontal curve result a considerably higher accident rates and that certain combinations of elements cause an unusually severe accident problem. In this paper, road geometric design elements and characteristics are taken into consideration, and explanations are given on how to which extent they affect highway safety.

A Review: Text to Speech Conversion
Authors:- Udisha Gupta, Uzma Badar, Mansi Varshney, Shivam, Guided By Ms. Jyoti Verma

Abstract:- Text-To-Speech (TTS) is a computer based system that can be able to read any text aloud. There are many systems which convert text to speech. The main aim of this paper is to study TTS which helped us in making our project. This project consist the solution for the problem that differently able person, old age people and illiterate people face while using social media. Our application is user friendly voice based chat application in which it can verbally respond on the basis of predefined commands in “Text” format and also take voice inputs then convert them into text. This paper consist design, implementation of our application. This application consist two modules voice to text and text to voice.

Analysis and Evaluation of Gravel Pack in Horizontal Wells
Authors:- Bestman Tamunodiyepiriye, Dr. Wopara Fidelis

Abstract:- In this research, gravel packing in horizontal wells are being analyzed to get the total pack efficiency of the gravel pack job. A model is developed for the gravel pack process using the basic laws of physics during the placement of the gravel in the horizontal well bore presuming some conditions are followed. The model developed is simulated using a Horizontal Gravel Pack SIMulator (HGPSIM), the results are now analyzed to determine the effectiveness and pack efficiency of the gravel pack job. The results gotten from the simulation process done in this research indicates that the settling effects of the slurry has to be considered when determining the pack efficiency of the gravel pack process. Some parameters where isolated, varied and analyzed to get the best gravel pack in terms of various injection rates to get their pack efficiencies. It was observed that low viscosity carrier fluid, low gravel concentration at low injection rates would give the most effective and efficient gravel pack process in horizontal wells. These results coincide with the general practices of gravel pack in horizontal wells.

Recommendation System Using Sentiment Analysis
Authors:- Supriya Manglekar, Shrutika Kakde, Pragati Kumar, JSS Krishnakanth

Abstract:- In this quickly developing period of advances, clients or customers assume an exceptionally essential job in basic leadership then it is possible that it will be for business associations, corporate associations or other individual shoppers. Consequently for business development or shopper fulfillment it is important to make strategies or systems that naturally takes a shot at characterization about any items. This technique can be accomplished by building a proposal framework utilizing an ebb and flow look into point in the field of content mining known as slant examination. An effective suggestion framework can be characterized as a framework which encourages client to settle on choice in numerous viewpoints. In actuality, building such a framework will be an extremely troublesome methodology. In this venture, we will attempt to discover the answer for conclusion in various areas, Sentiments of clients with respect to the items gave by sites like Twitter, Amazon, Flipkart, Oyo, Zomato, Olx are considered. Assessments of the clients are as appraisals and surveys. The principle objective of this work is to consolidate suggestion framework and feeling examination to get a progressively precise framework for clients.

A Review Article of Ptc Based Higher Efficient Hybrid Plants
Authors:- M.Tech. Scholar Sandeep Kumar, Associate Professor Suresh Kumar Badholiya

Abstract:- Now a day’s electricity is most needed facility for the human being. All the conventional energy resources are depleting day by day. So we have to shift from conventional to non-conventional energy resources. In this the combination of two energy resources is takes place i.e. PTC, wind and thermal energy. This process reviles the sustainable energy resources without damaging the nature. We can give uninterrupted power by using hybrid energy system. Basically this system involves the integration of two energy system that will give continuous power. Solar panels are used for converting solar energy and wind turbines are used for converting wind energy into electricity. This electrical power can utilize for various purpose. Generation of electricity will be takes place at affordable cost. This work deals with the generation of electricity by using two sources combine which leads to generate electricity with affordable cost without damaging the nature balance.

Hybrid Teacher Learning and Particle Swarm Optimization Based Dynamic Load Balancing
Authors:- Vinod Patidar, Dr. Shiv Sakti Shrivastava

Abstract:- A digital platform objective is to split information, estimation, and service evidently over a scalable system of nodes. While Cloud computing a service accumulates the information and dispersed resources in the release atmosphere. Consequently load balancing in this atmosphere is a key problem. This paper has resolve this issue by developing a dynamic algorithm which generate job sequence as per available resources. This paper has proposed a hybrid genetic algorithm where Particle Swarm Optimization PSO and Teacher Learning Optimization TLO algorithms operation were combined to generate low cost job sequences. Experiment was done on real dataset job sequences. Results were compared with existing algorithm on different evaluation parameters and it was obtained that proposed TLPSO algorithm values are better.

Document Class Identification using Fire-Fly Genetic Algorithm and Normalized Text Features
Authors:- Vinod Patidar, Dr. Shiv Sakti Shrivastava

Abstract:- Increase of digital platform resources ultimately raises the text content on different platform, so organization of this unstructured data is highly required. Researcher has proposed number of techniques to filter relevant data inform of feature so enhancing the understanding of work. This paper has work on clustering the document of research filed into respected class. Here paper has proposed an modified firefly genetic algorithm for clustering of document into respected cluster. Fire fly crossover operation was modified in this paper where best chromosome update rest of population. Pattern based features were evaluate from the text content. Normalized content feature were used for the work. Experiment was done on real set of research paper taken fro various research domain. Results were compared on different evaluation parameters with exsisting model and it was obtained that proposed model of FFDC( Fire Fly Document Classification) was better than other.

Robust Intrusion Detection System using SVM and Artificial Neural Network
Authors:- Raj Kumar Panday, Dr. Shiv Shakti Shrivastava

Abstract:- With large increase of internet user’s network security is important issues in today era. As variety of users have different requirement, so proper identification of safe network is required. This work focus on the network intrusion detection using SVM and neural network. Here SVM classify network behavior into two class first is safe and other is unsafe. Once unsafe network is identified then trained neural network identified attack type of the input sessions. So Whole work is divide into two modules, first is separation of safe and unsafe session from the dataset using SVM. Then in second module identification of type of intrusion is done in unsafe network by EBPNN. Experiment is done on real dataset and obtained results are better than previous works on different parameters.

Statement Analysis using NLP
Authors:- M.S.Vinu, P.Mohan, S.Ganesh Moorthy, M.Gobinath

Abstract:- We aim to draw on an important overlooked poten- tial of affective dialogue systems—their application to promote positive emotional states, similar to that of emotional support be- tween humans. This can be achieved by eliciting a more positive emotional valence throughout a dialogue system interaction, i.e., positive emotion elicitation. Existing works on emotion elicitation have not yet paid attention to the emotional benefit for the users. Moreover, a positive emotion elicitation corpus does not yet exist despite the growing number of emotion-rich corpora. Towards this goal, first, we propose a response retrieval approach for positive emotion elicitation by utilizing examples of emotion appraisal from a dialogue corpus. Second, we efficiently construct a corpus using the proposed retrieval method, by replacing responses in a dialogue with those that elicit a more positive emotion. We validate the cor- pus through crowdsourcing to ensure its quality. Finally, we pro- pose a novel neural network architecture for an emotion-sensitive neural chat-based dialogue system, optimized on the constructed corpus to elicit positive emotion. Objective and subjective evalua- tions show that the proposed methods result in dialogue responses that are more natural and elicit a more positive emotional response. Further analyses of the results are discussed in this paper.

Optimization of Parameters To Reduce The Surface Roughness in Face Milling Operation on Stainless Steel and Mild Steel Work Piece Applying Taguchi Method
Authors:- Research Scholar Yogesh Raut, Associate Prof. Dr. Amit Bahekar

Abstract:- This experimental study is based on the optimization of milling parameters to reduce the surface roughness in face milling operation using Stainless Steel (SS) and Mild Steel (MS) Work Piece. This experimental study will conduct under the three varying parameters depth of cut, spindle speed and feed rate. The settings of milling parameters will determine by using the Taguchi experimental design of L9 Orthogonal array method. All the nine experiments have conducted using a Stainless Steel and Mild Steel work piece and the roughness was checked using the surface roughness tester. Minitab 19 software has used to find out the combination of the optimum milling parameters by using the analysis of Signal-to-Noise (S/N) ratio. This experimental study will help in decreasing the surface roughness using the optimal combination of the milling parameters.

Traffic Management Through Roundabout at Major Intersections in Khargone City
Authors:- PG Student Mohd Rehman Sheikh, Asst. Prof. Vinay Deulkar

Abstract:-The traffic clogs are the serious issue in any creating city. Khargone city being a creating city having traffic issue in a few crossing points that is the reason, Traffic Rotary at street convergences is unique type of level difference in paths to channelize development of vehicles a single way around a focal traffic island. With quick development of traffic it is encountered that enlarging of streets and giving flyovers have gotten basic to conquer significant clashes at crossing points, for example, impact among through and right turn developments. Along these lines, significant clashes are changed over into milder clashes like combining and wandering. The vehicles entering the turning are delicately compelled to move a clockwise way. They at that point weave out of the revolving to the ideal course.

Smart Ambulance with Traffic Control
Authors:- Mr.Prashanth H S , Sandhya D, Shalini V, Sheela, Vydehi Bhat

Abstract:- Road traffic jam becomes a serious issue for extremely huddled metropolitan cities. Ambulance service is one in all the main services that gets delayed by traffic jams. An ambulance or any emergency vehicle stuck in traffic is unable to cross the signal due to poor traffic signal controller. This project aims at providing a solution by alerting the traffic controller before the ambulance reaches the traffic pole using the concept of Internet of Things (IoT).

Vibration Signal Denoising And Fault Diagnosis Of Rotating Machine: A Review
Authors:- M.Tech. Scholar Virendra Singh Rajput, Assistant Prof. Seema Shukla

Abstract:- Vibration signal plays very important role in fault diagnosis of machine because it carries dynamic information of the machine. Signal processing is essentially needed to process and analyse signal but it is difficult to process and analyse the noisy signal. In many cases the noise signal is even stronger than the actual vibration signal, so it is important to have some mechanism in which noise elimination can be effectively done without affecting the actual vibration signal. This paper presents two robust techniques for denoising of vibration signals corrupted by Additive White Gaussian Noise. The proposed method uses the Stationary Wavelet Transform (SWT) and the Dual Tree Complex Wavelet Transform (DTCWT). The proposed methods are very efficient due to their shift invariance property and have reduced aliasing effect than other methods such as Discrete Wavelet Transform (DWT), Continuous Wavelet Transform (CWT), Short Time Fourier Transform(STFT) etc.

A Review on Designing of Photovoltaic System Based on The Enhanced P&O Algorithm
Authors:- M.Tech. Scholar Shrangarika Dehariya, Associate Professor Dr. Dolly Thankachan

Abstract:- In this paper a structure of the photovoltaic system with MPP algorithm and function is generated which is the combination of structures of discovering solar module and DC-DC buck-boost converter along with algorithms of observation and perturbation P&O. The system stimulates inside the different conditions of climate and MPPT algorithms. By comparing the results of the simulation it is found that the tracking of the power accurately in the photovoltaic simulation system is done by using the MPPT algorithm. MPPT and P&O algorithm gives fast and quick output and it regulates PV output voltage. The major part in this process is played by the renewable energy which is solar energy.

World-Wide Manufacturing Overview: A Discussion On The Future
Authors:- Graduate Student and Review Fellow Nuzhat Fatima

Abstract:- This paper is describing about the manufacturing situation in the world. Today’s era is of industry, machine and continuously developing technology. The present world has been developed unexpectedly than the past. Now a days, without manufacturing technology, survival is in-imaginable. The author wants to highlight an overview of present condition and a corresponding analysis of the future.

Literature Survey on Current Public Bus Transportation
Authors:- Snehal Jose, Daniel Anto, Robin K M, Associate Prof. & Dr. R. Satheesh Kumar

Abstract:- Now days lots of passengers struggling to find correct bus which they supposed to enter.The fare collection system which currently in bus transportation is not efficient and corrupted. The conductors collect different amount of money from different persons also they will not give balance also.In this paper we are mainly focusing about different technologies that are available for smart use of bus transportation. Now all around the globe there are many new technologies that make bus transportation smart. The main technologies like BRTS, Rav Kav card etc.The system will help passengers to track each bus.that is the main advantage of our system. Also it helps to anti-corruption and efficient use of bus transportation system.

A Survey on Big Data Analytics: Challenges Of Big Data Integration, Open Research Issues And Tools
Authors:- GeyaSudha Singanamalla, Sree Devi E

Abstract:- Data has evolved in the last 5 years like never before. Lots of data is being generated each day in every sector such as social media, E-Commerce, Tech giants Organizations have slowly started realizing that they would be interested in working on all the data. Organizations are interested in doing precise analysis and they want to work on different formats of data such as structured, unstructured and semi structured data. Organization are trying to gain the inside data or to find the hidden treasure in so called Big Data. Now, any Organization would want to have a solution which allows them to store huge amount of data, capture it, process it, analyze it and also look into the data to give more value to the data. So, Big Data analysis is a current area of research and development. The basic objective of this survey paper is to give an idea on the potential impact of big data challenges, open research issues and various tools associated with big data. As a result, this article provides a platform to explore and provides the organizations and the researchers to develop the solution to big data based on the challenges and open research issues.

Secure Data Sharing in Mobile Cloud Computing
Authors:- Arshad Azmi, Associate Aarti Gautam Dinkar

Abstract:- Mobile cloud computing (MCC) is one of the technologies essential in today’s mobile environment run by using mobile devices in cloud environment. MCC has been imagined as the cutting-edge technology of IT enterprise. It combines both the features of mobile computing and cloud computing. It moves the application programming and databases to the unified datacenters, where the administration of the information and administrations may not be completely reliable. With the advancements in the field of MCC, security is a major issue. Some of the common security issues regarding data are like- risk of data theft, violation of privacy rights and loss of physical security, handling of encryption and decryption keys, data storage security. In this paper we provide a solution for data storage security and handling of encryption and decryption keys issues. In this paper we proposed a method which is implemented by combining the concepts of Diffie- Hellman Key Exchange (DHKE) algorithm and Blowfish algorithm. In this proposed scheme, at first a computer user will encrypt a file using a secret key generated by blowfish algorithm. Then using DHKE protocol a shared private key will be generated for two users who are trying to communicate. Presently if the subsequent user needs to decrypt the document encoded by the primary user, he/she needs to use the mutual key for authorization. When the permission is granted, the document can be decrypted by using blowfish algorithm. These proposed mechanisms can securely share and store data in cloud environment.

Cancer Detection Using Minimum spanning tree with Hyperspectral Images
Authors:- Asst. Prof. M.Gowtham Raj, Prof. P. Geetha

Abstract:- Cancer remains a major cause of mortality around the world. Survival and life quality of the patients connect straightforwardly to the measure of the essential tumor early discovery of dangerous tissue might move forward both the frequency and the survival. Rather than conventional biopsy, it’ll be perfect to put forward the cancer location utilizing intrusive procedures, it can make the treatment more viable and basic Here a self-sufficient classification strategy has been presented that combines both spectral and spatial data on hyperspectral images of a tissue in recognizing cancerous by means of an automatic calculation based on Minimum Spanning Forest (MSF) and Optimal band has been proposed to classify cancerous tissue on hyperspectral images. A support vector machine classifier is prepared to form a pixel-wise classification likelihood outline of cancerous and solid tissue. This outline is at that point used to distinguish markers that are used to compute common data for a run of groups within the hyperspectral image and in this way select the optimal groups. An MSF is at last developed to section the image utilizing spatial and spectral data. The SVM classifier is used to recognize between the typical or irregular tissue based on the MSF Marked region.

Disinfectant Efficacy Testing of Imago & Getter Disinfectant on non-porous surfaces using Surface Challenge Test
Authors:- Sachin D. Joshi, Dr. Imran Memon, Dr. Tahur Shaikh, Idris Khan, Surjeet Samanta, Komal Kumari, Romil Dagha

Abstract:- Disinfectants are used to maintain the bioburden of any facility under limits and making them free from any external or internal pathogenic intervention.The cleanroom area of any pharmaceutical facility comprises of different surface, these surfaces are easier to disinfect and so the cleaning and disinfection programs complement each other. The Disinfection efficacy and validation studies are carried in consistent with the United State Pharmacopeia <1072> Disinfectants and Antiseptics protocol. This study was aimed to generate data to provide a high degree of assurance that the disinfection program will consistently yield results that meet pre-determined specification by using different types of Imagard brand disinfectant. The recommended concentration of all the disinfectant at precise time i.e., 10 minutes showed excellent log reduction against the standard test organisms. The results proved that Disinfectant Imagard HD, Imagard IG PRO 401, Imagard IL 15, Imagard AS 10, Imagard SF 25 and Imagard Plus are effective against the standard test organisms. These data add a layer of product safety and generate confidence in the customer’s ability to deal with an unexpected contamination event.

Printing Solution: Online Printing with The Help of Android Mobile Application
Authors:- Mohammad Arsalan Adil, Vaibhav Daf, Rohit Kelzarkar, Karan Potdukhe, Ashish Pardhi

Abstract:- This paper presents the “printing solution” android mobile application for printing, which helps customers to print their printing stuff online without going to a different printing press. Now a day’s printing has become the part of everyone’s life, whether it is businessman, commercial dealer, wholesale dealer, shopkeeper, teacher, student, etc all are connected to printing. Today customers are visiting printing press to print their printing stuff, but with the help of printing solution mobile application customer are no longer need to go to the printing press, by sitting at their home they can print number of things at any time. The “printing solution” mobile application consists of printing options such as visiting cards, wedding cards, bill books, letterheads, banners, pamphlets, etc. All these options are available to a customer for printing. The android studio software is used to make this application, xml language is used for designing the front end and java language is used for backend connectivity and firebase is used as a database.

Improved RSA Algorithm Based on Cloud Database using Proth Number and Mersenne Prime Number
Authors:- Aditya Kumar

Abstract:- The purpose of this study is to improve the strength of RSA Algorithm and at the same time improving the speed of encryption and decryption. RSA algorithm or Rivest-Shamir- Adleman algorithm is named after Ron Rivest, Adi Shamir and Len Adleman, who invented it in 1977-78. The RSA crypto-system is the most widely-used public key cryptography algorithm in the world. Its security is based on the difficulty of factoring large integers. This paper presents an improved RSA algorithm which is superior to the original RSA algorithm in terms of strength of encryption and speed of encryption and decryption. This includes the strengthened form of RSA algorithm along with the architecture of the proposed algorithm. A cloud based database is used store the keys in advance. The modified RSA algorithm is compared on various aspects with the original RSA algorithm and the proposed algorithm certainly improve the strength and speed of computation. The experimental result shows that the encryption time remains more or less similar to the original RSA even though the complexity of calculation is increased. The decryption time is reduced considerably as compared to the original algorithm.

Survey on A New Controller for Bi-Directional Wireless Power Transfer Systems
Authors:- M.Tech. Scholar Manish Kumar, Assistant Professor Poonam Khatarkar

Abstract:- Wireless power transfer (WPT), which transmits power by an electromagnetic field across an intervening space, provides the prospect of new opportunities for electric vehicles (EVs) to enhance sustainable mobility. This review article evaluates WPT technology for EV applications from both technical and sustainability perspectives. The distinct research on, efficient WPT design for low power applications encompasses on designing proper coupling circuit by considering application constraint and addressing different issues in the resonant coupled circuit. This section analyzes the technical literature related to WPT links, capacitive power transfer, power transfer to multiple receivers, interference-free simultaneous power transfer, spatial misalignment mitigation technique and navigational force generation using magnetic circuits.

Result Analysis on New Controller for Bi-Directional Wireless Power Transfer Systems
Authors:- M.Tech. Scholar Manish Kumar, Assistant Professor Poonam Khatarkar

Abstract:- Challenges and opportunities remain in the design and deployment of WPT EV systems. Dynamic wireless charging offers opportunities for sustaining the battery charge while driving so that the large battery pack that represents a bottleneck for deploying EVs can be eliminated and range anxiety will be reduced. The environmental, economic and societal impacts of large scale infrastructure deployment and performance in terms of energy efficiency, durability, and reliability must be carefully evaluated for prospective real-world deployment of dynamic WPT EVs. Stationary WPT for residential and commercial charging is expected to have earlier wide spread adoption than dynamic charging given its technical maturity and economic feasibility, while dynamic WPT could be implemented gradually if the market develops enough to significantly lower the high initial infrastructure cost.

An Excess Food Redistribution Framework Using Smart Container
Authors:- Mrs.Sougandhika Narayan, Shreelekha R N, Shrividya N, Varshitha K, Rashmi Hegade

Abstract:- A trusted and active community aided and supported by the Internet of Things (IoT) is a key factor in food waste reduction and management. This paper proposes an IoT based context aware framework which can capture real-time dynamic requirements of both vendors and consumers and perform real-time match-making based on captured data. We describe our proposed reference framework and the notion of smart food sharing containers as enabling technology in our framework. A prototype system demonstrates the feasibility of a proposed approach using a smart container with embedded sensors..

A Literature Review on Study of Silica Fume as Partial Replacement of Cement in Concrete
Authors:- Kausthibh A. Pashankar, Lecturer A. S. Patil, Asst. Prof. P. M. Thorat

Abstract:- India is a developing country. Many construction projects are going on and many projects are proposed in near future. If we evaluate some of the projects in past, we find that they cannot sustained due to lack of enough considerations towards the sustainability of these projects during the planning stage. This is about the sustainability of individual projects. In broad context the construction sector consumes lot of natural resources in the form of material and fuel. This has adverse effect on the environment and ecology. The emission of CO2 in production processes contributes to global warming. Use of alternative materials, production processes, reuse and recycling of waste materials will help in preserving the natural resources. In recent study, there has been a considerableattempts for improving the properties of a concrete with respect to a strength and durability, especially in aggressive environments. High performance concrete is appears to be a better choice for the strong and durable structure. A large amount of the by-product or a wastes such as fly-ash, copper slag& silica fume etc. are generated by industries, which causes environmental as well as health problems due to dumping and disposal.Proper introduction of the silica fume in the concrete improves both the mechanical and durability characteristics of the concrete.

Review of Under Water Communication
Authors:- ME Scholar Rajju Jambekar, Assistant Professor Nilesh Parmar

Abstract:- This paper explains briefly our research directions in the field underwater sensor networks. We explain potential applications to off-shore oil fields for equipment monitoring, seismic monitoring and underwater robotics. We describe research directions in MAC, short-range acoustic communications, localization protocols and time synchronization for high latency acoustic networks, application level time scheduling and long-duration network sleeping.

Analysis of a method of Video Preprocessing with the help of Optical Character Recognition And Natural Language Processing
Authors:- B.Tech. Scholar Samarth Bajaj, Assistant Professor Viplove Divyasheesh

Abstract:- This research paper mainly focuses on the algorithm of searching for videos on YouTube, Daily Motion, Crackle, etc. At present whenever we want to search a video on any platform we search it by the name of the video and the contents that are given by the video maker, we are not able to search a video on the basis of the theoretical contents in that video. Though we can easily search a video if it is not based on theoretical content but if the video is purely theoretical and we are searching it for the first time then at present we cannot search that video by the content shown in that video. So, in this paper, we will understand how it is possible to search a video on the basis of the theoretical content in that video.

Sheet Metal Forming Processes Recent Technological Advances
Authors:- Saket Kumar Singh

Abstract:- The sheet metal industry has seen more technological advances than any other since the last century. Right from hand-forming processes to finite element based simulation, the transformation is very significant. They have prominent industrial applications especially in automotive industries. This may be attributed to the ease with which the final component with desired shape and appearance can be produced using simple tools. Due to wide range of applications, the process of forming the sheet metal into various shapes leads to classification of the forming processes based on specific operation. This classification involves bending, blanking, stretch forming and deep drawing. Each process has some parameters that define the quality of the work achieved. This paper aims at scattering light on the recent research and developments in the sheet metal forming processes over the last two decades. Most of the literature available on sheet metal forming focuses on the parameters that influence the quality and economic factor of the final product. The influence of process parameters based on geometry such as punch nose radius, blank temperature, and blank holding force, tooling dimensions, blank thickness and punch depth is significant. Similarly, the parameters based on the material properties like elastic strength, yield strength, plasticity and anisotropy have as much influence as the geometry based parameters. The literature raises the issue of defects in the formed parts. Defects such as wrinkling, tearing, springback, local necking and buckling in regions of compressive stresses have been analysed using both experimental and simulation techniques. Springback, the most predominant defect, has been researched thoroughly while considering sheet thickness, punch force, nose radius, binder force, die opening, punch velocity, punch height, sheet anisotropy, clearance, elastic limit and yield strength of the blank material as input parameters. Lastly, this paper also aims at reviewing the finite element based tool design, experimental and numerical investigations into sheet metal for ming processes.

Internet of Things: Survey on Future and Challenges
Authors:- Research Scholar Ahmed Mohamed Maher, Mca, Ph.D, Asst. Prof. S.Suganya

Abstract:- The computer science growth vary fast , and thanks to growing technology continuously One such concept is IoT (Internet of things) with which automation is no longer a virtual reality, IoT connects various non-living objects through the internet and enables them to share information with their community network to automate processes for humans and makes their lives easier. The paper presents the evaluation study of IoT,such as the technical challenges (connectivity , compatibility and longevity , standards , intelligent analysis and actions , security),the IoT architecture mainly requires two types of technologies: data acquisition technologies and networking technologies. Many technologies are currently present that aim to serve as components to the IoT paradigm. This paper aims to categorize the various technologies and challenges present that are commonly used by Internet of Things.

Contrivance Management using Arduino and Motion Detector
Authors:- Assistant Professor G.Vikram, Assistant Professor M. Narendra Prasad

Abstract:- Gadget Control Framework utilizing Arduino and PIR (Inactive Infrared) Sensor can be utilized to turn ON and OFF the lighting framework of domestic naturally or any other framework by identifying the nearness of human. This framework can be utilized in carports, classrooms, staircases, lavatories, etc. where there’s no require of nonstop light but only when there’s a human. Moreover, there’s no have to be stress approximately power bills as the lights get OFF when there’s no human and thus one got to pay the bills as per utilize. This paper proposed as almost programmed contraption control framework which consequently controls the room lights utilizing Arduino and PIR sensor. The most components utilized in this framework are Arduino Uno, PIR sensor and Hand-off Module. Out of these components, the operation of framework primarily depends on PIR sensor which makes a difference in recognizing human nearness.

Ultrasonic Technique for Physco-Mechanical Evaluation of Tungsten Alloys by Taguchi Technique
Authors:- A A Rabee, A M Abdelhay, M A Bahlol, Arafa S Sobh, A H Elsayed

Abstract:- Nine versions of the basic Tungsten heavy alloy “90W–7Ni–3Co “were investigated for optimal characteristics. These versions of the WHAs were manufacturing via powder metallurgy (P/M) technique. Involved PM preparation parameters together with the additions of specific percent of the Nano-particles of graphene were nondestructively evaluated. Study showed the effectiveness of using Taguchi Technique in representing and analyzing experimental results. Each alloy version has its own specific chracteristics, where influential primary affective parameter was ranked.

Web Application Vulnerability Exploitation using Penetration Testing scripts
Authors:- Shubham Rawat , Tushar Bhatia, Eklavaya Chopra, Asst. Prof. Akanksha Dhamija

Abstract:- Now a days many Webapps are being developed which on the one hand are beneficial but on the same part contains a lot of vulnerabilities. Most of the work which remains untouched is web security. Online shopping and web services are increasing at rapid rate. Cross Site Request forgery(CSRF) and Cross side scripting(XSS) are some of the top vulnerabilities. Going through this paper, we will cover a lot of vulnerabilities that are present in webapps and will be presenting some real world threats to the web apps. The vulnerabilities will be found out by the help of penetration testing. Various threat models for the vulnerabilities are also mentioned to give a good understanding about them.

Sentimental Analysis on Amazon Fine Food Reviews
Authors:- Kartikay Thakkar, Sidharth Sharma, Ujjwal Chhabra, Asst. Prof. Ms Charu Gupta

Abstract:- In the era of social media and internet, sentimental analysis is extremely useful in social media monitoring as it allows us to gain an overview of the wider public opinion behind certain topics. Our research is focused on to make prediction model where we will be able to predict whether a recommendation is positive or negative. in this analysis , we will focus on score as well as positive/negative sentiment of the recommendation. The analysis proves that logistic algorithm provides the best sentimental analysis result. Our results were further verified by the amazing accuracy of the Logistic regression classifier as well.

A Survey of Attacker Identification and Security Schemes in MANET
Authors:- M. Tech. Scholar Alok Gupta, Nikhil Ranjan

Abstract:- Security has become a crucial issue between the mobile nodes in Mobile Ad hoc Network (MANET). MANET is usually a lot of liable to physical security attacks and threats than the fixed- cable networks. The inherent characteristics of MANET like wireless medium, highly dynamic topology, distributed cooperation, resource strained capability, and restricted physical security poses variety of nontrivial security challenges to the network. Hence, social control of security through secure routing protocol becomes a very crucial task. Non-optimal routes are results of malicious modification through offender and inconsistent routing data exchange by offender during packet forwarding. The dynamic nature of MANET causes link breaks and new path ought to be search which cannot be optimum. In this paper, a trial has been created to think about the malicious varied attacks and security schemes proposed by various researchers and also proposed the some new approach against wormhole attack in MANET. In this paper we highlight the overview of MANET with description of routing protocols, security issue and attacks in MANET. Actually we focus on different types of attack and also present the some security scheme against attacks.

A High Sequence Value and Packet Dropping based Security Scheme in MANET
Authors:- M. Tech. Scholar Alok Gupta, Nikhil Ranjan

Abstract:- The malicious nodes are always stump intermediate nodes in routing procedure because these nodes are only receive and forward respond of surrounding neighbour. The intermediate nodes work is very responsible in routing procedure with continuous movement. In this research we proposed Malicious Sequence Number Identification (MSNI) security algorithm against malicious blackhole attack in MANET. The blackhole nodes The proposed security method of finding attacker is based on the identified the fake information of route in the network. The proposed scheme is detect the attacker presence and also estimate total number of packets is dropped by Blackhole attacker in network. The packet dropping on link through node is detected and prevented by security system. The blackhole presence is makeable in different node density scenarios and the single as well as multiple presences is detected by MSNI scheme. This method not only identified the balckhole nodes but also prevent from routing misbehaviour of attacker nodes. security is less effective on attacker/s. The performance of existing security scheme is compare with proposed MSNI and the performance of existing scheme is pitiable. The proposed secure MSNI is securing the MANET and improves the network performance after blocking malicious nodes in network. The network performance in presence of attack and secure MSNI is measures through performance metrics like throughput, routing packets flooding and proposed secures routing is improves data receiving and minimizes dropping data network as compare to existing security scheme.

Design & Analysis of Intake Manifold for SAE SUPRA
Authors:- Shubham Karkar , Omkar Kamble

Abstract:- This research paper aims to optimize the intake manifold of a formula SAE car competition. We are going to discuss about design & manufacturing of intake system for 390CC engine. We have used the 3-D printing technology to manufacture the following parts: -Restrictor, Plenum, Runner As a result, in this approach the geometry has been redesigned to result in reduction of weight. Analytical calculations are done to get maximum mass flow rate and minimum pressure drop across the restrictor. The intake manifold is designed with accordance to the SAE rule book which requires a restrictor of 20mm to be fitted in the intake manifold.

Satellite Image Fusion Based on Improved Wavelet Transform
Authors:- E.Gopi Krishna

Abstract:- The images captured by various satellites are high resolution images will also provide some distortion compared with original image. To avoid this problem we have number of basic transformations of image. Out of those, some frequently used fusion techniques namely IHS, PCA and Wavelet are discussed in this paper. Out of these three fusion methods, wavelet method is compared with two different fused rules. Improved DWT methods are, DWT using spatial frequency and DWT using mean max standard deviation. The proposed method (Improved DWT) performs better quality of fused image with good spatial and spectral resolution. This work addresses the increase in spectral distortion, entropy, mean, mutual information and standard deviation of fused image.

Deep Web and Cyber Crime
Authors:- Soham Mehta

Abstract:- The phrase “DEEP WEB” is used to denote content on the Internet which is not indexed by search engines.Among the different strategies in place to bypass search engine crawlers, the most efficient for malicious performers are so called “darknets”. I have analysed and researched on how malicious performers use these networks to trade goods and other services and examined how the deep web works, along with the goods and services offered. Due to a large variety of goods and services available in these marketplaces, I have focused on those that sparked the most interest from cyber crooks.

A Review on Grid-Connected PV Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel, Professor Pragati Priya, Professor Manju Gupta

Abstract:-The need for cleaner surroundings and also the continuous increase in energy desires makes localized renewable energy production more and additional necessary. This continuously-increasing energy consumption overloads the distribution grids in addition because the power stations, so having a negative impact on power availability, security and quality [1]. One among the solutions for overcoming this can be the Distributed Generation (DG) system. dg systems using renewable energy sources like solar, wind or hydro, have the advantage that the ability is made in shut proximity to wherever it’s consumed. This manner the losses because of transmission lines aren’t present.

Grid-Connected PV Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel, Professor Pragati Priya, Professor Manju Gupta

Abstract:- In the last decade solar power technologies became less costly and additional efficient, that have created it to an attractive resolution, being cleaner and additional environmentally friendly energy resource than traditional ones like fossil fuels, coal or nuclear. yet, a PV system continues to be rather more expensive than traditional ones, because of the high producing prices of PV panels, however the energy that drives them -the lightweight from the sun- is free, offered nearly everyplace and can still be present for many years, long in spite of everything non-renewable energy sources are depleted. One in every of the main benefits of PV technology is that it’s no moving components. Therefore, the hardware is very robust; it’s a long time period and low maintenance necessities. And, most significantly, it’s one resolution that gives environmentally friendly power generation. The efficiency of economic PV panels is around 15-20%. Therefore, it’s important that the power created by these panels isn’t wasted, by using inefficient power electronics systems. The efficiency and reliability of each single-phase and 3 part PV inverter systems is improved using transformer less topologies, however new issues related to escape current and safety need to be dealt with.

Supply Chain Management System Using Blockchain and IOT
Authors:- Saish Shah, Manas Maheshwari, Ayush Singh

Abstract:- The more traditional strategy to the supply chain was always a website that had to be set up or hosted by a supplier on a server. The supply chain data is centralized here, which means that the company only gets the information provided to it by the hosting company, and most of the important data is not received by the company in some cases which results in a conflict between the company and the customer on the hosting’s expense. So, our idea is to implement the supply chain using block chain technology along with IOT, this idea will enable the company to share the necessary data with the manufacturers, suppliers and the customers, hence, inducing transparency of data within the company. IOT also plays an important role in this, IOT ensures that there are no inconsistencies during the process and enables automation. So, our basic idea is to implement supply chain management using block chain to reduce complexity and induce transparency by hosting a server of its own and IOT for automation.

Vertical Jump Height and Sprint Performance In State Level Soccer Players
Authors:- Research Student Atri Nitin, Assistant Professor Kadyan Gaurav

Abstract:- Plyometric training (PT) is a widely used method to improve muscles’ ability to generate explosive power. Plyometric is a type of exercise training designed to produce fast, powerful movements, and improve the functions of the nervous system, generally for the purpose of improving performance in a specific sport. Purpose of study: To find out the better plyometric training protocol for Soccer players to improve their vertical jump height performance on headed the ball and to improve their sprint performance. Methodology Sixty healthy soccer players (forty females and twenty males ) within a age group of 18-22 years were randomly selected after testing the inclusive and exclusive criteria and divided into group A (n= 30, females= 20, males= 10) and group B (n= 30, females= 20 and males= 10). Both groups underwent two different plyometric protocols; each for 6 weeks, 2 times per week. The pre and post testing of Sargent jump test and 40- meter maximal sprint test were taken 0 week and 6 week for measuring the vertical jump height performance and sprint performance respectively. Result Both groups showed significant improvement in vertical jump height performance and sprint performance but there was no significant difference in both groups on vertical jump height performance and sprint performance. Both types of plyometric training are equally effective in improving the vertical jump height performance and sprint performance state level soccer players.

System Design for Natural Circulation Of Heat Exchanger
Authors:- Research Scholar Mohd Attalique Rabbani, Prof. Supervision Registrar Dr.G.R.Selokar

Abstract:- The primary function of a Natural Circulation Loop (NCL) is to transport heat from a source to a sink. The stabilization of loop fluid is achieved with the introduction of nano particles. The fluctuations in the velocity vs time curve would be decrease order and almost become linear with time. The main advantage of the natural circulation system is that the heat transport function is achieved without the aid of any pump.Also the enhancement of flow rate in the loop may be record with the increase of temperature of heat source and also with the increase of volume fraction of Al2O3 in nano fluid. Ultrasonic velocity of a liquid is identified with the coupling powers between the iotas or the molecules.The accurate estimation of thickness, viscosity, ultrasonic velocity and subsequently the determined parameters, free volume and related parameters will give noteworthy data with respect to the state of affairs in an answer.

Analysis of Non-Orthogonal Random Access for 5G Networks using MATLAB
Authors:- Damaraju Sri Sai Satyanarayana, Bejgum Sai Phanindra, Biruduraju Aditya Hruday, Gunda Sai Preethi, Kunapareddy Gowri Shashank

Abstract:- For the next generation of Cellular and Wireless communication systems, the key requirements are to efficiently support a massive amount of User Equipment’s. In this paper, to reduce the access congestion problem, the Non-Orthogonal Random Access (NORA) scheme based on SIC is proposed. This scheme identifies multiple user equipment’s with an identical preamble by utilizing the time of travel difference which thus enables power domain multiplexing. On Simulation, Results show that the number of user equipment’s can be improved by 30% and the access delay is also reduced significantly.

Document Class Identification using Fire-Fly Genetic Algorithm and Normalized Text Features
Authors:- Jitendra Yadav, Prof. Sumit Sharma, Prof. Pranjali Malviya

Abstract:- Increase of digital platform resources ultimately raises the text content on different platform, so organization of this unstructured data is highly required. Researcher has proposed number of techniques to filter relevant data inform of feature so enhancing the understanding of work. This paper has work on clustering the document of research filed into respected class. Here paper has proposed a modified firefly genetic algorithm for clustering of document into respected cluster. Fire fly crossover operation was modified in this paper where best chromosome update rest of population. Pattern based features were evaluate from the text content. Normalized content feature were used for the work. Experiment was done on real set of research paper taken fro various research domains. Results were compared on different evaluation parameters with exsisting model and it was obtained that proposed model of FFDC (Fire Fly Document Classification) was better than other.

Smart Adaptive Machine Learning Based Laptop Stand (Workbit)
Authors:- Reetu Jain, Shekhar Jain, Pratham Papneja, Atharva Nihalani, Nischal Patel, Radha Krishna,

Abstract:- White-collar workers who sit at desks all day face different risks than a delivery driver who wrangles boxes all day. Sitting in the same position working at a computer terminal which can increase the potential for herniated discs. Office workers also suffer from poor posture, tending to slump their shoulders inward as they sit and type, which can lead to muscle atrophy and increased strain on musculoskeletal joints. To prevent this, we have created an intelligent stand called “WorkBit” objective is to provide an interactive work health trainer on every desk that can monitor your daily work health and help you take preventive measure such that, person productivity increases, overall wellness increases, less stress, improved posture, less strain on the eyes, improved sleep patterns thus maintaining “WORK HEALTH BALANCE”. Our proposed solution is a highly sophisticated laptop stand mounted on wheels. It detects how far away the user’s face is from the laptop and can accordingly move in the four directions on the plane it rests on. It can even raise the laptop by 12 cm thus if the user’s table is too short, the laptop can still be raised to eye-level to avoid putting a strain on the neck.

A Review Article of Monitoring of Interconnecting Transformer using Ann
Authors:- Monika Patel, Associate Prof. Arun Pachori

Abstract:- Increase of digital platform resources ultimately raises the text content on different platform, so organization of this unstructured data is highly required. Researcher has proposed number of techniques to filter relevant data inform of feature so enhancing the understanding of work. This paper has work on clustering the document of research filed into respected class. Here paper has proposed a modified firefly genetic algorithm for clustering of document into respected cluster. Fire fly crossover operation was modified in this paper where best chromosome update rest of population. Pattern based features were evaluate from the text content. Normalized content feature were used for the work. Experiment was done on real set of research paper taken fro various research domains. Results were compared on different evaluation parameters with exsisting model and it was obtained that proposed model of FFDC (Fire Fly Document Classification) was better than other.

A Review Article Optimization of Electric Field Stress on High Voltage Insulator
Authors:- Satyam Parashar, Associate Professor Arun Pachori

Abstract:- To reviewstudy the effect of contamination on the insulator upon the tangential field, the simulation charges is replaced by complex charges. The contamination layer is simulated by a uniform surface resistivity along the insulator. The magnitudes of the simulation charges (real and imaginary components) are determined by a fore mentioned concept of error-function minimization. First, the algorithm is developed for calculating the tangential field is explained. Then the method of optimization is discussed, and the effect of contamination on the calculated tangential field distribution is investigated showing how the developed algorithm will accommodate this effect. Finally, the results obtained are discussed.

Real Time Video Fog Dehazer for Automobiles
Authors:- Nishal P A, Vaisakh Anil, Sivaprasad V B, Asst. Prof. Linnet Tomy

Abstract:- Driving vehicles in foggy climatic conditions may end in serious accidents, and makes it difficult for the driving force to envision the objects and other obstacles. Therefore traffic in foggy weather conditions is a very important issue and has been widely researched within the field of computer vision. The video dehazing software will get rid of the influence of weather factors and boost the visuals of the driving force.Previous techniques of image dehazing that are developed over the past decade are reviewed and analyzed.At first,the techniques are innovatively categorized into three categories: image enhance- ment based methods, image fusion based methods and image restoration based methods. Every methods are analysed and sub-categorized based on principles and characteristics. Various quality evaluation methods are implemented to make sure our project is capable of removing haze or fog. Finally, extensive experiments determine the performance of proposed system.

Wave and Tidal Studies off Kanyakumari Coast, Bay of Bengal, India
Authors:- A. H. Nabisa Begum, R.Venkatachalapathy, K. Gurumoorthi, M.Srinivasan

Abstract:- Ocean dynamic studies on the variability of the tides and wave characteristics have been studied in relation to the wind condition along the Kanyakumari Coast, Bay of Bengal during the NE and SW monsoon period of 2011. The maximum tidal height (1.13 m) was found in Kanyakumari tip during the Northeast monsoon period with the tidal pattern of mixed mainly semidiurnal tides. Wind speed varied from 0.1 – 9.5 m/s and 1.4 – 7.2 m/s with the average wind speed of 5.8 m/s and 4.4 m/s in NE and SW monsoon respectively wind blows (direction) predominantly with the average direction of the Northeast (550) and Southwest (1990) in NE and SW monsoon. The relationship between wave height and wind speed shows that they are weakly correlated with a significant level of 0.01.

Comparision of Strength Behaviour of M-40 Grade with Ordinary Concrete by Replacing the Fine Aggregate with Geopolymers
Authors:- M.Tech. Scholar Cherukuri Naga Lakshmi, Assistant Professor B.Anjana Devi

Abstract:- OPC is a major building material on this earth. Cement manufacturing is the major carbon dioxide emitting source and other hand besides deforestation and burning of fossil sources. The global warming and heating effect is caused by the emission of greenhouse gases, such as Carbon monoxide , CO2, into the atmosphere. Among the greenhouse gases, CO2 contribute about major amount is 65 % of global warming. The global cement industry contributes about 7-10% of greenhouse gas emission to the earth’s open area. In order to impact on surrounding environmental effects associated with Portland cement, there is a need to develop alternative binders to make concrete.One of the efforts to produce more eco -friendly concrete is the development of organic inorganic polymers like aluminium silicate, called geopolymer, synthesized from materials of geological origin or by-product materials such as fly ash that are rich in silicon and aluminium.In this paper work, low-calcium fly ash-based geopolymer from Chennai Thermal power stations has been used for the production of geo-polymer concrete. The combination of silicates of sodium solution and hydroxide of sodium solution was used as alkaline solution for fly ash activation. Alkaline solution to fly ash ratio was varied as upto .45.The concentration of sodium hydroxide solution was maintained upto 8M (Molars).The curing condition of geopolymer concrete was varied as ambient curing and oven curing at and 100°C. The strength of the GPC was tested at various ages like normal conditions 7,14,28 days.

Identification of Medical Diseases using Deep Learning
Authors:- Rituja Pardhi, Saumya Purwar, Pragati Patil, Aniket Nichat

Abstract:- The implementation of clinical-decision support algorithms for medical imaging faces challenges with reliability and interpretability. Here, we establish a diagnostic tool based on a deep-learning framework for the screening of patients with common treatable blinding retinal diseases. Our framework utilizes transfer learning, which trains a neural network with a fraction of the data of conventional approaches. Applying this approach to a dataset of optical coherence tomography images, we demonstrate performance comparable to that of human experts in classifying agerelated macular degeneration and diabetic macular edema. We also provide a more transparent and interpretable diagnosis by highlighting the regions recognized by the neural network. We further demonstrate the general applicability of our AI system for diagnosis of pediatric pneumonia using chest X-ray images. This tool may ultimately aid in expediting the diagnosis and referral of these treatable conditions, thereby facilitating earlier treatment, resulting in improved clinical outcomes.

Survey on Sustainable Energy Resources Prediction using Different Technologies
Authors:- Sumana Kuppannagari, Sree Devi E

Abstract:- Solar energy and the wind power are the environment friendly, sustainable sources of energy which are constantly being restored like sunlight and water. There are some non-renewable sources of energy available in the world like coal, Petroleum, natural gas etc. which can forms Fossil Fuels. In this world, it is important to predict the solar energy, in order to know how much the amount of energy can be consumed by different locations. Depending on different meteorological parameters like temperature, wind direction, velocity and humidity, wind power and solar energy forecasting can be done at regular intervals, so that it can balance the supply and demand of energy. In numerous applications in meteorology to understand phenomenon like humidity and rainfall, the statistical method has become a major tool and it is known as Time Series Analysis. Including time series analysis, regression analysis there are so many models like Autoregressive Integration Moving Average (ARIMA), Neural Network, Simple Moving Average (SMA) which are used to find the randomness of Solar Energy and wind power. Various Approaches has various disadvantages. This Paper can shows and can give a brief review on the theoretical forecasting methodologies and can provides the pros and cons of different methods. The study of Time Series Prediction of Solar Power is to know the advantage of using Exponential Smoothing (SES), Long-Short Term Memory (LSTM) and the suitability of Recurrent Neural Networks (RNN).

The Management of Project Conflicts Through Effective Negotiation
Authors:- Lecturer Crispin George

Abstract:- Abstract – In project management, conflicts should be treated with utmost seriousness in order to save the project from delay and resultant deadlock. There are several causes of conflicts in project management but conflicts arising from people with somewhat different ideas to reach project objectives are becoming more prominent. When people develop project plans, there is always the tendency for such to happen. There are lots of conflicts raised due to the following reasons: Different units working on the project might have different expectations about project costs, rewards and priorities, Confusion in the project team as a result of decision makin, Uncertainty on who has authority to make decision on resource allocation, Project manager setting cost and time restrictions that the functional manager cannot cope with, are also a recipe for conflict.
However, the most appropriate means of resolving conflicts is negotiation. In negotiating, the project manager should seek for a win-win situation unless in cases where such is not applicable or it cannot yield the desired outcome. This style of negotiation helps the project manager to improve his relationship with colleagues and thus achieve project objectives. In essence, the project manager should ensure that the interest of the project supersedes that of his personal feelings and ego during the negotiation process in order to get a better deal.

Design Chairless Chair-Exoskeleton System
Authors:- Mr. Ankush Borse Mr. Shubham Sonawane Mr. Rushikesh Hushar Mr. Sumit Salvi Prof. N. V. Dhumal. (Guide) Prof.M.A.Mane. (Co-ordinate)

Abstract:- The ‘chairless chair exoskeleton system’ is a hydraulic based exoskeletal support which is basically a ‘chair’ that is like an exoskeleton, allowing users to walk or move at certain speed with the device while they work. It is a mechanical ergonomics device that is designed around the shape and function of the human body, with segments and joints corresponding to those of the person it is externally coupled with. This support helps users to rest their leg muscles by directing their body weight towards a variable damper attached to the frame and directs the weight to the ground. This exoskeleton system is designed to be appropriate mechanism with human lower extremity and it operates synchronously with the human realizes. It consists of two identical ‘supports’, one strapped to each of the wearer’s legs. Simply bend the knees to a comfortable stance to activate its damper that supports the body weight. The overall weight of this exoskeleton chair is less so it doesn’t burden the wearer. The exoskeletal support not just provides a comfort lower body support, but also has several other purposes with this being a skeleton for newer products.

A Study on Artificial Intelligence in Reinventing Human Resources
Authors:-Dr. Purvi Shah, Management

Abstract:- This paper first make a point about terminology as there are lots of concepts that touch upon AI which might strictly be limited to ‘intelligent agents’ that mimic ‘cognitive’ behaviour. We are taking a broad approach to include expert decision-making systems, simulation and modelling, robotics, natural language processing, use of technologically-driven algorithms etc in this paper. Thus, we are including assisted, augmented and autonomous intelligence in the various ways that humans are supported, or replaced, by AI. Many technologies which were once seen as ‘cutting edge’ have become routinized and so no longer noticed as part of the change process. The chat boxes and cobots (robots collaborating with humans) we discuss here will, at some point, be mainstreamed.

A Survey on Text Content Sentiment Analysis Levels and Techniques
Authors:-Mahesh Patidar, Dr. V.B. Gupta, Seema Patidar

Abstract:- As Individual convey their thoughts on social media by discussing personal life events or other issues related to politics, science, environment, etc. So this produce large amount of opinion data which can be further mine by utilizing some techniques of pattern, classification, etc. So researcher works on this profitable data, and consequently, semantic annotation of online digital content into respected sentiment was done by utilizing various techniques. Hence this paper gives a detail investigation of different level of sentiment analysis with necessary pre-processing steps. Sentiment analysis techniques adopt by different researcher like supervised, unsupervised, lexion, etc. were also discuss with their desired outcome. A deep survey of social content sentiment analysis work done by different researcher was also discussed for improving the knowledge of methods used.

Analysis on an Online Social Network Based Question and Answer
Authors:-Hans Raj Pal, Professor Ritesh Yadav

Abstract:- Question and Answer (Q&A) systems play a vital role in our daily life for information and knowledge sharing. Users post questions and pick questions to answer in the system. Due to the rapidly growing user population and the number of questions, it is unlikely for a user to stumble upon a question by chance that (s)he can answer. Also, altruism does not encourage all users to provide answers, not to mention high quality answers with a short answer wait time. The primary objective of the system is to improve the performance of Q&A systems by actively forwarding questions to users who are capable and willing to answer the questions. Also improve Social Network Based Question and Answer system with security and efficiency enhancements by protecting user privacy and identifies, and retrieving answers automatically for recurrent questions.

A Survey on Data Visualization for Visualizing the Large Data Sets Using Visualization Techniques
Authors:- Harsha Vardhan G, Sree Devi E

Abstract:- Knowledge image involves presenting knowledge in graphical or pictorial kind that makes the knowledge simple to know. It helps to clarify facts and confirm courses of action. it’ll profit any field of study that needs innovative ways in which of presenting massive, advanced data. the appearance of tricks has formed trendy image. This paper presents a quick introduction to knowledge image. Data visual image could be a quite new and promising field in computing. In this paper, we have a tendency to initial get accustomed to knowledge visual image and its connected ideas, then we will surf some general algorithms to try to the information visual image. To get deeper regarding it, we’ll have some discussion regarding third dimensional knowledge visualization. With the mixture of some far-famed ways, we have a tendency to gift a replacement algorithm to try to four dimensional knowledge visual images. We have a tendency to conjointly gift a program project plan regarding it (optional), and a few problems and explanations around it.

A Qualitative Study of Devops Usage and Automation Tools in Practice
Authors:- Ishaq Shaik Mohammed, Masthan Baba B

Abstract:- DevOps could be an abstract framework for reintegrating development and operations of data Systems. We tend to perform a scientific Mapping Study to explore DevOps. Twenty six articles out of 139 were designated, studied and summarized. Supported this idea table was created. We tend to discovered that DevOps has not been adequately studied in scientific literature. There’s comparatively very little analysis out there on DevOps and also the studies ar typically of inferiority. We tend to conjointly found that DevOps is supported by a culture of collaboration, automation, mensuration, and data sharing and net service usage. DevOps advantages IS development and operations performance. It conjointly has positive effects on net service development and quality assurance performance. Finally, our mapping study suggests that additional analysis is required to quantify these effects.

A Survey on Cloud Computing Architecture Characteristics Deployment Models and Challenges
Authors:- Venkaiah Ramaiahgari, Masthan Baba B

Abstract:- Cloud computing is the process of storing and accessing of information and applications with the help of internet or web instead of your own hard disk. Cloud computing is a distributed resource pooling where anyone can access a particular resource from anywhere i.e. a single resource can be used by multiple people at different locations. This resource are like software, hardware, infrastructure, platform, networks, servers, storage spaces etc. it provides the services to the users based on their requirement and these services are easy and low cost to use. This paper is for everyone who are willing to take a study on cloud computing here we are going to see the architecture , characteristics , deployment & service models of cloud computing.

Supply Chain, Logistics and Technology in Agriculture
Authors:- Aakash Nar Singh Rout, Monika, Gourav Kumar Yadav, Arpit Barodiya

Abstract:- This paper addresses the issues pertaining to agriculture supply chain along with the effective role played by supply chain & logistics for timely delivery of produce to markets, along with other dimensions such as cold storage, access to market, government schemes.

Smart Customer-Realtime Customer Relationship Management System – A Survey
Authors:- Harshitha Deshpande, Shruthi V, Sushma J, Vasundhara Rajyalaxmi K, Hod.Dr. Sumithra Devi K A

Abstract:- Customer Relationship Management (CRM) is overall process of building and retaining profitable customers with an organization and directed towards improving business relationship with customers. It is a management philosophy and strategy which enables a company to optimize revenue and increases customer value and service quality by recognizing customer needs. it’s a procedure of business that is able to facilitate or meet out requirements of users and each and every component to be measured deliberately and should look of as all the requirements are met. A CRM strategy aims to create a comprehensive customer centric strategy that contributes to durable relationships with customers and makes a profit for owners.

Emotion Recognition using Human Activity From Smartphone Data
Authors:- Shahistha Sultana K

Abstract:- Social interaction has become an important concern in our daily activities. The social interactions tell us about the emotion and the mental state of a person. Both the body movements and the facial expression of a person can be used to analyses the emotion of a person. Numerous researches have been conducted for analyzing the emotion of a person with the help of face reaction. The proposed project focuses on analyzing the emotion of a person with the help of body movements. These movements will help to find the underlying emotion of a person whenever the face isunclear/occluded. Recognition of human activity is performed first with the help of the data recorded from a smartphone’s sensor such as accelerometer and gyroscope. The data is recorded when the smartphone is attached to the waist of the subject, as this provides accurate results. The human activity recognition is done using the UCI HAR Smartphone dataset which has data recorded from 30 volunteers at age difference of 19-48 years and with 561 measurements variable. After the human activity are identified it is compared with the 2-D stimuli from the dataset and features are extracted from the dataset frame which are preprocessed and matched against the same human activity identified from the smartphone dataset and the extracted features are fed to the KNN and Support Vector Machine (SVM) classifiers to classify the emotion of the human. In this way, a human emotion can be found from the activity recognized from the smart phone data.

Published by:

International journals for paper publication

Uncategorized

International Journal of Scientific Research & Engineering Trends (IJSRET) is not restricted to research done in the field of science and engineering but it will also accept papers which come under sub category of science and engineering. It is very important for a researcher and scholar to read the authors guidelines carefully in any International journals for paper publication. The research area should only be related to scientific and engineering topics. The content to the paper should be relevant and accurate.

Submit Your Paper 

Check Publication Charges

Some of the research topic we accept related to science and engineering are as under-

  1. Computer science
  2. Electronic
  3. Electrical
  4. Mechanical
  5. Civil engineering
  6. Mathematics
  7. Basic science
  8. Nano technology

Apart from the above fields if your research is done in any field related to science and engineering then you can submit your research paper to us. International journals for paper publication are a journal that gives you the benefit of publishing your paper internationally with low publication charges. Along with that there are some more benefits which you will get on our journal. They are as under:

  1. Direct link submission: You will get the benefit to submit your paper with just one click. You just need to fill few important details like-
  • Author’s name
  • Author’s contact number
  • Email address
  • Paper title
  • Author’s address
  • Keyword
  • Attach your manuscript

After filling the entire mandatory field your paper will be successfully submitted by the website. Before submitting read the note carefully which is written below on the submission form.

  1. Global access facility- Global access facility for each client will be there. You can access our site and check the volume anytime and from anywhere across the globe.
  2. Online submission: The main benefit of online submission is that even if you want to submit your paper in the midnight it will be successfully submitted. Though we will check your manuscript afterwards but at that time it will be successfully submitted to us.
Published by:

International scientific journal

Uncategorized

IJSRET (International Journal of Scientific Research & Engineering Trends) is a peer reviewed international scientific journal. IJSRET is a best deal for fresher who are looking for a journal to publish their research paper in the field of scientific research, engineering and technology. We have qualified and professional staffs who are experts in science and engineering field. Students who are pursuing masters and PhD in the scientific field need to publish their research paper. To select a scientific journal will become a very tough task for them. Sometimes they got confused because there are many journals out there and think which journal is better to publish their research paper. Before selecting any journal to publish their research paper one must check whether the journal is genuine and safe or not.

What makes us safe and secure?

Submit Your Paper 

Check Publication Charges

Below given points will give you the surety that our journal is safe and secure to publish your research paper internationally-

    1. Valid payment gateway: Payment gateway used while transferring money should be safe and secure. In some journals no valid payment methods is used that is why will not be able to transfer money easily to the other person account. Sometimes the money hot stuck while transfer so; it has become very important to use a valid payment gateway.
    2. Trusted team: We have a highly professional and qualified team working in our journal. Our team never discloses any information which is related to any of our client to any outsider. Our team is seriously committed to the tasks given to them they believe in the policy of honesty and loyalty.

ISSN approved: This is the first and the foremost thing that should come in the list of safety and security while choosing a journal to publish your research paper. If you are choosing any journal to publish research internationally paper make sure that is should be an ISSN approved journal. IJSRET is an ISSN approved international scientific journal.

Published by:

Fast Publishing Journals

Uncategorized

Scholars and researchers who are pursuing PhD and Masters degree always want to publish their paper in a Fast publishing journals to save their precious time. It has become a very tough task for them to choose a journal to publish their research paper, review paper and survey paper internationally. Sometimes they also got confused that on what basis they can identify a journal as a good journal to publish their research paper. IJSRET (International Journal of Scientific Research & Engineering Trends) has taken out some important point on the basis of which author and researchers can choose a best journal for their paper publishing.

Submit Your Paper 

Check Publication Charges

The following are the points to identify a good journal to publish your research paper. They are as under-

  • Check impact factor– Impact factor of any journal is very important in deciding its value. To know the ranking of any journal in the current year check its impact factor. The journal will be highly ranked if its impact factor is high. You can check the impact factor of any of the journal from its website; one must check the impact factor of the journal before publishing their paper.
  • Digital certificate– If a journal is providing you digital certificate for the publishing of your paper then it would be great for you. Always go through the ethics and rights of the author shown in the journal. It is very important to know about the rights of the authors before publishing the paper.
  • Responsive team– Proper support and response for publishing the paper is very important. There are many questions and thoughts which arise before publishing the paper in any of the journal. Researchers and scholars must check that the journal has responsive team or not. Every journal should hire a great expert team to solve client’s queries and issues.
  • Index– There is a separate section is given in every journal to show there indexing format. Authors must check which indexing format the journal is following. Proper indexing plays a very important role in the publishing of the paper.

Above we have mentioned some important point which author must check before publishing their paper in any fast publishing journals. If a journal has high impact factor, responsive team, providing you digital certificate and follow a proper indexing format then it will be a great platform to publish your paper to that journal.

Published by:

International journal publication

Uncategorized

International Journal of Scientific Research & Engineering Trends (IJSRET) is an ISSN approved journal with impact factor more then 3. IJSRET will provide you international journal publication in a very low publication charges. Research in the field of science and engineering will be accepted here. Our journal has a very strict terms and conditions towards the publishing of the research paper internationally. Though we provide a fast publication service to our researchers and scholars but our reviewing process is very firm.

HOW TO SUBMIT-

Before submitting the paper there are many questions that arises in the researchers and scholars mind. Especially fresher who are publishing their paper for the first time there are many questions which will arise in his mind. So, for them we have made a publishing process very easy and safe for them. We have a very easy submission process with a secure payment method. In the case of payment it is hard to trust anyone especially online. Our journal has a valid payment gateway that is very safe and secure. To submit your paper with us just follow the below steps-

Submit Your Paper 

Check Publication Charges

  1. Submit manuscript: Submitting manuscript to us is very easy and simple process. We have designed each and every step here simple and smooth for you. To submit your research paper to us just click on the paper submission from the top most section on our website. Two options will be given there to submit your paper first submit directly by filling the form or else email your paper to any of the email address.
  2. Received by us: Once you submission process is completed your paper will be received by us. We will send you an acknowledgement mail that your paper is successfully received by us and we will ask you to wait 2-3 days for the reviewing process.
  3. Reviewing process: When your paper is under reviewing process it will be deeply analyzed and studied by our professional team. This is a very crucial part where the decision is taken that your paper will be accepted or rejected. Whatever will be the final decision that will only be taken by our reviewers. They will check that your research paper is up to mark or not. After that we will email you with the final information.
  4. Payment process: Payment process in IJSRET is safe and secure. If your paper is accepted by our reviewers then our team will send you an acceptance mail and will ask you pay some particular amount. Here how much you have to pay that will also be decided by our team, we reduce the amount as per our reviewers comment up to Rs. 500 for Indian authors.
  5. Publishing process: Once your payment is received by us then your paper will be published within 2-3 days. After that our team will mail you that your paper is published successfully. IJSRET is providing you fast and easy international journal publication service in a very low publication charges.
Published by:

 International journal of electrical engineering

Uncategorized

IJSRET (International Journal of Scientific Research & Engineering Trends) is an International journal of electrical engineering or any of the engineering related fields. There are mainly six major branches of engineering:

  1. Mechanical engineering
  2. Chemical engineering
  3. Civil engineering
  4. Electrical engineering
  5. Management engineering
  6. Geotechnical engineering


The above mention fields are the main branches of engineering but many subcategories of these branches are there. Research paper on any of the subcategory of electrical engineering. Mechanical engineering, chemical engineering, civil engineering, geotechnical engineering and so on will be accepted here.

How to get your paper published fast with IJSRET:

Submit Your Paper 

Check Publication Charges

 

  1. Carefully fill the form: When authors and researchers fill the form to submit their manuscript it is very important to read all field carefully and fill the correct details. Sometimes when researchers fill the details incorrectly their paper will be rejected.
  2. Spelling check: Researchers must avoid the silly mistakes while filling the form. Small mistakes like incorrect spelling, incorrect details, incomplete information, and invalid topic will not let their paper accepted. If you want us to accept your paper fast then researcher should avoid small mistakes like I have mentioned above.
  3. Wrong sequence: Wrong sequence used in the article can also become a cause for research paper rejection or revision. If you have used a wrong sequence in the figure, table and paragraph then it might become a cause for paper rejection and revision.

IJSRET is a fast International journal of electrical engineering and for other branches in engineering. If you want your paper to get published fast in IJSRET then kindly follow the above instruction.

Published by:

Publish Paper in International Journal

Uncategorized

Before finding an International journal to publish your research paper, researchers and authors should study the proper way to publish a research paper. Sometimes when scholars and researcher doesn’t follow the proper steps and process then their paper will get automatically rejected by the reviewers. How can you Publish paper in international journal is thee common question which arise in every authors mind before publishing. IJSRET is showing you the correct and accurate way to get your paper published in international journal.

Steps to publish research paper in IJSRET:

Submit Your Paper 

Check Publication Charges

  1. Detect a research issue: The primary task you need to do is to detect a research problem in an article. Research problem can be detected by going through to some recent reports and articles of your field.

 

  1. Survey: Do not think that finding a solution of your detected problem in an article will be easy. Authors and researchers need to do a survey and investigation to find a better solution of the detected problem. After a deep analysis and study the solution of a detected problem will be found.

 

  1. Advantages and limitations: After finding a better solution of the detected problem authors and researchers need to find the advantages and limitations of that solution.

 

  1. Application of the solution: It is a very important stage where researchers need to apply their investigated solution for a problem and try to solve a problem in their own way and find out their advantages and disadvantages.

 

  1. Make a comparison: You need to make a comparison between your investigated solution and existing solution. You need to also proof here why your presented solution of the problem is better.

 

  1. Find a journal: Now what a last thing you need to do is to find an international journal to publish your research paper. Finding a right international journal to publish your research paper, review paper and survey paper will be a very tough task for you. IJSRET is giving you a platform to Publish paper in international journal in a very easy way. If you do your research according to the above described steps then your research paper will be easily publish in any of the international journal.
Published by:

IJSRET Volume 5 Issue 6, Nov-Dec-2019

Uncategorized

Optimizing Profit with the Linear Programming Model in a Manufacturing Industry
Authors:- M.Tech. Scholar Shrikant Desai, Professor Y.P. Ladhe

Abstract:- The study has successfully determined the product mix of Bansal Pipe Industry, Indore. In the process, the optimal quantities of the various PVC pipes to be produced within the study period in order to maximize profit were established. Also the status of the resources and the unit worth of each resource to the objective function were known with respect to varying budget resources and labor time. This is the advantage of going beyond mere knowledge of existing decision making tools to actual practical proof of its workability. The study has shown that linear programming model can be applicable in BIL, Indore. The researcher, through observation, noted that decision making regarding the quantity of shoes to be produced was based on trial and error method which yielded sub-optimal results. Hence, an attempt was made to fill this gap, has demonstrated practical means of developing a working linear programming model to find solution to the problem of sub-optimal results often realized by BIL. Also, the literature reviews in this work have – further affirmed that linear programming model is workable.

A Review on Organic Rankine Cycle (Orc) for Waste Heat Recovery with Different Refrigerant
Authors:- M.Tech. Scholar Rajeev Kumar, Prof. Brijendra Yadav

Abstract:- Rising energy demand due to industrial development, population growth, is pushing the mankind for utilizing more and more conventional energy sources such as coal, oil and gas. There is a need to minimize the use of such types of resources because; it contributes to the global warming, pollution and climate change. Use of alternative sources of energy such as solar, hydro, wind, tidal, geothermal, biofuel, and nuclear are preferable and are

A Survey on Different Adiabatic Logic Circuits for Low Power in Dsm Technology
Authors:- Priya Kumari, Ashish Chouhan, MD Naushad Akhtar

Abstract:- The term ‘adiabatic’ is coined from thermodynamics in which a method where no energy exchange takes place with environment results no dissipation of energy loss. On the other hand in short circuit devices in energy exchange process charge has been transfer between different nodes. Practically, with the use of partial adiabatic operation in the circuit results for the improvement of overall performance of the circuit with complexity. The result is represented in tabular and graphical form. And a comparison is done among all the simulation. After a detailed examination a conclusion has been drawn based on the entire work done and also from the simulation and the result is evaluated. All simulations are carried out using HSPICE at 65nm technology with supply voltage is 1V at 100 MHz frequency, for fair comparison of results W/L ratio of all the circuit is same.

Analysis of Embedded Network Security by Intrusion Detection System
Authors:- Research Scholar Mr. Suresh .B, Associate Prof. & Head Dr. M. Venkatachalam

Abstract:- The term ‘adiabatic’ is coined from thermodynamics in which a method where no energy exchange takes place with environment results no dissipation of energy loss. On the other hand in short circuit devices in energy exchange process charge has been transfer between different nodes. Practically, with the use of partial adiabatic operation in the circuit results for the improvement of overall performance of the circuit with complexity. The result is represented in tabular and graphical form. And a comparison is done among all the simulation. After a detailed examination a conclusion has been drawn based on the entire work done and also from the simulation and the result is evaluated. All simulations are carried out using HSPICE at 65nm technology with supply voltage is 1V at 100 MHz frequency, for fair comparison of results W/L ratio of all the circuit is same.

A Survey on Low Power High Speed Domino Circuit in Low Power VLSI Design
Authors:- MD Naushad Akhtar, Ashish Chouhan, Priya Kumari

Abstract:- Increased number of transistor count and reduced device size is main reason behind scaling and this incorporates leakage current also in other hand battery technology is growing very slowly hence we need low power circuit so that we can enhance overall performance of device. After evolution of CMOS circuit the scientist moved on static and dynamic circuit design. In static CMOS there are various limitations like no. of transistor count, power dissipation, slow speed, hence to overcome these limitation a new circuit pseudo NMOS is used. It exist somewhere between static and dynamic circuit. We have seen that FinFET technology is simulated by BISM4 model using HSPICE at 32nm process technology at 250C with CL=1pF at 100MHz frequency. When CMOS is compared with FinFET for 8 and 16 input OR gate we save average power 15.46%, 21.34% SFLD, 57.37%, 20.12% HSD, 30.90%, 42.46% CKD respectively.

The Effect of Radial Swirl Generator on Reducing Emissions from Bio-Fuel Burner System
Authors:-M.Tech. Scholar Amaresh prasad Sinha, Prof. Poonam Wankhede, Dr. Mohit Gangwar

Abstract:- A liquid bio-fuel burner system with various radial air swirlers attached to combustion chamber of 280 mm inside diameter and 1000 mm length has been investigated. All tests were conducted using crude palm oil as fuel. A radial flow air swirler with curved blades having 50 mm outlet diameter was inserted at the inlet plane of the combustor to produce swirling flow. Fuel was injected at the back plate of the swirler outlet using central fuel injector with single fuel nozzle pointing axially outwards. The swirler vane angles and equivalence ratios were varied. Tests were carried out using four different air swirlers having 45°, 50°, 60°and 70° vane angles. NOx emissions reduction of about 12 percent was obtained at swirl number of 1.911 as compared to 0.780 at the same equivalence ratio of 0.83. In addition, emission of carbon monoxide decreased as the swirl number increased. The results shows that a proper design of air swirler has great effect on mixing process and hence the combustion and emission.

CFD Analysis of Heat transfer in Tube Inserted with Centrally Hollow Narrow Twisted Tapes
Authors:- M.Tech. Scholar Ajay Kumar Roy, Prof. Suresh Kumar Badholiya, Rohit Choudhary

Abstract:- In this study, a new tube insert, named centrally hollow narrow twisted tape, is developed and its effect on the heat transfer enhancement performance of a tube under laminar flow conditions is numerically simulated. The model defines two study variables—hollow width and clearance—and then incorporates the concept of a unilateral twisted tape; the effect of the number of unilateral twisted tapes on the tube heat transfer performance is then examined. The results show that the tube with cross hollow twisted tape inserts has the best overall heat transfer performance for different hollow widths of the tape.

A Review on Heat Transfer Enhancement Analysis of Tube Inserted with Centrally Hollow Narrow Twisted Tapes
Authors:- M.Tech. Scholar Ajay Kumar Roy, Prof. Suresh Kumar Badholiya, Rohit Choudhary

Abstract:- In this study, a new tube insert, named centrally hollow narrow twisted tape, is developed and its effect on the heat transfer enhancement performance of a tube under laminar flow conditions is numerically simulated. The model defines two study variables—hollow width and clearance—and then incorporates the concept of a unilateral twisted tape; the effect of the number of unilateral twisted tapes on the tube heat transfer performance is then examined. The results show that the tube with cross hollow twisted tape inserts has the best overall heat transfer performance for different hollow widths of the tape.

Design and Implementation of Sensor Less Voltage Control Technique for Power Quality in Telecom
Authors:- M.Tech. Student Tamba Rajeswari, Assistant Prof. B.Jagan Narayana, Assistant Professor& Hod V. Sunil Kumar Reddy

Abstract:- In this paper, a three-phase three-switch three-level boost (Vienna) type PWM rectifier is proposed as an active front-end power factor correction (PFC) rectifier for power quality improvement in telecom load. The sensor less voltage control technique is proposed and it does not rely on any input voltage information results in reliable and robust operation. A brief description on the principle of operation and the most advantageous modulation method of the proposed system is discussed. The feasible switching states are identified for the proposed active front-end converter resulting in reduced switching stress and DC ripples. A triangular carrier based control logic is applied and the input current reaches sinusoidal shape without the need of sensing the input voltage. The detailed analysis of front-end PFC converter is carried out by equivalent circuit analysis. Also, the complete loss and efficiency calculation of the converter is explicitly carried out with the help of hardware design guidelines. The performance of the proposed system and its capability to operate satisfactorily in the event of failure of one-phase of the mains is verified through MATLAB Simulation and results obtained are presented. The experimental setup rated for 9 kW is developed in the laboratory to validate the simulation results. From the simulation and hardware results, it is observed and recorded that the power quality parameters are improved and are well within the IEEE, IEC standards.

A Comparison of Tcsc Fact Device Performance and Long Distance Transmission
Authors:- Maneesha Kushwaha, Arun Pachori

Abstract:- The prudent point of view of Flexible AC Transmission System (FACTS) establishment and execution has been an essential issue since origin and expanding each day because of vital, specialized and showcase requirements. The advancement of these issues assumes a significant job in the achievement of any utility and at last minimal effort accessibility of intensity at the client end. This paper exhibits the ideal area of Thruster Controlled Series Capacitor (TCSC) in control framework to limit the transmission misfortune utilizing Particle Swarm Optimization procedure. The reenactments are performed on the IEEE-14 transport framework, IEEE 30 transport framework and Indian 75 transport framework with Newton Raphsonload flow calculation including TCSC.

Review of Image Retrieval using Color Text and Shape Techniques
Authors:- ME Scholar Roshani Yadav, HOD Mr. Kamlesh Patidar

Abstract:- The big digital image databases are yielded by the widespread of smart devices along with the exponential growth of virtual societies. If not fused with efficient Content-Based Image Retrieval (CBIR) tools, these databases can be counter-productive. The introduction of promising CBIR systems had been witnessed last decade which promoted applications in various fields. In this editorial, an analysis on state of the art content-based image retrieval which includes theoretical and empirical work is propounded. This work comprises of publications that cover aspects of research relevant to CBIR area. That is to say, unsupervised and supervised education and combination techniques along with which the low-level image visual descriptors have been reported. Furthermore, challenges and applications that appeared to carry CBIR research have been discussed in this work.

Object Recognition Based on MATLAB
Authors:- Assistant Prof. Vishal V. Mehtre, UG Scholar Shivani Jitendra Khare

Abstract:- This paper describes image processing and its applications using MATLAB. Prime objective of image processing involves extraction of important information from the processed images. By use of this data, description and interpretations can be provided by the machine. Image processing modifies the original image in the desired format (image). And this system provides the users with the hard copy of the image using printer and also allows them to save the file in the desired format with extensions. In our practical life, we find many applications of image processing. One of the best examples in our day to day life is our brain in coordination with our eye which views a lot of images and helps the brain to sense and process information at higher rates and less time. Hence such operations carried out using image processing will help us in greater understanding and vision by development and implementation of image processing. In this paper image processing, object detection, applications of image processing using MATLAB and prospects are discussed.

Design and Implementation Optimization Algorithm for Underwater Acoustic Sensor Network
Authors:- Neha Jamrey, K K Sharma

Abstract:- Underwater Wireless Sensor Networks (UWSNs) contain several components such as vehicles and sensors that are deployed in a specific acoustic area to perform collaborative monitoring and data collection tasks. Tese networks are used interactively between different nodes and ground-based stations. Presently, UWSNs face issues and challenges regarding limited bandwidth, high propagation delay, 3D topology, media access control, routing, resource utilization, and power constraints. In the last few decades, research community provided different methodologies to overcome these issues and challenges; however, some of them are still open for research due to variable characteristics of underwater environment. In this paper, a survey of UWSN regarding underwater communication channel, environmental factors, localization, media access control, routing protocols, and effect of packet size on communication is conducted. We compared presently available methodologies and discussed their pros and cons to highlight new directions of research for further improvement in underwater sensor networks.

Prediction of Compressive Strength of Concrete Using Artificial Neural Network Model
Authors:- M.Tech. Student Sandeep Solanki, Asst. Prof. Mr. Sambhav Gangwal

Abstract:- This study proposes to build a concrete compressive strength development over time (CCSDOT) model by using conventional method combined with the artificial intelligence method. The CCSDOT model performed well in predicting and fitting the compressive strength development in green concrete containing cement, slag, fly ash, and limestone flour. It is concluded that the CCSDOT model is stable through the use of sensitivity analysis. To evaluate the precision of this model, the prediction results of the proposed model were compared to that of the model based on the BP neural network. The results verify that the recommended model enjoys better flexibility, capability, and accuracy in predicting the compressive strength development in concrete than the other models.

Brain Stimulation Game application for children
Authors:- P.S.M Alawatta

Abstract:- Most of the new generation children nowadays are using their parent’s electronic devices as a habit. Addict on to new technologies lead the children away from educational activities. This is affect to the child’s future and main problem is this that the early childhood does not develop on correct way. Considering about this problem the research implemented an educational gaming application based on how to use technologies toward to better future by navigate children to educational activities and reducing time wasting for useless things through the new technologies. Smart Kids is an Unity based gaming application for children of 6 to 10 age category. Prototype methodology used for implement the application. The developed gaming application based on Mathematics and includes many features. The application developed to improve child’s cognitive skills in mathematics and memory development areas. Different game categories used to develop child’s different kind of skills and each category included different levels. The variation of gaming categories will be motivating child to do different sides. When considering about parents, within the busy life style some parents have not time to check child’s skills improvements. As a solution, developed application calculates child’s performance.

Implementation of Queuing Theory Along with Lean Technique in Manufacturing Industry
Authors:- M.Tech. Scholar Bharat, Professor Vipul Upadhayay, Yogesh P Ladhe

Abstract:- This research provides a context for investigating the integration of queuing theory and scheduling approaches with the goal of more effectively solving scheduling problems arising in dynamic environments. In this thesis main objective of research are applied queuing theories in a production line by using an analytical model, using a queuing model to examine performance of a production line, To give information about the studied production line in this case study and To improve both efficiency and performance of workstations. This research work is carried out in Pressroom Industries limited, Bhopal. This industry produces variety of products such as sprocket, spur gear, helical gear and gear housing etc. In this work spur gear manufacturing is taken for study. At first different manufacturing processes (cutting the bar stock, OD turning, center drilling followed by boring, CNC machining, gear hobbling, debarring, keyway slotting and gear grinding) are identified. It is found the cutting, hobbling, drilling and slotting process are bottle neck processes. From the analysis it is found that the setup time of keyway slotting consumes more time. Using SMED concept single pallet is converted to two pallets.

Fem Analysis of Structural Response of Sandwich Beam
Authors:- M.Tech. Scholar Himanshu Kumar Gupta, Asst. Prof. Rakesh Patel, Prof. Vikas S Pagey

Abstract:- Sandwich plate are composite systems having high stiffness-to-weight and Strength-to weight ratios and are used as light weight load bearing components. The use of thin, strong skin sheets adhered to thicker, lightweight core materials has allowed industry to build strong, stiff, light, and durable structures. Due to the use of viscoelastic polymer constituents, sandwich beams can exhibit time-dependent behavior. This study examines the behavior of sandwich plate driven by the varying core thickness and different core stiffness. Finite element (FE) method is used to analyze the overall transient responses, harmonic responses and the static responses of the sandwich systems subject to a concentrated point load at the mid span of the beam. In this study the skin, i.e. the top and bottom layers are made up of aluminum while the core is made up of foam family. The stress and deformation fields are analyzed. The core thickness and core material stiffness was varied keeping the skin thickness constant and the behavior of the sandwich beam is studied under static and dynamic conditions.

Car Damage Detection and Analysis Using Deep Learning Algorithm For Automotive
Authors:- Rakshata P, Padma H V, Pooja M , Yashaswini H V, Karthik V

Abstract:- Images and its processing form a vital part of understanding of the world around us. Therefore incomplete images make it unable for us to detect and analyze the premise of the picture. This is of no use to us, but today’s machine learning platforms are capable of restoring the lost or corrupted parts of such images, making it easier to understand the context behind the scenes and efficiently analyze the pictures taken. In painting Extrapolation can be done by propagation of local structures into the unknown parts, in order to construct the missing part’s one pixel (or patch) at a time, while maintaining consistency with the neighborhood pixels. This application of deep learning is used in the car damage detection and extraction of original features before the incident for timely insurance claims.

Thermal Analysis of Organic Rankine Cycle Based on Different Fluid Type
Authors:- M. Tech Scholar Sanjay Rahangdale, Prof. Kashiram Kadwe

Abstract:- The ORC works with a high molecular mass organic working fluid with the characteristic of having a phase change of liquid to vapour occurring at a temperature which is lower than the phase change of water to steam for a given pressure. The recovery of low grade heat can be achieved using organic fluids. These low grade heat sources can be from biomass energy, solar energy, geothermal energy and industrial waste. This work presents an analysis of organic Rankine cycle (ORC) using R143a, R600a, R134a and RC318 as working fluids under constant external conditions. An EES program has been developed to parametrically compare the first and second law efficiencies and turbine size factor with increase in turbine entry temperature, heat source temperature, and turbine efficiency and pinch point temperature difference.

A Review Article of Composite Drive Shaft Vibration Effects and Methodology
Authors:- M.Tech. Scholar Govind Solanki, H.O.D. Mr. Ganesh Kesheorey

Abstract:- Almost all automobiles (at least those which correspond to design with rear wheel drive and front engine installation) have transmission shafts. The weight reduction of the drive shaft can have a certain role in the general weight reduction of the vehicle and is a highly desirable goal, if it can be achieved without increase in cost and decrease in quality and reliability. It is possible to achieve design of composite drive shaft with less weight to increase the first natural frequency of the shaft and to decrease the bending stresses using various stacking sequences. By doing the same, maximize the torque transmission and tensional buckling capabilities are also maximized. This work deals with the replacement of a conventional steel drive shaft with High Strength Carbon drive shafts for an automobile application.

Quality and Productivity Improvement in Gear Manufacturing Process by using Quality Control Chart and Capability Analysis Including Sampling
Authors:- M.Tech. Scholar Hari Krishnadas Raut, Asst. Prof. Yogesh Ladhe

Abstract:- Increasing productivity and profitability are main objectives of any organization. Many tools and techniques are used to reduce rejections and defects of product. Most of the rejections and defects are occurred due to improper control of quality of product. So use of 7 Quality control tools is best way to reduce rejections and defects of product after analyzing of manufacturing process. Another advantage is increasing customer satisfaction by use of 7 Quality control tools in today competitive market. Based on application of these tools will increase the level of standard products which they require as vision of an organization. The purpose of this work is to discuss the effect of implementation of Total Quality Management (TQM) in manufacturing industry (Shree Gears Pvt. Ltd, Indore). Very few service companies have been able to reap full benefits of TQM. One major reason for its inadequate success is that of trying to implement in service companies techniques that have been successful in manufacturing. In manufacturing, emphasis of TQM is on “zero defects”. Control charts and sampling are the major tools of quality control. However, in services, emphasis is on “zero defections”. Focus is on customer satisfaction and team approach. TQM can boost profits and improve customer satisfaction by reducing defects.

Road Construction in Hilly Region and Their Problem and Solution
Authors:- M.Tech. Scholar Techi Takar, Jitender Kumar

Abstract:- Construction of road is very much important for the transportation of goods and services from one place to another by the mean of roadway network. Road transportation is one of the primary modes of transportation since from the earlier time. The mode of road construction is varies with the geographical feature of the earth such as plain land, mountain terrain, steep and hilly region. It is more easy and accessible to construct a road in plain region as compare to the hilly region.This paper presents the road construction mode in the hilly region as well as their problem and solution with reference to the segment of NH-13 from Sagalee to Midpu (Doimukh). Hilly region comprises of steep mountain terrain, naturally hard rock strata and various turning points which made the road construction very difficult. As the development take place so it is necessary to connect the every corner of the country in order to have a transportation facility easy and accessible in terms of commercial purpose ,business purpose ,health and medical services , education sector etc. Therefore construction of serviceable road in hilly region is very much important for the overall Nation growth. The review study of this paper is to bring the knowledge of road construction problem and their solution of particular hilly region road stretch from Sagalee to Midpu (Doimukh) which is the capital region of Arunachal Pradesh, having stretch length of 74 km.

Implementation of Water Tank Design using Staad Pro Software
Authors:- Sunita Ahuja, Sourabh Dashore

Abstract:- Intensity of the wind is the principal reason for wind caused disaster. Hence constructed structures must be prepared by constructor to fight the impending disaster due to wind by understanding the performance of the structure under wind load. In this study a computational analysis of water tank has been carried to evaluate the performance of elevated water tank under the action wind forces. Since these types of tanks have high mass concentrated at the top height of slender supporting structure and that’s why this type of structures are mainly susceptible to horizontal forces induced by wind. Elevated water tanks have been investigated to analyze the actions of this structure due to wind force by changing different parameters such as capacity, height of stage, terrain category and wind zone. The results presented in this paper will be useful to the designer to understand the effect of various factors as mentioned above on the magnitude of wind force acting on the elevated water tank. Overhead Intze type tank is a form of expanded water tank resting on staging. Bottom part of tank of Intze tank is abounding in flat structure, thus in flat bottom, the thickness and reinforcement is set up to be high. This work aims to study the performance of the Overhead water tank of Intze type having different configuration of staging under the action of basic wind loads in different terrain category.

Review on Nano Particle Based Li Ion Batteries
Authors:- Y. V. Aravind Kumar

Abstract:- Li ion batteries have applications in nanotechnology .Here in this paper we were mainly focused on nonmaterial’s such as CNTs, silicon thinflims, coaxial MnO2/carbon annotate array electrodes ,self assembled TiO2 grapheme and li paper batteries to improve the performance of nanobatteries and storage.

Movie Recommendation Using Principle Component Analysis
Authors:- M.Tech. Scholar Bharti Vishwakarma, Prof. Ashish Tiwari

Abstract:-Recommendation system uses different types of algorithms to make any type of recommendations to user. Collaborative filtering recommendation algorithm is most popular algorithm, which uses the similar types of user with similar likings, but somewhere it is not that much efficient while working on big data. As the size of dataset becomes larger then some improvements in this algorithm must be made. Here in our proposed approach we are applying an additional hierarchical clustering technique with the collaborative filtering recommendation algorithm also the Principle Component Analysis (PCA) method is applied for reducing the dimensions of data to get more accuracy in the results. The hierarchical clustering will provide additional benefits of the clustering technique over the dataset and the PCA will help to redefine the dataset by decreasing the dimensionality of the dataset as required. By implementing the major features of these two techniques on the traditional collaborative filtering recommendation algorithm the major components used for recommendations can be improved. The proposed approach will surely enhance the accuracy of the results obtained from the traditional CFRA and will enhance the efficiency of the recommendation system in an extreme manner. The overall results will be carried out on the combined dataset of TMDB and Movie lens, which is used for making recommendations of the movies to the user according to the ratings patterns created by the particular user.

Review of Worm Hole Attack in WSN
Authors:- M.Tech. Scholar Bharti Yadav, Prof. Shailendra Tiwari

Abstract:-Wormhole attacks can undermine or put out of action wireless sensor networks. In a typical wormhole attack, the attacker be given packets at one point in the network, forwards through a wired or wireless network with take away latency than the network links, and transmits them to a different point in the network. This paper describes a give out wormhole recognition algorithm for wireless sensor networks, which detects wormholes based on the distortions they create in a network. Since wormhole attacks are passive in nature, a hop count technique is used by the algorithm as a explore procedure, renovates local maps in each node, and then uses a diameter element to detect abnormalities reason by wormholes. It can provide the approximate location of wormholes, which is useful in implementing countermeasures this is the main advantage of algorithms.

Predication and Root Selection of Worm Hole Attack in WSN
Authors:- M.Tech. Scholar Bharti Yadav, Prof. Shailendra Tiwari

Abstract:- Sensor Networks (WSN) are often vulnerable to several types of attacks due to its open space deployment and large area of applications. Wormhole is one of such attack, which falls under the category of Denial of Service (DoS). In this attack, an attacker takes control of the network services by developing an overlay tunnel called wormhole channel. In this paper, a mechanism has been proposed by appending extra four-bit information to RREP packets which is known to both sender and receiver; thus, reducing chances of wormhole tunnel. The work is based on AODV protocol and simulated in NS2, which effectively detect illegitimate attack carriers.

Design & Development of Electromagnetic Dynamometer for Testing of FHP Motor: A Review
Authors:- PG Student Rajgonda Shivgonda Patil, Principal S.H.Sawant

Abstract:- Ensuring any kind of Motor Performance as a part of Design Validation of FHP Motor is necessary to know against actual theoretical design of motor verses real test results obtained only through motor testing .Electromagnetic Brake Dynamometer (Eddy Brake Dynamometer ) is best suitable for Testing the Motor as a part of Loading & knowing the results at different torque values which enable us to know various characteristics parameters like Speed verses Torque, Current verses Torque, Input watt verses Torque & efficiency verses Torque as these are Key Motor parameters which should know to Designer or Motor manufacturer before releasing the product to customer cum market . This New Test Rig consisting of Designing, Development & validation of Motor.

Enhancement of PAPR Reduction Using Pso Based Optimization Technique
Authors:- M.E. Scholar Rati Ranjan Kumar , Asst. Prof. Komal Kanojia

Abstract:- A non-constant envelope with high peaks is a main disadvantage of Orthogonal Frequency Division Multiplexing (OFDM). These high peaks produce signal excursions into non-linear region of operation of the Power Amplifier (PA) at the transmitter, thereby leading to non-linear distortions and spectral spreading. Many Peak to Average Power Ration (PAPR) reductions methods have been proposed in the literature. The objective of this review is to give a clear understanding of different techniques to reduce PAPR of the signal.

Gaze PIN entry for Password Authentication
Authors:- Mr.Raghavendrachar S, Soumya Dattatreya Hegde, Varsha Purushotham, VennalaKN, Vidyashree S

Abstract:- Secret identification numbers are widely used for user authentication and security. Authentication of password using PINs requires users to input the PIN physically, which could be vulnerable to password knowing via shoulder surfing or thermal tracking. Authentication of PIN with hands-off gaze based (by closing the eye) PIN entry techniques, on the other hand, there is no physical footprints behind and therefore offer a more secure password entry option, Gaze -based authentication refers to finding the eye location across sequential image frames, and tracking over eye center over time. This paper presents a real-time application for gaze-based PIN entry, and eye detection and tracking for PIN identification using a smart camera.

Social BOT Detection for Twitter Dataset Using GBC Technique
Authors:- M.Tech. Scholar Roshani Singh, Prof. Sumit Sharma

Abstract:- Today, peoples are devoting large amount of time in social networks. As social media network popularity increases day by day, content writer are spamming on these platform for potential benefits of some organizations. Here graph based clustering algorithm was proposed to develop a binary cluster on the basis of serial or sequential action perform by the user. As per series of action social network graph is reduce into spanning tree where highly distance nodes are identified as abnormal behavior. So group of highly distance nodes are consider as the social bots while other are real users. Experiment was perform on real social sequential dataset of twitter. Results were compared on various evaluation parameters and it was obtained that proposed approach has improved all such parameter values as compared to previous approach adopt by researcher.

Survey on Stress Analysis and Design Optimization of A Pressure Vessel using Ansys
Authors:- M.Tech. Scholar Nitesh Katiyar, Assistant Professor Ranjeet Kumar

Abstract:- Pressure vessels are a commonly used device in marine engineering. Until recently the primary analysis method had been hand calculations and empirical curves. New computer advances have made finite element analysis (FEA) a practical tool in the study of pressure vessels, especially in determining stresses in local areas such as penetrations, O-ring grooves and other areas difficult to analyze by hand. This project set out to explore applicable methods using finite element analysis in pressure vessel analysis.

Stress Analysis and Design Optimization of a Pressure Vessel using Ansys
Authors:- M.Tech. Scholar Nitesh Katiyar, Assistant Professor Ranjeet Kumar

Abstract:- Pressure vessel is used to carry liquids such as petrol, kerosene; aviation fuel etc and these fuel tanks are used to transport fuel. Finite element method is a mathematical technique used to design a fuel carrying vessel and performing the stress analysis. The main objective of this paper is to design and analysis of pressure vessel. The designing various parameters of Pressure Vessel checked and designed according to the principles specified in American Society of Mechanical Engineers (A.S.M.E).

Review: Trust in VANET
Authors:- M.Tech. Scholar Divyam Singh, Prof. Shiva Bhatnagar

Abstract:- Vehicular ad-hoc networks(VANETs) expedite those probability change those way individuals experience the readiness of a secured interoperable remote correspondences a that consolidates cars, transports, activity signals, convenient telephones, Furthermore unmistakable contraptions. An opportunity to in any case, VANETs need help exposed against security perils because of developing dependence ahead correspondence, preparing, and control advancements. The surprising security Also security tests acted by VANETs in-enlightened decency data place stock in, mystery, no renouncement, get the opportunity to control, constant operational necessities/demands, availability, What’s greater security confirmation. The enduring quality for VANETs Might an opportunity to be improved Eventually Tom’s scrutinizing tending on completely those two dominant part of the information trust, which is depicted Likewise those examination from asserting regardless for if Furthermore what precisely degree those low down activity information would reliable, Furthermore focus trust, which is depicted Likewise how dependable those center points Previously, VANETs show up with make. In this paper, an assault safe trust association devise might be suggested for VANETs that could recollect What’s more acclimate to malevolent attacks what’s more review those relentless nature of the two information and versant centers On VANETs. Exceptionally, greater part of the information trust might be assessed done light of the information recognized Also gathered beginning with different vehicles; focus trust is reviewed On two estimations, I. E., helpful trust and suggestive trust, which show how at risk a middle cam wood satisfy its comfort what’s more door reliable those proposition beginning with an inside to isolate center points will be, freely. The adequacy Also capability of the recommended symbolization plot might be authorize through far reaching examinations. Those prescribed trust association subject might be relevant with a wide arrangement about VANET demands should overhaul development prosperity, flexibility, and trademark security with pushed ahead unflinching quality.

A Review: Speech Recognition
Authors:- Sunil, Shweta, Tanya Gulati, Asst.Prof.Garima Singh

Abstract:- Speech recognition is the capability of a program to identify words and expression in spoken language and convert them to a binary language so computer system can understand. Each spoken word is split into discontinuous division which include many tones. This paper brief about the speech recognition system and how it’s work and application in day to day life.

Energy Preserve using LEACH protocol in Wireless Sensor Networks
Authors:- M.Tech. Scholar Om Patel, Prof. Shiva Bhatnagar

Abstract:- In the time of new invention Networks many rising and future empower advancements achieve the prerequisites of pervasive correspondence systems. Remote Sensor Networks is a fundamental classification of these best in class advances, the gigantic worries of these systems are vitality proficient and efficient information accumulation. Bunch based directing in WSNs is a colossal answer for upgrade the vitality productivity of the hubs and creative information gathering. Many examinations on organize lifetime and information accumulation have been proposed by the (LEACH) Low Energy Adaptive Clustering Hierarchy conspire that permits the part of the group head turned among the sensor hubs and endeavors to disseminate the vitality utilization through every one of the hubs. The lifespan of WSNs are influenced by the Cluster Head choice; this is often on the grounds that a CH expends additional power than a Cluster (non-CH) hub. Inthis examination think about, a vitality effective bunch head choice in Mobile WSN is proposed, investigated and approved on the premise of remaining vitality and randomized determination of the hub, which is not doled out as a group head in past round. Additionally, the proposed approach demonstrates the noteworthy changes when contrasted and LEACH and a unique Application Specific Network Protocol for Wireless detector Networks conventions regarding vitality utilization of sensor hubs, improved system lifetime and proficient information assembling because of less vitality utilization amid information transmission.

Study of Different Types of Mixer Topologies
Authors:- M.Tech. Scholar Ranjan Patel, Asst. Prof. Priyanshu Pandey

Abstract:- In this paper, a comparative study of different types of mixer topologies is presented. Gilbert cell is widely used as core of the mixer because it provides high conversion gain, good port-to-port isolation and low even-order distortion. It is found that the linearity of mixer is very good for Multi-Tanh technique by incorporating multiple differential trans-conductance stage but it reaches to very low conversion gain whereas, use of current bleeding technique increase linearity and conversion gain of the mixer by adding current source to increase the bias current at the expense of power consumption. A very low value of noise figure can be achieved with the switched biasing technique by replacing current source with parallel connected nMOS transistors but due to use of the transistor in place of tail current source, linearity is degraded and more power is consumed. Folded Cascode Technique is used to reduce DC supply voltage by folding the LO switching stage with pMOS transistors in switching stage but it degrades the noise figure. Bulk-driven technique can be employed to lower down the power consumption by providing the switching action via the gate of LO (RF) and amplification by the bulk of LO (RF) transistors, however it reduces the linearity. High linearity is obtained by using CCPD (Cross coupled post distortion) technique by cancelling of third order derivatives but it decreases the conversion gain and consume more power due to increase in the number of auxiliary transistors. MGTR enables to achieve high linearity by incorporating auxiliary transistor but it decreases the overall conversion gain and increases noise figure of the mixer. So it is observed that there is a trade-off among the performance metrics, i.e., conversion gain, noise figure linearity, and power consumption of the mixer.

Review of Wide Bandwidth Low Power Low Noise Amplifier
Authors:- M.Tech. Scholar Shradha Chouhan, Asst. Prof. Priyanshu Pandey

Abstract:- Recently, Low noise amplifier versatile used in modern wireless communication like Wi-Max, WLAN, GSM, Bluetooth and satellite communication. Low Noise amplifier have important feature like amplify the signal with rejection of noise. Low noise amplifier in modern communication used as filter with amplifier. In recent scenario low noise amplifier available in wide band, single band, multi-band frequency of application. In present days low noise amplifier the also reduces the reflection of signal exist by elements and connecting interface inside the amplifier. Low noise amplifier available with high gain, noise rejection and with less power consumption. In this paper review the work of past decades done in low noise amplifier. Low Noise Amplifier (LNA) is versatile used as a broadband mixer, low noise amplifier, power amplifier and Darlington amplifier, active balunes, multiband amplifier. Today technology required high speed of transmission efficiency with small power consumption and less utilization of elements in proposed amplifier, Low Noise Amplifier (LNA) products full fill all requirement of modern wireless communications, so that review and discussion, future requirement of technology is needed to discuss. In this paper discusses issues of low noise amplifier, its application, issues and recent trends. In this paper review some techniques of Low Noise Amplifier (LNA) to improve perform and surveyed almost all the Possible Work of Past Decades.

Image Encryption using Steganography
Authors:- Srinvas Nishant, Sarath Dasari, Anisha M Lal

Abstract:- steganography is the art of hiding information within other information in such a way that it is hard or even impossible to identify the existence of any hidden information. There are many different carriers for steganography. Of which, most popular ones are digital images. Due to recent developments in steganalysis, providing security to personal contents, messages, or digital images using steganography has become difficult. His paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good stenographic algorithm and briefly reflects on which stenographic techniques are more suitable for which applications.

Image Retrieval using Hybrid Technique
Authors:- M.Tech. Scholar Deeksha Waghale, Prof. Ashish Tiwari

Abstract:- To retrieve important images from a dissimilar collection by using visual queries as search arguments are the arduous and substantial open problems. In this paper the writers have mentioned the designs and implementations of a simple yet very effective Content-Based Image Retrieval (CBIR) system. The colors, textures and the shapes features are the vital parts of this system. With the three main consequent searching steps the searching becomes multilevel. Such propounded systems are very unique as they consider one feature at each step and use the results of the previous step as the input for the next coming step in multilevel pattern whereas in the earlier methods all the features are combined at once for the single-level search of an average CBIR system. The propounded method is very simple and comfortable to adopt. The retrieval grade of the propounded method is valuated using bi-benchmark datasets for an image classification. The above system of methods shows very good results in terms of amelioration in retrieval qualities, when compared with the literature. In proposed work we get accuracy like between 68.15 % to 94.86% in used different features.

Review of Intrusion Detection system
Authors:-M.Tech. Scholar Purnesh Tiwari, Assistant Professor Prakash Mishra

Abstract:- The Internet of Things (IoT) is a new model that integrates physical objects and Internet and became one of the principal technological evolutions of computing. It is estimated that a trillion of physical objects will be connected to the Internet until 2022. The low accessibility and the lack of interoperability of many of these devices in a vast heterogenous landscape will make it very hard to design specific security measures and apply specific security mechanism. Moreover, IoT networks still exposed and vulnerable to attacks aimed to disrupt the network. Therefore, additional security tools specific to IoT are needed. Intrusion Detection System (IDS) could fulfill this purpose. In this paper, we present a literature review on the IDS in IoT topic, mainly focusing on the current state of research by examining the literature, identifying current trends and presenting open issues and future directions.

Iot Based Intelligent Trolley for Shopping Malls
Authors:- Ragini Raiyani

Abstract:- The project is based on the development of a project with the aim to reduce the time spent in the store and to make shopping of day to day items an experience instead of a headache. This cart uses modern and cheap technology like RFID and minicomputers to make it intelligent and timesaving. It helps the consumers to utilize the time saved in other fruitful activities instead of wasting their time by standing in long queues at the checkout counter.

A Review: Rumors Detection on Twitter using Machine Learning Techniques
Authors:- M.Tech. Scholar Kavita Khalotiya, Prof. Ashish Tiwari

Abstract:- In this period, web based life stage are progressively utilized by individuals to pursue newsworthy occasions since it is quick, simple to get to and modest similarly. In spite of the expanding utilization of web based life for data and news assembling, its tendency prompts the development and spread of gossipy tidbits i.e., data that are unconfirmed at the season of posting, which may makes genuine harm government, markets and society. Along these lines, there is need of compelling framework for distinguishing bits of gossip as ahead of schedule as conceivable before they generally spread. Viable framework should comprise of four parts: Rumor location, gossip following, position grouping, and veracity arrangement. Loads of work has been done in later segment while less work in segment talk identification. In this way, presently we should take a shot at gossip location. In this paper, we will condense endeavors done till now around there. A large portion of existing techniques identifies from the earlier bits of gossip, i.e., predefined gossipy tidbits. So it is required to have robotized gossip discovery strategy which recognizes new developing gossipy tidbits viably and as ahead of schedule as could reasonably be expected.

Survey Paper of Wireless Sensor Network
Authors:- M .Tech. Scholar Kamakshi Gupta, Asst. Prof. Shailendra Tiwari

Abstract:- In recent years there is a quick advancement in the field of Wireless sensor network. This paper gives brief introduction of Wireless sensor associate with its applications in the field of condition, structure checking, keen home watching, Industrial application, prosperity, military, vehicle recognizable proof, blockage control and RFID tag. With movement in WSN, little and simplicity sensor centers end up available, which have limits of Wireless correspondence, recognizing diverse sorts of biological conditions and data getting ready. There are different sorts of coordinating traditions depending on application and framework designing. Guiding traditions give route in the framework and capable multi-skip correspondence. WSNs can be found in various applications like normal native and military by and large which get a handle on enemy interference area, challenge following, calm watching, living space checking, fire acknowledgment and cutting edge.

Phone Security on Android Device
Authors:- M.Tech. Scholar Rajeshwari Yogi, Prof. Ashish Tiwari

Abstract:- Android is a savvy versatile terminal working stage center on Linux. Be that as it may, because of its open-source programming and programmable structure character, it drives the Android framework helpless against get infection assaults. This paper has profoundly inquired about from the Linux framework security system, Android-explicit security instruments and other assurance components. Also, on this premise, Android gadgets have accomplished firmly watched on ordinary state. With the goal that aggressors cannot utilize the portion module or center library to get most elevated access consent and be assaulted. In the mean time, to additionally reinforce the security of Android gadgets, it empowers them to appropriately deal with the high-hazard danger. This paper likewise fortified interruption identification framework (HIDS) in light of the host so as to identify noxious programming and reinforce the Android framework level access control.

Digital Water Marking Technique using Decision Tree
Authors:- M. Tech. Scholar Nikhil Shrivastava, Assistant Professor Prakash Mishra

Abstract:- The quick development of the Internet in the previous years has quickly expanded the accessibility of advanced information, for example, sound, pictures and recordings to general society. As we have seen in the previous couple of months, the issue of ensuring sight and sound data turns out to be increasingly essential and a great deal of copyright proprietors are worried about securing any unlawful duplication of their information or work. Some genuine work should be done so as to keep up the accessibility of mixed media data. Highlight extraction and order based computerized water checking is new territory of research in flow security assurance and copyright strategy. Around there of research different creators utilized element extraction method, for example, wavelet change work and for arrangement reason utilized help vector machine. During the time spent element based water checking strategy include extraction is most critical part and the characterization relies upon chosen highlight. In this paper proposed novel computerized water checking strategy dependent on whole number wavelet change with quality based order procedure. For the choice of highlight quality utilized RBF work. The determination of quality relies upon separated element by whole number wavelet change. The proposed technique recreates in MATLAB programming and tried some rumored assault, for example, commotion assault, share assault and interpretation assault. Our observational assessment result indicates better execution in pressure of DWT water stamping system.

Conservation of Water in Drought Areas
Authors:- Prof. Madhuri S. Bore, Prof. Monali G. Ingle

Abstract:- India is one of the agricultural economy based country. Despite, the share of agriculture sector to GDP of the country is only about 24%, 70% of Indians are dependent on farm incomes, and about 60% of farm cultivation depends on rains. In past few years there has been increase in extreme weather events such as drought, flood, heat and cold waves, strong wind etc. India suffered of drought in 2002 with seasonal June – September all India rainfall 19% below normal after all India drought occurred during June – September, 1987. Droughts have severe economic, environmental and social impacts. Areas having poor rain could be detected in advance. It is possible to reduce agricultural losses by advanced prediction of poor or no rain situations, timely dissemination of weather based agro-advisories to planners and farmers.

Hospital Waste Management and its Impact on a local Community in Indore City
Authors:- M.Tech. Scholar Anant Tare, Asst. Prof. Vijay Kahar

Abstract:- Hospital waste management in the world is a formal discipline and does occupy a critical place in the management of health care sector. The management of hospital waste requires its removal and disposal from the health care establishments as hygienically and economically as possible by methods that all stages minimizes the risk to public health and to environment. To analyze the present situation analysis of medical waste management systems was performed to understand the various handling and disposal procedures, the knowledge and awareness of individuals involved in medical waste generation, handling and disposal, and the potential impacts of the waste stream on both human health and the natural environment. The method adapted for present study was literature review and survey method. The data collection was done through questionnaire (data collection form), informal interviews and site visits. It was found that a variety of methods were used by the medical facilities to dispose their wastes including burning burial, entombing, selling, dumping, and removal by municipal bins. The waste disposal practice was found to be quite unsafe, and both clinical and non-clinical wastes were found to be thrown together. There was insufficient awareness of the magnitude of the medical wastes issue by concerned individuals at different levels from director or divisional head to waste pickers. There was no safety measure observed in dealing with waste disposal or laboratory analysis of infectious diseases. Medical waste incineration is identified as the most preferred disposal method.

Review of Under Water Communication on Wsn
Authors:- M.Tech. Scholar Priyanka Patwari, Asst. Prof. Madhvi Singh Bhanwar

Abstract:- This paper explains briefly our research directions in the field underwater sensor networks. We explain potential applications to off-shore oil fields for equipment monitoring, seismic monitoring and underwater robotics. We describe research directions in MAC, short-range acoustic communications, localization protocols and time synchronization for high latency acoustic networks, application level time scheduling and long-duration network sleeping.

Online Video Game Streaming using Cloud Gaming
Authors:- Pravin R. Thokal, Omkar D. Kshirsagar, Shubham R. Hadake, Muktesh T. Bobade

Abstract:- The present paper mainly focuses on review of cloud gaming. In cloud gaming, sophisticated game runs on powerful servers in data centers, rendered game scenes are streamed to gamers over the Internet in real-time, and gamers use light-weight software executed on devices to interact with the games. Computer games used to take more time to get installed on Computer systems as games are too complicated and the computer hardware has low specifications. Gamers have to repeatedly upgrade their computers to play latest computer games. Cloud gaming is a system that has the potential to make virtually any video game, regardless of system requirements, to be played on almost any system.

A Survey on Data Storage, Maintenance and Accessing Challenges in Cloud Computing
Authors:- Thilagavathy Sakthivel, Vijayalakshmi Saravanan

Abstract:- Cloud computing holds the possibility to dispense with the prerequisites for setting up of high cost figuring foundation for the IT-based arrangements and administrations that the business employments. It vows to give an adaptable IT design, open through web for lightweight convenient gadgets. This would permit many-crease increment in the limit or capacities of the current and new programming. In a distributed computing condition, the whole information dwell over a lot of organized assets, empowering the information to be gotten to through virtual machines. Since these server farms may lie in any side of the world past the range and control of clients, there are diverse security and protection provokes that should be comprehended and dealt with. Likewise, one can never prevent the likelihood from securing a server breakdown that has been seen, rather frequently in the on-going occasions. There are different issues that should be managed regard to security and protection in a distributed computing situation. This broad overview paper intends to expound and investigate the various uncertain issues compromising the Cloud processing selection and dissemination influencing the different partners connected to it.

What is Image Recognition?
Authors:- Justin Devassy, Abhishek Bharadwaj (Student MCA), Prof. LatikaKharb

Abstract:- In recent years, Image recognition has become a buzzword in the tech world. Deep learning has changed the entire world over the past few years image recognition is one of the striking features of deep learning. Every day, more applications depend on neural networks which are the core component of deep learning in fields of object detection, identification, and classification. In the paper, we have discussed about what is image recognition, some real world examples, image recognition tools, opportunities, uses and problems in image processing.

Experimental Evaluation of Super plasticizers used in M20 & M25 Grades Concrete
Authors:- Sc. B Pankaj Joshi, Sc. C Raj Kumar, Sc. E Rajeev Kumar

Abstract:- Chemical admixtures are one of the important ingredients in concrete other than Portland cement, water and aggregate added to the mix before or during mixing. Admixtures are primarily used to reduce the water-cement ratio to enhance workability and compressive strength of concrete along with other properties. Successful use of admixtures depends on the use of appropriate methods of batching and concreting. Most admixtures are supplied in ready-to-use liquid form and are added to the concrete at the plant or at the jobsite. Certain admixtures, such as pigments, expansive agents, and pumping aids are used only in extremely small amounts. The effectiveness of an admixture depends on several factors including: type and amount of cement, water content, mixing time, slump and temperature. The paper presents the experimental results for comparison of two super plasticizers (Naphthelene based and Poly-carboxi late based) used in M20 & M25 grade concrete mixes to achieve economical concrete mix.

Real Time Enhanced Speech Recognition Technique to Operate Computer System Using SVM:Review
Authors:- Jadhav Sayali, Kadam Madhuri, Talreja Khushboo, Khatake Sujata

Abstract:- Speech is unique human characteristic used as tool to communicate. Speech Recognition technology is one most of the fast growing engineering technologies. It has a number of applications in different areas and provides potential benefits. Nearly 20% people of the world are suffering from various disabilities, the speech recognition system in those particular cases provide a significant help to them, so that they can share information with people by operating computer through voice input. The main objective is to recognize the spoken word by same speaker using multi-class support vector machine. Because of their limitations and high cost, voice recognition systems have traditionally been used only in a few specialized situations. For example, such systems are useful in instances when the user is unable to use a keyboard to enter data because his or her hands are occupied or disabled. Instead of typing commands, the user can simply speak into a microphone. The performance of system gives better result with reducing the work of human in terms through input device or touch screen. This work is proposed to operate the computer system through the voice commands like open or close file or any computer operations.

Review of Cooling Load Calculation of New Academic Building of Asansol Engineering College
Authors:- UG Sourabh Choudhary, UG Shantnu Sharma, UG Sayak Saha, UG Sanu Kumar, UG Sanjeev Kumar, UG Rohit Vishwas, Asst. Prof. Kaushal Kishore

Abstract:- Day by day due to increasing global temperature of the environment the demand of Air Conditioning Systems is increasing so it’s very important that the right amount of Air Conditioning System is selected. This process of selecting the right amount of Air Conditioning System is done by calculating the heat loads from the various sources in the room. The calculation of Heat Load is very complex process and required a lot of complex mathematical calculation. So to simplify it various software such as HAP 4.0 etc. are used for the above said purpose. These software’s though are simple for the professionals but appear to be very complex for common people. So this projects develops a alternate excel sheet which does the same work as that of the professional software’s but in a very simple manner. This project contains a detailed cooling load calculation of “New Academic Building” of Asansol Engineering College, Asansol, West Bengal. Its covers all the aspects of solar heat gain through glass, walls, partition walls, ceilings, equipment etc. All the calculations are done in an excel sheets with all the data collected from ASHRAE and ISHRAE handbooks. The project also describes the different heat load parameters such as refrigeration, air conditioning, etc. The various assumptions and design parameters are also considered for the development of this project. The detailed calculation and the mathematics running behind the working of the excel sheet is also described in the 2nd half portion of the project.

Evaluation on Temperature Distribution Effect in Internal Combustion Engine Fin withDifferent Profile
Authors:- A. Gautam, R. Mohan

Abstract:- The fins used in internal combustion engine plays a vital role in thermal distribution of engine during its operating condition which is used to dissipate the heat gained from combustion inside the cylinder. It is mounted above the engine to extract maximum amount of heat flux generated inside it. In present study, the UNI-GRAPHICS NX-8.0 has been used to develop the CAD model of IC engine fin. The ANSYS workbench 15.0 software is used for steady state thermal analysis of IC engine fin in order to assess the parameters affecting their thermal performances. Here, the present model is validated with the previous literatures and it is observed to be in good agreement. The performance of various fin profile such as concave fin, convex fin, convex with perforation, elliptical fin, elliptical with fillet fin, elliptical fin with perforation are assessed. The simulation of the optimized model i.e. elliptical fin with perforation gives higher value of temperature distribution with respect to distance in fin profiles. It has also been observed that thermal resistance was reduced at constant temperature of 495K inside the cylinder. The maximum convergence is observed for elliptical fin profile with perforation irrespective of parameters and configurations employed in the analysis.

A Survey of Deep-Learning Model using Intrusion Detection for the Internet of Things
Authors:- Ms.S.Vinitha, Prof. M.Ganesan, Ms.S.Arabindhu

Abstract:- Cyber-attacks on the Internet of Things (IoT) are developing at a disturbing rate as gadgets, applications, and correspondence systems are winding up progressively associated and coordinated. At the point when assaults on IoT systems go undetected for longer periods, it influences accessibility of basic frameworks for end clients, expands the quantity of information breaks and wholesale fraud, drives up the expenses and affects the income. It is basic to recognize assaults on IoT frameworks in close ongoing to give powerful security and guard. In this paper, we build up a wise interruption discovery framework custom fitted to the IoT condition. Specifically, we utilize a profound learning calculation to identify pernicious traffic in IoT systems. The location arrangement gives security as an administration and encourages interoperability between different system correspondence conventions utilized in IoT. We assess our proposed recognition system utilizing both genuine system follows for giving a proof of idea, and utilizing recreation for giving proof of its adaptability. Our exploratory outcomes confirm that the proposed interruption recognition framework can recognize true interruptions adequately.

A Critical Review of Recent Nuclear Plant Accidents and Disasters
Authors:- M.Tech. Scholar Sourabh Verma, Prof. S. N. Varma

Abstract:- Present day safety levels are achieved by learning from past accidents. We learn to use a knife by analyzing at the incidents which caused injury and harm .As per HSA (Health Science Association) report “Incident investigation are intended to determine the cause of an incident, to identify unsafe conditions or acts and to recommend corrective actions so that similar incidents don’t occur in the future. The purpose is prevention, not blame. After an investigation, employers are required without any undue delay to take corrective actions and then report on the actions taken”.

Eye Can Help – An Assistive Eye Wearable for the Blind Designed Using Real-Time Object Detection
Authors:- Hrituja Khatavkar

Abstract:- It is a big challenge for the visually impaired to access the surrounding with ease. Given paper presents a tool, an assistive device for the blind that will aid them navigate the surroundings. This device uses real-time object detection to identify the objects in nearby environment and then the is processed to convert to speech to make the understand.

A Survey on Security Attacks in Vehicular Adhoc Networks (Vanets)
Authors:- S.Arabindhu, Prof K. Prem Kumar, S. Vinitha

Abstract:- VANETs have turned into a major part of numerous savvy transportation frameworks. Security is a significant yearning for VANET in perspective on the actualities that improved security which diminishes mishaps and subsequently improves traffic conditions but then spare lives. Creating secure VANET foundations stays most noteworthy test. As verification permits confiding in both client and information, it requires significant consideration in the security structure of VANETs. A large portion of the examination purposeful endeavors’ in scholastics and industry are engaged to give productive security engineering to VANET to shield the system from foe hubs and assaults. The issue of VANET is transmitting data to address goal without impact in that data. Bringing up security holes with respect to particular dangers, the arrangement will permit to structured new secure system control strategies. This paper gives different assaults in VANET and potential arrangements by utilizing cryptographic tasks.

A Survey on Internet of Things Based Water and Energy Management Open Research Issues
Authors:- Ms. Vijayalakshmi Saravanan, Ms. Thilagavathy Sakthivel

Abstract:- The quick progressions in correspondence advances and the hazardous development of Internet of Things (IoT) have empowered the physical world to imperceptibly entwine with actuators, sensors, and other computational components while keeping up persistent system network. The persistently associated physical world with computational components frames a keen domain. A brilliant domain plans to help and improve the capacities of its tenants in executing their errands, for example, exploring through new space and moving substantial items for the older, to give some examples. Specialists have directed various endeavors to utilize IoT to encourage our lives and to examine the impact of IoT based keen situations on human life. This paper studies the cutting edge examine endeavors to empower the IoT based brilliant situations. We sort and group the writing by concocting a scientific classification dependent on correspondence empowering influences, arrange types, advancements, neighborhood models, targets, and attributes. Besides, the paper features the uncommon open doors achieved by IoT based brilliant conditions and their impact on human life. Some announced contextual analyses from various endeavors are additionally displayed. At long last, we talk about open research difficulties for empowering IoT based savvy situations.

A Research of Dealing with Sinkhole Attacks To Prevent Security in WSN
Authors:-Ms. K. Prasannadevi, Prof P.Karthikeyan, Ms.A.Swathy

Abstract:- Wireless Sensor Network (WSN) is rising as a common innovation because of its wide scope of utilizations in military and regular citizen areas. These systems are effectively inclined to security assaults. Unattended establishment of sensor hubs in the earth causes numerous security dangers in the remote sensor systems. There are numerous potential assaults on sensor system, for example, specific sending, sticking, sinkhole, wormhole, Sybil and hi flood assaults. Sinkhole assault is among the most damaging steering assaults for these systems. It might make the interloper draw all or a large portion of the information stream that must be caught at the base station. When sinkhole assault has been actualized and the enemy hub has begun to fill in as system part in the information directing, it can apply some more dangers, for example, dark opening or dim gap. Eventually this drop of some significant information bundles can upset the sensor organizes totally. This paper centres around the different techniques that can be actualized to beat this assault like Location Based Compromise Tolerant Hop Count Monitoring Scheme and through Non Cryptographic Security Mechanism, Method of Sinkhole Attack Detection.

A Survey on Security Attacks in Vehicular Adhoc Networks (Vanets)
Authors:- S.Arabindhu, Prof K. Prem Kumar, S. Vinitha

Abstract:- VANETs have turned into a major part of numerous savvy transportation frameworks. Security is a significant yearning for VANET in perspective on the actualities that improved security which diminishes mishaps and subsequently improves traffic conditions but then spare lives. Creating secure VANET foundations stays most noteworthy test. As verification permits confiding in both client and information, it requires significant consideration in the security structure of VANETs. A large portion of the examination purposeful endeavors’ in scholastics and industry are engaged to give productive security engineering to VANET to shield the system from foe hubs and assaults. The issue of VANET is transmitting data to address goal without impact in that data. Bringing up security holes with respect to particular dangers, the arrangement will permit to structured new secure system control strategies. This paper gives different assaults in VANET and potential arrangements by utilizing cryptographic tasks.

A Survey on Internet of Things Based Water and Energy Management Open Research Issues
Authors:- Ms. Vijayalakshmi Saravanan, Ms. Thilagavathy Sakthivel

Abstract:- The quick progressions in correspondence advances and the hazardous development of Internet of Things (IoT) have empowered the physical world to imperceptibly entwine with actuators, sensors, and other computational components while keeping up persistent system network. The persistently associated physical world with computational components frames a keen domain. A brilliant domain plans to help and improve the capacities of its tenants in executing their errands, for example, exploring through new space and moving substantial items for the older, to give some examples. Specialists have directed various endeavors to utilize IoT to encourage our lives and to examine the impact of IoT based keen situations on human life. This paper studies the cutting edge examine endeavors to empower the IoT based brilliant situations. We sort and group the writing by concocting a scientific classification dependent on correspondence empowering influences, arrange types, advancements, neighborhood models, targets, and attributes. Besides, the paper features the uncommon open doors achieved by IoT based brilliant conditions and their impact on human life. Some announced contextual analyses from various endeavors are additionally displayed. At long last, we talk about open research difficulties for empowering IoT based savvy situations.

Tree Species Identification and It’s Diseases using Machine Learning
Authors:- Satish V. Kendre, Prof. J. N. Nandimath

Abstract:- Tree species identification is crucial for forest management. From the perspective of plant taxonomy, leaves, flowers, roots, and fruits all carry important information to distinguish different species. Roots, however, are buried in the ground and not easy to obtain. When the leaf image is uploaded to PC and then its essential features are identified and recorded And it’s diseases using image processing methods. Feature extraction is a critical stage because the ability of a system to discriminate various types of leaves depends on the features extracted. The features have to be stable in order to make the identification system robust. Subsequently the plant leaf is recognized using techniques of machine learning. We will provide an effective approach to automatically identify tree Species and its diseases machine Learning. The convolution neural network is a widely-used classifier, and provides an alternative for the traditional image recognition approach. The work will identifies tree species by analyzing tree leaves, which have multi-dimensional features such as color, shape, and leaf vein signatures. Since it is difficult to find a single leaf feature to accurately identify tree species and it’s diseases, convolution neural networks are employed to integrate multi-dimensional leaf features.

Survey on Prediction of Heart Disease using Machine Learning
Authors:- M.Tech. Scholar Yashita Agarwal, Asst. Prof. Deepak Singh Tomar, Hod Dr. Bhupesh Gour

Abstract:- Machine Learning algorithms provide the facility to find new facts in the form of patterns from the history of records stored in databases. Predicting the diseases in earlier stages is a major task of data mining algorithms. The number of costly tests is required for patients to analyze the symptoms and causes for effective disease diagnosis. On the other hand, this number of tests on patients can be eliminated using data mining machine learning algorithms. This minimizes number of tests which plays considerable outcomes in time and accuracy level of prediction. Heart disease prediction is essential since it permits healthcare professionals to analyze the attributes important for diagnosis like blood pressure, diabetes, age, height, weight, etc., effectively.

Use of Artificial Intelligence in Sales and Marketing
Authors:- MBA Student Atul Karale , Prof. Raghvendra Sandhane

Abstract:- Artificial intelligence is impacting the sales and marketing in an unparalleled way. AI is expected to grow performance across all sectors, especially those with a high proportion of predictable tasks. Companies like Walmart, Amazon are heavily investing in AI because of which Sales and marketing reps are facing a grim future. In this paper, a literature review of how artificial intelligence-based systems is used for sales and marketing purpose, how AI has evolved from time to time with special focus on organization which are presently using this for industrial marketing is covered. This paper also includes a survey which is aimed at gathering information from organizations on how they are using artificial intelligence. This paper therefore tries to address the use of AI cases in sales and marketing and also aims to determine the future scope of artificial intelligence in different marketing activities.

A Survey on Searching Mechanism for Encrypted Cloud Storage
Authors:- M.Tech. Scholar Mintu Kumar, Professor Niresh Sharma

Abstract:- The basic advantage of cloud computing is giving of data benefit, by which the data proprietors stores their information in general data server farms by financially sparing their capital venture towards data management. Distributed cloud storage gives clients enormous storage room and makes it easy to use for prompt necessity of data, which is the establishment of a wide range of cloud based applications. Data giving in the business open cloud additionally raises the issue for unapproved data get to and the distributed cloud storage would not be commendable if the outsourced data isn’t viably used. The challenge is on the most proficient method to influence successful data to access in the public cloud storage aiming at change of different searching procedures for expanding the data usage. In this paper, an endeavour is made to review different searching procedures for the powerful data use in cloud storage and is talked about in detail.

Analysis of A Fatigue Life Prediction for Safe and Economical Machine Shaft
Authors:- M.Tech. Scholar Gaurav Kumar, Asst. Prof. Ranjeet Kumar, Asst. Prof. R.S. Sikarwar

Abstract:- High-strength bolts are widely used in wind turbines and play a significant role in their operation. In this paper, in order to study the ultimate strength of high-strength bolts in the connection between the hub and main shaft in wind turbine with pretension effects, two kinds of finite element models are presented: a solid bolt model and a simplified bolt model. In this proposed study the numerically simulation analysis of the fatigue behavior of stepped shaft made of Carbon steel SAE 1045_390_QT under a biaxial loading (torsion-bending moment). This work will include the complete analysis of stepped shaft by using Ansys workbench 15.

Identification of Plant Leaf Diseases using Deep Convolutional Neural Networks
Authors:- M.Tech. Scholar Tirupati Murali Mohan, Asst. Prof. & Hod P. Bhanu Prakash Reddy

Abstract:- – Agriculture is the most important part of the global economy as it presents food safety. However, in modern years, it has been noted that plants are broadly infected by various infections. The manual examination of plant, fruit and leaf diseases is a complicated process which can be reduced by using automated processes for detection of plant diseases at the first stage. In the field of horticultural information, the automatic identification moreover diagnosis of maize leaf diseases are extremely desired. For increasing growth and productivity of the crop field, farmers need automatic monitoring of disease of plants instead of manual. Standard monitoring of disease do not produce a satisfactory outcome as natural eye observation is the old process needs more extra time for disease identification also need specialist hence it is not effective. Curvularia leaf spot, Brown spot, Mosaic, Grey spot, and Rust are five popular types of leaf diseases. To overcome the drawbacks of regular eye observing procedure, we used digital image processing method for active and accurate disease detection of the plant. To develop the identification accuracy of leaf diseases and decrease the number of parameters, the improved GoogLeNet and Cifar10 models based upon deep learning are proposed for leaf disease identification in this paper. Two improved standards that are employed to train and test nine varieties of maize leaf images are obtained by changing the parameters, adjusting the pooling combinations, combining dropout operations and rectified linear unit functions, and decreasing the number of classifiers. The enhanced processes have probably improved the accuracy of leaf disease and decreased the convergence repetitions, which can efficiently increase the model training and identification capability.

Online Parking Booking System
Authors:- Nidhi Sharma, Ruchita Bhoye, Anuja Deokar, Shrishti Nayak

Abstract:- With the increasing number of vehicles, finding a parking space in most areas is difficult for drivers. The common method of finding a free space is manual. This method takes time and effort. Hence, this project offers an online reservation system where the users can view various parking areas and select the available space. If the booking space is available then he/she can book it for specific time slot. The booked space will be marked red and will not be available for anyone else for that specified time. This system provides an additional feature of cancelling the bookings. User can remove their booked space anytime. Online payment can be done. After making payment, user will get a notification on his/her phone with unique parking number.

Traffic Sign Recognition and Boundary Estimation Using Convolutional Neural Network
Authors:- M.Tech. Scholar M. Hanumesh Raja, Asst. Prof. & Hod P. Bhanu Prakash Reddy

Abstract:- Now a days, a large number of vehicles is quickly increasing. In parallel, the number of routes and traffic signs has developed. As an outcome of developed traffic signs, the drivers are required to learn all the traffic signs and to pay attention to them while driving. A method that can automatically identify the traffic signs has been required to decrease traffic accidents and to drive more easily. Recognition and Detection of texts in traffic signs have been extensively studied and with the advance in image capture technology has accommodated to develop or to produce new methods to resolve this issue. In this work, we introduced a method for detection, segmentation and recognition of text-based traffic signs from images analyzing and processing techniques. We introduce a unique traffic sign detection system that concurrently estimates the location and precise boundary of traffic signs using convolution neural network (CNN). Estimating the precise boundary of traffic signs is very important in navigation systems for smart vehicles where traffic signs can be used as 3-D landmarks for the road environment. In this paper, the boundary view of a traffic sign is formulated as 2- D pose and shape class prediction problem, and this is completely solved by a single CNN. With the predicted 2-D pose and the shape class of a targeted traffic sign in the input, we determine the actual boundary of the destination sign by projecting the boundary of a corresponding template sign image into the input image plane.

Automated Payroll with Gps Tracking and Image Capture
Authors:- Shinde Reshma U.

Abstract:- This system is a combination of web as well as android application where the user will be using the android application and admin as well as HR will work with web application. This application is meant for field work users. The user will have this application in his android phone, when the user will login to the system his image will be captured and his GPS location will be send to the admin where admin will view image and GPS location in web application. After Login, GPS location of the employee will be tracked automatically by the system and send to the admin after every 30 minutes .When user logout the system again the image will be captured as well as GPS location will be send to the admin. In order to keep track of the attendance as well as payroll of the field work people, this system plays a major role.

A Review on Heat Transfer Analysis of Internal Combustion Engine Fins at Different Profile
Authors:- A. Gautam, R. Mohan

Abstract:- The part or component which faces high temperature variation and thermal stress is engine cylinder and also the core automobile component of engine is cylinder. So there has to need of slowdown the high temperature variation and thermal stress of cylinder by using the fins. To increase the heat transfer by convection fins have provided on the surface of cylinder. Internal combustion engine fins plays an important role in thermal distribution in engine during its operating condition which is used to dissipate the heat gained from combustion inside the cylinder. It is mounted above the engine to extract maximum amount of heat flux generated in it. This paper presents a review of different fin profile to reduce thermal resistance and get maximum convergence.

Wearable Polymer Optical Fiber Sensors in Healthcare using Iot
Authors:- C.Premanantha Madhavan, K.Jebastin

Abstract:- Sleep disordered breathing is an increasingly common condition among the general population. Life expectancy in most countries has been increasing continually over the several few decades thanks to significant improvements in medicine, public health, as well as personal and environmental hygiene. However, increased life expectancy combined with falling birth rates are expected to engender a large aging demographic in the near future that would impose significant burdens on the socio-economic structure of these countries. Therefore, it is essential to develop cost-effective, easy-to-use systems for the sake of elderly healthcare and well-being. Remote health monitoring, based on non-invasive and wearable sensors, actuators and modern communication and information technologies offers an efficient and cost-effective solution that allows the elderly to continue to live in their comfortable home environment instead of expensive healthcare facilities. These systems will also allow healthcare personnel to monitor important physiological signs of their patients in real time, assess health conditions and provide feedback from distant facilities. In this paper, we have presented and compared several low-cost and non-invasive health and activity monitoring systems that were reported in recent years. A survey on textile-based sensors that can potentially be used in wearable systems is also presented. Finally, compatibility of several communication technologies as well as future perspectives and research challenges in remote monitoring systems will be discussed.

Material Characteristics of Geopolymer Concrete for Different Strength
Authors:- Ph.D Research Scholar G.Jayarajan, Prof. & Dean Dr.S.Arivalagan

Abstract:-Every year 87 to 100 million tonne of fly ash is generated from coal based thermal power stations in India and power is the key to the prosperity and development of a nation and the power generation in India consumes 70% of country’s coal production and generates 100 million tonnes ash per tear. The ash generation is projected to increase at least to 175 million tonne per year by 2012. Now, having seen that fly ash is such a wonderful and useful material that it can be used for large number of gainful applications like in building components, cement, construction of embankments, raising, dykes, agriculture and mine fill material, it is successfully accepted for large scale utilization instead of disposing at high handling costs. This article deals with the management of fly ash in utilization based on its quality and value, Quarry dust, 12.5mm coarse aggregate with geoploymer concrete.

Perception of Business Education Teachers on The Need for Adoption of E-Learning Approach In Teaching and Learning
Authors:- Bamidele Vincent Olawale, Ayibiowu Stephen Idowu, Murtala Muhammed Yusuf

Abstract:- This paper examines the perception of business educators on the need for adoption of e-learning approach of teaching and learning in tertiary institutions. Two (2) research questions as well as hypotheses were raised for this study. The study made use of 500 Business education teachers who participated voluntarily in the study. The business educators used for the study were recruited from the six states of the North western region of the country, namely; Kano, Kaduna, Kastina, Zamfara, Sokoto and kebbi. A well structured questionnaire was used to collect the data used in this research. SPSS statistical tool was used to analyze the data, hypotheses were tested using t-test. And the finding of the study depicts that the perception of business educators with long teaching experience and those with shorter teaching experience on implementation of E-learning Approach in Teaching and learning of Business education differs. The finding of the study also shows that there is no significant difference between the perceptions of business education teachers who are first Degree holder (BSc/Bed) and those who are second degree holder (M.sc) on implementation of E-learning Approach in Teaching and learning of Business education. The study among others recommends that optimal attention should be given to improved software and appropriate policies that will favour e-learning approach of teaching and learning at all level of education in Nigeria.

A Survey: Possibility of using Building Material Waste and Waste Tyre as a Construction Material
Authors:- Ankit Chand Mishra, Assitant Prof. Dr. Sneha Gupta

Abstract:- The main objective of this study is to investigate the potential use of various solid wastes for producing construction materials. This paper is based on the review of available literature on the construction materials including different kind of solid waste. The traditional method for producing construction material is using the valuable natural resources. Besides the industrial and urban management system are generating solid waste and most probable dumping them in open fields. This activity poses serious detrimental effects on the environment. To protect the environment many efforts are being made for the reutilization of various types of solid waste with a view to utilize them in the production of various construction materials. This paper is about the environmental implications caused by the generation of various solid wastes. In addition, this paper shows the application of building material waste and solid waste based construction materials.

Past Studies on Thermodynamic Analysis of A Novel Combined Cycle Comprised of Vapor-Compression Refrigeration And Organic Rankine Cycles
Authors:- M.Tech. Scholar Prashant Kumar, Professor Sujeet Kumar Singh

Abstract:- The world is facing energy and environmental challenges due to population growth and economy development. The utilization of renewable energy can significantly contribute to reduction in consumption of conventional energy and environmental pollution. Low grade thermal energy can be utilized in organic Rankine cycle driven vapour compression refrigeration system (combined ORC-VCR) to produce refrigeration effect. Low grade renewable energy can be obtain from the source such as solar, geothermal and waste heat of industries.

Implementing Dynamic Shrew Attack Protection (Sap) to Defend Against Shrew Attack on Edges
Authors:- Asst. Prof. Agath Martin, Asst. Prof. Nidhin Sani, Asst. Prof. Nidhin Sani, Asst. Prof. Nishanth R.

Abstract:- Today’s world is ruled by Internet which is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It consists of different type of routers and components to connect between various sources. We have both inner router which connects similar topology and outer router which connects different topology. One of the error types in communication is packet loss by any means which may leads to attacks in TCP connection. Shrew Attack leads to packet drops which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner. We have so many reasons for packet dropping in edges; one of such reason is due to service level agreement (SLA) enforcement where it is a negotiated agreement between two parties (e.g., customer and service provider). In this paper we propose SAP (Shrew Attack Protection) which is an architectural model that used to defend against the shrew attack rather than attempting to detect and isolate. Basic concept which used here is differential tagging & drop rate collector to identify the victims Till now research have been shown mitigating the attack in inner router where the loss is very less. But we implement SAP in edges to reduce the packet-loss (where theoretically more drops in edges) and further stop the TCP connection from closing. SAP is a destination-port-based mechanism and requires only a small number of counters to find potential victims, which makes SAP readily implement able on top of existing router mechanisms.

Study of Forced Convection Nanofluid Heat Transfer in The Automotive Cooling System
Authors:- M.Tech. Scholar Atulya Agrawal, Professor Deo Kumar Singh

Abstract:-The development of high performance thermal systems for heat transfer enhancement has become popular nowadays. A number of works has been performed to gain an understanding of the heat transfer performance for their practical application to heat transfer enhancement. Thus the advent of high heat flow processes has created significant demand for new technologies to enhance heat transfer. Heat transfer performance of liquids is limited by their low thermo-physical properties compared with those of solids. Dispersing solid metallic or non-metallic materials in a base fluid (liquid), such as water, ethylene glycol or glycerol, has become an interesting topic recently. In this paper, the friction factor and forced convection heat transfer of different nano particles dispersed in water in a car radiator was numerically determined. Four different nano fluid volume concentrations (1%, 2%, 3% and 4%) were used, and the resulting thermal properties were evaluated. The Reynolds number and inlet temperature ranged from 10000 to 100000 and from 60 to 90 °C, respectively.

Comparative Study of ILS and MLS Systems and Proposed MLS Prototype on Runway 27 of Bangalore International Airport
Authors:- M.Tech. Scholar Niyonsaba Jeremie, Professor Samuel Vivek

Abstract:-This paper discusses how the instrument landing system (ILS) and microwave landing system (MLS) operate, their subsystems and how to convert Bangalore’s international airport ILS system into MLS system. The need of MLS system over ILS system is also covered in this paper.

Comprehensive Study of Cast Iron Welding by using Different Electrode, with the Help of Destructive Testing
Authors:-Prof. Aamir Sayed, Akash S.Kogade, Akash S.Lilhare, Bablu P.Bhimte, Akshay Wankhede

Abstract:-The problematic welding characteristics of the cast iron originate majorly from the high carbon content of the material. On welding and cooling, the carbon makes formation of various undesired microstructures possible, reducing the weld ability a great deal in all regions related to welding. For welding cast iron material by using hot welding process according to the preheating temperatures ranges. the lower preheating temperatures are nonsufficient for lowering the cooling rate to the desired values and hence formation of brittle phases as martens tic and carbides are encountered.For these cases generally Ni based electrodes are used. Ni based fillers are weaker than steel alloys and yields higher ductility. Increased ductility suspends crack formation especially in case of martens tic transformation and additionally Nickel bonds with Carbon preventing formation of iron carbide. Despite these superior properties, Ni electrodes provide relatively lower mechanical properties with respect to steel.

Survey on Secure Routing Method in Wireless Sensor Networks Based Pso
Authors:- M.Tech. Scholar Anamika Kumari, Asst. Professor Niresh Sharma, Dr. Varsha Namdeo

Abstract:-Some trust-based methods have been proposed for consideration by guaranteeing the security routing of wireless sensor networks (WSN) recently. However, Most of the current research work usually consumes a lot of energy resources and computing resources or only performs well for specific types of attacks. Nowadays, most of current research works are only targeted at specific types of attacks, so they cannot cope with dynamically changing security environments. Therefore, it is extremely important to design an effective security routing algorithm to ensure data security.

Image Colorization Using Deep Learning
Authors:-Abhishek Thakur, Sumit Pandey, Priyanka Dusane, Nidhi Sharma

Abstract:-The idea of colorizing black and white films and pictures is a very old notion dating back to 1902. Today it is accepted as enrichment to the art form. Today, colorization is usually done by hand in Photoshop and other software. This takes a lot of time and proficiency. In short, an image can take up to one month to colorize. It requires considerable research. A face alone requires up to 20 layers of pink, green and blue shades to get it just right. In this project we are attempting to recolor B/W or Grayscale images using Convolution Neural Networks. This survey paper covers a few techniques that automate the task of recoloring desaturated images. These techniques employ the use of image processing and machine learning to achieve the desired outputs.

Crowd Monitoring System using Artificial Neural Networks
Authors:- Shreyash Pimpalshende, Barsha Koley, Shubham Patil, Supriya Kudale, Dr. Archana Chaugule

Abstract:- Detection of objects and their analysis into useful data has always been the core concern throughout the human evolution. From the introduction of computers, to providing those human like capabilities, to the upcoming trends in computer vision and natural language processing, these abilities are now been started to replicate by the computers. Use of Artificial Intelligence is currently the prime focus of industry in development of such core abilities for computers. Our Project involves the use of Artificial Neural Networks to determine, analyze and classify the objects been given to the feed input of it and generate useful insights, resulting in the determination of person head count in particular place, thereby monitoring the crowd and taking appropriate actions.

Study of use of Artificial Intelligence as an Enabler for Startup Success
Authors:- Ph.D Research Scholar Saumendra Mohanty

Abstract:- Artificial Intelligence is turning out to be a godsend for startups. Funding of artificial intelligence-focused companies reached approximately $9.3 billion in the U.S. in 2018, an amount that will continue to rise as the transformative impact of AI is realized. AI-based analysis is used by these Startups to make data-driven decisions. AI in business analytics can play a very crucial role in the overall success of startup organization. Advanced computing tools, machine learning, predictive Artificial Intelligence is turning out to be a great enabler to Startups to gain early traction, Big Corporation interest & investor funding over other non AI based technology Startups. As business leaders and innovators race to reach the promise of artificial intelligence to deliver a competitive advantage as well as cost and time savings, the technology is altering industries from finance to manufacturing with new products, processes and capabilities. Startups are taking advantage of AI because it enables them to provide their customers with personalized marketing, which in turn increases engagement, helps to enhance customer loyalty and improve sales, saves time and money by automating and optimizing routine processes and tasks. Increase productivity and operational efficiencies and make faster business decisions based on outputs analysis and AI have fueled the growth of new-age business intelligence tools.A recent study of Artificial Intelligence firms from three continents and 18 industries, picked show a clear trend in this regard .Many large companies have invested or acquired those Startups which have used AI /ML Algorithms.

Vehicle Crash Alert System
Authors:- Prof. M.B.Yelpale, Shubham Sanjay More, Sahil Anis Pathan, Amogh Satish Kumathekar, Priyadarshan Sanjay Deshmukh

Abstract:- At the start the GPS continuously takes computer file from the satellite and stores the latitude and line values in AT89s52 microcontroller’s buffer. If we have got to trace the vehicle, we’d prefer to send a message to GSM device, by that it gets activated. It jointly gets activated by police work accident on the shock detector connected to vehicle. Parallely deactivates GPS with the help of relay .Once GSM gets activated it takes the last received latitude and line positions values from the buffer and sends a message to the particular vary or PC that’s predefined at intervals the program. Once message has been sent to the predefined device the GSM gets deactivated and GPS gets activated.

A Review To Improvement Power Quality To Grid Connectedwindenergy System by Statcom
Authors:- Lallan Kumar, Astha Dixit

Abstract:- This paper a review of power quality improvement of wind energy system by using of STATCOM to the grid system. It shows how power electronic devices and Flexible AC Transmission Systems play a role to mitigate the power quality problems. But in the transmission system of wind energy system is affected voltage variation, flicker, harmonics and switching operation .Hence the power system losses stability and lagging power factor to connect the load. In this paper researched by using of static compensator (STATCOM) with using the battery stored system (BESS) at the common point coupling to power factor improvement and minimize total harmonic distortion of the grid system. To improve power quality by using STATCOM to connect the grid of wind energy system of a scheme of simulated of the power system of block set. The required power system maintain voltage stability and phase difference is zero, minimize distortion, harmonics to power system according to the guidelines specified in IEC-61400 standard (International Electro-technical Commission) provides some norms and measurement parameter.

Friend Recommendation System Using Location-based Social Networks : A Review
Authors:- M.Tech. Scholar Ravi Kumar Sahu, Assistant Professor Abhilasha Vyas

Abstract:- Nowadays use of social networking site is increasing exponentially. Almost 90 to 95 percent of the young generation (especially students) are using social networking services. Every social networking site is using different factors for recommending friends. These factors may include social graph, tastes, moral standards, habits, attitudes, profession, etc. Two decades ago, people typically made friends with others who live or work surrounding to themselves like neighbors or colleagues. With the rapid advances in social networks, services such as Facebook, Twitter, Google+ have provided us new ways of making friends. So there is a big challenge with the social networking services which is how to recommend a good friend to a user.

Published by:

IJSRET Volume 5 Issue 5, Sep-Oct-2019

Uncategorized

Suitability and Performance of Bubble Deck Slab: A
Review

Authors:- Victor Osaze Francis

Abstract:- Slabs are of extreme importance in any structural construction, as they are primary members. However, about 80% of the concrete in the middle of conventional solid slab are of little structural importance. Bubble deck slab (also known as voided slab) is a phenomenon that removes the structurally-inefficient concrete in the middle of slab by replacing it with high-density spherical plastic balls. This solution will solve the problems of high cost, shorter span, longer construction duration, and environmental pollution associated with the use of traditional slab. This review study investigates how bubble deck slab compares with traditional solid slab in everyday use, under loading condition, and consequently making informed recommendations to minimize the inadequacies of the bubble deck slab system.

A Secure Iot Communication against Reactive Jamming Attack in CRN Subtitle
Authors:- Nitesh Yadav, Dr. Abhishek Bhatt

Abstract:- The number of nodes or IoT devices is sense and control the communication. The primary users are more trustworthy than the secondary users, since these are authorized or licensed users. The purpose of CRN is to intellect the spectrum band and identify the free channels which will be used for un-authorized access user or attacker that flooded the unwanted packets to next node or destination node in network. CRN get better the efficiency of spectrum handling, but it also performance degrades due to new security threats with jamming attacks during the spectrum sensing process, which can corrupt the effectiveness of spectrum sensing. In this research we proposed security scheme against packet flooding Jamming attack. The performance is vitiated in high, medium and low jamming probability and applies the proposed scheme to reduces the flooding. The hop count value based on forward and reverse mechanism of detection and provides secure communication in IoT CRN . The reliability of link is equivalent from the forward and reverse path consistency i.e. more in proposed security scheme as compare to with Batch based SA-MAC scheme. The proper packet forwarding in particular link and the reverse and forward is counted properly but correctly, current node are in suspicious. The record value of hop count is based on the packets receiving but heavy flooding is also disturb it at starting connection establishment procedure.

A Review on Efficient Approach for Scheduling Tasks in Cloud Computing Environments
Authors:- Anjali Kumari, Manoj Lipton

Abstract:- Nowadays, Cloud computing is widely used in companies and enterprises. However, there are some challenges in using Cloud computing. The main challenge is resource management, where Cloud computing provides IT resources (e.g., CPU, Memory, Network, Storage, etc.) Based on virtualization concept and pay-as-you-go principle. The aim of this proposed algorithm is to minimize the completion time and cost of tasks, and maximize resource utilization. The performance of this proposed algorithm has been evaluated using Clouds toolkit. It schedules the entire task within a particular deadline while increasing the system performance. The cloud-sim simulator is used for evaluating the task scheduling like file uploading. In this module we have to initialize the performance of this proposed algorithm has been evaluated using Cloud Sim toolkit. It schedules the entire task within a particular deadline while increasing the system performance. Here we propose a VM Placement aims to distribute the dynamic workload smoothly to all the hosts in the cloud to gain an improvement in both the utilization of Resources and the speed of execution time. It allocates the incoming tasks to all available VMs. In order to achieve balancing and avoid congestion.

A Review on Parametric Study and Optimization of H-Type Finned Tube Heat Exchangers using Taguchi Method
Authors:- M.Tech. Scholar Ankit Raj, Asst. Prof. Brijendra Kumar Yadav

Abstract:- In order to improve the heat exchange efficiency and extend surface heat transfer, H-type finned tubes have been widely used in boilers and waste heat recovery in recent years. H-type finned tubes are derived largely from rectangle finned tubes. Because of their unique groove structure on the fin surface, H-type finned tubes have excellent anti-wear and anti-fouling performance.

Parametric Study and Optimization of H-Type Finned Tube Heat Exchangers using Taguchi Method
Authors:- M.Tech. Scholar Ankit Raj, Asst. Prof. Brijendra Kumar Yadav

Abstract:- Fin and- tube heat exchangers are the typical equipment with extended surface and widely used in many engineering applications, such as air conditioning units, compressor intercoolers, boiler economizers, etc. Heat exchangers are widely used in various industries, such as space heating, refrigeration, air conditioning, power stations, chemical plants, petrochemical plants, petroleum refineries and waste heat recovery process. A heat exchanger is a device used to transfer heat between one or more fluids, which may be separated by a wall to prevent mixing or may be in direct contact. In this study, a parametric study is performed to investigate the effects of geometric parameters on the heat transfer characteristic and the flow friction characteristic of H-type finned tube heat exchangers. The effectiveness of various parameters on the objectives is evaluated and the geometric structure of the H-type finned tube is optimized for the best performance using Taguchi method. The results show that fin height, transversal tube spacing and longitudinal tube spacing is statistically significant to the flow performance characteristics of the H-type finned tube. Hence, these three parameters must be firstly considered and paid more attention during the design and optimization of H-type finned tube heat exchangers. Analysis of variance also further validates that intuitive analysis is correct.

Review Thermal Performance Enhancement of Double Pipe Heat Exchanger With Wavy
Authors:- Research Scholar Kundan Kumar, Asst. Professor Sujeet Kumar Singh

Abstract:- In present study, wavy-tape inserts are introduced to help establish swirl flow inside a straight pipe. Three-dimensional models will be created to simulate the flow and heat transfer characteristics inside the pipe with wavy-tape inserts. CFD simulation will be carried out to investigate the effects of different tape angles on the thermal-hydraulic performance of pipe. The effect of wavy strip tabulators with different angles on the NU, friction factor and thermal performance enhancement factor of double tube heat exchanger was studied.

Thermal Performance Enhancement of Double Pipe Heat Exchanger with Wavy Tape
Authors:- Research Scholar Kundan Kumar, Asst. Professor Sujeet Kumar Singh

Abstract:- CFD simulation will be carried out to investigate the effects of different tape angles on the thermal-hydraulic performance of pipe. The effect of wavy strip tarbulators with different angles on the NU, friction factor and thermal performance enhancement factor of double tube heat exchanger was studied. The configuration, gain in heat transfer augmentation, cost in pressure loss, generated swirl flow character, heat transfer enhancement mechanism, optimal geometric parameters and overall thermal hydraulic performance of wavy-tape are successively expounded in this work. It was seen that the results obtained from the simulation for the plain tube are in a good agreement with those predicted by the standard correlations. It is noted that, in this case the discrepancy between the results is less than 9% for Nusse. lt number and 11% for the friction factor. The wavy-tape induces significant swirl flow inside the pipe. Particularly, pairs of tangential vortices are generated on the flanks of the tape. These vortices break the thermal boundary layer and intensify the fluid advection, which consequently lead to highly localized heat transfer enhancement on the pipe surface.

A Review on Optimization of Heat Transfer in Six-Start Spirally Corrugated Tubes using Taguchi Method
Authors:- M.Tech. Scholar Sanjoo Sahani, Professor Poonam Kumar Agade

Abstract:- Heat transfer devices have been used for conversion and recovery of heat in many industrial and domestic applications. Over five decades, there has been concerted effort to develop design of heat exchanger that can result in reduction in energy requirement as well as material and other cost saving. Heat transfer enhancement techniques generally reduce the thermal resistance either by increasing the effective heat transfer surface area or by generating turbulence. Sometimes these changes are accompanied by an increase in the required pumping power which results in higher cost. The effectiveness of a heat transfer enhancement technique is evaluated by the Thermal Performance Factor which is a ratio of the change in the heat transfer rate to change in friction factor.

Optimization of Heat Transfer in Six-Start Spirally Corrugated Tubes using Taguchi Method
Authors:- M.Tech. Scholar Sanjoo Sahani, Professor Poonam Kumar Agade

Abstract:- In this study, a parametric study is performed to investigate the effects of geometric parameters on the heat transfer characteristic, the flow friction characteristic and overall thermal-hydraulic performance of corrugated tube heat exchangers. The effectiveness of various parameters on the objectives is evaluated and the geometric structure of the corrugated tube is optimized for the best overall thermal-hydraulic performance using Taguchi method. The geometric parameters considered in the model include corrugation height and corrugation pitch. The results show that corrugation height have dominant influence on heat transfer characteristic with contribution ratios of 74.79% respectively while corrugation pitch has minor effects.

Development of Fluid Transfer System (FTS)
Authors:- Abutu Joseph, Oluleye, Atinuke Modupe, Oladosu, Lekan Temidayo, Emmanuel, Abakpa James, Lawal, Albert Sunday

Abstract:- In this study, a fluid transfer system was developed using standard design procedure outlined in literatures. The effect of viscosity on the flow rate of a fluid (water) from different sources was also investigated. The development of the system involved design calculations, fabrication of metal base as well as tank guides. Similarly, plumbing of the system was done using polyvinyl chloride (PVC) pipes, gates valves, other pipe fittings and a centrifugal pump. The Reynolds number and the fluid pressure drop was also determined to investigate the nature of fluid flow through the system and the pressure drop in the motion of the transferred fluid respectively. The results showed that the flow through the system is turbulent since the Reynolds number (Re) 4000 (Re = 9160) while fluid pressure drop results indicate that there was more drop in fluid pressure at the longer lengths of pipe compared to the shorter ones. Testing of the system was also conducted sing three sources of water (rain, tap and stream) and the experimental result revealed that rain water has a higher volume flow rate compared to other sources of water with stream water having the least rate of flow.

Human Engineering in Tractor Design- A Review
Authors:- Lecturer, Anil Kumar

Abstract:- In India agriculture is one of the important sectors which provide local employment and have significant contribution in our GDP. The large population in our country needs various types of food and other agriculture products. As the land available with the country for cultivation is limited therefore in order to increase agriculture output we should make best use our available cultivable land using farm equipment’s and implements. Tractor is one of the main reasons which helped to increase productivity of farming sector reducing dependency of our farmers on animals for tillage and irrigation activities. Tractor was one of the main components which helped in making India self-sufficient in producing food items for its large population and creating green revolution in our country. Unwanted accidents involving farm equipment and machinery especially involving tractors continue to happen. One of the reasons for these accidents is driver fatigue and non-implementation of human factors while designing tractors. There are many human factors which enhance the use of tractor in farming activities without any troubles to the driver/ Operator making it easy to use.. This paper will explain the details of those human factors which need to be taken care while designing a tractor.

K-Fold Cross-Validation Machine Learning Approach on Data Imbalance for Wireless Sensor Network
Authors:- Mandvi Tripathi, Ankur Taneja

Abstract:-Machine learning is used to teach machines how to handle the data more efficiently. Sometimes after viewing the data, we cannot interpret the pattern or extract information from the data. In that case, we apply machine learning with the abundance of datasets available. The purpose of machine learning is to learn from the data. Many studies have been done on how to make machines learn by themselves. Data imbalance problem become greatest issue in for machine learning algorithm. Imbalance problem occur where one of the two classes having more sample than other classes. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The minority samples are those that rarely occur but very important. There are different methods available for classification of imbalance data set which is divided into three main categories, the algorithmic approach, data-pre-processing approach and feature selection approach. We will apply on wireless imbalance data to identify correct information. In this research work systematic study for define which gives the right direction for research in class imbalance problem. After apply our K-fold cross validation Technique for imbalance to balance data and a random forest algorithm a classification approach for balanced data we achieved a good accuracy rate percentage.

Comparative Analysis of Multi Leaf Spring and Composite Leaf Spring using Finite Element Method Under Static Loading Condition
Authors:- M. Tech. Scholar Narendra Kumar Verma, Asst. Prof. Mukesh Hemnani, Rakesh Sharma

Abstract:- The work is carried out on the front end multi leaf spring of a commercial vehicle. In this analysis the conventional steel leaf spring is tested for static loading condition and results are compared with a virtual model of composite multi leaf spring. The material used for conventional steel leaf spring is 65Si7 (BIS) and for composite leaf spring E-Glass/ Epoxy. The CAD model of the multi leaf spring is prepared in Solid works 16 and analyzed using ANSYS 16. The FE analysis of the leaf spring has been performed by discretization of the model in infinite nodes and elements and refining them under defined boundary condition. Bending stress and deflection are the target results. A comparison of both i.e. experimental and FEA results have been done to conclude.

A Review on Thermal Performance Analysis of Simple Organic Rankine Cycle with and without Internal Heat Exchanger using EES Code
Authors:- M. Tech. Scholar Vinay Yadav, Asst. Professor Brijendra Kumar Yadav

Abstract:- Energy efficiency and conservation are gaining attention due to increasing trend of greenhouse gas emissions. Increasing energy demand urges the researchers to design energy efficient, environmental friendly and commercially viable systems. Integration of thermal systems (hybrid systems) improves the energy efficiency, fuel utilization factor and reduces the carbon emissions. Integration of renewable energy sources avail the advantage of decentralized applications. The study investigates the effects of internal heat exchanger on the thermo-economic performance of organic Rankine cycle (ORC) configurations based on fluid properties and heat sources.

Thermal Performance Analysis of Simple Organic Rankine Cycle with and without Internal Heat Exchanger using EES Code
Authors:- M. Tech. Scholar Vinay Yadav, Asst. Professor Brijendra Kumar Yadav

Abstract:- In this study, performance of a simple organic Rankine cycle (S-ORC) and organic Rankine cycle with internal heat exchanger (IHX-ORC) have been compared. Two ORC configurations are investigated as follows: S-ORC and IHX-ORC. With respect to different ORC configurations, the first law efficiency, second law efficiency and net work done will be compared under the conditions of different heat source temperatures and heat source flow rates. The effects of working fluid type, heat source temperature domains on the system, thermo-economic performance will be investigated. Furthermore, the effects of pinch point temperature difference in IHX on the IHX-ORC system are analyzed.

A Review on Spectrum Efficiency Improvement for Quasi-Constant Envelope OFDM

Authors:- M. Tech. Scholar Rishabh Shukla, Hod. Dr.Vineeta Saxena Nigam

Abstract:- Benefiting from low peak-to-average power ratio (PAPR), constant envelope OFDM (CE-OFDM) is a promising technique in coherent optical communication. However, the spectrum efficiency of CE-OFDM is only half of conventional coherent optical OFDM, which restricts its application. We proposed a novel quasi-constant envelope OFDM (Quasi-CE-OFDM) scheme with in-phase/quadrature (I/Q) modulator. Furthermore, a phase demodulation scheme based on Taylor series expansion is performed to reduce calculation complexity and avoid phase ambiguity. Simulation results show that the proposed scheme could double the spectrum efficiency effectively without losing the advantage of high nonlinearity tolerance.

Simulation Result of BER and OSNR Performance for Quasi-Constant Envelope OFDM

Authors:- M. Tech. Scholar Rishabh Shukla, Hod. Dr.Vineeta Saxena Nigam

Abstract:- Quasi-Constant Envelope OFDM transmits dual-stream simultaneously to improve the spectral efficiency of Constant Envelope OFDM. It can provide high data rate links and maintain a low PAPR to reduce the distortion caused by the nonlinear power amplifier. Thus, the quasi-constant envelope OFDM is suitable for satellite communication system. However, the carrier frequency offset (CFO) in satellite communication must be estimated and compensated before the demodulation. In this paper a CFO estimation scheme is proposed for quasi-constant envelope OFDM satellite system under additive white Gaussian noise (AWGN) channel. Since the null subcarrier at the transmitter can be considered as the prior information at the receiver, this null subcarrier can be used to estimate the CFO through phase demodulator and inverse discrete Fourier transform (IDFT) module at the receiver. Mathematical analysis reveals that the ideal estimation range of normalized CFO is nearly half of the size of IDFT under AWGN channel. Simulation results show that the proposed scheme performs well at moderate and high signal-to-noise ratio (SNR) conditions.

Grid-Connected Pv Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel , Professor Pragati Priya ,
Professor Manju Gupta

Abstract:-In the last decade solar power technologies became less costly and additional efficient, that have created it to an attractive resolution, being cleaner and additional environmentally friendly energy resource than traditional ones like fossil fuels, coal or nuclear. yet, a PV system continues to be rather more expensive than traditional ones, because of the high producing prices of PV panels, however the energy that drives them -the lightweight from the sun- is free, offered nearly everyplace and can still be present for many years, long in spite of everything non-renewable energy sources are depleted. One in every of the main benefits of PV technology is that it’s no moving components. Therefore, the hardware is very robust; it’s a long time period and low maintenance necessities. And, most significantly, it’s one resolution that gives environmentally friendly power generation. The efficiency of economic PV panels is around 15-20%. Therefore, it’s important that the power created by these panels isn’t wasted, by using inefficient power electronics systems. The efficiency and reliability of each single-phase and 3 part PV inverter systems is improved using transformer less topologies, however new issues related to escape current and safety need to be dealt with.

A Review on Grid-Connected Pv Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel , Professor Pragati Priya ,
Professor Manju Gupta

Abstract:- The need for cleaner surroundings and also the continuous increase in energy desires makes localized renewable energy production more and additional necessary. This continuously-increasing energy consumption overloads the distribution grids in addition because the power stations, so having a negative impact on power availability, security and quality [1]. One among the solutions for overcoming this can be the Distributed Generation (DG) system. dg systems using renewable energy sources like solar, wind or hydro, have the advantage that the ability is made in shut proximity to wherever it’s consumed. This manner the losses because of transmission lines aren’t present.

Fabrication of Al 7068 Reinforced with Tur Husk Ash (THA) and Alumina Hybrid Metal Matrix Composite by Powder Metallurgy and Evaluating Its Microstructure and Mechanical Properties
Authors:- Mohammed Amair Sohail, Associate Prof. B.S.Motgi, Prof. Dr. G.K. Purohit

Abstract:- The applications of metal matrix composites are increasing day by day due to high strength to weight ratio. The hybrid aluminum composites can be considered as an outstanding material where high strength and wear-resistant components are of major importance, predominantly in the aerospace and automotive engineering sectors. In the present work , Al7068 reinforced with tur husk ash(THA) and Al2O3 hybrid metal matrix composite is prepared from sintering of mechanically alloyed powder (ball milling) in powder metallurgy process. Different combinations of compositions (Al7068 reinforced with 0%,4%,8%,12% 0F THA and Al2O3) were taken with total 16 combinations. Hardness was found to be increasing with increasing percentage of Al2O3 but was decreasing with increasing percentage of THA. The microstructure of the composites was studied.

Dc Micro grid Monitoring and Protection
Authors:- Veerpratap Meena, Dr. Vinay Pant

Abstract:- With the proliferation of distributed energy resources (solar, fuel cell, etc.) and DC loads, the installation and deployment of DC microgrid is seeking more attention in the contemporary paradigm of power system evolution. DC microgrid adds advantage of overall system efficiency increase due to decrease in the conversion losses and ohmic losses. Also, energy storage components are directly connected to the DC bus with the help of bidirectional converters, thus increasing the reliability of the system. However, this stochastic integration of renewable and dynamic operations of controlling poses protection problems for the DC microgrids. The main challenge in DC micro grid protection and control operations is the lack of standards and guidelines. The fault clearing time is also affected due to the lack of inertia and resistive of nature of the network. There is no zero crossing in DC system which affects the operation of the circuit breaker for fault isolation. The presented state-of-art is focused on identification of types of fault protection device, challenges in the DC microgrid system, architecture of DC microgrid controller strategies and different protection techniques are also discussed. This paper review various types of parameter estimation techniques are discussed in detail to improve the protection scheme. Superimposed current based unit protection scheme, protection using the oscillation frequency and transient power, and parameter estimation approach are help to determine the fault location and type of fault.

Investigation of Microstructure and Mechanical Properties of Hybrid Composite Aluminum 7068 Reinforced with Tur Husk Ash (THA) and Silicon Carbide (Sic)
Authors:- Shaikh Mohammad Tayyab Raza, Associate Prof. B.S.Motgi, Prof. Dr. G.K. Purohit

Abstract:- This paper deals with the fabrication of Al-7068 composites manufactured by powder metallurgy route reinforced with different weight percentages of tur husk ash (THA) and SiC A low pressure of 400 MPa was applied for compacting the composites and sintered at a temperature of 720oC for three hour. TG and XRD analysis of tur husk ash (THA) was done to obtain its chemical composition. SEM and EDX analysis was done to study the micro-structural behavior. Hardness and compression test were carried out. The hardness has been improved by adding the weight percentage of SiC but seems to be crash by adding the weight percentage of tur husk ash (THA). The compressive strength was found to be varying.

E-Mail Spam Classification Using Long Short-Term Memory Method
Authors:- M.E. Scholar (CSE) Shripriya Dongre, HOD (CSE) Prof. Kamlesh Patidar

Abstract:- In recent years, the single-modal spam filtering systems have hade high detection rate for text spamming. To avoid detection based on the single-modal spam filtering systems, spammers in jet junk information into the multi-modality part of an email and combine them to reduce the recognition rate of the single-modal spam filtering systems, there by implementing the purpose of evading detection.In view of this situation,a new model called text based data set module architecture based on model fusion (MMA-MF) is proposed, which use a text based dataset fusion method to ensure it could effectively filter spam whether it is hidden in the text. The model fuses a Convolution Neural Network (CNN) model and a Long Short-Term Memory (LSTM) model to filter spam. Using the LSTM model and the CNN model to process the text parts of an email separately to obtain two classification probability values, then the two classification probability values are incorporated into a fusion mode lt identify whether the email is spam or not. For the hyper parameters of the MMA-MF model, we use a grid search optimization method to get the most suitable hyper parameters for it, and employ a k-fold cross-validation method to evaluate the performance of this model. Our experimental results show that this model is superior to the traditional spam filtering systems and can achieve accuracies in the range of92.64–98.48%.

Review Paper on Analysis & Conduction of Certificate Examination in Cloud Environment
Authors:- Prof. C.U Chauhan, Priyanka Gupta, Snehal Gondane, Omeshwari Bobade, Roshan Gabhane, Sachi Gedam

Abstract:- Traditional Exam cell activity mostly includes a lot of manual paper work. The aim of the project is to build a centralized system. So that all the examination activities can be done effectively and efficiently for both students and admin . The final system would constitute a computerized module aimed at replicating offline exam cell process. The system is a new concept which came into existence because of a large amount of data being on paper. The automated system for exam cell department will benefit both the students as well as exam cell department staff to easily handle the entire task related to exam cell in contrast to the existing manual system. This system will make the procedure of exam cell in an organized manner. The admin can also generate the Transcripts and Letter of Recommendation, and can also verify, confirm the photocopy and revaluation of each applied student by using the CLOUD COMPUTING Technology.

Grid Tied One Megawatt Solar Photovoltaic Power Plant at Bhopal: A Feasibility Study
Authors:- M.Tech Scholar Lalit Kumar Goel, Prof. (Dr) Mukesh Pandey, Associate Prof. Dr Anurag Gour

Abstract:- With about 300 clear and sunny days in a year, the calculated solar energy incidence on India’s land area is about 5000 trillion KWh per year. India is densely populated and has been blessed with high solar insulation; it is a best combination for harnessing solar power. The way India is tapping the solar energy, the country is already a leader in solar power generation. In the solar energy sector, large projects have been proposed, and a 34,000 km2 area of the Western Desert has been earmarked for solar power projects, sufficient to generate 500 GW to 2,000 GW. Ministry of New and Renewable Energy(MNRE) has released the Jawaharlal Nehru National Solar Mission (JNNSM) Phase 2 Draft Policy, our Government is planning to install 10GW of Solar Power, and of this planning, 4 GW is under the central govt scheme and the remaining 6GW under state govt schemes.

Heart Rate Measurement using The Change of Color of Skin over Time Due To Blood Flow
Authors:- Soumyadip Chattopadhyay

Abstract:- Heart Rate is an important medical parameter in case of maintaining one’s health. There are some apps available in the market that can calculate the heart rate of a person by using a Smartphone camera. No external pulsometers are required. But, these applications also consists of different issues in measuring proper pulse, like motion, noise in capturing the video, premature ventricular contraction and many more. Also some human errors like low or high pressure on the mobile camera, misplacement of finger over the camera leads to countable amount of error in measurement of Heart Rate. In our case of study, we have developed an application using existing algorithms that can cut down these errors up to an extent and gives the user almost error less Pulse of him or her by using the video of change of color of skin over time. We have captured video to get the PPG using smart phone and used tan 1st order Butterworth (IIR) band pass filter with frequency domain analysis and Hann windowing for leakage reduction.

Production of High-Strength Concrete by Utilizing Volcanic Pumice Waste in KSA, Jazan Region: Particle Size Effect
Authors:- Abdullah M. Zeyad, Saeed A. Al-Qahtani, Hussain A. Al-Shehri

Abstract:- Volcanic areas are scattered in several areas of Saudi Arabia. This spread contributes to the diversity of the sources of volcanic substances and their chemical structures. This study assesses the use of volcanic pumice powder (VPP) obtained from volcanic residues in the western region of Saudi Arabia to produce high-strength concrete (HSC). Chemical analysis reveals that these volcanic residues consist of 76.01% pozzolanic materials. The VPP was used to replace part of the cement content of HSC, and the effects of replacing 10% and 20% of the cement mass with VPP on HSC properties were studied. In particular, the effects of granules measuring 4.96 µm (4VPP) and 63.6 µm (60VPP) in size were observed. The compressive strength, flexural strength, indirect tensile strength, porosity, and water absorption rate of the samples were determined after 7, 28, and 90 days of curing. The compressive strength of HSC samples containing 10% (4HSC10) and 20% (4HSC20) 4VPP improved by 12.0% and 16.6% compared with those of 60HSC10 and 60HSC20, respectively, after 28 days of aging. Water absorption decreased when the main particle size was 4 mm compared with that when the main particle size was 60 mm. The water absorption rate decreased by 12% after 28 days of curing when 20% of the cement mass was replaced with 4VPP.

Estbt- Enhance Secure Trust Based Transmission for Mobile Ad-Hoc Network
Authors:- Shailendra shrivastava, Sushma Kushwaha

Abstract:- Mobile Ad-Hoc network is most popular in current scenario but when this network popular increased as well as so many attacked or unauthorized access increased. In this article will analysis about secure and trust based communication. In any case, constructing a trust model that receives recommendation by different hubs in the system is a testing issue because of the danger of dishonest recommendation like bad-mouthing, ballot-stuffing and collusion. The attacks caused by badly behaving nodes when increasing recommendations in the existing trust models. A recommendation based trust model demonstrate with a protection plan, which uses clustering technique to powerfully filter out attacks related to dishonest recommendations between certain time in view of number of cooperation, similarity of data and closeness between the hubs. The model is observationally tried under a few mobile and separated topologies in which hubs encounter changes in their neighborhood prompting regular course changes. The experimental investigation exhibits vigor and precision of the trust demonstrate in a dynamic MANET condition. This model can be extended by weighting recommendations based on time and location to mitigate the influence of location and time dependent attacks.

Classifying Vehicle Activity Patterns from Iot Device & Remote Monitoring System
Authors:- M.Tech. Scholar Prachi Pandey, Asst. Prof. Ankur Taneja

Abstract:- By using the Internet of Things Technology can greatly enhance the performance, monitoring and maintenance of the vehicle. In this paper analysis is based on the Implementation of new cost effective methodology based on IoT to monitor vehicle health remotely for performance evaluation. This will facilitate preventive maintenance, fault detection, historical analysis of the vehicle in addition to real time monitoring. In this paper analysis The vehicle consist of onboard GPRS module which collect the CAN data from the CAN device fitted on the vehicle and send it to the remotely located server. Second phase work focus on Monitoring the temperature of the vehicle system avoid sparking of the vehicle and also providing the fuel consumption & Battery information of display and third phase of implementation using of GSM Module when vehicle is provide the unusual activity & driver is facing any problem then it give message to the owner of vehicle. In this proposed IoT system that allows the owner to monitor the data provided by the sensors available on a vehicle, and to control processes automatically, anytime and anywhere using cloud system analysis. We are Using Support-Weight Approach for classification of IoT Data, after that we compared some parameter like Computation Cost, Computation Time, Accuracy etc.

Parking System for Smart City using Internet of Thing
Authors:- M.Tech. Student Monika Bijore, Asst. Prof. Monika Raghuwanshi

Abstract:- – Recently parking has become a serious issue and even worse, because of the increasing number of automobiles everywhere. In this paper we propose an IoT based guidance for user as well as Upcoming self-driving vehicles to search parking space for the vehicle. it also help user to choose the right vehicles to travel according to the parking spaces available to the destination point. it provides an intelligent guidance to the user, user can choose their travelling vehicle as two wheelers, four wheelers or public transport according to the traffic density. It aims to develop an intelligent parking guidance system. which reduces difficulty in conventional parking system. The system can monitor the state of every parking slot by deploying a sensor node on the slot. Accordingly, sensor senses the status of parking slot and sends status to central node server controller. The controller unit collects the data from all sensor node and upload to the server using http protocol where user can check the parking status from anywhere using internet and any browser. The system can also integrate with the artificial intelligence network like google assistance and self-driving car. Google assistance assist user to choose right vehicle according to the traffic density and parking space available at the destination point. User can simply see the space available by clicking in google map of their destination building or social parking.

A Study on Design of Single Sided Linear Induction Motor and Controlling with Voltage Source Inverter Fed Convertor
Authors:-M. Tech. Scholar S. Venkata Sai Kumar

Abstract:- Now-a-days, Linear Induction Motors are widely used, in many industrial applications like transportation, conveyor systems, actuators, material handling, pumping of liquid metal, and sliding door closers, etc. The advantages of linear motor is that it requires no mechanical rotary-to-linear converters, high efficiency and economical. The linear induction motor is very useful at places requiring linear motion since it produces thrust directly and has a simple structure, easy maintenance, high acceleration/deceleration and low cost. Linear Induction Motor is basically a rotating squirrel cage induction motor opened out flat. Instead of producing rotary torque from a cylindrical machine it produces linear force from a flat one. The stator of the linear induction motor acts as the primary and the rotor of the linear induction motor acts as the secondary of linear induction motor. As a result, the stator is built with steel laminations and rotor is built with conductor sheet and black iron. The single sided linear induction motor construction is easy and low cost. The working principle of single sided linear induction motor is same as the conventional induction motor. In the secondary eddy current is generated due to an induced EMF. The EMF is induced because of relative velocity between travelling magnetic flux and secondary. The thrust force or linear force is produced due to interaction between travelling flux and eddy current. In this paper, a single sided linear induction motor design parameters are analyzed and prototype has been designed and motor will be control with Voltage Source Inverter Fed Convertor.

Grid Tied One Megawatt Solar Photovoltaic Power Plant at Bhopal: A Study on Performance Analysis Including Efficiency Calculation
Authors:- Research Scholar Lalit Kumar Goel, Prof. (Dr) Mukesh Pandey, Assistant Prof. Dr Anurag Gour

Abstract:- The growing energy demand in developing nations has triggered the issue of energy security. This has made essential to utilize untapped potential of renewable resources. India is focusing on development of its own sources of energy. For PV panels, the efficiency of converting solar energy to electricity is around 7%.Average solar radiation incident over India varies from 4kWh/day – 7 kWh/day. Grid connected PV systems have become the best alternatives in renewable energy at large scale. Performance analysis of these grid connected plants could help in designing, operating and maintenance of new grid connected systems. A 1MW photovoltaic grid connected plant commissioned at Bhopal is one of the commercial solar power plants with the site receiving a good solar radiation of 5.61 kWh/m2/day and annual temperature of about 31.2 oC . The plant is designed to operate with a fixed tilt. In this study the solar PV plant aspects along with its annual performance is elaborated.

A Review on Implementation of Queuing Theory Along with Lean Technique in Manufacturing Industry
Authors:- M.Tech. Scholar Bharat, Professor Vipul Upadhayay, Yogesh P Ladhe

Abstract:- Within the combinatorial scheduling community, there has been an increasing interest in modeling and solving scheduling problems in dynamic environments. Such problems have also been considered in the field of queuing theory, but very few research take advantage of developments in both areas, and previous surveys on dynamic scheduling usually make no mention of queuing approaches. In this research, we provide an overview of queuing theoretic models and methods that are relevant to scheduling in dynamic settings.

Automobile Technology A Study of Past, Present and Future
Authors:- Md. Shakil Hossain

Abstract:- This paper highlights the journey of automobile technology since the very beginning of invention to the present, also discuss the future development of this technology. Automobile technology is always of interest to those people who like to know and get touched with new invention of engineering. This paper can help one to recognize the development in vehicle technology for the past, present, and future. Lot of changes happened in automobile technology since 19th century, when the first radio controlled vehicles were designed. In the subsequent decades, automotive electric cars appeared which were powered by battery and embedded circuits in the roads. By the middle of last century, automotive cars were having approximately same electronic systems shown one by one. Various semi-autonomous type set up in modern cars such as lane keeping, automatic braking and adaptive cruise manage are based on such systems. It is forecasted that most companies will start fully autonomous vehicles by the coming of next decade. The future of autonomous vehicles is an ambitious era of safe and comfortable transportation.

Smart Sugarcane Crop Growth Monitoring System using IOT and Image Processing
Authors:- Someshwar Terkar, Saurabh Shinde, Sushma Potdar, Neha Chavan, Ms. K.S. Jadhav

Abstract:- Agriculture is the most important sector of an Indian economy. Sugarcane is the main source of sugar in India and holds a prominent position as a cash crop. People uses conventional way for the farming. Conventional way requires more human power. Around 55% people in India has been engaged in agriculture but only 15% goods we get from the agriculture. Though there is a large area under cultivation, we don’t get maximum yield. The fact that most of our farmers have the lack of proper knowledge makes it even more erratic. A large portion of farming and agricultural activities are based on the predictions, which at times fail. Due to this, farmers have to bear huge losses. Since we know the benefits of proper irrigation and soil nutrients in the growth of sugarcane crop, such parameters can’t be ignored. Diseases occurred to the sugarcane plant can affect the yield of sugarcane. Sothe “Smart sugarcane crop growth monitoring system based on IOT and image processing” is one of the best way to increase crop yields.

Data and Components Availability
Authors:- Atharva Manoj Kulkarni

Abstract:- Agriculture is the most important sector of an Indian economy. Sugarcane is the main source of sugar in India and holds a prominent position as a cash crop. People uses conventional way for the farming. Conventional way requires more human power. Around 55% people in India has been engaged in agriculture but only 15% goods we get from the agriculture. Though there is a large area under cultivation, we don’t get maximum yield. The fact that most of our farmers have the lack of proper knowledge makes it even more erratic. A large portion of farming and agricultural activities are based on the predictions, which at times fail. Due to this, farmers have to bear huge losses. Since we know the benefits of proper irrigation and soil nutrients in the growth of sugarcane crop, such parameters can’t be ignored. Diseases occurred to the sugarcane plant can affect the yield of sugarcane. Sothe “Smart sugarcane crop growth monitoring system based on IOT and image processing” is one of the best way to increase crop yields.

A Survey on Different Techniques of Static and Dynamic Load Balancing
Authors:- Ph.D Scholar Vinod Patidar, Dr. Shiv Shakti Shrivastava

Abstract:- As cloud computing have number of issues related to security, bandwidth efficiency, large information handling, load balancing, etc. Load balancing implies distribution of the workload to node or servers or assets with the goal that one can accomplish maximum utilization of resources, reduce execution time, increase system throughput and so on. This paper gives a concise study of cloud based service balancing methods proposed by different researchers. Here various features of service are detailed for the load balancing and planning. Different sorts of requirement of load balancing was additionally talked with their significance and limitations. So according to the module as well as steps used in techniques classification of load balancing algorithms are done with a comprehensive and comparative understanding of existing literature.

A Survey on Techniques and Features of Document Classification
Authors:- Ph.D Scholar Vinod Sharma, Dr. Shiv Shakti Shrivastava

Abstract:- Traditional information retrieval methods become inadequate for increasing vast amount of data. Without knowing what could be in the documents; it is difficult to formulate effective queries for analyzing and extracting useful information from the data. This survey focused on some of the present strategies used for filtering documents. Starting with different types of text features this paper has discussed about recent developments in the field of classification of text documents. This paper gives a concise study of methods proposed by different researchers. Here various pre-processing steps were also discussed with a comprehensive and comparative understanding of existing literature.

A Survey on Intrusion Detection System Techniques and Features for Identification
Authors:- Ph.D Scholar Raj kumar Pandey, Dr. Shiv Shakti Shrivastava

Abstract:- The intrusion detection systems (IDSs) are essential elements when it comes to the protection of an ICT infrastructure. Intrusion detection systems (IDSs) are widespread systems able to passively or actively control intrusive activities in a defined host and network perimeter. Recently, different IDSs have been proposed by integrating various detection techniques, generic or adapted to a specific domain and to the nature of attacks operating on. In this paper survey was done on the various techniques of intrusion detection system where some of supervised and unsupervised intrusion detection techniques are discussed. Here methodology of various researchers is explained with their steps of working. Different types of attacks done by the intruders were also discussed.

Design and Development of Text-Image Watermarking Based on Integer Wavelet Transform (IWT) and Discrete Cosine Transform (DCT)
Authors:- PhD Scholar Arpana Bhandari, Associate Professor Dr. Shailja Shukla, Professor Dr. Rajiv Shrivastava, Asst. Professor Dr. Vijay Bhandari

Abstract:-This paper investigates Text-images still has a great importance, despite the spread of electronic texts. Text-images are protected using digital watermarking. This paper proposes a watermarking method applied to text images. This method integrates two transforms: integer wavelet transforms (IWT) and discrete cosine transforms (DCT). For the watermark embedding, IWT is performed on the cover image and DCT is applied to the low frequency sub-band LL. The watermark image is inserted in the lower to medium DCT coefficients to achieve a high degree of robustness and imperceptibility. Experiments using different English text-images are performed to evaluate the proposed method in terms of imperceptibility and robustness. Results show that the proposed method has higher imperceptibility compared to other existing methods applied to English text-images. Also, the proposed method provides good robustness results, especially against compression and noise..

Smart Home Automation Technique using Unsupervised Machine Learning Algorithm
Authors:- Nikhil, Amit Sahni, Rishav Kumar Thakur

Abstract:-Smart home mechanization technique is getting highly considered these days because its wide selection of uses like security system, controlling home appliances, entertainment system, lighting etc. Large quantity information is accumulated from the past good home expertise by the user however these information isn’t absolutely used, but currently because of development of huge information and machine learning technologies these prediction is also accustomed manufacture a very intelligent system. Regarding this paper proposes user behavior prediction formula (UUBP) that uses a artificial neural network(ANN) and tells a couple of new and advanced conception of forgetting issue to contend with the shortcomings of previous algorithm. This formula shows high-learning ability and wants minimum human intervention. This formula may contend with the user influence and outdated records. UUBP formula shows more robust performance then different algorithms.

Comparative Analysis of Traffic Classification Algorithms in Deep Learning
Authors:- Goddeti Mallikarjun, A. Srinish Reddy, J. Manikandan

Abstract:- Traffic classification is an important algorithm to a wide range of applications from QoS provisioning and billing in ISPs to security-related applications in firewalls and intrusion detection systems. Port-based, information packet scrutiny, and classical machine learning ways in which area unit used extensively inside the past, but their accuracy has declined due to the dramatic changes in Internet traffic, particularly the increase in encrypted traffic. With the proliferation of deep learning ways, researchers have recently investigated these ways for traffic classification and according high accuracy. In this article, we tend to introduce a general framework for deep-learning-based traffic classification. We gift usually used deep learning ways and their application in traffic classification tasks. Then we have a tendency to discuss open issues, challenges, and opportunities for traffic classification.

Advanced Smart Road Deformation Detection System
Authors:- Reetu Jain, Aarav Amit Akali, Jai Jariwala, Tanay Nistala

Abstract:- Aging roads and poor road-maintenance systems resulted many potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly to find the location a data base as to be developed, which requires a specific pothole-detection system that can collect pothole information at low cost and over a wide area. However, pothole repair has long relied on manual detection efforts causing loss of time and money to government. Thus, in this paper, we introduced a pothole-detection system using a commercial “Road sepoy”. The proposed system detects potholes using vision-based tracking system and MATLAB algorithm specifically designed to work with road sepoy camera giving us accurately in real-time environment. Geo-mapping the pothole in google maps helps the exact location.

Automated Vehicle Identification and Toll Tax Collection
Authors:- Anwar A. Shaikh, Akshay B. Raskar, Sagar R.Sonne, Omkar S.Lalge, Prof. K.S. Jadhav

Abstract:- The ANPR (Automatic Number plate Recognition) system is based on image processing technology. It is one of the necessary systems designed to detect the vehicle number plate. In today’s world with the increasing number of vehicle day by day it’s not possible to manually keep a record of the entire vehicle. With the development of this system it becomes easy to keep a record and use it whenever required. The main objective here is to design an efficient automatic vehicle identification system by using vehicle number plate. The system first would capture the vehicles image as soon as the vehicle reaches the security checking area. The captured images are then extracted by using the segmentation process. Optical character recognition is used to identify the characters. The obtained data is then compared with the data stored in their database. The system is implemented and simulated on MATLAB and performance is tested on real images. This type of system is widely used in Traffic Control Areas, Tolling, Parking Area etc. This system is mainly designed for the purpose of security system.

A Survey on Cigs Solar Cell Technology
Authors:- Asst. Prof. J. Dinesh Kumar, Associate Prof. S. Prince Immanuel Alexander, Asst. Prof. G. Lavanya

Abstract:- Thin film solar cells are favorable because of their minimum material usage and rising efficiencies. The three major thin film solar cell technologies include amorphous silicon (α-Si), copper indium gallium selenide (CIGS), and cadmium telluride (CdTe). In this paper, the evolution of each technology is discussed in both laboratory and commercial settings, and market share and reliability are equally explored. The module efficiencies of CIGS and CdTe technologies almost rival that of crystalline solar cells, which currently possess greater than 55% of the market share. α-Si is plagued with low efficiency and light-induced degradation, so it is almost extinct in terrestrial applications. CIGS and CdTe hold the greatest promise for the future of thin film. Longevity, reliability, consumer confidence and greater investments must be established before thin film solar cells are explored on building integrated photovoltaic system.

A Review Article of Transportation Vehicles Routing Scheduling using Genetic Algorithm
Authors:- Kshitij Singh Chouhan, Professor Vinay Deulkar

Abstract:- The paper proposes a technique for the development of ‘‘optimal’’ transit route networks (for example, a bus route network) given the information on link travel times and transit demand. The proposed method, unlike previous techniques, primarily uses optimization tools for the development of the transit route network—the reliance on heuristics is minimal. In the proposed method, genetic algorithms, an evolutionary optimization technique, is used to develop the ‘‘optimal’’ set of routes. Results show that the proposed procedure performs better than the existing techniques.

A Survey on Optimization Techniques of Spectrum Sensing and Allocation in Cognitive Network
Authors:- Vivek Banerjee, Dr. Rajneesh Kumar Karn

Abstract:- Cognitive radio network increase spectrum as non-licensed users get chance to transfer their data. Hence IOT devices get dynamic access to the spectrum by sensing channel data. Spectrum sensing is a key enabler for cognitive radios technology in network implementation. Spectrum sensing identifies idle spectrum and provides attentiveness about the sensing radio environment. In this paper, a survey of the CRs technology is presented. Different papers of the spectrum sensing techniques are reviewed. Here paper has summarize techniques adopt by researchers to increase the detection rate, in different environment of ideal and real situation. Spectrum allocation algorithm also discuss as utilization depends on allocation as well. Comparison of sensing technique with their issues is tabularized. Paper has explained various evaluation parameters for comparison of spectrum sensing techniques..

Published by:

Journal on Civil Engineering Topics

Uncategorized

IJSRET is an online platform which gives a way to scholars, researchers to share their research paper/review paper/survey paper in the field of civil engineering. There is no doubt that the demand and the need of engineers who are expertise in this field is increasing day by day. As the demand is increasing so the improvement is also required along with it. So, for an improvement we have created this platform in which a researcher and a scholar can find an number of civil engineering topics to publish their research paper or they can suggest if they have something new related. They can submit their paper by selecting submit option, they can also check the publication charge by clicking on check publication charges, after that their paper will be published within 3-4 days after the complete analysis of their research paper by our team.

Submit Your Paper 

Check Publication Charges

One can publish their journal by selecting the links given below –

Spark your career with IJSRET PUBLICATION

From then above ideas of topics of a journal, if a researcher haven’t find any according to their findings and research so, they can directly contact us or they can also leave a feedback for us. Our team will consider your topics if it is suitable. Through this platform a researcher can spark their career by publishing their research paper.</p?

Published by: