Category Archives: Uncategorized

Implementation Strategy For Salesforce Einstein Copilot In Enterprise CRMs

Uncategorized

Authors: Ayesha Farzana

Abstract: Salesforce Einstein Copilot represents a transformative leap in intelligent customer relationship management (CRM), leveraging the power of generative artificial intelligence (AI) to enhance user productivity, automate workflows, and deliver contextually aware recommendations. As enterprises strive to remain competitive in an increasingly data-driven and customer-centric business landscape, the integration of Einstein Copilot into existing CRM infrastructures provides a strategic edge. This article explores a comprehensive implementation strategy for deploying Salesforce Einstein Copilot across enterprise-level CRM systems. It begins by outlining the business rationale and technological foundations that underpin Einstein Copilot, including its reliance on AI, machine learning (ML), and natural language processing (NLP). It then delves into detailed planning methodologies, governance frameworks, and organizational change management approaches necessary for successful integration. Key focus areas include architecture alignment, data security and privacy, customization techniques, performance optimization, and cross-platform scalability. Emphasis is placed on aligning business goals with AI capabilities, ensuring data quality, managing user adoption, and integrating with external systems through APIs and MuleSoft. The article also covers the technical prerequisites for Einstein Copilot setup, sandbox testing strategies, KPI tracking, and iterative feedback loops. Real-world case studies illustrate practical lessons and benefits achieved, while challenges such as AI model bias, integration complexities, and user resistance are addressed with actionable solutions. The article concludes with a forward-looking perspective on the role of generative AI in CRM evolution and outlines best practices for ensuring long-term success with Einstein Copilot. The goal is to provide CXOs, CRM managers, architects, and developers with a clear, strategic, and technically grounded roadmap for deploying Einstein Copilot to drive innovation, operational efficiency, and enhanced customer engagement in the enterprise CRM landscape.

 

 

Published by:

Engineering Resilience In Multi-Cloud Java Microservices: Architectural Patterns Across AWS And Google Cloud

Uncategorized

Authors: Sriram Ghanta

Abstract: As enterprises increasingly adopt multi-cloud strategies to mitigate vendor lock-in, meet regulatory requirements, and improve service availability, ensuring resilience across heterogeneous cloud platforms has emerged as a fundamental architectural challenge. Java microservices ubiquitous in large-scale enterprise systems must be engineered to tolerate partial service failures, regional outages, transient network partitions, and uneven performance characteristics inherent to distributed cloud environments, all while preserving end-user experience and meeting strict service-level objectives. This article presents a systematic study of multi-cloud resilience patterns for Java microservices deployed across Amazon Web Services (AWS) and Google Cloud Platform (GCP), synthesizing established distributed-systems principles with cloud-native fault-tolerance techniques and industry best practices published prior to 2022. We examine core architectural patterns including asynchronous messaging for decoupling and buffering, circuit breakers and bulkheads for failure containment, and saga-based coordination for maintaining data consistency without global transactions, highlighting their practical applicability in real-world enterprise deployments. Leveraging publicly available architectural diagrams and insights from prior empirical studies, the paper demonstrates how these patterns can be implemented in a cloud-agnostic manner while mapping effectively to provider-specific services, enabling fault isolation, graceful degradation, operational stability, and predictable recovery behavior in complex multi-cloud Java microservice ecosystems.

DOI: http://doi.org/10.5281/zenodo.18081618

Published by:

Performance And Environmental Assessment Of A Waste-to-Energy Thermal Power Plant Under Variable Load Conditions”

Uncategorized

Authors: Mr. Parth Kohli, Prof. Neha Singh

Abstract: Waste-to-Energy (WtE) thermal power plants offer a sustainable solution for simultaneous municipal solid waste (MSW) management and electricity generation. This study presents a detailed performance and environmental assessment of a WtE thermal power plant operating under varying load conditions. Key performance indicators, including thermal efficiency, heat rate, and specific carbon dioxide (CO₂) emissions, were analyzed to evaluate the influence of operating load on plant performance. The results demonstrate a clear improvement at higher loads, with increased thermal efficiency, reduced heat rate, and lower specific CO₂ emissions per unit of electricity generated. These enhancements are attributed to improved combustion stability, effective utilization of the calorific value of MSW, and lower relative auxiliary power consumption. The analysis confirms that operation near rated capacity maximizes energy recovery and minimizes environmental impact, highlighting the importance of consistent waste supply and optimized load management. Beyond technical performance, the study underscores the role of WtE plants in sustainable urban infrastructure by reducing landfill dependence, recovering energy, and mitigating greenhouse gas emissions. The findings provide practical insights for policymakers, urban planners, and plant operators, supporting the integration of WtE systems into modern energy strategies and environmentally responsible waste management frameworks.

DOI: https://doi.org/10.5281/zenodo.19449403

Published by:

A Comparative Analysis Of Einstein AI Vs. Microsoft CoPilot In CRM Contexts

Uncategorized

Authors: Sarosh Ameen

Abstract: The rapid advancement of artificial intelligence (AI) has revolutionized customer relationship management (CRM), empowering businesses with tools to automate workflows, personalize customer interactions, and drive data-driven decision-making. Two of the most prominent AI solutions in the CRM landscape are Salesforce Einstein AI and Microsoft CoPilot. This article presents a thorough comparative analysis of these platforms, focusing on their architectures, core functionalities, integration capabilities, security and privacy frameworks, customization options, use cases, and overall business impact.Salesforce Einstein AI is an advanced suite of AI-powered tools natively integrated into the Salesforce CRM ecosystem. It leverages machine learning, predictive analytics, and natural language processing to deliver intelligent insights, automate routine tasks, and enhance customer engagement. Einstein AI is renowned for its robust data security, extensible platform, and seamless integration across Salesforce’s Sales, Service, Marketing, and Commerce Clouds. The platform’s Einstein Trust Layer ensures data privacy and responsible AI usage, making it a trusted choice for enterprises seeking to harness AI without compromising sensitive information.Microsoft CoPilot, on the other hand, is an AI assistant embedded across Microsoft’s productivity and business applications, including Dynamics 365. CoPilot leverages large language models (LLMs) to provide real-time assistance, automate data entry, generate insights, and streamline workflows. Its integration with Microsoft 365 and Dynamics 365 enables users to access AI-powered features within their existing work environments, fostering productivity and collaboration. Microsoft CoPilot prioritizes data privacy and security through its multi-layered approach, aligning with Microsoft’s comprehensive compliance and regulatory framework.This article explores the unique strengths and limitations of both platforms, their real-world applications, and their potential to transform CRM operations. By examining their architectures, security models, customization capabilities, and business outcomes, this analysis aims to provide a comprehensive understanding of how Einstein AI and Microsoft CoPilot are shaping the future of CRM.

DOI:

 

Published by:

IJSRET Volume 8 Issue 3, May-June-2022

Uncategorized

Vertical Handoff Mechanism: Recent Challenges & Applications
Authors:-Research Scholar Ravneet Kaur, HOD. Ravi Malik

Abstract- The evolution of the next-generation wireless network has led to the increasing demand for handheld devices to enjoy mobility through “Always Best Connected” services. In the next-generation wireless network, seamless best-possible access to a network, which has a widely varying set of network characteristics, requires rigorous mobility management. The vertical handover facilitates users to roam across different networks with the seamless network connection. The vertical handover process that supports mobility can be initiated as mobile controlled handoff or as a network controlled handoff process. Associating the user with a suitable wireless network using a vertical handover process through wide network integration is a challenging and difficult problem that has drawn the attention of many researchers.

Design & Development of Electricity Generation by using Wave Energy
Authors:-Shriram Malwe, Shivam Shahu, Anaya Bansod, Amit Bele, Aniket Singh, Vaishnav Shende, Tushar Dhakhare, Bhavesh Sewatkar

Abstract- Waves are a huge, largely untapped energy recourse, and the potential for extracting energy from waves is considerable. Research in this area is driven by the need to meet renewable energy targets, but is relatively immature compared to other renewable energy technologies. This review introduces the general status of wave energy and evaluates the device type that represents current wave energy convertor (WEC) technologies. Here, our research paper focusing to eliminates the existing limitations of wave energy converter methods, and also helps the potential of this method for generating electricity and this could be common way to producing electricity in future.

IOT Based Seed Planting and Watering Rover
Authors:-G Nagarjuna Reddy, G Maheedhar Reddy, G Balaji, CH Muni Harish, CH Kethan

Abstract- Exploring Mars and other planets aids scientists in their understanding of severe climate swings that have potential to drastically affect the planets. Humans devised a strategy for colonizing Mars. As a result, before humans set foot on Mars, it’s a good idea to grow some plants on Mars and monitor them. This Automated Rover takes on the role of a human by planting and watering the plants on its own. This paper is focused on automated seed planting and monitoring using Internet of Things (IoT). Rover is a movable device that is powered by ESP8266 Node MCU controlled DC motors. Rover is equipped with a DHT11 sensor and a Wi-Fi module that continuously monitors and uploads data to Thingspeak. This rover is equipped with a plough that can be adjusted, a seed dropper, and automated water pouring equipment. An Arduino Nano can be used to control all of the actions. It estimates the distance between each seed after dropping the seed, so that it can water the seeds automatically after 12 or 24 hours. Depending on availability, the rover uses both DC battery and solar energy to power the entire setup. All the rover’s actions are fully automated, and no human intervention is required.

Air-Borne Disease Prevention System
Authors:- Ms. Sai Saru Nossam, Ms. Sandhya Nethibottu, Mr. Shaik Imran, Ms. Aparna Somala, Asst. Prof. Mr. Iliyaz Pasha M

Abstract- Mining continues to be a dangerous activity, whether large-scale industrial mining or small-scale artisanal mining. Not only exposure to dust and toxins, there are accidents along with stress from the working environment or managerial pressures, give rise to a range of diseases that affect miners. I look at mining and health from various personal perspectives and the risk of transmission is high. One of the best ways is to stay safe from getting infected is by wearing a face mask. In this project, we propose a method to detect human face masks by continuously monitoring the mining environment using TensorFlow and OpenCV. A bounding box drawn on a person’s face stored in a database, you can take precautions by determining the name of a person who is not wearing a mask and sending an email warning that person is not wearing a mask.Also this proposed system can also be used in Sand blasting and public areas where there is strict demand of face mask in situations like covid-19.

Authentication System for Global Roaming on Unlimited Resources in Mobility Networks
Authors:- Asst. Prof. Mohanapriya D, Sujith Kumar M, Kapilesh B, Rhakul P G

Abstract- With the improvement of the Internet, cyber-assaults are converting hastily and the cyber protection state of affairs isn’t always optimistic. Machine Learning (ML) and Deep Learning (DL) techniques for community evaluation of intrusion detection and presents a quick educational description of every ML/DL approach. Papers representing every approach had been indexed, read, and summarized primarily based totally on their temporal or thermal correlations. Because information is so essential in ML/DL techniques, they describe a number of the typically used community datasets utilized in ML/DL, talk about the demanding situations of the use of ML/DL for cyber protection and offer guidelines for studies directions. The KDD information set is a widely recognized benchmark in the studies of Intrusion Detection techniques. A lot of labor goes on for the development of intrusion detection techniques even as the studies at the information used for schooling and checking out the detection version is similarly of top problem due to the fact higher information nice can enhance offline intrusion detection. This assignment provides the evaluation of the KDD information set with recognition of 4 lessons that are Basic, Content, Traffic and Host wherein all information attributes may be categorized by the use of MODIFIED RANDOM FOREST(MRF). The evaluation is finished with recognizing of 2 outstanding assessment metrics, Detection Rate (DR) and False Alarm Rate (FAR) for an Intrusion Detection System (IDS). As a result of this empirical evaluation of the information set, the contribution of every of 4 lessons of attributes on DR and FAR is proven that may assist beautify the suitability of the information set to obtain most DR with minimal FAR.

Prediction on Patient Treatment Time Scheduling Based on Machine Learning Approach
Authors:- Asst. Prof. Javed Ahamed B M S, Saravanan M, Srikanth A, Thamizhselvam S, Vijayaravind S

Abstract- Clinical decision-production in medical care is now being impacted by expectations or proposals made by information driven machines. Various AI applications have showed up in the most recent clinical writing, particularly for result forecast models, with results going from mortality and heart failure to intense. In this undertaking, we sum up the best in class in related works covering information handling, derivation, and model assessment, with regards to result expectation models created utilizing information removed from electronic wellbeing records. We likewise examine impediments of conspicuous demonstrating suspicions and feature valuable open doors for future examination.

Post-Operative Rotator Cuff Repair using IoT
Authors:- Asst. Prof. Padmanaban K, Grisey E, Janitha J, Leena B, Manju A

Abstract- This paper shows the design of a low-cost upper limb rehabilitation robot that can be applied to various symptoms of shoulder disorders. The 3-dimensional shoulder tracking mechanism was implemented to allow the translational movement of the shoulder joint. With improvements in surgical techniques and increased knowledge of rotator cuff healing, there was a need to identify a safe progression after rotator cuff repair. During rehabilitation after rotator cuff repair, there should be constant communication with the surgical team.Awareness of complication management, healing potential of the repaired tendon, and anatomies of the shoulder complex are critical. During the early stages, reducing pain and inflammation should be prioritized followed by progressive restoration of range of motion. When advancing range of motion, progression from passive, active assisted, and active movements allow for gradual introduction of stress to the healing construct. Even though time frames are not used for progression, it is important not to place excessive stress on the shoulder for up to 12 weeks to allow for proper tendon-to-bone healing. As exercises are progressed, scapular muscle activation is initiated, followed by isometric and lastly isotonic rotator cuff exercises. This system uses micro controller and EMG, TILT, ACCELEROMETER sensors in order to find the muscle activity along with the position & angle of the hand while they performing movement during rehabilitation recovery time. The system can able to give the muscle rehabilitation details time to time using the micro controller. Thus, we can predict how soon the patient can recover from the rotator cuff problem and also the current muscle activity details are shown using cayenne app using IOT (ESP 8266-12E) NODE MCU and cayenne server.

Super Cool Workspace using Deep Learning
Authors:- Asst. Prof. Sudhakar R, Ebinezar M, Varun Kumar M, Saran R, Siva C

Abstract- To capture the emotions of employees during various times automatically without having to manually key in the ratings. To analyze the movements of happiness index with various factors .To map the captured emotions into a graph or chart during the real time. Face discovery assumes an essential job in feeling acknowledgment. These days face acknowledgment is increasingly effective and utilized for some constant applications because of security purposes. Face recognition in real time using photo manipulation and artificial intelligence (AI) techniques a challenging task for a PC vision to interpret the world in the same way as people do using AI. Organizations have been exploring various avenues for combining refined calculations with picture preparation methods that have risen in the last ten years to see progressively about what a picture or video of a person’s face teaches us about how he or she is feeling, as well as indicating the probabilities of blended feelings a face could have. We distinguish feeling by examining (static) pictures or with the (dynamic) recording. Highlights extricating should be possible like eyes, nose, and mouth for face identification. The convolutional neural system (CNN) calculation follows ventures as max-pooling (greatest component extraction) and leveling.

Plant Leaf Disease Detection & Fertilizer Suggestion using CNN
Authors:- Akash V. Bhambere, Aniket K. Sawale, Suvarna I. Patil, Manali B. Kapadnis,Mrs. Poonam Y. Pawar

Abstract- Every country’s primary need is Agricultural products. If plants are infected by diseases, this impacts the country’s agricultural production and its economic resources. In agriculture for an efficient crop yield early detection of diseases is important. Automatic methods for classification of plant diseases also help taking action after detecting the symptoms of leaf diseases. In the agricultural sector, identification of plant diseases is extremely crucial as they hamper robustness and health of the plant which play a vital role in agricultural productivity. These problems are common in plants, if proper prevention methods are not taken it might seriously affect the cultivation. The current method of detecting disease is done by an expert’s opinion and physical analysis, which is time-consuming and costly in the real world. We are introducing the artificial intelligence based automatic plant leaf disease detection and classification for quick and easy detection of disease and then classifying it. This main aim of ours system is towards increasing the productivity of crops in agriculture. In this approach we have follow several steps i.e. image collection, image preprocessing, segmentation and classification.

A Review of Intrusion Detection Systems
Authors:- Udit Narayan Pushpad, Prof. Lokendra Singh Songare

Abstract- A network security system that detects, identifies, and tracks an intruder or invader in a network is known as an intrusion detection system (IDS). As our society’s use of the internet grows by the day, intrusion detection systems (IDS) are becoming an integral component of the network security system. As a result, adequate IDS research and implementation are essential. Many ways for creating intrusion detection systems have been discovered nowadays, thanks to enhanced technology at our disposal. However, with so many alternatives available, it might be tough to choose the best one. As a result of the need for a better security system, this article gives a study of many published solutions that have been created and/or studied on the issue of intrusion detection methods from 2000 to 2019, including the accuracy of the output. An all-inclusive perspective of the various papers will be available with the aid of this survey.

Law Enforcement Managemenent System
Authors:- Adem Omer Adem, Asst. Prof. Sulthana A.S.R, MCA., M.Phil., Ph.D.

Abstract- To deliver next generation police and law enforcement reporting tools, and setting up intelligence platforms that agencies use to take incoming incident reports, lessen employee resources and allow these enforcement agencies to reallocate resources to much needed community areas.

Domestic Water Supply Monitoring andTheft Identification System
Authors:- Asst. Prof. Ragavi P, Keerthana G, Arthi T, Dharaneesh Kumar D, Gogula Varsini S.

Abstract- In urban areas the water supply to residence and commercial establishments are provided at a fixed flow rate. There are incidents of excess water drawn by certain consumers/users by connecting the motor pump or Suction pump to suck the water directly from the home street pipeline which is consider as water theft. In this project it is proposed to develop an IoT based water supply monitoring and theft identification system by recording the flow rates at the consumer/user end. In order to implement the proposed water supply system, each consumer can be provided with an Arduino based microcontroller kit to record the flow rate using a flow sensor. It is also provided with an electrically operated solenoid valve to supply water to the consumers. When there is theft occurred in water supply pipeline, the excess flow rate and corresponding charge will be sent to consumer Id. The valve is tuned off using IoT to stop the water supply, when the consumer fails to pay or uses excessive water. LCD is connected with a NodeMCU to display data locally. The proposed automated framework is completely programmed thus no human power is required.

comparison and Extension of Approximate 4:2 Compressors for Low-Power Approximate Multipliers
Authors:- Asst. Abinaya.D

Abstract- The existing research, which suggests numerous circuits built with approximate 4:2 compressors, is quite interested in approximate multipliers. Because of the enormous variety of offered solutions, the designer who desires to employ approximate 4:2 compressors faces the difficulty of picking the appropriate topology. In this study, we give a complete analysis and comparison of previously suggested approximate 4:2 compressors in the literature. We also introduce a fresh approximate compressor, bringing the total number of approximate 4:2 compressors studied to twelve. The circuits studied are used to create 8*8 multipliers.

An Automatic Security System in ATM and Vulnerability Reduction Based on IoT
Authors:- Asst. Prof. Elamathi K, Su.Harinyvidhya, Keerthana R, Arthi S, Vaishnavi R

Abstract- Our adventure proposes a made sure about ATM (Automated Teller Machine) frame exercising a card filtering frame alongside LINK frame for advanced security. Common ATM fabrics do not contain the LINK highlight for cash pullout. On the off chance that an raider figures out how to get hold of ATM card and the leg number, he may effectively use it to pull back cash deceitful. So our proposed frame bolsters the ATM card filtering frame alongside a LINK frame. This customer may filter his card and login to the frame. In any case, after customer is through with this evidence he may see craft yet is approached to enter LINK when he clicks cash pullout volition. At this stage the frame produces and sends a LINK to the enrolled movable number to that specific customer. The secret expression is produced announcement transferred to the customer cell phone. He now needs to enter the LINK in the frame so as to pull back cash. In this way our frame gives an absolutely secure approach to perform ATM exchanges with two position security structure.

Digital Guide Assisstant
Authors:- Abdalrahman Farag Ali , Asst. Prof..Sulthana A.S.R, Mca, M.Phil

Abstract- The Project “Digital Guide Assistant” is designed by Frontend as PHP and Backend as MY SQL. This Project is about the tourist guide may expose toursits to fraud because they know that they don’t know anything. This project is based on website. This website helps to detect the fraud and it can helps the tourist in any country. This website will shows the places in every country that can add by Admin. It shows the correct time of closing and ending for the tourists. It will shows the correct price for entering. It shows the details of each thing there so can read or listen to a voice in the language.The uses can collect all the details of the statue in the place that users are in. The users can post the photos and it can be uploaded in the Gallery.

Safety Enhanced Location Tracking Device for Logistics Container using Raspberry PI
Authors:- Asst. Prof. Dinesh Kumar B, Arvisa SR, Balaji S, Gokul P, Illakiya P

Abstract- The Internet of Things (IoT) interconnects physical devices and objects that offer to enrich the user experience. For instance, empowering traditional transport systems with IoT ensures greater visibility Internet of Things (IoT) interconnects physical devices and objects that offer services to enrich the user experience. In traditional shipping and freight systems, containers carrying donated organs should be sealed carefully, kept below a certain temperature, and placed in a physically safe place to minimize the chances of damage due to jerking and accidental falling. During the shipping process, the IoT-enabled container provides continuous monitoring and readings related to temperature, humidity, location, vibration, and open/close conditions. Additionally, automatic push alerts and notifications are sent to stakeholders when certain conditions or violations occur.

Hybrid Accident Prevention Using Eye Blinking
Authors:- Ali Moallin Mao, Dr. K. Juliana Gnanaselvi

Abstract- Transportation safety is important for detection of Driver’s Drowsiness. Drowsy driving is an important reason of traffic accidents. Driver Fatigue is one of the major reasons causing most fatal road accidents around the world. This shows that in the transportation industry specially, where a heavy vehicle driver is often open to hours of monotonous driving which causes fatigue without frequent rest period. Hence it is very essential to design a road accidents prevention system for detecting driver’s drowsiness, which determines the level of driver inattention and give a warning when an impending hazard exists. The SMS or mail alert sends to the emergency helpline numbers about the drowsiness of a driver with the vehicle details and the contact details to the nearest police station and the help line numbers. This project provides Eye Blink Monitoring System that will alert the driver in drowsiness. A system for monitoring eye movements would be useful in warning drivers when they fall asleep. The driver’s eye is continuously monitored using a web camera. To monitor the number of eye blink, threshold limit is been set. Webcam keeps monitoring the eye blinks based on this threshold. When the blink gets fluctuated from the threshold limit then the system automatically plays a song and helps the driver to get rid of drowsiness. Two algorithms are implemented one is based on edge detection that helps in monitoring the brightness of video and the other algorithm is based on counting the dark pixels to monitor the driver accurately. This in general avoids road accident due to fatigue of drivers if this system is implemented in every vehicle. The purpose of such a model is to advance a system to detect fatigue symptoms in drivers and to alert the drivers to avoid accidents. This is developed as a windows application using Python language. MySQL backend is used to store the vehicle information such as vehicle number, driver contact details and the helpline numbers.

Analysis of Friction Stir Spot Weldments Using EN19TAPER Square & Diamond Profile Tools on Similar Metals
Authors:- Associate. Prof. Dr. B Srinivasulu, Abdul Saud Khan, Mohammed Uzair, Salman Hussain

Abstract- The process uses a non-consumable tool comprised of two rotating components – probe and shoulder. Although one continuous process, RFSSW occurs over four stages: the first of which sees the tool move to the surface of the top sheet, where it rotates to produce the initial frictional pre-heating. Once the pre-heating stage is complete, the material is sufficiently soft, allowing the shoulder to plunge to a pre-determined depth in the base material while the probe retracts to create a gap into which the displaced material can flow. The third stage of the process involves the rotating components returning to the top surface, consolidating the weld material. EN 19 Diamond and Taper Square profile tool. Al-6061 to Brass-IS319 and Brass-IS319 to Al-6061 specimens, in lap-joint configuration. Test samples showed a Brass-IS319 to Brass-IS319 and Al-6061 to Al-6061.

Smart Energy Meter with Wi-Fi Module
Authors:- Asst. Prof. Sravanthi Gottipati, Ganesh. N, Jathin. M, Srilatha. A, Mahesh babu. P

Abstract- Efficient energy utilization plays a very vital role for the development of smart meters in power system. So, proper monitoring and controlling of energy consumption is a chief priority of this project. The existing energy meter system has few problems associated to it and one of the key problems is there is no full duplex communication for the suppliers. To solve this problem, a smart energy meter is proposed based on Internet of Things (loT). The proposed smart energy meter controls and calculates the energy consumption using ESP 8266 12E, a Wi-Fi module and uploads it to the cloud from where the consumer and producer can view the reading. Therefore, energy analyzation by the consumer becomes much easier and controllable. This system also helps in detecting power theft. Thus, this smart meter helps in close monitoring of the energy utilization using IoT and enabling wireless communication for consumers and suppliers.

Wallpaper App with Firebase Server
Authors:- Prof. Reshma R. Owhal, Pooja D. Salave, Sakshi S. Waghmare, Ritika S. Kothawade, Prithviraj S. Thorat

Abstract- We are going to build a wallpaper application in which we will be adding functionality to filter wallpapers based on various categories. Along with that we will be also adding a search bar to search wallpapers based on the user search query. We are going to implement this project using the kotlin language. Basically the project is divided into two modules. First Moduleis home screen in which different types of wallpaper are available like Aesthetic Wallpaper, Animal Wallpaper, BlackWallpaper, Colorful Wallpaper, Flower Wallpaper, Landscape Wallpaper, Anime wallpaper, Natural Scenery, Simple Wallpaper, Solid Color Wallpaper, etc.second module is for downloading wallpaper in which all the free downloadedwallpapers are available offline which are used to set homescreen and lockscreen wallpaper.

An Efficient Spam Detection Technique for IoT Devices using Machine Learning
Authors:- Asst. Prof. Sulthana A.S. R, Ilyas Abdi Mohamed

Abstract- The Internet of Things (IoT) is a group of millions of devices having sensors and actuators linked over wired or wireless channel for data transmission. IoT has grown rapidly over the past decade with more than 25 billion devices are expected to be connected by 2020. The volume of data released from these devices will increase many-fold in the years to come. In addition to an increased volume, the IoT devices produces a large amount of data with a number of different modalities having varying data quality defined by its speed in terms of time and position dependency. In such an environment, machine learning algorithms can play an important role in ensuring security and authorization based on biotechnology, anomalous detection to improve the usability and security of IoT systems. Motivated from these, in this paper, we propose the security of the IoT devices by detecting spam using machine learning. To achieve this objective, Spam Detection in IoT using Machine Learning framework is proposed. In this framework, five machine learning models are evaluated using various metrics with a large collection of inputs features sets. Each model computes a spam score by considering the refined input features. This score depicts the trustworthiness of IoT device under various parameters. REFIT Smart Home dataset is used for the validation of proposed technique. The results obtained proves the effectiveness of the proposed scheme in comparison to the other existing schemes.

A Localization and Traffic Density Short Term Forcasting in Non Motorised Vehicle Comprehensive Case Analysis
Authors:- Mohammad Hashim Khan, HOD Mr. Vinay Deulkar

Abstract- Non-motorized transport (NMT) is the use of a bicycle or walking to travel from one place to another. It is gaining popularity especially in the developed countries due to low transport externalities such as emissions and traffic congestion alongside its benefits to physical and mental health. The built environment, geography and weather, and socioeconomic factors significantly affect the use of NMT as a travel mode. This study reviewed some unique characteristics of NMT especially in developing countries to provide a clear understanding of the dynamics of NMT.

Energy Management Strategies of Hybrid Energy Storage System Using LSTM Technique
Authors:- M. Tech. Scholar Neetu Singh, HOD Ashwani Kumar, Assistant Professor Shilpi

Abstract- The commercial penetration and expansion of EV are restricted by various barriers such as Energy Storage System (ESS), driving range, Power Electronic Interface (PEI), charging station and high initial cost. Research related to ESS helps in solving the various research challenges associated with it. Since last decade, researchers are aiming at hybridizing different energy storage technologies. In fact, hybridization of different energy storage systems has proved to be the promising solution in improving the driving range, extending the battery life span by mitigating the stress, increasing the power train efficiency, lowering the cost and weight of ESS. A fuel cell model was developed and then to get the required energy level, a module was made using this fuel cell. The sharing of power between Ultracapacitor and fuel cell was again analysed and checked for optimal sharing of energy which will allow the Ultracapacitor to share more during the acceleration when peak current is in demand by EV. To get the optimal energy management of the HESS, a Hybrid Optimization Algorithm was developed which consists of a novel control strategy and optimization technique to analyse for efficient energy management of HESS for maximum energy utilization by electric vehicle. The MATLAB/SIMULINK software was used to validate the implementation. The complete energy management scheme which utilizes the proposed novel LSTM management scheme making it an efficient management scheme and at the same time the life of the primary energy source of Electric Vehicle is protected from easy damage and fuel starvation.

Attendance System Using face Detection with Deep Learning
Authors:- Ayushi Verma, Ashwani Shankar Amist

Abstract- The attendance management could be much hectic for teachers if it is taken manually by hand. To get rid of this problem smartly automatic attendance system has been developed but authentication of this system becomes an issue. In general, the smart attendance system has been accomplished with the help of biometrics. Face recognition is one of the effective forms of biometric to get improvement in security and authentication. Being a key feature of biometric verification, facial recognition is used in various applications like video monitoring, CCTV footage system and enables interaction between computer and humans. By using this method, the problem of proxies and students marked present when they are not present physically can be easily removed. This article has been proposed to implement automated attendance management system for students by using face recognition, with the help of eigenface values, Principal component analysis (PCA) and Convolutional neural network (CNN). After that the connection has been recognized by comparing these faces with the student’s faces stored in database. This model could manage records of students for attendance purpose successfully [1]. Human face recognition is one of the evolutions in machine vision. Attendance System is one of the main implementations of human face recognition. In Attendance System faces are used as objects which need to be detected and recognized to identify a person’s identity and that is stored in face database. In this process the faces captured by camera has been matched with the face images stored in face database to identify the object faces captured by camera. In this study this attendance system based on face recognition uses hybrid feature extraction method using CNN-PCA. This kind of collaboration of methods will deliberate to produce more precise and accurate feature extraction method. This method of attendance system based on face recognition system using this camera has very accurate data processing resulting it would be more effective, powerful and reliable to identify faces in real-time [2].

“Study on Diferent Techniques of Retrofitting”
Authors:- Ganesh Mali, Omakr Kailas Tambe, Kunal Shrinath Babar, Adesh Dattatray Modak,Lecturer Nishchay R More sir

Abstract- Now-a-days retrofitting is becoming popular around the world, as most of the important structures like historical building or some other old structures which becomes weak over the time. Retrofitting is the best method to make safe the existing structures from the future earthquake and other environmental factors. Retrofitting diminishes the helplessness of harm to a current structure amid future seismic movement It plans to reinforce a structure to fulfil the necessities of the present codes for seismic outline. With respect to conventional repair and rehabilitation, retrofit is much better and convenient. Retrofitting helps to enhance the strength, resistivity and overall lifespan of the structure.

Study of Incorporation of Waste Plastic in Road Construction
Authors:- Abhishek Kamble, Harish Kokani, Abhishek Tapkir, Akshay Bodhale, Lecturer M.A. Dhatunde

Abstract- Plastic use in road construction is not new. Waste plastic is ground and made into powder; 3 to 4 % plastic is mixed with the bitumen. The durability of the roads laid out with shredded plastic waste is much more compared with roads with asphalt with the ordinary mix. Worldwide, sustainability is the pressing need of the hour in the construction industry and towards this end use of waste material in road construction is being increasingly encouraged so as to reduce environmental impact. In the highway infrastructure, a large number of originate materials and technologies have been invented to determine their suitability for the design, construction and maintenance of these pavements. Plastics and rubbers are one of them. Also considering the environmental approach, due to excessive use of polythene in day-to-day business, the pollution to the environment is enormous. The use of plastic materials such as carry bags, cups, etc. is constantly increasing day by day. Since the polythene are not biodegradable, the need of the current hour is to use the waste polythene in some beneficial purposes. the main aim of this study is to focus on using the available waste/recycled plastic materials and waste rubber tires present in abundant which can be used economically and conveniently. The use of these materials as a road construction proves ecofriendly, economical and use of plastic will also give strength in the sub-base course of the pavement. Keywords-abundant, recycled, biodegradable, economical.

Low-Cost Housing
Authors:-Soham Katkol, Suyash Dhaygude, Abhishek Tugaonkar, Gaurav Tupe, Lecturer Samiksha R. Gaikwad

Abstract- The objective of our project is to develop low, economical and efficient housing material especially bricks which we covered in this project. Construction materials made of renewable resources have promising potential given their low cost, availability, and environmental friendliness. Although hemp fibres are the most extensively used fibre in the eco-friendly building sector, their unavailability hinders their application in Iraq. This study aimed to overcome the absence of hemp fibre in Iraq and develop a new sustainable construction material, straw create, by using wheat straw and traditional lime as the base binder. A comparable method of developing hempcrete was established. The experimental program adopted novel Mixing Sequence Techniques (MSTs), which depended on changing the sequence of mixed material with fixed proportions. The orientation of the applied load and the specimen’s aspect ratio were also studied. The mixing proportion was 4:1:1 (fibre/binder/water) by volume. Results showed that the developed straw create had a dry unit weight ranging from 645 kg/m3 to 734 kg/m3 and a compressive strength ranging from 1.8 MPa to 3.8 MPa. The enhanced physical and strength properties varied with the MST and loading orientation. The properties of the developed hempcrete were compared with those of straw create.

Tiles From Recycled Tyre Rubber: The Future
Authors:- Sakshi S. Kande, Komal R. Tambare, Nita N. Kolekar, Sayali K. Gopnar Lecturer Thorat M.D.

Abstract- This research present a case study of producing flexible tiles from rubber crumb obtain from automobile tyre waste using a polyrethene resin asa binder matrix. The process was made in collaboration with a company located in colombia, where the manufacturing of this materials has been optimized. The material is green solution to an increasing worldwide problem,rubbertyres ,mostly put in landfills or burn to extrat their reinforced steel wires instead of properly recycled. Several rubber contents and particle size disrtibution were investigated and tested.Tension, density scanning electron microscopy,and thermo-gravimetric analysis characterization were used to evalute the composites.Result shows that the amount of rubber usedis quite large in comparision with the binder, maximizing the rubber in the formulations, and composites to be used in multiple application. The tensile test showed the composites can work very well for structural application of low solicitations , asuch as well cover soft floors and barriers.The project is sucessful example of a small-medium entreprise company that contributes to the circular economy of these highly pollutant materials.

A Review of Nano Refrigerant R134a+Al2O3 based Vapour Compression Refrigeration System
Authors:- Ibrahim Hussain Shah

Abstract- This research paper is deals about the today’s world refrigeration systems which play a significant role to meet the human desires and never-ending analysis is being dole out by several researchers so as to boost the performance of those systems. Here, an endeavour has been created to boost the performance of the system. Our, gift study on experimental investigations into the performance of nano refrigerant (R134a + Al2O3) based mostly cooling. it absolutely was ascertained that there’s additional temperature drop across the condenser for the nano refrigerant (12.37% — 10.88%) compared to refrigerant R134a. Similarly, a gain of five.52% and 9.24% was obtained for evaporator temperature. Associate in nursing improvement in COP was additionally ascertained throughout the investigations (1.17% — 9.14%). This was achieved underneath 25–26 oC evaporator temperature load. The results indicate that constant of performance will increase with the usage of nano Al2O3. So mistreatment Al2O3 nano refrigerant in cooling is found to be possible.

Study on Effect of Admixtures on Self Compacting Concrete
Authors:- Saurabh Satav, Omkar Dhere, Shubham Dunghav, Prof. Jayram Shivaji Shendge, Prof. Manoj Dilip Thorat, Prof. Sayali Akshay Wadkar

Abstract- The concrete today can take care of any specific requirements under most critical exposure conditions. The concrete in modern days has to satisfy various performance criteria’s. As a result, concrete is required to have properties like high fluidity, self compactability, high strength, high durability, better serviceability and long service life. In order to address these requirements, self-compacting concrete (SCC) was developed. Self compacting concrete is a mix that can be compacted into every corner of formwork, by means of its own weight and without the need for vibrating compaction. In spite of its high flowability, the coarse aggregate is not segregated. At the same time there is no entrapped air.

Nanotechnology towards the Next Revolution
Authors:- Dr.Diwakar Nath Jha

Abstract- The Nano world is full of surprise and potential. In this field, the disciplinary boundaries between chemistry, molecular Biology, materials science and condensed matter physics dissolve as scientists struggle to understand new and sometimes unexpected properties. Atoms are the most basic units matter. They can be combined to form more complex structures such as molecules, crystals and compounds nanomaterial also are arrangements of matter in length scale of approximately 1 to 100nanometers that exhibit unique characteristics due to their size. Fabrication, or the making, of nanomaterial falls into one of two categories top-down or bottom-up. Top-down method involves carving nanomaterial out of bulk materials. Approaches in this category are referred to as different forms of lithography. Lithography can be understood through the concepts of writing and replication. Writing involves designing a pattern on a negative and replication involves transferring the pattern on the negative to a functional materials. One nanometer is equal to one billionth of a matter, spans approximately 10 atoms. Even scientists in the field maintain that it “depends on whom you ask”. Biophysicist Steven M. Block notes that some researchers “reserve the world to mean whatever it is they do as opposed to whatever it is anyone else does” Scientists reserve the term for research involving sizes between 1 and 100nanometers. There is also debate over whatever naturally occurring nano- particles, such as carbon soot, fall under the rubric of nanotechnology. One nano meter is equal to the width of three to five atoms. Type of Applications:-there are three general classes of nanotechnology applications based on the degree of control over the synthesis, characterization, first, we use the term simple nanotechnology to describe applications involving mass production of nanomaterial’s commercial products based on simple nanotechnology do not involve precise fabrication and positioning of nanostructures. We describe the second class of nanotechnology applications as building small. This category refers to the use of nanomaterials to build advanced materials devices and systems within the next 5 to 15 years, “building small” nanotechnology could have a major impact on a number of different products in a range of different industries the final class of nanotechnology applications “building large” describes the unrealized vision of self –replicating nanorobots.

Diabetes Detection Using Image Processing Algorithm
Authors:- Ms. Reshma.R.Owhal, ShubhamVaghasiya, AtharvaTenkale, AkshayPokale

Abstract- Diabetes is a metabolic disease that causes high blood sugar and an untreated high blood sugar can damage your nerves, eyes, kidneys and other organs and to detect the diabetes disease, we propose this methodology to machine learning technique which will be painless to detect diabetes. We’re using thermal imaging scans of an eye to illustrate the effect of temperature variation of anomalies in the ocular architecture as a diagnostic imaging modality that can help optometrists make clinical diagnoses. We’re using thermo graphy images of an eye to actually prove the caused by thermal variation of abnormalities in the eye structure as a mammography type of therapy that can help optometrists make clinical reasoning. A method through which a computational system understands the characteristics of input information is known as machine learning. Several methodologies have previously been shown to be sensitive enough to detect diabetes. Countless optimization algorithms, with the exception of guided, uncontrolled, and reinforcement instructional strategies, have been developed. Machine learning techniques are powered by data, so this is obviously practical. Our system is using SVM, machine learning algorithm and histogram array values to find the diabetes disease, in data. This project that we have created takes less time and detects diabetes from the entered values.

SVM for Diabetic Detection System
Authors:-Ms. Reshma.R.Owhal, Shubham Vaghasiya, Atharva Tenkale, Akshay Pokale

Abstract- Diabetic Diagnosis Using Retinopathy Diabetic retinopathy is a T2dm retinal detachments resulted in the degradation of neurotransmitters in the vascular system of the eye. High blood glucose levels could indeed significantly raise a patient’s risk of developing diabetes. Diabetic Retinopathy is indeed an infection that affects once diabetes propagates to a patient’s photoreceptors. This condition can cause inaccurate blood vessels to form in the retina, as well as blood vessel rupture and hypertension. Blurred vision, undulating vision, reduced colour perception, and spots or dusky filaments are all symptoms of diabetic retinopathy. The primary goal of this experiment is to determine whether the patients have eye diseases.

Deep Learning Techniques to Classify the Aerial Images with Gabor Filter
Authors:- PG Scholar Prakruthi D P, Asst. Prof. P Sumathi

Abstract- Aerial Images are a valuable data source for earth observation, can help us to measure and observe detailed structures on the Earth’s surface. Aerial images are drastically growing. This has given particular urgency to the quest for how to make full use of ever-increasing Aerial images for intelligent earth observation. Hence, it is extremely important to understand huge and complex Aerial images. Aerial image classification, which aims at labeling Aerial images with a set of semantic categories based on their contents, has broad applications in a range of fields. Propelled by the powerful feature learning capabilities of deep neural networks, Aerial image scene classification driven by deep learning has drawn remarkable attention and achieved significant breakthroughs. However, recent achievements regarding deep learning for scene classification of Aerial images is still lacking..

Decision on Cryptocurrency
Authors:- Miss. Priyanka Ramchandra Gupta

Abstract- A cryptocurrency is a digital currency that relies on networking for every transaction. It follows peer to peer version of electronic cash that can allow online payments to be sent directly from one party to another without any involvement of financial institutions or any other centralized authority. To prevent any fraudulent activities a decentralized system relies to record and oversee transactions. The thesis shows a present situations and the regulation of digital currencies in India. Despite gaining worldwide popularity and various other legal restrictions, it is regularized and gains its momentum. All circulars, challenges, and circumstances are being highlighted below on the matter of digital currencies.

Power Generation Using Speed Bumps
Authors:- Associate. Prof. Dr. B Srinivasulu, Mohd Faisal Farooq Malik, Mohammed Safdar Ullah, Mohammed Suleimaan

Abstract- In the following article, we will learn how speed breakers can be used as power generators. Adding a rack-and-pinion gear with a generator attached to a combination of the gears mentioned above can accomplish this. The electricity can also be stored in various cells or other storage sections. The following paper includes a sample calculation for which energy calculations have been conducted.

Face Mask Recognition Using RCNN
Authors:- Aishwarya M P, Sowmiya S

Abstract- Corona Virus is the latest pandemic that forced an international health emergency. It spreads mainly from person to person through airborne transmission. Many countries have imposed compulsory face mask policies in public areas as a preventive action. However, some people still do not wear masks in public areas, which might lead to infection of themselves or others. Manual observation of the face mask in crowded places is a tedious task. Therefore, automatic detection of the wearing of face masks may help global society, but research related to this is limited.In this paper, we propose a Mask-RCNN use two novel methods to achieve this. First, to detect mask region from the face using RPN and to extract rich context features and focus on crutial face mask related regions, we propose a novel residual residual context attention module (RCAM). Second, to learn more discriminating features for face with and without masks. This technique is capable of recognizing masked and unmasked faces to help monitor safety breaches, facilitate the use of face masks, and maintain a secure working atmosphere.

Survey on Existing Accident Alert Systems
Authors:- Divya K S, P J Roshan, Srivathsan, Vishnu S Nath, V Krishnadev

Abstract- Road accidents are a common sight nowadays. The main reasons are overspeeding, a lapse of concentration, drunk
and drive, etc. Moreover, victims do not get the required aid in time which results in serious problems such as injury or even
death. Thus, there arises the need for an accident alert system that detects accidents and delivers the aid in time by transmitting information to the right destination. There are many existing systems. In this paper, we focus on some of the existing accident alert systems and review their features. Studying these features will help in finding any bugs and faults in them.

Face Recognition Using Python and Deep Learning
Authors:- Jemi Mariya Jose, Maris Baby, Meenakshi P D, Assoc. Prof. T Sobha

Abstract- In their daily lives, people who work in the chemical sector come into contact with hazardous or caustic compounds. They also come across a variety of substances and particles that, when inhaled, cause a variety of negative effects. Some of the gases used in these industries are so toxic that they can make a worker dizzy and cause a temporary loss of concentration. When working with chemicals, it is therefore suggested that you use a breathing mask. These masks shield you from hazardous particles and gases in the air. They remove contaminants from the air that might cause injuries, infections, or death. As a result, respirators are required to protect you from gas and other toxic chemicals. In this research, we offer a method for detecting face mask.Abounding box drawn across the person’s face indicates whether or not the person is wearing a face mask. If a person’s face is recorded in the database, the name of the person who is not wearing a face mask is spotted, and an email is sent to the authority informing them that the worker is not wearing a mask so that precautions can be taken.subhumans using TensorFlow andOpenCV.

Agricultural Crop Recommendations System Based on Soil Fertility Using Machine Learning Techniques
Authors:- Sneha A.S, Nikila A, M. Dharun Gandhi Supervisor, Mr.P.Boopathirajan

Abstract- Agriculture plays a major role in everyday life, without proper agriculture techniques production of quality crops will be affected. This may lead to economic crisis or downfall. Agriculture gives a significant hand in country’s economic development. It is mandatory to administer new farming techniques and include technological advancements for better crop yield and production. Machine Learning techniques have greatly shaped agriculture throughout time. Machine Learning techniques greatly help in recommendation and prediction systems. Soil techniques greatly help in recommendation and prediction systems. Soil fertility is vital for healthy and increased crop yield. Soil fertility is determined based on several factors. Some of the features used in this approach are Nitrogen (N), Phosphorus (P), Potassium (K), humidity, temperature, rainfall and ph value of the soil. In our approach we use the technique of Multilayer Perceptron Classifier and Stochastic Gradient Descent to predict the best crop yielded based on the soil fertility.

Automatic Irrigation System
Authors:- Shaikh M Shahnawaz Aalam, Rahul Boga

Abstract- India is an agricultural-based country. Agriculture is the main source of livelihood for most Indians and contributes significantly to the country’s economy. In dry areas or when there is insufficient rainfall, irrigation becomes difficult. Therefore, it needs to be done automatically to get the right yield and remotely managed for the safety of the farmers. If the farmer is far from the agricultural land he will not be able to pay attention to the currentsituation.Therefore, good water management plays an important role in agricultural irrigation schemes. This study investigates the design of an Arduino-based automated irrigation system. This Embedded project is to design and develop a low-cost feature based on the fixed location of the irrigation system. This research uses soil moisture sensor to determine the amount of water availabilitysee the sensor value for the dry condition. in agriculture. The project uses a small Arduino controller to process information. The purpose of this was to show that automatic irrigation can be used to reduce water use.

Industrial Robotic Arm Based on IR Sensor and ARDUINO
Authors:- Prof. Komal Wanzare, Chetan Tamgadge, Pratiksha Suryavanshi, Sanket Gaurav, Sumedh Khillare

Abstract- This Paper outlines the various stages of operations involved in the pick and place robotic arm. It is an automated material handling system is synchronizing the movement of robotic arm to pick the object moving on a conveyor belt. Nowadays various advanced robots are used in industries but still controlling is done manually or using processors likewise Adriano, microcontroller. But microprocessors have several disadvantages so these disadvantages can be overcome by Arduino. Here Arduino uno is used for controlling and operating robotic arm. All the various problems of this process have been analyzed properly and have been taken into consideration while programming and designing the pick and place robotic arm.

Design of Area-Efficient Carry Skip adder
Authors:- M.Kousalya

Abstract- The design of area-efficient logic systems is an essential component and one of the most active areas of study in the field of VLSI Design. The most fundamental mathematical operation is addition. An area-efficient Carry Skip adder is suggested in this Project. CSA is a rapid adder that is used in data processing systems to execute quick arithmetic operations. Second, the Carry Skip adder’s construction allows for the reduction of space and power usage. Third, there is potential to lower the area by using an add-on plan. As a result, a Modified Carry Skip Adder (MCSA) is developed using a single Ripple Carry Adder (RCA) and a Binary to Excess-1 Converter (BEC) instead of twin RCAs to save size while sacrificing speed.

Survey on Crowdfunding Platforms Using Smart Contracts
Authors:- Namitha Sabin, Niranj U, Srinidhi D Pai, Sneha T U, Asst. Prof. Gripsy Paul Mannickathan

Abstract- In a normal banking system, the transactions are prone to hacks, double spending, high rates etc. The concept of blockchain puts a stop to these drawbacks. Blockchain is a distributed, unchangeable ledger that makes recording transactions and managing assets in a corporate network much easier. Crowd funding is a method of raising funds that runs independently of any government and is used by individuals, corporations, and charities. It is a method of raising funds by asking a huge number of people for a modest amount of money from each of them. Crowd funding has many advantages, but it also has a significant danger of fraud, as well as several other possible risks, such as money loss, investment lock-in and lack of transparency. In this paper we discuss various crowdfunding platforms that run for charity purposes.

Automatic Bush Trimming Machine
Authors:- Braj Bhushan Yadav, Meet Chandrakant Patel, Shubham Ahire, Associate Prof. Durgesh Borse

Abstract- This paper presents a literature review and development of Bush Trimming Machine use for trimming the plants of road side. Maintenance of private and public premises is becoming necessary and involves high cost. In general manually operated trimmers were used just like simple and most common type is shearing of scissors. This project focuses on development of bush trimming machine in societal view with low cost system. The manually operated trimmers involve more effort & time consuming, where the operator required more efforts to lift the trimmer at suitable height and it is having very heavy weight. The uniformity of cutting varies from one operator to another. Different operator will cut in different way. The time also be saved using this trimming machine.

Effect of Filler Rod on Microstructure and Mechanical Properties of Bimetallic Weld Joint
Authors:- M. Tech. Scholar Lokesh, Asst. Prof. Manoj Kumar

Abstract- Bimetallic weld joint is used in boiler reactor and pressurized water reactor design, where low carbon steel alloy components are welded to stainless steel piping system. There are various problems which need to be addressed while welding the bimetallic metals due to the variation in the properties of the base metal.The analysis confirms the well mixing of stainless steel and mild steel with filler rods inside the weld pool. The mechanical properties in terms of ultimate tensile strength found to be high as 467.54 N/mm2 with filler rod SS316L and micro hardness value at the center of the welded zone was found maximum (294 HV) with filler material SS316L, the fracture of the tensile test specimen were obtained outside the weld zone.

A Review Article to Voltage Sag and Swell Power Compensation with Power Stabilization Using SAF
Authors:- Gurpreet Kaur, Professor Arun Pachori

Abstract- The parameters of electrical energy, such as supply voltage amplitude, are very important, especially from the viewpoint of the final consumer with respect to sensitive loads connected to the grid. Dynamic states in the power grid?voltage sags and swells?might cause faults and defects to develop in sensitive loads. To mitigate unwanted effects, many topologies of ac/ac converters are implemented as voltage compensators. This article presents a review of hybrid ac/ac converters designed to compensate voltage sags and swells with the aim of protecting sensitive loads against sudden and severe changes in supply voltage amplitude. In this article, only solutions without galvanic separation between source and load are described. To assess the properties and to compare different topologies of voltage compensators, some common parameters, such as range of voltage sag and swell compensation, reliability, quantity of switches and transformers, and required power ratings of power electronic units in relation to power of load, are introduced. In addition, we discuss possibilities for compensation of voltage interruption, time of compensation, the efficiency, and the effect on the supply network of the described circuits. The results of the analysis have been collected and compared in tabular form and represented in graphical form. Furthermore, we show potential areas of application for particular solutions of ac voltage compensators.

Grid Connected Maximum Power Utilization Using Isolated AC- DC Converter
Authors:- Ballabh Chaudhary, Professor Arun Pachori

Abstract- An ever-increasing interest on integrating solar power to utility grid exists due to wide use of renewable energy sources and distributed generation. The grid-connected solar inverters that are the key devices interfacing solar power plant with utility play crucial role in this situation. Although three-phase inverters were industry standard in large photovoltaic (PV) power plant applications, the microgrid regulations increased the use of single-phase inverters in residential power plants and grid interconnection. This paper presents a detailed review on single-phase grid-connected solar inverters in terms of their improvements in circuit topologies and control methods. Even though there are many reviews have been proposed in the current literature, this study provides a differentiating approach by focusing on novel circuit topologies and control methods of string and micro inverters. The single and multi-stage solar inverters are reviewed in terms of emerging DC-DC converter and unfolding inverter topologies while the novel control methods of both stages have been surveyed in a comprehensive manner. The isolated and transformerless circuit topologies have been investigated by reviewing experimental and commercial devices. The soft computing, evolutionary and swarm intelligence based algorithms have been summarized in MPPT methods section while current injection and grid-connection control methods of unfolding inverters stage have been presented with and without PLL architecture. There are many papers have been compared and listed in each section to provide further outcomes which is followed by a summarizing discussion section and conclusion.

Smart Blind Stick Using Arduino UNO
Authors:- Prof. Sushma Patwardhan, Miss. Divyata Karivadekar, Miss. Pratiksha Phadtare, Miss. Komal More, Miss. Swapnali Rabade

Abstract- In the era of technology where each and every person strives to be independent in order to survive in this competitive world, being an independent is the at most priority to almost all the people. Our project is designed to provide this independence to the visually challenged people. This project gives them helping end to commute safely and securely. This act as a Third Eye for the visually challenged people and make their difficult life little bit simple and safe. The project consists of Ultrasonic sensor used for detection of obstacles like staircase, wall and other objects. After the detection of an obstacle, it alerts the user by beep sound of the buzzer.

Alphaneumeric Hand Gesture recognition System
Authors:- Prof. Megha Beedkar, Mr.Barve Saurabh, Mr.Jadhav Rajan, Mr.Raibole Vinay, Ms.Sonawane Pooja

Abstract- The project introduces an application using computer vision for Hand gesture recognition. A camera records alive video stream, from which a snapshot is taken with the help of interface. The system is trained for each type of count hand gestures (one, two, three, four, and five) OR Alphabets (A, B and C) at least once. After that a test gesture is given to it and the system tries to recognize it.

Review of Human Face Mask Identification using Deep learning with Open CV Techniques
Authors:- M.Tech. Scholar Rahul Baghel , Associate Professor Dr. Pallavi Pahadiya, Dr.Akhilesh Upadhyay

Abstract- The 2019 coronavirus illness outbreak has become a significant threat to public health. Because of the way it behaves when in touch with other substances, it is rapidly disseminating. Therefore, the World Health Organization recommended that people in crowded settings use masks as a form of preventive. In some of these regions, the illnesses have grown quite widespread as a direct result of the incorrect use of face masks. Therefore, in order to solve this issue, we needed a mask monitoring system that was effective. By means of the development of machine learning and analytical techniques using image processing, present methods for mask detection. Image processing analysis and the approach of machine learning are both used in the process of finding out mask detection. There are a few different approaches that may be used to identify face masks. The convolutional neural network approach is the one that is utilised most often nowadays. In comparison to other organisations, CNN has a very high level of both accuracy and decision making. In this article, we will talk about a variety of deep learning approaches that may be used to recognise face masks.

Food and Medicine Serving Robot
Authors:- Asst. Prof.A. Rama Krishna Prasad, P. Sukumar, A. Narayana Teja, AA. Jagadish

Abstract- His project describes the design and development of a Serving Robot which is considered as a possible solution to address the lack of human resource and to introduce Automation. The role of robotics in healthcare and allied areas with special concerns relating to the management and control of the spread of the hazardous diseases like corona virus disease 2019 (COVID-19). The pandemic covid-19 have brought a vast change to the world and made us distant socializing rather than social distancing. The medical sectors are facing a crucial stich on this. Moreover a Bluetooth based remote controlled robot for navigating ,delivering food and Medicines can limit the interactions of medical professionals to patients. Ensuring the safety and low expansion of covid-19, the robot can be controlled anywhere from the hospital.

Interactive and Smart Refrigerator using IOT
Authors:- Raashi Taneja, Rushit Shah, Shradha Narwadkar, Manisha Kumawat

Abstract- In the modern era of technology and with increasing dependency on smart techniques like mobile phones, there is a requirement of solving daily life tasks in quick and easy ways. Smart technology is becoming the need of the hour to take control over the different tasks at home and in industries. The system proposed is based on detection and recognition algorithms. The main function of the algorithms is to automatically detect the smell and generate a message to the user that the food is spoiled. The key feature of computer vision is Arduino for reasons like marketability & law-abiding apps. Secondly, after a lot of research on the accessibility of realistic technologies, this area of research finds an important place among different types of researchers and scientists like computers, food & different organizations. The microcontroller panel can perform functions that include interpreting inputs and outputs and making the sensor activated. Generally, food is stored in the refrigerator which lowers the bacteria rate of production. Certain items which are perishable or not used for long-term storage are to be detected and informed to the user. This project is based to solve the food spoilage through sensors by continuously sensing the signals from the food and sending the alert message to the registered mobile phone.

Design & Analysis of LPG Kit for Two Wheeler
Authors:- Manish Krishna Prasad Singh, Taufik Sikandar Maniyar, MD Ghayas Alam, Associate Prof. Amol D Lokhande

Abstract- In metropolitan regions like Mumbai, Pune, and many other cities. In India, two-wheeler act a very major role in transportation. Most of the vehicles (four-stroke engines) are majorly run by petrol. In recent days petrol prices have increased and the availability of crude oil decreases. Petrol and diesel contribute a major role in global warming because it emits harmful gases and partials like carbon monoxide (CO), hydrocarbon (HC), nitrogen oxide (NOx). These gases are harmful to human health and also affect the environment. We have seen a three-wheeler (auto-rickshaw) that is also run-on LPG. In this paper, we all attempted to use alternative fuel for a single-cylinder four-stroke engine to increase efficiency and decrease the running cost. Our aim in selecting this paper is to use non-conventional fuel against conventional fuel. We have done the required modification. LPG is cheaper than petrol and it is clean gas. Gasoline/petrol has less value of octane compared to LPG and emitted less exhaust emission hence it is less harmful to global warming and human health. In this paper, the single-cylinder four-stroke engine is run on both fuels’ petrol and LPG.

A Cyber Security of IOT in 6G Era
Authors:- Mr. R Vignesh, Asst. Prof. Ms. Sumaiya M

Abstract- With the deployment of more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions. These investigations include the fundamental security and privacy problems associated with 6G technologies. Therefore, to combine and solidify this foundational research as a basis for future investigations, we have prepared a survey on the status quo of 6G security and privacy.

Cloud Computing Distinctiveness In The Real-Time Environment
Authors:- Dr.V.Mathivanan , Dr. Vimal Kumar Stephen ,Mr Mohamed Ruknudeen Raf, Mr.Senthil Jayapal , Dr. Ramesh Palanisamy i.

Abstract-Information can be shared via cloud computing on systems such as computers, tablets, laptops, or smartphones. Software and resources can be provided based on user demand for devices such as computers, tablets, laptops, and smartphones [1]. The advent of cloud computing has distorted the general notion of Infrastructure, software delivery services, and development models. In this paper, we investigate the revenue from Cloud service modes such as Infrastructure as a service (IaaS), Platform as a service (PaaS) and Software as a service (SaaS) through vertical transmission from mainframe computers to client/server deployment models. This finally leads to cloud computing, combining distributed computing, utility computing and autonomic computing into an evolving deployment architecture[2].

A Review on Maximum Power Point Tracking Using Renewable Energy Resources
Authors:- Research Scholar Rahul Kumar, Asst. Prof. Aashutosh Khasdeo

Abstract- Both the AC and DC power systems need to be updated so that they can meet the needs of the public. When DC microgrids are connected to DC renewable and storage sources, their performance is admirable because it is so efficient, consistent, and reliable, and it allows for load sharing. The main goal of any DC Microgrid’s control strategy should be to make sure that the load and power are balanced well with the Distributed Generator (DG) sources. Because renewable energy sources come and go, batteries are an important part of a DC microgrid’s load–power balancing system. There’s a chance that the plan for managing energy that’s already in place can handle the extra load. The power distribution networks that serve rural areas, on the other hand, are not made to work with this method. The results of this study give an energy management strategy, or EMS, for a DC Microgrid that can use solar, wind, super capacitors, and batteries as input sources to power remote areas. In the modelling and overall design of controllers, the rated voltage of the super capacitor is usually taken into account. The usual way to make a controller could cause the system to become unstable or cause the DC link voltage to ring when the super capacitor voltage is low. In this, the effect of changes in the voltage of supercapacitors on the stability of DC micro grids is studied, and a control design method is suggested to make sure that DC micro grids are stable in all modes of operation. The design and stability analysis of a direct current (DC) microgrid with a battery-super capacitor energy storage system that works with a variable super capacitor operating voltage.

Review on Air Pollution Detection and Purification using Air filter
Authors:- J.Jenitta, Praveen N, Vaibhav P, Shashank S Shetty, Yogesh H S

Abstract- As on today Pollution is a major problem which all the countries are trying hard to reduce it. Air pollution is a major harmful pollution. Pollution leads to severe health issues. Major reason for air pollution is the release of harmful substances from the vehicles. This paper aims to give a detailed review about methods used to detect the pollutants from the vehicle emission and various ways to purify the same.

Diabetes Prediction By Frog Jumping Algorithm and Artificial Neural Network
Authors:- Roopa Shrivastava, Prof. Rajesh Ku. Nigam, Prof. Rakesh Ku. Tiwari

Abstract- Diabetes is a disease that is continuously increasing in developed and developing countries. The efficient solution to deal with this disease is need of the time. This work has reduced the input dataset size by use of frog leaping genetic algorithm that give high effective features. Selected features will be further used for the training of neural network that give more accurate results. Use of less feature for training and testing directly reduces the evaluation complexity. Experiment was done on real dataset of users feature who might have chance of diabetes. Comparison of proposed model is done with existing techniques on different evaluation parameters. Result shows that proposed model has improved precision, recall, and accuracy of diabetes prediction.

Family Searching Assisstant
Authors:- Ms. Areej Bakdash, Dr. K. Juliana Gnanaselvi

Abstract- The Project “Family Search Assistant” is designed by Frontend as PHP and Backend as MY SQL. We will make a site that can help the people to find some boys or girls who can take care of our kids or old people in some places near from you or we also can choose the location that where we need them and then we will find them also with their details, photos experiments. This site will be very useful for families to find someone who can help them with a good price and we can get all their info.

Security with CCTV Camera and Deep Learning with Python
Authors:- Durgesh Rao

Abstract- The Corona Virus Disease known as COVID- 19; An Acute Respiratory Syndrome Coronavirus-2 Disease called SARS-CoV-2. As, this virus is genetically related to the SARS outbreak of 2003. This deadly and unstoppable disease, which all started in Wuhan, China in Dec 2019, was declared as the World Pandemic on 11 March, 2020 by WHO World Health Organization. Face Mask and Social Distancing are the Best Precautions for staying safe. These Research Papers focuses on implementing Real Time Face Mask Detection using CCTV Closed- Circuit Television Camera and Deep Learning, to Catch the Real Culprit of Virus Spread and Report him or her Immediately.

Design of Kalman Adaptive Filter Thresholding and EMD based De-noising Method for ECG Signals
Authors:- Monisha Lodhi , Silky Pariyani

Abstract- An ECG signal is usually corrupted by various types of noises. Some of these noises are power line interface, baseline drift, muscle contraction, motion artifacts, electrosurgical noise, instrumentation noise and electromyography noises. It is highly required to develop a method which can filter ECG signal noises significantly. In this work, an EMD along with adaptive switching mean filter based new method for de-noising of ECG signal has been proposed. Unlike, conventional EMD based de-noising approaches, where only lower orders IMFs are denoised in this work, along with EMD, ASMF operation has been employed for further signal quality improvement. The lower order IMFs are filtered through wavelet de-noising technique to reduce high-frequency artifacts and retain the QRS complexes. Then, considering the effectiveness of ASMF, for further enhancement of signal quality adaptive switching mean filtering is performed. The validity of the performance of the described technique is evaluated on standard MIT-BIH arrhythmia database. Gaussian noise at different signal to noise ratio (SNR) levels are added to the original signals.

Performance of Energy Consumption and Communication Overhead in WSN Using Clustering Techniques
Authors:- Himani Pidi Paras, Rajat Saxena

Abstract- During the past few years, Wireless Sensor Networks (WSNs) have become widely used due to their large amount of applications. The use of WSNs is an imperative necessity for future revolutionary areas like ecological fields or smart cities in which more than hundreds or thousands of sensor nodes are deployed. In those large scale WSNs, hierarchical approaches improve the performance of the network and increase its lifetime.In this paper, we are using self-organizing map (SOM) based clustering methods. The Simulation a result indicates that a cluster based protocol has low communication overheads compared with the velocity in m/s based protocol.

Plant Leaf Disease Detection Using Image Processing
Authors:- C Manikanta Reddy, Golla Lakshmi Prasanna, Gonuthala Sreevidya, Maddha Siva Kishore,Associate Prof. Iliyaz Pasha M

Abstract- The major cause for decrease in the quality and quantity of agricultural production in plant diseases. A farmer faces very high difficulties in identifying and controlling plant diseases. So, a very huge importance for leafs in order to diagnose the plant diseases at early stages so that the accurate and the suitable action can be done by the farmers to avoid further losses. The project focuses on the approach based on image processing using machine learning for identification of plant diseases. In this project we use machine learning algorithms to test and train the data. The data set contains both healthy and unhealthy leaf images. At last by comparing the input image and trained image we can detect the disease. By this we can control the loss of the crops.

Thermal Analysis of Vapour Compression Refrigeration System with R22, 4404A, R407C and R410A Refrigerants
Authors:- Amit Kumar, Prof. Abhishek Bhandari

Abstract- Refrigeration and air conditioning (RAC) play a very important role in modern human life for cooling and heating requirements. This area covers a wide range of applications starting from food preservation to improving the thermal and hence living standards of people. The utilization of these equipment’s in homes, buildings, vehicles and industries provides for thermal comfort in living/working environment and hence plays a very important in increased industrial production of any country. On the basis of comparison of COP with different refrigerant, VCRS with R22 has max. COP as compared to others. Max. Compressor work with R407C is achieved i.e. 28.57 KJ/Kg. Max. Heat rejected from evaporator and condenser is achieved with 22 i.e. 147.9 KJ/Kg. Therefore, R22 can be used for achieving maximum COP with VCRS.

Hearing aid using Reverse Piezoelectric Effect
Authors:- M Prithvi Raj, Nikhil V, Prashanth Manoj, Tushanth L, Ms Manasa S

Abstract- The hearing device described in this study uses reverse piezoelectric technology and differs from conventional hearing aids in a number of ways. Sound waves are transmitted to the three major bones by bone conduction (Malleus, Incus, Stapes). Electrical pulses are converted into mechanical stress using piezoelectric transducers (vibrations). The goal is to create a low-cost gadget that does not require implants. We concentrate on talking about the construction and operation of hearing aids.

Design Optimization of B- Pillar of Car
Authors:- M.Tech. Scholar Ankur Kumar Rathore, Dr. Pankaj Agarwal, Dr. Ashish Manoria

Abstract- For protection of passengers in accidental scenarios, the B-pillar design and manufacturing must be in line with existing standards and techniques to enhance resistance to impact which may depend on a number of factors including material and welding techniques. Therefore, in order to validate the efficiency of a B-pillar for proper design and reinforcement, it is necessary for the design to be analysed by Finite Element Analysis (FEA) using appropriate Computer Aided Engineering (CAE) software. FEA is a numerically analysis techniques for structural engineering designs. This involves design with the aid of complex software and FEA solvers, which can be used in analysing the effect impacts, vibration stress, heat transfer etc. It functions as a mechanism of linked points referred to as nodes which combined arrangements make up an element often referred to as a mesh (Roymech, 2016). Therefore, this study attempts to analyse and optimize the design of B-pillar using Taguchi method.

Productivity Improvement in Manufacturing Industry Using Industrial Engineering Tools
Authors:- M.Tech. Scholar Rupesh Mahajan, Prof. Nitesh Mishra

Abstract- This study presents a novel analysis for the control of manufacturing flaws. This investigation focuses on the tube bending process. The chosen component was generally rejected due to defects in a cross section of the tube flatness. Six Sigma, the zero-defect approach, is used in this research. A strategy for increasing productivity is a method for increasing the production of brake shoes. The collection of data is intended to provide an analytical foundation, that is, to turn data into information that decision makers and value may use. However, before data can be collected, a data collection plan must be developed. Data is obtained in order to identify, analyse, and eliminate the manufacturing facility’s bottleneck station. The collected data is viewed immediately on the shop floor through continuous assessment of each machine using a stop-watch.

Deep Learning Techniques Based Plant Leaf Disease and Prediction
Authors:- Mayur Kumar Bundela, Assistant professor Ms. Priya sen

Abstract- The latest advances in deep learning indicate that repeated image appreciation organization using convolutional neural network (CNN) models can be very beneficial in such troubles. Since the plant leaf disease imaging dataset is not readily accessible, we used transfer learning to enlarge our deep learning model. Accurate or timely recognition of diseases in plants leaf can help farmers to deal with plants in time, which can greatly reduce economic losses. The latest development of the deep learning-based convolutional neural network (CNN) has vastly enhanced accuracy of image classification. Driven by CNN’s success in image classification, this paper developed a deep learning-based method for detecting infection from images of plants leaf. The contribution of this work has two aspects: The most advanced deep learning architecture, such as ResNet50, DenseNet, used for recognition of the plant leaf disease .Training, testing and experimental results show that proposed architecture can realize and higher ResNet50 model getting is 95%.accuracy as compare to other model.

Stock Market Prediction Using Machine Learning Algorithm
Authors:- Diviesh Chaudhari, Pranay Bafna, Shubham Jadhav, Jay Chaudhari, Prof. V.T. Patil, Prof. V.O.Patil

Abstract- Stock Market is one of the Important thing in any Country’s Economic Point Of View, people need to understand the way of stock changes and how can a stock behave in next Period of Time where it is Pretty Much Interesting that to Predict a Stocks. Prediction of Stocks are very much Interesting not for trading community as well as it also for Computer Enthusiastic Public Also. When we think About Prediction that it can be happen in two ways that prediction can be happen because of previous data values and the other way is look and understand the News and Data in the Digital Media. In Previous data there is problem is Unavailability of the data or some data which is available which might get bad prediction because some point their accuracy is less because of changing patterns. Some of stocks have the valuable parameter Like “Return Rate”, but at some point Due to Unavailability of Data, but the other side return rate need to find out Opening and closing Price of the Parameters we are here to focus on predicting long term value of the stock is relatively easy than predicting on day-to-day basis as the stocks fluctuate rapidly every hour based on world events. Our system will predict the stock prices for the next trading day and for the specific date. The prediction model will notify the up or down of the stock price movement for the next trading day and investors can act upon it so as to maximize their chances of gaining a profit. The accuracy of the prediction is evaluated and gives a percentage of accurate result. Combining the accuracy and the prediction, recommendation can be given to the user to acknowledge them the trend of the target stock with known accuracy.

Blockchain Enabled E-Voting
Authors:- Ali Saeed Mohamed, Asst. Prof. Mrs. Sulthana A.S.R, Mca. M. Phil

Abstract- In addition in block chain enabled e-voting computing technology there is a group of critical political issues which include the issues of privacy security and anonymity and the ability to communication and government control reliability responsibility and others But most of them are Security and how cloud provider confirms this Overall block chain enabled e-voting has many customers like ordinary users academia and corporations who have different motivations to move to the cloud Overall block chain enabled e-voting has many customers like ordinary users academia and corporations who have different motivations to move to the cloud Overall block chain enabled e-voting has many customers like ordinary users academia and corporations who hava different motivations to move to the cloud Security issues in block chain enabled e-voting such as the availability of the service.

Utilisation With Forecasting Of Demolish And Construction Waste In Environment Management
Authors:- Vianjal Badjatiya, Pallavi Gupta

Abstract- Construction is an important aspect of infrastructure and growth in developing countries. In this process the construction industry produced a large quantity of waste which is harmful environmentally and costly for budgeting the project. So waste management is important for construction industry. Construction waste management defines as reduction recycling and utilize of waste by proper management of resources. In this paper, we are going to review on the major sources and factors of generating construction waste by critical literature review. At last, developed framework for the future research in this area.

A Review Article Novel Approach Ofdm 5g Communication and Papr Minimization Using Modified Clipping Method
Authors:- Preeti Tembhurne, Swati Nigam

Abstract-To improvement of voice signal quality and reducing its noise level to implementation of various type method like filter and Compression etc. Hence observation of various article obtained maximum methods is not compatible of real time speech signal. So our proposed implementation gives a topological method to formulation of noise problem and real time speech signal processing. Its numerical technique are called of thresholding based DWT (Discrete wavelet Transform). This approach available of multiple decomposition and Composition to reduce of noise level in terms of db.

Strength evaluation of Geopolymer Concrete with C&D Waste
Authors:- Ilamugilan.C, Jerold Gnanaseelan.J, Asst. Prof. Nithyapriya.K, Subash Chandra Bose.S, Suryavarman.R.

Abstract- Global warming and climate change are increasingly threatening issues nowadays and cement industries alone emits 0.8-2 tonne of carbon dioxideper tons annually and the cement production alone estimated to be 1.35 billiontons annually by equating to approximately 5 percent of global total greenhouse emissions. This requires for the alternative construction materials to lessen the carbon emission, and to carry a sustainable development. One such is thegeopolymer concrete, it is the useful invention in the world of concrete and this paper presents the overview of recent advances of geopolymer concrete, a concreteformed organic/inorganic materials using alkaline solution. Which means thecement is totally replaced by pozzolanic material that is rich in silica and alumina that may be natural or artificial, and the alkaline liquid is activated to act as binder in concrete by means of polymerchains. In addition to that C&D waste (Construction and demolition waste) is usedas a partial replacement of coarse aggregate. The studies states that geopolymerconcrete posses the advantages of rapid strength gain, elimination of water curing,good mechanical and durability properties, eco-friendly and sustainable. In the present study C&D waste is used as partial replacement of natural coarse aggregate in geopolymer concrete at 0%, 5%, 10%, 15%, and 20% by weight. The flyash is used as the source material for geopolymer and 16M sodium hydroxide and sodium silicate alkali activators are used to synthesize the flyash geopolymerconcrete. This study is to compare the rapid strength gain of the geopolymer concrete without replacement of coarse aggregate and the geopolymer concrete with the partial replacement of coarse aggregate.

System Dynamic Simulation Modeling for Enhancing Green Environment through Energy Savings
Authors:- Doctoral Research Scholar Rathiga. J, Prof. Dr. Umadevi. G

Abstract- The fundamental stream characteristics are speed, flow, and density. Traffic density it is an important characteristic that engineers can use in assessing traffic performance from the point of view of users and system operators. Speed and travel time are fundamental measurements of a highway’s traffic performance and speed is a key variable in the design of roadway facilities. Some models use speed or travel time as an input for the estimation of fuel consumption, vehicle emissions, and traffic noise. Theoretical model relating fuel consumption, emission, modal split, v/c ratio, LOS, and speed is then developed, using STELLA 9.0.1. The results shows that in desirable scenario, as the percentage of public transport increases, the level of service, V/C ratio and Speed improves. The emission levels have decreased in desirable scenario, when compared to do minimum scenario. This is because, the public (Bus & Auto’s) share is increased, and the private (TW’s & Cars) share is decreased. As well as diesel cars are replaced with CNG cars and diesel bus with CNG bus.

Experimental Study of Strength and Behaviour of Gypsum with Sugarcane Bagasse Ash in Polymer Impregnated Mortar
Authors:- Anto Moses Mukilan A, Arumugam Essaki S, Akash Aravind S

Abstract-The industrial wastes due to their high performance when blended with the building materials generated great impact in the field of structural engineering. Many industries are looking for the cos effective use of their industrial waste. This paper represents the result of an experimental investigation carried out to study the gypsum with sugarcane bag asses’ ash in polymer impregnated mortar. Gypsum and sugarcane bag asses ash are waste materials from various industry. In this report gypsum was partially replaced with three percentages (10%, 20%, and 30%) of bag asses’ ash weight. Gypsum mortar was prepared by in the mix ratio 1:2 control mix mortar. After the initial test is carried out the specimens are casted and cured for 28 days at room temperature. The specimens are immersed in PVA solution for 5 minutes. After that this specimen are dried out and the compressive strength test as well as split tensile strength test is determined.

Application of Big Data in LegalCase Investigation
Authors:- Rahul Dhanji Gupta

Abstract-According to the 2020 report of the National Judicial Data Grid, over the last decade, 3.7 million cases were pending across various courts in India, including district, taluka courts and High courts.With the rapidemergence of information Technologyanddevelopmentin recent years. Many criminal cases have become sophisticated and secret. The Conventional investigation method has been very difficult to cater the demands of the times. With the continuous development of big data, it has been used in multiple domains. The fallowing paper reviews the pros of big data and application in legal context.

Live Video Emotion Detection Using Convolutional Neural Network
Authors:- Bibithamol Baby, Christy Jojy

Abstract-The human face plays an important role in the field of Human Computer Interaction (HCI) for real time applications like driver state surveillance, personalized learning, health monitoring etc. While communicating, only 7% of message is conveyed by spoken words, whereas 38% by tone of voice and 55% effect of the speaker’s message is contributed by facial expressions. Although humans possess various emotions, modern psychology defines seven basic facial expressions: Happiness, Sadness, Surprise, and Fear, Disgust, neutral and Anger as “Universal Emotions”. Most reported facial emotion recognition systems, however, are not fully considered subject-independent dynamic features. So, they are not robust enough for real life recognition tasks with subject (human face) variation, head movement and illumination change. Most of the existing systems use SVM’s and Clustering techniques to train the machine learning model. But these models have a less accuracy as they can’t adapt to live videos. Therefore, we propose to build a model which identifies the human emotions from a real time live video using CNN (convolutional neural networks) which gives more accurate results.

VLSI Architecture of Filter for Image Denoising: A Review
Authors:- Research Scholar Aarti Sharma, Asst. Prof. Shweta Garde

Abstract-Image processing has many of the application in current scenario. During the image capturing or processing, some noise mix with the original image. Due to the noise issue the overall performance down or sometimes it failure. The images pixels mix with these types of the noise signal. There is various filters design which avoids or removes the noise signal. The advancement of the technology is going with the advance ICs processing. The VLSI architecture of filter design is useful in the FPGA ICs for the image processing applications. This paper reviews about the low-cost VLSI architecture of the filter for image denoising.

Survey on Existing Student Management System
Authors:- Prof. Sumesh M.S, Jayanth Ramavarma, Sagar Saji, Sreehari Jeevan, Vinayak Sivaprasad

Abstract- Student Management System is software which is helpful for the students as well as the school authorities. In the current system, all the activities are done manually. So it is very time consuming and costly. In this paper, our main focus is to design a unique Student Management System that will improve Data Management in Institutes experience for both Students and the Administration authorities. The whole system will run on the internet. Users will have the ability to log in from any place with an internet connection. After that they will be able to do various tasks that are designed for them. This design mainly deals with the various activities related to the students.

Research on Image Activity Transformation into Readable Caption Using Deep Learning Algorithm
Authors:- Himaniadiga, Mallikarjunav.R, Mandarab, Mangala S, Prof. Dr. Praveenkumar KV

Abstract- In Recent years, with the rapid development of artificial intelligence, image captionhas graduallyattracted the attention of many researchers in the field of artificial intelligence and has become an interesting and arduous task. Image caption, automatically generating natural language descriptions according to the content observed in an image, is an important part of scene understanding, whichcombines the knowledge of computer vision and natural language processing. the application of image caption is extensive and significant, for example the realization of human computer interaction. This paper summarizes the related methods and focuses on the attention mechanism which plays an important role in computer vision and is recently widely used in image caption generation tasks. Furthermore, the advantages and the shortcomings of these methods are discussed providing the commonly used datasets and evaluation criteria in this field. Finally, this paper highlights some open challenges in the image caption task for a computer to generate context describing the image given as input takes a lot of effort in terms of computation memory usage and processing minute details present in the image. All the great progress has been made in ML, artificial intelligence, deep learning image processing it is always a challenging task for a computer to generate a text describing an image accurately with semantically and grammatically correctsentence.

Analysis of Fake News in a Twitter Data Set for a Food Review
Authors:- M. Tech. Scholar Rema Varma, Asst.Prof. Megha Gupta Jat

Abstract- The current day and age of the internet is characterised by the widespread dissemination of ideas and opinions among users through various forms of social media, including microblogging sites, personal blogs, and reviews. The reviews come from a variety of individuals and include topics such as a particular product, business, brand, person, forums, companies, brands, movies, etc. An important component of text mining is known as sentiment analysis. people’s opinions were analysed and the resulting tweets were categorised as either positive, negative, or neutral. In this paper, work data will be collected from Twitter’s API, and the sentiment of tweets and reviews of published papers will be identified by searching for particular keywords. After that, the polarity of tweets will be evaluated based on the percentage of tweets that are classified as being positive. Negative. Having done so, the data were then input into a supervised model for the purpose of evaluating additional data sets. Methods and technologies related to machine learning are used. Machine learning classifiers such as Naive Bayes (NB), Maximum Entropy, Random Forest (RF), and Support vector machine SVM classifiers are used for testing and training of the data sets, as well as evaluating the Polarity of sentiment of each tweet based on this analysis. These classifiers are used for testing and training of the data sets. Demonstrate that the end product gives us a performance of classifiers that has the maximum accuracy by evaluating the parameters. Utilizing machine learning classifiers such as RF, DTs, and SVM, as well as increasing the amount of tweets, accuracy of feature evaluation will be performed. Using the same process in subsequent studies may allow for the addition of more characteristics that may be used to improve the accuracy of the prediction.

A Look at Some Different Methods of Image Processing That Can Detect Glaucoma
Authors:- M.Tech. Scholar Akanksha Kumayu, Asst. Prof. Lokendra Jat, Asst. Prof. Megha Gupta Jat

Abstract- This review article discusses the use of a variety of image processing methods with the purpose of providing an automated diagnosis of glaucoma. Glaucoma is a neurological illness that affects the optic nerve and may lead to a loss of some of one’s eyesight. Eye problems affect a significant number of individuals in the world’s rural and semi-urban regions, and this is true in every region. The examination of a picture of the retinal fundus using image processing is now the gold standard for diagnosing retinal diseases. Image registration, image fusion, image segmentation, feature extraction, image enhancement, morphology, pattern matching, image classification, analysis, and statistical measures are some of the essential image processing methods for detecting eye illnesses.

Review of E-Mail Spam Filtring Using Machine Learning Classification Technique
Authors:- M.Tech. Scholar Neetu Ahirwar, Reshma Shivhare (HOD)

Abstract- One of the safest methods for online communication and sending data or messages over the internet is email. Along with an excessive rise in popularity, the amount of unwanted information has significantly expanded. There are many methods for filtering data that automatically identify and eliminate these undesirable signals. There are several methods for detecting spam in email, including knowledge-based methods, clustering methods, learning-based methods, heuristic procedures, and others. This study provides an overview of several machine learning techniques (MLTs) for email spam filtering, including Naive Bayes, SVM, K-Nearest Neighbor, Bayes Additive Regression, KNN Tree, and rules. However, in this article, we classify, assess, and compare various email spam filtering systems and provide a summary of the general situation with relation to the accuracy rate of various currently used methods.

A theoretical Model to make the Effective and Novelty Approach to Use the Solar Energy to Generate Electricity and Water Treatment towards the Optimization of Non-Renewable Energies Utilization by Using Magnifying Glass Tetragonal Dipyramid Shape System
Authors:- M.Muthuganesh, S.Baghavathi Babu

Abstract- The effective utilization of renewable energies is not yet achieved to optimize the utilization of non-renewable energy sources because of various difficulties and hurdles to get easy practicable approach systems. By considering the needs of modern techniques to solve this problems and meet the above challenge, we identifying one of the practically applicable novelty approach system to reduce the non-renewable energy utilization with effective utilization of the solar energy to treat the water and produce the electric power by introducing tetragonal Dipyramid magnifying glass dome system. This novelty approach of these duel system of treating water and generating electric power as a combined unit will leads to the technological development in the renewable energy resource utilization.

Review on Utilization and Management of Scrap Steel in Form Construction Fiber Concrete
Authors:- M.Tech. Scholar Aditya Srivastava, Associate Prof. Mr Satish Parihar

Abstract- In the construction of any industry or structure there is a common material used as concrete. And concrete is is used in very huge amount in the construction and industries. Many property of the the concrete like brittleness sometimes fails to bear tensile load which is the cause of brittle failure. Since the fibre have the property to increase the toughness of the concrete. In many experiments it is found that, steel fibre reinforced concrete have high resistance to cracking so the reason behind the increasing uses of steel fibre reinforced concrete to increase the hardness or toughness and to reduce the crack deformation characteristics. So I present this paper for theoretical discussion on the subject of of steel fibre reinforced concrete. And here we discuss use terms and models of behaviour that form ambitious for understanding material performance without mathematical details. Here we shown that flexural strength of steel fibre reinforced concrete is directly proportional to the the steel fibre content and inversely proportional to the water cement ratio. Why the different references from early and old authors are included as a means of tying the subject together along a timeline. In the current time by the historical review to build a background for what is currently understood about steel fibre reinforced concrete.

Performance Analysis of Different Routing Protocols In Mobile Ad-Hoc Networks
Authors:- Ripusudan Vishwakarma , Rajat Saxena

Abstract- MANET stands for Mobile Adhoc Network also called a wireless Adhoc network or Adhoc wireless network that usually has a routable networking environment on top of a Link Layer ad hoc network. A MANET can be defined as an autonomous system of nodes or MSs(also serving as routers) connected by wireless links, the union of which forms a communication network modeled in the form of an arbitrary communication graph. The characteristics of an ad-hoc network can be explored on the base of routing protocols. The dynamic topology is the vital characteristic in which nodes frequently change their position. In the ad-hoc networks, there are mobile nodes such as personal digital assistance (PDA), smart phone and laptops; they have limited operational resources like battery power and bandwidth. We have performs in this paper different routing protocols in mobile ad-hoc networks.

A Review on Utilization of Plastic Waste with Polymer Improvement of Soil Strength Using Geosynthetic Pavement
Authors:-M. Tech. Scholar Shubham Nigam, Associate Prof. Mr. Satish Parihar

Abstract- Geopolymer concrete (GPC) is a new material in the construction industry, with different chemical compositions and reactions involved in a binding material. The pozzolanic materials (industrial waste like fly ash, ground granulated blast furnace slag (GGBFS), and rice husk ash), which contain high silica and alumina, work as binding materials in the mix. Geopolymer concrete is economical, low energy consumption, thermally stable, easily workable, eco-friendly, cementless, and durable. GPC reduces carbon footprints by using industrial solid waste like slag, fly ash, and rice husk ash. Around one tonne of carbon dioxide emissions produced one tonne of cement that directly polluted the environment and increased the world’s temperature by increasing greenhouse gas production. For sustainable construction, GPC reduces the use of cement and finds the alternative of cement for the material’s binding property. So, the geopolymer concrete is an alternative to Portland cement concrete and it is a potential material having large commercial value and for sustainable development in Indian construction industries. The comprehensive survey of the literature shows that geopolymer concrete is a perfect alternative to Portland cement concrete because it has better physical, mechanical, and durable properties. Geopolymer concrete is highly resistant to acid, sulphate, and salt attack. Geopolymer concrete plays a vital role in the construction industry through its use in bridge construction, high-rise buildings, highways, tunnels, dams, and hydraulic structures, because of its high performance. It can be concluded from the review that sustainable development is achieved by employing geopolymers in Indian construction industries, because it results in lower CO2 emissions, optimum utilization of natural resources, utilization of waste materials, is more cost-effective in long life infrastructure construction, and, socially, in financial benefits and employment generation.

Research On Image Activity Transformation Into Readable Caption Using Deep Learning Algorithm
Authors:- Himaniadiga, Mallikarjunav.R, Mandarab, Mangala S, Dr. Praveenkumar Kv

Abstract- In Recent years, with the rapid development of artificial intelligence, image caption has gradually attracted the attention of many researchers in the field of artificial intelligence and has become an interesting and arduous task. Image caption, automatically generating natural language descriptions according to the content observed in an image, is an important part of scene understanding, whichcombines the knowledge of computer vision and natural language processing. the application of image caption is extensive and significant, for example the realization of human computer interaction. This paper summarizes the related methods and focuses on the attention mechanism which plays an important role in computer vision and is recently widely used in image caption generation tasks. Furthermore, the advantages and the shortcomings of these methods are discussed providing the commonly used datasets and evaluation criteria in this field. Finally, this paper highlights some open challenges in the image caption task for a computer to generate context describing the image given as input takes a lot of effort in terms of computation memory usage and processing minute details present in the image. All the great progress has been made in ML, artificial intelligence, deep learning image processing it is always a challenging task for a computer to generate a text describing an image accurately with semantically and grammatically correctsentence.

An Experimental Study on Self Compacting Concrete with Recycled Concrete Aggregate
Authors:- PG Scholar Seethal T M, Asst. Prof. Mr.M.Sadhasivam

Abstract- The usage of natural aggregate is becoming more intense with the advanced development in construction. Recycled aggregate can be used as a suitable replacement for natural aggregate. Recycling of aggregate material from construction and demolition waste may reduce the demand – supply gap and reduce consumption of natural resources. The advance in the pre stressed concrete and multistoried structures has given impetus for making high performance concrete. When the general performance of concrete is substantially higher than that of normal type concrete, such concrete is regarded as high performance concrete (HPC). High- performance concrete (HPC) exceeds the properties and constructability of normal concrete.HPC is usually more brittle when compared with normal strength concrete, especially when high strength is the main focus of the performance. These deficiencies can be overcome by adding fibres. Fibre reinforced concrete has become popular due to its crack arresting mechanism, strengthening property, high energy absorption properties, ductile behavior and post-cracking tensile strength. The aim of this thesis is to study the flexural as well as shear behaviour of fibrere in forced high performance recycled aggregate concrete in beams under monotonic for optimum percentages of fibres.

Smart Pesticide Spraying Robot
Authors:- Prof. Sushma Patwardhan, Mr.Adinath Kadam, Mr.Sourabh kothawale, Ms.Jagruti Kotkar, Mr.Tejas Ghodke

Abstract- pesticide spraying ramble is the device for exact pesticide spraying equipped nebulous shapes and variable article targets. the gadget incorporates a solitary splash siphon engine with a consequently separate flexible spraying utilizing ultrasonic sensors, all mounted on a pan tilt unit. the site-explicit spraying gadget plans to splash explicit targets while diminishing the utilization ofpesticides. the proposed framework includes the advancement of an article explicit sprayer arrangement. Created gadget intends to diminish pesticide application by spraying singular targets explicitly by setting the item separation of the spraying as per the objective. the spraying device is equipped for decreasing the measure of pesticides connected. real reserve funds rely upon the spraying lengths, target size, and appropriation. we trust that such a device can be utilized in present day farming and can be joined with an automated sprayer exploring independently along yield fields. such a gadget will add to decreased pesticide application. the aim of this paper is to create an intelligent spraying robot that will decrease pesticide use andhuman health damage, allowing farmers to be protected and labor intensity can be reduced. the robot will have full route planning and navigation systems, as well as driving control, spraying mechanism and system construction and obstacle avoidance with multi- sensor module integration.

Agriculture Protection from Animals Using Smart Scarecrow System
Authors:- Prof. Harshalata Mahajan, Mr. Jaydeep Farate, Mr. Vishnu Sankpal , Mr. Dhananjay Choudhari, Mr. Purvesh Bokade

Abstract- Subsistence farmers of our country repeatedly encroaching wild habitats so interaction between farmer and wildlife increases resulting into the conflicts. We studied how the pattern of raiding changes according to different seasons, farm land and crop types. A smart scarecrow system is constructed to minimize crop raiding and man animal conflict from wild animals and birds. The scaring system works in three parts: time delay, servo control with flash light and automatic sound system. Depending upon seasonal cropping pattern sound of the system get automatically adjusted using mp3 module. In our study we take samples from different farms combined and observed how object detection vary at day and night in three seasons which gives monthly efficiency of the system. It is more convenient and cost effective than traditional scaring strategies like trapping, hunting and wood fencing. No manpower is required for scaring. The present system is made up of metal body so it can work in worst climate conditions.

Power Grid Failure Detection System using Arduino
Authors:- Dr.B. Durai Babu, Samera Salim Sulaiman Al-Saadi, Badour Majid Salim Mohammed Al-Azri

Abstract- Recent advancement in power system made possible to deliver electrical energy from the power station to the consumer through big network of transmission and distribution. To supply power there are several power units connected to the grids. For the proper operation we must provide consumers with constant voltage and frequency. In this project we have designed a system to sense abnormalities in voltage and frequency in order to detect the synchronization failure in power grids. To maintain the power quality and frequency of the grid voltage synchronization technique plays a vital role. In our project we used PLL (Phase Locked Loop) synchronization technique for grid integration. In this project, we have designed and developed a system for monitoring and measuring voltage and frequency so that these parameters are maintained within limits. If any deviation from the acceptable limit feeder should be disconnected from the grid so that black out of power can be avoided. So, we developed a system which warn the grid in advance so that alternative arrangement can be done to avoid complete grid failure. Arduino monitors the under/over voltage received from the comparators and lamp load is used to predict the blackout incase voltage/frequency going out of acceptable range.

Online Car Parking Application Using GPS Mapping
Authors:- Tanishq A. Injal,Shweta V. Jadhav,Ankita A. Madakari,Shivani N. Nimbalkar, Asst. Prof. Mrs. P. G. Sanmane

Abstract- Online Car Parking application using GPS mapping is an application built to book parking slots by allotting free parking slots. This application is to reduce the traffic in parking slots.In the multiplexes, cinema halls, large industries, shopping-malls, and function halls there is problem, that people have to go and search for free space to park the vehicle. Hence for parking, man power is required for parking vehicles in correct slot and its money consuming process. Also, when people park their vehicles in no parking zones their vehicles are taken away by towing vans and they have to pay the penalty. This problem can be solved by providing people a platform to easily book their parking slots before going on roads with this online parking slots booking application.

Wavelet Compression Techniques for Video Data Using Bit-Plane Complexity Segmentation
Authors:- Ismail Hassan Farah, Dr. K. Juliana Gnanaselvi

Abstract-This project presents a steganography method using lossy compressed video which provides a natural way to send a large amount of secret data. The proposed method is based on wavelet compression for video data and bit-plane complexity segmentation (BPCS) steganography. In wavelet based video compression methods such as 3-D set partitioning in hierarchical trees (SPIHT) algorithm and Motion-JPEG2000, wavelet coefficients in discrete wavelet transformed video are quantized into a bit-plane structure and therefore BPCS steganography can be applied in the wavelet domain. 3-D SPIHT-BPCS steganography and Motion-JPEG2000-BPCS steganography are presented and tested, which are the integration of 3-D SPIHT video coding and BPCS steganography, and that of Motion-JPEG2000 and BPCS, respectively. Experimental results show that 3-D SPIHT-BPCS is superior to Motion-JPEG2000-BPCS with regard to embedding performance. Steganography is the art and science of communicating in a way which hides the the existence of the secret message communication. It aims to hide information/covered writing. Information to be protected is hidden in another data known as cover or carrier. Data containing hidden message are called as Stefano’s or Stegos. Steganos look like cover data and it is difficult to differentiate between them. Steganography based communication over easily accessible platforms to prevent leakage of information.

Influence of Wood Fiber On The Performance Of Stone Matrix Asphalt Using Slag As Aggregate Replacement
Authors:- Pusapatri Venu , K.Sreekar Chand

Abstract-Stone grid black-top , was most importantly evolved in 1960 in Germany which currently generally assists in giving a more noteworthy long-lasting twisting obstruction, strength to surfacing materials, longer help life, worked on maturing ,high opposition in breaking, weakness, wear, better pallet opposition and like in diminishing with noising. It is a hole evaluated combination of totals which helps by boosting the black-top concrete substance and parts of coarse total . It is a steady, groove safe blend and extreme which depends on total contact for giving strength . Alongside rich mortar cover it gives better strength. The SMA test is ready by blending coarse total, fine total , filler according to the degree diagram given by the standard code while utilizing stabilizer and without stabilizers. . A fiber that is promptly accessible in nature. less practical contrasting with other non regular filaments has been utilized as stabilizer. It is Bamboo fiber, which is cellulose fiber separated from normally accessible Bamboo stem. It has high strength in fiber heading, more prominent pliable, flexural and influence strength. Slenderness level of fiber can without much of a stretch be gotten from it. It is sturdy in nature, has relentlessness and great soundness esteem. An endeavor has been made to figure out its appropriateness in expanding the steadiness and stream esteem in the combination of Stone Matrix Asphalt Mixes. For this undertaking, we have arranged SMA blends involving stone as coarse total, slag in halfway substitution of coarse total and utilized various stabilizers and have attempted to look at the outcomes at a differing bitumen content of 4,5,5.5,6,7 % bitumen. The stabilizers were utilized at an ideal of 0.3% of the heaviness of test.

Review of Under Water Communication
Authors:-Babita Suryavanshi, Er. Lokendra Jat, Er. Megha Gupta Jat

Abstract- This essay offers a clear and comprehensive overview of the directions that our research on the topic of underwater sensor networks will go in the future. In this article, we explore the potential applications of underwater robotics, equipment monitoring, and seismic monitoring in offshore oil fields. In this paper, we examine the future opportunities for research in the fields of MAC, short-range acoustic communications, localization protocols and time synchronisation for high-latency acoustic networks, application-level time scheduling, and long-duration network sleeping.

Developing Autonomous Luggage System Using Arduino
Authors:- Pradeep Saroj, Rahul Varma

Abstract- People in the world today use many modes of transport to travel from A to B in the shortest amount of time. Traveling with luggage is always important.Each piece of luggage has its own meaning, function and practicality. We all experienced frustration with carrying luggage while traveling. It is a time-consuming process that contributes to our fatigue and road difficulties. The idea of the Autonomous Baggage project is to prevent the suitcase from being pushed away. To do this, we will create an autonomous baggage system that can successfully track users by bypassing obstacles and sending coordinates from mobile phones. Baggage will track you. Arduino UNO is used to integrate all the electronic components used in the project. In addition, we will introduce a new luggage function that is easier and more convenient to use.

Design and Fabrication Of Semi Automated Areca Nut Collecting Machine
Authors:- Priya S, Shubham S Naik, Sneha E S, Sushma G, Dr.Usha Rani, Dr.Swetha Rani

Abstract- The Indian economy most desperately needs the field of agriculture. The areca palm, which grows in Coorg, Shivmoga, and some locations in Karnataka, produces the areca nut as its seed. Areca nut automatically falls to the ground as a result of wind and heavy rain. The main issue encountered when collecting areca nuts from the ground is that it takes a lot of labour and takes a long time. We put in place a machine for digging up areca nuts to solve this issue. For identifying areca nuts, the Raspberry Pi can be used with openCV. The areca nut is extracted from the ground using a robotic arm. There are numerous machines available for drying, separating, and scraping areca nuts. This essay investigates the notion of gathering areca nuts.

Intelligent Traffic Controlling and Assisting Road Divider
Authors:- Yaseen B S, Syed Saif, Shyam Sunder Tiwari, Sufiya Kouser, Asst.Prof. Victor Jeyaseelan D

Abstract- Road Divider is generically used for dividing the road for ongoing and incoming traffic. This helps in easy flow of traffic; generally, there is equal number of lanes for both ongoing and incoming traffic. The problem with Fixed Road Dividers is that the number of lanes on either side of the road is fixed. Since the resources are limited and population as well as number of vehicles increasing day by day, there is significant increase in number of vehicles on roads. This calls for better utilization of existing resources like number of lanes available. For example, in any city, there is industrial area or shopping area where the peak traffic generally flows in one direction in the morning or evening hours. The other side of Road divider is mostly either empty or much underutilized. This is true for peak rush hours. These results in loss of time for the vehicle owners, traffic jams, time consuming as well as underutilization of available resources. Our aim is to create a mechanism of automatic road divider that can shift lanes, so that we can have desirable number of lanes in the direction of the rush. The collective impact of the time and fuel that can be saved by adding even one extra lane to the direction of the rush will be significant. And also detecting traffic rules violations and giving priority to emergency vehicles with speed breaker deactivation if any so that the whole roadway system is utilized efficiently and effectively .

To Provide Security for Database Using Encryption and Decryption
Authors:- Asst. Prof. M.Thangamani M.Sc, M.Phil, B.Ed

Abstract- Encryption is the process of transforming information from an unsecured form or Plain Text into coded information or Cipher Text, which cannot be easily real by strangers. An algorithm and key. control the entire transformation process. This process may be reversible, so that the intended recipient can return the information to its original readable form. But reversing the process, without the appropriate encryption information is not possible. This means that the details of the key must also be kept secret. The use of cryptography in daily life is growing immensely. This is due to the necessity for hiding the content from unauthorized person. As the days pass by the old algorithms used in crypiography may not remain as strong as it was before Hence, the cryptanalysts suggest new algorithms for the same. Currently the computers are faster and in future its speed will also increase rapidly Brute force attacks are made to bereak the encryption and are emerging faster. These attacks are the main drawbacks for the older algorithms. In future these algorithms will be replaced by new algorithms that will enhance a better protection. In this investigation, a new encryption technique is proposed, which is more faster, better immune to attacks more complex, easy to encrypt and many more advanced security features are comprised. Encryption can also provide strong security for data, but developing a database encryption strategy will take many factors into consideration “Combination of encryption and decryption for secure communication” is an application which combines both encryption and decryption techniques, to make the communication more secure. It is concerned with embedding information in a secure and robust manner. Providing security speedily is the aim of this investigation, Relational databases are very important in satisfying today’s infirmation needs. This investigation provides a method to provide security by using encryption algorithm which is alone sufficient to protect the same.

Object Detection Deep Learning Using Yolo, Darknet
Authors:-Dharun Kumar, Premnath. S

Abstract- Picture characterisation stands out enough in the field of computer vision to be noticed. Over the last few years, there has been a lot of research done on picture characterisation using traditional AI and deep learning techniques. Deep learning-based techniques have yielded astounding results thus far. Despite the fact that various deep learning-based methods have demonstrated excellent picture sorting performance, deep learning methods are unable to separate all significant data from the image due to a variety of difficulties. As a result, characterization precision was significantly reduced. The goal of the current study is to improve image classification performance by combining deep features extracted using the popular YOLO deep convolutional neural network. From the experiment, we achieved an accuracy of 94.51 percent.

Dense Graph Sequences and Its Limits
Authors:- Asst. Prof. R. Sujatha

Abstract- We show that if a sequence of dense graphs Gn has the property that for every fixed graph F , the density of copies of F in Gn tends to a limit, then there is a natural “limit object,” namely a symmetric measurable function 𝑊 = [0,1]2 → [0,1] . This limit object determines all the limits of subgraph densities. We discuss about weighted graphs and homomorphisms. We restrict our attention to positive real weights between 0 and 1. An edge with weight 0 will play the same roles as no edge between those nodes, so we could assume that we only consider weighted graph is obtained by replacing the 1’s in the adjacency matrix by the weights of the edges. We consider graph sequence we need not assume that the number of nodes tends to infinity. We could always achieve this without changing the limit. We also characterize graph parameters that are obtained as limits of subgraph densities by the “reflection positivity” property, along the way we introduce W-random graphs and some simple properties and lemma.

Movie Recommendation Using Machine Learning
Authors:- Shivani Chowdhary, B. Kalyan, V. Gnanavathi, U.V.Rambai

Abstract- The recommendation system plays an essential role in the modern era and used by many prestigious applications. The recommendation system has made the collection of apps, creating a global village, and growth for abundant information. This paper represents the overview of Approaches and techniques generated in the Collaborative Filtering based recommendation system [1]. The recommendation system derived into Collaborative Filtering, Content-based, and hybridbased approaches. This paper classifies collaborative filtering using various approaches like userbased recommendation, item-based recommendation. This survey also tells the road map for research in this area. We extract aspect-based specific ratings from reviews and also recommend reviews to users depends on user similarity and their rating patterns. Finally, validating the proposed movie recommendation system for various evaluation criteria, and also the proposed system shows better result than conventional systems.

Grid to Vehicle and Vehicle to Grid Energy Transfer Using Three -Phase Bidirectional AC-DC Converter
Authors:- Lokesh Kumar Sharma, Bhanu Pratap Soni, Ankit Kumar Sharma

Abstract- Chargers must be efficient so that electric cars (EVs) and plug-in hybrid electric vehicles (PHEVs) can be charged at the right rate as they become more popular. It would also make charging more expensive, because more people would use the traditional power grid. It’s because of this that more people are going to use local, renewable sources of energy instead. PV panels, which convert sunlight into electricity, can be added to the traditional power grid. As well wind converter designed to convert the energy of wind movement into mechanical power this could make the traditional grid more efficient. A place to recharge in this thesis, PV and the grid are used to power EV loads. However, Because of the PV’s intermittent nature, which is very dependent on where you live and the weather, it is well-known that it isn’t very stable Conditions. To make up for the PV’s inconsistency, a battery storage system is used. An electric car charging station powered by solar panels and wind that are part of a system that is connected to the grid. Most of the time, hybrid charging stations are supposed to be, efficient, and safe to use. The needs of electric vehicles in a variety of situations by giving them more options. This thesis talks about how to be more efficient at the top. PV power generation on site is planned and implemented to meet the needs of the project. Using BSS, electric cars can have a more varied load, which lessens the strain on the grid. This method works. Improves overall performance, reliability, and cost by a lot. Efficiency in converting power in both directions interleaved buck-boost converters are added to BSS to make sure it works. By using BSS, conversion losses can be kept to a minimum. This structure could help to reduce the waves that are already there. Electricity will be better if you improve its quality to get the most out of a PV system while keeping it as environmentally friendly as possible. MPPT and an interleaved boost converter are used when the weather isn’t always clear. This way, the output stays the same. PV power will always be available. In the same way, to deal with the changing power needs of car chargers, Converters should be put together in a way that meets the needs of electric cars while also keeping the balance between the levels of power that can be generated.

Experimental Investigation on Mechanical Behaviour of Rice Straw- Jute – Coconut-Palm Fibres – Reinforced Epoxy Natural Composite Material
Authors:- Asst. Prof. Gosula Suresh, Research Scholar Manda Ranjith Kumar, M. Keshav Prasad, M. Shiva Kumar, M. Nagesh, Ch. Ranjith Kumar

Abstract- Rice-Straw-jute-Coconut-palm-Fibres is being used as a reinforcement material in the development of reinforced plastics for various engineering applications. Its biodegradability, low cost, and moderate mechanical properties make it a preferable reinforcement material in the development of polymer matrix composites. Therefore, Rice-Straw-jute-Coconut-palm-Fibres reinforced composites have replaced the most widely used synthetic fibre (glass, kevlar) reinforced composites in many applications. In the present experimental endeavor, Natural fibre reinforced composites were prepared using Vacuum bagging process. The effect of the weight percentage of the trio fibre reinforcement was investigated experimentally on the mechanical properties of the developed composites. The mechanical properties were tested using computerized UTM machine as per the ASTM standards. Scanning Electron Microscope (SEM) have been utilized to fully understand the mechanical behaviour of developed composites. The results reveal that, the mechanical properties of Rice-Straw-jute-Coconut-palm-Fibres based composites are substantially improved on account of the addition of the Jute fibre reinforcement. It has also been observed that the significance of the enhancement of the mechanical properties increased as the weight percentage of the Jute fibre reinforcement increased.

A Semantic Knowledge for Distributed Smart Environment
Authors:- Yeduguri Himani, Pathakota Akhila Sai, Nayuni Guna Eswar Prakash, Poojari Sai Ashmith

Abstract- Intelligent functionality is provided to every objects with the help of wireless sensors by the internet. Since the past few years, all are facing some problems to develop effective and intelligent protocols to integrate a large number of smart objects in distributed computation environments. However, the main difficulty for smart and distributed system designers lies in the combination of a huge number of heterogeneous components for rapid, low cost, and effective functionalities. In this article, we are going to propose semiology and intelligent based framework on the Garbage bins to provide the perfect service by connecting the sensors to the garbage bin, from these sensors collect the information from the bins within less time.

Developing A Master Plan For Tribal Hamlet
Authors:- PG Student Hanna , Prof. A. Kumar

Abstract- The project is concerned with developing a master plan for an “Adivasi” hamlet. The hamlet under consideration is Vellakulam ooru in Attappady in Mannarkad taluk, Palakkad district. A socio- economic survey was conducted to collect the necessary data for assessment and planning. The topographical details and details of existing buildings were collected through relevant surveys. On the basis of collected data site plan of the hamlet was prepared. A complete master plan of hamlet for the development of hamlet is proposed, which encompasses the provision of well-designed habitats, water supply, sanitation, transportation and other public amenities. A rough estimate of all the proposed works is also presented.

An Experimental Study on Self Compacting Concrete with Recycled Concrete Aggregate
Authors:- PG Scholar Seethal T M, Asst. Prof. Mr.M.Sadhasivam

Abstract- The usage of natural aggregate is becoming more intense with the advanced development in construction. Recycled aggregate can be used as a suitable replacement for natural aggregate. Recycling of aggregate material from construction and demolition waste may reduce the demand – supply gap and reduce consumption of natural resources. The advance in the pre stressed concrete and multistoried structures has given impetus for making high performance concrete. When the general performance of concrete is substantially higher than that of normal type concrete, such concrete is regarded as high performance concrete (HPC). High- performance concrete (HPC) exceeds the properties and constructability of normal concrete.HPC is usually more brittle when compared with normal strength concrete, especially when high strength is the main focus of the performance. These deficiencies can be overcome by adding fibres. Fibre reinforced concrete has become popular due to its crack arresting mechanism, strengthening property, high energy absorption properties, ductile behavior and post-cracking tensile strength. The aim of this thesis is to study the flexural as well as shear behaviour of fibrere in forced high performance recycled aggregate concrete in beams under monotonic for optimum percentages of fibres.

Rings in Which Elements Are Sums of, Tripotents and Its Idempotents
Authors:- Asst. Prof. S. Bhuvaneswari

Abstract- we completely determine the rings for which every element is a sum of a tripotent, and a idempotent that commutative with one another, and the rings for which every element is a sum of a tripotents and two idempotent that commutative with one another. Here are all the possible meanings and translations of the word tripotent. Relating to or being a mathematical quantity which when applied to itself under a given binary operation (such as multiplication) equals itself also: relating to or being an operation under which a mathematical quantity is idempotent. We study the class of rings R with the property that for x ∈ R at least one of the elements x and 1 + x are tripotent. We prove that a commutative ring has this property if and only if it is a subring of a direct product R0 × R1 × R2 such that R0/J(R0) =∼ Z2, for every x ∈ J(R0) we have x2 = 2x, R1 is a Boolean ring, and R3 is a subring of a direct product of copies of Z3.

Experimental Study on Underground Water Quality in Coimbatore Dump Yard Area
Authors:- J Akash, L Sivanesh, R Sriram

Abstract- Underground water is a precious natural water resource considered as a readily available and safe source of water for domestic, agriculture and industrial uses. In Coimbatore, underground water is being contaminated because of numerous human activities. Improper solid waste management is one amongst the major sources of environmental pollution deteriorating underground water quality around landfill sites. In this view, the current study was conducted to determine the impact of the existing landfill site on the quality of subsurface water in Vellalore. So as to realize this nine underground and one pool water samples from various distances around the dump site were analyzed. Parameters analyzed are color, odour, turbidity, pH, TDS, BOD, COD, DO, total hardness, nitrate, chloride, alkalinity. Results revealed that concentration of all the parameters apart from pH scale, are unit moderate than acceptable limits for safe drink. The distance from the dump site has an impact on the quality of subsurface water. Overall, underground water is imprinted contaminated because of existing landfill site in this study area. Therefore, the municipal solid waste in this space is nice in method. As a result, there are no consequences in groundwater.

Hybrid Power Systems Energy Management Based on Artificial Intelligence Using ANN Controller
Authors:- Sachin Verma, Asst. Prof. Mrs. Namrata Nebhnani, (HOD) Dr. Manish Sahajwani

Abstract- Due to the fact that solar and wind power is intermittent and unpredictable in nature, higher penetration of their types in existing power system could cause and create high technical challenges especially to weak grids or stand-alone systems without proper and enough storage capacity. By integrating the two renewable resources into an optimum combination, the impact of the variable nature of solar and wind resources can be partially resolved and the overall system becomes more reliable and economical to run. This paper provides a review of challenges and opportunities / solutions of hybrid solar PV and wind energy integration systems. Voltage and frequency fluctuation, and harmonics are major power quality issues for both grid-connected and stand-alone systems with bigger impact in case of weak grid. This can be resolved to a large extent by having proper design, advanced fast response control facilities, and good optimization of the hybrid systems. The paper gives a review of the main research work reported in the literature with regard to optimal sizing design, power electronics topologies and control. The paper presents a review of the state of the art of both grid-connected and stand-alone hybrid solar and wind systems.

Experimental Investigation On Behavior Of Box Girder Bridge
Authors:- Sachin Verma, Asst. Prof. Mrs. Namrata Nebhnani, (HOD) Dr. Manish Sahajwani

Abstract- Bangalore metropolis, the silicon valley of India, has experienced phenomenal growth in population in the last two decades. So, to meet the traffic demands, Metro Rail Transport started. Bangalore Metro Rail Corporation; is constructing some phase of Metro Rail to be of elevated one. There are different structural elements for a typical box girder bridge. The present study focus on the parametric study of single cell box girder bridges curved in plan. For the purpose of the parametric study, five box girder bridge models with constant span length and varying curvature. In order to validate the finite element modeling method, an example of box girder bridge is selected from literature to conduct a validation study. The example box girder is modeled and analyzed in SAP 2000 and the responses are found to be fairly matching with the results reported in literature. For the purpose of the parametric study, the five box girder bridges are modeled in SAP2000. The span length , cross-section and material property remains unchanged. The only parameter that changes is the radius of curvature. The cross section of the superstructure of the box girder bridge consists of single cell box. The curvature of the bridges varies only in horizontal direction. All the models are subjected to self weight and moving load of IRC class A tracked vehicle. A static analysis for dead load and moving load, and a modal analysis are performed. The longitudinal stress at top and bottom of cross sections, bending moment, torsion, deflection and fundamental frequency are recorded. The responses of a box girder bridge curved in plan are compared with that of a straight bridge. The ratio of responses is expressed in terms of a parameter. From the responses it is found that; the parameters like torsion, bending moment, and deflection is increasing as curvature of the bridges increase.

A Review on Automatic Fruit Plucking and Sorting Using Image Processing
Authors:- Soumya Tummaraguddi, Prakruthi R T, Tejaswini Anand, Sharathchandra C, Mr shivayogappa H J

Abstract- An emerging area of research that combines ma chine intelligence and computer vision is automated or robot assisted harvesting. This study can be applied to the picking and sorting of fruits to provide a more rapid production chain. This essay will examine common fruit classification and auto harvesting techniques. Sorting is the action of placing objects in a methodical order. In the wholesale market and food processing industries, manual fruit sorting is favoured depending on several factors like size, shape, quality, etc. However, it is a laborious, ineffective, and erratic approach. The market’s current methods can sort a single fruit based on one or more criteria. The pro posed system offers an automatic fruit sorting mechanism using an image processing methodology to replace this conventional method of sorting.

A Review on IOT Based Wheel Chair Fall Detection
Authors:- M. Tech. Scholar Teena Sachdeva , Asst. Prof. Ms. Rachna

Abstract- The purpose of this article “IOT BASED WHEEL CHAIR FALL DETECTION” is to discuss that we know that people with disabilities and older people need a wheelchair and elderly people are more prone to fall than we usually anticipate. These falls often lead to injuries and sometimes even lead to death. As elders are more vulnerable, it is important to monitor their old ones for their health and safety. Due to weakness and weak joints, they have a great risk of falling down. Now it is important to know if an old person has fallen so that they can be helped on time. So, it has become an urgent need to devise a system to alert the people nearby and attract the help that is directly needed in situations like these. The purpose of this project is to provide the necessary help through a device that would detect the fall through a series of sensors and send an alert message to a mobile device without any delay.

Genetic Algorithm Based Routing of IOT Network
Authors:- Research Scholar Shailendra Kumar Tiwari, Asscoiate Prof. Dr.Ravindra kumar Tiwari

Abstract- Smart devices in human life brings Internet of Things in day to day uses. Routing in such network should be efficient and energy effective, as devices depends on battery. Such network are optimized by various approaches, out of different methods routing based IOT network is an effective solution. This paper has proposed a genetic algorithm that finds the path based on Biogeography genetic algorithm. Paths were filter by estimating the fitness on the basis of node spectrum utilization. Such nodes are filter by into two class real and other is malicious. Malicious nodes are identified by the Adamic Adar function. Experiment was done on different environment and results shows that proposed model has increases the work performace.

Performance of PAPR Reduction in OFDM Based Wireless Communication using OICF system
Authors:- Mr. Pankaj Anare, Prof. K. K. Sharma

Abstract- Orthogonal frequency division multiplexing has emerged as a leading candidate for a key technology in a variety of wireless communication systems in recent years. In particular, OFDM has been accepted as a standard for a variety of wireless communication systems, including DAB and DVB, wireless local area networks, wireless metropolitan area networks, and wireless local area networks. In this article, we have covered a variety of topics concerning PAPR, including reduction approaches and a discussion of PAPR concerns. The power amplification product ratio, or PAPR, is defined as the relation between the maximum powers of a sample in a particular OFDM transmits symbol and the average power of that OFDM symbol. PAPR is triggered if a multi-carrier system has sub-carriers that are out of phase with one another. The simulation results show that our proposed power reduction technique OICF was proposed to reduce the high Peak to Average Power Ratio values. The Simulations are performed using the OICF technique with modulation technique under both Additive White Gaussian Noise channels. The simulation result shows the relationship between Complementary Cumulative Distribution Function versus PAPR. The simulation is performed by MATLAB R2013a.

Detection of Plant-Leaf Diseases with the Application of Deep Learning Techniques: A Review
Authors:- M. Tech. Scholar Punam Solanki, Asst. Prof. Ramiz Sheikh

Abstract- In India, a considerable proportion of the population relies on agriculture as their primary source of income, as well as meeting one of the fundamental requirements for human survival. Agriculture is an essential component in the economic development of many nations. The harvest is contaminated with a wide variety of diseases due to the varied weather and environmental conditions that exist there. In the early phase of the disease, it is possible to see the majority of symptoms on the plant’s leaves; nevertheless, the disease will ultimately affect the whole plant, which may result in less crop yield. The diagnosis of diseases in plants is an essential step in reducing production losses in the agricultural sector and improving the overall quality of food and other products derived from agriculture. When there are a large number of plants in a field, it may be challenging to recognise illness and to identify specific plant breakdowns from natural eye observation in agricultural settings. It is essential to do checks on all crops in order to prevent the illness from spreading over a vast area. It is essential to have precise sickness diagnosis and control measures in order to prevent disease in its early stages in order to maintain superior product quality while simultaneously increasing production levels. This recommended model will be AI-based software for the detection of crop leaf infections, which will make the diagnostic process more expedient and straightforward. Subsequently, it will evaluate this information and generate solutions that are foreseeable with the goal of preventing enormous crop cultivation loss. This strategy seeks to increase the profitability of farming by increasing the value of the crops produced. In this model, we are required to perform a number of operations, including the collecting of image data sets, the pre-preparation of the data, the selection of features from the leaf image, the evaluation, and the categorization of diseases.

Automatic Fertigation System
Authors:- Prof. Yayati Shinde, Saurabh Parhyad, Aditya Lohakare, Ditij Nandgaonkar, Sanyukta Bankar, Dr. Sandhya D. Jadhav

Abstract- Fertigation is that the strategy of delivering plants nutrients beside water to supply a high-grade crop with higher yields. victimization associate degree automatic fertigation system can facilitate farmers by significantly rising water and nutrient usage. the target is to automatically maintain the condition level at intervals the soil and to mix totally different nutrients to urge the desired NPK quantitative relation and provides it to plants beside irrigation. This work is assigned in a pair of components. One is maintaining the optimum level of condition at intervals the soil. A soil condition detector that senses the condition content at intervals the soil is used. The detector output is given to the controller, which decides if further water should be tense up or not. Then an effect system for the chemical combination and delivery 0.5 is meant. The user can give the input in terms of what amount of N, P and K is needed in kg. The user conjointly can input the concentrations of NPK chemical solutions used. Taking of those parameters into thought, the system will prepare a chemical mixture that contains the required amount of nutrients needed by the plant. it’ll then deliver the mixture beside irrigation water. The preparation of chemical mixture area unit finished specific intervals of some time which is ready to be set by the user. The system is connected to web by exploitation Wi-Fi and conjointly the user can enter the parameters in an exceedingly} very mobile application that is ready to transmit the data to the system over net.

Students Activities and Behavior Prediction in Online Exams Using Resnet50 Deep Learning Model
Authors:- Amit Shukla, Aditi Khemariya(HOD)

Abstract- This research focuses on current issues in online assessments, which are especially relevant during the Covid-19 pandemic. Our focus is on academic dishonesty associated with online assessments. We investigated the prevalence of potential e-cheating using a case study and propose preventive measures that could be implemented. We have utilized an e-cheating mechanism for detecting the practices of online cheating, which is composed ResNet50 deep learning technique. The behavior of the students and has the ability to prevent and detect any malicious practices. It can be used to assign randomized multiple-choice questions in a course examination and be integrated with online learning programs to monitor the behaviour of the students. The proposed method was tested on various data sets confirming its effectiveness. The deep neural network ResNet50 model achieved accuracy of 95.12 percent.

A Review on Optimization Of Process Parameters In Extrusion Of aluminium Alloy
Authors:- M.Tech. Scholar Atul Kumar, Prof. Mayank Mishra

Abstract- Recently, extrusion processes have been used to make a wide range of metal products, including bars and tubes and strips and solid and hollow profiles, that are usually long, straight, semi-finished metal products. In order to govern the extrusion parameters, it is also critical to understand the history of the process reactions. Prior to the experimentation, a finite element analysis of extrusion was used to predict the performance.Friction between the die and the blank can have a significant impact on numerous process parameters during extrusion. It is preferable to run the lathe at a modest pace to avoid overheating the blank owing to friction and distortion. It causes the blank to heat up too quickly. Inefficient use of memory resources results in higher operating costs and a longer time to complete tasks. A review has been done on optimization of process parameters in extrusion of aluminium alloy.

Leveraging AI to Optimize Oracle EM Ops Center Operations

Authors: Lakshmi Menon, Aravind Krishnan, Ramya K, Vineeth Das

Abstract: Modern IT environments, characterized by hybrid infrastructure, rapid virtualization, and regulatory constraints, demand sophisticated systems management platforms that go beyond manual operations. Oracle Enterprise Manager Ops Center (OEMOC) has long served as a unified platform for provisioning, patching, asset discovery, and monitoring in Oracle Solaris and Linux-based data centers. However, as operational complexity scales, traditional rules-based workflows face limitations in managing configuration drift, correlating events, and predicting performance degradation. This has prompted a shift toward integrating artificial intelligence into Ops Center’s telemetry and operational lifecycle. This review explores the application of AI and machine learning techniques to optimize various facets of OEMOC. From predictive asset discovery and patch prioritization to real-time anomaly detection and resource planning, AI offers the potential to transform the platform into a proactive, self-optimizing system. The review evaluates supervised, unsupervised, and reinforcement learning models that can be trained on logs, asset data, and historical events collected across Enterprise Controllers and Agent Controllers. Specific emphasis is placed on using time series forecasting for utilization prediction, clustering techniques for configuration drift detection, and NLP algorithms for intelligent alert triage. Additionally, the review delves into the architectural integration of AI pipelines with OEMOC components, the use of SNMP, syslog, and ITSM APIs for external telemetry fusion, and case studies from financial, government, and telecom deployments. The article also addresses challenges related to model explainability, data governance, and integration within legacy environments. In doing so, it outlines a roadmap for enhancing Ops Center with intelligent automation, turning it from a monitoring tool into a closed-loop operations platform capable of dynamic remediation and resource optimization.

DOI: https://doi.org/10.5281/zenodo.15846496

Reimagining Personalized Healthcare With AI-Driven Diagnostics, Monitoring, And Treatment Planning

Authors: Raghavendra Duvvuri

Abstract: The convergence of wearable technology and artificial intelligence is transforming the landscape of physical and mental wellness. Modern wearables collect a wide range of biometric data—such as heart rate, sleep quality, and stress indicators—while AI systems analyze this data to generate real-time, personalized insights. These intelligent feedback loops help users make informed decisions about their activity levels, recovery needs, sleep hygiene, and emotional well-being. By continuously adapting to the user’s habits and physiological trends, AI enhances behavior change, supports mental resilience, and promotes preventive self-care. While challenges such as data privacy, sensor accuracy, and user dependency remain, the long-term potential for AI-driven wellness systems is vast. As wearable tech becomes more advanced and integrated with broader healthcare ecosystems, it paves the way for predictive, adaptive, and personalized health management that is proactive rather than reactive. This article explores how AI-enhanced wearables empower individuals to take control of their health through data-driven, sustainable lifestyle changes.

DOI: http://doi.org/10.5281/zenodo.16742346

Reinventing Retail Through AI-Driven Personalization, Demand Forecasting, And Inventory Optimization

Authors: Priya Gopalakrishnan

Abstract: This article explores how artificial intelligence (AI) is revolutionizing the retail industry by enhancing personalization, demand forecasting, and inventory optimization. It discusses the limitations of traditional retail approaches and illustrates how AI enables data-driven strategies that improve customer engagement, operational efficiency, and profitability. By leveraging technologies such as machine learning, natural language processing, and predictive analytics, retailers can deliver customized experiences, anticipate market demand with greater accuracy, and optimize stock levels across supply chains. The article also outlines practical implementation strategies, highlights measurable business impacts, and offers a forward-looking perspective on the future of AI in retail.

DOI: http://doi.org/10.5281/zenodo.16742080

Revolutionizing Decision-Making In Enterprises With AI-Augmented Analytics And Real-Time Dashboards

Authors: Harish Kumaran

Abstract: This article explores how AI-augmented analytics and real-time dashboards are transforming enterprise decision-making. As businesses face increasing complexity, data overload, and the need for instant responsiveness, traditional analytics methods fall short. AI-driven analytics enhances decision-making by automatically uncovering patterns, generating forecasts, and offering prescriptive recommendations, while real-time dashboards provide live visibility into key metrics and operations. Together, these technologies empower organizations to act with speed, precision, and agility. The article covers their core capabilities, integration strategies, implementation challenges, and the evolving role they play in modern business environments. It also looks ahead to the future of enterprise intelligence—where decisions are increasingly autonomous, collaborative, and insight-driven.

DOI: http://doi.org/10.5281/zenodo.16742123

Scaling Your Side Hustle With No-Code AI: From Passion Project To Intelligent Business

Authors: Revathi Bommakanti

Abstract: In today’s creator economy, side hustles are evolving into scalable, revenue-generating ventures. However, many solo entrepreneurs struggle to grow due to limited time, resources, and technical skills. This article explores how no-code AI tools empower side hustlers to automate repetitive tasks, analyze business data, and optimize performance—without needing to write a single line of code. From content generation and customer engagement to sales forecasting and financial tracking, no-code platforms are transforming how small businesses operate. Through practical tools, real-world examples, and common pitfalls to avoid, this guide offers a blueprint for turning passion projects into intelligent, self-sustaining businesses. By strategically integrating AI from the start, side hustlers can build smarter systems, make data-driven decisions, and free up time to focus on creativity, growth, and impact.

DOI: http://doi.org/10.5281/zenodo.16742147

A Review Of Big Data Frameworks In Healthcare IT

Authors: Tanira Poddar

Abstract: The exponential growth of healthcare data, driven by electronic health records (EHRs), medical imaging, wearable sensors, genomic sequencing, and real-time monitoring systems, has resulted in unprecedented opportunities for transforming medical care. Big data frameworks provide the computational backbone to store, process, analyze, and visualize these massive, heterogeneous datasets. Their applications extend from early disease prediction and personalized medicine to hospital workflow optimization, fraud detection, and population health management. However, integrating big data solutions in healthcare presents challenges such as data privacy, fragmented systems, interoperability issues, and resource-intensive infrastructure requirements. This review comprehensively explores the evolution and impact of big data frameworks in healthcare IT, evaluating critical technologies, architectures, applications, and implementation strategies. It also highlights the barriers and future directions for leveraging big data to improve clinical practice, research, and administration. Insights are drawn from recent studies, practical use cases, and emerging trends in artificial intelligence, predictive analytics, and real-time decision support. The review ultimately provides a roadmap for stakeholders—clinicians, technologists, administrators, and researchers—to harness big data for better outcomes, operational efficiency, and patient-centric care.

DOI: http://doi.org/10.5281/zenodo.16982564

The influence of AI in optimizing workload balancing across multi-cloud infrastructures

Authors: Aditya Bhandari

Abstract: Artificial Intelligence (AI) has emerged as a transformative force in IT infrastructure management, particularly in optimizing workload balancing across multi-cloud environments. Multi-cloud infrastructures, which involve the utilization of multiple cloud services from different providers, present a complex landscape for businesses seeking high availability, scalability, and cost efficiency. The dynamic nature of workloads, variability in service level agreements (SLAs), and diverse cloud resource characteristics necessitate intelligent automation to optimize performance. AI-driven approaches leverage machine learning algorithms, predictive analytics, and autonomous decision-making to manage workload distribution effectively, ensuring optimal utilization of resources while minimizing latency and operational costs. This article delves into the integration of AI in multi-cloud workload balancing, exploring how it addresses challenges such as resource heterogeneity, network latency, and fluctuating demand patterns. We discuss various AI techniques, including reinforcement learning, neural networks, and evolutionary algorithms, that are employed to predict workload behavior and automate deployment decisions. Additionally, the article examines real-world case studies highlighting successful AI implementations and outlines the future trajectory of this synergy. By adopting AI-driven workload optimization, organizations can enhance resilience, improve user experience, and achieve sustainable cloud operations amid the rapidly evolving digital ecosystem.

DOI: https://doi.org/10.5281/zenodo.17708834

The influence of AI on achieving sustainable energy consumption in data centers

Authors: Sanjana Rao

Abstract: Sustainable energy consumption in data centers has emerged as an urgent global priority as digital transformation accelerates and the demand for cloud computing, data storage, and processing escalates dramatically. Data centers, pivotal infrastructure for the digital economy, are also substantial consumers of electricity and significant sources of greenhouse gas emissions. The integration of artificial intelligence (AI) technologies introduces promising avenues to enhance energy efficiency, optimize resource management, and ultimately contribute to sustainability goals. AI-driven systems can analyze vast amounts of operational data in real-time, enabling predictive maintenance, smart cooling, dynamic workload management, and energy-aware orchestration of resources. These capabilities reduce energy waste and minimize carbon footprints while ensuring robust performance. This article explores the multitude of ways AI influences energy consumption patterns in data centers, including machine learning techniques for demand forecasting, innovative cooling solutions, renewable energy integration, and automated control systems. It also examines challenges such as the energy demands of AI itself and the need for transparent, ethical AI governance. Through the lens of case studies and emerging technologies, this synthesis underlines the transformational potential of AI in promoting sustainable data center operations, offering insights valuable for industry stakeholders, researchers, and policymakers. Ultimately, embracing AI as a core component of data center management aligns with broader objectives of climate responsibility and operational resilience in the digital age.

DOI: https://doi.org/10.5281/zenodo.17708969

Engineering Resilience In Multi-Cloud Java Microservices: Architectural Patterns Across AWS And Google Cloud

Authors: Sriram Ghanta

Abstract: As enterprises increasingly adopt multi-cloud strategies to mitigate vendor lock-in, meet regulatory requirements, and improve service availability, ensuring resilience across heterogeneous cloud platforms has emerged as a fundamental architectural challenge. Java microservices ubiquitous in large-scale enterprise systems must be engineered to tolerate partial service failures, regional outages, transient network partitions, and uneven performance characteristics inherent to distributed cloud environments, all while preserving end-user experience and meeting strict service-level objectives. This article presents a systematic study of multi-cloud resilience patterns for Java microservices deployed across Amazon Web Services (AWS) and Google Cloud Platform (GCP), synthesizing established distributed-systems principles with cloud-native fault-tolerance techniques and industry best practices published prior to 2022. We examine core architectural patterns including asynchronous messaging for decoupling and buffering, circuit breakers and bulkheads for failure containment, and saga-based coordination for maintaining data consistency without global transactions, highlighting their practical applicability in real-world enterprise deployments. Leveraging publicly available architectural diagrams and insights from prior empirical studies, the paper demonstrates how these patterns can be implemented in a cloud-agnostic manner while mapping effectively to provider-specific services, enabling fault isolation, graceful degradation, operational stability, and predictable recovery behavior in complex multi-cloud Java microservice ecosystems.

DOI: http://doi.org/10.5281/zenodo.18081618

Architecting High-Throughput Transaction Processing In Distributed Microservices Systems: Principles, Coordination Mechanisms, And Performance Optimization

Authors: Shekar Vollem

Abstract: Modern digital applications demand the ability to process massive numbers of transactions while maintaining reliability, scalability, and responsiveness across geographically distributed infrastructures. Traditional monolithic architectures often struggle to support the throughput requirements of large-scale distributed systems due to tight coupling between components, limited horizontal scalability, and the difficulty of isolating failures within a single codebase. As workloads grow and user bases expand globally, these limitations become increasingly evident in areas such as transaction latency, system availability, and deployment agility. Distributed microservices architectures offer a viable alternative by decomposing applications into smaller, independently deployable services that communicate through lightweight APIs or event-driven messaging systems. This architectural paradigm enables organizations to scale services horizontally, optimize resource utilization, and process transactions concurrently across distributed environments. In such systems, each microservice typically manages its own data store and business logic, allowing for flexible scaling and improved resilience. This paper examines the architectural principles, distributed transaction models, and performance optimization strategies that enable high-throughput transaction processing in microservices environments. The study reviews existing research on distributed transaction processing systems, including distributed OLTP platforms and main-memory databases that reduce I/O bottlenecks and improve transaction latency. It also analyzes microservice orchestration patterns and coordination mechanisms that enable reliable transaction management across multiple services. Particular attention is given to techniques such as data partitioning, asynchronous messaging, event-driven communication, and Saga-based transaction coordination, which collectively help maintain data consistency without sacrificing system performance. Through the analysis of existing systems, architectural patterns, and prior research studies, the paper highlights approaches that significantly improve transaction throughput while preserving fault tolerance, service autonomy, and data consistency in complex distributed computing environments.

DOI: https://doi.org/10.5281/zenodo.19219630

Performance And Environmental Assessment Of A Waste-to-Energy Thermal Power Plant Under Variable Load Conditions”

Authors: Mr. Parth Kohli, Prof. Neha Singh

Abstract: Waste-to-Energy (WtE) thermal power plants offer a sustainable solution for simultaneous municipal solid waste (MSW) management and electricity generation. This study presents a detailed performance and environmental assessment of a WtE thermal power plant operating under varying load conditions. Key performance indicators, including thermal efficiency, heat rate, and specific carbon dioxide (CO₂) emissions, were analyzed to evaluate the influence of operating load on plant performance. The results demonstrate a clear improvement at higher loads, with increased thermal efficiency, reduced heat rate, and lower specific CO₂ emissions per unit of electricity generated. These enhancements are attributed to improved combustion stability, effective utilization of the calorific value of MSW, and lower relative auxiliary power consumption. The analysis confirms that operation near rated capacity maximizes energy recovery and minimizes environmental impact, highlighting the importance of consistent waste supply and optimized load management. Beyond technical performance, the study underscores the role of WtE plants in sustainable urban infrastructure by reducing landfill dependence, recovering energy, and mitigating greenhouse gas emissions. The findings provide practical insights for policymakers, urban planners, and plant operators, supporting the integration of WtE systems into modern energy strategies and environmentally responsible waste management frameworks.

DOI: https://doi.org/10.5281/zenodo.19449403

Published by:

IJSRET Volume 8 Issue 2, Mar-Apr-2022

Uncategorized

Performance Analysis of Ad-Hoc Networks Under Black Hole Sybil Attack and DDoS Attack
Authors:- M. Tech Scholar Vikas Swarnakar, Asst. Prof. Shivraj Singh

Abstract- The next generation communication network has been widely popular as an ad hoc network and is roughly divided into mobile nodes based on mobile ad hoc networks (MANET) and vehicle nodes based on the vehicle’s ad hoc network (VANET). VANET aims to maintain traffic congestion by keeping in touch with nearby vehicles. Every car in the ad-hoc network works like a smart phone, which is a sign of high performance and building an active network. The self-organizing network, is a decentralized dynamic network, as vehicles are constantly moving, efficient and secure communication requirements are required. These networks are more vulnerable to various attacks, such as hot hole attacks, denial of service attacks. This article is a new attempt to investigate the security features of the VANET routing protocol and the applicability of the AODV protocol to detect and manage specific types of network attacks called “black hole attacks Sybil attack and DDoS attack. A new algorithm is proposed to improve the security mechanism of the AODV protocol, and a mechanism is introduced to detect attack and prevent the network from being attacked by the source node this simulation set up performed on matlab simulation.

A Review on Series Voltage Regulator and PV based Voltage Modulated Direct Power Control for Grid Connected
Authors:- Guatam Ojha, Prof. Vijay Anand Bhart

Abstract-We have designed voltage modulated direct power control (VM-DPC) for a three-phase voltage source inverter (VSI) connected to a weak power grid. If the conventional vector flow control (VCC) method is PLL, then the PLL system may make the system unstable. Compared to the traditional VCC method, eliminating the PLL system is the major advantage of the proposed VM-DPC method. In addition, the VSI system must also generate a certain amount of reactive power to inject the rated active power into the weak power grid. Analysis based on eigenvalues shows that, using the proposed method, the system tracks the required dynamics within a specific workspace.

Power Quality Improvement Performance of PV and Grid Connected System
Authors:- Nitesh Yadav, Prof. Vijay Anand Bhart

Abstract- This Paper introduced for regulating the load voltage through DVR pulses at different abnormal operating conditions, and accordingly convert the static optimized PI controller into adaptive one based ANN. The system performance with the proposed ANN-DVR controller is enhanced through improving the current, voltage, and power waveforms of each generating source. With compensation of the faulty line voltage, the system retains an uninterrupted operation of the three renewable sources during fault events and the total harmonic distortion is reduced. an Artificial Neural Network (ANN) controller based MPPT controller and Dynamic Volt-age Restorer (DVR) utilization to improve the performance of a stand-alone hybrid renewable energy system. The renewable energy system consists of three renewable energy sources, namely, solar PV cells, battery system and fuel cells. These three sources are tied to a common DC link by three boost converters, one for each source. The common DC link is connected to the AC side via a DC/AC inverter. The optimal size of the three proposed renewable sources is calculated using the MATLAB Software. The DVR control is attained through regulating the load voltage at different anomalous working conditions. These conditions are three-phase fault, voltage sag/swell, and unbalanced loading. to control DVR by regulating the D-Q axes voltage signals. The input/output data used for training ANNs are obtained by two optimized PI controllers.

Experimental Research on the Mechanical Properties of M50 Grade Concrete Using Steel Fibres
Authors:- PG Scholar Nuthalapati Jaganmohan Rao, Hod Balakrishna Penta

Abstract-Now a days investigations all over the world are centring on ways of progressing the mechanical properties of concrete. Plain concrete has low malleable quality, is fragile in nature, has low ductility, less sum resistance to breaking. The nearness of inner smaller scale splits effectively gives engendering of splits beneath stacking which comes about low malleable quality and brittle in nature. Steel is utilized to move forward the mechanical properties of concrete. From antiquated times diverse sorts of added substances were utilized to make strides in the properties of concrete. From the early 1900’s diverse sorts of fiber strengthened concretes are being utilized against ordinary concrete. The fiber reinforced concrete is superior in flexural quality, tensile quality, and split arresting. In this display think about a concrete mix design is made for High Strength Concrete of M50 Grade as per IS 10262 – 2019 and steel fibers are included in terms of % of volume division of concrete. The sum of rates changes from 0.5% to 3% at an interim of 0.5%. The fresh concrete tests like slump cone test and vee bee consistometer test and as well as hardened concrete tests like compressive strength, flexural strength at the ages of 7, 14 and 28 days were conducted. By comparing these tests comes about with plain concrete the impact of strands on compressive and flexural strengths of High Strength Concrete has been considered.

The Basic HADOOP: HDFS, MapReduce, YARN
Authors:- Ayushi Ankita Rakshit

Abstract- In our day-to-day life, we encounter with a huge amount of data. As a student, the name of the subjects, syllabus, terminologies, etc should be kept in mind, as a teacher, the name of the students, subjects, syllabus, etc should be kept in mind. Every small thing here represented are considered as a data. For a computer, files like images, videos, documents, etc, are considered as a data. We as a human deal with fewer amounts of data as compared to that of the computers. Working with millions and billions of data is not possible by humans. So, to overcome the problem Big Data was introduced and works with Hadoop as an ecosystem. This paper is a technical brief on how Hadoop ecosystem works, its principles and basic algorithms.

An Outlier Detection Using Clustering Algorithms and Its Techniques
Authors:- Asst. Prof. B.Angelin M.Sc., M.Phil. (Ph.D), Asst. Prof. M.Radha M.Sc., M.Phil., Asst. Prof. P.Poornima M.Sc., M.Phil

Abstract- Clustering is the task of assigning a set of data objects into groups called clusters so that the objects in the same cluster are more similar in some sense to each other than to those in other cluster. Data items whose values are different from rest of the data or whose values fall outside the described range are called outliers. Outlier detection is an important issue in data mining, where it is used to identify and eliminate anomalous data objects from given data set. Outlier detection is an essential step in the data mining process. Its main purpose to remove the incompatible data from the original data. This purpose helps in the removal of data which necessary for carrying out to speed up the applications like classification, data perturbation and compression. It plays an important role in the weather forecasting, performance analysis of sports person and network intrusion detection systems. The outlier for the single variable can be easily observed but for the n-variable it become a tedious process. To enhance the performance of outlier detection in n-variable or attributes several methods were discussed. This paper provides a brief survey on clustering techniques and outlier detection techniques. Particularly the K-means clustering algorithm for outlier detection is discussed.

Using Blockchains for Security and an Algorithm for Cloud Computing
Authors:- Divya Asritha Somisetty, Mohammad Tajammul

Abstract- Blockchain is a completely new approach for the development of Internet technology due to its distributed mechanism, decentralized mechanism, password mechanism, and scripted mechanism. As a result of Blockchain technology, storing and spreading information in a network has been redefined. There is no need for participants to know each other, nor is it a requirement for third-party certification bodies. An asymmetric cryptographic algorithm ensures that data cannot be tampered with and forged while recording, transmitting and storing transfer activities of the information value. The exchange of blockchain data information enables all participants to reach consensus. Moreover, the current industry research on blockchain explains the applications of the technology in identity authentication, data protection, and network security. This new technology will lead to a major shift in information.

The Investigation of Mechanical Properties of Dissimilar Material Weld Joint by GMAW & MMA Process
Authors:- M. Tech. Scholar Mohd Naseem, Associate Prof. Dr. Ram Gopal Verma

Abstract- In this paper discussed about the investigation of mechanical properties of dissimilar material of weld joint by Gas Metal Arc Welding (GMAW) and Manual Metal Arc (MMA) process. In this study to evaluate of strength of weld joint, weld size of weld joint and torsional strength of weld joint. In this investigation used two types of weld joint, groove joint (V-joint) and butt joint. In this investigation used impact test, torsional test and welding size. The main purpose of this study comparison between welded joint and welding techniques. The parameters of welding are welding current, welding voltage, welding speed. In the metal inert gas welding used wire electrode size is 0.8 mm diameter. In this investigation used mild steel sheets and stainless-steel sheets. The thickness of sheets is 4mm, 5mm, 6mm, the dimension of sample size of butt joint and groove joint is 230 mm X 120 mm X 4mm X 5 mm X 6 mm.

Cloud Based Smart Detecting Metering Terminal
Authors:- Asst. Prof. C.Rekha, AkshayaPrabha P, Logeshwari S

Abstract- Underground cables are inclined to a wide assortment of faults due to underground conditions, wear and tear, rodents etc. Diagnosing fault source is troublesome and entire cable need to be taken out from the ground to check and settle issues. The project work is pointing to recognize the region of fault in underground cable lines. To locate a fault in the cable, the cable must be tested for faults. The current would change depending upon the length of the fault of the cable. Within the urban regions, the electrical cables run in underground rather than overhead lines. When the fault happens in underground cable it is troublesome to recognize the exact zone of the fault for get ready of repairing that particular cable. The proposed framework finds the precise area of the fault and also electricity load forecasting is important for utility companies to ensure reliable power supplies. Traditional methods for load forecasting relied on historical records from one single data source and have limitations with insufficient or missing data and also when the fault happens in cable it is troublesome to recognize the exact zone of the fault for get ready of repairing that particular cable. Our project is to find solution for this.

Post Pandemic (Covid-19) Recovery of Economic Systems for Attainment of Sustainable Development
Authors:- Asst. Prof. Mr. Sachin Sharma, Prof. Dr. Priyank Sharma, Asst. Prof. Mr. Deepak Sharma, Associate Prof. Dr. Ankur Goel

Abstract- Covid-19 pandemic has taken away the worldwide happiness and financial power that really required the notable global co activities across the differentiated regions. It includes the medical and immunity advancements, the value and supply chains related to vigor and strength, money supply facilities, backing up of economy of agricultural oriented nations etc. There is a requirement of worldwide recovery efforts related to overall economic systems after the COVID-19 in order to achieve the goals of sustainable development. This paper is based on content analysis technique and attempts to highlight the green recovery efforts in various dimensions and eventually analyse the role of money for attainment of sustainable development.

Review Paper on Electrical Discharge Machining
Authors:- Prof. Kalpesh S. Kamble, Pankaj Rane, Shadab Shaikh, Mahesh Dalvi, Rahul Chavan

Abstract- By means of the improvement and growths in new machineries, low weight- high strength, high hardness and temperature resistant materials have been advanced for distinctive applications which include aerospace, medical, automobile and more. In the machining of hard and metal matrix composite materials, outdated manufacturing processes are being more and more changed by more nontraditional machining processes which include Electrical Discharge Machining (EDM). The work piece material designated in this experiment is Inconel 925 taking into interpretation its wide usage in industrial applications. In today’s world stainless steel provides to nearly half of the world’s production and consumption for industrial determinations. In this experiment the input variable factors are voltage, current and pulse on time. As we know that Taguchi method is functional to produce an L9 orthogonal array of input variables by means of the Design of Experiments (DOE). So, Taguchi method is used to analysis the output data. The consequence of the compliant parameters stated overhead upon machining characteristics such as Material Removal Rate (MRR) and Tool Wear Rate (TWR) is considered and examined. In this we are focused on to analysis minimum TWR and maximum MRR based on control factors and response parameters.

Optimization of Various Parameters for High-Efficiency Light-Fidelity (LI-FI)
Authors:- Anurag Garood, Chirag Bhardwaj

Abstract- Light Fidelity (LiFi) is a Visible Light Communication (VLC) based technology that making a light as a media of communication replacing the cable wire communication. LiFi is evolve to overcome the rate speed in Wi-Fi, while using LiFi the rate speed can reach until 14 Gbps. This paper presents an introduction of the LiFi technology including its performance at different parameter. The result of this paper can be used as a reference and knowledge to develop some of the LiFi technology. Li-Fi has evolved with the tremendous growing technology. This paper presents a communication system based on Light fidelity (Li- Fi). In this paper, simulation of the transmitter- receiver system has been done. The major contribution of the work is in the optimization of various parameters. We achieved received signal power density and 3D power distribution along with signal to noise ratio at receiver end with variation of perpendicular distance between receiver and transmitter i.e. height and with variation of incidence angle of light i.e. the angle between the horizontal plane and light rays. All simulation work is done of MATLAB 2018a software version.

Smart Handbag Enabled with Location Tracking
Authors:- Ankathi Susheel Varma, Kadari Supriya

Abstract- The world is becoming unsafe in all aspects. The crimes are increasing at a higher rate. This paper proposes a quick responding mechanism that uses a speaker to alert the user and provides a way to safeguard his/her belongings. As a snatch theft has become a serious problem to the society, it is required an immediate action to put an end to this problem [1]. All the electronic inventions are to reduce manual effort upon mechanical work and to create an interaction between human and machine [2]. The framework of project is based on a 555 timer IC [NE555P] in astable configuration that produces square wave of definite frequency. A loudspeaker which is used as a load at the output generates sound and alerts the user in case of breaking of wire or discontinuity in the loop (cutting the bag strap with scissors-based theft) also in case of direct snatching the bag, we can track the bag as it is interfaced with a GPS GSM module [SIM808]. This project can be used to protect our wallets, carry bags or even just in case to mention caution so that people alert. The applications are not just limited to this as it is portable, reliable, cost efficient and small as it uses only battery supply.

Beat the Warmth Seat Using IOT
Authors:- Annepu Gowtham Kumar, Kannkanti Likhita

Abstract- Every year, aggregate of forty youngsters die per annum thanks to hyperthermia because of accidentally being left in hot automobile and the number for 2019 was fifty-two. A change within the normal routine could make indeed a careful parent inadvertently leave a baby behind within the automobile seat. When the surface temperature is 80 °F, the temperature inside the car can fleetly climb to 109 °F in 20 twinkles, causing child death thanks to hyperthermia. I wanted to provide a practical device that would reach further people than the dear newer vehicles that come with smart seat systems. This part can detect weights in excess of 10 lbs. when the baby is sitting there, the system will automatically start and monitor the temperature within the car. when the temperature surpasses 102 degrees, the seat generates an alarm together with a warning on its display and texts the parent’s phone. If the button is not reset by the parent within 60 seconds, the Arduino will send the car’s location to emergency service. It then automatically activates a cooling mechanism to maintain a comfortable temperature near the kid to avoid death by hyperthermia. The cooling was achieved by an Arduino controlled thermoelectric cooling system incorporated within the electronic system which maintained ambient temperature round the child. The temperature in the automobile with and without smart automobile seat intervention was compared on a traditional day to demonstrate that the smart automobile seat was effective in achieving ambient temperature round the child within three minutes.

Design of Low Power Multiplier with Improved Column Bypassing Scheme
Authors:- Mandula Sai Kumar, Pullagurla Sowmya

Abstract- In design of portable electronic devices for signal processing applications the primary constraints are Power, speed and area. Multiplier plays a vital role in DSP applications. In this paper, a high speed and low power multiplier with improved column bypassing scheme is presented. Primarily power reduction is achieved by disabling the supply voltage applied to non-functional blocks when the operands of the multiplicands are 0. Power reduction is obtained by both architectural and circuit level modifications. The proposed multiplier is involved with a new adder architecture which is also responsible for reducing the power consumption and propagation delay. Simulated results are obtained with UMC (United microelectronics Corporation) 90nm and 0.9V CMOS technology with help of cadence spectre simulation tool. The proposed multiplier has been compared with popular multipliers and performance parameters such as speed, power dissipation and area occupation are found better. The proposed multiplier is holding a better choice for the low frequency (≤ 50 MHz) applications. From the obtained results for randomly generated input test patterns having uniform distribution probability and power saving would be more if operands have more 0’s than 1’s.

Implementation of Inventory Management Technique in Manufacturing Industry
Authors:- M. Tech. Scholar Ram Pratap Dangore, Asst. Prof Yogesh Ladhe

Abstract- Inventory management is the accurate tracking of all materials in the company’s inventory. The company has purchased these items from another supplier. There are three possible areas of loss that are reduced through effective inventory management: shrinkage, misplacement, and short shipments.There are various types of inventory control analysis techniques. Here we shall focus on the ABC analysis. It is possible to utilize the concept of ABC model in formation of rational inventory policy which should give the best possible service level to production while minimizing investment costs. ABC analysis tends to measure the significance of each item of inventory in terms of value.

A Review on Casting Defect Reduction in a Manufacturing Industry
Authors:- M.Tech. Scholar Raghav Pandey, Asst. Prof. Vipul Upadhayay

Abstract- In the era of globalization, producing good quality castings as per the standards needs multidirectional competitiveness. Indian foundry industries are constantly on the alert to gain a competitive edge. Yet, the focus is deviating from overall operational excellence. To compete globally, foundry men have to move ahead from the slogan of ‘satisfying customer’ and adopt and rigorously Endeavour for ‘customer delight’. Meeting customer demands will not be sufficient, requirements will be to exceeding them through quality and productivity improvement. For global competitiveness, foundry industries are trying many techniques such as quality circles, total quality management (TQM), International Organization for Standardization certifications, etc. All these techniques are well capable of producing the desired results, but the darker side of the coin is the issues related with their implementation and longer time span to realize the benefits. There are myths that Six Sigma is suitable for large organizations only but, Six Sigma is equally suitable for Small scale foundry too.

A Research Onthe Impact of Implementing Green Supply Chain Management Practices in Smes Using Spss
Authors:- M.Tech. Scholar Aman Laad, Prof. Yogesh Ladhe

Abstract- Green supply chain management (GSCM) is also called as sustainable supply chain, environmental supply chain, and ethical supply chain. It has also been described as a socially responsible supply chain”. GSCM means “integrating environmental thinking into supply chain management, including product design, material sourcing and selection, manufacturing processes, delivery of the final product to the consumers and end-of-life management of the product after its useful life”.The aim of this research is to analyse firm performance by implementing GSCMpractices. This paper therefore helps to build environmental awareness amongst industry and helps industry to take decisions that are a priority with little information about supply chain management.Quantitative research method is used to analyse the firm performance by implementing GSCM practices. Primary data is collected from the distribution of questionnaires through online survey. Further, statistical techniques have been applied on survey results.GSCM research is currently in the emerging phase. The survey may be further refined to distinguish between various manufacturing industries. This analysis offers significant perspectives. Implementing GSCM activities enhances corporate success in many ways. Supplychain managers are obliged to determine the company’s output and therefore choose the best GSCM practice combination, which will maximize the optimal amount. This research is useful to SME owners to consider GSCM procedures and introduce them.

Thermodynamic Analysis of a Cascade Refrigeration System Based on Carbon Dioxide and Ammonia
Authors:-M.Tech. Scholar Sourabh Kori, Asst. Prof. Shahrukh Khan

Abstract- Refrigeration and air conditioning (RAC) play a very important role in modern human life for cooling and heating requirements. This area covers a wide range of applications starting from food preservation to improving the thermal and hence living standards of people. The utilization of these equipment’s in homes, buildings, vehicles and industries provides for thermal comfort in living/working environment and hence plays a very important in increased industrial production of any country. In present study the comparison of thermodynamic analysis of cascaderefrigeration system has been done with two refrigerant pairs R23-R600A and R23-R290. In these systems, performance of two stage cascade compression system using above different refrigeration system have been studied and the effect of condenser temperature & evaporator temperature , difference in cascade condenser and low temperature cycle condensertemperature on performance parameteron COP, total compressor work, exergy efficiency and total exergy loss has also been done.Thermodynamic analysis is carried out by developingcomputational model in Engineering Equation solver (EES)..

A Review on Thermal Performance Analysis of Shell and Tube Heat Exchanger
Authors:- M.Tech. Scholar Vishwas Gautam, Asst. Prof. Vikas Jain

Abstract- Shell and tube heat exchanger with single segment baffles, helical baffles at varied helix angles, and flower baffles was researched and compared in enhancing performance, according to the literature review. Furthermore, simulations involving single, double, triple segmental baffles, helical baffles, and flower baffles have not been compared using the same STHX specification and input circumstances. As a result, a unique idea was developed to investigate the impacts of multiple baffle designs in shell and tube heat exchangers (STHX), including such single, double, triple segmental baffles, helical baffles, and flower baffles, on heat transfer coefficient and pressure drop.

A Review Article Novel Approach To Classification of Capacity Urban and Rural Roads with Detection of Traffic Noise across Higher Density
Authors:-Harish Kumar Verma, Professore Jitendra Chouhan

Abstract- In order to accurately predict the short-term traffic flow, this paper presents a k-nearest neighbor (KNN) model. Short-term urban expressway flow prediction system based on k-NN is established in three aspects: the historical database, the search mechanism and algorithm parameters, and the predication plan. At first, preprocess the original data and then standardized the effective data in order to avoid the magnitude difference of the sample data and improve the prediction accuracy. At last, a short-term traffic prediction based on k-NN nonparametric regression model is developed in the Matlab platform. Utilizing the Shanghai urban expressway section measured traffic flow data, the comparison of average and weighted k-NN nonparametric regression model is discussed and the reliability of the predicting result is analyzed. Results show that the accuracy of the proposed method is over 90 percent and it also rereads that the feasibility of the methods is used in short-term traffic flow prediction.

Review of AI based Automated Dishwasher
Authors:- Asst. Prof. Shital P. Dawane1, Rutvik M. Meshram, Shivam B. Patil, Harshal V. Nikhade

Abstract- This review deals with the evolution of dishwasher ranging from primitive model to its complex form. The discussed review papers deals with analysis of human effort, power consumption, time consumption required for the operation of dishwasher. In this paper we tried to analyze and learn the working of dishwasher along with its future scope with an attempt to integrate with modern technologies.

Constant Matrix Multiplication Using Carry Select Adder
Authors:- Karlapudi Vikram, Panjala Sai teja, Dakuri Chandana

Abstract- Constant matrix multiplication (CMM) is the process of multiplication of a constant matrix with a vector,
is a common operation in digital signal processing. It is a generalization of multiple constant multiplication (MCM) where a single variable is multiplied by a constant vector. Like MCM, CMM can be reduced to additions/subtractions and bit shifts. Finding a circuit with minimal number of add/subtract operations is known as the CMM problem. While this leads to a reduction in circuit area it may be less efficient for power consumption or throughput. The existing model uses RCA(Ripple Carry Adder), whereas this proposed method is implemented by using CSLA(Carry Select Adder). Here the usage of CSLA resulted in reduction of time for execution and the reduction of no. of LUTs(Lookup Tables), which in turn leads to efficient power consumption. This paper is highly concentrated on Time for execution and Power consumption, which are important parameters for implementation real time application circuits.

Computer Vision to Control Documents
Authors:- Prof. Vrushali R. Sonar, Sanskruti S. Patil, Shyamal S. Patil, Sneha G. Pawar, Vaishnavi B. Kute

Abstract- Computer vision, or the ability of artificially intelligent systems to “see” like humans, has been a subject of increasing interest and rigorous research for decades now. As a way of emulating the human visual system, the research in the field of computer vision purports to develop machines that can automate tasks that require visual cognition. Computer Vision, often abbreviated as CV, is a field of study that seeks to develop techniques to help computers “see” and understand the content of digital images such as photographs and videos. With the help of computer vision, we are going to develop a system which recognizes colors and helps us to scroll through documents, pdf, etc. With similarly astounding feats by AI with computer vision technology becoming increasingly common in different industries, the future of computer vision appears to be full of promise and unimaginable outcomes.

Portable Cloth Dryer Machine
Authors:- Prof. R.M.Dahekar, Ajay Hajare, Akash Dhole, Pratik Thakare, Sahil Narekar

Abstract- As technology continues to progress human civilization has begun to enter into new world in many parts of India like cherranpunji, Shimla and other humid regions in foreign countries, it is observed that clothes are being wet for many days after the wash, so as the people suffer. So, the invention of quick portable cloth drying machine helps in solving out these problems. The quick portable cloth drying machine helps in drying out the clothes in all seasons.

Stock Prices and Risk Prediction with Sentiment Analysis Using Machine Learning Technology
Authors:- Prof. Siddhesh Khanvilkar, Mr. Aditya Jadhav, Mr. Aniket Khaladkar, Mr. Sahil Lamture

Abstract- Stock Prices Prediction” is a key topic in the present situation. Therefore, the curiosity about this topic is increasing among the researchers as well as retail investors. After multiple research one thing has everyone noticed that past data of stock market, Search Engine optimization Queries and the data which is generated from sources like Twitter and other financial platforms, has a close relationship with the future price of any stock. Previously a decade ago there was problem of lack of related information in the field of stock market. Therefore, in order to fill that information bridge between market and investors and predict an future, we discuss an simple method to analyse different information source. To do so, Long Short Term (LSTM), Linear Regression and Autoregressive Integrated Moving Average (ARIMA) etc. algorithms were utilized to examine separate sources, which helps users or investors precise results of stock prices of next 7 days or so. Through this method, new investors or retail investors can survive in the stock market.

Friend Recommendation on Social Media
Authors:- M.Tech. Scholar Atul Kumar Churhe, Asst. Prof. Girish Gogate

Abstract-Friend recommendation is one of the most popular characteristics of social network platforms, which recommends similar or familiar people to users. The concept of friend recommendation originates from socialnetworks such as Twitter and Facebook, whichuses friends-of-friends method to recommend people.We can say users do not make friends from random people but end up making friends with their friends’ friends.The existing methods have narrow scope of recommendation and are less efficient. We put forward a new friend recommendation model to overpower the defects of existing system.For better friend recommendation system with high accuracy, we will use collaborative filtering method to compare similar, dissimilar data of users and will make a recommendation system which gives user to user recommendation based on their similar choices, activities and preferences. Location based friend recommendation system are becoming popular because it brings physical world to digital platform and gives better insight of user’s preferences or interest This recommendation system will increase the scope of recommendation from one user to other with similar set of interest and their location.

Detecting and Predicting Malicious Nodes in Mobile AD-HOC Networks using a Secure Technique
Authors:- M.Tech. Scholar Amit Kumar Yadav, Asst. Prof. Girish Gogate

Abstract- Mobile Ad Hoc Networking (MANET) is a rapidly expanding communication framework. Because the MANET has no foundation, it has the dynamic nature of a self-assertive network architecture. These networks need to be secure. MANET nodes may launch a variety of attacks or become very self-centered to maintain their edge. These nodes may be harmful. Malicious nodes must be identified for MANETs to function properly. A collection of networks is shown, each with its own limitations. On the other hand, a network of counteractive action employing responsive guiding conventions is proposed in this concept. An AODV, NS-2 test network is employed for execution analysis and replication. It uses a countermeasure that calculates the Trust value based on route request, route response, and information package. After the count, assign stock values from 0 to 1. If the trust esteem is more than 0.5, the node is reliable and allows network access. The SAODV is assessed in terms of network execution. The outcome differs from the standard AODV convention. SAODV outperforms AODV and existing protocol by extending the length of a decrease in throughput. In comparison, SAODV’s packet delivery ratio outperforms the existing AODV protocol. This is a better solution than the present AODV protocol and combined malicious attack..

Secure Network for Malicious Nodes in Mobile Ad-hoc Networks using Trust-based Approach
Authors:- M.Tech. Scholar Kiran Singh, Asst. Prof. Prof. Megha Jat

Abstract- MANET stands for Mobile Ad Hoc Networking and is a fast growing communication framework. The MANET has the dynamic character of a self-assertive network design since it has no base. These networks must be protected. To keep their advantage, MANET nodes may launch a variety of assaults or become very self-centered. These nodes might be dangerous. For MANETs to work correctly, malicious nodes must be discovered. A number of networks are shown, each with its unique set of constraints. This notion, on the other hand, proposes a network of counteractive activity based on responsive guiding norms. For execution analysis and replication, an AODV, NS-2 test network is used. It employs a countermeasure that determines the Trust value based on the route request, route response, and data package. Assign stock values from 0 to 1 after the count. The node is dependable and enables network access if the trust esteem is more than 0.5. In terms of network execution, the SAODV is evaluated. The result deviates from the typical AODV procedure. By increasing the duration of a throughput reduction, SAODV beats AODV and current protocols. SAODV beats the previous AODV protocol in terms of packet delivery ratio. This is a superior alternative to the current AODV protocol and malicious attack.

A Review of Power Quality Improvements by using FACTS devices of Smart Energy System Using Hydro System
Authors:- Research Scholar Rampravesh Chauhan, Asst. Prof. Abhishek Dubey, Dr. Shweta Chourasia

Abstract- MANET stands for Mobile Ad Hoc Networking and is a fast growing communication framework. In a recent trend for controlling of most of the industrial loads is mainly based on semiconductor devices which cause such loads to be more sensitive against power system disturbances. Thus, the power quality problems have gained more interest recently. This paper presents a review of some of the disturbances, on the source side that may cause problems on the load side. The focus is given on problems associated with voltage dips as voltage dips have been reported to be the most severe problems to industrial loads. The power quality has an important role in the power supply industry. As the power providers are turning to smart grid and smart meters, the standards for power quality needs to be revisited. The power quality can be categorized into two groups, one addressing the standard for the power quality supplied at the grid level and the other group which deals with the factors that affect the power quality at user level. These factors include harmonics, voltage changes, sags, transients, voltage unbalance, etc. These factors will provide us in- depth details about the power system network. In this paper, an overview of various factors will be presented in order which can affect the power quality of the system.

Survey on Number Automatic Plate Recognition System
Authors:- Ankita S Sawalkar, Anas S Pathan , Anuja P Kakade, Bhushan R Chandne, Prachi P Telvekar

Abstract- Automatic Number Plate Recognition (ANPR) could be a fairly well explored drawback with several winning solutions. However, these solutions area unit usually tuned towards a selected atmosphere thanks to the variations within the options of variety plates across the globe. Algorithms written for number plate recognition area unit supported these options and then a universal resolution would be troublesome to appreciate because the image analysis techniques that area unit accustomed builds these algorithms cannot themselves boast hundred percent accuracy. The main focus of this paper could be a planned formula that’s optimized to figure with Ghanese vehicle variety plates. The formula, written in C++ with the OpenCV library, uses edge detection and has Detection techniques combined with mathematical morphology for locating the plate. The Tesseract OCR engine was then accustomed determine the detected characters on the plate.

A Review on Failure of Gears (Cluster Gears Shaft) and its Preventions
Authors:- Research Scholar Shubham Jamnik, Associate Prof. S. M. Fulmali

Abstract- There are various reasons due to the gear may fail, few of them could be application error, design error, manufacturing error or application error. According to American gear manufacturing association, the failures of gear can be classified into four major categories namely surface fatigue, wear, plastic, and breakage. It has been observed that in most of the cases the failure starts from the bearing. The statistics of gear failure shows that 2.8% of the gear fails due to handling errors, 6.9% due to overload, 17.7% due to installation error, 19.6% due to contamination, and 34.4% of the gears fails due to inadequate lubrication. An in depth review of failure of gears along with its reasons and precautions are carried out in this article. In addition, the failure of cluster gear shaft mounted in a tractor gear box is discussed.

Happy Minds: Mental Health App
Authors:- Prof. Mrs. Pooja Bhore, Hetavi Manani, Sunny Patil, Asawari Gulmire, Parshva Chordia

Abstract- Mental health – something that affects our overall well-being and is essential in our daily lives – is frequently overlooked, particularly in India, where it has become a taboo subject. It determines and regulates our mood, how we communicate, how we deal with stress, and how we make decisions. It is especially important when it comes to our physical well-being, as it has a direct impact on our mood and vice versa (Ref 1). There are apps designed specifically to address the need for regulating, improving, and maintaining good mental health, assisting people in overcoming anxiety, depression, panic attacks, and other mental illnesses. Recently, in light of the global pandemic, we’ve seen an increase in the number of such apps available at our fingertips, with only 5% not being fully functional. Reference 1: Purves D, Augustine GJ, Fitzpatrick D, et al., editors. Neuroscience. 2nd edition. Sunderland (MA): Sinauer Associates; 2001. Physiological Changes Associated with Emotion. Available from:.https://www.ncbi.nlm.nih.gov/books/NBK10829/.

Controlling Solar Charger System by Means of Microcontroller
Authors:-M.Tech. Scholar Pottabathini Nikhil, M. Tech. Scholar Ganji Mahima

Abstract- Mental health – The purpose of this mission is to layout and construct a sun price controller, using mostly discrete additives. The rate controller varies its output to a step of 12V; for a battery of 200Ah rating. The design consists of four ranges which consist of modern booster, battery stage indicator, battery rate controller and electricity supply unit. The designed device may be very useful, durable, desirable cost and realizable the use of regionally sourced and less expensive additives. This work is a prototype of a commercial sun charge controller with protection systems so as to prevent damages to the battery related to unregulated charging and discharging mechanisms.

Sophisticated Air Quality Detecting System Using Raspberry PI
Authors:- K Ajay Kumar Reddy, Manchikatla Prathiba

Abstract- With a growing air pollutants, we developed a sophisticated Air quality detecting system using Raspberry Pi 3B+. The device includes monitoring the air first-class through the use of considering parameters like Suspended particulate keep in mind (SPM), Carbon dioxide, Ozone, Carbon monoxide, Smoke, temperature and humidity. Particulate depend being a completely vital parameter offers a smooth indication of pollutants in that precise time within the area. The ones pollutant records are extracted using sensors like MQ7, MQ135, MQ9, DSM501A, DHT11, and so on. Maximum of those sensors produces analog output so an Analog to digital converter is wanted earlier than providing the statistics to the Raspberry pi 3B+ microcontroller. the usage of software program and coding of the Raspberry Pi 3B+, the statistics are analyzed and a graph to show the modifications in the locality and time in which the test is plotted. The results acquired have been hooked up. The check is carried out in a locality at Rajarhat, New metropolis, Kolkata and the outcomes had been in evaluation with that from a neighborhood environment manipulates authority. This gadget would assist to take actual-time decisions and really effective in today’s state of affairs of excessive air pollution in maximum of the Indian towns.

Hydroponic System Monitoring by Means of Solar Energy
Authors:- M. Tech. Scholar Kanduri Navya Sri, M. Tech. Scholar Megavath Shankar

Abstract- The main idea behind this project is to develop a hydroponic system monitored by using solar energy. The hydroponic system uses water with required nutrients as a medium to grow instead of soil. For the power supply to the Arduino Uno, a microcontroller to control all sensors and for collecting and displaying the data to the users, we use solar energy. Different sensors such as propylene float water level sensor, pH sensor, and temperature sensor are used to monitor the elements, which helps users in the hydroponic system. For monitoring the system, the code was implemented by using Aurdino Software [5]. The temperature, water level, and Ph are measured and collected for further analysis.

Energy Efficient IoT Based Smart Home Automation Unit
Authors:- Venkata Ramana N, E Apoorva

Abstract- Advancement in IoT primarily based totally utility has end up the state-of-the artwork era for the various researchers because of the presence of Internet everywhere. To make the utility extra easy access to users, working with internet, android related technology has won their significance in current trend of technology. In this paper, IoT based low power consumption automation device of home is proposed which could monitor and command the domestic equipment from anywhere through internet. For this device, Internet connectivity module is connected to the primary power supply device which may be accessed via web. Static IP inclusion adds wireless operation to it. Home automation is primarily based totally on multi-modal utility that may be operated with the usage of voice reputation command of the person with the usage of the Google Assistant or via an internet-based utility. Thus, essential goal of this equipment is to make our domestic automation gadget extra stable and sensible.

Real Time Object detection and Tracking Using Open-CV
Authors:- Zaid Bin Shafi

Abstract- Computer vision is a very progressive and modern part of computer science. From the scientific point of view, theoretical aspects of computer vision algorithms prevail in many papers and publications. The underlying theory is really important, but on the other hand, the final implementation of an algorithm significantly affects its performance and robustness. For this reason, this paper tries to compare the real implementation of tracking algorithms (one part of the computer vision problem), which can be found in the very popular library OpenCV. Moreover, the possibilities of optimizations are discussed. An object Tracking System is used to track the motion trajectory of an object in a video. First, I use the OpenCV’s function, select ROI, to select an object on a frame and track its motion using a built-in-tracker. Next, Instead of using select ROI, I use YOLO to detect an object in each frame and track them by object centroid and size comparison. Then I combine YOLO detection with the OpenCV’s built-in tracker by detecting the object in the first frame using YOLO and tracking them using select ROI. Video tracking is widely used for multiple purposes such as human-computer interaction, security and surveillance, traffic control, medical imaging, and so on.

A Power System DG Protection and Power Scheduling Using Breaker Triggering Time Controlling
Authors:- Amit Yadav, Assistant Professor Deepak Bhataniya

Abstract- Modern electrical power system is spreaded over large geographical area with great complexity. Power quality requirements resulting from such great complex electrical network have motivated the improvement of fault location methods and development of protection scheme for grid. Grid is a vital, often overlooked, part of the power system. Even though faults on grid are very rare, they can lead to disturbances & major shutdown of power system network. Thus, protection of grid requires highly reliable, fast and high speed relaying scheme. With the fast changing technologies in the field of grid protection, new protection concepts addressing new technologies are coming to the market.

Plant Leaf Disease Detection & Fertilizer Suggestion using CNN
Authors:- Aniket K. Sawale, Akash V. Bhambere, Suvarna I. Patil, Manali B. Kapadnis

Abstract-Every country’s primary need is Agricultural products. If plants are infected by diseases, this impacts the country’s agricultural production and its economic resources. In agriculture for an efficient crop yield early detection of diseases is important. Automatic methods for classification of plant diseases also help taking action after detecting the symptoms of leaf diseases. In the agricultural sector, identification of plant diseases is extremely crucial as they hamper robustness and health of the plant which play a vital role in agricultural productivity. These problems are common in plants, if proper prevention methods are not taken it might seriously affect the cultivation. The current method of detecting disease is done by an expert’s opinion and physical analysis, which is time-consuming and costly in the real world. We are introducing the artificial intelligence based automatic plant leaf disease detection and classification for quick and easy detection of disease and then classifying it. This main aim of ours system is towards increasing the productivity of crops in agriculture. In this approach we have follow several steps i.e. image collection, image preprocessing, segmentation and classification.

A Review Article of Comparative Analysis of Geotextile and Geojute Compressive Strength
Authors:- Arpan Gupta, Prof. Sh. Vinay Deulkar

Abstract- This study covers a literature search and review to obtain information on geotextile applications related to pavement construction. Applicable information-from this study, if sufficient, would then be used to prepare guidelines on design application, material specifications, performance criteria, and construction procedures for improving subgrade support with geotextiles in general aviation airport pavements. The study revealed that there are numerous design procedures available for using geotextiles in aggregate surfaced pavements and flexible pavement road construction. However, there is no generally accepted procedure for either type construction. The state-of-the-art has not advanced to the point where design procedures for using geotextiles in paved airport construction are available. Construction/installation procedures are available for using geotextiles in aggregate surfaced pavements and flexible pavements for roads, and these may be used as an aid in recommending procedures for airport construction.

IOT Based Auditorium Sound Controlling System
Authors:- M. Tech. Scholar Banothu Prashanth, M. Tech. Scholar Bodupalli Sindhuja

Abstract- It hasbecome a certain thing that there would be communication in our day-to-day life but due to the limitation of the human voice, this project came into existence. A public address or “P.A system” is anamplification system that is used in our design that consists of a mixer, amplifier, loudspeaker, and microphone that converts sound into electrical energy this electrical signal produced arebeing transmitted to the amplifier circuit to amplify the signal. The amplified is thus given as input to the loudspeaker that converts the electrical signal back to the original form but amplification is done here. The overall design is made up of a power supply unit, the pre-amplifier, and pre-amplifier units,a tone control unit, anda Bluetooth module. The overall design is constructed for delivering 20W electrical power into an 8-ohm load means the loudspeaker. This design comprises of fixing each classroom with a sound controlling system and the control will be in the hands of the main person who wants to communicate the information according to his /her selection. RF technology has been used here to make the loudspeaker turn ON according to the selection.

Wearable Health Monitor for Soldier
Authors:- M.Tech. Scholar Pamba Anjanamma, M.Tech Scholar Gunde Harish

Abstract-The nation depends upon the enemies’ warfare and so the safety of the soldiers is considered as vital role in it. Many times soldiers become lost or injured. This project gives the ability to track the current location and gives the current health status of the soldier and also concerning the soldiers’ safety, there are many instruments to view their health. In soldier’s health monitoring, bio-sensors systems such as temperature sensor and heart rate sensor give the result of abnormal condition when the level goes low or high. The GPS sensor gives the latitude and longitude to find the direction becomes easier. GSM module can be used for effective range of high-speed transmission, short-range and soldier-tosoldier wireless communications that will be required to relay information on critical situation awareness so that the rescue operation become easier. Both GPS and GSM devices are being added to weapons and firearms, and some militaries such as theIsraeli Army which are exploring the possibility of embedding the devices into soldiers’ vests and uniforms. Through this project, we continuously monitor the health status (body temperatureand heart rate) of the soldier and transfer the data wirelessly to the website using mobile as a server through IOT. So by using these equipments, we are trying to implement the basic lifeguarding system for soldier in low cost and high reliability..

Smart Virtual Indoor and Outdoor Guiding System for Blind People
Authors:-M. Tech. Scholar Samamah Rafath, M. Tech. Scholar Harish Pamu

Abstract-This paper presents a Smart system for visually impaired, that make use of ultrasonic sensors and camera. The main aim of this work is to design a voice-based alerting system for the blind people. Visually impaired individuals find navigation difficult as they struggle every day in performing actions for bypassing obstacles and hurdles in their path. In order to help blind people, navigate safely and quickly this system is proposed. Ultrasonic sensor is placed on the spectacle which is used for obstacle detection with distance indication. The camera is used to detect the object in front of the blind people and alert them using the APR voice module. This system prevents the blind people from accidents and identifies the object in front of them.

IOT: Prime Challenges, Problems and Analysis using New Technologies
Authors:- K. Rajkumar, G. Sai Keerthi, N.Pooja

Abstract- Internet of things is best domain for sharing and for communicate the data to real world. Now a day’s many things are connected with each other using different mediums and produce information various formats and offers different service. IoT brilliance in internally connected objects for communicate, giving information to others and making decisions and to provide service service as per our requirement. The network protocols and architecture use things, information produced by the things leads to several issues such as policy issue, security issue, complexity and standardization. This research gives the idea about the different challenges of internet of things and various issues, as it leads to technologies which are associated for internet of things and provides the solutions to the issues.

Techniques for Retrieving Images based on the Region of Interest
Authors:- PG Scholar V.Divya Madhuri, PG Scholar G.Sai Prasanth Kumar

Abstract- This paper depicts how to find interest base image area, techniques and algorithm for image retrieval. Portion of an image is considered important or selected specified area of an image defines a region of interest. With the help of content-based image retrieval systems, retrieval performance in large databases can be revamped which handles the extraction of global and regional features of images. Region-based features exhibited to be more effective, reflecting user specific interests with greater precision and accuracy than global features. Extraction of features, indexing, segmentation and image retrieval are the jobs need to be done in retrieving images in order to meet the similar regions specified in the task given. In this paper, the basic idea of ROI (Region of Interest) based retrieval of image concepts is depicted and it is anticipated to provide researchers that are working in ROI based retrieval system field. This paper also reviews the work of researchers included in the span of twenty years. Main aim of this paper is to provide comprehensive reference source for researchers involved in ROI based image retrieval. Algorithm of operations performed on ROI of images retrieved is implemented in MATLAB software with results are provided.

A Review on Mechanical Properties of Engineered Cementitious Composites
Authors:-UG Scholar Chilumu Ruchitha, UG Scholar Gudibandla Spandana, UG Scholar Guthikonda Pallavi, UG Scholar Nakerekanti Vasantha, Asst. Prof. Ch Saidhi Reddy, Asst. Prof. P Janardhan, Asst. Prof Modugu Naveen Kumar

Abstract- This paper provides an overview of the various properties of engineered cementitious composites (ECCs) that are used in a variety of structural applications. Different properties of engineered cementitious composites are investigated in this paper, including tensile, flexural, compressive, tensile strain capacity, shear strength, toughness, fibre matrix interaction, drying shrinkage, water permeability, sorptivity, cracking, impact and frost resistance, and beam-column connection behavior. According to the study, ECC has a much greater strain capacity than conventional concrete, as well as a higher energy absorption capacity, defection capacity, and impact resistance, as well as a crack width of less than 100 m. The use of mineral admixtures improves tensile strain capacity with multiple fine cracks, while compressive strength and carbon dioxide emissions decrease, according to the findings of various studies. Fiber hybridization can increase ECC’s strain hardening with various fine cracking, flexural and toughness properties, impact resistance, and crack width resistance.

Automatic Destination Reaching Drone Using Autopilot Software
Authors:- PG Scholar N.Vasundhara, PG Scholar G.Ravi

Abstract- This paper represents Quadcopter (QC) as a low- weight and low-cost autonomous flight capable Unmanned Aerial Vehicle (UAV) for delivering ordered by online by using an autopilot software as its core on-board processing unit. This Quadcopter by following Google map can locate and navigate destination. This paper demonstrates the Quadcopters capability of delivering order by online and coming back to the starting place. The promising result of this method enables future research on using Quadcopter for delivering parcel.

Performance and Modeling for the Home Solar Thermal and Power Supply System and Energy Management
Authors:- M.Tech. Scholar Rajkumar Baghele, Asst Prof. Shyam Kumar Barode, HOD Sachin Jain

Abstract-PVT hybrid systems (photovoltaic and thermal) are solar photovoltaic systems that are combined with a thermal energy system. Because the hybrid system uses the same area to generate both electricity and heat energy, the system’s overall efficiency improves Aside from crop drying and air heating, a solar PVT system may be built into a structure’s façade, which is known as a building integrated PVT system (BI/PVT). The increasing cost of fossil fuel and crisis of energy has led the world in a quest for exploiting the free and naturally available energy from the sun to produce electric power. This thesis summarizes the development situation of the solar thermal electric technology with description and comparison for three prevalent power generation methods: PV tracking techniques are the methods for positioning solar panels to maximize the quantity of solar irradiation that can be captured. A fixed-tilt solar panel is frequently placed utilizing manually adjustable panel slops, which have the advantages of being cheap cost and simple to install. However, because the sun’s location changes during the day or year, they are unable to benefit from the maximum amount of solar irradiation possible PV tracking technology allows a PV array to automatically adapt to the sun’s high-density beams. The PV tracker necessitates the purchase of additional components and accessories, such as a motor, gear, control unit, and sensor, which raises the cost of the PV system.

Handover Using Fuzzy Analytic Hierarchy ProcessHandover Using Fuzzy Analytic Hierarchy Process
Authors:- G. Bhuvana Sri, S. Durga

Abstract- The Next Generation Networks have heterogeneous nature and cover wide range of technologies such as Long-Term Evolution (LTE), Wireless Local Area Network (WLAN), Worldwide interoperability for Microwave Access (WiMAX) etc. with a variety of data rates and coverage. When a user travels at a certain speed and continuously changes the direction, good connectivity and reasonable Quality of Service (QoS) should be provided in order to manage the switch over between various networks.

Design of Efficient BCD Adders Correction Logic in QCA Technology
Authors:- Sandu Ajay Kumar, Mudavath Kavitha

Abstract- Recent experiments in the field of VLSI designing and Nanotechnology have demonstrated a working cell suitable for implementing the Quantum-dot Cellular Automata (QCA). QCA is a transistor less computational model which is expected to provide high density nanotechnology implementations of various CMOS circuits. QCA has been constrained by the problem of meta-stable states. QCA adder with comparatively less number of cells and area has been proposed in this project. This paper also demonstrates a reversible logic synthesis for one bit adder which gives a superior solution for side channel attack based on power analysis in security applications. The new proposed hybrid method reduces cell counts and area and uses conventional form of QCA cells. QCA implementation provides efficient design methodology for faster speed, smaller size and low power consumption when it compared to technology imposed by transistors. QCA provides ability to quickly layout a QCA design by providing an extensive set of CAD tools.

Footprint of AI in VLSI Design Automation
Authors:- Anusha Anugu, Akshay Pittala

Abstract- This paper deals with the impact of Artificial Intelligence on the VLSI chip design techniques . An evident challenge ahead for the integrated circuits (IC) industry in the nano meter regime investigation .The splendid progress on VLSI technology and gradual shifting of VLSI chips designs to Ultra large scale integrated (ULSI) circuits system made the use of computer aided design (CAD) and programs(tool) helped significantly to the automation of VLSI chip design. Anyhow, by integrating and placing these tools together into one package, the functionalities and the effectiveness of CAD programs decreased drastically. To reduce these problem researchers suggested artificial intelligent techniques. Conventional methods employed for such tasks are mainly manual; thus becomes more time-consuming and resource-intensive. Artificial intelligence techniques like expert and knowledge-based systems, at first define the problem and then select the best solution from the different possible domains of solutions. Using AI algorithms in VLSI design and manufacturing them reduces the effort and time for processing and understanding the data across and within different abstraction levels by automated algorithms. Artificial Intelligence performance and their techniques used in aiming VLSI design for automation intelligence and high speed, and their efficient way of implementations are discussed in this paper.

Factor Affecting Labour Productivity In Construction Projects
Authors:- Umang Mandloi, Assistant Prof. Diwakar Singh

Abstract- Construction project is said to be successful if it is completed in schedule duration and estimated cost. For that purpose productivity has to be efficient. Productivity forecasting plays an important role in strategic and operational planning. Quantitative forecasting is used for decision making process for many of complex situations. The construction industry is a unique one, highly diversified and fragmented, and one that produces unique products. It is not therefore less difficult to define labor productivity in this industry than it is in the rest of the industry. Labor productivity is still a complex issue in construction and extremely difficult to measure due to the heterogeneity of the industry’s products as well as of its inputs. Accordingly, in this study a review on improvement of labour productivity in construction industry.

Performance of Video Streaming Based on Canny Edge Detection Algorithm
Authors:- M.Tech. Scholar Nikhil Soni, Prof. Mahesh Prasad Parsai

Abstract- In image processing and computer vision, figuring out where the edges are is important. object recognition is used in computer vision to give more accurate information about an image’s contents as well as to improve the security and reliability of the image as a whole. There are likely to be many people who use face and pedestrian detection. In this study, we point out some problems with the traditional way of figuring out where the edges are. The goal of this work was to improve edge detection by filtering and setting thresholds for different contrasts in a picture. This study shows how to get moving and strong edges with an improved canny edge detection method. In order to cut down on the amount of data that needs to be processed while still keeping the important structural parts of an image, the main features can be found at the edges. With edge detection and morphological image processing, this study comes up with a new way to process images based on footage from a video. An inflammatory area can be found with a new way to get processed images. It will be more efficient and easy with the help of clever edge detection, so it will. Our findings suggest that we are very good at what we do. 98 percent of the time, 97.618 percent of the time. More than 90% of the 86 microseconds have passed. A person walks at a speed of 2.12 seconds per minute.

Antitheft and Multifunctional smart suitcase with real-time tracking system
Authors:- Prof.Siddhesh Khanvilkar, Mr. Sahil Bhurke, Mr. Shubham Anbhule, Mr. Shravan Chilka

Abstract- The main idea of the Smart Luggage System IoT Project is to develop an easily usable bag carrying machine. This is not just an automation but its beyond that. Bags carry a vital role in our travelling regardless it be a hiking bag or a polythene bag or a travelling bag. Pulling it all over has been done since time immemorial. Visualizing of a bag that conveys its weight, traces its position, which automatically follows the user, by touching the current technology in the old carriers may reveal its true potential. This has always encouraged the project to be easy to use.

A Comparative Survey on Various Steganography Techniques
Authors:- M.Tech. Scholar Ashma Naz, Associate Prof.Shrikant Zade

Abstract- In present Scenario of the world, Internet has nearly reached to each part of our lives. Because of this, the vast majority of the data sharing and correspondence is completed utilizing web. With such fast improvement of Internet innovation, a major issue emerges of unapproved access to private information, which prompts most extreme need of data security while transmission. Steganography covers many kinds of covers to conceal information like text, picture, sound, video and protocols yet ongoing advancements focus around Image Steganography because of its huge information hiding limit and troublesome recognizable proof, likewise because of their more noteworthy scope and mass sharing inside social organizations. An enormous number of strategies are accessible to conceal secret information inside digital images like LSB, ISB, and MLSB and so on. In this paper, a detailed survey will be introduced on Image Steganography and furthermore various information hiding and security methods utilizing digital pictures with their scope and elements.

A New Approach for Image Steganography Using Inter Pixel Value Difference and Quantized Range Table Method
Authors:- M.Tech. Scholar Ashma Naz, Associate Prof.Shrikant Zade

Abstract- In the time of data, secret communication is quite possibly the main issues in the present communication framework. The improvement of computerized communication with information mystery becomes one of the fundamental reasons for the analysts. Among the information security methods, steganography is a way to deal with conceal the presence of mystery message in a transporter without being caught by the intruders. As of now, it is essential to conceal information and innovate systems by moving them so that the intruders cannot get the message. There are different information concealing strategies that utilization different advanced media. Digital images are the most well-known among the transporter designs on account of their recurrence on the web. In this paper, another methodology of image steganography with least significant bit substitution is proposed where the data inserted in the arbitrary bit position of a pixel. The test result implies the significance of the proposed technique.

Random Intervel Query and Face Recognition Attendance System for Virtual Classroom using Deep learning with AI
Authors:- Asst. Prof. Nallusamy P,Aravinth C, Goerge Williams A, Kishore K, Kowsik R

Abstract- In today’s competitive world ,most of the learning process take place in virtual mode due to the phenomenoal circumstances like COVID-19.The online learning makes the teachers and students in virtual classroom as an alternative for the one-on-one learning in physical classrooms.Instead of focusing on learning ,lectures are stuck with taking and maintaining the attendance record for the individual student in manual mode during the virtual classroom as it consumes the classroom time.It’s hard to keep students engaged without a teacher’s physical presence and face-to-face contact.In this paper ,we introduce the ‘Random Interval Query and Face Recognition Attendance System for Virtual Classroom using Deep Learning with AI’,which is an innovative solution for attendance monitoring issues during virtual learning.Here the attendance monitoring is done through face recognition with the help of AI.The algorithm used here is Deep Neural Network (DNN) learns and captures the unique features from each student ‘s face input.It collects the faces of student’s in the classroom and matches with the exact face of the student with the database that are stored in the server.However, it takes the accurate attendance of the student day by day and stores in server so that teachers can monitor and maintain their attendance properly.

University Computer Network Vulnerability Assessment
Authors:- PhD Research Scholar Kismat Chhillar, Assoc. Prof Saurabh Shrivastava

Abstract- University Computer Network being large, diverse and open in nature is highly vulnerable to attacks. This demands for high level of network security to maintain the confidentiality, integrity and authenticity of crucial data that university deals with on daily basis. This paper presents the scanning of a Computer Network of a University using scanning tools Qualys and Nexpose. The scan results were analyzed to provide remediations for vulnerabilities detected according to severity. Priority is given to vulnerabilities having critical severity. From scan results, CVE IDs of vulnerabilities weredetermined and then the risk associated with a vulnerability was evaluated using National Vulnerability Database (NVD) of National Institute of Standards and Technology (NIST). From CVE ID of a vulnerability, CVSS Base Score was noted from NVD. The Common Vulnerability Scoring System (CVSS) is used for scoring of vulnerabilities based on their severities form score of 0 to 10. Risk score is also given in the scan results of Nexpose. Based on the risk that a vulnerability possesses on a network, further decisions on remediations can be taken by the concerned authorities. Critical vulnerabilities need to be dealt on priority basis else there are high chances for them to be exploited by attackers which in turn might create a serious damage to the host or network. Current paper presents vulnerability assessment and risk level estimation of critical vulnerabilities of University Computer Network.

A Study on Construction of Flyover to Avoid Traffic Congestion
Authors:- Bhagyalaxmi Akkenepally, Galapati Deepa, B. Sony

Abstract- Miryalaguda is a congested place in Nalgonda district and populated with above 1 lack, existed with 80 rice mills, many educational institutes, Hospitals, railway station, etc.. The Nagarjuna left canal also existed near to this. All agriculture carts are used to transport through this way so it was necessary to handle the heavy traffic and for uninterrupted connectivity of the transportation. Construction of flyover can be reduce traffic, fatal and non-fatal accidents and make the facility to perform more transportation. Accidents were avoided by constructing a fly-over about 1 km distance, at Hanmanpet Cross Road from Peddavoora to Addanki Road. It includes 11 piers and 2 Abutments and connects all four roads at a junction. Open foundation was used for all piers and Abutments. Total station was used to locate exact centre points of piers. JCB Vibromax and Cranes are used to excavate and strengthening of soil. In order to remove rock strata explosive materials were used. Dumpy level was used to give reduced levels for Reinforcement according to standards and specifications and also estimated the quantity of rock. PCC and VRCC concrete and Fe415 steel with diameters of 10mm,8mm,12mm,16mm ,20mm,25mm bars are used in construction. Many field tests like slump cone test and cube compressive strength tests are performed to find the strength of concrete. The risk and failure of bridge elements was analysed and problems were solved while constructing and also traffic jams, accidents, head on collision incidents have been reduced. It takes around 24 crores.

Investigation the role of Data Science in Advancements for Mechanical Engineering
Authors:- Raghuvamshi Bathini, Ganji Lokesh, Avula Nivish

Abstract- Miryalaguda is a congested place in Nalgonda district and populated with above 1 lack, existed with 80 rice mills, many educational institutes, Hospitals, railway station, etc.. The Nagarjuna left canal also existed near to this. All agriculture carts are used to transport through this way so it was necessary to handle the heavy traffic and for uninterrupted connectivity of the transportation. Construction of flyover can be reduce traffic, fatal and non-fatal accidents and make the facility to perform more transportation. Accidents were avoided by constructing a fly-over about 1 km distance, at Hanmanpet Cross Road from Peddavoora to Addanki Road. It includes 11 piers and 2 Abutments and connects all four roads at a junction. Open foundation was used for all piers and Abutments. Total station was used to locate exact centre points of piers. JCB Vibromax and Cranes are used to excavate and strengthening of soil. In order to remove rock strata explosive materials were used. Dumpy level was used to give reduced levels for Reinforcement according to standards and specifications and also estimated the quantity of rock. PCC and VRCC concrete and Fe415 steel with diameters of 10mm,8mm,12mm,16mm ,20mm,25mm bars are used in construction. Many field tests like slump cone test and cube compressive strength tests are performed to find the strength of concrete. The risk and failure of bridge elements was analysed and problems were solved while constructing and also traffic jams, accidents, head on collision incidents have been reduced. It takes around 24 crores.

Ground water Level Prediction Using Random Forest Technique
Authors:- S. Valarmathi,N. Hariraghavan, K. Santharuban Supervisor R.P.Vijai Ganesh

Abstract- Ground water level predıctıon usıng random forest technique. most of the fresh water resources in our worldconsist of underground water reserves. estimation of fluctuations of groundwaterlevel (gwl)is very important in them anagement of water resources.in this study,ground water level (gwl) was investigated using random forest approaches in india. total689 data taken from various districts belonging to various states in india were used in the study. using the annual averageprecipatation and extraction level, the change in gwl is modeled by support vector regression(svr),multilayer perceptron(mlp),random forest(rf) approaches. the results showed thatrandom forest(rf) shows best result.

Ground water Level Prediction Using Random Forest Technique
Authors:- Nilesh Pathare, Kamlesh Gurjar

Abstract- Improving the efficiency of any operation in the Manufacturings sector, whether manufacturing, distribution, or support services, is much more than a one off exercise. In the current economic climate, with reduced demand from the construction, automotive and aerospace industries, added to increasing threats from overseas suppliers, and customer- led demands for cost control, it is essential to have a mechanism in place which reviews and updates processes and systems, and looks for smarter ways of working The present study has covered three areas namely, environmental accounting, reporting, and auditing. Keeping in view the observations of the study, suggestions have been made in each of these three areas. The recommendations are for the benefit of professional accounting bodies, government, regulatory authorities, professional accountants, companies, and various stakeholders.

A Cycle Simulation Model Of A Diesel Engine For Predicting The Performance Using Python
Authors:- M.Tech. Scholar Sneha Waghmare, Assistant Prof. B. V. Lande

Abstract- Experimental research generally requires a significant amount of work, money, and time. To forecast the performance of a diesel engine, a cycle simulation model containing a thermodynamically based single zone combustion model was constructed. For compression ignition (C.I) engines, a thorough computer code was built using ‘Python’ programming language. Combustion factors including cylinder pressure, heat release, and heat transfer were studied, as well as performance characteristics like work done, braking power, and brake thermal efficiency (BTE). The characteristics at each degree crank angle were computed using the first law of thermodynamics. The maximum pressure and temperature value was determined to be quite near to the experimental value based on the results.

GIS-Multicriteria Evaluation Using AHP For Geohazards Susceptibility Mapping In The City Of La Paz, Baja California Sur., Mexico(Vista Hermosa Urban Settlement)
Authors:-Joel Hirales-Rochin

Abstract- Actually, geology has become a fundamental tool to determine areas of susceptibility, vulnerability and geological risk. The geological dynamics and the accelerated changes of the processes at the climatic level in the last decades have demonstrated the close relationship between geological space and sustainable urban development of a city. From this interaction, it is possible to respond to the growing demand for environmental and urban solutions. At the national, regional and local level where the study area is located, there is a growing need to create new urban areas, but these are not linked to an adequate analysis of the geological environment and knowledge of the main factors that control susceptibility vulnerability and risk conditions and consequently, their impacts.The methodology to achieve the objectives was based on a characterization of the geological, hydrogeological and geomechanical conditions of one of the main urban irregular urban settlements of the city of La Paz, capital of the State of Baja California Sur., Mexico, using the methodology. of the Analytical Hierarchy Process (AHP), in combination with the multi-criteria analysis (MCA), thus obtaining a risk susceptibility map and a set of thematic maps related in local areas to flood events, debris flows, landslides rocks and landslides. The results represent the first stage of a larger project and with this it is possible to contribute new knowledge to be used in the more precise zoning of geo-hazards, which will allow the State capital a sustainable growth of the population of the city., the improvement of current construction standards and the corresponding zoning to anticipate their development in an orderly manner.

Implementation paper for Weed Detection in Agricultural Crops
Authors:-Pradnya Nikam1, Kartiki Borage, Shreyash Lokhare, Shraddha More, Prof. Pushpavati V. Kanaje

Abstract- AWhen a plant is in a place where it shouldn’t be, it is called as weed. Weeds are one of the major problems faced by the farmers because they result in reduction of yield. There are few algorithms developed to identify crops and weeds. In this paper, we focus on identifying the weed present between the crops which compete with the crops for nutrition, sunlight, water etc. The objective to develop such a model is that, if we identify weeds, we can find out which areas should not be sprayed with pesticides, water and other nutrition and eventually it will result in reduction of weed. In our paper, we have proposed a system in which we will pass a video and CNN, Yolo algorithms are used to identify the weed. The purpose of selecting Yolo algorithm is that it has become a industry standard for object detection due to its speed and accuracy and CNN helps us to reduce images in such a form that processing becomes easier, also this process does not result in losing any features that are critical for giving us good prediction. The contributions of this paper are to: study and present an approach to identify weeds that are present in crops, develop a method that can identify weed in plantations.

Channel Estimation and BER Reduction Using Artificial Neural Network
Authors:- M.E. Scholar Pankaj Kumar, Asst. Prof. Komal Kanojia

Abstract- The work proposes Inter-Symbol Interference (ISI) reduction scheme, ISI being a major problem in Optical systems, which produces various type of non-linear distortions. So the implementation of OFDM system using Artificial Neural Network (ANN) scheme with M-QAM modulation technique is proposed and compared with the conventional OFDM system without using ANN. This proposed scheme is implementation of Backpropagation (BP) algorithm over AWGN channels to achieve an effective ISI reduction in orthogonal frequency division multiplexing (OFDM) systems. Simulation results prove that ANN equalizer can further reduce ISI effectively and provide acceptable BER and better MSE plot compared to conventional OFDM system.

IOT Enabled Smart Charging Stations for Electric Vehicles
Authors:- Prof. R.A.Sanadi, Gauri M.Patil, Rutuja M. Patil, Anjali P. Sankpal, Samruddhi S

Abstract- Fuel that we are using for our vehicles has limited supply in nature. So, everyone moving towards electrical vehicle to consume fuel as possible. But still people are not ready to change electrical vehicle over present fuel vehicles. One of the reasons for this is because of price and lack of charging stations. Even if there are few charging stations are available, people must have to spend extra time for charging the vehicle. Also, car parking has become a major problem in urban cities. So, by looking at these issues we can provide a smart parking with charging availability to the most commercial buildings, petrol pumps, etc. This will reduce the efforts of finding for slot of parking. Also, there is no need to invest more time for finding charging station. This project gives you brief idea about the wireless power transfer technology for EV’s and charging systems with IOT. In this project, research of IOT based smart parking methods which are implemented is studied and comparison is done between combined parkingand charging system with separated parking and charging system.

A Review On Prediction Of Piston Performance Using Two Varience Anova Method
Authors:- Sheikh Mohshin Raza, Assistant Professor Kamlesh Gangrade

Abstract- Piston plays a main role in energy conversion. Failure occurred of piston due to various thermal and mechanical stresses. The working condition of the piston is so worst in comparison of other parts of the internal combustion engine. The main objective of this work is to investigate and analyze the stress distribution of piston. Design and analysis of an IC engine piston using three different materials that are used in this project.

Prediction of Wine Quality Using Machine Learning Algorithms
Authors:- Associate Prof. Lakshmi.D, Anil Kumar.B, Guda V.S.C.S.S.Gowtham, Konda Venkata Saran Vineeth

Abstract- Piston plays a main role in energy conversion. Failure occurred of piston due to various thermal and mechanical stresses. The working condition of the piston is so worst in comparison of other parts of the internal combustion engine. The main objective of this work is to investigate and analyze the stress distribution of piston. Design and analysis of an IC engine piston using three different materials that are used in this project.

Telemedico Portal for Booking Consultation with Best Doctors
Authors:- Asst. Prof. Bhagyata Mhatre, Sneha Khollam, Kirti Patil, Snehal Patil, Pratiksha Bhosale

Abstract-It is a real challenge when we try to move through an unknown environment and can’t rely on our own health. As during this COVID-19 pandemic many peoples are facing problems to visit the clinics and take the consultations with the doctors. As the condition is not being good so it is not suitable for a person to take the physical consultation with the doctors. This paper focuses on developing online portal names as ‘Telemedico’ to make audio or video consultation with doctors online. This portal is the distribution of health related services and information via electronic information and telecommunication technologies. It allows long-distance patient and clinician contact, care, advice, reminders, education, intervention. Telemedico is sometimes used as a synonym, or is used in a more limited sense to describe remote clinical services, such as diagnosis and monitoring. When rural settings, lack of transport, a lack of mobility, conditions due to outbreaks, epidemics or pandemics, decreased funding, or a lack of staff restrict access to care. Online information and health data management and healthcare system integration. Telemedico could include two clinicians discussing a case over video conference.

Review of Structural Analysis of Steel Plate Shear Wall
Authors:- Research Scholar Piyush Kumar Jaiswal, Asst. Prof. Rahul Sharma

Abstract- For construction activity normally we use materials as concrete and steel to build up tall buildings. In concrete there are different constituents like aggregate, cement, sand, admixtures, water and plasticizers from which we can achieve the characteristic strength according to our structure. We also use various grades of steel like MS, TOR, TMT, depending on the type of structure. We can construct building by using these two main components up to the limit that means the deign limits according specified by the IS 456:2000 ‘Plain and Reinforced Concrete’. But for the high rise structures we cannot go only by using these two components i.e. concrete and steel. We have to choose some different alternatives or different systems to construct the high rising structures therefore we can see system like Steel plate Shear Wall (SPSW) suggested by different scientist that we are going to study in this paper. We are going to study the Performance of Steel Plate Shear Wall during Past Earthquakes events. In this paper we will also study the testing on steel plate and also the different case study of SPSW system.

A Review Study on Applications of Big Data in Business Organizations
Authors:- Saumya Satija

Abstract- In this digital era, huge amount of data is generated and available to the decision makers within an organization. Big data is a term used to describe the large volume of data that can be structured or unstructured which the traditional tools and techniques cannot handle. Business organizations have a huge amount of data that affects their business on day to day basis. It includes data that can be viewed and analyzed by different audience obtaining different knowledge and creates value for making effective decision for the business to sustain and achieve its objectives. This review paper aims to identify some of the applications of big data analytics in different verticals of business that helps in effective planning, controlling, directing, and allocation of resources for innovation and creation of new ideas that help an organization to sustain, grow and increase its revenue.

Application of Machine Learning and Deep Learning Algorithms in the Detection of Parkinson’s Diseases: a Review
Authors:- Saloni Bhatia Dutta, Rekha Vig

Abstract-Neuroimaging studies including functional, structural and molecular modalities that provide with underlying features and biomarkers for the detection of Parkinson’s disease (PD). The usage of multimodality techniques in neuroimaging can help in diagnosing the disease from new perspective with better accuracy. This paper deals with the study of different Machine Learning (ML) and Deep Learning (DL) algorithms that had been applied on different modalities like Magnetic Resonance Imaging (MRI), it’s various variants, Positron Emission Tomography (PET), Single Photon Emission Tomography (SPECT) and data like handwritten images, voice data, Gait data etc. Papers which implemented ML or DL techniques on these modalities have been reviewed and the method, cohorts along with results provided by each paper has been well illustrated.

Human Activity Detection Using Deep Learning
Authors:- Asst. Prof. CVSN Reddy, Karthik B, David Antony Selvaraj A, Gagan GR, Ramesh Roshan M, Adarsh SM

Abstract- In this modern world, Human activity Recognition and Detection are gaining importance where it is and will be used in many upcoming innovations, not only in security and surveillance but also in understanding the behavioral patterns of humans. The purpose of this project is to develop a model that would take the video input from different sources like recorded videos and detect actions that are being performed by the people which is commonly referred to as Human Activity Recognition or Human Activity Detection. To emphasize its importance the project aim is to build a model which can intelligently classify the video clips related to human activities. The project is making use of keras library where video classification is involved and implementing the model by using CNN and LSTM algorithms. The expected result can be a wise application that could predict various human activities. The project has made use of the UCF50 – Action Recognition dataset to train the model.

A Review of Intrusion Detection Systems
Authors:- M.Tech. Scholar Bablu Karoriya, Asst. Prof. Girish Gogate

Abstract- The intrusion Detection System (IDS) monitors and detects intrusion attacks. This article examines current IDS research employing Machine ML technique; dataset, ML metric and algos The choice of data sets is vital. Verify model construction for IDS usage. Also, dataset Structure may impact ML algorithm performance. So, ML algorithm selection is influenced by the chosen dataset. Then metric will supply a ML algorithm assessment on a given dataset. This soft computing approaches are getting many have given it here. In Also, numerous scholars are studying categorization of IDS, which helps identify known intrusions attacks. But it may be difficult to recognise anomalous incursion, new or modified intrusions. Many researchers were still Using KDDCup99 and NSL-KDD, are nearly 20. This tendency might lead to stagnant IDS as intrusion attacks continue adapt to new technology and consumer habits Ultimately, this circumstance renders IDS obsolete. a cyber security tool Popular metrics for Its strengths include accuracy and True Positive. TPR and FPR (FPR). Expected, since these metrics give vital information highly important for IDS.

Telemedico Portal for Booking Consultation with Best Doctors
Authors:- Asst. Prof. Bhagyata Mhatre, Sneha Khollam, Kirti Patil, Snehal Patil, Pratiksha Bhosale

Abstract- The intrusion Detection System (IDS) monitors and detects intrusion attacks. This article examines current IDS research employing Machine ML technique; dataset, ML metric and algos The choice of data sets is vital. Verify model construction for IDS usage. Also, dataset Structure may impact ML algorithm performance. So, ML algorithm selection is influenced by the chosen dataset. Then metric will supply a ML algorithm assessment on a given dataset. This soft computing approaches are getting many have given it here. In Also, numerous scholars are studying categorization of IDS, which helps identify known intrusions attacks. But it may be difficult to recognise anomalous incursion, new or modified intrusions. Many researchers were still Using KDDCup99 and NSL-KDD, are nearly 20. This tendency might lead to stagnant IDS as intrusion attacks continue adapt to new technology and consumer habits Ultimately, this circumstance renders IDS obsolete. a cyber security tool Popular metrics for Its strengths include accuracy and True Positive. TPR and FPR (FPR). Expected, since these metrics give vital information highly important for IDS.

IOT Based Smart Energy Meter Monitoring with Theft Detection
Authors:-Ramkrishan Nishad, Deepali Salunkhe, Mayur Thorat, Prof. Sachin Desai

Abstract- In India, the demand for energy, especially electrical energy, is sky- rocketing and posing several problems for policy-makers, administrators, industrial and house-hold consumers. The hardest hit is the common house- hold consumer who not only has to pay the rapidly increasing prices for electricity, but also has to put up with frequent power-cuts, load-shedding, fluctuating voltages, power theft, faulty meters and most of all suspiciously high bills. When consumers know in real-timethe pattern of consumption of their house-holds, they will be able to control their usage and guarantee savings. World’s main focus is to make a smart home to take advantage in providing comfort for human life. Web technology is a thing which is growing all the time. Embedded systems with Internet on Things (IoT) is becoming important and necessary part in the current IT industry and exhibiting potential market. Power consumption and efficiency with a user’scomfort level is most important issue during this stage while performing various operations. This system gives theinformation on meter reading, power cutand the alert systems for producing an alarm when energy consumption exceedsbeyond the specified limit using IoT. This idea is being implemented to reducethe human dependency to collect the monthly reading and minimize the technical problems.

Self-Cleaning Concrete: The Future
Authors:-Prathamesh R. Ingole, Niranjan D. Mali, Piyush A. Kedari, Mazain V. Shaikh, Lecturer Rushali P. Wade

Abstract-Concrete is the most considerably used construction accoutrements for erecting technology. But cement product releases high quantities of carbon dioxide (CO2) to the atmosphere that leads to adding the worldwide or global warming. Therefore, another, environmental friendly construction material similar as photocatalyst concrete has been developed. Photocatalytic concrete applies greener indispensable binder, which is a ultramodern- day construction material that replaces the Conventional cement. This technology presented nano patches similar as nano clay into the cement paste in order to ameliorate their mechanical parcels. The concrete accoutrements also have been developed to be performed as tone- drawing construction accoutrements. The tone drawing parcels of the concrete are convinced with the help of photocatalytic accoutrements similar as Titanium Di-oxide (TiO2). Tone- drawing concrete that contains those photocatalytic will be amped by ultraviolet (UV) radiation and quickens the corruption of organic particulates. Therefore, the dinginess of the structure shells can be maintained, and the air girding air pollution can be reduced. This paper briefly reviews about tone- drawing concrete.

Facial Recognition Attendance System Using Python and OpenCv
Authors:-Nikhil Rai, Raj Kumar Tiwari, Vipin Kumar, Assistant Professor Mr. K. Suresh

Abstract-The main purpose of this project is to build a face recognition-based attendance monitoring system for educational institution to enhance and upgrade the current attendance system into more efficient and effective as compared to before. The current old system has a lot of ambiguity that caused inaccurate and inefficient of attendance taking. Many problems arise when the authority is unable to enforce the regulation that exists in the old system. The technology working behind will be the face recognition system. The human face is one of the natural traits that can uniquely identify an individual. Therefore, it is used to trace identity as the possibilities for a face to deviate or being duplicated is low. In this project, face databases will be created to pump data into the recognizer algorithm. Then, during the attendance taking session, faces will be compared against the database to seek for identity. When an individual is identified, its attendance will be taken down automatically saving necessary information into a excel sheet. At the end of the day, the excel sheet containing attendance information regarding all individuals are mailed to the respective faculty.

Cross-Cultural Business Ethics: An Analysis
Authors:-Debjani Sarkar, Dr Amar Latta

Abstract-In the era of globalization where the participation of any business is not limited, where people from different countries, cultures, and societies are actively moving around the world for jobs. The very question that arises is what values or diligence should be adopted by the global companies so that the harmony and the healthy growth of any organization can be achieved. The chapter aims to understand the concept of cross-culture business ethics which starts with an introductory part that includes the need and dimension of business ethics. The influence of transculturation on work ethics will be explained theoretically in this chapter. And also discuss the effect of formal training and education on ethical behaviour among the management students and the employees working for global companies as many businesses who want to broaden their product markets invest heavily in educating their staff about how to connect and interact effectively with people from different cultures. The chapter will objectively examine the various issues and challenges that the Indian corporate and public sectors are facing with the aid of statistical evidence and facts in order to analyse and evaluate the claims about the various aspects of business ethics and cultural differences. At last, what measures and steps that have been taken so far and will be taken by the governing body for the future benefit of the Indian businesses globally that can grow exponentially without compromising the moral and ethical system, will be discussed. A conclusion is drawn about the importance of the presence of ethical practices in the cross-cultural business to run a sustainable business across the world as ethics is not only important in businesses but also in all aspects of life. A company or society without ethical principles is doomed to go down sooner or later.

Fitness Application
Authors:-Aman, Sourabh Swami, Mehir Gupta, Nayyar Jamal, Prof. Mayank Kumar Goyal

Abstract- Over recent times, the world has seen a shaft in the download and operation of fitness and health apps. In 2019 fitness app usage grew at a exponential rate, being the most used category of application for that year. Since then, it has maintained its stoner consumption and continues to grow, with the inclusiveness of wearables bias like Google fit and Fitbit. This is the dawn of a new period, an period where people look further to their mobiles or their fitness watches to check on their health, rather than the traditional system of going and seeing a expert. These apps give a great avenue for those who are interested on tracking their fitness situations runners, cyclists, and spa goers likewise. Everything can be tracked currently; indeed the standard iPhone comes with a health app erected in, with a range of features.

Predicting the Song Popularity Using Machine Learning Algorithm
Authors:-Yasmin Essa, Adnan Usman, Tejasvi Garg, Murari Kumar Singh

Abstract- Being ready to predict popularity of a song supported metadata and attributes are often of great industrial importance. We aim to attain this using machine learning techniques. We use data obtained from Spotify Web API which contains information of over 160,000 songs from 1930 to 2021. We perform the desired pre-processing to check several regressions and classification algorithms supported obtained results; we build ensemble learning models for classification. Models are tuned to present optimal test results. Due to the imbalanced classification, the models are able to predict non-popular songs more easily than popular ones, where there are a high number of false negatives.

A Review on Comprehensive Intellectual Free Vibration Analysis of Composite Derive Shaft
Authors:- Azhar Uddin Sheikh, Dr. Satyendra Sharma

Abstract- Substituting composite structures for conventional metallic structures has many advantages because of higher specific stiffness and strength of composite materials. In the recent days, there is a huge demand for a light weight material such as fiber reinforced polymer composites seems to be a promising solution to this arising demand. These materials have gained attention due to their applications in the field of automotive, aerospace, sports goods, medicines and household appliances. The overall objective of this work is to analyze a composite drive shaft for power transmission. Substituting composite structures for conventional metallic structures has many advantages because of higher specific stiffness and strength of composite materials.

Analysis of Single Stage Vapour Absorption Refrigeration System
Authors:-Anil Kumar Shukla, Mr Vijay Kant Pandey

Abstract- In this study, the first and second law thermodynamic analysis of a single-stage compression-absorption system with ammonia-water as working fluid pair is performed. Thermodynamic properties of each point (the inlet and outlet of each component) in the cycle are calculated using related equations of state. Heat transfer rate of each component in the cycle and some performance parameters (circulation ratio CR, coefficient of performance COP) are calculated from the first law analysis. From the second law analysis, the exergy destruction of each component and the total exergy destruction of all the system components are obtained. Variation of the performance and exergy destruction of the system are examined at various operating conditions. Simulation results are presented in tabular and graphical form. The results of the first and second law analysis of the system, done with the help of a program developed in Engineering Equation Solver software.

Electricity Generation by Using Waste Heat
Authors:-Prof. Akhil Ahemad, Himanshu Atkare, Gagan Dawande, Tushar Ganvir, Gautam Sewte, Pranav Ghode, Dipankar Varma

Abstract- This paper presents the investigation of power generation using the thermo-electric generators. A majority of thermal energy in the industry is dissipated as waste heat to the environment. This waste heat can be utilized further for power generation. The related problems of global warming and dwindling fossil fuel supplies has led to improving the efficiency of any industrial process being a priority. One method to improve the efficiency is to develop methods to utilize waste heat that is usually wasted. Two promising technologies that were found to be useful for this purpose were thermoelectric generators. Therefore, this project involved making a bench type, proof of concept model of power production by thermoelectric generators using simulated hot air. A higher mass flow rate ratio results in a higher amount of heat transfer and higher power output. The proposed system can be used for waste heat recovery from the industry where thermal energy is used in their daily process.

Business Analytics Strategies of Amazon
Authors:-Yash Kumar, Anshul Singh

Abstract- This paper aims to present the Amazon business analytic strategies.Since the objective of the Company is to become the best place to buy,find and discover any product or service available online. Amazon.comwill continue to enhance and broaden its brand, customer base andelectronic commerce expertise with the goal of creating customers’preferred online shopping destination, in the United States and aroundtheworld.Internet became more powerful and basic tool for every person’s needand the way people work. By integrating various online informationmanagement tools using Internet, various innovative companies haveset up systems for taking customer orders, facilitate making ofpayments, customer service, collection of marketing data, and onlinefeedback respectively. These activities have collectively known as e-commerceorInternetcommerce.

Drones for Logistics Operation
Authors:-M.Tech. Scholar Tanuja Muthyala, M.Tech. Scholar M. Laxmikanth Reddy

Abstract- A drone is a flying robotic that may be remotely managed or fly autonomously using software- controlled flight plans in its embedded structures, that paintings together with on board sensors and a global positioning machine. Drones can move locations that people can not get admission to, so they may be a really perfect answer for risky seek and rescue efforts, as well as for turning in emergency elements to far off places and disaster regions. Whether or not you name them Unmanned Aerial motors, Miniature Pilot less plane, or Flying Mini Robots, drones are rapidly growing in reputation. They’re nevertheless in the infancy degree in phrases of mass adoption and utilization however drones have already broken via rigid traditional obstacles in industries which in any other case appeared impenetrable through comparable technological innovations. Unmanned Aerial vehicles have obtained interest inside the last decade because of their low price, small size, and programmable features. increasing work performance and productiveness, lowering workload and production fees, improving accuracy, refining carrier, and purchaser members of the family, and resolving protection issues on a full-size scale are most of the pinnacle makes use of drones provide industries globally. The adoption of drone technology throughout industries leaped from the fashion stage to the mega-fashion level fairly speedy as greater groups started out to comprehend its capability, scope, and scale of worldwide reach. Drone transport is one of the most promising packages to deliver applications efficiently. UAVs that fly independently primarily based on pre-programmed flight plans or greater complicated dynamic automation systems are advanced for passenger transportation and may be advanced for turning in vital groceries. Given the growing needs of the users, however additionally the growing opposition in the field of logistic techniques and widespread deliver chains, it’s miles essential to enhance the current abilities through making use of cutting-edge technologies consisting of expert systems, which encompass UAVs.

A Tuberculosis (TB) Detection Using Convolution Neural Network
Authors:-G.Sathish, E. Dhakshanaa, S.Suratha Supervisor: Mr.R.P.Vijai Ganesh

Abstract- Tuberculosis, a highly contagious lung disease, is the leading cause of worldwide death followed by malaria and HIV/AIDS. The World Health Organization alludes that more than 95% of TB patients live in developing countries that lack adequate healthcare funding and supporting medical infrastructure. In descending order, two-thirds or 67% of newly TB-infected cases occur in eight developing nations beginning with India, followed by China, Indonesia, the Philippines, Pakistan, Nigeria, Bangladesh (formerly, East Bengal of British India), and South Africa. Timeliness in TB diagnosis is critical when mitigating its spread, improving TB preventive efforts and/or minimizing the TB death rate. With advances in deep learning, the convolutional neural networks (CNNs) have consistently surpassed other traditional recognition algorithms in achieving superordinate performance for image-based classification and recognition problems. This project is to detect Pulmonary Tuberculosis based on the patient chest X-ray images using Densenet and Resnet models.

Survey on Dairy Livestock Disease Prediction System
Authors:-Prof. A.V. Brahmane, Purva Dekate, Gayatri Dike, Sneha Musmade, Rutuja Shinde

Abstract- Background: This dissertation aims in developing a expert systems for dairy farmers, which can predict livestock diseases and suggest nearby veterinarian. Methods: The main purpose of the planned system is to present a livestock disease prediction model for the prediction of occurrence of different disease. For this purpose, machine learning algorithm is used. This system takes the symptoms as input and predicts the disease by using Machine Learning algorithm. For prediction of the disease, we have used non- parametric decision tree algorithm and application programming Interface (API) for nearby veterinarian. Findings: At present, when livestock suffers from particular disease, then the doctor has to visit which is time consuming and costly too. Also, if the doctor is out of reach it may be difficult for the farmer as the disease cannot be identified. So, if the above process can be completed using an automated program which can save time and treat the diseases in time, reduce the losses of cattle effectively.

Face Mask Detection with Attendance System
Authors:-B. Gokulakannan,J.Navya,T.Rubavagini,Mr.T.Kanagasabapathy(Supervisor)

Abstract- Covid19 disease is the latest epidemic that forced an international health emergency. It spreads mainly from personto person through airborne transmission. Community transmission has raised the number of cases over the world. Manycountries have imposed compulsory face mask policies in public residencies as a preventive action. Manual observation of theface mask in crowded places is a tedious task. However, some people still do not wear masks in public areas, which might leadto infection of themselves or others. Therefore, automatic detection of the wearing of face masks may help global society, butresearch related to this is limited. Various machine learning based methods have been applied in health care to assist thedetection of COVID-19 cases from medical images. One issue that limits machine learning methods for detecting COVID-19cases is the lack of data. In this paper, we propose a Mask-RCNN which is able to detect face masks accurately and warn themto wear face mask.Mask-RCCN use two novel methods to achieve this. First, to detect mask region from the face using RPNand to extract rich context features and focus on crucial face mask related regions, we propose a novel residual contextattention module (RCAM). Second, to learn more discriminating features for faces with and without masks. This technique iscapable of recognizing masked and unmasked faces to help monitor safety breaches, facilitate the use of face masks, andmaintaina secureworking atmosphere.

Air Canvas: Drawing in Air using AI
Authors:-Prof. Hemlata A. Shinde, Shravani M. Jagtap, Anushka A.Kalpund, Pranita B. More, Ayushi A. Parkale

Abstract- Drawing in Air has been one of the most fascinating and interesting research areas in the field of visual pattern recognition. Here, visual pattern recognition means to recognize movement of finger tips. It improves the interaction between man and computer in various applications. This idea will help in achieving the naturalness desired for Human Computer Interaction (HCI). Proposed method have two main tasks: first it tracks the fingers tip and second it plots the co-ordinates of finger-tipon the screen in any desired colour. It does not require any keypad, pen or glove rather than a camera. This idea of Air Canvas is beyond the traditional empty (white), rectangular and flat-dimensional canvas seen in traditional artworks. We are applying the techniques of computer vision in OpenCV to build this project. To achieve the goal of this project, the finger-tip tracking and detection process are used. Air canvas refers to virtually drawing through hand gesture on the air without touching anything which is recommended during COVID-19. This project will be a powerful means of communication for the deaf, specially-abled, senior citizens and children’s for educational purposes.

Bridge Deck Analysis through Grillage Method
Authors:-M.Tech Scholar Sunil Kumar, Prof. Rashmi Sakalle

Abstract- Various methods have been developed for structural analyses of bridge decks. Their differences are mainly in the idealization of structural behaviour of bridges with mathematical related models. The selection of bridge modelling approach depends on many parameters including deck characteristics, the required accuracy, and the available modelling tools such as computing software. Therefore, in this study, bridge deck analysis through grillage method has been done.

Introduction to Artificial Intelligence and Problem Solving
Authors:-Kartik Sharma, Yash Bhargav

Abstract- Artificial intelligence is the field devoted to building artifacts capable of displaying in the controller, a well-understood environment, and over a sustained period behavior that they consider being intelligent or more generally, behavior that we take to be at the heart of what it have to a mind. In this paper we discuss about one of the upcoming fields in artificial intelligence and problems solving which is automatic speech recognition from neural signals.

A Panorama of Machine Learning Algorithms
Authors:-Taunk Mayur G

Abstract- Machine learning (ML) is a subset of artificial intelligence that empowers systems to learn from data without explicit programming. By employing statistical models and algorithms, ML enables computers to identify patterns, make predictions, and automate decision-making processes. This versatile field finds applications across numerous domains, from recommendation systems to medical diagnostics. This paper delves into the core methodologies of ML, including supervised, unsupervised, and reinforcement learning, to elucidate their principles and applications, with a particular focus on supervised learning algorithms.

DOI: 10.61137/ijsret.vol.8.issue2.194

Question Answering for Low Resource Languages Using Natural Language Processing
Authors:-Nirav A. Baldha

Abstract- Recent advancements in Question Answering (QA) systems have significantly improved their performance, predominantly benefiting high-resource languages. However, low-resource languages, which lack extensive linguistic resources and data, face substantial challenges in developing effective QA systems. This paper provides an in-depth review of methodologies and advancements in QA systems for low-resource languages using Natural Language Processing (NLP) techniques. We discuss various approaches, including transfer learning, multilingual models, and cross-lingual embeddings. Additionally, we highlight case studies and experimental results, aiming to offer a comprehensive overview and suggest future research directions.

DOI: 10.61137/ijsret.vol.8.issue2.207

Deep Learning Algorithms for Crop Analysis by Agricultural Experts to Enhance Crop Management and Health
Authors:-Dr.C.Saravanabhavan, Janesh M, Kathirvel T, Dhivagar R

Abstract- In India, agriculture is an essential industry that makes a substantial economic contribution. However, most of conventional crop monitoring techniques are still done by hand, which makes the procedure time-consuming and ineffective. On the other hand, wealthy countries adopt cutting-edge technologies to increase the productivity of crops and enhance resource utilization. We suggest an integrated strategy for crop health monitoring that makes use of aerial drones, IoT, machine learning, and deep learning in order to close this gap. Several sensory modalities are used in our approach for generating varied information with different accuracy in space, temporal fidelity, and character. While drone-based multispectral imagery collects precise information to create vegetation indices like the Normalized Difference Vegetation Index (NDVI), which calculates crop health based on chlorophyll content, IoT sensors provide real-time environmental data that influences crop development.To obtain a comprehensive analysis, variable-length time-series data from IoT sensors and multispectral images were converted into a fixed-sized representation to generate crop health maps. Several machine learning and deep learning models were applied, with a deep neural network (DNN) with two hidden layers achieving the highest accuracy of 98.4%. Due to the absence of reference data, the health maps were validated through ground surveys and expert evaluations. This technology-driven solution enhances real-time decision-making, optimizing large-scale agriculture in India.

DOI: 10.61137/ijsret.vol.8.issue2.296

Supervisory Control and Monitoring of IoT Enabled Paddy Cultivation
Authors:-Dr.R. Shankar, S. Karthika, M.Suwathy, J.Vidhya

Abstract- The Internet of Things (IOT) is changing agriculture in which farmers enable a wide range of techniques. The IOT technology helps to collect information about conditions such as climate, humidity, temperature, soil fertility, water level, pest detection, animal penetration in the field, and crop growth. Sensor networks are used to monitor the terms of the farm, and the ESP32-CAM is used for controlling and automating the processes of the farm and combining all the information into the cloud. To monitor the cultivated field in the form of images and videos with wireless cameras from a far. Image processing techniques are used to protect the field from birds and animals by creating noises when they are recognized in the rice field. IOT technology can reduce the maintenance costs and improve the productivity of traditional agriculture.

DOI: 10.61137/ijsret.vol.8.issue2.297

Development of Paver Block from Textile Dye Waste
Authors:-M.P. Iniya, K.Dhanush, G.Jagan

Abstract- Textile sludge management is a huge problem for its disposal from the textile industry. It has tremendous applications, such as walking paths, street road, and fuel stations, etc. In this manner, an innovative step has been towards the manufacture of paver blocks blended with textile effluent treatment plant sludge to use of it in reasonable extends. A different percentage of sludge starts from 50% to 100% to be taken for this study for the effective utilization of sludge to the construction industry. This thinks about looked for to experience the potential use of as a binding fabric for paving blocks generation. Conventional paver block is cast with full replacement of sand by using M-sand as fine aggregate. Paver blocks consist of textile waste in addition to distinctive proportions was casted according to the recommendation of Indian Standards (IS) 15658 (2006), also the various results were obtained through experimentally and it was compared to the conventional paver block. The different mix combinations outcome reveals that 50% of fine aggregate replacement by effective utilization of textile sludge and waste water from the textile industry. The density and compressive strength of paver blocks were decreased with increase in the percentage of textile sludge and water absorption capacity was increased.

DOI: 10.61137/ijsret.vol.8.issue2.298

Implementation and Analysis of Secure Packet Transfer in Blood System Management

Authors:-Assistant Professor Dr.Pon Partheeban, Amsha J, Lakshmi Prabha K

Abstract-Blood transfusion safety is a relevant and significant public health issue. Since most blood banks are still in paper- based system, various disadvantages are experienced by various stakeholders, which endanger the lives of patients and deter the healthcare system. As such, the researchers aimed to design, develop, and implement an online blood donation system (OBDS). This web-based application allows hospitals to make inventories of their blood bags online, subsequently, allowing each hospital to check the availability of blood bags anytime. The researchers designed and administered a questionnaire that assesses the perceptions of various stakeholders in both manuals based and OBDS. Based on the findings and results, it was found out that these stakeholders perceived online blood donation system is much better than the manual system. Therefore, with the use of online blood donation system, blood transfusion process is safe and secured. Threats on improper blood donor documentation or misplaced records will be totally eradicated. Also, processes involving recording about blood donors, blood bag collection, storage, and inventory will be systematized and organized, hence, improving the healthcare management for blood banks.

DOI: 10.61137/ijsret.vol.8.issue2.299

Behavior Based Credit Card Fraud Detection Using Deep Learning Techniques

Authors:-Assistant Professor Ms.J.Sunanthini, Antries Preeshma A ,Arockiya Shaakila T ,Shacksia Brinda Mol J .

Abstract-Most companies and institutions now tend to move their business toward online services due to the rapid increase of using modern technology in all fields. The rise of digital payments systems such as google Pay, Phone Pay, and Paytm has meant that loss due to fraudulent activity is expected to increase. Deep Learning presents a promising solution to the problem of credit card fraud detection by enabling institutions to make optimal use of their historic customer data as well as real-time transaction details that are recorded at the time of the transaction. To ensure the safety of users for these credit cards, the credit card’s provider should provide a service to protect users from any risk they may face. Consequently, we present our approach to predict legitimate or fraud transactions. In this paper, we evaluate a subsection of Deep Learning topologies – from the general artificial neural network to topologies with built-in time and memory components such as Long Short- term memory – and different parameters with regard to their efficacy in fraud detection on a dataset of nearly 80 million credit card transactions that have been pre-labeled as fraudulent and legitimate. We also present a framework for parameter tuning of Deep Learning topologies for credit card fraud detection to enable financial institutions to reduce losses by preventing fraudulent activity.

DOI: 10.61137/ijsret.vol.8.issue2.300

GPS Vehicle Tracker for Monitoring and Controlling The Engine
Authors:-Dr. F. R. Shiny Malar, Anusika.Ms, Evangelin Jeronnah.F.J, Marcelin K.

Abstract-Vehicle theft has become an increasingly preva- lent concern, necessitating advanced security solutions for two- wheeled vehicles. This study presents an innovative Anti-Theft Vehicle Security System that leverages Global Positioning Sys- tem (GPS) technology and an open-source platform to provide comprehensive vehicle tracking, monitoring, and remote control capabilities. The proposed system integrates a sophisticated tracking mechanism with a unique locking mode, enabling real- time vehicle location tracking and remote engine immobiliza- tion.The system’s architecture comprises a GPS-enabled device interfaced with the vehicle’s battery and ignition system, allowing precise location tracking and remote engine control through a smartphone application. When theft is detected, the system can immediately disable the vehicle’s engine via a relay switch, preventing unauthorized movement. Additionally, the device implements a password-protected restart mechanism, adding an extra layer of security. A custom-developed program facilitates exact vehicle position- ing and navigation tracking using Google Map services, providing users with real-time location information and movement history. The proposed solution addresses the critical need for enhanced vehicle security by offering a comprehensive, technologically advanced approach to theft prevention and vehicle monitoring.

DOI: 10.61137/ijsret.vol.8.issue2.301

AI-Powered Smart Glasses for The Blind And Visually Impaired
Authors:-Assistant Professor Mrs.A.Aldo Tenis, Manju.T, Sowmiya.R, Nimmy S.

Abstract-Vision is one of the most important human senses, and it plays a critical role inunderstanding the surrounding environment. However, millions of people in the world are experiencing visual impairment. They are facing difficulties in their daily navigations since they cannot see the obstacles in their surroundings and also recognizing a person is one of the major problems faced by them. There are many applications other than automation that use object detection but are not explored in depth till date. This project involves one such application that uses detection to help the visually impaired to identify the objects ahead of them for safe navigationand also proposes a face recognition system with auditory output which can be beneficial for visually challenged people in recognizing known and unknown persons. Voice-based aid would be provided to them through speakers. In this project, we applied deep learning based Faster Region-Convolutional Neural Network (Faster R-CNN), to detect and recognise human and objects in surroundings.The image aptured by the camera is processed and classified by the Faster Region Convolution Neural Network algorithm. The identified image is given as an audio input to the audio jockey.Thus, this model helps in assisting the visually impaired people in a more comfortable way than white canes.

DOI: 10.61137/ijsret.vol.8.issue2.302

Stock Price Prediction Using Machine Learning
Authors:-Associate Professor Dr.F.R.Shiny Malar, Ashik Cristo Mourin.M, Antony George.T ,Sahaya Anish Sujith.

Abstract-Prediction of stock prices is one of the most re- searched topics and gathers interest from people and the industry alike. With the emergence of Artificial Intelligence and Machine Learning various algorithms have been applied in order to predict the equity market movement. The combined application of statistics and machine learning algorithms have been designed either for predicting the opening price of the stock the very next day or understanding the long term market in the future. This paper explores the different techniques that are used in the prediction of share prices from traditional machine learning and deep learning methods to neural networks and graph- based approaches. It draws a detailed analysis of the techniques employed in predicting the stock prices as well as explores the challenges entailed along with the future scope of work in the domain.

DOI: 10.61137/ijsret.vol.8.issue2.303

A Review Ethical Design Of AI Agents In Salesforce Environments

Authors: Lhamo Yangchen
Abstract:

The integration of artificial intelligence agents into enterprise environments such as Salesforce has transformed customer relationship management, operational efficiency, and workforce productivity. However, the ascendancy of AI agents brings with it profound ethical considerations that demand deliberate design and vigilant oversight. This article explores the foundational principles and practical guidelines for the ethical design of AI agents within Salesforce ecosystems, emphasizing trust, fairness, transparency, and inclusivity. Ethical design in this context is not merely about avoiding bias or protecting data; it is about embedding responsibility and human-centric values into every stage of AI development and deployment. Salesforce’s approach to AI ethics is proactive, integrating ethical guidelines from the outset and maintaining a steadfast commitment to safeguarding human rights, ensuring data privacy, and fostering inclusivity. The company’s Office of Ethical & Humane Use plays a pivotal role in guiding both internal and external stakeholders through best practices, frameworks, and policies that ensure AI agents are trustworthy, safe, and accessible to all. This article highlights into the challenges of mitigating bias, toxicity, and harmful outputs, and highlights the importance of transparency in disclosing AI involvement to users. It examines the necessity of keeping humans at the helm, ensuring that AI agents augment rather than replace human judgment, and discusses the critical role of feedback mechanisms in continuous improvement. By addressing these ethical dimensions, organizations can harness the full potential of AI agents while maintaining public trust and compliance with evolving regulations. The article also considers the broader implications of agentic AI on labor, customer experience, and societal norms, providing actionable insights for organizations seeking to navigate this complex landscape. Ultimately, the ethical design of AI agents in Salesforce environments is a dynamic, multifaceted endeavor that requires ongoing dialogue, interdisciplinary collaboration, and a commitment to responsible innovation.

 

 

Hybrid AI Models for ZFS Usage Forecasting

Authors: Ritika Ghosh, Abhishek Dey, Sonali Mondal, Arjun Sen

Abstract: In today's data-intensive environments, the Zettabyte File System (ZFS) plays a central role in ensuring reliable and high-performance storage for applications ranging from databases to high-performance computing and cloud workloads. However, predicting future storage consumption, ARC/L2ARC cache pressure, and snapshot bloat has become increasingly complex due to the dynamic and non-linear nature of modern workload behaviors. Traditional statistical approaches often fall short in capturing these complexities, necessitating the adoption of hybrid AI models that blend statistical, machine learning (ML), and deep learning techniques. These hybrid systems can more accurately model usage trends, recognize anomalous patterns, and respond to previously unseen behaviors, especially when trained on detailed ZFS telemetry. This review article explores the use of hybrid AI techniques for ZFS usage forecasting, focusing on time series modeling, anomaly detection, snapshot growth prediction, and proactive capacity management. It begins with a foundational overview of ZFS architecture, highlighting the importance of ARC, L2ARC, ZIL, and snapshot layers in the overall usage landscape. It then discusses the specific forecasting challenges that arise in ZFS due to caching hierarchies, concurrent access patterns, and latency-sensitive applications. We examine a taxonomy of AI models used in the domain and analyze how hybrid designs can improve accuracy and adaptability. The review further details the construction of end-to-end pipelines for training, evaluating, and deploying predictive models based on ZFS metrics. Case studies from healthcare, research clusters, and enterprise NAS environments are presented to demonstrate the operational impact of intelligent forecasting. Finally, the article outlines future directions including federated learning, online retraining, and integration with AIOps platforms to support self-optimizing storage infrastructures.

DOI: https://doi.org/10.5281/zenodo.15845749

AI-Powered Salesforce CRM Security Monitoring Using Tripwire And Tivoli Across Hybrid Multi-Cloud Unix-Based Systems

Authors: Harnoor Gill

Abstract: As Salesforce CRM increasingly drives enterprise customer engagement, securing sensitive workflows across hybrid multi-cloud Unix infrastructures has become critical. This review explores the integration of Tripwire, Tivoli, and artificial intelligence (AI) to create a comprehensive security monitoring framework for Salesforce CRM environments. Tripwire provides continuous file integrity monitoring and change detection, while Tivoli ensures system performance, event correlation, and compliance management. AI enhances these tools by enabling anomaly detection, predictive threat analysis, and automated remediation, transforming traditional monitoring into a proactive, intelligent security system. The article examines architectural frameworks, workflow automation, incident response orchestration, and regulatory compliance considerations. Industry case studies from financial services, healthcare, retail, and government illustrate real-world applications and benefits. Challenges such as integration complexity, scalability, cost, and AI tuning are discussed, alongside future research directions, including cloud-native monitoring, zero-trust architectures, and self-healing security frameworks. This review emphasizes how combining Tripwire, Tivoli, and AI empowers enterprises to maintain secure, resilient, and compliant Salesforce CRM workflows in complex hybrid multi-cloud environments.

DOI: http://doi.org/10.5281/zenodo.17365580

Resilient Hybrid Unix Infrastructures: Leveraging Veritas Cluster Server To Support AI-Powered Salesforce Service Cloud Workflows

Authors: Gurnam Toor

Abstract: Enterprises today demand uninterrupted customer engagement, especially as Salesforce Service Cloud integrates artificial intelligence (AI) to power predictive case routing, chatbots, and intelligent support workflows. However, delivering these services at scale requires robust, fault-tolerant infrastructures capable of ensuring high availability and disaster recovery. This review explores how Veritas Cluster Server (VCS) strengthens hybrid Unix infrastructures to support AI-powered Salesforce Service Cloud operations. The paper examines VCS’s architecture, including its cluster-based design, service groups, and monitoring agents that automate failover and ensure business continuity. It further discusses the integration of VCS with Salesforce workflows, highlighting how resilience at the infrastructure level enables continuous availability of customer-facing AI processes. Industry case studies from financial services, healthcare, telecommunications, and the public sector illustrate real-world benefits, while challenges such as deployment complexity, interoperability, and cost considerations are critically assessed. Finally, the review identifies future research opportunities, including AI-driven cluster management, deeper integration with cloud-native architectures, compliance automation, and sustainability-focused clustering strategies. By linking technical resilience with business value, this article emphasizes the transformative potential of combining VCS with Salesforce Service Cloud to meet modern demands for reliability, compliance, and enhanced customer experience

DOI: http://doi.org/10.5281/zenodo.17365601

LAMP Stack Management In Hybrid Unix Environments Integrated With Salesforce Lightning And Einstein Copilot AI Agents

Authors: Gabriel Pinto

Abstract: Managing LAMP (Linux, Apache, MySQL, PHP) stacks in hybrid Unix environments presents unique operational and integration challenges for modern enterprises. Simultaneously, AI-driven customer relationship management platforms, such as Salesforce Lightning and Einstein Copilot, require reliable, real-time access to operational data for predictive analytics, automation, and enhanced customer engagement. This review explores strategies for deploying and managing LAMP stacks across heterogeneous Unix systems while integrating with Salesforce AI workflows. Key topics include automated deployment using Kickstart and Jumpstart, configuration management, orchestration of end-to-end workflows, security and compliance considerations, and practical case studies demonstrating measurable benefits. Additionally, emerging trends such as cloud-native deployments, containerization, and AI-driven orchestration are examined to provide insights into the future of hybrid Unix infrastructure supporting intelligent CRM systems. By aligning infrastructure automation with AI-enhanced CRM capabilities, enterprises can achieve operational efficiency, improved system reliability, and optimized customer engagement in a secure and compliant manner.

DOI: http://doi.org/10.5281/zenodo.17519763

The influence of cognitive automation on improving enterprise compliance operations

Authors: Dev Malik

Abstract: Cognitive automation, an advanced form of artificial intelligence (AI) that integrates machine learning, natural language processing, and robotic process automation, is transforming enterprise compliance operations. Enterprises today face intensifying regulatory scrutiny, increasing the complexity and volume of compliance requirements. Cognitive automation helps address these challenges by automating complex tasks, reducing human error, accelerating compliance processes, and improving overall coverage. Unlike traditional rule-based automation, cognitive automation can learn from data, understand context, and adapt to new situations, making it highly suitable for the dynamic regulatory environment businesses operate in today. This article explores how cognitive automation influences enterprise compliance operations, focusing on its capabilities to enhance data handling, risk management, regulatory reporting, and audit readiness. It also discusses practical implementation approaches, benefits, and challenges encountered by enterprises adopting this technology. Furthermore, the article examines real-world use cases that demonstrate cognitive automation's effectiveness in improving compliance efficiency and accuracy. As regulatory landscapes continue to evolve and expand, cognitive automation emerges as a vital tool for enterprises seeking to maintain compliance while optimizing operational costs and minimizing risks. This article provides a comprehensive overview for business leaders, compliance officers, and IT professionals interested in leveraging cognitive automation to strengthen their compliance frameworks, improve decision-making, and support sustainable enterprise governance.

DOI: https://doi.org/10.5281/zenodo.17709139

The Influence of Generative AI on Adaptive Automation in IT Operations

Authors: Priya Deshpande

Abstract: Generative Artificial Intelligence (AI) has emerged as a revolutionary force in transforming IT operations through adaptive automation. This advancement is reshaping traditional IT frameworks by enabling systems to dynamically learn, adapt, and optimize processes autonomously. Adaptive automation in IT focuses on the seamless integration of human decision-making and machine-driven responses, improving efficiency, reducing human error, and enhancing predictive maintenance capabilities. Generative AI models, powered by deep learning and advanced neural networks, contribute significantly by generating innovative solutions, automating complex workflows, and providing real-time actionable insights. The incorporation of generative AI enhances the agility and resilience of IT operations, allowing faster incident response, proactive problem resolution, and intelligent resource allocation. This article explores the intersection of generative AI and adaptive automation in IT operations, highlighting the evolution, benefits, challenges, and future directions. The synergy of these technologies promises to address the increasing complexity of modern IT environments while supporting continuous improvement and scalability. With the critical role IT plays in business continuity and innovation, generative AI-driven adaptive automation stands as a key enabler for the next generation of operational excellence. The discussion encompasses the technological underpinnings, practical applications, and strategic implications for organizations aiming to leverage AI to its fullest potential in their IT operations.

DOI: https://doi.org/10.5281/zenodo.17709327

 

Applications And Challenges Of AI-Driven Systems In The Modern Food Industry

Authors: Jigarkumar Ambalal Patel, Mayur Girish Taunk

Abstract: The food industry is one of the largest global employers, yet it faces ongoing challenges in demand–supply chain management and food safety due to heavy reliance on manual processes and human error. Artificial Intelligence (AI) and Machine Learning (ML) are increasingly being adopted to transform the industry across the entire "farm to fork" pipeline by improving efficiency, accuracy, and safety. This paper reviews key AI- and ML-driven applications, including smart farming for crop monitoring and yield optimization, automated product sorting and grading, electronic noses for spoilage detection, and vision-based dietary assessment. Despite these advances, significant challenges remain, such as inaccurate image segmentation, high intra-class variation in food appearance, and the lack of large, standardized datasets. Overcoming these limitations is crucial for enabling reliable and scalable real-world deployment of AI.

DOI: http://doi.org/10.5281/zenodo.18359803

Published by:

Development of Paver Block from Textile Dye Waste

Uncategorized

Development of Paver Block from Textile Dye Waste
Authors:-M.P. Iniya, K.Dhanush, G.Jagan

Abstract- Textile sludge management is a huge problem for its disposal from the textile industry. It has tremendous applications, such as walking paths, street road, and fuel stations, etc. In this manner, an innovative step has been towards the manufacture of paver blocks blended with textile effluent treatment plant sludge to use of it in reasonable extends. A different percentage of sludge starts from 50% to 100% to be taken for this study for the effective utilization of sludge to the construction industry. This thinks about looked for to experience the potential use of as a binding fabric for paving blocks generation. Conventional paver block is cast with full replacement of sand by using M-sand as fine aggregate. Paver blocks consist of textile waste in addition to distinctive proportions was casted according to the recommendation of Indian Standards (IS) 15658 (2006), also the various results were obtained through experimentally and it was compared to the conventional paver block. The different mix combinations outcome reveals that 50% of fine aggregate replacement by effective utilization of textile sludge and waste water from the textile industry. The density and compressive strength of paver blocks were decreased with increase in the percentage of textile sludge and water absorption capacity was increased.

DOI: 10.61137/ijsret.vol.8.issue2.298

Published by:

Supervisory Control and Monitoring of IoT Enabled Paddy Cultivation

Uncategorized

Supervisory Control and Monitoring of IoT Enabled Paddy Cultivation
Authors:-Dr.R. Shankar, S. Karthika, M.Suwathy, J.Vidhya

Abstract- The Internet of Things (IOT) is changing agriculture in which farmers enable a wide range of techniques. The IOT technology helps to collect information about conditions such as climate, humidity, temperature, soil fertility, water level, pest detection, animal penetration in the field, and crop growth. Sensor networks are used to monitor the terms of the farm, and the ESP32-CAM is used for controlling and automating the processes of the farm and combining all the information into the cloud. To monitor the cultivated field in the form of images and videos with wireless cameras from a far. Image processing techniques are used to protect the field from birds and animals by creating noises when they are recognized in the rice field. IOT technology can reduce the maintenance costs and improve the productivity of traditional agriculture.

DOI: 10.61137/ijsret.vol.8.issue2.297

Published by:

Deep Learning Algorithms for Crop Analysis by Agricultural Experts to Enhance Crop Management and Health

Uncategorized

Deep Learning Algorithms for Crop Analysis by Agricultural Experts to Enhance Crop Management and Health
Authors:-Dr.C.Saravanabhavan, Janesh M, Kathirvel T, Dhivagar R

Abstract- In India, agriculture is an essential industry that makes a substantial economic contribution. However, most of conventional crop monitoring techniques are still done by hand, which makes the procedure time-consuming and ineffective. On the other hand, wealthy countries adopt cutting-edge technologies to increase the productivity of crops and enhance resource utilization. We suggest an integrated strategy for crop health monitoring that makes use of aerial drones, IoT, machine learning, and deep learning in order to close this gap. Several sensory modalities are used in our approach for generating varied information with different accuracy in space, temporal fidelity, and character. While drone-based multispectral imagery collects precise information to create vegetation indices like the Normalized Difference Vegetation Index (NDVI), which calculates crop health based on chlorophyll content, IoT sensors provide real-time environmental data that influences crop development.To obtain a comprehensive analysis, variable-length time-series data from IoT sensors and multispectral images were converted into a fixed-sized representation to generate crop health maps. Several machine learning and deep learning models were applied, with a deep neural network (DNN) with two hidden layers achieving the highest accuracy of 98.4%. Due to the absence of reference data, the health maps were validated through ground surveys and expert evaluations. This technology-driven solution enhances real-time decision-making, optimizing large-scale agriculture in India.

DOI: 10.61137/ijsret.vol.8.issue2.296

Published by:

A Review Ethical Design Of AI Agents In Salesforce Environments

Uncategorized

Authors: Lhamo Yangchen
Abstract: The integration of artificial intelligence agents into enterprise environments such as Salesforce has transformed customer relationship management, operational efficiency, and workforce productivity. However, the ascendancy of AI agents brings with it profound ethical considerations that demand deliberate design and vigilant oversight. This article explores the foundational principles and practical guidelines for the ethical design of AI agents within Salesforce ecosystems, emphasizing trust, fairness, transparency, and inclusivity. Ethical design in this context is not merely about avoiding bias or protecting data; it is about embedding responsibility and human-centric values into every stage of AI development and deployment. Salesforce’s approach to AI ethics is proactive, integrating ethical guidelines from the outset and maintaining a steadfast commitment to safeguarding human rights, ensuring data privacy, and fostering inclusivity. The company’s Office of Ethical & Humane Use plays a pivotal role in guiding both internal and external stakeholders through best practices, frameworks, and policies that ensure AI agents are trustworthy, safe, and accessible to all. This article highlights into the challenges of mitigating bias, toxicity, and harmful outputs, and highlights the importance of transparency in disclosing AI involvement to users. It examines the necessity of keeping humans at the helm, ensuring that AI agents augment rather than replace human judgment, and discusses the critical role of feedback mechanisms in continuous improvement. By addressing these ethical dimensions, organizations can harness the full potential of AI agents while maintaining public trust and compliance with evolving regulations. The article also considers the broader implications of agentic AI on labor, customer experience, and societal norms, providing actionable insights for organizations seeking to navigate this complex landscape. Ultimately, the ethical design of AI agents in Salesforce environments is a dynamic, multifaceted endeavor that requires ongoing dialogue, interdisciplinary collaboration, and a commitment to responsible innovation.

 

 

Published by:
× How can I help you?