Category Archives: Uncategorized

IJSRET Volume 7 Issue 3, May-June-2021

Uncategorized

Estimation of Cooling/Heating Loads Quantity of Air (CFM) and Hence Tons of Refrigeration Required for Air-Conditioning of Commercial Establishment
Authors:- Asst. Prof. Attalique Rabbani, Moazzam Mohd Mujeeb, Samad Bin Khaled, Abdul Wahab

Abstract- More than 90 per cent of our time is spent in buildings i.e. either in the office or at home. Energy used in buildings (residential and commercial) accounts for a significant percentage of a country’s total energy consumption. This percentage depends greatly on the degree of electrification, the level of urbanization, the amount of building area per capita, the prevailing climate, as well as national and local policies to promote efficiency. In many countries, buildings consume more energy than transport and industry. The International Energy Agency (IEA) statistics estimate that globally, the building sector is responsible for more electricity consumption than any other sector, 42 per cent. Today, the field of air conditioning design is more technologically challenging than ever before. While design innovations and product improvement promise sleeker, more versatile, more powerful and more energy-efficient air conditioners, the challenge today lies in identifying the most appropriate products, for their application at hand. Indeed, today the emphasis is no more on understanding air conditioning “products” but on crating “solutions” and not just solutions, but “customized solutions” that suit specific needs i.e., heating/cooling or ventilation. Central Air-conditioning plant comprises of Heating Ventilation and Air-Conditioning. Conditioning means control of mainly Temperature and humidity apart from dust odour. Temperature and humidity is control through vapour refrigeration cycle, having refrigeration like R-134a. Air is composed mainly of gases. The major gaseous components of clean, dry air near sea level are approximately 21% oxygen, 78% nitrogen, 1% argon, and 0.04% carbon dioxide. Normal outdoor air contains varying amounts of foreign materials (permanent atmospheric impurities). These materials can arise from natural processes such as wind erosion, sea spray evaporation, volcanic eruption, and metabolism or decay of organic matter. The natural contaminant concentrations in the air that we breathe vary but are usually lower than those caused by human activity. To evaluate the thermal load, quantity of air to be distributed and ventilation air in the conditioned space Carrier developed software HAP v.4.41 is used. Quantity of air, which is evaluated from the heat gains/loss into the space need to be properly evaluated considering the orientation if the building, type of glass/structure, occupancy and nature of work in the conditioned area, so is the quantity of air need to be exhausted. And to evaluate ton of the refrigeration required for the same.

A Survey on Cloud Environment Intrusion Detection System Types and Issues
Authors:- Asst. Prof. Ms. Amlesh Singh, Dean Dr. Pratima Gautam

Abstract- Cloud reduces implementation cost and increases flexibility of data access around the globe. But this easiness of uses introduces the vulnerability in the network. So different type of attacks inform of intrusion was prepared and execute by insider or outsider virtual machines in the cloud. Detection of such type of attacks needs to develop intrusion detection system. This paper has found type of intrusion in cloud environment. Further paper has summarized various techniques proposed by scholars to develop a intrusion detection system. Various intrusion detection system were classified as per detection approaches adopt by researcher. Finally paper detailed the issues of cloud security that make this area of research more complex.

An Analysis of Receiver Operating Characteristic Curve, Area Under Curve and Precision Recall
Authors:- Associate Prof. Praveen Gujjar J, Asst. Prof. Naveen Kumar V

Abstract- Receiver Operating Characteristic (ROC) curves are commonly used to present results for binary decision problems in machine learning. However, when dealing with highly skewed datasets, Precision-Recall (PR) curves give a more informative picture of an algorithm’s performance. Researcher show that a deep connection exists between ROC space and PR space, such that a curve dominates in ROC space if and only if it dominates in PR space. A corollary is the notion of an achievable PR curve, which has properties much like the convex hull in ROC space; researcher show an efficient algorithm for computing this curve. Finally, we also note differences in the two types of curves are significant for algorithm design. For example, in PR space it is incorrect to linearly interpolate between points. Furthermore, algorithms that optimize the area under the ROC curve are not guaranteed to optimize the area under the PR curve.

Experimental Study on Dolomite Bricks with Positive Permanent Linear Change
Authors:- Ms. Varnita Mahant, Asst. Prof. Ms. Swati Agrawal, Asst. Prof. Mr. Akshit Lamba

Abstract- Dolomite brick is that the foremost vital stable refractory under the working conditions of Argon Oxygen De-carbonization (AOD). For AOD applications, the Dolomite bricks should have positive Permanent Linear Change (PLC) on re-heating. A positive PLC dolomite brick has higher life and best fitted to joint less refractory lining with no cobble stoning defect. Therefore the event of dolomite bricks having positive PLC during applications could also be a challenge for refractory manufacturing industry. Within this investigation, dolomite refractory bricks were prepared by varying different additive with an intention to urge the positive PLC of the brick. It’s documented that Iron Oxide could also be an honest additive for dolomite brick sintering. it is also been reported that monoclinic zirconia (m-ZrO2) additive improves the BD, CCS and PLC of dolomite brick. During this background, first trial composition was containing a tough and fast amount of 1% m-ZrO2 and different concentration and sorts of iron oxide. Mill scale containing Fe2O3 was added in two different concentrations 0.5%, 1% and in another trial 0.25% of nano Fe2O3 was added. Fe2O3 containing bricks showed an honest improvement in BD and CCS because of the upper sintering of dolomite grains in presence of liquid formation during sintering by the presence of Fe2O3.The CCS value was within the range 750-800 kg/cm2. However, the PLC value was negative within the range of -0.2 to -0.35%. relying on this result, new additive, Chrome Green oxide was then used. it has been found that the PLC tends to be positive with increase in Cr2O3 content. However, in presence of Cr2O3 the m-ZrO2 it had been not performing well. Finally m-ZrO2 was removed and a far better percentage of Cr2O3 additives showed the positive PLC (+ 0.12%) of the dolomite brick. The brick showed a CCS value of 650 g/cm2. this is often often within the suitable limit.

Memory Organization in Computer Architecture
Authors:- Kishan Singh, Aniket Singh, Asst. Prof. Rohini Rathod

Abstract- This article presents give an general idea of the memory organization in computer architecture .In this paper we will learn about type of memory and there memory organization in COA (computer application and architecture). Memory is employed for storing programs and knowledge that area unit needed to perform a particular task. A memory unit is that the assortment of storage units or devices along. The memory unit stores the binary data within the variety of bits. The classification of primary and secondary memory, the different types of ROM and RAM we will learn about direct mapping in the article.

IOT Based Healthcare Monitoring and Intelligence
Authors:- Namrata Jewargi, Sonal Shinde, Mr. Pratap Nair

Abstract- Nowadays, People are getting more prone to diseases and medical problems more than ever. So to reduce the Regular Routine Check-ups, an IOT based system which is Smart and Intelligent using Sensors for sick patients examination has been proposed here. Healthcare Services using IOT based Platform will make a huge difference for medical field. Using Internet of Things with Wireless Connectivity alongside an Android Application which will make the Doctors and Patients easier to communicate. The proposed system here is an Smart and Intelligent system that will give proper medicine the patient his/her with prescription that will be shown on Patient’s Phone. Any updates related to medicines given by doctor’s will be shown on Patient’s phone and will alarm the patient about the right timings and right medicines.

IOT Based Surveillance Robotic Car Using Raspberry Pi
Authors:- Aniket M. Ainapure, Akshay kumar S. Basargav, Sanket V. Mhetar, Asst. Prof. Saurabh R. Prasad

Abstract- Robots have found a drastically increasing demand in day-to-day life. In this present work, a Raspberry Pi based spy robot with remote monitoring and control through Internet of Things (IoT) has been developed. Because of IoT feature, it overcomes the problem of limited range surveillance. The spy robot system comprises the Raspberry Pi (small single-board computer), night vision pi camera and sensors. This robot can be controlled with the help of laptop/mobile. The proposed robot is small in size thus capable of manoeuvring into area where human access is not easily possible. This surveillance system using spy robot can be customized for various fields like industries, banks and shopping malls. This system will save human live, and protect the country from enemies. We have also developed a webpage consisting of Graphical User Interface (GUI) application to facilitate the robot control. The live streaming ability of the Pi allows the camera feed to be analysed from any location using internet.

Review Paper on the Study of Permeable Pavement
Authors:- Aditi S. Shinde, Shilpa B. More, Onkar S. Shekade, Pranay D. Shelar, Asst. Prof. Baliram R. Warvate

Abstract- Permeable pavement is used in construction industries such as, parking lots, low–traffic roads and sidewalks. It consist of porous concrete, portland cement concrete, coarse aggregate, fine aggregate, water, cement and admixtures. From recent studies, it is conclude that permeable pavement is best solution to reduce stormwater pollution. As per litrearure review it is seen that permeable pavement is an eco–friendly paving material that allows water to percolate directly through the surface and recharge groundwater. And also can reduce volumes and improve water quality of stormwater runoff by allowing water to percolate through it’s joints, while being filtered through layers of aggregate

Mandatory Seat Belt With Steering Controlled Head Light
Authors:- Thakkar Vrushabh, Sorathia Nishant, Jethva Hardik, Diwasaliwala Kushang, Bhure Kunal, Asst. Prof. Dhruv Solanki

Abstract- The purpose of this project was done to focus on the design and working of an Arduino based Adaptive Headlight System (AHS) for automobile safety. The highest fatal accidents occur on the curved road at night time. In maximum cases, the recognition of objects in the traffic zone plays an important role. These facts point to the necessity of the role of automobile adaptive headlight systems. The dazzling headlights also contribute to recognition of objects due to temporary vision loss. Components that are easily available in the market are suitable for adaptive headlight system. The system is designed to receive input from the sensors and manipulate the data which drives the motor connected to the headlights. Also, the headlights brightness is automatically varied to prevent glare on other drivers. Safety is a precaution taken to live our life to live in a better way. Safety is a main concern while considering automobiles too. Basically, our little carelessness has led to many accidents in roadways. Negligence of wearing seatbelt is also a major reason for the fatal accident. To prevent that we are making the seatbelt as a mandatory one. Unless or until the seatbelt the driver will not be able to start the vehicle. Our innovation is done by placing the IR sensor in the seatbelt and the IR sensor is connected to the microcontroller. The microcontroller is connected to the ignition coil. When the heartbeat sensor senses the heartbeat, the signal is transmitted to the microcontroller which makes the ignition coil to ignite and the spark plug sparks and the car starts. By making our innovation in seatbelt, carelessness transforms into mandatory and it also increase the safety level in the automobile.

Survey on Content Based Disaster Management Using Social Media
Authors:- Prof. Ashish P. Mohod, Vedant Dhurve, Krutika Hedaoo, Himanshu Itankar, Jayesh Lanjewar

Abstract- Today, Online Social Media such as Twitter, Facebook, WhatsApp, are important sources of real-time information related to things happen around us. People use social media for discussing different situation like disaster / crisis including both natural and man-made disasters. We can use this information for Disaster management. There has been a lot of work on designing information systems that would be useful for aiding post and pre disaster relief operations. We need Automatic System for gathering critical information and coordinating relief ops. And Also need to Learn from Prior Events and be prepared accordingly. Hence we have used Twitter API to access the twitter data. In this project we propose a natural disaster analysis interface that solely makes use of tweets generated by the twitter user during the event of disasters. We observe that our analysis of data from social media provides a viable, economical, uncensored and real-time alternative to traditional methods for disaster analysis and the perception of affected population towards a natural disaster.

Smart Energy Efficient Home Automation System Using IOT
Authors:- Asst. Prof Shaik Fareed Ahmed, Mohammed Abdul Sami Rahman, Syed Mudaseer Ahmed Razvi, Adeel Ahmed

Abstract- Advancement in IoT based application has become the state-of-the art technology among there searcher due to the availability of Internet everywhere. To make the application more user friendly, web based and android based technologies have gained their importance in this cutting edge technology. In this paper, smart energy efficient home automation system is proposed that can access and control the home equipments from every corner of the world. For this system, Internet connectivity module is attached to the main supply unit of the home system which can be accessed through the Internet. For wireless connectivity, the static IP address is used. Home automation is based on multimodal application that can be operated using voice recognition command of the user using the Google Assistant or through a web based application. Thus, main objective of this work is to make our home automation system more secure and intelligent.

Website Like Github for Project Sharing and Open Source Work
Authors:- Gitanjali Mukadam, Nandini Naik, Samyukta Sandeep, Rashmi Mada, Prof. Audumber Umbare

Abstract- The goal of this project is to create a git-based website. The website will provide users the option to store all the code that they are working in a public or private database/repository. If the repository is public then the code is available to download on the website for other users. This gives users a chance to collaborate with people working on the same topic of interest around the world. In simpler words the website is going to be a social networking site for software enthusiasts around the world.

Disease Prediction System in New Normal
Authors:- Sonal Shilimkar, Pratiksha Thosar, Prajakta Dharade, Ayushi Patel, Asst. Prof. Varsha Pimprale

Abstract- In this disease prediction system follows normal rules. The system is designed such that to provide a facility predicting disease from given reports. Report can be in the form of image (MRI, x-Ray, mammography, etc). Or in the form of input parameters like numerical value came with the result of reports. The system will take an input from the user for specific disease the system will follow image processing techniques to process and extract result from image. The result will be provided to a user. The system will also suggest nearby specialists for detected disease.

A Review on Applications of Artificial Intelligence for Public Cloud
Authors:- Assistant Professor Anumandla Mounika

Abstract- Artificial Intelligence has additionally made it less complicated for individuals to trade as well as invest. Before artificial intelligence, evaluating stock market information was an opportunity taking in and also complicated for individuals. Currently, individuals have the energy to commit at their fingertips. They may analysis which shares that they want to buy and they can know the danger of investing by looking at just how the company has performed in the past. This also creates the stock market much more affordable because it is now simpler to invest. Folks may analyze the changes in stock just before the put-in, this caused even more reliability in trading.

Survey on IoT Security: Challenges and Solution with ML, AI, Block Chain Technology
Authors:- P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N, HOD. Dr.Narasimhamurthy M S

Abstract- Internet of Things (IoT) is one of the most rapidly used technologies in the last decade in various applications. The smart things are connected in wireless or wired for communication, processing, computing, and monitoring different real-time scenarios. The things are heterogeneous and have low memory, less processing power. The implementation of the IoT system comes with security and privacy challenges because traditional based existing security protocols do not suitable for IoT devices. In this survey, the authors initially described an overview of the IoT technology and the area of its application. The primary security issue CIA (confidentially, Integrity, Availability) and layer-wise issues are identified. Then the authors systematically study the three primary technology Machine learning(ML), Artificial intelligence (AI), and Blockchain for addressing the security issue in IoT. In the end, an analysis of this survey, security issues solved by the ML, AI, and Blockchain with research challenges are mention.

Covid19: Distance Learning in Times of Crisis(Job Portal)
Authors:- Prof. Hemant Kumar Pathak, M. Tech. Scholar Vinita Sahu

Abstract- The process we followed in this is promoting distance learning and students can get their job during this COVID period. The main aims of this portal are to connect to the industries and acts as an online recruitment to support the students to find the right IT job after graduation. We create a portal like job portal and students do registration by filling their information one by one and after collecting all details we can shortlist the students according to their fields and interest and provide job. Our job portal contains 3 modules. Administrators, recruiters and job seekers the administrator has the authority of the entire portal. You can view the recruiter’s requirements and search for relevant candidates for that profile. Recruiters can post jobs and view profiles of job applicants. The project brief aims to provide work during this COVID time period and promote distance learning. There are many platforms to learn different technologies. Therefore, we can use these online platforms to learn different technologies and apply for different job profiles. The purpose of the app is to develop a system that job seekers and recruiters can use to communicate with each other. The online job portal is an application where job seekers can register on the website and search for positions that suit them, because employers register on the website and provide company vacancies. The online job portal system is a software package that agencies can use to improve business efficiency.

Visual and Vocal Prosody Analysis Based on Artificial Intelligence
Authors:- Asst. Prof. Ramya. R, Asst. Prof. Bilomin Ramya. A, Somnath. S. M, Amarthiyan. S, Karan. D

Abstract- Analysis of observable behavior in depression primarily relies on subjective measures. New computational approaches make possible automated audiovisual measurement of behaviors that humans struggle to quantify (e.g., movement velocity and voice inflection). Emotions are normally displayed by visual, vocal, and other physiological means. One of the important way humans display emotions is through facial expressions. Facial expression is one of the most powerful ways that people bring together conversation and communicate emotions and other mental, social, and physiological cues. Highlights include a study that measured the temporal coordination of vocal tract and facial movements, a study that predicted which adolescents would go on to develop depression based on their voice qualities, and a study that tested the behavioral predictions of clinical theories using automated measures of facial actions and head motion. The large sizes of data in recent years has led to the need for big data and streaming frameworks for mining.

IoT Based Underground Fault Cable Detection Using Wireless Technology
Authors:- P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N

Abstract- Underground cables are prone to a wide variety of faults due to underground conditions, wear and tear, rodents etc. Diagnosing fault source is difficult and entire cable should be taken out from the ground to check and fix faults. The project work is intended to detect the location of fault in underground cable lines from the base station in km using a PIC16F877A controller. To locate a fault in the cable, the cable must be tested for faults. This prototype uses the simple concept of Ohms law. The current would vary depending upon the length of fault of the cable. In the urban areas, the electrical cables run in underground instead of overhead lines. Whenever the fault occurs in underground cable it is difficult to detect the exact location of the fault for process of repairing that particular cable. The proposed system finds the exact location of the fault. The prototype is modeled with a set of resistors representing cable length in km and fault creation is made by a set of switches at every known distance to cross check the accuracy of the same. In case of fault, the voltage across series resistors changes accordingly, which is then fed to an ADC to develop precise digital data to a programmed PIC IC that further displays fault location in distance. The fault occurring distance, phase, and time is displayed on a 16X2 LCD interfaced with the microcontroller. IoT is used to display the information over Internet using the Wi-Fi module ESP8266.A webpage is created using HTML coding and the information about occurrence of fault is displayed in a webpage.

Face Detection using Neural Network
Authors:- Owais Khan, Prabhat Singh, Ruchika Suryawanshi, Manish Shetty, Prof. Devidas Chikhale

Abstract- Face recognition is an important function of surveillance system, enabling detection and identification of person who appear in a frame. Face recognition from the real data, capture images, sensor images and database images is challenging problem due to the wide variation of face appearances, illumination effect and the complexity of the image background. With the development of deep learning, face recognition technology based on CNN (Convolutional Neural Network) has become the main method adopted in the field of face recognition. It is a multi-layer network which is used to train the network, to perform a particular task using classification. This paper suggests a cascade classifier based face detection and convolutional neural network based face recognition that can recognize the faces.

Sustainable, Portable and Efficient Electricity Delivery from 4 Different Sources
Authors:- Asst. Prof. Syed Shajih Uddin Ahmed, Md Khaleel Ur Rehman, Md Zain Ul Abedeen, Syed Akber Ali Salman,

Abstract- The main objective of this project is to provide uninterrupted power supply to a load, by selecting the supply from any source out of 4 such as main power supply,solar energy, generator, and inverter power supply automatically in the absence of any of the source. The demand for electricity is increasing every day and frequent power cuts is causing many problems in various areas like industries, hospitals and houses. An alternative arrangement for power source is a serious matter. In this project we used four switches to demonstrate the respective failure of that power supply. When any of the switches is pressed it shows the absence of that particular source, switches are connected to microcontroller as input signals. A microcontroller of ATMEGA8-32 family is used. The output of microcontroller is given to the relay driver IC, which switches appropriate relay to maintain uninterrupted supply to the load. The output shall be observed using a lamp drawing power supply from main supply initially. On failure of the main supply (which is actuated by pressing the appropriate switch) the load gets supply from the next available source, say the solar. If the solar also fails it switches over to the next available source and so on. The current status, as to which source supplies the load is also displayed on an LCD. As it is not feasible to provide all 4 different sources of supply, one source with alternate switches are provided to get the same function, Taking in consideration the use of the source whose cost is the lowest then, the higher cost sources and so on.

Memory Organization in Computer Architecture
Authors:- Kishan Singh, Aniket Singh

Abstract- This article presents give an general idea of the memory organization in computer architecture .In this paper we will learn about type of memory and there memory organization in COA (computer application and architecture). Memory is employed for storing programs and knowledge that area unit needed to perform a particular task. A memory unit is that the assortment of storage units or devices along. The memory unit stores the binary data within the variety of bits. The classification of primary and secondary memory, the different types of ROM and RAM we will learn about direct mapping in the article.

Identification and Controlled of Short Duration Voltage Disturbance by using RMS Algorithm of Distribution System
Authors:- PG Scholar Miss. Anjali Nandkumar Jambhulkar , Prof. Hitesh Murkute, Prof. R.M Bhombe (HOD)

Abstract- Delivering good quality of power is the main agenda for distribution system to the loads. But maintain power quality is not so easy due to the load variations in the system. Sag and swell are the main factors that affect power quality. In this paper, multiple sag conditions and swell conditions were tested by producing the condition in different phases of the system. A simple algorithm called RMS algorithm was developed and tested for the said conditions. Sag and swell were generated on single phase and multiple phases for testing the algorithm. The algorithm and the results were obtained using Matlab. .DVR is installed between supply and load which will inject voltage and active power to the distribution system during balanced/unbalanced voltage sag and swell disturbances. The performance of DVR based of voltage sag, swell is going to be tested and Simulation results are going to be carried out by MATLAB with its Simu-link to analyze the proposed method.

A Review Article of Road Ways Hot Spot Design Optimization with Calibration of Geographical Side
Authors:-Monika Dawar, Asst. Prof. Vinay Deulkar (HOD)

Abstract- In this a literature review is given of the methods and techniques that are used to analyse black spots and black zones. Although, no universally accepted definition of a black spot or black zone is given, these locations will in general be described as high risk accident locations. In this context, several statistical models are described in literature to model the accident frequency and accident severity.

Configurable Survey Template APP
Authors:- Mr. Shubham Ambre,Ms. Priyanka Lokhande,Mr. Manish Ram, Ms.Mohini Misale

Abstract- Mobile phones have become a necessity for living in this technologically advanced generation with development in electronics and communication. The applications used daily have become an essential part of the business world and provide a simpler means to communicate with the consumer. This paper deals with such an android application which will be used to gather information for creating upcoming products in various industries by targeting the need of their customers. A survey app is required for the industries to connect with their clients to collect better feedback. So, they would be able to design their future products according to the need and demand of today’s society. When the opinion of the client is considered, the industry can provide good and a satisfactory service. This platform allows the client to raise their concerns freely. For example, when we consider a survey app in the fashion industry the features included are- provide upcoming product details before it hits the market, release and pre-order schedule, notice board, updates on previous products like bags, shoes, purses etc. notification for recently inclusive updates, designer details and collaborative works. Its goal is to provide the customer every detail before passing out a feedback form so the feedback and review of the customer is unbiased, and they can make a well-informed decision before purchasing the products. It will take place by making communication effortless, provide simple and quick access to information. Though it will be a development for a specific industry only, this application has the potential function to have an extension version for a wide range of users.

PC Based 2D Game Design
Authors:- Aanesha S. Ghosh Dastidar, Rini Sarkar, Pranjal S. Tikande, Shree S. Meher, Dr. Siddharth Hariharan

Abstract- Games are a fundamental way that humans interact and learn. They provide so many advantages for people of all interests and abilities. The main benefits of using computer games as learning tools, is related with problem solving, 21st- century skills, integration of learning and assessment, collaboratives and interactivity, addressing cognitive as well as affective learning issues, and motivation for learning. Gaming is gaining a different level of attention not only from the youngsters but also from different age people. It is creating a virtual world where we can virtually live our life. Gaming has gained importance in Desktop application as well as in Android Application. The objective of the following paper is to give information about pc-based game designs. In this paper a 2d game generation is described. The game is “Brick Blasters”. It is a 2.0 version of this respective game where its background theme and many other aspects are changed. Different levels and different attraction have enhanced the game in a new way.

Aahar – Food Donation App
Authors:- Mrigank Mathur, Ishan Srivastava, Vaishnavi Rai, Assistant Prof. Mr. S. Kalidass

Abstract- The sharp rise in the amount of food waste creates theneed for charity in terms of donations. Food is mostly lost everyday in numerous restaurants, parties, socialgatherings, college canteens and many other social activities in the present scenario. By visiting each organisation several times to reduce the problems with food waste, people donate food manually. Where there are platforms that have made attempts to help people donate food, the current framework offers a new internet-based application that provides all poor people/organizations with a forum for recycling surplus food. The device has seen to be an efficient wayto donate items over the Internet to organizations, etc. It highlights the ability to prevent food waste. It offers details about the inspiration behind such an application, explaining the current mechanism of contributions and how the product works to benefit society. This framework would establish a shared communication platform for hotels/restaurants, charities and individuals, where charities and individuals can contact restaurants that have remaining food directly and report generation. Showing how much food is given by which restaurant and giving reward points Food Donor, Food Receiver, Third Party Provider, Admin are the key modules in this framework where Food Donor can be any organisation, entity or college that wants to donate food and build a new food donation request and Food Receiver can be any food-seeking charity corporation. A fresh food donation request will be produced on thesite and a message will be sent to the third-party provider responsible for transporting food from the food donor to the food recipient until the request is approved.

Pothole and Uneven Roads Detection using Android Application
Authors:- Prof. Sadhana B, P M Vidyashree, Sahana Salian, Sushmitha Shetty, Thrupthi H Karkera

Abstract- The android application makes use of mobile sensors for detecting anomalies on the road surface including potholes, cracks and bumps. This application will utilize sensors to analyse the level of unevenness of the road. The application collects information and stores the information on a database so that the potholes location can be made public to all the users. When all the potholes are pinpointed on a map, it becomes very easy for civic authorities to focus their efforts on stretches of roads. A good road helps to simulate economic and social development. Maintenance of proper condition of roads is becoming a major issues in many developing countries like India creating disturbance in smooth travel and cause damage to vehicles. This project proposes an efficient solution for pothole detection which is cost and power effective.

Design and Optimization Power in 10T SD RAM with Voltage Etimation using Artficial Intelligence
Authors:-Priya Jain, Mrs. Megha Soni

Abstract- Random access memory is an essential resource required by the computational hardware. As the processor speed has attained GHz clock frequency, memory throughput can be a bottleneck to achieve high performance. 10T SDRAM can deliver a reasonable solution for such data storage. Typical computational system consists of multiple hardware modules that perform different operations on the data. These modules attempt to access the data concurrently. This leads to a requisite for a memory controller that arbitrates amid requests queried by different modules and exploits maximum throughput. The memory controller interfaces SDRAM and other subsystems. Hence it manages the data into and out of memory. The access latency or access speed solely depends on the implementation of memory controller. We are also proposed on AI algorithm because it is consume lower power as compare to AI. The study comprises area, power and timing analysis of the both in AI based 10T SDRAM. Synopsys Design Compiler tool is used to obtain the necessary results. Conventional 10T SDRAM and MESFET 10T SDRAM are analyzed through Microwind and DHCH tool in technology. It is seen that sub-threshold and gate leakage, both effects the operation of the SSDRAM cell. In this thesis MESFET is used to simulate the 10T SDRAM cell and it is concluded that MESFET increases the performance of SDRAM cell.

Prepaid Energy Meter using GSM and Arduino
Authors:-Dinesh Yadav, Atharva Parab, Siddharth Raul, Bhavesh Sharma, Sheeba P.S.

Abstract- It is realized that one of the main defective subsystems adding to the tremendous budget loss in Power Supply Company is that the improper meter reading and charging framework. Mistakes are observed at every phase of charging the energy rates, almost like blunders with conventional meters, reading errors by humans while noticing the consumed energy; and error during the preparation of paid and the due bills. The solution for this downside may be a prepaid charging or billing framework of consumed energy. Most of the developing countries are in the process to shift their conventional energy management practices to the fashionable ones by replacing the old and traditional energy meters with the smart technology meters outfitted with the prepaid facility to quantify the facility consumption so on decrease the income deficits looked by utilities due to customer unwillingness to form consumed energy payments on time. Our proposed design embedded with Arduino and GSM technology is a level-up upgrade over the currently existing energy meter, which enables consumers to effectively manage their electricity usage. The system performance is sweet with the acquired results. An earlier charging will undoubtedly get solve the problems of unpaid bills and man-made mistakes in meter readings, along these lines guaranteeing justified income for the utility.

Comparative Analysis of Financial Performance: A Study with Reference to TCS & INFOSYS
Authors:-Asst. Prof. Samrat Banerjee, Nikhil Modi

Abstract- The implementation of Liberalization, Privatization and Globalization lead to the emergence of the IT sector in India, which is one of the most booming sector of 21st century.Increased Foreign Direct investment provided more impetus for these IT giants to explore its massive heights in India. As service sector contributes a major portion of our GDP,IT sector has been instrumental in contributing to the success of the service sector.This study focuses on evaluating and comparing the financial performance of two IT giants, TCS & Infosys, and thus analyzes its Du-pont model.Descriptive statistics and Multiple regression model were used for the analysis.

IOT Based Surveillance Robotic Car Using Raspberry Pi
Authors:-Aniket M. Ainapure, Akshay kumar S. Basargav, Sanket V. Mhetar, Asst. Prof. Saurabh R. Prasad

Abstract- Robots have found a drastically increasing demand in day-to-day life. In this present work, a Raspberry Pi based spy robot with remote monitoring and control through Internet of Things (IoT) has been developed. Because of IoT feature, it overcomes the problem of limited range surveillance. The spy robot system comprises the Raspberry Pi (small single-board computer), night vision pi camera and sensors. This robot can be controlled with the help of laptop/mobile. The proposed robot is small in size thus capable of manoeuvring into area where human access is not easily possible. This surveillance system using spy robot can be customized for various fields like industries, banks and shopping malls. This system will save human live, and protect the country from enemies. We have also developed a webpage consisting of Graphical User Interface (GUI) application to facilitate the robot control. The live streaming ability of the Pi allows the camera feed to be analysed from any location using internet.

Designing the Communication Architecture in Future Tripping Device
Authors:-Vikas Shrivastava

Abstract- This paper presents an estimation of SF6 gas circuit breakers reliability in the transmission substations, Among the substation equipment circuit breakers play a vital role when triggered to switch to Control the power transfer based on the load demand situations, Isolate faulty circuits, Prevent system stability failures in case the system parameters are crossing the permissible limit allow maintenance of substation equipment Generally when utilities wanted to procure circuit breakers (CBs) in past as well as today, their preference is always for three pole operated circuit breakers due to cost effectiveness. This preference continued up to voltage levels of 220kV, beyond which the higher phase spacing has not permitted possibility of three pole operated Air Insulated Substation (AIS) circuit breakers. In Gas Insulated Substations (GIS), the limitation is 170kV for three pole operated CBs, beyond which the size of the tubular housing may become uneconomical. A circuit breaker failure may result in the unavailability of an entire power system, causing major disruption and severe financial losses. Describe in this paper.

Designing the Communication Architecture in Future Tripping Device
Authors:-Vikas Shrivastava

Abstract- Transformers are basic design of electrical device which provide power transmission with transforming induced current from one circuit to another. The induced current can be converted step up or step down of current or voltage. This application mainly deliberates on the three-phase transformers which are used in among electric poles and the Power transformers. The real time overprotective is done on the basic features like gas level, oil aging and regulation of overload and temperature maintenance. These features are essential for effective power transmission and long life of industrial transformers and Communication Architecture for Future Protection & Control of Power Transformer .The monitoring and control of the transformer is done by using IEC 61850 AND RET 620 processor.

D.C. Operated Portable Vehicle Lifting Jack
Authors:-Joshi Kandarp U, Patel Nisarg N, Soni Vatsal D, Vakil Brijesh M, Asst. Prof. Mr. Bhaumik Bhandari, Principal Dr. D.M. Patel

Abstract-Car jack is a device used to lift up the cars while changing the tires during an emergency. Car jacks are available at the market has some disadvantages such as requiring more energy to operate, are not suitable for women and cannot be used on the uneven surface. The purpose of this project is to modify the design of the existing car jack in terms of its functionality and also human factors considerations. In this project, the scopes of research were on the designing 1.5 to 3 Ton maximum lifting capacity of car jack by using optimization concept.

Big Data Security Challenges and Prevention Mechanisms in Business
Authors:-Anusha Dissanayake

Abstract-Sensitive data analytics have reached gradually a smart area in the business world over the past few years. Various research has emphasized the importance of this field in augmenting the business performance in the industry. Excessive collection of data is making harmful effects on human beings. These data are extremely vulnerable for outsiders thanks to their hidden value. Big data gives us more advantages to make progress in many fields including business. It improves the competitive advantage of companies and to add value for many social and economic sectors. Sensitive data sharing brings new information security and privacy challenges. Earlier technologies and methods are no longer appropriate and lack performance when applied in a big data context. This research focuses on investigating the challenges and providing viable solutions to minimize the risk of the threats of user data.

QR Scan Based System for School Bus Tracking
Authors:- S. Ramya, P. Ajitha, M. Brindha, A. Gayathri, Mrs. V. Kavitha

Abstract- In the current day, it isn’t unprecedented for guardians and watchmen to stress over the prosperity and security of their youngster or kids. With the appearance of various advancements, schools that can bear, execute broad and exorbitant measures to guarantee the security of their understudies. Nonetheless, such advances remain out of reach to the not all that rich. This paper proposes a productive and dependable school transport following cum security arrangement as an application combined with a site. The framework consolidates area following, a basic yet idiot proof validation and warning system, and oddity discovery strategies for bringing cautions up if there should arise an occurrence of strange movement. Such a framework takes into account the guardians to be mindful of their youngster in remarkable just as known conditions. The school specialists are likewise ready to screen the situation with their transports by means of a site.

Review on Finite Element Modelling and Analysis of Steel Angles
Authors:- Md Mozaffar Masud, Prof. A. K. L. Srivastava

Abstract- Steel angles under tension are frequently used in a variety of structures because of the basic simplicity of its cross-section. The stress distribution in the vicinity of such connections is non-uniform because of the coupled effects of connection eccentricity, shear lag and stress concentrations. This paper presents finite element techniques used in modelling the angle tension members. Further, the associated problems such as the shape of the material stress-strain curve, the interaction between the gusset plate and the angle, the interaction between the bolt and the bolt hole, the appropriate failure criteria, the effect of punching of holes etc. are discussed. Finally, the prospects of accurate modelling of such connections are explored.

Early Detection of Heart Disease Using Machine Learning
Authors:- Shekhar Chavda, Rishikesh Kumbhar, Shubham Karande, Prof. Snigdha Bangal

Abstract- Heart connected diseases square measure primarily the foremost reason of death throughout the world and because of that an outsized range of casualties square measure arising in countries with low and middle financial gain like Asian nation. A large quantity of information is unendingly generated by medical practitioners. the information generated will be used for the first detection of heart diseases, which may effectively support to scale back the incidence of assorted heart connected diseases. the choice prediction will be effectively done by enhancing the information identification needed to find patterns that weren’t once renowned. economical prediction will be done by accessing the information accumulated from health care firms and industries and realize the hidden patterns.

Cloud Based Meta Engine for High Availability and Maximum Service Performance
Authors:- Infant Raju. R, Ananthi Christina R, ArshimaShimona C A, Sherril Sophie Maria Vincent

Abstract- A one stop solution for the entire mobile and PC OS, which uses only the hardware of the system whereas the software (Meta Engine) resides on the cloud which replaces existing OS. A cloud OS is a kind of lightweight operating system that stores data and can access Web-based applications from a remote server. In the proposed system, users work with Cloud-based framework accessible via browser on any device, which is similar in services, applications, look and feel of an operating system. With this design, users can work from multiple devices and multiple places which are accessible to the Internet over the same set of applications and files.High availability and Cloud Computing yields maximum service performance with a minimalistic hardware support using SaaS and DaaS service. This integrates existing operating systems and web browsers. The internet becomes your personal computer, the browser becomes your cloud desktop. Secure and effortless integration of applications and data that ends up in aqueous experience. Working throughout all phases of the software development lifecycle: writing, testing, and maintaining the code that powers highly scalable cloud applications offering the user full stack support. The cloud stack OS provides Saas and Daas services at the user end. DaaS-offering a service provider that delivers virtual desktops to end users over the Internet. Saas – allows each user to access programs via the internet, instead of having to install the software on the user’s computer. The software could be customized anyway for any purpose. This OS could include the demanded applications inevitable by the client. Eg. Bank, Hospital, Workplace monitoring. Thus a Generic OS simulation for mobile and desktop via mobile app and web app is rendered.

Design and Analysis of Submarine Radome
Authors:- Asst. Prof. Md Baha Uddin, Mohd. Mahmood, Shahbaz Pasha, Mohd. Naqi Ahmed

Abstract- Submarine antenna is used for communication by Radio Frequency (RF) system. It is protected by radome. Radomes are the electromagnetic windows that protect microwave sub-systems from the environmental effects Low-observable radomes are usually made of E-glass/epoxy composite due to its low dielectric constant which is necessary not to interfere electromagnetic (EM) wave transmission characteristics. Since aramid fibers have lower dielectric constant and higher strength than those of E-glass fiber. The dielectric strength constant were measured of the E-glass/epoxy and Aramid/epoxy materials The modal analysis is also carried out on radome to check for the natural frequency of the radome. So that resonance does not occur if the natural frequency of the radome coincides with the excitation frequency of the submarine. It is designed to a high pressure radome covering frequencies from 15 KHz to 18 GHz to meet the submarine applications. The details are presented in this paper.

Boat rental app in Cloud Environment of Salesforce
Authors:- Assistant Professor H K Virupakshaiah, Nikita Shetty (Project Student)

Abstract- This paper examines the advantages of Boat Rental App over cloud technology to better connect with customers and owners. We build here a boat sharing service platform where company acts as a leasing agent and customers can use this platform to give their boats for rental instead of investing on its own. This helps author to find varieties of boats in nearer location with complete details. This paper concerned with the improvement of efficiency and productivity of business and saving time in searching boats for author or end users.

Dual Axis Solar Tracking System
Authors:- Asst. Prof. Asra Sultana, Shaik Omer, Mohammed Sameer, Mohammed Abdul Bari

Abstract- Solar panel has been used increasingly in recent years to convert solar energy to electrical energy. The solar panel can be used either as a stand-alone system or as a large solar system that is connected to the electricity grids. The earth receives 84 Terawatts of power and our world consumes about 12 Terawatts of power per day. We are trying to consume more energy from the sun using solar panel. In order to maximize the conversion from solar to electrical energy, the solar panels have to be positioned perpendicular to the sun. Thus the tracking of the sun’s location and positioning of the solar panel are important. The goal of this project is to design an automatic tracking system, which can locate position of the sun. The tracking system will move the solar panel so that it is positioned perpendicular to the sun for maximum energy conversion at all time. Photo resistors will be used as sensors in this system. The system will consist of light sensing system, microcontroller, gear motor system, and a solar panel. Our system will output up to 40% more energy than solar panels without tracking systems.

Mood Music Player
Authors:- Nitesh Jha, Ronak Shukla, Prof. Uma Goradiya

Abstract- Recent studies confirm that humans respond and react to music and that music has a high impact on person’s brain activity. The average Indian listens up to two hours of music every day. People tend to listen to music based on their mood and interests. This project focuses on creating an application to suggest songs for user based on their mood by capturing facial expressions. Facial expression is a form of nonverbal communication. Computer vision is an interdisciplinary field that helps convey a high-level understanding of digital images or videos to computers. In this system, computer vision components are used to determine the user’s mood through facial expressions. Once the mood is recognized, the system suggests a playlist for that mood, saving a lot of time for a user over selecting and playing songs manually. Mood-Based Music Player also keeps track of user’s details like number of plays for each song, sorts songs based on category and interest level, and reorganizes the play-list every time. The system also notifies user about the songs that are never played so that they can be deleted or modified.

Inventory Management System
Authors:- Prof. Deshmukh R.R, Aishwarya Pawar, Vaishnavi Katore, Nikita Dabhade,
Vishakha Kasture, Sohan Bagul

Abstract- This project is aimed at developing a desktop based application named Inventory Management System for managing the inventory system of any organization. The Inventory Management System (IMS) refers to the system and processes to manage the stock of organization with the involvement of Technology system. This system can be used to store the details of the inventory, stock maintenance, update the inventory based on the sales details, generate sales and inventory report daily or weekly based. This project is categorize individual aspects for the sales and inventory management system. In this system we are solving different problem affecting to direct sales management and purchase management. Inventory Management System is important to ensure quality control in businesses that handle transactions resolving around consumer goods. Without proper inventory control, a large retail store may run out of stock on an important item. A good inventory management system will alert the wholesaler when it is time to record. An automated Inventory Management System helps to minimize the errors while recording the stock.

Methodological Obligation in Inherited Procedures for the Optimization Through Agile Considerable Awareness and Investigative for E-Commerce
Authors:- Dr. Santosh Kumar Dwivedi, Dr. Rajeev Tripathi

Abstract- In talent state of concerns after Coid-19 pandemic software program-based equipment deployed in a company to cater to the complicated commercial enterprise processes, combine diverse commercial enterprise devices and cope with necessities of a worldwide consumer base. The conventional method of software program engineering succumbs to the converting want of consumer and era advancement. On the behest of the consumer, a software program system ought to be designed in a manner that it is going in concert with the existing person needs. Agile for instance, is a famous instance of a lifecycle used to construct smart and analytical systems. Methodological responsibility is a time period coined through Ward Cunningham to indicate the quantity of rework required to position a bit of software program into that nation which it ought to have had from the beginning. Obligation Management Model is used to hit upon Methodological responsibility. The examination pursues updated address the reason of the boost of IS lightsomeness and pleasant for detecting, finding, associated mixture and execution in a mild-footed IS. IS lightsomeness is specified in mild of the reality that the ability of associate IS to acumen changing progressively; determine it continuously; and select out and achieve a reaction continuously. Architecting associate dexterous IS can be a multifaceted and asset extreme crucial, ultimately assessment of its factors of hobby is quite desired and proper, associate hobby for lithe system is presented, this paper expects associate net commercial enterprise approach with lightsomeness, and it talks approximately its security conjointly. This system receives better on-line commercial enterprise viability and acquires to unmatched low of goings-on troubles.

Multilevel Security Using Honeypot
Authors:- M. Tech. Scholar Yamini S. Shegaonkar, Asst Prof. Dr. Leena Patil, Asst Prof. Dr. Shrikant Zade

Abstract- Security is becoming a major issue today. A Security is not limited to laptops and other devices. Data security is becoming more and more important today. Data is not safe in any social situation since any person with access to hacking can access data, so that any organization can protect its data against any type of cyber attack. It is important. It is an imperative task, and work. This is why honeypot security is used primarily for data protection. Interacting with the location of attackers and attackers, network of attackers and malware assault details is the main work of this security. Honeypot will create data logs for attackers. Honeypot supplies a researcher with relevant data on attackers. They might understand easily. Honeypot and its benefits will be examined in this paper. We will also learn how Honeypot interacts and collects information and keeps data secure from attackers.

“Design and Development of Multiutility Sheller Machine using Powered by Vehicle”
Authors:- M. Tech. Scholar K. N. Ramteke, Asst. Prof. V. B. Vaidya

Abstract- Agriculture is the most important factor of our Indian economy, in Indian agricultural farming produces semi-finished product or goods. Groundnut, chickpeas and other various different types of seeds are agricultural semi-finished Products. Lack of processing machines on these types of goods, especially Groundnut, Yellow peas, Chickpeas etc. these types of seeds, their lack of Sheller machine is a major problem of formers to production of the finished product in our country. In beginning this Process was done by manually which is output got from this method was very low and it does very time consuming process. On other hand some machines are working on the electric motor or tractor which is very costly as well as not comfortable for every former at every place. Therefore we proposed affordable Sheller machine. And this is powered by vehicle as well as an electric motor. The farmer can be selected on our own requirement what her need and what he want. This project involves so many processes like research of previous machines, design of new components, calculation, fabrication and assembling of different components.

Speed & Direction Control of DC Motor through Bluetooth HC-05 Using Arduino
Authors:- Asst. Prof. S.Md. Mazhar Ul Haq, Mohammad Mujahid, Mir Naser Ali Khan, Syed Abdul Farhan

Abstract- The technology is a process that never ends and to improve the quality of any product these technologies are required. Under this article, the blueprint and execution of a cheap, robust as well as resilient and secure Bluetooth based device DC motor is present. The blueprint is represented on AT Mega 328 board and the motor is liaisons to the input/output ports. The connection between the controlling device and the Arduino Nano is without wire i.e. wireless due to which an individual can operate easily who are using Bluetooth devices. Due to low cost of this system, DC motor to be controlled with the help of this board.

Designing of CSSD System using VGG Algorithm
Authors:- Avani Agrawal, HOD. Dr. Kamal Shah

Abstract- Five billion people worldwide have no access to quality surgical care. The skill of the physician varies greatly, and many patients who are offered care have problems and are easily injured. Improving surgical training and feedback can help reduce the level of complications that have been shown to be preventable. To do this, it is important to test the ability to work, a process that requires professionals right now and manual, time-consuming, and humble. In this work, we introduce a method to automatically assess the performance of physicians by tracking and analyzing the movement of tools in surgical videos, using region-based convolutional neural networks. While previous methods have talked about the availability of tools, ours is the first to not only see the presence but also locally available surgical tools in real laparoscopic surgical videos. We show that our approach is more sensitive to the limitations of tools and far outweighs the methods available to determine the presence of tools.

Brain Tumor Detection
Authors:- Tejas Mhatre, Omkar Narangikar, Shubham Dhonde, SugatPalaspagar, Dr. Shilpa Joshi

Abstract- One of the dreadful diseases existing within the world is brain tumor. When it involves biomedical applications, Image Processing is widely used for diagnosis of various tissues. This paper deals with detection of brain tumor from MRI images of the brain. Tumor may be a rapid uncontrollable growth of cells. Magnetic Resonance Imaging (MRI) is that the device required to diagnose brain tumor. The traditional MRI images are not that suitable for fine analysis, so Image Processing is a crucial process required for efficiently analyzing the tumor images. An algorithm for brain tumor detection is proposed. Image Processing is employed within the medical tools for detection of tumors. Image Segmentation alongside pre-processing of images is implemented for detection of tumors. The shape and texture for feature extraction is considered. It is expected that the experimental results of the proposed system will give better leads to comparison to other existing systems.

Multifunctional Agricultural Sprayer
Authors:- Parikh Vaibhav D., Patel Chirag J., Patel Het J., Patel Ronak S., Asst. Prof. Pankaj Prajapati, Principal Dr. D. M. Patel

Abstract- India is claimed to be an agricultural base country directly or indirectly 75% of the peoples are hooked in to farming, during this agriculture sector there’re tons of field work, such as weeding, reaping, sowing etc. Apart from these operations, spraying is additionally a crucial operation to be performed by the farmer to guard the cultivated crops from insects, pests, fungi and diseases that various insecticides, pesticides, fungicides and nutrients are sprayed on crops for cover. Farmers face enormous problem while spraying the pesticide like tank capacity is extremely small, high cost and spaying time taken more. In order to scale back problems different sort of sprayers has been introduced within the market, but these devices don’t meet the required problems or demands of the farmers. Small scale farmers are very curious about manually lever operated knapsack sprayer due to its versatility, cost and style. But multi-functional pesticide sprayer pumps are combination of both manually & battery-operated pump for better efficiency. We make it as Multifunctional Pesticide Sprayer which can perform many tasks at a time like weeding, cropping etc. This one is trolley operated system by using this we can reduce maximum effort required for spraying pesticides as well as we can spray pesticides in any direction or around the crops at any height of crops. This is used for weeding, ploughing etc. This paper suggests a model of operated by hand multi nozzle pesticides sprayer pump which may perform spraying at maximum rate in minimum time.

A Review of Face Recognition Using SIFT Feature Extraction
Authors:- Prof. Shubha Dubey, Ravina Meena

Abstract- Face detection may be defined as the process of determining whether face is present or not in a given image, if present, then the location of the face is notified. Face can be detected in colour or single intensity, single image or video sequence (single image/frame taken at a time).Another term closely related to face detection is face localization. It may be defined as determining position of single face in a given image. The difference is that in face localization it is assumed that only one face is present in the input image. But in the face detection presence of face either one or many is not known prior. Facial feature detection is to detect the presence and location of facial features like eyes, eyebrow, nose, nostrils, mouth, lips and ears. Automatic Face Recognition aims to use pattern recognition technology to identify people in photos or videos. Automatic face recognition has been widely used in applications from social media to advanced authentication systems. Face recognition technology is very mature. In an unlimited real environment, automatic recognition of faces from digital cameras is still very challenging because it involves important changes in acquisition conditions, facial expressions and attitude changes. Therefore, the key challenges in this area as well as developed solutions and applications based on imaging and machine learning technologies are introducing the topic of automatic computer face recognition.

Control BLDC Motor using Bidirectional DC Converter for Electric Vehicle
Authors:- M. Tech. Scholar Sana Afreen Khan, Prof. Diksha Khare, Prof. Yogesh Likhar

Abstract- The aim of this research project is to design a three phase four quadrant variable speed drive (VSD) for a permanent magnet brushless direct current motor (PMBLDC) that can be applied to an electric vehicle (e-bike). The design is confined to PMBLDC motors with a maximum power rating of 1.5kW. The speed controller operates in current mode at a maximum voltage and current rating of 50V and 30A, respectively. The VSD has the ability to smoothly control the current delivered to the DC motor and therefore controls its torque. The motor’s current is limited in all four quadrants of operation, and its speed is limited in the forward and reverse directions. The performance of the proposed DC motor VSD system is tested on an electric vehicle. Simulation is carried out using MATLAB. A Simulink model is developed to simulate and analyze the operation of the motor. A permanent magnet synchronous machine with trapezoidal back EMFis modeled as a BLDC machine. A controller has been modeled with feedback signals from the Hall sensors of the motor. Based on the Hall signals, gate pulses (PWM pulses) are generated and appropriate switches of the inverter circuit are triggered to achieve precise control of the motor. The voltage across the battery which is charged during the braking period is also measured. The proposed electrical vehicle speed control system provides efficient control in all four quadrants of operation and it is a suitable alternative for a low cost transportation mode.

A Review: Design And Implementation Of An Intelligent Wheelchair Controlled By Multifunctional Parameter
Authors:- Bhushan M. Ghubade, Dr. Shubhangi Giripunje

Abstract- The purpose of this task is to make a Multi-Functional Wheelchair using Accelerometer ADXL335 and ESP32 as sensor to help physically disabled human beings in transferring from one region to any other simply by giving path from the hand, voice, Bluetooth. This Accelerometer ADXL335 and ESP32 primarily based totally challenge use Accelerometer ADXL335 and ESP32 for transferring backward path, ahead path, left path or proper path. We have advanced a Multi-useful wheelchair for medically disable human beings. We are working wheelchair by multi-feature 1) Bluetooth (Using Bluetooth device, ESP32), 2) Hand Gesture (Using Accelerometer ADXL335 MEMS), 3) Voice (ESP32). This makes challenge very powerful. The fundamental of this challenge is achieved retaining in thoughts to able the handicapped man or woman to transport round their domestic without any assist of different character.

Design of Single Precision Floating Point Arithmetic Unit
Authors:-Devyani R. Kamale, Lecturer Mrs. Pradnya J. Suryavanshi, Lecturer Ms. Sharda G. Mungale

Abstract- Most of the algorithms instigated in FPGAs used to be fixed-point. Floating-point operations are useful for calculations involving large dynamic range, but they require significantly more resources than integer operations. With the current trends in system necessities and available FPGAs, floating- point implementations are becoming more common and designers are increasingly taking benefit of FPGAs as a platform for floating-point implementations. The rapid development in Field- Programmable Gate Array (FPGA) technology makes such devices increasingly attractive for instigating floating-point arithmetic. Associated to Application Specific Integrated Circuits, FPGAs offer reduced development time and costs. Moreover, their suppleness enables field upgrade and variation of hardware to run-time conditions. A 32-bit floating-point arithmetic unit with IEEE 754 Standard has been premeditated using VHDL code and all operations of addition, subtraction, multiplication and division are verified on Xilinx.

A Study on Vertical Axis Wind Turbine
Authors:-Maicecer Karan, Abhishek Singh, Parikh Kaival, Vaghela Pruthviraj, Malek Sohil,
Asst. Prof. Nishit Patel, Principal Dr. D.M Patel

Abstract- This project studied the potential for installing roof-mounted vertical axis wind turbine (VAWT) systems on house roofs. The project designed several types of VAWT blades with the goal of maximizing the efficiency of a shrouded turbine. The project also used a wind simulation software program, WASP, to analyze existing wind data measured on the roofs of various WPI buildings. Scale-model tests were performed in the WPI closed- circuit wind tunnel. An RPM meter and a 12 volt step generator were used to measure turbine rotation speeds and power output at different wind speeds. The project also studied roof mounting systems for turbines that are meant to dissipate vibrations to the roof structure. Turbine vibrations were measured during the wind tunnel tests and in impact tests on a scale-model house. Recommendations were made for future designs of roof-mounted VAWTs.

Why Data Structures?
Authors:- M. Amitha Reddy

Abstract- This paper explores the definition and importance of data structures in the field of Computer Science. We will aslo see the chief grounds of using various data structures.The study of data structure helps us to understand how data is organized and how data flow is managed to increase efficiency of any process or program. They also provide various methods to organize and represent the data within the computer’s memory. Different types of data structures are examined in this paper. This paper begins with an overview of data structures and its types. It then examines their main application and concludes with the necessity of data structures in the Computer Science specialization. This paper is the result after a detailed research under the situation of absence of data structures.

Design of Cashew Nut Shelling Machine
Authors:- Suhas M Chougule, Prof. R. B. Gunale

Abstract- Cashew is highly appreciated in a large number of countries and cultures. India is the largest cashew processor in the world. Export of cashew nut shell liquid from India stood at 11,677 million tones (MT). Cashew which belongs to the family is native to the tropical parts the USA, Mexico, Brazil and the West Indies. However, it has since become naturalized in many lowland tropical areas. It is one of the most nutritious food crops of the tropical world, with high protein and fat content. The US is the largest market for Indian cashew kernels, followed by the UAE and the Netherlands, while Indian Cashew nut shell liquid is largely exported to South Korea, followed by China and the US. The cashew industry ranks third in the world production of edible nuts. The major exporters of cashew in the world are India and Brazil with 60% and 31% respectively of the world market share. The major cashew nut importers are the United States (55%), the Netherlands (10%), Germany (17%), Japan (5%) and the UK (5%). Cashew kernels are ranked as either the second or third most expensive nut traded in the US. Also process of cashew nut is very much important as to improve production rate. Now days there are various machineries used to save the time and to improve the quality. The Industries are using manual, Semi-Automatic and fully automatic machineries to increase the production rate. But In conventional process, it takes more time to complete operation and hence production rate is very low. Thus to reduce human injuries in conventional methods and to increase the production of cashew nut the present study has been studied.

Face Mask Detection and Surveillance System
Authors:- Karthik Prasad N, Prasadkumar Raviswamy Chikkamath, Pavan G Jambigi, Preetham Kumar M S, Asst. Prof. K. Asha

Abstract- The COVID -19 pandemic has reshaped our lives. Many of us are staying at home , avoiding to socialize and changing everyday habits, like going to school or work, in ways we never imagined . While we are modifying our old behaviors , there are new practices we need to adopt. First and foremost, the habit of wearing a mask or face covering whenever we are in a public space. Masks and face coverings have been proven to prevent the wearer from transmitting the COVID -19 virus to others and may provide some protection to the wearer itself. The outcome of this system is to help societal health by administrating a strict rule to avoid the spread of this contagious “Novel Corona Virus”. Our model will detect those people without face masks and warn the person about his negligence. And also report about this to the concerned authority. AI is an advanced technology which will work on the mathematical problem to respond to the real-world situations. To analyze the high transmission hot-spots and modulate the inspection in such areas is the main concern. To achieve this, we analyze the density of the lawbreakers (non- mask bearers ) and then report this data to the nearby authorities and based on this information, they will document the areas of high negligence and take necessary actions. The system is implemented using YOLOv4. This system will bring more insights to navigate/track the increasing spread of the virus. The authorities can be aware of the risk in certain areas and allot the inspection team accordingly. If the reports of each area are circulated on social media and news telecasts , people would be very cautious of the risks they will be facing. Hence, this will bring down the increasing rate of spread of the Corona Virus.

Farmer Friendly Drone
Authors:- Rajnandini Patil, Narayani Peshkar, Saloni Hatgine, Atharv Ghalsasi, Prof. Mrs S A Pore

Abstract- With the increase in population, the demand for the production of crops is also increasing. Along with the production, the quality of crops is one of the major concerns which come with this. Vast fields and low efficiency in crop monitoring create the largest obstacle in farming. It creates a major threat to food security. With the recent advances in technology, we can use quadcopters equipped with cameras for monitoring the fields. For crop disease identification advanced technologies like deep learning, image processing is very useful. These Unmanned aerial vehicles (UAV) are great to achieve the goals for tomorrow’s farming. Our proposed work discusses how we can detect the diseases on crops in the early stages. In this project, we have used raspberry pi to gather the required images from the camera and after capturing the image, image segmentation is done through Keras. This image segmentation will provide in the end a classification between the diseased and healthy crop and this information will be given to the farmer.

Android Mobile Monitoring Application with Google Firebase Real-Time Database
Authors:- Ankit Kukade, Dikshant Deogade, Ankur Ramteke ,Saurabh Kambale, Saurabh Kambale, Prof.Jayant Rohankar

Abstract- Using electronic devices is not limited to adult or to specific time or place. Children use difficult types of mobile device with no constraints. Guardian concern about the effect of the technical explosion on theirchildren development. Controlling , monitoring and managing approaches are in need to help in overcoming some of the worries. This gives insight in approaches to monitor and control children electronic devices thatallow guardian to manage and monitoring data, applications, or services available in kids mobile devices. The main challengeis to balance privacy and flexibility with the case of use. The project also includes the implementation of an androidapp called parent monitor app.

Clustering Approaches to Offer Business Insights
Authors:- B.Tech. Student Suyash Sharma , B.Tech. Student Kashif Ahmad, B.Tech. Student Varundeep Singh

Abstract- Various business undertakings have come to understand the centrality of CRM and the utilization of specialized skills to accomplish serious advantages. This examination investigates the significance of Customer Segmentation as a center capacity of CRM(Customer Relationship Management ) just as the different models for fragmenting clients utilizing bunching procedures. The accessible bunching models for client division, when all is said in done, and the major models of K-Means, DBSCAN, and Hierarchical Clustering, specifically, are examined and the temperance and indecencies of the strategies are called under attention. The individual models are examined.

Face Mask Detection System
Authors:- Shelke Rohit, Salke Sumedha, Rahate Anchal, Sherkar Tejaswini

Abstract- The COVID-19 pandemic is causing a global health crisis so the effective protection methods is wearing a face mask and follow social distancing in public areas according to the World Health Organization (WHO). The COVID-19 pandemic forced governments across the world to impose lockdowns to prevent virus transmissions. Reports indicate that wearing face masks while at work clearly reduces the risk of transmission. An efficient and economic approach of using AI to create a safe environment in a manufacturing setup. A hybrid model using deep and classical machine learning for face mask detection will be presented. A face mask detection dataset consists of with mask and without mask images , we are going to use OpenCV to do real-time face detection from a live stream via our webcam. We will use the dataset to build a COVID-19 face mask detector with computer vision using Python, OpenCV, and Tensor Flow and Keras. Our goal is to identify whether the person on image/video stream is wearing a face mask or not with the help of computer vision and deep learning.

Medicine Reuse System
Authors:- Komal Chunge, Shruti Deshmane, Vikas Solanke

Abstract- Today in this present area where technological advances are at its vertex, there is not even a single sector which remains untouched by technology. Technology has not merely established our lives simpler, but also offers a high level of safety and security wherever required. Technological devices are available which provides refuge for all the mankind. People are very concern about their health, But there are some people who cannot afford to take medicines. And such people are more likely to get major rather serious. Serious disease are dangerous and can become uncontrollable if timely medicines are not taken. Our health should be our first priority. Medicine donation is an active activity which is done by NGOs, but there are very few donors are available. Because of today’s situation donors cannot donate medicines to NGO. This paper basically deals with the donors who can donate the medicines, and transforming this simple application into most advanced donation system in the future. Some of the condition for the donor they can donate only they medicines which are not expired. Some people die simply because they do not receive timely medication. Therefore, developing medicine reuse system is very essential. Hence, this paper presents a medicine reuse system to donate medicines to the NGO.

Knowledge, Attitude, & Practice Regarding Environmental Hazards of Plastic Use
Authors:- Renno Jose B. Gabuya. Ed.D.

Abstract- This study looks into the knowledge, attitude, and practice of Barangay Bachao, Daram, Samar regarding environmental hazards of plastic use. Specifically it aims to: 1) identify the knowledge or information that residents possess regarding the danger of plastic use; 2) find out their attitude towards the use of plastic and the hazards it carries; and 3) identify their practices that might mitigate or perpetuate the hazards. Both quantitative and qualitative research designs were employed in the study. A survey was conducted among the 78 residents of the barangay and non-numerical data were also gathered from unstructured interviews.

Survey On Skin Disease Recognition Using Texture Analysis
Authors:- Gauravi S. Khandalkar, Associate Prof. Leena H. Patil, Associate Prof. Shrikant Zade

Abstract- Skin diseases are one of the most common diseases that people have faced over the years. The recognition of skin diseases is mainly based on the doctor’s experience and the results of skin biopsy. This is a long process. Image recognition and classification are important for improvement. Diagnose accuracy and overcome the lack of human experts. Image classification of skin diseases is an important task. The correct classification depends largely on the characteristics of the disease in question. Many skin conditions have very similar visual characteristics, which makes it more difficult. Choose useful image functions. Accurate image analysis of such diseases can increase the speed of diagnosis and speed up the diagnosis Process. A shorter diagnosis time can provide patients with better and cheaper care. Various methods and techniques are used to classify skin diseases, namely: traditional or manual performance-based methods and deep learning-based methods.

Future of Commerce Between Farmers and Merchants
Authors:- Vinay Solanki, Yash Mehta, Prabhat Tiwari, Shreshth Gupta, Margi Patel

Abstract- In recent years, electronic commerce of agricultural products has developed rapidly. In the development process of electronic commerce of agricultural products, many classic cases and business models have emerged, such as Reliance Fresh. The author analyzes and compares each model from 7 aspects and summarizes their differences and links. Finally, the author puts forward suggestions on the development of electronic commerce of agricultural products in India.[1]

Implementation On Iot Based Underground Fault Detection Using Wireless Technology
Authors:-P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N

Abstract- Detecting fault cable system proposes fault location model for underground power cable using microcontroller. Fault location models are to determine the distance of underground cable fault from base station in kilometers. This project uses the simple concept of ohm’s law. When any fault like short circuit occurs, voltage drop will vary depending on the length of fault in cable, since the current varies. A set of resistors are therefore used to represent the cable and a dc voltage is fed at one end and the fault is detected by detecting the change in voltage using a analog to voltage converter and a microcontroller is used to make the necessary calculations so that the fault distance is displayed on the LCD display.

Smart Shopping Cart with Interactive Chatbot
Authors:-Naveen Kumar B S, Prem Kumar, Anil Kumar, Dibyendu Dey

Abstract- The main focus of our project is to reduce human efforts and ease of shopping at shopping malls. The present scenario at every mega malls or shopping malls has the hastiest situation when it comes to heavy rush while standing in queue for prolonged hours at the billing counter. Our goal is to reduce those meaningless efforts to minimum and provide a better option using latest technology for a user-friendly shopping experience of the mall customers.

Generation of High Frequency Bat Voice for Avoiding Locust Attack in Field
Authors:- Krishna Deshpande, Jay Gaikwad, Pranjal Tiwari, Prof. Dr. Prasanna G Shete

Abstract- Locust attacks needs to be avoided for the healthy growth of the wheat crop. And farmers generally use harmful chemicals sprays to avoid the locust attack. The use of chemical sprays affects the growth of wheat crop adversely, and also have toxic effect on humans and environment. To avoid toxic chemical spray and its ef- fects on humanity, environment, and most importantly on the crop for locust attack we are proposing to generate high frequency (200- 250KHz) signal to tackle locust attack.

IOT Based Water Quality Monitoring System
Authors:- Preeti S. Hadimani, Shivani B. Mane, Rohitkumar S. Korvi, Asst. Prof. Saurabh R. Prasad

Abstract- The conventional method of testing water quality involves collecting samples of water manually and then using laboratory methods to test and analyse the collected samples. But this method is time consuming, involves wastage of man power, and uneconomical. The water quality measuring system that we have implemented checks the quality of water in real time through various sensors. The microcontroller transfers the data collected by the sensors to the smart phone/PC using Wi-Fi connection. This system can keep a strict check on the pollution of the water resources and thus ensures to provide safe drinking water

IOT Based Water Quality Monitoring System
Authors:- Preeti S. Hadimani, Shivani B. Mane, Rohitkumar S. Korvi, Asst. Prof. Saurabh R. Prasad

Abstract- The conventional method of testing water quality involves collecting samples of water manually and then using laboratory methods to test and analyse the collected samples. But this method is time consuming, involves wastage of man power, and uneconomical. The water quality measuring system that we have implemented checks the quality of water in real time through various sensors. The microcontroller transfers the data collected by the sensors to the smart phone/PC using Wi-Fi connection. This system can keep a strict check on the pollution of the water resources and thus ensures to provide safe drinking water.

A Literature Review on Privacy Preserving Implementing for TPA Data Sharing in Cloud
Authors:-Dnyanada N. Meshram, Asst. Prof. Shrikant D. Zade, Associate Prof. Leena H. Patil

Abstract- Today, many data warehouses and computing facilities are tested in cloud computing systems. Several people participated in the improvement of services in the system. Nowadays, cloud computing services cover a variety of possibilities, so shared computing resources and data can be transferred to computers and other devices as needed, thereby providing users with space for storing documents, pictures, etc. Whenever they want. However, the security of the document cannot be guaranteed. Cloud can provide services, through these services, you can access your applications and data anytime, anywhere. Since the data is stored in encrypted form, it must be fully protected. Many users host their data in the cloud, so accuracy and security are a top priority. We want to enable an external auditor (TPA) to check the integrity of the data stored in the cloud. Using cloud storage to share data with others is a common process. The current system believes that sharing data among multiple users may be one of the most compelling features that inspire cloud storage. In this we propose a secure cloud storage system supporting privacy-preserving publicauditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently.

Continuous Monitoring & Protection of 3-Phase Induction Motors Using PLC and SCADA
Authors:- Arsalan Ahmed Danish, Md Khaleelullah, Fahad Bin Zaid, Asst. Prof. Asra Sultana

Abstract- Induction motors are widely used in many operating areas and industrial applications as they are simple, robust, and reliable and have low production costs. The use of Induction motors have increased nowadays due to their versatility, good self-starting capability and these motors also offer simple, rugged construction, , low cost, reliability and easy maintenance. The reliability of an induction motor is of great Importance in applications such as commercial, aerospace and military and many industrial applications. In this paper different problems of IM are dealt with as over current, overvoltage, over temperature, over speed, inrush current, vibration monitoring during it’s time of operation. There are various proposed methods for fault diagnosis and protection of IM. Some of them are Stator fault monitoring techniques, protection system using Microcontrollers, On-line fault detection, Programmable Integrated Circuit (PIC) based protection system and Programmable Logic Controller (PLC) based protection system. In this study, the method which is applied is PLC based protection system of an IM.

A Fuzzy Text Fragementation by Implementing SSA Algorithm
Authors:- PG Scholar Aakansha Jha, HOD. Dr. Lal Ji Prasad

Abstract- In this new world that is surrounded by digital technologies and human wants to utilize the technology in spite of manually complete the assignments. The digital environment of today’s world creates a knowledge-based society surrounded by a high-tech economy concept that spans over its influence on how the manufacturing throughput and the information technology sector operate in an efficient and convenient way. Here we announce a project research based on Extract Technology. In this technology data can be refined and sourced with specific certainty and relevance. The concept of artificial intelligence technique correlates with the design of machine learning and it is very effective. Auto Defragmentation is an intelligent content summarization concept that automatically parses information, documents and many more into relevant and accurately abbreviated summaries. This is a concept of converting a whole paragraph into one third. This paper introduce the main research challenges of the data mining algorithm implementation with analysing the one subject note and bifurcate it into different subjects on the basis of ‘keywords’. In our technology chart ‘keyword’ are relative words of a prescribed subject that helps to distribute a single note into its respective subject’s folders. The basic architectural approach of the Data Defragmenter is to manipulate and rectify the data structure implementation on the basis of data mining and data warehouse concepts. Finally, the future of notes making approach will work terms like “Data Arranger”. Proposed approach is researched in different sectors like student’s notes making, letter writing, news reporting, script managing, and different more criteria related to writing work and managing prepared notes. General Terms: Fragmenting Notes, Auto Separation, Notes Classification.

PRAYAS Child Welfare Application
Authors:- Prof. Sonal Chakole, Sourabh Pandya, Pratik Pogde, Ankit Vitale, Dipika Katare

Abstract- Street life is a challenge or survival, even for adults, and is yet more difficult for children. They live within the city but are unable to take advantages of the comforts of urban life. There are so many slum children who roam on streets, while at this age they should study. But due to the financial crisis, they don’t have the privileges of education. Therefore they risk their lives just to get enough meal to stay alive. To get overcome from such crisis, our system will help the needy and homeless children. If we develop such kind of system, then this will surely promote poor and destitute children of our country. And this will be a small step towards promoting new generation.

IOT Based Water Quality Monitoring System
Authors:- Preeti S. Hadimani, Shivani B. Mane, Rohitkumar S. Korvi, Asst. Prof. Saurabh R. Prasad

Abstract- The conventional method of testing water quality involves collecting samples of water manually and then using laboratory methods to test and analyse the collected samples. But this method is time consuming, involves wastage of man power, and uneconomical. The water quality measuring system that we have implemented checks the quality of water in real time through various sensors. The microcontroller transfers the data collected by the sensors to the smart phone/PC using Wi-Fi connection. This system can keep a strict check on the pollution of the water resources and thus ensures to provide safe drinking water.

Plant Disease Detection and Solution Using Image Classification
Authors:- Sahil Thakur, Darshan Patil, Rita Sarse, Prof. Manisha Bharambe

Abstract- Crop cultivation plays a crucial role within the agricultural field. Presently, the loss of food is particularly because of infected crops, which reflexively reduces the assembly rate. Identifying plant diseases is not explored yet. The foremost challenge is to reduce the usage of pesticides within the agricultural field and to increase the quality and quantity of the assembly rate. Our paper is used to explore the disease prediction at an untimely action. We propose an enhanced algorithm to predict the infected area of the leaves. For segmenting infected region and placing it to its relevant classes, colour based segmentation model is used. Experimental analyses were done on samples images in terms of sometime complexity and thus the world of infected region. Plant diseases are often detected by image processing technique. Disease detection has steps like image acquisition, pre-processing, segmentation, classification and feature extraction. Our project is used to detect the plant diseases and provide solutions to urge over the disease. It shows the affected a neighbourhood of the leaf in percentage. We planned to style our project with voice navigation system, so a private with lesser expertise in software should even be able to use it easily.

Pre-Processing for the Reconstruction of Fetal MRI Images
Authors:- M. Tech. Scholar Anagha A, Asst. Prof. Aruna B

Abstract- Clinical imaging scenarios like foetus imaging, which include significant subjective movements, does complicate the 3D image and volume reconstruction process and it remains as a problem to overcome. This project is to bring up a learning based image registration to picture the 3D rigid transformations of arbitrarily oriented 2D slices. The advantage is that no spatial transform initialization is required. Only image slice intensity is needed. Convolutional Neural Network (CNN) architecture is used to learn the regression function for mapping 2D image slices to a 3D canonical atlas space. This quantitatively evaluates the simulated magnetic resonance imaging (MRI). Further it demonstrates the results on MRI data where this method is integrated into a full reconstruction and compensation. This paper is to elaborate the preprocessing step for the whole reconstruction of fetal image project.

Accident Avoidance and Alert System
Authors:-Sourabh S. Bagi, Prathmesh S. Parit, Nilesh B. Vaishnav, Asst. Prof. Anushka D. Kadage

Abstract- Accidents are the main threat in today’s modern world. All though the technological development in automobiles increases day by day, there are no proper advancements in the perspective of accident avoidance and detection. This system avoids accidents due to collisions occurring between the vehicles because of the driver’s negligence. In case of any accidents, there is smart rescue system in the vehicle which helps in sending the location of accident spot to the family members. So, the proposed system is designed for vehicle which will not only prevent the accidents but will also look over the safety of the driver. It is used to analyze the cause of vehicular accidents and prevent the loss of life and property arising from vehicle accidents.The system also involves the improvement of the security by preventing the damage of the Car.This System records the relevant details about a Vehicle such as Distance from obstacles, Speed of Vehicle, detect vibration of the vehicle Detect orientation or inclination of vehicle.

A Novel Smart Energy Theft System
Authors:-Asst. Prof. S. Md. Mazher Ul Haq, Yaseen Quraishi, Syed Mohd Taseen Shuttari, Mohd Abdul Faheem

Abstract- Energy theft has become a serious issue in the smart grid community. It has caused massive losses for many countries that exceed billions of dollar. Nowadays, a smart meter will be placed at the end of every distribution network to record power consumption and generates the energy reports remotely. Energy theft methods involve hacking smart home appliance and most commonly direct hooking on other households electricity supplies. Other methods involved are tampering with the smart meter’s software, mechanism, and manipulating data through cloud storage. Thus, attackers can reduce their own electricity usage by manipulating other households through tampering and hacking to increase their electricity usage as the aggregate bill for all customers in the community remains the same This system principally monitors electrical parameters of household appliances such as voltage and current and subsequently calculates the power consumed.

A Review on AFD- PSO Algorithm Based Secured Energy Efficient Wireless Sensor Network
Authors:-M. Tech. Scholar Diksha Jharbade, Prof. Amit Shrivastav

Abstract- Wireless Sensor Networks (WSNs) are networks of autonomous nodes used for monitoring an environment. Energy efficiency and secured data transmission are considered as the most important design goals for WSN. As the complexity of computer networks increased, the erudition of network-based attacks drew the attention of various researchers from several sectors. As a result of this, many Intrusion Detection System (IDS) have been deployed in such a way that it resolves various aspects of network security such as DoS, worms, viruses, malware, etc. Automation of IDS has been proposed in order to improve the energy efficient routing in Wireless Sensor Network in a secured manner. This paper represent a review on LD2FA (Learning Dynamic Deterministic Finite Automata) the dynamic nature of the network is cultured. In turn, LD2FA – PSO provides the information about the node, packet and route inspection for detection and elimination of intruders so that the data transmission is done in an energy efficient manner through the optimal path. Routing through optimal path improves the overall performance of the sensor network and through various metrics such as energy consumption, throughput, network lifetime, alive and dead nodes incorporates the Deterministic Finite Automata (DFA) and Particle Swarm Optimization (PSO) for intrusion detection and the data transmission is done in a secured manner by determining and following the optimized route. Various techniques showing in the literature.

A Review on Digital Image Copy –Move Detection
Authors:-M. Tech. Scholar Deepali Pal, Prof. Amit Shrivastav

Abstract- The use of digital photography has increased over the last few years and this trend has opened the door for image falsification. Image falsification has become a central issue in many applications. Common techniques used to create fake digital images (copy-moving and sewing images). Existing systems integrate block-based and keypoint-based counterfeit detection methods with SLIC super pixel segmentation algorithms. Existing programs can roughly indicate suspicious, counterfeit areas. SLIC image segmentation uses simple and global stopping criteria, which reduces the accuracy of image debugging and detects copy-moving image falsification. The most important contribution of this proposed work is to use local termination criteria for each cluster to avoid cluster and image region audits, and there have been no major changes since the last iteration. Adaptively, the algorithm divides the host image into non-overlapping and irregular blocks, extracts function points from each block, and matches the block functions to each other to locate the selected function points. An effective method of detecting image falsification is proposed.

Antioxidant Properties of Prosopis Cineraria (Ghaf): Pods And Leaves
Authors:- Dr. Vibha Bhardwaj

Abstract- The aim of the present investigation was to evaluate the antioxidant properties of Pods and Leaves of Prosopiscineraria (Ghaf). Antioxidants protect biological systems against free radical damage. Insufficient levels of endogenous and exogenous antioxidants can cause oxidative stress, an imbalance of oxidants and antioxidants resulting in cellular damage or death. The antioxidant activity was assessed by DPPH scavenging activity. The methanolic extract of pods and leaves P. cineraria had shown very significant DPPH (1, 1-diphenyl-2-picrylhydrazyl) radical scavenging activity. The DPPH radical scavenging activity of the extract increased with the increasing concentration of the plant extract. In DPPH free radical scavenging assay IC50 value of methanolic extract of P. cineraria pod and leaves were found to be 550 μg/mL and 480μg/mL respectively. Therefore, in vitro assays indicate that P. cineraria pods and leaves extracts are a better source of natural antioxidant, which might be helpful in preventing the progress of various oxidative stresses.

Slider Foot Scaffold on Railway Station with New Perception
Authors:- Mayur Kailas Suryawanshi, Vivekanand Gopalrao Patil, Bharat Prakash Shirsath, Kunal Sunil Aaglave, Asst. Prof. Habiburrahman Ansari

Abstract- The Fundamental objective of Customized Railway Bridge System is to assist the truly Tried Explorers to move beginning with one Phase then onto the following. Crossing point the railway track inside the railway station is outstandingly problematic. Nevertheless, it is extremely difficult to the impaired and developed individuals to cross the railway track without the help of others. In railroad station people’s necessities to move from one phase to other stage hence, stairway is given. In present day times lift or lift system is similarly being executed. Nonetheless, these options are either a costly endeavor or then again dreary endeavor. In this paper the experts use a lot of resources train characteristics, driving rules and information about various trains to make their movement technique. There are various elderly individuals social classes encountering leg cramps walking inconveniences leg vain issues and tenacious foot tortures, etc That is the motivation to deal with this troublesome we are making a response for that is we will make a venture on a level changed stage which is related between the two stations stage. Since because of this there will be no convincing motivation to bouncing on a bridge by adults similarly as kids. This will help the voyager’s with diminishing the effort in moving between various stages. The developed and incapacitated individual can without a doubt get across the contrary side. Lately, focal points for the advancement are the applying using modified associate is move backward by using clock base furthermore, manual executive or sensor base and manual overseers. So specific use in having railroad station. Exactly when the train will pass from stage by then request will be send through Arduino to motor to pen it.

FARMBOOK-Portal for Connecting Buyers and Sellers
Authors:- Asst. Prof. Saravanan, Bharath.T, Sravan.P

Abstract- Agriculture a huge role in the economy of India, where more half of its rural households still depend on agriculture for their livelihood. More than 75% of farmers being small and marginal. Even though agriculture is the major block in the Indian economy. But the farmers who are the back bone of this are not benefited due to the lack of good prices for the crop, lack of new techniques, and lack of technologies, and methods to see profits. The growth of the mobile communication technology is creating more opportunities learn and make huge innovations in the developing countries, where bringing information technology in the field of agriculture give best of it as well. The introduction of the mobile phones leads to new services and applications, in agriculture sector this is used to know the information about the new technique, climate, soil, marketing etc. It is one of the areas where it makes a huge impact on the agriculture and the rural development. Information technology in the agriculture opens the gates to the huge productions and profits which leads to increase in economy and profits to farmers. Giving importance to the agriculture leads to growth of our nation. Where information technology with agriculture provides good ability and awareness to the future generation. As per the concern of the farmers this combination of technology leads to the huge change in trends.

Brain Tumor Recognition through MIR Image
Authors:- Prof. Pranay M. Meshram, Lalit Roshankhede, Ujwal Kurhade, Priyanka Waghmare, Nilkanth Bhagat

Abstract- Brain tumor at early stage is very difficult task for doctors to identify. MRI images are more prone to noise and other environmental interference. So it becomes difficult for doctors to identify tumor and their causes. So here we come up with the system, where system will detect brain tumor from images. Here we convert image into grayscale image. We apply filter to image to remove noise and other environmental interference from image. User has to select the image. System will process the image by applying image processing steps. We applied a unique algorithm to detect tumor from brain image. But edges of the image are not sharp in early stage of brain tumor. So we apply image segmentation on image to detect edges of the images. In this method we applied image segmentation to detect tumor. Here we proposed image segmentation process and many image filtering techniques for accuracy.

Vision Face Recognition Attendance Monitoring System Using Deep Learning and Computer Vision
Authors:- Ritika Andhare, Akanksha Baghele, Ankita Tiwari, Prof. K.D. Yesugade

Abstract- Background: This рrоjeсt will show how we can use algorithms fоr fasсe deteсtiоn and recognition in the construction of programs to build a program that will look and see the front faces of students in сlаssrооm. “A fassee is the frоnt раrt оf а рersоn’s heаd frоm the fоreheаd tо the сhin, оr the соrresроnding раrt оf аn аnimаl” (Oxfоrd Diсtiоnаry). In interасtiоns, fasсe is the most imrоrtаnt fасtоr and is capable of extracting implоrtаnt infоrmаtiоn аbоut а рersоn оr individualuаl. All humnns have the power to see how people can cope with their consequences. The рrороsed sоlutiоn is tо develоr а wоrking рrоtоtyрe оf а system thаt will fasсilitаte сlаss соntrоl fоr BVСОEW leсturers in а сlаssrооm by deteсting fо them. The second part of the program will also be able to make face recognition compared to a smaller database. In recent years, research has been done, and vision and development programs have been developed. Some are used on social media, in banking apps, in government offices e.g. Metropolitan Police, Facebook etc. After that, the Classification algorithm was used within an application that created multiple human templates. So facial features have it been detected. After that, it saved a particular database with their unique ID. Furthermоre, the verifiсаtiоn рrосess hаs been stаrted by mаtсhing the temрlаtes inside the dаtаbаse. To please this, the student is then regarded as аutоmаtiсаlly. Findings: Submitted prematurely with vоiсe and biоmetriс teсhnоlоgy саn improve security time. Emрlоyee’s аttendаnсe саn is characterized by the modern pull of the potential disruption of рunсtuаlity. Students can be arrested and transported by the fasсe deteсtiоn. Well, it may be set to bnnks tо improve chastity by capturing аuthоrized рeорle оnly оr whо hаve ассоunts in thаt bank. Nоvelty / imрrоvements: Fоr acquires gender and sexuality, appropriate tactilenics distressed, and new sоme аррrоасhes fоr mаintаining security. We have removed the mоdels соmрlete with safety challenges in this рrоjeсt.

Thermal Insulating Powder Tester
Authors:- Mr. Aakash Ashtankar, Mr.Abhay Rakhade , Mr. Ankit Ghode, Mr. Rahul Katr, Mr. Rushab Kamble, Prof. Rahul. M. Dahekar

Abstract- Insulating Powder apparatus is designed to determine the thermal conductivity of insulating Powder. In this paper we will discuss about different powders testing its insulating properties. How different powders react in the insulating powder tester.

FEA of Existing Rocker Arm of Compression Garbage Truck
Authors:- Mr.Ashish R. Tale, Prof. A. S. Patil Prof. A. D. Diwate

Abstract- Experimental analysis of existing rocker arm is performed to determine stress and deformation. Later topology optimization is to be carried out for best optimized model leads to saving of material, cost as well as sustaining existing boundary condition. Manufacturing of new optimized model is compared with existing and analyzed in ANSYS software.
This project focuses on design optimization of Rocker arm targeting weight reduction with required strength and stiffness. Optimized design of arm is mandatory with appropriate material selection as well as valid finite element analysis. Optimization was performed considering static analysis of stress, strain and total deformation along with the suitable material selection. The experimental testing will be performed on universal testing machine. After making the comparative analysis result and conclusion was drawn.

Finite Element Analysis of Vehicle Seat
Authors:- Mr.Avadhoot D. Prabhu, Prof. A. S. Patil, Prof. A. D. Diwate

Abstract- Vehicle seat has great importance as it is the primary component of vehicle that provides comfort to the occupants. The seat should have proper strength and durability in case of accidents of when vehicle passes thru bumps. If seat structure breaks, severe injury can be occurred to the passengers. In present scenario fuel consumption of the vehicle should be minimum; hence there is a need to weight optimization of vehicle components without compromising the strength. To check these qualities of any physical components, Finite Element Analysis (FEA) is an imperative simulation tool. In this method CAD model of seat structure is prepared and developed FE model of complete seat assembly. Steel properties were used to model seat members. Passenger mass was distributed to the seat floor and seat back. As vehicle can have braking, cornering and bump event while passing on the roads, three load cases were simulated on seat and measured the stresses generated on seat members.

Vocal Extraction from Music Signal: Classification
Authors:- M. Tech. Scholar Anila R, Asst. Prof. Safoora O K

Abstract- Music signals contains atleast one vocal and instrumental music or can be pure music or can be pure instrumental music. Most of the researchers are doing their research on vocal signal separation from the mixed music signal. For this application the music which contain both vocal signal and instrumental music is taken. For this purpose first the feature is extracted from the music signal then the classification is done using SVM.

Implementing of Online Auction System
Authors:- Ms. Amrita Shirode, Akanksha Chavan, Sneha Bansoda, Vaibhavee Gadhave, Pranali Tatkar

Abstract- Online Auctions system is web application which will help the users to buy and sell the products. The system that holds the various products on a website and server sellers and bidders accordingly. And it is designed to allow users to set up their products for auctions and bidders to register and bid for different types of products that are available. This is a best method for buying and selling the products and services. And it helps the customers to buy and sell the products at reasonable price. There are some existing applications that allows users forbidding but the product is not available in your local area, you cannot do inspection of the product that you are going to buy. By online auction application user will be able to bid for product that is available in this local area.

Smart Attendence Monitoring System in College Smart Attendence Monitoring System in College Bus using RFIDBus using RFID
Authors:- K. Priyanka, S. Abirami, S. Kalivani, A. Kavitha, A. Meena

Abstract- On reviewing the past work of college bus tracking, monitoring and alerting system, there is a possibility to categorize various methodologies and identify new trends. One among them is a challenge for vehicle tracking, monitoring and alerting system. Now-a-days with the increase in the crime rate and accidents, Student often gets on the wrong buses and get off at the wrong stop. Bus drivers may be unable to identify all students and will not know in time if a student is missing. Parents have no way of knowing if there ward is safe until the evening when the returns there is no provision to monitor driving with in speed limit unscheduled deviation.. And it has the advantage of efficient tracking capabilities, low cost and easy maintenance. The RFID tags are effective and it is used for tracking and monitoring students. The bus unit is used to detect when a student enters/exits from the bus using RFID Card. This information is communicated to the parent unit and school unit that identify the presence of students. The system tracks the students by the IOT.

A Survey Paper on Full Stack Web Development
Authors:- Manish Bagal, Gaurav Kadam, Ajay Bandgar, Abhijit Salunkhe, Prof. R.M. Kedar

Abstract- The complexity of Web sites is increasing and transforming into Web applications that contain business logic, interactivity, transaction handling and states. This phenomenon forces the Web developers to adapt more traditional software engineering techniques to keep the Web applications error free, maintainable, reusable, well documented etc. Many Web developers do not use any engineering techniques at all and design mainly to create as fashionable applications as possible with no regards on the application’s functionality. This results in applications that are hard to maintain and with poor functionality. The purpose with this thesis was to see if the use of a more traditional software engineering technique, namely the Unified Modeling Language with the newly added Web Application Extension, resulted in a Web application with good design regarding the maintainability of the application. To investigate the maintainability of an application, the maintainability was further divided into three sub criteria: extensibility, reusability and documentation. These three criteria were then applied on a case study where a Web application was designed. From the analysis of the final design, using the three criteria, the maintainability was derived. This paper examines the four components of MEAN stack (Mongo DB, Express.js, Angular.js &Node.js) and how they go well together, their benefits as a complete stack in web development. This paper also describes the work flow and server architecture in detail to understand the working of these four technologies employed in the MEAN stack web development. This paper mainly focuses on roles of these four technologies in MEAN stack and how they are popularly implemented in present times.

A Review Paper on: Design of Reconfigurable Microstrip Antenna with Low Noise for Wi-Max Applications
Authors:- Ms. Rohini Pochhi (HOD), Ms. Sonal Tikale, Mr. Sandeep Thakre

Abstract- A compact, single feed, multi frequency style of reconfigurable microstrip antenna with varied slots are given during this paper. An oblong patch loaded with horizontal slots having extended slot arms constitutes the basic structure of the antenna. The standardization of the multi resonant frequencies is completed by variable the effective electrical length of the slots by loading varactor diodes across the slots. A size reduction of eighty four for the lower operative frequency is obtained in comparison to standard rectangular microstrip patch. planned antennas are helpful for multi-band wireless applications like GSM1800, IMT2000, WLAN etc operating over a good vary of bands. Measured and simulated results of come back loss, antenna gain and radiation patterns also are discussed.

A Review Paper on: Design of Reconfigurable Microstrip Antenna with Low Noise for Wi-Max Applications
Authors:- Ms. Rohini Pochhi (HOD), Ms. Sonal Tikale

Abstract- A compact, single feed, multi frequency style of reconfigurable microstrip antenna with varied slots are given during this paper. An oblong patch loaded with horizontal slots having extended slot arms constitutes the basic structure of the antenna. The standardization of the multi resonant frequencies is completed by variable the effective electrical length of the slots by loading varactor diodes across the slots. A size reduction of eighty four for the lower operative frequency is obtained in comparison to standard rectangular microstrip patch. planned antennas are helpful for multi-band wireless applications like GSM1800, IMT2000, WLAN etc operating over a good vary of bands. Measured and simulated results of come back loss, antenna gain and radiation patterns also are discussed.

A Review Paper on: Design of Reconfigurable Microstrip Antenna with Low Noise for Wi-Max Applications
Authors:- Ms. Rohini Pochhi (HOD), Ms. Sonal Tikale

Abstract- A compact, single feed, multi frequency style of reconfigurable microstrip antenna with varied slots are given during this paper. An oblong patch loaded with horizontal slots having extended slot arms constitutes the basic structure of the antenna. The standardization of the multi resonant frequencies is completed by variable the effective electrical length of the slots by loading varactor diodes across the slots. A size reduction of eighty four for the lower operative frequency is obtained in comparison to standard rectangular microstrip patch. planned antennas are helpful for multi-band wireless applications like GSM1800, IMT2000, WLAN etc operating over a good vary of bands. Measured and simulated results of come back loss, antenna gain and radiation patterns also are discussed.

Analysis Of Ber Performance Of Ofdm System Using Different Modulation Methods
Authors:- M.Tech. Scholar Shubham Srivastava, Associate Prof.Dr. Bharti Chourasia

Abstract- Now a days, demand for wireless systems are reliable and have a high spectral efficiency have increased because of the rapid expand of wireless digital communications. orthogonal frequency division multiplexing (ofdm) has been recognized for its good performance to achieve high data rates. ofdm and multiple input and multiple output (mimo) are two main techniques employed in 4th generation long term evolution (lte) networks. in ofdm, multiple carriers are used and it provide higher level of spectral efficiency as compared to frequency division multiplexing (fdm). in ofdm, because of loss of orthogonality between the subcarriers there is inter carrier interference (ici) and inter symbol interference (isi) and to overcome this problem, the use of cyclic prefixing (cp) is required. this uses 20% of available and width. but we are using the proposed method the bit error rate (ber) is improved and this may lead to higher accuracy rate.

A Comparative Study on Loan Eligibility
Authors:- Akash Dagar

Abstract- Nowadays, machine learning algorithms are used everywhere around us. In near future our lives would be eased out by using artificial intelligence. We all know checking if a person is eligible for loan or not is a very complex and time consuming process. And it’s a great source of income for banks. In recent years, many experts worked on loan approval prediction. Machine Learning algorithms play a very crucial role in prediction. In this paper four machine algorithms, Logistic Regression, Random Forest, Support Vector Machine, XGBoost are used for predicting if a person is eligible for a loan or not. On the basis of dataset used, we found that Logistic Regression provides better accuracy than other models.

Automatic Image Captioning With CNN and LSTM
Authors:- Biswarup Harh, Tejas Mahajan, Zulkif Khan, Prof. Gajanan Arsalwal

Abstract- PC Vision and Natural Language Processing in man-made consciousness is utilized for consequently portraying the substance of an image. To portray the image a very much framed English expressions is required. Naturally portraying image content is a lot of supportive to the outwardly debilitated individuals to comprehend the issue better. The paper is expected to recognize protests and advise individuals through text. It perceives image and converts to text utilizing LSTM. At first, the information image is changed over to a grayscale image that is handled through the Convolution Neural Network (CNN) to effectively distinguish the objects. Objects in the image are effectively recognized utilizing OpenCV, which is then changed over to text. The proposed technique for blind individuals is intended to expand to people with vision misfortune to accomplish their full potential.

Attenuation Coefficients of Gamma Rays in Some Natural Rocks
Authors:- A.Abbady, M. Motawea, S. Harb

Abstract- In this work, gamma-ray linear attenuation coefficients of phosphate and sandstone materialswere determined using an alternative method for determining gamma-ray linear attenuation coefficients. Different energies for gamma rays ( 22 Na 511, 1280 Kev) ( 137 Cs 662 Kev) ( 54 Mn 0.834.9 Kev) ( 65 Zn 1115.5 Kev) and ( 60 Co 1173, 1332 keV) had been used to ensure that the obtained experimental results are accurate; Moreover, the coefficients had been determined using the XCOM code and Radiological ToolboxUser’s Guide program. The XCOM code and Radiological Toolbox program had been utilized for gamma rays attenuation coefficients. The data show good correlation between experimentally and theoretically results. So, they can be applied as well as the empirical methods. The obtained results show that phosphate has effective shielding properties against gamma rays than sandstone.

Regenerative Braking System Using Buck-Booster
Authors:- Raj S. Mishra, Athang S. Ramadhin, Sharique A. L. Shaikh, Krishna K. Verma, Asst. Prof. Tejas K. Thakur

Abstract- In Automotive vehicles that are completely mechanical in nature, the braking system makes use of a vast surface to produce a rubbing action and converting all energy received into heat. The stopping power or capacity of brake can largely vary with the amount of frictional power generated. The objective is to capture this released energy byproduct, when brakes are applied and use it for electric power generation. With the help of conventional regenerative braking systems available in the markets, the above mentioned claim could be achieved. To enhance this system even more with an incorporation of DC to DC transfer (BOOST) module in the regenerative braking circuit we target to amplify the output generated even more which will be sufficient enough to recharge the battery at a much efficient rate resulting in less battery recharging times. The power can be further stored in capacitors for emergency electronic motor boost torque, providing immense acceleration at an instant to avoid accidents from rear or the sides making it a Safety feature.

Review of Fack News Analysis on Twitter Data Set
Authors:- M. Tech. Scholar Mamta Gehlot, Asst. Prof. Vasudha Sharma

Abstract- Today’s the modern era of the internet where people share the opinions, ideas of the people through such social media: microblogging sites, personal blog, reviews. various users review for a specific product, company, brand, individual, forums, company, brand and movies etc. sentiment analysis is a part of text mining where Analyzed, opinion of people and classified into tweets as good, bad, neutral. In this paper work data will be collected from twitter API and the sentiment of tweets and reviews published paper identified by searching particular keywords and then evaluate the polarity of tweets based on classified tweets as positive. Negative.After fed data into a supervised model for testing of new data sets. Machine learning techniques and tools are used. Machine learning classifiers such as Naive Bayes (NB), Maximum Entropy, Random Forest (RF), Support vector machine SVM classifiers are used for testing and training of the data sets and also evaluating the Polarity of sentiment of each tweet based on this analysis. Show that in result we get a performance of classifiers by evaluate parameters has highest accuracy. Using machine learning classifier RF, DTs, SVM and evaluate the accuracy of features and increasing the number of tweets. In the future work use of same methodology some more features can be added which are used for improving accuracy of prediction.

A Study on Consumer Perception with Reference to Flipkart
Authors:- Pawan Dadoria ,Ajitanshu Yadav , Ashish Teotia

Abstract- The importance of this study is to examine the customer perception towards Flipkart.com users in Greater Noida city. What people are thinking about flipkart company and what new and old generation people like most in Flipkart. com. Also tried to find out various attributes of Flipkart users of Greater Noida city towards the online shopping. For this study survey was conducted. The data will be collected from respondents through a scheduled containing question. The study result concluded that future in India especially in cities looking very bright. Flipkart.com offering best prices, good products and completely easy shopping experience for our customers. The success of any e-commerce company in India is depending upon its popularity, its branding image, its unique & fair policies, and its customer relationship etc. Design/ Methodology/ Approach– The study used a descriptive research methodology. A survey of 300 hundred college students in Greater Noida was conducted to describe and identify the perception of flipkart.com. Finding-The key result is that 83 percent of respondents provide cash on delivery, which influences respondents to buy online. The majority of respondents (54%) agree that detailed information about products in online shopping is essential. In Greater Noida, 75% of respondents are very happy with their online shopping experience on the flipkart.com website.

Weight Optimization of Vehicle Rim with Fatigue Tests
Authors:- M.E. Student Ashwini T. Vinchu, Asst. Prof D. S. Chaudhari

Abstract- Rims are now produced in Aluminum Alloy and Magnesium Alloy providing options to steel material which are heavy and difficult to produce due to complex styling. Also, rim should satisfy all the fatigue test criteria according to IS and ARAI standards. There are two important fatigue tests Radial fatigue test and Dynamic cornering fatigue test. In this paper we are studying optimization of Wheel rim with mass criteria and testing 2 different models and 2 materials on Fatigue tests with finite element analysis.

Review on “Design and Combustion of Pulsejet Engine”
Authors:- M. Tech. Scholar Ganesh Motekar, Prof. G.R. Kesheorey (Supervisor & HOD), Dr. A.J. Siddiqui (Executive Director)

Abstract- The pulsejet engines are of relatively simple design without any moving or rotating parts with low cost, easy to use but extremely high noise. The performance of pulsejet engine is significantly affected by design type, geometric parameters and combustion chamber volume. The current research studies the various researches conducted in improving the existing design of pulsejet engine using experimental and numerical techniques. The fuel type and fuel inlet configuration affecting the thrust generation and pressure is also studied by various researchers.

Identification of Potential Phytoremediation Behaviour of Arsenic and Cadmium Tolerant Plants in Contaminated Sites of Central India
Authors:-Ashish Kumar Bhui, Piyush Kant Pandey

Abstract-Arsenic and cadmium are of great environmental concern due to its extensive contamination and carcinogenic toxicity. There is a great need for reliable and cost-effective technologies capable of reducing arsenic contaminated sites to environmentally acceptable levels. Phytoremediation, a plant-based green technology, has been successfully used to remove contaminants from soils. After the discovery of an efficient arsenic-hyper accumulating plant in cold countries, the Brake fern (Nature, 409:579), efforts for discovering similar hyper accumulating species in areas having arid environment is in progress. In this effort four different plant samples found in wild, terrestrial and arid environment were harvested in Greenhouse in an arsenic- cadmium contaminated soil for 16 weeks and were analyzed for arsenic concentrations. In addition, some plants growing in naturally contaminated soils were also analyzed. Among these species Calotropis procera among other species was found to be a better arsenic and cadmium hyper accumulator, its efficiency being calculated in terms of their enrichment factor which for Calotropis procera was as high as 25.00 and 17. The highest arsenic concentrations the biomass of the plant growing in the arsenic-cadmium contaminated soil in the field was 14 ppm. This plant thus has a better potential to be used for Phyto remediating arsenic and cadmium contaminated sites.

Managing Changes Safely
Authors:- M. Tech. Scholar Ritesh Makwani, Nisha Kushwaha

Abstract- Change is the only permanent thing in this world” quoted by the Greek philosopher, Heraclitus, fits perfectly right for the industrial setting as well. In the current world of industrialization, the race to make any business successful leads to lot of dynamic conditions at workplace. Be it capacity enhancement of equipment and facility OR introduction of new aspect in technology & process to increase production quantity and quality, generates the need of Change. The Change is intended for good & useful purposes, however it has potential to add new hazards & risks and aggravate the existing ones. Disasters in the past have proved that if changes are not handled cautiously they can prove very costly. Lessons learnt from the past incidents and disasters have emphasized the need for Managing Change Safely. Management of Change (MOC) is one of the key aspect required to be complied as per many legal & regulatory requirements in several countries. This paper explores the requirements of the procedural details for Management of Change by deliberating on the various stages involved in handling Changes in an operating facility. Management of Change will typically comprise five key steps – Screen, Review, Approve, Implement, and Close. By implementing & maintaining a sound MOC Procedure, the industries, by managing hazards & risks, will make sure there are ZERO incidents, injuries & illnesses. Overall it means no suffering by injured/deceased and family, it also means no breach of laws & regulations, no penalties & compensations to be paid, no lost time, no business interruption and no financial losses.

Student’s Attendance Management System
Authors:- Nikita Shriname, Vaishali Pandhare, Prof. Palwe R.M

Abstract- Fingerprint verification is one of the most reliable personal identification methods is biometrics. With the rapid development of fingerprint verification, a number of its applications system etc. In this paper, a fingerprint Attendance management system is designed and implemented. This system based biometrics and serial port communication technique solve the problem of attendance and trouble of maintaining the register. It can make the user’s attendance more easily and effectively.

Fabrication of Automatic Pneumatic Braking System
Authors:- Avinash V. Khadye, Hardik A. Thakur, Akash S. Waghdhare, Abhishek K. Yadav, HOD. Wasim Khan

Abstract- Most of the accidents in four wheeled vehicles occur because of failure of braking systems. Manual method of applying brakes is always dangerous as it leads to accidents. Unconsciousness of driver, failure in the linkages of braking systems, road conditions, uncontrollable speed of the vehicle and manual operation of braking systems are the reasons of accidents. It is necessary to control brakes automatically through electronics devices to minimize the accident problems. In this project report we propose an effective methodology for automatic control of braking system to avoid accidents. In this technology we used Arduino, relays, IR transmitter and IR receiver for effective function of braking control system. This Braking system consists of IR transmitter and receiver circuit and the vehicle. The IR sensor is used to detect the obstacle. There is any obstacle in the path, the IR sensor senses the obstacle and giving the control signal to the Arduino Board which in turn sends signal to relay circuit and actuate solenoid which actuates the flow control system from the pneumatic circuit by actuates the pneumatic cylinder so as to stop the vehicle as programmed. This complete system can be fitted on to dashboard of a vehicle and effectively used for automatic control of braking system. The prototype has been prepared depicting the technology and tested as per the simulated conditions. In future the actual model may be developed depending on its feasibility.

Application Research on Smart Hospital Bed for Paralytic Patients
Authors:- Aayushma Jain

Abstract- The chosen idea is that of a Smart Hospital Bed for Paralytic Patients. I came across hospitals and NGO’s serving paralytic patients who have their whole or partial body disabled by the paralysis attack. These people in most cases are not able to convey their needs as they are neither able to speak properly nor do they convey through sign language due to loss in motor control by their brain. The focus of this project is to develop a software-hardware platform that addresses one of the costliest, acute health conditions of a paralytic patient. Caring for paralytic patient is extremely costly, increases the length of hospital stays and is very labor intensive. The proposed platform collects information from various sensors incorporated into the bed, analyzes the data to create a time-stamped, and commands the bed’s actuators to start ringing alarm whenever the patient shows a slight movement. These capabilities are combined to form a cognitive support system that augments the ability of a care giver, allowing them to provide better care to more patients in less time. For proof of concept, Ihave implemented algorithms and architectures that cover three key aspects of this platform: 1) data collection, 2) modeling & profiling, and 3) acting.

Rational Fire Revealing and Pictorial Guided Evacuation System Consuming Arduino and GSM
Authors:- Asst. Prof. Potaparthini Kiranmayee, Asst. Prof. Dubasi Kirtana, Asst. Prof. Chakali Swathi

Abstract-An example accomplished of distinguishing fire coincidence in actual time and as long as a pictorial management organization in circumstance of alternative in space Area is communicated in offered case. Project consumes binary parts hardware part and software part. The central and intellectual unit of the prototypical is arduino. “Hardware design comprises arduino, flame sensor, LEDs, liquid crystal display (LCD), buzzer, GSM. And software contains the programming of Arduino conferring to preparation of fire sensor and grounding of LED panels for supervisory emigration in case of fire”. The sensor units are associated via common data line to ATMEL MEGA328P AU1722 Arduino. A SIM 800C GSM kit based network module, accomplished of operational in normal. GSM Bands has been recycled to send alert communication. The scheme is working on overall determination published circuit board (PCB).

Fitness Club Management System
Authors:- Priyanka Sakhare, Prajkta Zanje, Palwe R.M.

Abstract- This Project “Fitness club Management system” is solution fitness centres to manage the customers in an easier and more convenient way.The administrator, is able to view all the members of fitness centre as well as their details. This project is a computer based program and it manages the gym members, the personal and the inventory. This system also maintains the client details,to provide the valuable reports regarding the progress of the gym member.

Productivity Improvement in Manufacturing Industry using Industrial Engineering Tools
Authors:- M. Tech. Scholar Pawan Nathani, HOD. Praveen Patidar

Abstract- This research study proposes an innovative analysis for controlling the defects in manufacturing industry. In this analysis, pipe bending process is concentrated. The component selected has often rejected due to flattening and crinkling of cross section of tube defects. Six Sigma, the zero defect approach, is used in this study. Define measure, analyse, improve and control (DMAIC) problem solving methodology is applied for problem analysis. Taguchi’s experimental design is used for process validation and improvement. The confirmation experiment showed that the rejection rate was reduced to 6.77 % from 21.66 % in case of flattening defect while rejection rate was reduced to 8.22 % from 16.77 % in case of crinkling defect. The application of Six Sigma program with Taguchi technique has developed an innovative cost effective methodology for controlling defects in less experimental time.

A Review on Defect Reduction in Manufacturing Process by Applying Six Sigma and Dmaic Problem Solving Methodology
Authors:- M. Tech. Scholar Pawan Nathani, HOD. Praveen Patidar

Abstract- In today’s competitive world, customer wants perfection and there is no room for error. Delighting the customer and new ways to exceed their expectations is requirement of today’s business world. Six sigma helps to achieve this goal. Six sigma is a highly disciplined process that helps us focus on developing and delivering near-perfect products and services. Six sigma helps us to reduce deviation in process and keep them within acceptance limit.

Android Based Furniture Shopping
Authors:- Mohini Bhosale, Varsha Pandit, Kulkarni D.P

Abstract- The furniture shopping system is an android application that allows clients to check out for different furniture available in the store and can even buy them on the online. The system gives a categories list of furniture results of various styles and models. Clients need to login into the system for browsing every item and would then be able to include them into their truck. Subsequent to choosing the items clients can make an anchor online installment by means of the credit card. In this manner, the online furniture shopping project brings a whole furniture shop on the web and makes it simple for both purchaser and dealer to make furniture deals.

Web Application for Rule Based Banking Chatbot
Authors:- Swathi. K, Arul Vijay Kumar. CH, A. P. S. B Vyshnav, A. Krishna Chaitanya, Manoj. K

Abstract- The banking industry is one of the most important sectors of Indian economy that has continuously increasing its activities due to the rise of population. Today banks have diversified their activities by offering various products and services such as credit cards, debit card, home loan, equity and general insurance.We all know we are running in tough times due to this pandemic situation,to support middle class families the reserve bank of india announced a three month loan moratorium on Indian public sector banks. So,we decided to develop a rule based banking chatbot web application to collect statistical data,scenarios and the reasons why the customers applied for loan moratorium and when will they get back to normal situation.The economical condition of the customer during this pandemic situation.do the customers looking other options to settle their loan or want to continue and the application stores all the feedback/responses provided by the customer.Our work concentrates to develop a chatbot web application that will help the customers understand the various options available to them during this tough time.

Crop Market
Authors:- Purval Bhoyar, Khushabu Potwar, Mansi Tiple, Pralay Ramteke, Payal Satpute, Asst. Prof. Nutan Sonwane

Abstract- There is lot of headache in crop selling and buying because farmer get very less prices of crop and these crop are very expensive for customer. In the current situation, farmers to direct consumer marketing is the most need of the country. As farmers are not getting high Compensation on the selling of agriculture commodities and customers are also not satisfied because they are paying high price than the original price of the product. This situation happens because of mediators. In this paper, we are trying to resolve various approaches regarding farmer to customer crop selling.

Arduino Based Solar Tracking Using LDR Sensor & Servo Motor
Authors:- Anshad M, Asst. Prof. Mrs. Asmin M K, Associate Prof. Ms. Shamna A

Abstract- The main objective of this seminar is to explain about solar tracking system which will keep the solar panels aligned with right facing the Sun in order to consume maximum solar power. The system tracks the maximum intensity of light from the sunlight . When the intensity of light is decreasing, this system automatically changes its direction to get maximum intensity of light. Light dependent resistors (LDR) have been used for sunlight detection and to capture the maximum light intensity. A servo motor is used to rotate the solar panel to the maximum light source sensing by the light dependent resistor (LDR) in order to increase the efficiency of the solar panel and generate the maximum energy. The system will be controlled by a servo motor and a microcontroller as a main processor. As a result of solar tracking system, solar panel will generate more power, voltage, current value and higher efficiency.

Mask Detection and Face Recognition System Using Tensor Flow, Keras and Mobile Net
Authors:- Samiksha Patankar, Vishakha Dubey, Raghav Bishnoi, Ritik Porwal, Ujjawal Tomar, Assistant Prof. Ronak Jain

Abstract- The deadly COVID-19 virus has become a very serious issue for each and every one in current time. To prevent being infected by the virus one can on his/her personal level can only wear mask to stay safe, keep social distancing and use sanitizers or wash hands. Keeping this pandemic situation in mind we proposed a project “Mask Detection and Face Recognition” which automatically detects face masks on human faces and note down the time and names of people recognized without face masks in excel sheet. The admin can then take actions accordingly on people recognized without face masks, like charging them with some penalty or simply instructing them to wear masks. This project can be implemented in a small organization or department where the face dataset is already available with the admin of that department or organization. By implementing this, the chances of people getting infected by virus reduces in the institution, as everyone will wear mask which are the personal protective equipment against virus. It is a project based on Machine Learning and Artificial Intelligence using OpenCV, Keras/Tensorflow, MobileNet and Deep Learning.

A Review Vision Guided Plant Leaf Disease Detection Using IOT
Authors:- Meghana B S, Roshani S P, Sindhu H M, Vidyashree, Asst. Prof. Gana K P

Abstract- In agribusiness exploration of programmed checking of diverse parameters along leaf illness recognition is imperative exam challenge as it is able to show blessings in controlling vast quarter of yields, and eventually this framework obviously identifies facet consequences of illness when they display up on plant clears out. The term leaf contamination is usually applied just for devastation of stay and sound takes to the air. This paper offers notion concerning estimation of various parameters of plant and investigation of leaf sickness discovery using image processing technique and machine learning algorithm i.e, SVM and sends the whole data over net by way of technique for time period IoT. Internet of factors (IoT) expects to stretch out internet to massive number of dispersed devices by means of characterizing preferred, interoperable correspondence conference. The real intention of internet of things (IoT) is to make a eager situation utilizing empowering advances, for instance, sensors, inserted gadgets, and correspondence conventions. For result purpose leaf of the plant is picked in positive framework growing any leaf is an awesome errand as the plant is provided to the assaults from distinct small-scale lifestyles bureaucracy, bacterial maladies and irritations. The facet effects of the attacks are usually identified via the leaves, stems or natural product exam. This is the motive leaf ailment location of plant is picked on this framework.

Survey Paper on Edge Computing
Authors:- Shashank Sharma, Anurag Punde, Nidhi Agrawal, Deepak Agrawal

Abstract- By utilizing cloud computing engineering and administrations to do concentrated calculation, particularly when Internet of Things (IoT) situations need to respond from experiences came about because of that calculation back to end gadgets, at that point we run into real restrictions of transfer speed blockage and the came about high dormancy. Edge Computing come to presence with various executions to steadily eliminate these hindrances on restrictions. A few approaches have been created in equal by various substances, similar to investigate gatherings, industry, administrators, and normalization associations. Haze registering, Multi-access (Versatile) Edge Computing, cloudlets, and so forth, are applicable models, remembered for the enormous class of Edge figuring. Their structures and advancements have numerous fundamental normal qualities, yet additionally contrasts in approach. A whiz question is raised – if any critical union will arise soon. This paper isn’t expected to be a finished study, however it endeavors to distinguish some intermingling architecture and some case studies related to edge computing.

A Hybrid MPPT Technique for Partially Shaded Photovoltaic Arrays
Authors:- M. Tech. Scholar Utsav Patil, Prof. R. M. Bhombe, Prof. Diksha Khare

Abstract- Photovoltaic panels are the most important green energy source because of their inexhaustible moreover its clean. It is important to connect the PV panels to the maximum power point tracking (MPPT) controller to optimize its output power. The PV panels output power efficiency is related to the rapidly variation of the incident irradiance moreover the partial shading pattern. The variation of the incident irradiance and the partial shading pattern makes the tracking of the global maximum peak (GMP) through the local ones too difficult, which extremely decrease the efficiency of the PV panels. The problem is the GMP value varies as the sun irradiance varies so; the detection of the GMP needs an efficient and fast algorithm which cannot be done by the traditional MPPT. In order to solve the problem, proposed system a hybrid new algorithm can combine a traditional MPPT algorithm, such as perturb and observe, or incremental conductance, with the ANN (artificial neural network) This new algorithm can combine a traditional MPPT algorithm, the proposed hybrid MPPT algorithm is based on the ANN and used to predict the global MPP region by estimating its voltage boundaries. Consequently, the conventional MPPT algorithm searches for the MPP in the predicted region. The proposed technique is modeled and simulated using MATLAB/Simulink.

Online Voting System
Authors:-Dr. Anupam Sharma (HOD), Yash Kumar Jain, Sudhanshu Gupta,Yash Jajoria, Kartikey Tyagi

Abstract- This paper deals with design, build and test an online voting system that facilitates user (the person who is eligible for voting), candidate (Candidate are the users who are going to stand in elections for their respective party), Election Commission Officer (Election Commission Officer who will verify whether registered user and candidates are authentic or not) to participate in online voting. This online voting system is highly secured, and its design is very simple, ease of use and also reliable. The proposed software is developed and tested to work on Ethernet and allows online voting. It also creates and manages voting and an election detail as all the users must login by voter id card number and password and click on his favourite candidates to register vote. This will increase the voting percentage in India. By applying high security, it will reduce false votes.

Modeling and Simulation of Gas Turbine Blade with Different Geometrical Perforated Holes
Authors:- Research Scholar Abhijeet Tiwari, Asst. Prof. Shamir Daniel, Asst. Prof. Nilesh Kumar Singh

Abstract- Gas turbine is a typical power generating device, although gas turbines are used for different purposes in presented work the model of the gas turbine used for the purpose of jet propulsion, aircraft and airplanes, is considered in addition the thermodynamic performance of the machinery is evaluated, to meet the requirement, some kind of arrangement need to being corporate for getting optimized power output. In the gas turbines the power is generated at a higher temperature and in large magnitude, the results of which it generates a lot of heat, so the cooling of turbine blade is very much required. To improve the cooling efficiency were quire more optimized and efficient cooling methods. We required some geometrical changes in the gas turbine blade as well as the changes in designs of turbine may be in the form of perforations. There are number of techniques employed for the purpose of cooling, it like increase the overall flow rate of the coolant around the gas turbine or providing the cooling holes in blade which may different size and shapes according to the gas turbine applications. For the purpose of cooling, the mediums required to flow continuously, either over the surface or under the surface for the optimum performance.In the present work we will see the effect of providing cooling holes on the turbine blade by improving its geometry using the CATIA modelling software and to analyse the different boundary conditions in the analysis ANSYS software. We will also optimize the material of the blade as well as we can also iterate the type of the coolant which is flow over the surface of the blade to improve its efficiency and to optimize the performance of the gas turbine. For three new nicke based alloys were taken namely Inconel 700, Nimonic 263 and MAR M247 and found that Inconel 700 proves to be the best among these materials. Secondly the blade geometry with cooling holes provides much more efficient results then simple blade geometry and it should be preferred.

Design and Performance Evaluation of 32-bit Floating Point Multiplier Using Vedic Multiplier
Authors:- Rajesh Deokate, Prof. N. M. Chore, Prof. M. N. Thakre

Abstract- Floating point multiplication is a common operation in advance Digital Signal Processing (DSP) applications. This paper explains a 32-bit binary Floating Point Multiplier (FPM) architecture using an Vedic multiplier. The proposed multiplier generates only the needed MSB bits of the product mantissa by making use of Divide and Conquer (D&C) algorithm with a modified Full Adder (F A) to increase the speed of multiplication. The pipeline architecture is also proposed to improve the performance of the multiplication in terms of reduced delay and power. The proposed FPM is compared with booth recoding based FPM and the various performance measures such as area, power and delay are analyzed.

E-Cycle Retailer App Based on Salesforce Platform
Authors:- Asst. Prof. Virupakshaiah H K, Gayathri R (Project Student)

Abstract- E- Cycle retailer App allows fictitious electric bicycles manufacture, manage their products and reseller orders using Salesforce platform. The need of the Electric-Cycle online retailer App is to simplify purchase E-cycle with complete requirements and to avoid the end user frustration and increase the productivity to the retailer. Product Explorer will provide the complete details of the E-cycle which is select by the customer by adding filters and the product is ordered by the reseller and the data is stored in reseller orders. These paper explain about the system provides complete solution to manage the time of cycle riding enthusiast to get a good and selected E-cycle through the reseller.

Vision Guided Plant Leaf Disease Detection Using IOT
Authors:- Meghana B S, Roshani S P, Sindhu H M, Vidyashree, Asst. Prof. Gana K P

Abstract- In agribusiness exploration of programmed checking of diverse parameters along leaf illness recognition is imperative exam challenge as it is able to show blessings in controlling vast quarter of yields, and eventually this framework obviously identifies facet consequences of illness when they display up on plant clears out. The term leaf contamination is usually applied just for devastation of stay and sound takes to the air. This paper offers notion concerning estimation of various parameters of plant and investigation of leaf sickness discovery using image processing technique and machine learning algorithm i.e, SVM and sends the whole data over net by way of technique for time period IoT. Internet of factors (IoT) expects to stretch out internet to massive number of dispersed devices by means of characterizing preferred, interoperable correspondence conference. The real intention of internet of things (IoT) is to make a eager situation utilizing empowering advances, for instance, sensors, inserted gadgets, and correspondence conventions. For result purpose leaf of the plant is picked in positive framework growing any leaf is an awesome errand as the plant is provided to the assaults from distinct small-scale lifestyles bureaucracy, bacterial maladies and irritations. The facet effects of the attacks are usually identified via the leaves, stems or natural product exam. This is the motive leaf ailment location of plant is picked on this framework.

Detection of Lung Cancer using Image Processing and Respiratory Monitoring System
Authors:- Mis. Rupali B. Dorkhande, Asst. Prof. Rahul Dhuture, Prof. Mrs. Rohini Pochhi

Abstract- As the oxygen saturation is very important in terms due to the pandemic. The role of pulse rate plays a major role to detect the symptoms of corona. Lung carcinoma the number of death reported day by day is increased. This type of sickness happened in human being. This is life threatening disease occurred globally. The detection of this infection at premature stage can be curable. Also the disease is affected due to bad eating habits, pollution, smoke, etc. are the main causes. CT scan, mri, X-ray and much more are used for recognition of this illness symptoms. The tissue grows abnormally in affected region. Image processing is the technique where we can find the detected region. Respiratory also plays very important role for sp02 sensor is proposed. The proposed system which works with the hardware and software gives result regarding normal and abnormality of patient.

Home Automation Using Gesture Control and RF Communication
Authors:- Shashank Sundar

Abstract- This general paper directs towards the concept of Home Automation. We will see a detailed concept of (1) Home automation concept; (2) use of wireless communication; (3) adapting gestures to machine language. Contrary to other projects, I aim to work towards gesture-based control of home automation systems. This research has the diversification to capture gestures and process them in real time to perform specified functions in a smart home. It can be said that this paper will be a great analysis to study what home automation is and the required components both hardware and software.

Space Vector Based Hybrid Random Pwm For Two Level Vsi Fed Induction Motor Drive
Authors:- Asst. Prof. Dr. Nayeemuddin.M, Asst. Prof. Dr. G.Venkata Subba Reddy, Asst. Prof. B. Amarnath Naidu

Abstract- A conventional PWM inverter fed Induction motor drive generates more harmonic content. The Random PWM (RPWM) techniques will reduce the harmonic content. In this paper a hybrid Random PWM technique is implemented and the simulation results will effectively proves the reduction of harmonic content compared to conventional SVPWM techniques.

Numerical Simulation of Truncated Aerospike Nozzle
Authors:- P.G Scholar Nagarajan P, Asst. Prof. Thiru.D.Kulandaivel

Abstract- Aerospike nozzles are being considered in the development of the Single Stage to Orbit launching vehicles because of their prominent features and altitude compensating characteristics. This paper presents the design of aerospike nozzles using characteristic method in conjunction with streamline function, and performance study through numerical simulation using commercial Computational Fluid Dynamics (CFD) code ANSYS FLUENT. For this purpose nozzles with truncation lengths of 10%,20%,30% 40%, 50% are choosen, because of the thermal and structural complications in the ideal aerospike nozzle. Simulation of the flow is carried out at three different altitude conditions representing Under-expansion, Ideal, and over- expansion conditions of the flow. Optimum percentage of the truncation is selected by the comparison of nozzles with different lengths of truncation under various altitude parameters. The results show that the flow pattern of the nozzles under different altitude conditions are almost similar. The truncated nozzle is found to give optimum performance and it has achieved the desired exit Mach number in all the three altitude conditions.

Critical Factors Influencing Construction Productivity in Vidarbha Region
Authors:- P.G. Student Ajit Ambekar, Asst. Prof. A. M. Ingle, Associate Prof. Syed Sabihuddin

Abstract- Literature review and factors recommended by experts were considered categorical factors. 40 factors classified into 5 groups were analyzed and classified taking into account the relative importance indicator. Questionnaires were distributed to the project manager, project engineer, architecture, etc. It was concluded that the final cost of the projects was higher than the estimated cost. It is recommended to develop human resources through appropriate and ongoing training programs that have a clear task, vision and planned approach to overcoming violations in the implementation of construction projects. It is expected that the factors discussed will help to successfully carry out construction projects.

Classification and Prediction of Diseases with Similar Symptoms
Authors:- Prof. Khaire R.B, Pankaj Suryawanshi, Abhijeet Kadtan, Jayesh Dayalani, Tejas Sonavane

Abstract- Beauty parlor management system is web based Beauty parlor management system application with appointment scheduling functionality. it connects clients, salons and stylists in online community allowing user to browse salon and styl ists and book or cancel appointments. User can also write and read reviews of salons and particular stylists. salons can specifysty lists that work at there salons, as well as services they offer. salon can also book appointment for customers, and can view and print schedules in convenient formats. . User can also write and reviews about the salon or stylist. This system helps both the customer and the salon. Customer can easily find best salon in their locality and can check the review of other customer of that salon online. It helps him to take decision of taking the services of a particular salon.

Classification and Prediction of Diseases with Similar Symptoms
Authors:- Dr. Archana Ajit Chaugule(Project Guide), Shrutika Sarawade, Priyanka Dhondage, Sapna Burud, Sonali Gulimi

Abstract- The field of medicine is found to have a lot of information but unable to implement that information.This is due to lack of tools to discover the hidden information and development in them. By applying the machine learning algorithms and techniques, valuable knowledge can be extracted from the health care system Malaria and Dengue have group of condition affecting the structure and functions of the body and has many root causes. We are using Deep Learning algorithm to increase the accuracy of Malaria and Dengue Disease Prediction System. It is implemented as desktop application in which user submits the heterogeneous data like text and image of blood cell symptoms. It results in hidden data from stored database and deep learning models are used to compare these user values with our trained model.

Website Development of Restaurant Management
Authors:- Prof. Jadhav A.K, Nupur Ligade, Renuka Savale, Malay Chitodkar, Rushikesh Salve

Abstract- The Restaurant Management website provide convince for the customer. The restaurant management system is there to help communication between all teams within a restaurant by minimizing the probability of human error and getting a more efficient and effective information. This System set up menu online and the customers easily places the order with a simple mouse click. By using the food menu online anyone can easily track the orders, maintain customer’s database and improve food delivery service.

Risk Management System for Stock Market
Authors:- Amey More, Tejas Warishe, Prof D.M.Bavkar, Abhay Mehta

Abstract- A sound risk management system is integral to an efficient clearing and settlement system. NSE introduced for the first time in India, risk containment measures that were common internationally but were absent from the Indian securities markets. Risk containment measures include capital adequacy requirements of members, monitoring of member performance and track record, stringent margin requirements, position limits based on capital, online monitoring of member positions and automatic disablement from trading when limits are breached, etc. Risk Management for Derivative products is managed with Standard Portfolio Analysis of Risk (SPAN)® is a highly sophisticated, value-at-risk methodology that calculates performance bond/margin requirements by analyzing the “what-if’s” of virtually any market scenario. SPAN ® is a registered trademark of the Chicago Mercantile Exchange, used herein under License. The Chicago Mercantile Exchange assumes no liability in connection with the use of SPAN by any person or entity.

A Review on Automated Attendance Management Systems
Authors:-Abhijith M.S, Christy Jojy

Abstract- Effective attendance management has become a major challenge in academic institutions as it is difficult to mark the attendance of the students especially when the class is very large and time is of great essence. Most of the Smart Attendance Systems keep the authentic record of every registered student and destroys the traditional tedious task that has been implemented. However, such systems still have issues that allow the research to increase multiple folds. This paper brings a literature survey on the related and currently existing works and also proposes a new idea on automated attendance management system using face recognition and RFID which handles the attendance process more precisely and efficiently.

Smart Multifunction Agriculture Robot Powered by Solar with Solar Tracking System
Authors:- Ankita Bhimgade, Prof. Hitesh Murkute, Prof. Yogesh Likhar, Prof. R. M. Bhombe (HOD)

Abstract- Smart multifunctional agriculture robot is designed to reduce efforts of the farmer. This robot perform various agriculture activities like ploughing, seed sowing, mud leveling and water spraying at a time. This robot is powered by solar so the cost of fuel will be reduced. This robot has solar tracking system which helps to use maximum solar energy from sun. This robot required less man power because it can operate using mobile Bluetooth by single person. This robot reduces overall cost for farming and increase productivity.

Virtual Voting System
Authors:- Asst. Prof. Gaurav Kumar, Divya Agarwal, Astha Tiwari, Smriti Gupta

Abstract- Indian voting system plays a vital role in Indian Democracy. The existing system is offline and has certain disadvantages. In recent years, the spread of covid-19, inefficient rural voters, people away from their birthplaces, paper waste affecting mother nature, the budget which could have been used for development, unseen frauds, wastage of human power, have been recorded and can be avoided by the virtual voting system.The main approach is to supply an easy and secure electoral system in India.

A Review on Automated Attendance Management Systems
Authors:- Abhijith M.S, Christy Jojy

Abstract- Effective attendance management has become a major challenge in academic institutions as it is difficult to mark the attendance of the students especially when the class is very large and time is of great essence. Most of the Smart Attendance Systems keep the authentic record of every registered student and destroys the traditional tedious task that has been implemented. However, such systems still have issues that allow the research to increase multiple folds. This paper brings a literature survey on the related and currently existing works and also proposes a new idea on automated attendance management system using face recognition and RFID which handles the attendance process more precisely and efficiently.

Election System using Block Chain Technology
Authors:- Mayur Chaudhari, Prof. Dinesh Patil (HOD)

Abstract- Voting is an integral part of any organization which helps organizations to take important decisions after taking a consensus from others and help implement any idea/decision in a procedural manner. This system is an online voting system based on blockchain technology. In view of the problems of malicious voting, data security, privacy leakage and so on in the current online voting system, the system can guarantee the fairness, openness, verifiability and non-tampering of voting data in the voting system by combining the decentrization of blockchain technology, the non-tampering of data and the anonymity of the voting system. Users can use the system to create voting projects, set voting time, register to vote and other operations, the system also provides the voting data traceability verifiable function, designed to build a more efficient and safe voting environment for users.

Building Cooling by Using Phase Change Materials for Human Comfort
Authors:- Prasad M. Sawant,Pruthviraj B. Patil, Rushikesh R. Patil,Shahidhusain R. Narwade, Abhishek A. Kurade, Mr. Avesahemad S.N. Husainy

Abstract- It is well acknowledged that technologies to achieve thermal comfort in buildings while cooling and heating demand are required. Thus, for the internal cooling and heating of building. One of the advanced technologies Thermal Energy Storage (TES) by using phase change material. The use of PCMs in building provides the potential for better indoor thermal comfort for resident due to the reduced indoor temperature fluctuations, and lower global energy consumption due to the load reduction/shifting. Building researcher need PCMs to better understand building temperature reaction features and the economic viability of utilizing PCMs, as well as to take additional steps to fully use PCMs to improve indoor environmental quality and overall building energy performance. This paper shares assessment TES in building using sensible, latent heat and thermochemical energy storage. Sustainable heating and cooling with TES in buildings can be achieved through passive system in building envelopes, Phase Change Material (PCM) in active system, sorption system, and seasonal storage.

Alcohol Detection and Vehicle Speed Controlling
Authors:- D. Shalini, R. Jhansi Bai, K. Pawan Kumar, I. Rajkumar, Asst. Prof. N. Aravind

Abstract- This is new approach towards automobiles safety and security to decrease the no of accident caused due to drunken drivers. by using a smart electronic system which monitors continuously the content of alcohol in air surrounding the body. Which makes the humans driving safer and to overcome accidents. This system implemented by us aims at reducing the road accidents in the future due to drunken drivers. Vehicle speed will be varied on the content of the alcohol detected. If the vehicle running at the high speed(100KMPH) medium speed (50-80KMPH) and low speed(40KMPH) which helps the driver to reach the destination safely. If the distance is between front vehicle the speed of the vehicle is reduced. In extreme situations the system disables the vehicle by switching of the ignition. The GPS captures the locations and sends the information to authorities with help of GSM. All the function in this project carried out by with help of ARDUINO UNO based on ATMEGA328P.

E-Commerce Portal: Grocery Delivery
Authors:- Asst. Prof. N.A. Ghodichor, Monali Vijay Ramteke, Yash Rameshwar Agrawal, Vipin Yadav, Vivek Shivprakash Raut, Suyash Shivshankar Ajbale, Mahadev Saren

Abstract- ShopWala is an E-commerce portal for purchasing groceries online. The main motive behind making such portal is to reduce the spread of covid-19 virus in the State. This E-commerce websites helps to control the mass gatherings at supermarkets , Using these websites, customers can buy goods or products online just by visiting the website and ordering the item online by making payments online. This E-commerce portal is open 24*7*365 so that customers can purchase the products any time according to their requirements. The proposed work will helps in building a website to buy, sell products or goods online using internet connection. The purchasing of goods online, user can choose different products based on categories, secure online payments, delivery services and hence covering the disadvantages of the existing system and making the buying easier and helping the vendors to reach wider market. In existing system of buying goods has several disadvantages. It requires lots of time to travel to the particular shop to buy the goods.

Production and Industrial Applications of Xylanase: A Review
Authors:- Deepanshi Tyagi, Dr. Divya Sharma

Abstract- The global population is increasing at a rapid rate, which results in high demand of life-supporting products. During the production of these life supporting products like textiles, paper and fibers etc. there is a generation of huge amounts of chemicals in the environment, which pollute the air. Therefore, industries around the world are looking for eco-friendly technologies for fulfilling the product demand without polluting environment and is economical to use. The use of enzymatic processes has been implanted in a broad range of industries in recent decades, because they are specific, fast in action, save raw materials, energy and chemicals as compared to conventional processes. In recent years, microbial enzymes have been used commercially in many industries such as pulp and paper, food, textile and feed industry. Xylanase was produced from different microorganisms such as fungi, bacteria. Xylanase enzyme has been utilised in getting enhanced sugar extraction from fruit juices, clarification of fruit juices and substantial dough-raising in bakery industries. This review is focusing on the properties of xylan, production of xylanase enzyme, mechanism of action and applications in different fields. So, the aim of this review here is to explore the applications of xylanase enzymes at different industrial levels.

Driver Drowsiness Detection System for Vehicles
Authors:- Aditya Chadde, Sunil Bhagat, Saurabh Chikankar, Prashik Kamble, Sankalp Moharle, Preetee Karmore, Nutan Sonwane

Abstract- The main reason for motor vehicular accidents is the driver drowsiness. This work shows a surveillance system developed to detect and alert the vehicle driver about the presence of drowsiness. It is used a smartphone like small computer with a mobile application using Android operating system to implement the Human Computer Interaction System. For the detection of drowsiness, the most relevant visual indicators that reflect the driver’s condition are the behavior of the eyes, the lateral and frontal assent of the head and the yawn. The system works adequately under natural lighting conditions and no matter the use of driver accessories like glasses, hearing aids or a cap. Due to a large number of traffic accidents when driver has fallen asleep this proposal was developed in order to prevent them by providing a non- invasive system, easy to use and without the necessity of purchasing specialized devices. The method gets 93.37% of drowsiness detections.

Design and Simulation of VTOL Stealth Bomber Controlled by Artificial Intelligence
Authors:- Shashank Sundar

Abstract- This project aims to design, engineer and test a new variant of vertical take-off and landing aircrafts. The implementation of a new design of VTOL engine and supporting machinery in a stealth bomber along with transfer of control from user to artificial intelligence using neural networks and AI processors. The project aims to close the gap between machine learning and aviation system along with providing a new strain of stealth aircrafts for modern combat operations. The use of SolidWorks to design the aircraft and Ansys simulation for the testing provided with valuable results that would prove successful in real time application and practice.

Zero Energy Building & Magnetic Levitation
Authors:- Khan Mujahid Ahmed Abdul Quddus, Shaikh Khalid Rabbani, Salmani Abdul Rehman, Shaikh Huzaifa Khurshid, Associate Prof. Avinash More, Asst. Prof. Suresh Suryavanshi

Abstract- Our aim of paper is to compile the information regarding research of magnetic levitation technology in civil engineering sector and to bring environmental sustainability by means of renewable energy sources. We are trying to introduce a new concept of magnetic levitation to make structure earthquake resistant. Levitation is a magnetic phenomenon resulted when two same poles are introduced to each other. Maglev or magnetic levitation is an innovative technology that can simultaneously guide, propel and suspend a train using the magnetic force between a guide way and the electromagnets in the train, similarly a powerful electromagnet creating large magnetic field which will be able to lift entire superstructure and act as substructure indirectly. In addition to this we are trying to make the premises eco-friendly by using renewable energy resources to meet the energy requirements of the structure. Zero-energy building is a building with zero net energy consumption meaning the total amount of energy used by the building on an annual basis is equal to the amount of renewable energy created on the site or in other definitions by renewable energy sources off site. We are using solar wind and hydro energy to make the structure environment friendly.

Recyclable Wastage Classifier
Authors:- Asst. Prof. Monica Batra, Mayank Gupta, Naman Jindal, Riya

Abstract- Detecting fault cable system proposes fault location model for underground power cable using microcontroller. Fault location models are to determine the distance of underground cable fault from base station in kilometers. This project uses the simple concept of ohm’s law. When any fault like short circuit occurs, voltage drop will vary depending on the length of fault in cable, since the current varies. A set of resistors are therefore used to represent the cable and a dc voltage is fed at one end and the fault is detected by detecting the change in voltage using a analog to voltage converter and a microcontroller is used to make the necessary calculations so that the fault distance is displayed on the LCD display.

Efficient Approach for Palm Line Extraction and Matching for Personal Authentication
Authors:- M.Tech. Scholar Awantika Belwanshi, Asst. Prof. Shailesh Khaparkar

Abstract- Palm print recognition has been reconnoitered over numerous years. During this instance of time, several different glitches related to palm print recognition have been addressed. Furthermost of the studies has been done in palmprint recognition due to its stability, reliability and exclusivity. Furthermore it has been used for law enforcement, civil applications and access control applications. Researchers have proposed a variety of palmprint preprocessing, feature extraction and matching approaches. This paper deliberates about the number of investigation works introduced to overcome the difficulties confronted in each stage of palm print verification. Our study on palm print recognition focuses on verifying the palm print in different types of schemes involved. In this thesis, we projected a novel framework to execute multi biometrics by broadly combining the left and right palmprint images. This framework integrated three kinds of scores generate from the left and right palmprint images to perform matching score-level fusion.

Android APP for Online Examination and Results Systems
Authors:- Ms.Sneha P. Mhaiskey, Mayuri R. Thombare, Ms. Nirasha M. Patle, Ms. Kiran S. Gujarkar, Prof. Abhay Rewatkar

Abstract- The Online Examination System is a software that allows any institute or sector to arrange, administer, and monitor examination via the internet. This is achievable under Internet/Local Area Network (LAN) conditions. It’s possible. Delays in result processing, arranging problems, and keeping records are some of the concerns that can arise during physical examination systems. It’s difficult to avoid bad record management and manual record searching. The system’s upkeep is also difficult, time-consuming, and exhausting. One of the most important aspects of an online education system is the online test. It is well organized, efficient, and saves a significant quantity of material resources. On the web, a testing system has evolved. The paper explains the system’s principle, shows the system’s primary functions, and explores the system’s security.

Review on Secured and Automated Healthcare System
Authors:- J Jenitta, Arun M, Balakrishna J, Sangeetha D, Vijay G

Abstract- Diseases are one of the biggest challenges for developing countries. Due to the growth in population, providing health-care services is becoming difficult day by day, especially in rural areas. The problem also lies in updating doctors of the monitoring parameters and the history of patients from time to time. The use of remote healthcare technology may reduce most of the management of chronic diseases, meanwhile it may also contribute to the improvement of people’s quality of life. Healthcare monitoring systems, by using low cost wireless sensors and existing Internet of things technology as a communication platform, alerts the doctors if a patient is in need of medical attention or hospitalization. The Internet of things is being applied in healthcare.The physiological parameters of the patients like Pulse rate , heart beat, body temperature, humidity are sent to doctors for monitoring and based on doctors advice the medicines will be automatically given to the patients who are away from doctors which is connected to a physician server or medical server through the internet. This paper gives a review about the various technologies used in remote health monitoring systems.

Modular Multilevel DC/DC Power Converter for High Voltage DC-Connected Wind Energy Applications
Authors:-M. Tech. Scholar Mohini Rangari, Prof. R. M. Bhombe, Prof. Yogesh Likhar

Abstract- In this project, a multilevel modular DC/DC conversion system based on the capacitor-clamped module is explained. This project explores the application of modular multi-level converters (MMC) as a means for harnessing the power from wind power plants. The MMC consists of a large number of simple voltage sourced converter (VSC) sub¬ modules that can be easily assembled into a converter for high-voltage and high power. DC/DC power conversion solutions are becoming more popular for fulfilling the growing challenges in the high voltage DC-connected wind power industry. Two types of the capacitor-clamped modules, the double-switch module and switchless module, are discussed. A soft-switching technique is adopted to achieve minimal switching losses and the maximum system efficiency. The inherent interleaving property of the proposed configurations effectively reduces the output voltage ripple without adding extra components. A cascaded hybrid topology is developed by the combination of double-switch and switchless modules. The proposed hybrid topology achieves higher efficiency and lower component count. This project is implemented by using Matlab / simulation.

Glance on Food Security, Food Safety and Sustainability in Agriculture and Livelihoods (Asia Region)
Authors:- Snehal P Hulikire, Gouri B Shinde, Riya V Patil, Mr. Avesahemad S N Husainy

Abstract- COVID-19 pandemic has substandard consequences across the world and has put on the spotlight the existing discrepancy in the security and sustainability within our food and agriculture system. So the COVID-19 crises has deeply increased already existing inequalities and created massive vulnerabilities in the livelihoods. Food is basic necessity and agriculture is backbone of economy in order to that food security is the most important and significant aspect of sustainable and progressive development and also agriculture field is able to provide livelihoods to people in Vulnerable and developing countries. Asia consists of some of the most food insecure countries in the world and it has drawn considerable affection to food movement .And it is generating crucial challenges between the rebalance of scarcity and availability. Because of this it is created large environmental hazards as there was tragic waste of food when many were going hungry. So the supply chain should be flexible enough to adjust the spike rate of demand and supply. The purpose of this review is to assess the impact of COVID-19 on food, agriculture and livelihood and improve the security and sustainability in it.

Online Healthcare System
Authors:- Ninad Verulkar, Sushil patil, Varsha Rahangdale, Komal Vaidya

Abstract- This paper implements an android based mobile app for online medicine shopping. This mobile app is developed to facilitate online medicine purchase by verifying the prescription uploaded by the user and to confirm the order. This system includes mobile application interfaces, pharmacist interface, database, web service provider for intermediate process to provide service through android mobile phone. When the user wants to make purchase through mobile app, necessary to upload the authorized prescription from a doctor and the prescription will be stored in the database. Then the user precedes the process by giving medicine name in the mobile application Whatapp interface. When the medicine is available in the pharmacy, the user allowed to add the medicine in the cart list, if the medicine is not available in the pharmacy, the mobile app will hold the process for the pharmacist response to post a suggestion and get confirmation for providing equivalent brand of medicine. The prescription uploaded by the user is compared with the cart list and will be approved by the pharmacist before placing the order. The domain of this system is android application. The n-gram technique is used in this system to speed up the searching process by the user typing medicine name in the user application interface. The drawback of existing system is online shopping or android apps are not user friendly. The proposed mobile app is user friendly by implementing the Bot Builder Framework for online medicine shopping.

A Carrier-based Discontinuous PWM Method with Varying Clamped Area for Vienna Rectifier
Authors:- Prof. Sonali Dhurvey, Jyoti Jiwtode, Sanika Nagarare, Ankita Bhurse, Manthan Bamnote, Alkesh Kadu, Ashish Madavi, Vishal Chalakh,

Abstract- Conventional single-phase Vienna rectifiers employ proportional- integral (PI) controllers which are appropriate for controlling DC components, to regulate their line currents. However, in the regions close to the line current’s zero-crossing point, the dynamics of PI controllers are too slow to respond to the reference current, which has an AC component. Hence, the power factor (PF) of the device is degenerated, and total harmonic distortion (THD) increases. A controller with a fast dynamic response is thus required to solve this problem. In this paper, we investigate the use of a model-based predictive controller (MPC), which has a faster dynamic response than a PI controller, to improve the line current quality of a single-phase Vienna rectifier.

Solar Based Dstatcom Using Srf and Irp Control Theory
Authors:- M. Tech. Scholar Adesh Dandi, Prof. R.M.Bhombe, Prof. Yogesh likhar

Abstract- In modern eras increasing in use nonlinear load or power electronics load to satisfied the need of todays industry such as adjustable speed drives, office accessories, Synchronous motor drive, Variable Frequency drive Energy efficient lighting etc . but such types of load is create harmonics in the system which flow from load to source and it will harmful to equipment connected to the system so there need to compensate such type of problems already there are various devices available to solve and eliminate such type of problem but every devices having some advantages and drawback. In proposed system use shunt connected based DSTATCOM. In this project, a three phase three wire Distribution Static Compensator (DSTATCOM) is proposed for power quality improvement. There are traditional methods available to Control DSTATCOM such as Single pulse width Modulation, SPWM, SVPWM. In proposed project result analyses by using SRF and IRP controller the result observed in MATLAB Simulink.

A Review on IOT Based Water Irrigation And Farm Protection using Arduino
Authors:- Ajay Prakash, Rahul Kumar, Prabhat Kumar Singh, Ankit Singh, Asst. Prof. Shahab Ahmed, Asst. Prof. Abhishek Jain

Abstract- This paper portray mechanized water system framework which is configuration to use for agribusiness harvests and checking the dirt condition through soil dampness locator. This framework depends on IOT (Internet of things) since it is minimal expense in market, with the goal that Rancher will be competent for it. The IOT (Internet of things) is associated with rancher’s cell phone and Arduino (microcontroller) through the remote organization with assistance of wi-fi module. This model is fundamentally plan for checking the dirt water and shielding the field of from the light radiated by AC loads and light pillar fall on LDR. IOT (Internet of things) give the data about rancher field and soil dampness. The utilization of IOT for crop water system interaction will lessen the works strength and cost. Which control the progression of water.To satisfy the prerequisite of food, agribusiness ranch , it need fix measure of water for water system. Subsequently there is a need of keen water system framework which checking and controlling the measure of water to the fields. The sensors are utilized in the framework are soil dampness indicator and LDR which record the ongoing valve of actual boundary and send the information to microcontroller which is shown on it just as remote sent. In this framework rancher don’t needed the actual presence on the field. The field and water system measure are controlled and observed through the telephone through the IOT (internet of things).

File Tracking System
Authors:- Akshat Joshi, Aman Khandelwal, Ansh Vijay, Devansh Kumar Rathore, Ms. Garima Sharma

Abstract- File Tracking Systems is software that facilitates the process of file movement and tracking within an organization. In government and public organizations, every official procedure is carried out by moving files. When a file is moved, an entry is made in the office diary for record keeping. Comments are added in file to indicate the action to be taken and then file is moved further if required. Sometime the process may take number of days and if entry in the diary is missing then it becomes hard to search the file. To overcome this problem we have developed a system with the help of QR Scanner to monitor all file movements of every employee through which the concerned person can get timely information about the whole process. The point of the whole system is to make processes simpler, efficient and accountable by eliminating every scope of corruption, incompetence and making the whole system transparent to the highest degree.

Natural language Text to SQL Queries using ML
Authors:- Raja Mishra, Nishant Singh, Prof. Bhagyashree Patle, Rutkar Verma, Rushikesh Tokmurke

Abstract- Our focus is cross-domain context-dependent text-to-SQL generation task. Adjacent natural language questions are often linguistically dependent and their corresponding SQL queries tend to overlap, by editing the previously predicted query we utilize the interaction history to improve the generation quality. we employ an utterance-table encoder to affect complex table structures in several domains and a tableware decoder to include the context of the user utterance and therefore the table schema. We evaluate our viewpoint on the SParC dataset and signify the advantage of editing compared with the state-of-the-art baselines. We present simple techniques to leverage the table content to unravel the text-to-SQL problem for the BERT-based model. Based on the observation that a number of the table content and table header match some word in the question string, we encode an addition feature vector for a deep model. During testing our methods are beneficial for model inference because the tables are more or less the same in testing and training time. We assess our model on the wikiSQL dataset and outperform the BERT-based baseline by 3.7% in execution accuracy and three .7% in logic form and acquire state-of-the-art.

Survey Paper on Edge Computing
Authors:- Shashank Sharma, Anurag Punde, Nidhi Agrawal, Deepak Agrawal

Abstract- By utilizing cloud computing engineering and administrations to do concentrated calculation, particularly when Internet of Things (IoT) situations need to respond from experiences came about because of that calculation back to end gadgets, at that point we run into real restrictions of transfer speed blockage and the came about high dormancy. Edge Computing come to presence with various executions to steadily eliminate these hindrances on restrictions. A few approaches have been created in equal by various substances, similar to investigate gatherings, industry, administrators, and normalization associations. Haze registering, Multi-access (Versatile) Edge Computing, cloudlets, and so forth, are applicable models, remembered for the enormous class of Edge figuring. Their structures and advancements have numerous fundamental normal qualities, yet additionally contrasts in approach. A whiz question is raised – if any critical union will arise soon. This paper isn’t expected to be a finished study, however it endeavors to distinguish some intermingling architecture and some case studies related to edge computing.

A Review: Screening of Cellulase Enzyme And Their Applications
Authors:- Shiv Kumar, Anshika Sharma, Dr. Divya Sharma

Abstract- Cellulose is one of the most common polymers in nature. It exists almost exclusively in cotton fibers, and is combined with other materials (such as lignin and hemicellulose, wood, leaves and plant stems) in textiles and detergents. Medium cellulose is a long chain polymer composed of self-repeating glucose units, a monosaccharide, connected by β-1,4-glycosidic bonds. Cellulase causes the hydrolysis of individual cellulose fibers in order to break them down into smaller sugar units and ultimately produce glucose molecules.The production conditions of cellulase and bacteria to produce cellulase are optimized through variable factors. Various production conditions, such as carbon source, nitrogen source, pH, temperature, incubation temperature and seed size. Here, we mentioned different types of microorganisms that can produce cellulase under optimal conditions. In today’s world, this makes them more popular because industrial enzymes play a wide-ranging role in the commercial market, and we need to focus on additional research on their manufacturing.These substrates are sold every year and are environmentally friendly. The above methods are very useful for the production of cellulase because they reduce the problem of handling such agricultural waste. These substrates are more efficiently consumed by potential strains such as microorganisms, plants, etc. to produce cellulase. In this review, we try to explore the most effective source of cellulase production, both in terms of performance and quality.

Devising Communication strategies for Retaining Employees
Authors:- Moheb Faltas, MS

Abstract- The research will reflect numerous reasons as to why the employees leave the organization by considering not just past observations but also the observations from the recent times. A massive amount of data is available which reflects on the reasons behind the lack of employees’ retention. As we are entering into the advanced era; retention has always been a key factor, which is rapidly growing and making it more challenging for the organizations to facilitate and retain their employees. Employees’ retention is one of the crucial challenging factors which the workplaces are being faced by, as quitting of just a single employee lasts a massive negative impact over the organization, causing it not just to lose a skilled employee but also to start a new recruitment process for that one position, which tends to incur massive cost for job advertisement etc. So, the organizations must have first-hand knowledge of the factors that contribute to retaining the talented and skilled employees and enabling the organizations to be cost effective by not undergoing frequent recruitment procedures.

Small Scale Lunar Rover for Geographical Research/Survey
Authors:- Asst. Prof. Ms. Tanvi Rastagi, Md. Aftab Qadri, Piyush Shukla

Abstract- This paper deals with designing, building, and testing the Small scale Lunar Rover for geographical research and survey. This Lunar Rover is designed as keeping the focus on the problems faced by the geographical researcher and surveyor. This Rover is designed with simple and easy-to-understand technical methods. This rover is very lightweight so it can be carried by a 10 years old child and can be maintained easily by having minimum knowledge of robotics. It can measure the temperature of the surrounding area, it works on a wireless network therefore it can be controlled from a specific distance. It also provides live video feedback through an open channel on the network. So the research can take live reading and measurements of the particular area. This rover also has a grappling feature that is very important in research as the researcher must want to have some sample of the researching area. Through this feature, it can bring back samples to the researcher.

Reduction of Spring Back For Stainless Steel Sheet under Various Lubrication Mediums/Survey
Authors:- Archana Yadav, Prof. Anil Kumar, Subhash Kumar

Abstract- The Spring back occurs due to elastic recovery after removal of load in sheet metal forming. In certain cases of bending, the final angle is smaller than the original die angle and it is called the negative spring back. Similarly the final angle may be more than the original die angle and it is called the positive spring back. In sheet metal forming, there are many factors that affect the spring back. These are punch velocity, punch shape, sheet thickness, anisotropy and friction conditions etc. In the present work, three factors viz. Punch velocity, anisotropy (orientation with the rolling direction) and friction between punch and die set have been considered at three levels. The combination of these factors that gives the minimum spring back is predicted in V-die bending of stainless steel sheet. The full factorial experiments have been performed and ANOVA has been carried out using Minitab 14. The results show that medium punch velocity and 〖45〗^0orientation to rolling direction along with use of machine oil give the least spring back.

To Design a Flyover for Katraj Chowk
Authors:- Mahesh Kadam, Rohit Jadhav, Jayant Marne, Shubham Bhati, Juee Athalye

Abstract- In this paper, we aim to analyze and design a T-girder bridge by using the theory of structure, bridge Engineering, and foundation engineering. Theories of foundation engineering for sub-structure and theories of bridge engineering and live loading recommended by IRC forms the base of our design. The knowledge of foundation engineering, Influence lines, and Theory of structures are essential for the analysis and design of this project. IRC and IS code guidelines were preferred for the design purpose. The superstructure (RC slab, T-beam girder and cross girder) and sub-structure (RCC abutment and pier) components have been designed using a working state of design method under class AA, 70R and class A loading as prescribed by IRC. The courbons method was used in analysis of the slab. The limit state method of design was used for the design of pier shafts. In this way with the help of supervision and available data & sources, we have designed this T-girder bridge.

High Quality of Gaussian and Salt & Pepper Noise Remove from MRI Image using Modified Median Filter
Authors:- M.Tech. Scholar Anamika Shukla, Prof. Pankaj Sharma

Abstract- Images are often corrupted by impulse noise in the procedures of image acquisition and transmission. in this paper, we propose an efficient denoising scheme and its vlsi architecture for the removal of random-valued impulse noise. to achieve the goal of low cost, low-complexity vlsi architecture is proposed. we employ a decision-tree-based impulse noise detector to detect the noisy pixels, and an edge-preserving filter to reconstruct the intensity values of noisy pixels. furthermore, an adaptive technology is used to enhance the effects of removal of impulse noise. in an advanced imaging technique magnetic resonance imaging (mri) plays a major role in medical field to create high standard images contained in the human brain. mri imaging is often used when treating brain, prostate cancers, ankle and foot. noise elimination is the main constraint in digital image processing and sometimes it is very difficult to find out the origin of the noise.

Validation & Analysis of Injection Moulding Processparameters for Plastic Industry
Authors:- M.Tech. Student Naveen Kumar, Prof. Dr. S. M. Husain

Abstract- In the early days manufacturers came to us for a specific thermoformed or injection molded part or parts for a product they were making. Over the years we noticed that, more and more, they were coming to us for entire subassemblies and more complex parts that might incorporate both thermoformed and injection molded parts.Based on that experience, and our knowledge of the pressures that manufacturers are under to increase efficiency and reduce cost, it became obvious to us that we needed to provide a wider array of services to help our customers increase their efficiencies, reduce their overall costs and maximize their ROI on each project, part or component. This vision has lead us to add assembly, decorating (in and post mold), reusable packaging, RFID and much more to our capabilities.We believe that Lower Overall Customer Cost comes from an innovative, total solution made up of customer focused, operational excellence. By combining quality production and secondary services with design expertise, supply chain management, and world class logistics WPS has been able to help our customers find new ways to lower their costs and improve profitability. Injection molding has been a challenging process for many manufacturers and researchers to produce products meeting requirements at the lowest cost. Faced with global competition in injection molding industry, using the trial and error approach to determine the process parameters for injection molding is no longer good enough. Factors that affect the quality of a molded part can be classified into four categories: part design, mold design, machine performance and processing conditions. The part and mold design are assumed as established and fixed. During production, quality characteristics may deviate due to drifting or shifting of processing conditions caused by machine wear, environmental change or operator fatigue.Determining optimal process parameter settings critically influences productivity, quality, and cost of production in the plastic injection molding (PIM) industry. Previously, production engineers used either trial-and-error method or Taguchi’s parameter design method to determine optimal process parameter settings for PIM. This paper aims to review the recent research in designing and determining process parameters of injection molding. A number of research works based on various approaches have been performed in the domain of the parameter setting for injection molding. These approaches, including mathematical models, Taguchi method, Artificial Neural Networks (ANN),Fuzzy logic, Case Based Reasoning (CBR), Genetic Algorithms (GA), Finite Element Method(FEM),Non Linear Modeling, Response Surface Methodology, Linear Regression Analysis ,Grey Rational Analysis and Principle Component Analysis (PCA) are described in this article. The strength and the weakness of individual approaches are discussed. It is then followed by conclusions and discussions of the potential research in determining process parameters for injection molding.

A Survey on Automatic Multiple Choice Questions Generation from Text
Authors:- Ms. Nikeeta Patil, Ms. Kratika Kumari, Mr. Devendra Ingale, Ms. Pranali Patil, Mr. A. R. Uttarkar

Abstract- NLP is an area of exploration where many researchers have presented their work and is still an area under exploration to achieve higher correctness. We are going to use NLP for an automatic question generation system. As in any education system, the examination is conducted to judge the caliber of the students. So to conduct the examination, the educator needs to generate the questions manually which is a very time-consuming process, so we have decided to develop a system through which automatically multiple-choice questions will be generated within some time and human efforts will be reduced. In this paper, we consider the Automatic Question Generation system that generates multiple-choice questions. To generate multiple-choice questions, the system uses various NLP techniques. This paper presents a review of work to generate questions automatically from the inputted text.

Automatic Multiple Choice Questions Generation from Text
Authors:- Ms. Pranali Patil, Ms. Nikeeta Patil, Ms. Kratika Kumari, Mr. Devendra Ingale, Asst. Prof. Mr. A. R. Uttarkar

Abstract- Assessments and Examinations are going through a huge insurgency. Colleges, universities, and other instructive establishments are progressively moving towards on the web assessments. The example of appraisal is significantly moving towards the target evaluation for example MCQ based, it is hard to build and requires a lot of time for setting various inquiries. There’s a developing requirement for a cost-effective and time-effective computerized MCQ generation framework. In this paper, the content is first summed up utilizing the BERT calculation, and appropriately sentence planning is accomplished for creating MCQs. To create decisions for the questions, distractors are created utilizing WordNet (A lexical data set for English). As the BERT calculation has much better execution over other inheritance strategies also as it can measure a lot of information in less time, it will upgrade the speed of producing MCQs from given content.

A Review on Enhancement of a Grid Connected Wind Farm using STATCOM and PID Controller Based Stability
Authors:- M. Tech. Scholar Shubham Saxena, Asst. Prof. Dheeraj Gupta

Abstract-The development of the modern power system has led to an increasing complexity in the study of power system, and also presents new challenges to power system stability, and in particular, to the aspects of transient stability. Transient stability control plays a significant role in ensuring the stable operation of power systems in the event of large disturbances and faults, and is thus a significant area of research. Flexible AC transmission system (FACTS) devices can be a solution to these problems. They are able to provide rapid active and reactive power compensations to power systems, and therefore can be used to provide voltage support and power flow control, better transient stability and improve power oscillation damping. Suitably located FACTS devices allow more efficient utilization of existing transmission networks. Among the FACTS family, the shunt FACTS devices such as the static synchronous compensator (STATCOM) has been widely used to provide smooth and rapid, steady state and transient voltage control at points in the network Maintaining voltage and frequency ride-through requirements is essential in providing adequate voltage support and dynamic reactive power compensation. Wind turbines have to sustain voltage sags during grid faults by increasing reactive power compensation. The low voltage ride through (LVRT) or faults ride-through (FRT) is defined as the ability of wind energy converters to remain connected during faults on power system . The matlab simulation outcome demonstrates the overall implementation of wind farm by using just capacitor bank and using STATCOM or using STATCOM along with PID controller. Comparison of result shows that STATCOM with PID controller offers better performance.

Touchless Sanitizer Dispenser
Authors:- Dr Y. B. Gurav, Tejas Giri, Nupur Karve, Ifrah Ansari, Atish Oswal

Abstract-A programmed hand sanitizer apportioning machine is mechanized, non-contact, liquor-based hand sanitizer gadget, which discovers it’s utilization in clinics, work places, workplaces, schools and significantly more. Liquor is essentially a dissolvable, and furthermore a generally excellent sanitizer when contrasted with fluid cleanser or strong cleanser, likewise it needn’t bother with water to wash off since it is unpredictable furthermore, disintegrates in a split second after application to hands. It is too demonstrated that a convergence of >70% liquor can execute Covid in hands. Here, we have used IR sensor detects the hand put close to it, the Arduino Uno is utilized as a microcontroller, which detects the distance and the outcome is the pump starts running out the hand sanitizer.

Steady State Thermal Analysis of IC Engine Piston Head Surface Using Ansys Workbench
Authors:- Azeem Khan, Asst. Prof. Amit Sharma

Abstract-The goal of this research is to optimize stress changes on the upper surface of the piston under real-world engine conditions. Thermal behaviour testing on the piston surface is carried out in this research. Gas pressure, temperature, and piston material functions are among the functions used for study. According to studies, the damaged or not damaged top surface of the piston is extremely costly to repair and is not usually accessible owing to temperature. Convex and capital ANSYS 14.0, created in Solid Work 2016, piston profile for piston form and FEM studies for improving the piston’s heat behaviour. The piston is made of aluminium alloy and grey iron cast material. Pressure is used in structural analysis to assess the piston’s pressure and displacement. We can evaluate whether or not our suggested piston is safe under the load conditions by following the study’s results. Thermal flux and thermal temperature distribution are calculated using temperatures on the piston surface an examination of the heat.

Analysis of Pre-Processing Techniques in Retinal Images
Authors:- Asst. Prof. S.Bharathi

Abstract- In this paper various preprocessing techniques that can be applied on retinal images to enhance the performance of segmentation is discussed. Vessel extraction is required to judge how badly the person is affected due to hypertension, diabeties etc.the retinal images can be obtained from drive, stare, chase through internet . green channel extraction, border removal, filtering, contrast enhancement, morphological operations were carried out on retinal images during preprocessing phase. Preprocessed image can be used to generate features which are classified using supervised or unsupervised techniques. The preprocessing is carried out in matlab 13 version.

Fake News Classifier using Machine Learning & Natural Language Processing
Authors:- Satyam Rawat, Taukir Qureshi, Kundan Tormal, Sanket Pol, Prof. Gitimayee Sahu

Abstract-This Project comes up with the applications of NLP (Natural Language Processing) techniques for detecting the ‘fake news’, that is, misleading news stories that comes from the non-reputable sources. Only by building a model based on a count vectorizer (using word tallies) or a Term Frequency Inverse Document Frequency (TFIDF) matrix, (word tallies relative to how often they’re used in other articles in your dataset) can only get you so far. But these models do not consider the important qualities like word ordering and context. It is very possible that two articles that are similar in their word count will be completely different in their meaning. The main objective is to detect the fake news, which is a classic text classification problem with a straight forward proposition. It is needed to build a model that can differentiate between ‘Real’ news and ‘Fake’ news. The preprocessing is carried out in matlab 13 version.

A Review on Mango Leaf Diseases Identification Using Convolution Neural Network
Authors:- Research Scholar Purnima Batra Continue reading

Published by:

Paid Journals For Publishing Research Paper

Uncategorized

International journals are controlled by a non-government organizations, private agencies, etc. These are a non-funded organizations, hence depend on publication fees or paper processing charges. So scholars who are searching paid journals for publishing research paper doesn’t mean that journal accepts low-quality paper just for money. Scholar / Researcher have to understand that journal has following set of expenses:

Submit Paper Now

Article Processing Charges

  1. Portal need a technical expert that maintains the server for site update throughout the year.
  2. Plagiarism software is paid with a monthly or yearly subscription.
  3. Some field reviewers take charge to review the paper.
  4. Paper formatting, digital certificates are manual operations, hence a dedicated staff needs to do such work.
  5. Some journal indexing sites provide impact factors on yearly basis with some charges.
  6. Print journals have to publish a proceeding of the published paper and submit to the ISSN organization for each new issue.
  7. Editorial board have members that always look journal paper quality, submit journal in good indexing and follow-up.

 

The above reasons help mentor to clear though that Paid Journals For Publishing Research Paper is also good, as many high index journals charge money to increase the review process. I suggest scholar to filter journal on the basis of the following points that are genuine and improve paper reach around the globe:

  1. Journal Indexing
  2. Journal age (Starting year minimum 5 years)
  3. Issue per year
  4. Article-processing charges
  5. Review time to get submitted paper status
  6. Publishing country (As transaction with some of the country is not allow from few nations)
  7. Research area journal accepts for paper publishing.
  8. Other scholars published paper quality matching your paper content.

I hope all above points help the young scholars to filer the journal on the basis of valid checkpoints not on the basis of paid or unpaid class. Finally, I conclude this article with a note that to run any organization or publishing house money is only medium to increase its quality, so journal charge in form of publication fees, paper processing fees, paper language improvement fees, paper formatting fees is not an unfair activity.

Published by:

IJSRET Volume 7 Issue 2, Mar-Apr-2021

Uncategorized

Strength Analysis by Utilization of Plastic PET Bottles In Concrete Material
Authors:-Priyanka Yadav, Mr. Anuj Verma

Abstract:-Plastic waste disposal in the environment is a big problem since it is impossible to biodegrade and has a broad footprint. Plastic recycling was practiced on a wide scale in India. Recycling from various sources accounts for up to 60% of industrial and urban plastic waste. Recently, plastic waste has been studied as a possible replacement for a portion of the current concrete aggregates. In this study, trials and measurements were carried out in order to evaluate the effectiveness of waste plastic reuse in concrete building. Waste plastic was used to partially replace sand in 0 percent, 1 percent, 2 percent, 3 percent, 4 percent, and 5 percent of concrete blends. The concrete cubes were tested at room temperature. Slumping and compression are needed for these measurements. This study ensures that reusing plastic waste as a substitute for fine concrete aggregates will result in lower material costs while still addressing the waste disposal problem.

A Review of Mechanical Properties of Fly Ash Based Geo-Polymer Concrete Used As Paver Blocks
Authors:-Awdhesh Kumar, Anuj Verma

Abstract:-The world is facing the challenges of climate changes due to the increase in CO2 emissions. Cement production is one of the biggest contributors to CO2 emissions due to combustion processes that require high temperatures. The new development in building construction showed that fly ash based Geopolymer concrete can be as structure materials to reduce or even eliminate ordinary Portland cement concrete. This paper presented the research results of fly ash based geopolymer concrete mechanical properties, like the compressive strength, flexural strength, and Elastic Modulus.Paver block is often used in alternative functions, such as those in street as well as other areas of building. So far, roof tiles and paving bricks are the only products to have been manufactured at the lab-scale. Future studies could focus on the investigation of other mechanical and durability properties of the optimum formulations, in order to find applications in the manufacturing of a variety of building materials.

A Review of Bamboo/Jute/PLA Biodegradable Composite
Authors:Subhash Kumar, Dr. Anil Kumar, Mr Amit Sharma

Abstract:-Biodegradable polymers can potentially be combined with natural fibers to produce biodegradable compositematerials. In this work, PLA (Polylactide) was used in combination with Jute fabric to generate bio-composite by compression molding technique. Various mechanical characterizations like tensile, flexural and impact properties of bio-composite were determined. The result from mechanical testing showed that use of Jute fabric with PLA, increases the tensile strength and tensile modulus, why the flexural modulus is reduced. Scanning electron microscopy (SEM) investigation also showed good bonding between the Jute fabric and PLA as there were no air voids. Water absorption results reported increase in weight of the bio-composite for 24 hrs conditioned time. The findings of this work create the scope of use of the Jute fiber/ fabric for making fully biodegradable composites for potential application as architectural interiors in building construction sector. The developed composites were also used as the replacement for mica sheets for the table top, chairs, door panels and many more.

A Review of Solar Energy Based Heat and Power Generation Systems
Authors:M. Tech. Pooja Vaishya, Prof. Barkha Khambra

Abstract:-The microgrid has shown to be a promising solution for the integration and management of intermittent renewable energy generation. This paper looks at critical issues surrounding microgrid control and protection. It proposes an integrated control and protection system with a hierarchical coordination control strategy consisting of a stand-alone operation mode, a grid-connected operation mode, and transitions between these two modes for a microgrid. To enhance the fault ride-through capability of the system, a comprehensive three-layer hierarchical protection system is also proposed, which fully adopts different protection schemes, such as relay protection, a hybrid energy storage system (HESS) regulation, and an emergency control. The effectiveness, feasibility, and practicality of the proposed systems are validated on a practical photovoltaic (PV) microgrid. This study is expected to provide some theoretical guidance and engineering construction experience for microgrids in general. The utilization of solar energy based technologies has attracted increased interest in recent times in order to satisfy the various energy demands of our society. This paper presents a thorough review of the open literature on solar energy based heat and power plants. In order to limit the scope of the review, only fully renewable plants with at least the production of electricity and heat/hot water for end use are considered. These include solar photovoltaic and solar thermal based plants with both concentrating and non-concentrating collectors in both solar-only and solar-hybrid configurations.

Disease Prediction System in New Normal
Authors:Sonal Shilimkar, Pratiksha Thosar, Prajakta Dharade, Ayushi Patel4, Asst. Prof. Varsha Pimprale

Abstract:-In this disease prediction system follows normal rules. The system is designed such that to provide a facility predicting disease from given reports. Report can be in the form of image (MRI, x-Ray, mammography, etc). Or in the form of input parameters like numerical value came with the result of reports. The system will take input from the user for a specific disease the system will follow image processing techniques to process and extract results from images. The result will be provided to a user. The system will also suggest nearby specialists for the detected disease.

Study on Concrete Properties under Acid Attacks
Authors:- Racharla Nageswara Rao, Asst. Prof. DMS Nageswara Rao

Abstract:-Acidic attack on concrete imparts unique set of injury mechanisms and manifestations compared to other durability problems with concrete. vitriol attack limits the service lifetime of concrete elements and, thus, leads to increased expenditures for the repair or in some cases replacement of the entire structure. To date, there’s lack of standardized tests for specifically evaluating the resistance of concrete to vitriol attack, which has caused great variability, for instance in terms of solution concentration, pH level/control, etc., among previous studies during this area. Accordingly, there are conflicting data about the role of key constituents of concrete (e.g. supplementary cementitious materials [SCMs]), and uncertainty about building codes’ stipulations for concrete exposed to vitriol. Hence, the primary objective of this thesis was to assess the behaviour of an equivalent concretes, prepared with single and blended binders, to incremental levels (mild, severe and really severe) of vitriol solutions over 36 weeks. The test variables included the sort of cement (general use [GU] or Portland limestone cement [PLC]) and SCMs (fly ash, silica fume and nano-silica). The severe (1%, pH of 1) and really severe aggression (2.5%, pH of 0.5) phases caused mass loss of all specimens, with the latter phase providing clear distinction among the performance of concrete mixtures. The results showed that the penetrability of concrete wasn’t a controlling factor, under severe and really severe damage by vitriol attack, whereas the chemical vulnerability of the binder was the dominant factor. Mixtures prepared from PLC performed better than that of counterparts made up of GU. While the quaternary mixtures comprising GU or PLC, fly ash, silica fume and nanosilica showed the very best mass losses after 36 weeks,binarymixturesincorporatingGUorPLCwith ash had rockbottom masslosses. Several studies reported that the improved chemical resistance of alkali-activated materials (AAMs) over concrete supported Portland cements. However, AAMs have technical limitations, which could deter its widespread use in cast-in place applications. These limitations include need for warmth curing, slow setting, and slow strength development, which could be mitigated by further improving the reactivity of AAMs during early-age with nanoparticles; however, this area remains largely unexplored. Hence, the second objective of this thesis was to develop innovative sorts of AAMs-based concrete [alkali activated ash (AAFA), alkali activated slag (AAS) and their blends incorporating nanosilica] and evaluate their resistance to 2 different vitriol exposures over 18 weeks for potential use in repair of concrete elements susceptible to acidic attack. While AAFA specimens, produced without heat curing, experienced rapid ingress of the acidic solution and a big reduction within the bond strength with substrate concrete, ash based AAMs comprising slag and or nanosilica (AAFA-S and AAFA-S-NS) had improved performance thanks to discounting the ingress of acidic solution and continued geopolymerization reactivity. Comparatively, specimens from the slag group exhibited high levels of swelling, internal cracking and mass loss thanks to chemical deterioration. The general results suggest that AAFA-S and AAFA-S-NS mixture, without heat curing, could also be a viable option for repair applications of concrete elements in acidic entrainments, but field trials are still needed to further verify their performance.

Experimental Study on Presence of Calcium Exchange Capacity on the Properties of Expansive Soils
Authors:- Sunkara Suresh, Asst. Prof. A. Sarath Babu

Abstract:- This research work presents the efficacy of salt and ash as an additive in improving the engineering properties of Black cotton soil which is expansive soil. Salt of 1%, 2% and three were mixed with black cotton soil utilized in the laboratory experiments. The ash percentages of 20% and 30% were used for compare the results obtained with salt percentages. The effectiveness of the salt and ash tested by conducting unconfined compressive strength and swelling pressure test. The unconfined compressive test has finished curing period of seven, 14, and 28 days to match the results with 0 days unconfined compressive strength. The soil samples were subjected to wet and dry cycles and observed that increase of unconfined compressive strength and reduction of swelling pressure. The results were obtained from salt mixes soil sample after wet and dry cycles has better strength, less swelling pressure and fewer swelling index.

Strength and Behavior of Concrete by Partial Replacement of Fine Aggregate with Recycled Plastic
Authors:- Nithisha Nalluri, Asst. Prof. A. Sarath Babu

Abstract:- Considering quick improvement of individuals in nations like India the discarding Solid waste is an immense issue in our bit by bit life. Distinctive waste materials are made from social event measures, association associations and normal strong squanders. The developing consideration about nature has enormously added to the worries related with ejection of the made squanders. Strong waste association is one of the critical typical worries on the planet. With the insufficiency of room for land filling and because of its always expanding cost, squander use has gotten an engaging decision instead of ejection. Among the waste material, plastic is the material that is the significant worry to by a wide margin the majority of the ordinary impacts. Examination is being done on the usage of waste plastic things in cement. The utilization of waste things in strong makes it prudent, yet besides helps in reducing removal issues. The movement of new improvement materials utilizing reused plastics is essential to both the unforeseen development and the plastic reusing adventures. Reuse of waste and reused plastic materials in solid blend as a characteristic neighborly improvement material has pulled considering specialists advancing occasions, and unlimited appraisals revealing the direct of cement containing waste and reused plastic materials have been scattered. This paper sums up an extensive survey on the evaluation articles on the utilization of reused plastics in strong dependent on whether they administered concrete containing plastic totals or plastic filaments. Moreover, the morphology of cement containing plastic materials is to clarify the impact of plastic totals and plastic filaments on the properties of cement. The properties of cements containing virgin plastic materials were additionally examined to build up their similitudes and contrasts with concrete containing reused plastics. Solid shape, chamber and segment were casted taking 0% to 40% of plastic as halfway substitution of fine total and pursued for 28days of compressive quality, flexural quality and split adaptability of cement.

Response of Shear Wall in Open Storey Building under Seismic Excitation
Authors:- Shaik Mohammed Imran, Asst. Prof. D.C. Anajaya Reddy

Abstract:- The Open Ground Storey buildings are very commonly found in India due to provision3 for considerably needed parking lot in urban areas. However, seismic performance of this sort of buildings is found to be consistently poor as demonstrated by the past earthquakes. A number of the literatures indicate that use of shear walls may enhance the performance of this type of buildings without obstructing the free movement of vehicles within the parking zone . This study is an effort during this direction to review the performance of Open Ground Storey buildings strengthened with shear walls during a bay or two. additionally thereto , the study considers a special scenarios of Open Ground storey buildings strengthened by applying various schemes of multiplication factors in line with the approach proposed by IS 1893 (2002) for the comparison purpose. Study shows that the shear walls significantly increases the bottom shear capacity of OGS buildings however the comparative cost is slightly on the upper side.

Analysis of Credit Card Fraud Detection in Data Mining using Various Classifier Techniques
Authors:- Research Scholar Sachin Jain, Professor Dr. Rohit Kumar Singhal

Abstract:-The data mining is the technique which can mine useful information from the rough data. The prediction analysis is the technique of data mining which can predict new things from the current data. The classifications techniques are generally applied for the prediction analysis. This research work is based on the prediction of the credit card fraud detection. The various techniques are proposed by the authors for the credit card fraud detection. The technique which is proposed the study in the different paper is based on the conventional neural networks in which system learns from the previous experiences and drive new values.

Analysis of Software Project Cost Estimation using Functional Point
Authors:-Research Scholar Sunil Kumar, Professor Dr. Rohit Kumar Singhal

Abstract:-Effort estimation has been used for planning and monitoring project resources. As software grew in size and complexity, it is very difficult to predict the development cost. There is no single technique, which is best for all situations. A careful comparison of the results of several approaches is necessary to produce realistic estimates. The use of workforce is measured as effort and defined as total time taken by development team members to perform a given task. It is usually expressed in units such as man-day, man -month, and man-year, which is a basis for estimating other values relevant for software projects, like cost or total time required to produce a software product.

Study and Analysis in HEART DISEASE ANALYSIS USING K-Nearest Neighbor Classifier
Authors:- Research Scholar Wasim Akaram, Professor Dr. Rohit Kumar Singhal

Abstract:- Data mining refers to analysis of complex data. The prediction is the process of determining what will happen next. Recently, various techniques have been applied for the prediction analysis. A SVM technique is applied to the prediction analysis. The technique divides data into training and testing stages. The first class of test data is for the most part related to the individuals who have little to no risk of having a heart disease . The second class of test data all have risk-of-heart-disease levels above 50%. This research work proposes to improve this existing method using decision tree classifier. The proposal would improve accuracy and reduce the execution time.

A Review on Design Considerations for a Bidirectional Dc/Dc Converter
Authors:- M.Tech. Scholar Alka Tanwar, Asst. Prof. Mithilesh Gautam

Abstract:- Recently the use of renewable energy resources has been increased to save the environment and remaining fossil fuel and the requirement of storing the energy is also increased. In many applications like electric vehicles the need of interfacing of energy storage with load and source is increased for a reliable and efficient system. Bidirectional dc to dc converter is the main device used to interface the Battery and super capacitor as a storage device to increase the system reliability A conventional buck-boost converter can management the power flow in one direction only but power can flow in both the direction in bidirectional converter. Bidirectional dc-dc converters are the device for the purpose of step-up or step-down the voltage level with the capability of flow power in either forward directions or in backward direction. Bidirectional dc-dc converters work as regulator of power flow of the DC bus voltage in both the direction. In the power generation by wind mills and solar power systems, output fluctuates because of the changing environment condition. the basic knowledge and classification of bidirectional dc to dc converters on the basis of galvanic isolation, the comparison between their voltage conversion ratio and output current ripple along with various topologies researched in recent years are presented in this paper. Finally, zero current and zero voltage soft switching schemes and phase shifted controlling techniques are also highlighted.

Classification of Brain tumour in MRI images using BWT and SVM classifier
Authors:- M.Tech. Scholar Nisha Tomar, Asst.Prof. Ashish Tiwari

Abstract:- The improvement in medical image dispensation is increasing in an incredible manner. The speed of increasing ailment by method of reverence to various types of cancer and other related human exertion pave the way for the increase in biomedical research. as a result giving elsewhere and analyzing these medical descriptions is of high significance for scientific diagnosis. This work focus on the stage effectual categorization of brain tumour descriptions and segmentation of exist illness images employing the planned mixture bright techniques. The challenge as well as objectives lying on design of mark extraction, characteristic collection in addition to image classification and segmentation for medical images are discuss The tentative results of intended method contain been appraise and validate for arrangement in addition to superiority examination on magnetic clatter brain images, based on accuracy, sensitivity, specificity, and dice comparison directory coefficient. The experimental marks achieved 91.73% accuracy, 91.76% specificity, and 98.452% sensitivity, demonstrating the efficiency of the proposed method for identify normal and nonstandard tissues from intelligence MR images.

Dynamic Brain Tumor Image Detection Using Median Filter and Genetic Algorithm
Authors:- M.Tech. Scholar Shivi Joshi, Prof. Shalini Sahay

Abstract:- Processing of MRI image for detection of disease in human body was done manually by heath specialist. But most of machine develops automation for the same, so researchers are working in this field to improve the accuracy of detection. This paper has proposed the brain tumor detection algorithm in MRI images. Due to the dynamic nature of tumor in any part of brain sculpture genetic algorithm was used for tumor detection. Proposed tumor detection model use Teacher Learning Based Optimization genetic algorithm which classify image pixel into two regions first was tumor and other was non tumor portion of brain. So no need of training for the detection of tumor from image is required. Use of median filter increase detection accuracy with gray scal image input in fitness function. Real image brain tumor dataset was taken for testing of algorithm. Result shows that proposed model has improve the precision, recall, f-measure evaluation parameters as compare to previous approaches.

Gesture Recognition for User Interaction
Authors:- Anshul Joshi, Harsh Gupta, Srija Nagabhyru

Abstract:- With the massive influx and advancement of technologies there is a scope for us to interact with our systems in the best possible way. One such technology would be Gesture based Human Computer Interaction. So our system makes use of HCI which would help us interact without touching the screen. It is a well known fact that two dimensional user interfaces are everywhere, but with the increasing popularity of Extended Reality (XR) we require a better, more sophisticated three dimensional user interface.

Prediction of Earthquake Magnitude Based on the Clusters in Sulawesi Island, Indonesia
Authors:-Fachrizal Fajrin Aksana*, Andi Azizaha, Enggar Dwi Prihastomob

Abstract:- In this paper, we present an earthquake magnitude prediction model based on similar earthquake locations. To classify the earthquakes that occurred in Sulawesi Island, we use the K-Means clustering method to group the earthquakes based on the longitude and latitude of the earthquake. Support Vector Regression and Random Forest Regressor are proposed model to predict the magnitude in each cluster based on the longitude, latitude, and depth of the earthquakes. The data of past earthquakes are obtained from the USA Geological Survey and Meteorology, Climatology and Geophysical Agency of the Republic of Indonesia (BMKG). The optimal number of clusters is determined by the elbow method is 3. The prediction results show that the most accurate prediction model is Random Forest Regressor when the clustering approach is used.

Emotion Recognition Using Face Detection
Authors:- Amit Badave, Shivani Oswal, Siddharth Atre, Prof. Shilpa Khedkar, Vivek Alhat, Prof. Bhagyashri More

Abstract:- Human-machine interaction is one of the most important aspects of computing. Automatic emotion recognition has been an active topic for research since the last decade. Analyzing unique patterns of human emotions will help machines to understand humans better. Face detection and emotion recognition can be used in several application areas. It can be used in real-time monitoring, security and in gaming applications. In recent years, deep learning has provided a whole fresh approach to understanding and process real-time data. It provides effective methods and algorithms to process images, audio, video, and metadata. In this paper, we propose a system that aims to classify human emotions in different categories such as happy, sad, neutral, disgust, ange and fear. It bases our paper upon the idea of using different techniques of machine learning such as neural networks, haar cascade, principal component analysis (PCA), and facial features extraction to classify human emotions.

Survey on Secure Transactions Using Facial Identification
Authors:- Assistant Professor A.Porselvi, M.E, Anusha S, Meena P, Nishitha K

Abstract:- The rise of technology brings into force many varieties of tools that draw a bead on a lot of client pleasure. There’s associate degree pressing would like for up security in banking region. During this survey, we tend to discuss banking transactions exploitation facial identification. This subject has relevance to facial idea exploitation bank dealing. The processed info passes through the information of banks and payment systems. If facial identity is matched then dealing can be finished. The event of such a system would serve to safeguard customers and money establishments alike from intruders and identity thieves. The combined biometric options approach is to serve the aim each the identification and authentication.

Use Cases of Blockchain with Big Data
Authors:- Ms. Pratima Keni

Abstract:- Big data means data which is stored in massive amount of storage. Big data is high- volume, high-velocity and high-variety of data which is cost effective and help us to take any decision. Block chain is nothing but data which is stored in block and connect that data with each other through the block. Most recent transaction data which is added to block. This is also known as peer in chain. Blockchain which is the trending technology in today’s world. In this research paper we are dealing with what are the advantages when big data and blockchain are two big technologies are come into the picture. Basic Introduction of this paper which is explains in Section I. Section II talks about what is big data. Section III tells about What are the issues of Big data analytics. Block chain basic information which is explain in Section IV. Use Cases of Big data with Blockchain which is explain in section V.

Haar Cascades On Face Mask Detection
Authors:- Chinmay Patil

Abstract:-Coronavirus disease 2019 has affected the world seriously. One major protection method for people is to wear masks in public areas. Furthermore, many public service providers require customers to use the service only if they wear masks correctly. However, there are only a few research studies about face mask detection based on image analysis. Object detection is an important feature of computer science. The benefits of object detection are however not limited to someone with a Doctor of Informatics. Instead, object detection is growing deeper and deeper into the common parts of the information society, lending a helping hand wherever needed. This paper will address one such possibility , namely the help of a Haar-cascade classifier.

Analysis of Major Cenrifugal Pumps Failures (With Application to Irrigation Pumps in Sudan)
Authors:- Mohamed Yagoub Adam, Hassan Khalifa Osman, M. I. Shukri

Abstract:-Centrifugal pumps are one of the most widely used pumps in the world, with a wide range of applications, from the petroleum industry to the transportation of irrigation water. Despite the extensive use of pumps, few component failures cause severe degradation of pump performance and increase downtime, which adversely affect production. Therefore, in order to minimize downtime and improve pump reliability and availability, these pumps must be carefully controlled, diagnosed, maintained or replaced before a catastrophic pump failure occurs. This study investigated the major faults found in centrifugal pumps, especially in Sudan’s irrigation pumps. In this study, we analyzed the problems faced by pump failures causing yield loss at the level of all privatization and parastatal pump schemes operating under government license, government pump stations in the four national government owner agricultural schemes (New Halfa, Rahad, Suki and Gezira & Managil), by using statistical methods. Results show that, at the technical level of the system, a probabilistic method based on the evolution of the pump state enables us to carry out preventive interventions; when the component reaches the degradation zone, it leads to an increase in periodic system intervention. For equipment, whose system schedule set in advance by the manufacturer cannot effectively meet the maintenance requirements; the mathematical model based on failure linearization can correct or even optimize the maintenance plan. Through our own investigation, we have concluded that it is necessary to change the structure of the maintenance cycle of the irrigation pumps under consideration. In this study, the feasibility of preventive maintenance based on reliability and conditional maintenance was verified. The results obtained are contributions to meet the reliability goals pursued by irrigation pumps.

Study of On-Line Monitoring Technology on the Transmission Line
Authors:- M.Tech.Scholar Manmay Banerjee, Asst. Prof.Sachin Kumar

Abstract:- This paper presents a ground-breaking thought of overhead T/L web based checking. Mainly premise of this paper is to secure the tons of exploration con-ducted by generation and distribution engineers & another serious T/L secure activity observing framework is working with effectively. Moreover, we are trying to utilize fake impartial organization for analysis models, to demonstrate the plausibility and adequacy for the serious T/L secure activity framework.

Blind – Sight: Object Detection with Voice Feedback
Authors:- A. Annapoorani, Nerosha Senthil Kumar, Dr. V. Vidhya

Abstract:- Computer vision deals with how computers can be made to gain high-level understanding from digital images or videos. It seeks to automate tasks that the human visual system can do. Humans glance at an image and instantly know what objects are in the image, where they are, and how they interact. An estimate of 285 million people is visually impaired worldwide, stated by WHO. The proposed Blind Sight-Object Detection with Voice Feedback is a computer vision-based application that leverages state of the art object detection techniques. These are employed to detect objects in the vicinity. You Only Look Once (YOLO): Unified, Real-Time Object Detection a new approach to object detection is deployed in this proposed work. YOLO has 75 Convolutional Neural Network (CNN). Image classification techniques are used to identify the features of the image and categorize them into their appropriate class. The COCO dataset used in this project consists of around 123,287 hand labelled images classified into 80 categories. This wide set of data is used to describe spatial relationships between objects and their location in the environment. In addition, an Indian currency recognition module is developed to identify the denominations. The text description of the recognised object will be sent to the Google Text-to-Speech API using the gTTS package. Voice feedback on the 1st frame of each second will be scheduled as an output to help the visually impaired hear what they cannot see.

Convolutional Neural Network Based Facial Expression Recognition
Authors:- M.Tech. Scholar Ramchandra Solanki, Asst. Prof. Vijay Yadav

Abstract:- We see the importance of facial expression recognition in different applications. To do such task the traditional feature extraction is used which involves in complex processing. Previously various deep neural networks have been used for this task; as well it can be replaced by some improved methods. So, in this paper we have proposed a system for face recognition which uses the convolutional neural network (CNN) along with the detection of the edges of image. The proposed workflows in two steps in the first the normalization of the facial expression in the image is done, secondly the convolution is done for the extraction of the edges in images. After this the maximum pooling method is used for the dimensionality reduction. At the end the classification of the facial expression is done and the Softmax classifier is used for this classification and the face expression is recognized. The facial expression recognition experiment is done on the Fer-2013 dataset. The results obtained from the proposed approach gets a face recognition rate up to 92.45% for the used dataset. The given method works with lesser number of iterations for the recognition and the system provides approx 1.5 times fast execution as compared to the SDSRN algorithm..

Review of Twitter Data Sentiment Analysis
Authors:- M. Tech. Scholar Nikita Akhand, Asst. Prof. Ms. Shivani Gupata

Abstract:- Everyday a huge amount of data has been
produced over various social sites. A huge number of users share and tweet regular updates on twitter. Tweet is a short way of expressing thoughts on any topic. So, the sentiment analysis of this data is must to keep track of the tweets. Sentiment analysis is the way to carry out text mining. To analyze this data produced over the twitter there are many methods that are used. Various experiments have been done to perform sentiment analysis of this data produced over twitter. There are different levels on which the sentiment analysis can be performed. So, in this paper we are providing a survey on the sentiment analysis of twitter data which uses the supervised and unsupervised learning algorithms.

A Review: Improvement of Link Permanency
Authors:- M. Tech. Scholar Bharti Chouhan, HOD Avinash Pal

Abstract:- Vehicular Ad hoc Networks (VANET) are highly mobile wireless ad hoc networks that provides communication between vehicles. As a promising technology it plays an important role in public safety communications and commercial applications. Due to the rapidly changing of topology and high-speed mobility of vehicle, routing of data in vanet becomes a challenging task. One of the critical issues of VANETs are frequent path disruptions caused by high-speed mobility of vehicle that leads to broken links which results in low throughput and high overhead. This paper argues with how to maintain the reliable link stability between the vehicles without any packet loss using two separate algorithms besides position, direction, velocity and digital mapping of roads. In this paper we propose a reliable position-based routing approach called Reliable Directional Greedy routing (RDGR) which is used to obtain the position, speed and direction of its neighboring nodes through GPS and as well as the well-known Ad-Hoc On-Demand Distance Vector (AODV) which includes vehicles position, direction, velocity with link stability. This approach incorporates potential score-based strategy, which calculates link stability between neighbor nodes for reliable data transfer in this paper we use both RDGR and AODV approach in order to provide reliable link stability and efficient packet delivery ratio even in high-speed mobility and changing of topology.

News Classification System Based on Area
Authors:- Prof. Krishnanjali Shinde, Prachi Prajapati, Sakshi Tagalpallewar, Ruchita Bacchuwar

Abstract:- – In 21st century the internet is filled with loads of news articles, there is a pressing need to classify news according to the requirements of an individual. People are generally more interested what is going on, in their immediate surroundings. News has a vital role in the society. Most people read news every day to keep up with the latest information and trends. The information could be anything, from technology, disaster, politics, even the affair of the celebrities. After they absorb the information and understand it, it will be used by the people as a reference to their ideology and decision making. With the help of technology advancements, news disseminates relatively quick across the globe. Using the internet, people can send information from another side of the world in under a second. Because of this, almost any kind of information such as knowledge, idea, entertainment, and news from the people can easily spread to the community. With the development of the web, and ton of internet sites that provide similar information and data. So, users often discover it hard todecide that of those websites will offer thespecified information inside the foremost valuable and effective way.

Behaviour of Combined Piled Raft Foundation in Clayey Soil
Authors:- S. Lakshmi Prabha

Abstract:- In situations where a raft foundation alone does not satisfy the design requirements, it may be possible to enhance the performance of the raft by addition of piles, the use of a limited number of piles, strategically located, may improve both the ultimate load capacity and the settlement and the differential settlement performance of raft. This paper discusses the philosophy of using piles as settlement reducers and considering interaction effects. In this method the raft is considered as a plate supported by a group of piles. To verify the reliability of the proposed method, a 5 storied RCC structure is analysed in SAP 2000, considering the guidelines given in chapter 56 of ICE manual of geotechnical engineering (volumeII) and Theoretical manual for pile foundation by US Army corps of Engineers (ERDC/ITL TR-00-5).

Optimize Piston Durability by Coating Layer of Tungsten Carbide
Authors:- Student of M.Tech. Nitesh Kumar, Gouraw Beohar(HOD), Assistant Professor Anshul Jain

Abstract:- This coating enhance piston durability on layer of 0.20 to 0.25µm which explore that after all testing on Coated piston minimum coating thickness which has been coated will be 0.20 µm whereas maximum thickness of coating which has been coated on piston will be 0.25 µm . There are various result which shows that these layer are efficient during long run .These layer also having less absorption capacity of heat results in maximum heat energy transform into work due to this exhaust will be less. The most expensive way to reduce fuel consumption is to develop more efficient fire engines. Today, about 40-45% of gasoline is converted into useful energy, while the remaining thermal energy is converted into heat. One of the possible solutions of decreasing heat losses from the engine is by insulation of piston coated with Tungsten carbide; all possible measures of improvements are in the scope of interest. Therefore this master thesis was carried out. The theoretical study was focused on about appropriate materials, industrial applications and the state of the art research in the area of coating. Sample prototypes and material samples were coated using a thickness of 0.5 µm to 0.25 µm and coated with Tungsten Carbide powder coating. Heat flux, Shear stress, Elastic strain, and total deformation are measured for each coating. The integrated pistons have been tested in a single cylinder engine, to ensure the strength of the thermal barrier. Due to the negative impact on piston the combustion process and the overall efficiency of piston, were obtain .A trend showing a decrease in heat loss with an increase in the coating of the layer was observed. During both load and thermal cycling tests of different thickness of Tungsten Carbide powder coating such as 0.05 µm, 0.1 µm, 0.15 µm, 0.20 µm, 0.25 µm, and 0.3µm. The temperature and stress field of piston are resolved using ANSYS (Version 18) software. The optimum result obtained to acquire minimum heat loss during combustion and obtained no deformation during high heat in general 150 cc Aluminum alloy piston, the best result obtained on coating piston with 0.25 µm with Tungsten Carbide powder coating.

Acoustic Steam Leak Detection System
Authors:- R. Saravanan M.E.,Ap/Eee, R. Balambika , R.Chelvadharani , A. Divyadharshin

Abstract:- The boiler tube failure is occurring frequently in thermal power plants. Boiler tube leakage is the significant reason for blackout of units and age misfortune in warm influence plants. Location of boiler tube leakage is a significant factor for power plant working as roughly 60% of boiler outages are because of tube leaks. Power plant engineers must cautious about boiler tube puncher so that further damages to pressure parts such as water wall tubes and headers, super heater tubes, re-heater tubes, and furnace refractory may be avoided. Boiler tube leaks have even been known to prompt to bending damage and deformation of the entire boiler. The costs of repair, substitution, and maintenance due to secondary damage can be maximum. There are several solutions are available to identify the boiler tube leakages such that analyzing the make-up water, survey of tube thickness and fitting sensors inside the boiler. The compact solution is fitting sensors inside the boiler. Here, we are using piezoelectric sensor to detect the tube leakages. There are two types of sensors available which are airborne sensor and structure borne sensor. Airborne contains a genuine microphone, which is totally insensitive to vibration. Structure borne is Piezo- electric based sensors can measure sound generated by a leak in the boiler structure by either acoustic frequencies or ultrasonic frequencies. The airborne sensor is used in acoustic steam leak detection system. The Acoustic Steam Leak Detection (ASLD) system works on the principle of detecting the sound waves emanating from the steam leak, processing the same and then indicating the quantum of steam leak and the location. When a leak is detected by a change in the sound patterns, alarms are activated and the fault is localized. By using these methods the leak is detected and the many secondary damages were avoided.

Design and Deflection Analysis of Deck Slab
Authors:- Kapil Mohaliya, Sourabh Dashore (HOD)

Abstract:- Steel-Free Deck Composite Bridges system has been investigated during the past two decades. The concept is totally new and innovative. The new structural system enables the construction of a concrete deck that is totally devoid of all internal steel reinforcement. Traditionally, reinforced concrete bridge decks are designed to sustain loads in flexure. The new innovative bridges with steel-free decks develop internal compressive forces “internal arching” which leads to failure by punching shear at substantially higher loads than the flexural design load. Five composite bridges have been recently constructed in Canada adopting this new concept.

CFD Analysis of Tubular Heat Exchanger with Ribbed Twisted Tapes for Heat Exchanger Enhancement
Authors:- M.Tech. Scholar Vinita Kapse, Prof. Sharvan Vishwakarma

Abstract:- A heat exchanger is really a system that transfers heat between two or more fluids. The fluids can also be single-phase or two-phase, so they can be isolated or in close contact, depending on the form of exchanger. In this study, two twisted ribbons are inserted into another heat exchanger tube and heat transfer is studied. The aim of both the ongoing project is to figure out how fast heat transfers in a circular tube with entangled ribbons. The Reynolds (Re) number as well as the geometry of tube is the parameters of concern. For the first case, diameter of tube is taken 50.8 mm and length 1000 mm. For the second case the diameter is increased and length is kept constant, diameter is constant and length is increased for third case, and for fourth cases both length and diameter is increased. It is found that with the increase in both length and diameter of tubes, the heat transfer is increasing, pressure drop is decreasing by 56%, Nusselt number (Nu) is decreasing by 72% and the thermal enhancement factor is increasing by 12%. It can be concluded that the increase in diameter results in decrease in heat transfer while increase in length is preferable for increase in heat transfer rate. Hence, among the selected four designs, the fourth case with diameter=80mm, and length=3000 mm is the most preferable one.

An Iot Based Modern Street Light System for Energy Efficient and Energy Auditing with Fault Identification System
Authors:- Asst. Prof. R. Rubanraja, M. Kanimozhi, M. Mahalakshmi, K. Mounika, V. Suruthipriya

Abstract:- Today’s modern world people preferred to live the sophisticated life with all facilities. The science and technological developments are growing rapidly to meet the above requirements. With advanced innovations, Internet of Things (IoT) plays a major role to automate different areas like health monitoring, traffic management, agricultural irrigation, street lights, class rooms, etc., Currently we use manual system to operate the street lights, this leads to the enormous energy waste in all over the world and it should be changed. In this survey we studied about, how IoT is used to develop the street lights in the smart way for our modern era. It is an important fact to solvethe energy crises and also to develop the street lights to the entire world. In addition, with the study on Smart Street lighting systems we analysed and described different sensors and components which are used in Iot environment. All the components of this survey are frequently used and very modest but effective to make the unswerving intelligence systems.

A Model for Sentimental Analysis of Twitter Data in Hindi Polarity: A Study
Authors:- Suraj Prasad Keshri1, Neelam Sahu2

Abstract:- This research explores real-time feelings of analysis. Twitter / WhatsApp posts are based in Hindi, with a sense of classification on a three-way scale, negative, positive and natural. The efficiency of various methods such as speech (POS) tagging and part of the stop word extract are compared and WordNet is proposed to improve the Hindi Sentimental Word. The current work of analysis on sentiment has been done in mining. There are resource-rich languages such as English; while data in Indian languages is still relatively low web content in languages like Hindi has grown rapidly over the past few years. In addition, as the length of social media increases, WhatsApp has become a hotbed of user content on platforms such as Twitter and Facebook SA of tweets made in English. There is not an analysis of similar data in Hindi. In this paper, we perform real-time SA on a live stream of Hindi tweets. Twitter social media application is a popular site Forum to share opinions of millions of people there are users on a variety of topics. The Analysis and opinion mining websites are rich sources of data for sentiment. A Twitter user can often use hash tags, then the same tag is used to group similar posts. A group of people can become a hash tag trend Attract a special discussion to as many people as possible to participate in it.

Privacy-Preserving Zero Knowledge Scheme for Attribute-based Matchmaking
Authors:- Solomon Sarpong

Abstract:- Making friends with common attributes is a characteristic of some persons. This characteristic is also extended to matchmaking on social networks. In some of the existing matchmaking protocols, the users are match-paired without considering the number of attributes they have in common. Furthermore, the bane of the existing proposed matchmaking protocols has been how to preserve the users’ privacy and this has been considered as the key security issue for such applications. In order to prevent malicious users from gaining extra information, the attributes in this protocol will be certified. Hence, certification authority ensures that, a user actually possesses the input attributes and binds them to him/her. With the use of certified sets and zero knowledge proofs, users can adequately find a matching-pair whilst keeping his/her input set private. Furthermore, in this proposed protocol, a person can find a best match among potential candidates by finding the one who has the maximum number of common attributes. At the end of the protocol, the match-pair can exchange their attributes without any other person knowing the number or the type of attributes they have in common.

Structural Investigation of Agricultural UAV
Authors:- E.Akshaya Chandar, Adesh Phalphale, Sourav Ghosh, Sanket Desai

Abstract:- UAV Technology has improved exponentially in the last few cycles, and we can discuss its importance as new resolutions to all challenging queries that include managed services on a unique land that a computer can make floating above it. It covers UAV that produces agricultural projects like spraying, an examination of products for vast hectare fields. Structural analysis is the purpose of the consequences of pressures on concrete buildings and their elements. The structural analysis applies applied mechanics, materials science, and applied mathematics to measure a structure’s deformations, internal forces, stresses, support reactions, accelerations, and stability. The analysis results verify a structure’s fitness for use, often precluding physical tests. This report presents the results of structural analysis of the Agricultural Unmanned Aerial Vehicle in compliance with the requirements of DGCA. The analysis includes the Strength of Materials approach to determine loads (Shear Force and Bending Moments) which is utilized for further analysis using the Finite Element Analysis (FEA) approach. Commercial FEA software ANSYS is used for this purpose. The static structural analyses of the UAV are performed under different load conditions. The consequences of these researches show that the planned construction is safe within the flight envelope. This paper lays the structural analysis framework, which could as a source for additional temporary separation. The products can be increased additional to effective reports like Crash Test, sloshing examination of Fuel tanks, Etc. to mimic real-time events. This paper is required to showcase the structure’s authenticity (hypothetical load circumstances compelling) for certification determinations and vibration endorsement from DGCA.

Enhancing Air Pollution Predicton Using Artificial Neural Network with XG Boost Algorithm
Authors:- Assistant Professor Christina Rini R, Aishwarya N, Meenakshi G, Saranya M

Abstract:- Air pollution has become a major public health concern in recent years. Despite substantial improvements in overall air quality in recent years, India remains the third most polluted country according to the latest edition of the World Air Quality Report [1]. The release of gases into the air that are harmful to human health and the environment is referred to as air pollution. Lung cancer, cardiovascular disease, respiratory disease, and metabolic disease have all been linked to high concentrations of fine particulate matter with a diameter less than 2.5 m (PM2.5). Experimental research with various machine learning algorithms has yielded promising results in the field of air pollution prediction. Predicting air quality by determining concentrations will assist different departments, including governments, in alerting people who are at high risk, reducing complications. An improved air pollution prediction approach based on the XGBOOST and ARTIFICIAL NEURAL NETWORK algorithms is used to forecast air quality. Our goal is to look into a machine learning-based approach for air quality forecasting using the AQI index and get the best results possible. In addition, we compare the performance of different ML algorithms from the dataset with the use of a GUI to predict air quality bycharacteristics.

Localization of Partial Discharge in a Transformer Winding Using Ladder Network – A Review
Authors:- Tejal Dixit, Vivek Anand

Abstract:- The Detection of the location of partial discharge in the windings of power transformers has always been considered a challenging task because of the convoluted structure of the winding. There are several methods proposed for the localization of partial discharge in the transformer winding. In this paper, we have concluded a detailed study on detecting the partial discharge using a ladder network to compute the response of a partial discharge in a winding of a transformer. The algorithm for two separate winding sections that are along and across the winding is computed. A response is calculated at the winding neutral terminal.

A Study on Proximate Analysis of Chicken Intestine and Chicken Skin
Authors:- Asst. Prof. Mohammad Saydul Islam Sarkar, Student Md. Saiful Islam

Abstract:- In the present study, percentage of protein, fat, moisture, ash and carbohydrates of poultry by product was studied. For this analysis poultry by product were collected from dining and restaurant. For chicken intestine the intestine percentage of protein, fat, moisture, ash and carbohydrate was 68.28%, 8.64%, 7.37%, 4.33% and 11.40% respectively. For chicken skin the percentage of protein, fat, moisture, ash and carbohydrate was 22.16%, 47.64%, 9.2%, 11.14% and 10.86% respectively. Percentage of protein was more in intestine than skin. Percentage of fat content was more in skin than intestine. Percentage of moisture content was similar between intestine and skin. Percentage of ash content was more in skin than intestine. Percentage of carbohydrate content was similar between intestine and skin.

COVID – 19 Detection Using Medical Imaging and Health Parameters
Authors:- Aditya Raute, Alisha Punwani, Siddhesh Hadkar, Heramb Kulkarni, Asst. Prof. Lifna C.S.

Abstract:- This research paper focuses on the use of advanced technology in confluence with readily available machinery to create a testing environment for COVID-19 that is more efficient, accurate, and has a higher reachability. This paper aims to develop a unique algorithm for detection of COVID-19 based on chest X-Rays, in combination with the patient’s medical information including symptoms, age, bloodwork, and possible contact with someone infected with the virus. This proposal will especially be instrumental in locations with inadequate medical staff, and can drastically reduce the diagnosis time that is otherwise required.

Excessive Retardation in Concrete
Authors:- P.Senthamil Selvan

Abstract:-Setting time of concrete has vital role in the construction process. Retarders are used where early setting of concrete is not required and when higher retention period is needed to place the concrete. Chemical composition of retarder is formulated to stop the hydration temporarily to delay the initial set of concrete. Once the effect of retarder wears off initial set will begin and hardening will develop. Use of concrete as a construction material depends upon the fact that it is plastic in fresh state and gets hardens subsequently with considerable strength. This change in physical properties is due the hydration process which is irreversible. This reaction is gradual, first stiffening of concrete and then development of strength which continues for a long time. The rate of reaction primarily depends on the cement property, concrete mix, and use of mineral and chemical admixtures. It is observed from study that delayed setting of concrete has impacted only early compressive strength of concrete but later strength at 28days remains unaffected by delayed setting of concrete.

Factors Affecting Water Absorption in Hardened Concrete
Authors:- P. Senthamil Selvan

Abstract:Concrete can absorb moisture because of its porous nature. When ambient relative humidity is high, concrete will absorb moisture from the air. When relative humidity is low, water will evaporate from the concrete in to the ambient environment. This absorption of moisture by concrete causes dampness in roof slabs and when concrete is more porous dampness will be higher. Porosity in concrete especially in roof slabs is caused by following several factors; Poor mix proportion, Poor compaction and laying, Curing regime, Poor construction practices.And dampness in roof slab which is primarily absorption of moisture by concrete is caused by following factors; Porosity of concrete, Relative Humidity, Surface area of element, Exposure period of wetting and drying.

A Review Article of thermal Analysis of Shell and Tube Heat Exchanger Using Artificial Neural Network
Authors:- Dhananjay Kumar, Asst. Prof. Deepak Solanki

Abstract:This review explains the effective utilization of artificial neural network (ANN) modeling in various heat transfer applications like steady and dynamic thermal problems, heat exchangers, gas-solid fluidized beds etc. It is not always feasible to deal with many critical problems in thermal engineering by the use of traditional analysis such as fundamental equations, conventional correlations or developing unique designs from experimental data through trial and error. Implementation of ANN tool with different techniques and structures shows that there is good agreement in the results obtained by ANN and experimental data. The purpose of the present review is to point out the recent advances in ANN and its successful implementation in dealing with a variety of important heat transfer problems. Based on the literature it is observed that the feed-forward network with back propagation technique implemented successfully in many heat transfer studies. The performance of the network trained were tested using regression analysis and the performance parameters such as root mean square error, mean absolute error, coefficient of determination, absolute standard deviation etc. The authors own experimental investigation of heat transfer studies of tube immersed in gas-solid fluidized bed using ANN is included for strengthening the said review. The results achieved by performance parameters shows that ANN can be used reliably in many heat transfer applications successfully.

Security in ad-hoc network using encrypted data transmission and Steganography
Authors:- Prof. Ravindra Ghugare, Ankita Patil, Ajay Jha, Dhiraj Kuslekar

Abstract- Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost. Thus users can reduce the maintenance and burden of local data storage. Meanwhile, once data goes into cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. Hence, efficient and effective methods are needed to ensure the data integrity and confidentiality of outsource data on untrusted cloud servers. Thepreviously proposed protocols fail to provide strong security assurance to the users. In this paper, we propose an efficient and secure protocol to address these issues. Our method allows third party auditor to periodically verify the data integrity stored at CSP without retrieving original data. To compare with existing schemes, our scheme is more secure and efficient.

Design; Construction and Evaluation of Engine Operated Rotary Tiller
Authors:- Tamiru Dibaba, Rabira Wirtu, Wasihun Mitiku, Teklewold Dabi

Abstract- Currently, as Ethiopia is importing most of the agricultural mechanization technologies, including power tillers, there are significant shortages for using powered farm machineries in the country. Thus, this activity was initiated to design and construct an engine operated rotary power tiller locally and test performances. Accordingly, the design of this machine was based on the total specific energy requirements which carried out for an L-shape rotary tiller blade through using mathematical model. This rotary tiller was operated by 10 hp motor engine out of this 2.25 hp of the power was used to dig the soil. The performance of the machine was evaluated in terms of theoretical field capacity, actual field capacity and field efficiency on clay soil. The results indicated that the theoretical field capacity, the actual field capacity and the field efficiency was 0.146 ha/hr., 0.134 ha/hr. and 91.78 % respectively at 1.11 g/cm3 soil bulk density and 30.3 % soil moisture content. The soil mean clod diameter after pass through by rotary was 0.127 mm. But, the designed rotary tiller requires some improvement on operation system as writing on recommendation parts before demonstration.

Robot for Defense & Security with IOT
Authors:- P.G. Scholar Manjula M, Asst. Prof. Jagadeesh B N, HOD. Dr. Narasimhamurthy M S

Abstract- This Project is an IR & camera-based security system or robot for protected areas & borders, which senses the Intruders, trespassers and transfer video to other end. The robot to be built is going to have an IR Sensor which senses any intruders / trespassers and will activate the alarm as well as switch on the guns. The robot will also be capable of shooting the intruder when he cross the border, the bullet shall also be equipped with a GPS facility so that incase if the intruder tries to escapes he can be tracked with devices or smart phone. The robot will also activate the Camera, which will start capturing the live video and transmit the same to the receiver end, the smart phone. It will trigger the alarm and the data will be transferred to the mobile device.

Advance Glass House Monitoring and Controlling Using Deep Learning
Authors:- Raju. U, Siva. B, Vishal Jayaruban. S, Asst. Professor Ms. S. S. Sugania

Abstract- In current era, Faster Region-Convolution Neural Networks (Faster R-CNN) are desperately improved localization, identification and detection of objects. Recent days, Big data is evolved which leads huge data generation through modern tools like surveillance video cameras. In this project, it focused on tomato growing stages and plant health condition in the agricultural field, monitor the temperature, soil moisture, light intensity and sends the notification message to the user. Agriculture is one of major living source in India. By using impro ved and customized Faster R-CNN model (improved-detect), this project had trained datasets of Tomato and Plant. In this project, Tomato plant is mainly used for model training and testing. This project have experimented on plant image data set and tomato growing stages. Expe rimental results are compared with state of the architectures like Mobile Net, Dark Net-19, ResNet-101 and proposed model out performs in location. O btains best results in computation and accuracy. In the below results sections, we have presented the results with suitable models.

Reduce waste by using lean Manufacturing: Case study in Yarmouk complex
Authors:- Mohammed Sirelkhatim Abdelwahab, Prof. Hassan Khalifa Osman

Abstract- The aim of this paper is to study the gap of applying lean philosophy in production lines in one of Yarmouk industrial complex factories(A22) to achieve some goals summarized in changing production management from traditional manufacturing concepts to lean manufacturing concepts. Selection one of products mix in factory A22 to apply lean principles. The methodology of this research is to investigate the effect of batch size, inventory between processes and time spend due to transportation in total throughput and mean life time of the product.

Secure Data Search in Cloud Services Based on Encryption Scheme
Authors:- M. Tech. Scholar Shraddha Verma, Asst. Prof. Dr. Neha Singh

Abstract- In recent days, Cloud storage has become good entrant for organizations that suffer from resource limitation. Cloud computing is a procedure that surveys internet founded computing. The cloud computing method is used to lessen data organisation cost or time. In addition, cloud computing is used to store data that can be retrieved in remote areas. The most challenging task in the cloud is to ensure availability, integrity, and secure file transfer Searchable symmetric encryption (SSE) has been extensively explored in cloud storage, enabling cloud services directly .Search for encrypted data. Most SSE solutions are only suitable for honest but curious cloud services and will not differ. Because storage outsourcing is not trusted, this assumption is not always true in practice. Data protection or file protection in the cloud environment is one of the biggest problems in the cloud environment. Data protection involves many issues, such as wise management, integrity, claims, accessibility, etc. Data confidentiality means that only authorized users can access the data. The accuracy of the data means that if the information is accessible to a remote system or local system it should not be altered. Verification is an effective way to authenticate users who are trying to access information. The availability of data indicates the availability of data if necessary. Confidentiality is usually through encryption technology. The confidentiality of data and keywords is the most important privacy requirements in SSE. It ensures that users’ plaintext data and keywords cannot be revealed by any unauthorized parties, and an adversary cannot learn any useful information about files and keywords through the proof index and update tokens used in GSSE. A verifiable SSE scheme should be able to verify the freshness and integrity of the search results for users.

Performance Analysis of Routing Protocols for Security Attacks
Authors:- M. Tech. Scholar Pooja Verma, Asst. Prof. Dr. Priyanka Shivhare

Abstract- The next generation communication network has been widely popular as an ad hoc network and is roughly divided into mobile nodes based on mobile ad hoc networks (MANET) and vehicle nodes based on the vehicle’s ad hoc network (VANET). VANET aims to maintain traffic congestion by keeping in touch with nearby vehicles. Every car in the ad-hoc network works like a smart phone, which is a sign of high performance and building an active network.The self-organizing network is a decentralized dynamic network, as vehicles are constantly moving, efficient and secure communication requirements are required. These networks are more vulnerable to various attacks, such as hot hole attacks, denial of service attacks. This article is a new attempt to investigate the security features of the VANET routing protocol and the applicability of the AODV protocol to detect and manage specific types of network attacks called “black hole attacks Sybil attack and DDoS attack.A new algorithm is proposed to improve the security mechanism of the AODV protocol, and a mechanism is introduced to detect attack and prevent the network from being attacked by the source node this simulation set up performed on matlab simulation.

Artificial Intelligence in Healthcare
Authors:- Pooja Mahanth Bhagat

Abstract- Artificial intelligence (AI) is outlined as a field of science and engineering involved concerning the computational comprehension of what’s ordinarily referred to as intelligent behavior, and with the creation of artifacts that exhibit such behavior. It’s the subfield of engineering. AI is turning into a renowned field in engineering because it has increased the human life in several areas. AI has recently surpassed human performance in many domains, and there’s nice hope that in care. Artificial intelligence might leave the better interference, detection, diagnosis and treatment of unwellness. Major unwellness areas that use AI tool include cancer, neurology, medical specialty and polygenic disorder. Review contains this standing of AI applications in care. AI can even be accustomed mechanically spot issues and threats to patient safety, like patterns of sub- optimum care or outbreaks of hospital-acquired malady with high accuracy and speed. Some current researches of AI applications in care that offer a read of a future where supplying is a lot of unified, human experiences. This review will explore however AI and machine learning will save lives by serving to individual patients.

Improving Vegetable Disease Detection using Modified K-Means Clustering Algorithm
Authors:- Asst. Prof. C. Santhosh Kumar, J. Jenifer, G.Vidhya, Asst.Prof. R. Vijayabhasker

Abstract- India is the cultivating country and rich in producing agricultural products. So, we have to classify and exchange our agricultural products. Manual arranging is tedious so we use automatic grading system. It requires less time for grading of the agricultural products. Image processing technique is helpful in examination and evaluating the products. In this paper we proposed a vegetable disease detection system for recognizing diseased vegetables. Here we utilize the Image processing system for reviewing the vegetables. Vegetables are recognized dependent on their features. The features are color, shape, size,texture. We extract these features utilizing algorithms to distinguish the vegetables. We develop a recognition system for 2D input images. The main aim of this work is detecting infected vegetable based on their features with K-means clustering algorithm. Algorithm is classified into three steps namely enhancement, segmentation and classification. In this Vegetable samples are collected as images from high resolution camera and the data acquisition is carried out for database preparation. The image segmentation process is based on pixel of the image and it is applied to get the segmented and infected vegetables using K- Means Clustering algorithm.

Comparison of Different Hybrid Approaches Used for Sentiment Analysis: Survey
Authors:- Research Scholar Mansi Chauhan, Research Scholar Devangi Paneri

Abstract- In Today’s Technological Life Social media quiets a specious amount of Information. Social media has become a tremendous source of acquiring Users Opinions. It also helps to analyze how people, particularly consumers, feel about a particular topic, product or Idea. Among such opinions plays an important role in analyzing different business aspects. Sentiment analysis therefore becomes an effective way of Understanding public Opinions. Business Organizations can predict best Decision with Using Sentiment analysis. A lot of Research work has been done on Sentiment analysis in order to classify the opinions. Researchers have tested a variety of methods for automating the sentiment analysis process but very few Researchers are using Hybrid Approaches. This research paper shows the advantage of hybrid approaches to improve classification accuracy Compare to individuals. In proposed work a comparative study of the effectiveness of hybrid approaches was used for Sentiment analysis. Empirical results indicate that the hybrid approaches outperform compare to this individuals Classifiers.

Automating Business Processes to Improve Efficiency Efficient Design of Building Automation Systems
Authors:- Akaash Dey

Abstract-Back in the day, logistic companies weren’t using GPS devices and tracking software to optimize their routes throughout the day. They used to fill out bills on paper, using a finite set of receipt numbers, carrying over to accounting which spent days to a month for completion. More manpower means more delay and more cost as well, and productivity can only be followed by discipline and quality work on a gradual basis(Guerra, L., & Stapleton, L. (2019). How will our capabilities change after adding automation processes in existing businesses that follow traditional methodologies? To improve day to day operations of business using new technologies and automation to increase efficiency, save time and cost.Building and maintaining Automation Performance Index models (to keep track of the performance. We have already recognized some clear opportunities for research process automation: automated sampling, automated survey, and automated visualization of data (through online reporting dashboards or tools). These tools allow researchers to handle much bigger data sets and spend less time creating (or editing) common charts and graphs(Martinho, R., Rijo, R., &Nunes, A. (2015). This helps in quality decision making thus helping businesses to upscale.

Performance Enhancement of Leaf Spring Using Design Optimization
Authors:- M.Tech. Scholar Abhishek Chandra, Prof. G.R. Kesheorey (Supervisor & HOD), Dr. A.J. Siddiqui (Executive Director)

Abstract-Leaf spring is one of the potential parts for weight reduction as it accounts for 10% – 20% of the unsprung weightand thereforegood scope of work lies in its design optimization for weight reduction. This current research investigates the application of Taguchi Response Surface Optimization in optimizing dimensions of mono leaf spring. Initial FEA analysis is conducted using ANSYS software to determine to determine stresses, deformation and strain energy of mono leaf spring.Design of leaf spring is optimized using Taguchi design of experiments scheme generating 3D response surfaces, sensitivities, goodness of fit curves. The optimization parameter considered for analysis are spring inner radius and spring outer radius while the output parametersare equivalent stress, mass and deformation.

Fatigue Life Analysis of Tube Flange Welded Joint using ANSYS
Authors:- M. Tech. Scholar Sumit Kumar, Prof. G.R. Kesheorey (Supervisor & HOD), Dr. A.J. Siddiqui (Executive Director)

Abstract-The fatigue cracks are the one of the major cause of failures in welded joints and it us therefore essential to investigate the dimensional parameters affecting the fatigue characteristics of welded joints. The current research investigates the fatigue life characteristics of tube flange welded joint using techniques of Finite Element Method. The effect of dimensions i.e.,h, α and t on fatigue life and safety factor is investigated using Taguchi response surface method. The 3D response surface plots are generated each variable and range of dimensions are evaluated for which safety factor is maximum or minimum. The CAD modeling finite element analysis is conducted using ANSYS software.

A Glaucoma Detection Using Deep Learning Technique
Authors:-Ms. Arkaja Saxena, Avinash Pal (HOD)

Abstract- Glaucoma is a disease that relates to the vision of human eye. This disease is considered as the irreversible disease that results into the vision deterioration. Many deep learning (DL) models have been developed for the proper detection of glaucoma so far. SO here we have presented an architecture for the proper glaucoma detection based on the deep learning with making use of the convolutional neural network (CNN). The differentiation between the patterns formed for the glaucoma and the non glaucoma can be finding out with the use of the CNN. The CNN provides a hierarchical structure of the images for differentiation. Proposed work can be evaluated with total six layers. Here we also used the dropout mechanism for the effective performance in the glaucoma detection. The datasets used for the experiments are the SCES and the ORIGA. The experiment is performed for both the dataset and the obtained values are .822 and .882 for the ORIGA and SCES dataset respectively.

Design Factoid Question Answering System using BERT
Authors:- M. Tech. Scholar Sheetal Singh Goutam, HOD. Avinash Pal

Abstract-The field of text mining which deals with the providing of answers to the questions of the users is also one of the hot topics for researchers. In this paper Natural Language Processing (NLP) has been used which deals with the processing of the data that comes in any form like text, video, image, or audio. This NLP comes under the field of artificial intelligence (AI), which is used in the field of question answering (QA) system. Here proposedworked for designing a system that works for factoid QA which will answer the questions that are asked by the users.Lexical Chain and Keyword analysis is used in our system for the answering of questionsfrom a given set of articles.The reasoning system is used for the validity of the answering. The experiment here is done with the SQUAD dataset.In our experimentoverall average of the correct prediction of the answerthe accuracy obtainedfor the passage retrieval using existing TFIDF is70.30% and proposed BERT is 87.81%.

E-Mail Spam Filtring Using Machine Learning Technique
Authors:- ME Scholar Shivani Panwar, Asst. Prof. Kapil Shah

Abstract- In recent years, the single-modal spam filtering systems have had a high detection rate for text spamming. To avoid detection based on the single-modal spam filtering systems, spammers inject junk information into the multi-modality part of an email and combine them to reduce there cognition rate of the single-modal spam filtering systems, there by implementing the purpose of evading detection. In view of this situation, a new model called text-based dataset modal architecture based on model fusion (MMA-MF) is proposed, which use a text-based dataset fusion method to ensure it could effectively filter spam whether it is hidden in the text. The model fuses a Convolutional Neural Network (CNN) model and a Long Short-Term Memory (LSTM) model to filter spam. Using the LSTM model and the CNN model to process the text parts of an email separately to obtain two classification probability values, then the two classification probability values are incorporated into a fusion model to identify whether the email is spam or not. For the hyper parameters of the MMA-MF model, we use a grid search optimization method to get the most suitable hyper parameters for it, and employ a k-fold cross-validation method to evaluate the performance of this model. Our experimental results show that this model is superior to the traditional spam filtering systems and can achieve accuracies in the range of92.64–98.48%.

Intrusion Detection System Using Deep Learning
Authors:- M. Tech. Scholar Megha Sharma, Asst. Prof. Khushboo Sawant

Abstract- As the beginning of twenty-first century, PC framework describing improving Updationin form of network efficiency, several hand holders & kind of operationswhich achieve on the system. As progressing accompanied by latest generation under comfortable machines for ex: Internet mobile, tabs, smart instruments i.e. updated machines & software also several calculating devices, no. connected hand holders progressing most & most. Therefore, safety on connection has been key process which support complete hand holders. Intrusion detection has been procedure in protecting intrusion. Process of going to a system unable to take agreement termed as intrusion. An intrusion detection techniquemay predictcomplete upcoming & on- going intrusion at a structure. Intrusion detection techniquemay investigate complete priority under safety procedure with the help of managing infrastructure movement. As Intrusion detection system (IDS) are obvious class under safety layout, therefore it may manage capacity with support to determine safety points in a frame work. Numbers of several system supports under intrusion detection. Given research studying distinguishing in middle of hybrid documents opening approach & mono approach. Primary objective of the research are representing i.e. With support to hybrid document opening approaches may minimize duration difficulty in process as compared to mono approach. Particular structures were certifiedwith support to kdd’99 document pair. An observational out come significantly describing i.e. hybrid approaches with support to k-means & Projective Adaptive Resonance Theory may uniquely minimize structure practicing duration of the frame work &balancing perfectness of detections.

Healthcare Prediction Using Machine Learning Technique
Authors:- ME Scholar Chetna Sawalde, Asst. Prof. Ranjan Thakur

Abstract- In medicinal sciences forecast of Heart sickness is most troublesome undertaking. In India, fundamental driver of Death is because of Heart Diseases. The passings because of coronary illness in numerous nations happen because of work over-burden, mental pressure and numerous different issues. It is found as fundamental reason in grown-ups is because of coronary illness. Along these lines, for distinguishing coronary illness of a patient, there emerges a need to build up a choice emotionally supportive network. Information mining order systems, to be specific Modified K-means and SVM are broke down on Heart Disease is proposed in this Paper.

Reliable and Energy-Efficient Routing Protocol for Under Water Acoustic Sensor Networks
Authors:-M.Tech. Scholar Surbhi Rathore, Asst. Prof. & Head Ashish Tiwari

Abstract- The research for UASN has attracted a lot of people in recent years. Here, propagation and globalization are done for 3-D environments. The Acoustic Sensor network (UASN) works extensively with activities such as groundwater data and water filtration. An aquatic reactor network has been created to be used for marine harvesting, pollution control, marine exploitation, disaster prevention, cruise assistance, and monitoring applications. The UASN is a chemical sensor that uses batteries as a power source. Due to the difficult environment of UASN, replacing these batteries is difficult. One way to alleviate this problem is to extend the life span of UASN batteries by reducing energy consumption (improving energy efficiency). This proposes an Energy-Balanced Unequal Layering Clustering (EULC) algorithm that can improve acoustic sensor operation. The UASN layer produced by the EULC algorithm differs greatly from the nodes, providing a solution to the “hot spot” problem by building different clusters of similar size. Simulation results show that the EULC algorithm can efficiently balance the energy of the UASN platform, thus enhancing network life.

Facial Expressions Recognition Based on LBP & SVM
Authors:- M.Tech. Scholar Nagesh Patel, Asst. Prof. & Head Ashish Tiwari

Abstract- Facial expression analysis is a compelling and demanding problem affecting important applications in various fields such as human-computer interaction and data-driven animation. The development of effective facial expressions from the original facial images is an important step in gaining facial expression recognition. The actual evaluation is based on the face representation of statistical local functions, local binary pattern (LBP). Several machine learning techniques have been thoroughly observed on various databases. Researchers usually use the effective and competent LBP feature of facial expression recognition. Cohn Kanade is the database for the current work and the programming language used is MATLAB. First, the face area is divided into small areas through which histograms are extracted, local binary pattern (LBP) and then connected as a single function vector. This feature vector outlines a well-organized representation of face and is helpful in determining the resemblance among images. These operators along with other proposed techniques were experimented considering different settings viz. with or without localization and registration errors, person dependent or independent, operator scales, number of grids (hence the size) and number of available LBP based codes. The FR system was configured in verification mode using Eigen face approach derived on these LBP based histogram feature vectors. The FER system was configured for multi-class facial expression classification mode using Support Vector Machine (SVM). Experiments on facial expression databases reveal that maximum recognition rate would be obtained for the scale in which width is larger than height of the operator. Both proposed operators are sensitive to registration errors. However, these operators could be applied in automatic FERS.

Online Crime Management System
Authors:- S.S. Sugania, D. Jason Daniel Raj, S. Jagath Ratchagan, C. Dinesh Pandi

Abstract- The Online Crime Management system is designed in such a way that, it can be accessed anywhere through internet. A person who is about to file a complaint approaches the portal and registers into the portal using his information. After that the admin authenticates the user, after a successful authentication the user can login into the portal. The complaint will be received at the police end. And the process will be updated in the portal. For the efficiency of the police, various criminal activities are collected as datasets and analyzed using the KNN algorithm. The crime types like methods, properties used, fingerprints obtained are analyzed using the datasets. Now if the crime filed by the user matches the crime patters occurred before it will be easy for the police to solve the crime.

Image Processing Based Leaf Disease Detection Using Raspberry Pi
Authors:- Dinesh Kumar R, Prema V, Radhika R, Queen Mercy C.A, Ramya S

Abstract- Green plants are very much important to the human environment; they form the basis for the sustainability and long term health of environmental systems. In this project, we have proposed a system using raspberry pi to detect healthy and unhealthy plants & alerts the farmer by sending email. The main objective of this project is detection of diseases at the early stage. We mainly focus on image processing techniques. This includes a series of steps from capturing the image of leaves to identifying the disease through the implementation in raspberry pi. Raspberry pi is used to interface the camera and the display device along which the data is stored in the cloud. Here the main feature is that the crops in the field are continuously monitored and the data is streamed lively. The captured images are analyzed by various steps like acquisition, preprocessing, segmentation, clustering. This turn reduces the need for labor in large farm lands. Also the cost and efforts are reduced whereas the productivity is increased. Automatic detection of symptoms of diseases is useful for upgrading agricultural products. Completely automatic design and implementation of these technologies will make a significant contribution to the chemical application.

A Review on Software Fault Detection using a Classification Model with Dimensionality Reduction Technique
Authors:- Research Scholar Devangi Paneri, Research Scholar Mansi Chauhan

Abstract-Software plays the most important role in every organization it requires high-quality software. If a fault happens in this system then it causes high financial costs and affects people’s lives. So, it is important to develop fault-free software. Sometimes, a single fault can cause the entire system to frailer. So in the SDLC life cycle Fault prediction at an early stage is the most important activity it helps in effectively utilize the resources for better quality assurance. So before delivering the software to market it is important to identify defects in the software because it increases the customer satisfaction level. here in this survey paper present an ensemble approach to identifying fault before delivering the software. Ensemble classifier improved classification performance compared to the single classifier. So improved the accuracy the new algorithm is proposed that is “improved random forest” it works with random forest classifier with filter-based feature selection method. The feature selection method reduces the dimensionality and selects the best subset of features and gives that subset to the random forest classifier. The experiment carried the public NASA dataset of the PROMISE repository.

Load Flow Studies of 132/33KV Transmission Line in Port Harcourt Zone Using Newton Raphson’s Method
Authors:- M. Tech. Scholar Eze I. Wokocha, Prof. Christopher O. Ahiakwo, Prof. Dikio C. Idoniboyeobu

Abstract- This paper critically examines the Load Flow condition of the Port Harcourt Mains and Town 132/33kV transmission networks. In carrying out the Load flow study, the Newton Raphson power flow method in Electrical Transient Analyzer Program (ETAP) was used to evaluate the performance of both networks. Findings from the simulation exercise showed a lot of grey areas that required urgent attention within both networks. The combined transmission efficiency recorded low and the total system apparent losses stood at 52.5912MVA. All transformers were critically loaded as some exceeded 100% loading. The percentage operational bus voltages were below threshold as bus voltage magnitudes fell outside the +/- 5% nominal rated values. The systems also had undesired power factor levels. These threatening findings led to the quest to improve the networks. Three system improvement algorithms were used in this research viz: capacitor placement, transformer upgrade and transformer load tap modifications. These algorithms were superimposed in a stepwise mznner to obtain the most desired result. The final simulation result saw the performance of both networks within acceptable limits as the systems were greatly improved. The total system apparent losses reduced to 26.129MVA (50% improvement). All percentage loading of transformers were seen below the 60% benchmark. Bus voltage levels with significantly within the +/-5% limit and finally the power factor values were good.

Enhanced Drowsiness Detection Using Machine Learning
Authors:- Mohamed Nasrutheen. S, Morton Rillo. S, Naveen. A, Asst. Prof. Ms. K. Thamizharasi M. E

Abstract- A recent study showed that around half a million accidents occur in a year, in India itself. Out of which 60% of these accidents are caused due to Driver Drowsiness. Previous approaches are generally based on blink rate, eye closure, and other hand-engineered facial features. The proposed algorithm makes use of features learned using a convolutional neural network (CNN) to explicitly capture various latent facial features and the complex non-linear feature interactions. This system is hence used for warning the drowsiness of driver by ringing an alarm as well as to prevent traffic accidents by turning ON Parking lights and information shared to the registered mobile number via SMS, Phone Call with the help of GSM Module. This can reduce more than 50 percent of the accident.

Enhancing Air Pollution Predicton Using Artificial Neural Network with XGBOOST Algorithm
Authors:-Asst. Prof. Christina Rini R, Aishwarya N, Meenakshi G, Saranya M

Abstract- Air pollution has become a major public health concern in recent years. Despite substantial improvements in overall air quality in recent years, India remains the third most polluted country according to the latest edition of the World Air Quality Report [1]. The release of gases into the air that are harmful to human health and the environment is referred to as air pollution. Lung cancer, cardiovascular disease, respiratory disease, and metabolic disease have all been linked to high concentrations of fine particulate matter with a diameter less than 2.5 m (PM2.5). Experimental research with various machine learning algorithms has yielded promising results in the field of air pollution prediction. Predicting air quality by determining concentrations will assist different departments, including governments, in alerting people who are at high risk, reducing complications. An improved air pollution prediction approach based on the XGBOOST and ARTIFICIAL NEURAL NETWORK algorithms is used to forecast air quality. Our goal is to look into a machine learning-based approach for air quality forecasting using the AQI index and get the best results possible. In addition, we compare the performance of different ML algorithms from the dataset with the use of a GUI to predict air quality by characteristics.

Android Agricultural Application
Authors:- Omkar Aditya, Aparna Shukla

Abstract- Forecasting and technical information regarding farming can be provided by the experts of the farming community to the farmers by using new development in Information and Communication Technology (ICT). Agriculture kiosk is one of the many routes by which farmers in the rural areas get various agriculture information on the run using IT-based application installed in a Kiosk. There are few disadvantages of kiosks given as; a) It is not user friendly. b) Setup cost of the kiosk is very high. c) Problem of internet network connection. d) Security cost for protecting kiosk. Here, in this document, we have planned to build an IT-based application which provides a piece of information to the farmers overcoming the above problems by developing android application. The android operating system is open-source; using it we can design and develop software having functionality similar to agriculture kiosk. After developing an android application, we can deploy it in an android market, so that everyone can download it freely. This research paper shows how to design and implement such a technique which focuses on mobile farming technology.

Human Facial Expression Recognition Model Using Convolutional Neural Network
Authors:- Asst. Prof. M. J. Freeda, Maajidha Kamar. A, Lisha. S, Iswarya. M

Abstract- Facial expression is that the most powerful and natural non-verbal emotional communication methodology. the popularity of facial expressions isn’t a simple downside. folks will vary considerably within the approach they show their expressions. Hence, the face expression recognition remains a difficult downside in pc vision. To propose an answer for face expression recognition that uses a mix of Convolutional Neural Network and specific image preprocessing steps.It delineate the innovative resolution that has economical facial expression and deep learning with convolutional neural networks (CNNs) has achieved nice success within the classification of assorted face feeling like happy, angry, unhappy and neutral.

Emotional Contagion in Teenagers and Women
Authors:- Kavadi Teja Sree

Abstract- This study aimed at measuring the difference between emotional contingency among teenagers and women by using The Emotional Contagion Scale by Doherty, R.W. Emotional contagion is the phenomenon of having one person’s emotions and related behaviour’s directly trigger similar emotions and behaviour’s in other people. Emotions can be shared across individuals in many different ways both implicitly or explicitly. The Emotional Contagion Scale was designed to assess people’s susceptibility to catching joy and happiness, love, fear and anxiety, anger, and sadness and depression, as well as emotions in general (Doherty, 1997; Hatfield, Cacioppo, & Rapson, 1994, p. 157). The main objective of this study is to study whether emotions are contagious among teenagers and women. The survey was conducted among under graduates and post graduates between the age group of 15-28, in 100 under graduates and post graduates, among which 50 of them were teenagers and 50 were women. A statistical analysis of mean, standard deviation and t test were used, thereby concluding that there is a significant difference between teenagers and women. It was found that teenagers were more emotionally contagious than women in general. The study suggests that the teenagers and women should inculcate themselves first and be positive.

Design and Fabrication of Three Axis Rotating Trailer Using Pneumatic System
Authors:- Asst. Prof. S. Divya, Praveen S, Ramchandran R, Selvayukesh M, Sridhar S

Abstract- This project work “design and fabrication of Three axis rotating trailer using pneumatic system” has been conceived having studied the trouble in emptying the materials. Our review in the respect in a few automobile garages, reveals the fact that generally some troublesome strategies were embraced in emptying the materials from the trailer. The trailer will empty the material just in one direction only. It is hard to empty the materials in small compact roads and small streets. All the three sides are effectively to unload the trailer in our task are rectified. Automobile engine drive is coupled to the compressor engine, the compressed air its stores when running the vehicle. the pneumatic cylinder are is used to activate this compressed air, when activate the valve. Spur gear is used for rotating the trailer in three directions & easy for unloading the materials in small compact streets and roads.

Alam’s Model (“The BASE Model”)
Authors:- Mohammed Shafiq ALam.N

Abstract-Introduction–Stable Body Model–BASE Model–Gravity–Formation of Single Cell Atom –The Force, holding the “electrons” and “Planets” in their orbit–Electromagnetism–Light–Conclusion–Applications–Acknowledgement.

Robotic Arm Controlled by Using Arduino Uno
Authors:- Nikhil J.Solaskar, RushikeshM.Desai, AkashD.Sarkar, GaurangP.Tari,
Asst. Prof. VaishaliP.Ramtekkar

Abstract-In recent years the industry and daily routine works are found to be more attracted and implemented through automation via Robots. The pick and place robot is one of the technologies in manufacturing industries which is supposed to perform pick and place operations. The system is so designed that it eliminates the human error and human intervention to urge more precise work. There are many fields during which human intervention is difficult but the method taken into account has got to be operated and controlled. This results in the world during which robots find their applications. Literature suggests that the pick and place robots are designed, implemented in various fields such as; in the bottle filling industry, packing industry, utilized in surveillance to detect and destroy the bombs etc. The project deals with implementing a pick and place robot using Arduino for any pick and place functions. The pick and place robot so implemented is controlled using Bluetooth over Arduino Uno. The robotic arm implemented has three degrees of freedom. Many other features like line follower, wall hugger, obstacle avoider, detector etc are often added to the present robot for versatility of usage.

Face Mask Detection Using Tensor Flow JS. and Arduino
Authors:- Saswat Samal

Abstract-Coronavirus is continuously spreading until now all over the world. The impact of COVID-19 has been fallen on almost all sectors of development. Many precautionary measures have been taken to reduce the spread of this disease where wearing a mask is one of them. In this paper, I propose a system that restrict the spread of COVID by finding out people who are not wearing any mask in the public places which are monitored with cameras. While a person without a mask is detected, a warning sign is created and not allowed to enter into the building. A transfer learning architecture is trained on a dataset that consists of images of people with and without masks collected from various sources. It is hoped that the study would be a useful tool to reduce the spread of this communicable disease for many countries in the world.

Literature Survey of Two-Way Authentication System
Authors:- Mrs Dnyanada Hire, Monika Bhatt, Mohit Anand,Chaitanya Harde

Abstract-We all need to use stronger passwords which should not include our names, sequential number and birthdates even if these are easy to remember. But strong passwords are hard to remember so, the solution is Two-Factor Authentication (2FA). Two-factor authentication, also called multiple-factor or multiple-step verification, is an authentication mechanism to double check that your identity is legitimate, and this does not require transferring data over the internet. The two-factor authentication security feature has the following advantages: Enhanced security, helps in fraud prevention, Easy for users to understand and enable, Easier and quick account recovery

Predicting Areas of Improvement to Boost Up the Sales Using Data Analysis Techniques
Authors:- Manas Maheshwari, K Sai Varun, Farman Ahmed, Sonali Borase

Abstract-This paper gives an overview of Data analysis and how Data analysis is used in Business Intelligence tools and business development. It gives different algorithms and techniques to perform Data analysis and its implementation.

Design and Implementation of Fast Charging Universal Power Bank Using Super Capacitor
Authors:- Asst. Prof. Mr. K. Sathiyaraja, M. Sasikala, R. Shobhana, R. Thamil Ilakkiya, R. Manoj

Abstract-Portable power banks are comprised of battery in a case with a circuit to control power flow. Power banks are becoming increasingly popular because the battery life of phones, tablets and portable media players is exceeded by the number of time gadgets used in a day. In this project, the design and implementation of universal power bank using super capacitors as a charge storage device is presented. Existing power banks use batteries to store charges and it takes a long time to charge completely. In this work, batteries are replaced with super capacitors to take advantage of its quick charging and slow discharging feature. Super capacitors are charged using charging and regulation circuit. An output regulator circuit delivers the necessary power for charging portable devices. A display is also implemented using a Atmega microcontroller for monitoring. Battery technologies are well established and widely used technology but they offer several disadvantages like weight, volume, large internal resistance, poor power density, poor transient response. On the other hand, due to advancement in the material and other technology, Super capacitor or Ultra capacitors or Electrostatic Double Layer Capacitor (EDLC) are a most promising energy storage device. They offer a greater transient response, power density, low weight, low volume and low internal resistance which make them suitable for several applications.

Cyber Security: The Study on Information Gathering
Authors:-Varun Verma, Saurabh Kumar Dubey, Tajwar Khan, Prem, Himanshu Pandey

Abstract- Internet-wide network scanning has numerous security applications, including exposing new vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire public address space with existing tools is both difficult and slow. We introduce GRABIN – An automated Cyber Security tool by which we can gather the information about the particular target like we can gather the information about domains, subdomains, users, user emails, open ports, their IP addresses and much more. Also, we are able to find web App vulnerabilities in the proper CVE format, and we are able to hash the values and we can encrypt and decrypt out messages by using the tool. We present the scanner architecture, experimentally characterize its performance and accuracy, and explore the security implications of high speed Internet-scale network surveys, both offensive and defensive. We also discuss best practices for good Internet citizenship when performing Internet-wide surveys, informed by our own experiences conducting a long-term research survey

Effect of Multifluid Flow for Internal Heat Generation or Absorption in Presence of Concentration in a Vertical Channel
Authors:-Mangala Kandagal, Shreedevi Kalyan

Abstract- The effect in heat mass transfer and of multi-fluid flow characteristics in vertical channel is investigated in this paper. The fluids are incompressible in both the region and assumed the transport properties of fluid flow are constant. By the help of analytical method all the basic equations governing th set of coupled nonlinear ordinary differential equations are solved. These results are illustrated by plotting graphs and for various physical parameters. Here we can control result by heat absorption coefficient, width ratio and viscosity ratio.

Online Crime Management System
Authors:-S.S. Sugania, D. Jason Daniel Raj, S. Jagath Ratchagan, C. Dinesh Pandi

Abstract- The Online Crime Management system is designed in such a way that, it can be accessed anywhere through internet. A person who is about to file a complaint approaches the portal and registers into the portal using his information. After that the admin authenticates the user, after a successful authentication the user can login into the portal. The complaint will be received at the police end. And the process will be updated in the portal. For the efficiency of the police, various criminal activities are collected as datasets and analyzed using the KNN algorithm. The crime types like methods, properties used, fingerprints obtained are analyzed using the datasets. Now if the crime filed by the user matches the crime patters occurred before it will be easy for the police to solve the crime.

Survey on Detection and Identification of Face Mask
Authors:-J. Jenitta, Shrusti B K, Vidya D Y, Vinay S Sinnur, Shivesh Varma P

Abstract- The world is coming out of lockdown and starting its new normal. As Education plays a key role in every student’s life, the Government is planning to reopen schools and colleges after the COVID-19 pandemic situation. It is mandatory for the educational institutions to follow Standard Operating Procedure(SOP) to reduce the risk of spread of COVID-19 in the institution campus. In SOP one important point is wearing a face mask because the virus that causes COVID-19 is mainly transmitted through droplets generated when an infected person coughs, sneezes, or exhales. These droplets are too heavy to hang in the air, and quickly fall on floors or surfaces. This paper aims to review various state of art methods available to find whether the person who is entering the institution is wearing a face mask or not, using various machine learning techniques.

Speed Control Analysis and Performance Comparison of Induction Motor Using Improved Hybrid PID Fuzzy Controller
Authors:-Sartaj Singh, Prof. Priya Sharma (HOD)

Abstract- To control the speed of an induction motor is very difficult. The speed control relies on the electric power factor offered to the motor. Many researchers have performed a significant number of studies to enhance the mechanism of vector control. They have used different controllers such as PI (Proportional Integral), PD (proportional derivative), Fuzzy-PI, Fuzzy PID (Proportional Integral derivative). In this paper, a novel approach is developed which used hybrid controller. This controller is developed by the amalgamation of Fuzzy type-2 and PID controller. Fuzzy type-2 has various advantages over type-1 fuzzy which overcome the limitations of the traditional system. A literature survey is given with the detailed information of the works done in this field. The mechanism is developed by taking into consideration different parameters such as rise time, settling time and overshoot. The proposed model is analysed using MATLAB. Simulation results showed the better efficiency of the novel controller. Is observed that, developed controller reduced the time required by the motor to achieve its target speed, thus, gives excellent outcome.

Patient’s Health Monitoring System with Smart Medicine Box
Authors:-Ms. S. Sivaranjini Ap/Cse, V. Chithiraiselvi, M. Suruthi, M. Vinitha

Abstract- The medicine box system contains a biomedical sensor to monitor the health condition of the patient. The information about the health condition and the details of medication will be stored in the server which can be accessed by both doctor and patient and also doctor can change the prescription based on the patient’s condition on the server. The intelligent medicine box will help a patient to remind the right time to take the medicine based on prescription by receiving notification to the patient’s fixed email address using Wi- Fi module and he also will receive voice message using speaker. If he forgets the actual time of taking medicine and goes to take medicine at any time the medicine box will not open as a servo motor will make the box locked.

Review of Skin Diseases Classification Using Machine Learning
Authors:- Ram Charan Mishra, Rahul Mishra, Kusum Sharma

Abstract- Skin diseases are among the most common health problems worldwide. These diseases like acne, eczema, benign, or malignant melanoma have various dangerous effects on the skin and keep on spreading over time. Feature extraction using complex techniques such as SVM (Support Vector Machine) and Convolutional Neural Network (CNN). The work may in the future serve as a knowledge base for an expert system specializing inmedical diagnosis, testing evaluation, treatment evaluation, and treatment effectiveness. AlexNET, a pre-trained CNN model will be used to extract the features. This system will give more accuracy and will generate results faster than the traditional method. multiple skin lesions are classified using different image processing and machine learning techniques. The most used machine learning techniques used for skin lesion classification are SVM, trees, artificial neural network K-nearest neighbor, ensemble classifiers and convolution neural network (CNN).

Structural Synthesis of Melamine on the Properties of Concrete Different Mix Time Slice
Authors:- M. Tech. Scholar Mohit Chandak, Asst. Prof. Sourabh Dashore

Abstract- The performance of concrete primarily depends upon the sort and quantitative relation of its constituents, compaction, natural conditions and admixtures used throughout the action process. A part of this analysis emphasis to calculate the results on strength of concrete once water-cement quantitative relation is constant and the rise in slump happens with the increase in the quantity of Super plasticizer. The rest of the investigation is dispensed to review the results of Superplasticizer with completely different dosages under completely different action regimes at the associate close field with different temperatures. For this purpose, a concrete combine with silica fume and fly ash with all parameters constant was associate anionic alkali based Superplasticizer with no chlorides. Different percentage of melamine were employed in completely different batches of all 48 specimens and cured under completely different action conditions so tested for compressive and tensile strengths following the water curing testing showed most strength. The highest and lowest values of compressive strength were obtained with the addition of 1.5% to 4.5% Superplasticizer severally. It had been found that while not increasing the W/C quantitative relation, the addition of the Super plasticizer exhibits an increase in strength.

Investigation of Performance of Organic Rankine Cycle-Vapor Compression Refrigeration System Using Different Refrigerant
Authors:- M. Tech. Scholar Amjad Fahad Usmani, Prof. Dr. M. K. Chopra

Abstract- In this study, the energy and exergy analysis of a combined cycle was carried out. This cycle consists of an organic Rankine cycle and a vapor compression refrigeration cycle for producing the cooling effect. Four organic fluids were used as working fluids such as R600a, R245fa, RC318 and R236fa. The parametric analysis allowed us to characterize the combined system and to study the effect of some parameters that were used to estimate the thermal and exergy efficiency of the studied system. The results showed that the operating parameters have a significant impact on the performance of the combined system. Due to environmental issues of R600a is recommended as a superior candidate for the ORC-VCR system for retrieving low-grade thermal energy.On the other hand, the results of the exergydestruction distribution showed also that maximum exergy destruction rate is found in R600a and minimum is in RC318.

The Importance of Drone Technology in Nigerian’s Construction Industry
Authors:- Birmah M. Nyadar, Buba Y. Alfred, Audu M. Justina, Dr. Jibrin Sule, Maton D. John

Abstract- Drone is also known as Unmanned Aerial Vehicles (UAVs) are aircrafts that fly without any humans being onboard. They are either remotely piloted, or piloted by an onboard computer. Drones are used for emergency response, inspection of damaged roofs, collapsed buildings, accessing difficult to reach places and many builders / engineers have come to rely on drones for their everyday operations in the developed countries. The advent of new construction technologies did not exterminate the job for construction workers, rather it created a room for workers to acquire skills of the modern technology for the new generation. Drones are not common in Africa and has been grounded in some countries because the governments do not have full understanding of the technology. The professionals in other related fields don’t really have the knowledge of operating drones. The purpose of this paper is to create awareness of drone technology application in the Construction Industry of Nigeria, which the use of drones is not common in Nigeria. Oral interview with the construction workers in Abuja and the use of personal observation and open source materials were part of the methodology. The use of drones save time, reduces cost, allows remote monitoring of construction site, easy accessibility to difficult terrains or sites and reduces risk of human lives to dangerous sites. The Nigerian Construction Industry needs to embrace the use of drones in all project execution for effective job delivery, the Public and the Private sector can invest in the technology where Professions can be trained in drones operation, the engineers with interest in drone technology should establish a drone service / repair center as an avenue for job creation in Nigeria.

Student Performance Prediction using Machine Learning Techniques
Authors:- M. Tech. Scholar Nandini Sahu, Prof. Ashutosh Khemariya, Prof. Aditi Tiwari

Abstract- The capacity to screen the advancement for students’ academic execution is an essential issue of the educational Group from claiming higher Taking in. An arrangement to dissecting students’ comes about dependent upon group dissection and utilization standard measurable calculations with organize their scores information as stated by the level about their execution may be portrayed. In this paper, we also actualized the k-mean grouping algorithm for examining students’ consequence information. Those model might have been consolidated for those deterministic model should dissect those students’ effects of a private foundation clinched alongside % Iberia which is a great benchmark with screen the progression of academic execution about people for higher institutional to the reason for making an successful choice by those academic organizers.

Android Phone Data Security using Special Features
Authors:- M. Tech. Scholar Rumana Nigar Ansari, Prof. Ashutosh Khemariya, Prof. Aditi Tiwari

Abstract-Today, everyone necessarily requires a smart phone. There are tremendous number of possibilities and numerous scopes witnessed in different areas of the mobile world. With this rapid growth in mobile services the researchers are alarmed about the security threats and are working upon it by securing the infrastructures which support the online-interface and other distributed services. Man has embraced mobile phones like a best friend. Among 7 billion people worldwide, around 4 billion smart phones and millions of tablets are in use. A smart phone has various utilizations like taking pictures, watching movies, listening songs, surfing internet, making bank transactions, using social media, calling etc. A smart phone user keeps all his personal and professional data in his phone. These devices are valued immensely as we keep all our records in it. The personal data carried by such mobile devices are very important. These important and sensitive data (account numbers, policy numbers and others) can cause trouble if the device is lost. At present, there are a huge number of populations which recognize the security threat of smart devices and personal computers. Still, many do not realize the everyday threat while accessing their smart devices. As a matter of fact, around 32 percent of the population thinks that they do not require any software for securing their smart phone devices. But this mindset and rising fame of smart mobile devices have attracted cyber crime up to an extreme extent. Over the period of months, the attacks have increased and reached up to 37 percent. This has become the topic of discussion at this hour and several reports have been published for the same. These reports also talk about the susceptibility of the android smart devices. The susceptibility of smart phones is about 99 percent as mentioned by a survey. These personal phones and tablets are actually a type of mini-computers and they are more prone to vulnerability than desktops. Therefore, a mobile user must be very careful about his smart device and install a simple application and put a password to safeguard his data.We discuss about secure android application on android phone. The objective is to provide such services which can secure customers’ android devices. This data security methodology of cell phones is quite novel. In this paper, we discuss about using AES algorithm for handling the data of Android mobile phones.The objective is to provide such services which can secure customers’ data. This data security methodology of cell phones is quite novel.

Zigbee-GSM Based Automatic Meter Reading System
Authors:- Prof. Z.V. Thorat, Shreyas Chaudhari, Siddhant Hajare, Mansi Kamble, Karan Katariya

Abstract-This project is concerned with the electrical board. As the population grows, the number of electric meters is increasing. In India standard meters are widely used to calculate power consumption. Collecting this large amount of data requires extra time and effort. In this way before the bills are made the meter readings are kept by hand in low-level channels, which are time consuming and full of human error. As a result, the consumer always complains about his or her debts. This whole network is full of holes in different categories and cannot be removed or found. To avoid this type of problem, wireless meter reading technology can be used. It also saves staff. Another feature of this meter is that it improves accuracy because it works in real time. It increases the speed of operation because it requires fewer human efforts and especially energy consumption is very low. In this case, the power consumed by the consumer is monitored by low-level channels via a wireless network. In low-level channels, debt is calculated and records are kept. By using this process, we can easily monitor any error in the meter and any interference is used to steal electricity. Eliminates error of any type of data loss during data transfer and acceptance. The main part of the model is “ZigBee”, because it has a lower data rate and therefore uses less operating power. As we know from ZigBee devices, no one can use the data, only authorized person or device can read the data. That is why it is so reliable. Therefore, this model is a test to remove all errors created with standard meters.

Structral Behavior of Concrete Bridge with Soil-Structure Interaction
Authors:- M. Tech. Scholar Neeraj Sansiya, Prof. Sourabh Dashore

Abstract-An iterative plan technique of progressive straight unique reaction investigations that considers the non-direct conduct of the projections brought about by refill soil yielding is created. Likewise, a non-straight static investigation of the extension soil framework is directed. These examinations explore the impacts of the dirt projection association on seismic investigation and plan of vital scaffolds. Past experience and late examination demonstrates that dirt structure collaboration assumes a significant part on the seismic creation of scaffold structures. Projections pull in an enormous segment of seismic powers, especially in the longitudinal course. In this way, investment of refill soil at the projections must be thought of. A plan-driven system to show the projection firmness for either direct or non-straight examination, considering the inlay and the wharf establishment, is introduced. An extension with solid projections is chosen to exhibit the proposed methods. Parametric investigations show that, if the scaffold is examined with the proposed system rather than a basic methodology that disregards refill firmness decrease, the determined powers and minutes at the docks are more prominent by 25%- 60% and the removals by 25%-75%, contingent upon soil properties.

Modern Air Purifier Drone for Control Air Pollution
Authors:- Asst. Prof./HOD Ramya. R, Asst. Prof. Punithavathi. K, Hariharan. M, Karthi. G, Mohamed Al Ameen. H, Vishnuvarthan. U

Abstract-The pollution is presently become very burning issue not only in India but also all over the globe and it is various types, therefore, here, we considered only air pollution for depth discussion. Pollution refers to the release of chemicals or inimical substances including particulates and biological molecules into the earth`s environment which has a very insidious effect on human, animal and plant life. It is a significant risk factor for several pollutions cognate diseases and health conditions including lung cancer, heart diseases, etc. and water react very rapidly to pollutants and will abstract.

Incisive Health Recognizing for Animals
Authors:- Asst. Prof./HOD Ramya. R, Asst. Prof. Dhivya. K, Afra Banu. A, Arthi. P, Kayalpraba. G, Nithya. V

Abstract-In the some cases of emergency, veterinary or pet hospital staff cannot able to treat sick animals immediately as they cannot monitor animals after surgery or recuperating for 24/7. This problem is the leading cause of death in said animals. Therefore, developers have the concept to develop a health monitoring system which keeps tracking the heart rate and temperature of sick animals in veterinary hospital. The web application focuses on the rate of heart rate and temperature. If the heart rate and temperature are abnormal, it will alarm veterinary or pet hospital staff the animal is at risk and needs to be treated correctly. This system can be monitored by recording and analyzing the health information of sick animals, when animals have abnormal heart rate or temperature, they can be treated as soon as possible.

Instinctive Escalation and Surveying System for Farming
Authors:- Asst. Prof./HOD Ramya. R, Ajithkumar. M, Balamurugan. N, Sakthivel. V, Vignesh. S

Abstract-Agriculture plays a crucial role in the Indian economy. It’s not only a food and raw material but also provides employment opportunities. Instead of increasing the scale of agriculture a better way will be implementing smart is precision agriculture technique using IOT. This model can be very effective than the traditional method as risk of crop failure, less yield, excessive water supply or excessive use of fertilizers and pesticides ect. To monitor the environmental factors such as Temperature, humidity, soil moisture etc and help the formers in handling the crops automatically without any manual effort. The yield of any crop can be maximized with the help of precision agriculture by reducing the wastage. The data controlled by the sensor nodes deployed all over the field in sent to the cloud and there the data is analyzed and visualized for the ease of formers. With the help of visualized data formers can take precise and effective decision affecting their crops.

Smart Strike of Fruit Aspect Using SVM Algorithm
Authors:- Asst. Prof./HOD Ramya. R, Asst. Prof. Thaiyalnayagi. S, Mahadevi. M, Sabitha. D, Nithya. L

Abstract-Diseases in fruit cause devastating problem in economic losses and production in agricultural industry worldwide. In this paper, a solution for the detection and classification of fruit diseases is proposed and experimentally validated. The image processing based proposed approach is composed of the following steps; in the first step K-Means clustering technique is used for the image segmentation, in the second step some features are extracted from the segmented image, and finally images are classified into one of the classes by using a Support Vector Machine. Our experimental results express that the proposed solution can significantly support accurate detection and automatic classification of fruit diseases. In the third step training and classification are performed on a SVM. It would also promote Indian Farmers to do smart farming which helps to take time to time decisions which also save time and reduce loss of fruit due to diseases. The leading objective of our paper is to enhance the value of fruit disease detection.

Systematic Perusal of Volder’s Algorithm in Lifescience
Authors:- Asst. Prof. /HOD Ramya. R, Asst. Prof. Sahaya Reshma. M, Gayathri. R, Parkavi. G, Rakshitha. R

Abstract-In medical field, ICA plays an important role. This system reduce the power consumption and memory using Modular multiplication. The proposed approach reduce the circuit area in separating the super-Gaussian source signals. Efficient hardware architectures for modular multiplication, modular inversion, unified point addition, and modular multiplication are proposed. In this system aims to design and implement a very large scale integration [VLSI] chip of the extend Infomax ICA algorithm. Further more, the measurement results show the ICA core can be successfully applied to get output within a minutes.

Solar Power Driven Multifunctional Agribot
Authors:- Asst. Prof. /HOD Ramya. R, Asst. Prof. Lakshmipriya. D, Ajitha. V, Kavipriya. D, Parkavi. B

Abstract-This paper aims to design an agricultural robot, which helps the people to survive where it performs operations such as digging of soil, sowing of seeds, spraying pesticide, cutting grass and ploughing and the detection of obstacles. In previous projects the techniques used were complicated as well as expensive. This AGRIBOT uses the renewable energy i.e. solar energy obtained from solar panel powered battery, it also consists of a visual obstacle detector and a Bluetooth module which is paired with a Bluetooth terminal application through which it is easily controlled and the instructions are given to the AGRIBOT for the operations to be performed. Hence this is a low cost AGRIBOT and is easy to operate without the need to go to the field personally it also helps the farmers to facilitate to ease work by reducing human effort, saving time and energy. By this farming can be done easily in any climatic condition irrespective of day and night. This agribot compared to other robots is very beneficial as it has multitasking functional system and advanced techniques for smart farming.

Image Processing Based Leaf Disease Detection Using Raspberry Pi
Authors:- Dinesh Kumar R, Prema V, Radhika R, Queen Mercy C.A, Ramya S

Abstract-Green plants are very much important to the human environment; they form the basis for the sustainability and long term health of environmental systems. In this project, we have proposed a system using raspberry pi to detect healthy and unhealthy plants & alerts the farmer by sending email. The main objective of this project is detection of diseases at the early stage. We mainly focus on image processing techniques. This includes a series of steps from capturing the image of leaves to identifying the disease through the implementation in raspberry pi. Raspberry pi is used to interface the camera and the display device along which the data is stored in the cloud. Here the main feature is that the crops in the field are continuously monitored and the data is streamed lively. The captured images are analyzed by various steps like acquisition, preprocessing, segmentation, clustering. This turn reduces the need for labor in large farm lands. Also the cost and efforts are reduced whereas the productivity is increased. Automatic detection of symptoms of diseases is useful for upgrading agricultural products. Completely automatic design and implementation of these technologies will make a significant contribution to the chemical application.

Big Data Mining in Internet of Things Using Fusion of Deep Features
Authors:- Faraz Pourafshin

Abstract- Today internet of things is employed in different fields such as security, protection and health care systems. This major attention causes huge amount of information transfer from different nodes in network. Recently, big data mining has become one of the most crucial challenges in IOT. In this paper, a novel method based on deep learning is proposed to mine images which is collected from IOT. The proposed method consists of two parts: 1) Features extraction, 2) classification. Features from a convolutional neural network called Alexnet is extracted to use in data mining process. In classification part, a couple of K Nearest Neighbor (KNN) is employed to process features. Also a majority voting approach is used to find the final result. We evaluated our method by pictures which was captured by MIT University. Experimental results proved that the proposed method has better accuracy and precision in comparison of KNN, SVM, Neural network and Bayesian classifiers.

Electricity Generation by E-Bump
Authors:- Parth Gotawala, Smit Gamit, Kedar Kelawala, Niraj Patil, Punit Suthar, Asst. Prof. Happy Patel

Abstract- This project is designed to use the jerking movement produced by the vehicle while passing the speed breaker and then turns this energy to electricity which then can be used for other purposes. Consequently, a kinetic energy is produced and transferred into electrical power. And the biggest advantage of this type of speed breaker over other speed breakers that produces electricity is that, it is not necessary to dig down the road to install or do the maintenance of the speed breaker. Designing energy recovery systems that are pollution free has become a significant goal.

Sentiment Analysis:Textblob For Decision Making
Authors:- Associate Prof. Praveen Gujjar J, Prof. Prasanna Kumar H R

Abstract- Data is the new oil for the market survey. Internet is the one where it constitute the huge amount of the data in the form of customer reviews, customer feedback etc., TextBlob is one of the simple API offered by python library to perform certain natural language processing task. This paper proposed a method for analyzing the sentiment of the customer using TextBlob to understand the customer opinion for market survey. This paper, provide a result for aforesaid data using TextBlob API using python. The paper includes advantages of the proposed technique and concludes with the challenges for the decision makers when using this technique in their market survey.

Modelling of Arduino Based Pre-Paid Energy Meter Using GSM Technology
Authors:- Asst. Prof. Syed Shajih Uddin Ahmed, Md. Basheer Ahmed, Md. Shahnawaz Khan, Mirza Akif Ali Baig

Abstract- This project presents the design and modelling of Energy recharge system for Prepaid metering. The present system for energy building in India is error prone and also time and labor consuming. Errors get introduced at every stage of energy billing like errors with electro-mechanical meters, human errors and processing errors. The aim of this project is to minimize the error by introducing a new system of Pre-paid energy metering. This will enable the user to recharge his/her electricity amount from or any place by using a GSM Module. We can easily implement many add-ons such as energy demand prediction, real time tariff as a function of demand and so on.

Natural Frequency and Dynamic Stability Region Study
Authors:- Prof. A. K. L. Srivastava, Md Mozaffar Masud

Abstract- The dynamic instability regions are analysed using Hill’s infinite determinants system. The excitation frequency of plates with different boundary conditions, or aspect ratios, was investigated. The results are determined using the bending displacements of plate and stiffener. The results show that the principal excitation frequency regions have a significant effect considering and neglecting in-plane displacements.

Power Generated by Regenerative Braking Systems
Authors:- Yash Bhavsar, Mahaveer Jat, Mrs. Hiral Sonkar, Dr. D. M. Patel

Abstract- Most brakes commonly use friction between two surfaces pressed together to convert the kinetic energy of the moving object into heat, though other methods of energy conversion may be employed as all the energy here is being distributed in the form of heat. Regenerative braking converts much of the energy to electrical energy, which maybe stored for later use. Driving an automobile involves many braking events, due to which higher energy losses takesplace, with greater potential savings. With buses, taxis, delivery vans and so on there is even more potential for economy. As we know that the regenerative braking, the efficiency is improved as it results in an increase in energyoutput for a given energy input to a vehicle. The amount of work done by the engine of the vehicle is reduced, in turnreducing the amount of energy required to drive the vehicle. The objective of our project is to study this new type of braking system that can recollect much of the car’s kinetic energy and convert it into electrical energy or mechanical energy. We are also going to make a working model of regenerative braking to illustrate the process of conversion ofenergy fromoneformto another. Regenerative braking converts afraction amount of total kinetic energy intomechanical or electrical energy but with further study and research in near future it can play a vital role in saving thenon-renewable sources of energy.

Literature Survey on IOT and Machine Learning Based Disease Predictor
Authors:- Charmi Zala

Abstract- The world is moving with a fast speed and in Order to keep up ourselves with the whole world we tend to ignore the symptoms of disease which can affect our health at a large extent. Healthcare is one of the important parts for each human being in the world. Health care is given extreme importance with conspicuous novel corona virus. Spreading of disease such as Covid19 has become a global pandemic due to fast spreading of virus in all the countries. Knowing the current situation Internet of Things (IoT) with machine learning will help a lot in serving the best to healthcare and saving many lives around us. Predicting disease according to the symptoms can reduce unnecessary rush to the hospital. This could help to treat the patient early and save many lives getting affected by different disease and virus. As it is rightly said “prevention is better than cure” so predicting disease can help to prevent the occurrence of disease. The Internet of Things (IoT) is very helpful as it can work with real time data as well as the past data that was recorded earlier. This IoT sends data through Wireless Sensor Network (WSN) to the computational devices so that the result can be generated. Machine learning with help of different prediction algorithm such as Decision tree, Naive Bayes etc can help to predict the disease fast and accurate. IOT and Machine Learning are on trend in medical field as it helps both patient and the doctor. Early prediction leads to save time, cost and prevent humans getting affected by diseases.

IOT Based Disinfection and Sterilization using Temperature and Humidity
Authors:- Asst. Prof. M. Nalina Sangaviya, S. Lakshmanan, M. Pavithra, G. Sasireka, G.Vahini

Abstract- The Project is developed based on the Guideline for Disinfection and Sterilization in Healthcare Facilities, University of North Carolina Health Care System. extrapolates quantitative data for ozone virucidal activity on the basis of the available scientific literature data for a safe and effective use of ozone in the appropriate cases and to explore the safety measures developed under the stimulus of the current emergency situation. Ozone is a powerful oxidant reacting with organic molecules, and therefore has bactericidal, virucidal, and fungicidal actions. At the same time it is a toxic substance, having abverse effects on health and safety. Instead of Ozone system ,here we are proposed Temperature and Humidity based Disinfection and Sterilization system. Proposed system maintaining 37OC and 85% of Relative humidity at Disinfection and Sterilization area. Its use is being proposed for the disinfection of workplaces, public places with particular reference to the COVID-19 pandemic outbreak. Water mist is generated by Ultrasonic based mist maker and Temperature of the room is increased by heater attached with proposed system. It should be injected into the room that is to be disinfected until the desired Humidity and Temperature concentration is reached. After the time needed for the disinfection, its concentrations must be reduced to the levels required for the public safety. Here we are using Node MCU Esp8266 module to transfer status of the system to remote location. Electromagnetic relay is used to turn on and off the Ultrasonic humidifier and Heater.16*2 LCD display is used to display the notification to user side. The developed system improves the reliability and stability of Disinfection and Sterilization.

Testing of Alternative Material for Production of Excavator Bucket Teeth from Scrap using Traditional Methods
Authors:- Sir Elkhatim Mohammed Jumaa Abou Zeid, Izeldin Ahmed Abdalla Babikir, M. I. Shukri

Abstract- Failure of the excavator bucket teeth is commonly overcome either by replacing with a new one which is too expensive or by welding the failure parts with metal that sometimes may have different properties from the original one, which may lead to imbalance cases. This study was conducted to test the modified welding method by fabricating alternative bucket teeth from available engine block scrap, using a sand casting process in a traditional foundry, operated by engine waste oil. The quality and properties of the two bucket teeth (Failure (F) and the Alternative (fabricated from scrap) (A)) were tested under laboratory and field measurements. Type of tests includes hardness, chemical composition, heat treatment, microstructure and field failure rate which had resulted in improving some of its mechanical properties such as hardness and wear resistance after practical application and comparison of the two samples in the study field which was tested after (2232 hrs for the failure) and (2016 hrs for the alternative) after 13 months each. According to the experimental results obtained from laboratory examinations and field measurements, the new alternative product has better properties than the failed one.

Bus Ticket Automation with T Money Card
Authors:- M. Ananthi, M. Gowsalya, S. Pavithra, B. Vaishnavi, AP/CSE P. S. Velvizhi

Abstract- These days the public transportation framework like the metro are all around cutting edge. Traveler wellbeing, accommodation and the need to improve the exhibition of existing public transportation is driving interest for shrewd transportation framework on the lookout. The venture based ticket framework for gathering the transport discovered to be a wellspring of major monetary misfortune. It is hard to guarantee the acquisition of ticket by every single traveler .A paper ticket gets pointless to the travelers when the objective is reached. Indeed, even the check of numerous unsold tickets each day is exceptionally high. In the period of innovation, India should zero in on instilling a robotized framework for gathering transport toll. Consequently, this undertaking proposes a computerized card driven framework utilizing Smart Card and GPS Tracking for transport ventures with the assistance of various stages like web, android, IOT. Various situations concerning the execution of this framework here.

Analysis of Energy Management by Using IOT
Authors:- Manmay Banerjee, Amandeep Dhiman, Prateek Shrivastava, Asst. Prof. Rehana Perveen

Abstract- In present scenario the energy is used at a wide range by all our appliances as well as in our industries the energy consumption is getting higher day by day. Therefore, the energy management done by “EMS” Energy management system to reduce energy consumption by using of smart technology and metering, control system in industries. By using of industry automation and PLC, MATLAB, SCADA controlling system we can interface the energy efficient system. The various opportunities are to control interconnected devices by a pre designed scenario human machine interfacing system is a big achievement in IOT. To support the digital transformation of enterprises and help in energy management the transparency is increases by using latest devices due to the need of systematic improvement and increasing the efficiency we used an industrial automation device and hence they consume less amount of energy. The operational cost is higher in any manufacturing and developing industry and it is also responsible for energy consumption, industrial sector is more uses of energy other than any sector it consumes 54% of the global delivered electricity and in addition, non-energy-intensive manufacturing such as pharmaceuticals and energy-intensive-manufacturing are posed make up 70% of the estimated 228 trillion gross output by 2040. So basically, regardless of energy cost fluctuations and an oil prices, the industrial sector is and will continue to be one of the largest contributors of electricity use.

Bank Locker System Using IOT Concept
Authors:- Saifali Shaikh, Rani Jawale, Rushikesh Kandalkar, Onkar Shinde,Prof. Ganesh Kakade,
Prof.Shrikant Dhamdhere(HOD)

Abstract- The main aim of this project is to develop a device for the bank locker security purpose for alerting theft and to auto arrest the thief in bank itself from centralized monitoring unit and control system using IOT technologies. Even the latest technology such as fingerprint sensor lock can be unlocked with ease. So to overcome this problem , this project suggest the use of Internet of Things(IoT) to provide secure enter only to authorized person. For this we are using Raspberry Pi for capturing image, processing it and then sending it via mail to the user’s email account. The Raspberry Pi captures the image when a person tries to enter the bank locker and then process it and sends it to the user’s email account as picture message. The user can then provide authorization to the Raspberry Pi from his/her email account whether to open or remain it shut.

Word Analysis of Friction Stir Spot Weldments Characteristics Using Different Tools Materials and Shape for Similar and Dissimilar Metals
Authors:- Asst. Prof. Attalique Rabbani, Mohd. Zeeshan, Mohammed Salahuddin, Shaik Amjad

Abstract- Efforts to reduce vehicle weight and improve safety performance have resulted in increased application of light-weight aluminium alloys and a recent focus on the weldability of these alloys. Friction stir spot welding (FSSW) is a solid state welding technique (derivative from friction stir welding (FSW), which was developed as a novel method for joining aluminium alloys). During FSSW, the frictional heat generated at the tool-workpiece interface softens the surrounding material, and the rotating and moving pin causes material flow. The forging pressure and mixing of the plasticized material result in the formation of a solid bond region. The present work investigated the effect Aluminium, Brass and Copper alloy plates are joined by friction stir Spot welding (FSSW) by using EN31 and EN19 Tool material with Circular, Taper thread, Square and Diamond Profile Tools. Profiles with varying welding parameters like with a Rotational speed of RPM, Feed and depth of cut, inclinational angle of the tool.All welded samples are observed by followed by their tensile tests. Mechanical strength of the base material with comparable elongation is achieved in FSSW sample rotation speed and welding speed. Material flow during FSSW using a step spiral pin was studied by decomposing the welding process and examining dissimilar alloys spot welds which allowed a visualization of material flow based on their differing etching characteristics. The movement of upper and bottom sheet material, and their mixing during FSSW were observed.

Secure Data Storage Design for Biomedical Compliance Environments

Authors: Nadeesha Perera, Tharindu Silva, Ishara Fernando, Chamika Weerasinghe

Abstract: Secure data storage in biomedical environments is a foundational requirement for maintaining regulatory compliance, safeguarding patient privacy, and enabling ethical scientific research. As healthcare and life sciences organizations generate and manage vast amounts of sensitive information ranging from electronic health records to genomic sequences the need for secure, resilient, and policy-driven storage architectures has become increasingly urgent. This review examines the technical, regulatory, and operational considerations involved in designing storage systems that align with frameworks such as HIPAA, GDPR, and FDA 21 CFR Part 11. The paper begins by analyzing the classification of protected health information (PHI) and the importance of data sensitivity in biomedical workflows. It explores regulatory mandates related to auditability, legal retention, and chain-of-custody, followed by a detailed examination of the evolving threat landscape, including ransomware and insider attacks. The review compares traditional SAN/NAS models, object-based architectures, and software-defined storage solutions, highlighting their respective roles in compliance-driven deployments. Further sections address critical security practices such as encryption, key management, access control, and data lifecycle enforcement. The integration of secure storage with biomedical systems like PACS, LIMS, and EHRs is evaluated, with attention to secure APIs and auditability. Emerging technologies including confidential computing, blockchain-based integrity tracking, and AI-driven anomaly detection are also explored for their future impact. Through real-world case studies, the review illustrates successful implementations in hospitals, research institutions, and hybrid infrastructures. It concludes with an analysis of common challenges such as vendor lock-in and the trade-offs between compliance and usability. Looking ahead, the paper advocates for zero trust-aligned architectures and adaptive compliance automation as guiding principles for next-generation biomedical storage design.

DOI: https://doi.org/10.5281/zenodo.15847131

Towards Autonomous Wireless Cloud–IoT Systems: Architecture And Risk Perspectives

Authors: Pranita Lohani

Abstract: The rapid growth of Internet of Things (IoT) devices and the increasing reliance on cloud computing have driven the need for autonomous wireless Cloud–IoT systems capable of supporting large-scale, real-time applications. These systems integrate heterogeneous devices, sensors, and networks with cloud-based platforms to enable seamless data collection, processing, and decision-making without significant human intervention. The architecture of such systems typically involves layered structures, including edge computing, fog nodes, and centralized cloud services, to optimize performance, reduce latency, and enhance scalability. Despite these benefits, the deployment of autonomous Cloud–IoT systems introduces substantial risks, particularly in terms of cybersecurity, data privacy, and system reliability. Vulnerabilities in communication protocols, improper access controls, and potential failures in autonomous decision-making mechanisms pose significant challenges. To address these concerns, robust risk assessment frameworks, adaptive security mechanisms, and fault-tolerant architectural designs are essential. Moreover, ensuring interoperability among diverse devices and standards while maintaining energy efficiency further complicates system design. This study explores the architectural models and operational strategies of autonomous wireless Cloud–IoT systems, emphasizing both their functional advantages and potential threats. It examines current methodologies for risk identification, mitigation, and continuous monitoring to achieve resilient and secure operation. By providing a comprehensive perspective on architecture and risk, this work aims to guide the development of reliable, scalable, and secure autonomous Cloud–IoT systems capable of supporting emerging applications in smart cities, healthcare, industrial automation, and environmental monitoring.

DOI: http://doi.org/10.5281/zenodo.18162732

Continuous Risk Scoring In SAP ERP Through Autonomous Learning Algorithms

Authors: Yuvraj Deshmora

Abstract: Enterprise Resource Planning systems, particularly SAP ERP, have become critical tools for organizations seeking to streamline operations, integrate business processes, and manage risks effectively. Traditional risk management approaches in SAP ERP often rely on periodic assessments, static risk scoring, and manual intervention, which may fail to capture emerging threats or changes in operational environments. Continuous risk scoring powered by autonomous learning algorithms offers a transformative approach, enabling real-time identification, evaluation, and mitigation of risks across various business processes. By leveraging machine learning, deep learning, and adaptive algorithms, organizations can continuously analyze transactional, master, and operational data to detect anomalies, predict potential failures, and proactively respond to emerging threats. This review examines the current state of continuous risk scoring in SAP ERP, highlighting the capabilities of autonomous learning algorithms, data integration challenges, practical applications, and potential limitations. Case studies and literature indicate that organizations adopting autonomous risk scoring benefit from improved decision-making, reduced manual oversight, and enhanced compliance with regulatory standards. Furthermore, continuous risk assessment supports proactive management strategies by providing dynamic insights into operational, financial, and compliance risks. The review also identifies future directions, including the incorporation of explainable AI for interpretability, integration with cloud-based SAP systems, and the use of reinforcement learning to enhance predictive accuracy. The findings suggest that continuous risk scoring is not only a technological advancement but also a strategic necessity for organizations aiming to maintain resilience and agility in a rapidly changing business environment. By synthesizing current research and practical implementations, this review provides a comprehensive understanding of how autonomous learning algorithms can revolutionize risk management in SAP ERP. It concludes with recommendations for future research and practical adoption strategies to maximize the benefits of continuous risk scoring.

DOI: http://doi.org/10.5281/zenodo.18162741

AI-Augmented Software Quality Engineering: Data-Driven Risk, Prediction, And Continuous Assurance In Modern Software Systems

Authors: Ramani Teegala

Abstract: By April 2021, software quality engineering was under increasing pressure from the combined effects of accelerated release cadences, widespread adoption of microservices, and the operational realities of cloud-native deployments. Banking and other regulated industries faced a particularly acute version of this tension: delivery speed had become a competitive requirement, yet failures carried outsized consequences in customer harm, financial loss, and regulatory exposure. In this context, conventional quality practices such as manual test authoring, rule-based static analysis, and human-driven code review remained necessary but frequently insufficient to scale with system complexity. The problem was not that these practices were ineffective in principle, but that they depended heavily on human attention and stable system boundaries, both of which were increasingly scarce in modern delivery pipelines. AI-augmented software quality refers to the application of machine learning and statistical techniques to improve the effectiveness, coverage, and timeliness of quality controls across the software lifecycle. Unlike general automation, which executes predefined checks, AI-augmentation aims to learn from historical artifacts such as defects, test outcomes, telemetry, and code change patterns in order to anticipate risk and prioritize interventions. By 2021, the software engineering community had accumulated substantial research and industry experience in areas such as defect prediction, anomaly detection in operational metrics, automated test prioritization, and mining software repositories. These approaches did not eliminate the need for engineering judgment or rigorous testing, but they offered a way to focus limited quality effort on the changes, components, and execution paths most likely to fail.Within regulated domains, AI-augmentation for quality must be evaluated through constraints that are distinct from those of consumer software. Quality signals and decisions often need to be explainable, auditable, and reproducible, especially when they influence production readiness, control effectiveness, or incident management. Data used for training and inference can include sensitive operational and development artifacts, requiring governance controls comparable to those used for security and compliance data. Moreover, quality failures in financial systems tend to cluster around concurrency, distributed consistency, configuration drift, and integration boundaries, meaning that a quality system must reason not only about code-level correctness but also about system-level behavior under partial failure. AI methods applied without regard to these constraints risk producing brittle signals that cannot be operationalized, trusted, or defended during audit and post-incident review. This paper examines AI-augmented software quality as understood and practiced by April 2021, with particular attention to how such techniques integrate into modern delivery pipelines and operational feedback loops. It synthesizes research in software analytics, defect prediction, test optimization, and anomaly detection, and it situates these methods within the architectural trends that shaped software systems from 2000 through 2021. The paper proposes a conceptual model in which AI-driven signals complement, rather than replace, established quality controls, and it describes a layered architecture that connects development artifacts, CI/CD execution data, and production telemetry into a cohesive quality intelligence capability. Special attention is given to the interactions between AI-generated quality signals and governance requirements common in regulated environments, including traceability, change control, and evidence preservation. The analysis further explores the practical trade-offs associated with AI-augmented quality, including data quality and labeling challenges, feedback delays, model drift under frequent system change, and the risk of embedding organizational biases into automated decision-making. It evaluates these challenges alongside potential benefits such as earlier risk detection, more efficient test allocation, and improved incident prevention. By framing AI-augmentation as an engineering discipline grounded in measurable outcomes and controlled deployment practices, the paper aims to provide a historically accurate and technically rigorous account of how machine learning techniques can strengthen software quality programs as of April 2021, without relying on later generative AI developments or post-2021 tooling assumptions.

DOI: https://doi.org/10.5281/zenodo.19100296

AI-Powered Network Observability Systems

Authors: Dmitry Kuznetsov

Abstract: The escalating complexity of modern network infrastructures, characterized by the convergence of multi-cloud environments, microservices, and massive IoT deployments, has pushed traditional network monitoring beyond its structural limits. Traditional monitoring, which relies on static thresholds and reactive alerting, fails to provide the deep "internal state" visibility required for modern digital resilience. This review examines the paradigm shift toward AI-powered network observability systems. Unlike traditional monitoring, observability leverages high-cardinality telemetry data—including logs, metrics, and traces—to enable the "Unknown-Unknown" discovery of system behaviors. By integrating Artificial Intelligence (AI) and Machine Learning (ML), these systems transition from simple data aggregation to "Cognitive Insight" engines. We categorize the core methodologies of AI-driven observability, including the use of unsupervised learning for real-time anomaly detection, Graph Neural Networks (GNNs) for mapping relational topologies, and Natural Language Processing (NLP) for parsing unstructured log telemetry. This article explores how these systems automate Root Cause Analysis (RCA) and enable "Self-Healing" network architectures. Furthermore, the review addresses critical challenges, such as the "Data Silo" problem, the computational overhead of real-time inference at the network edge, and the necessity for Explainable AI (XAI) to foster operator trust. By synthesizing recent breakthroughs in Deep Learning and AIOps, this paper provides a strategic roadmap for building "Autonomous Observability" frameworks. The findings suggest that AI-powered observability is the foundational technology required to manage the invisible complexity of the 6G and hyper-connected era, ensuring that network operations move from reactive troubleshooting to proactive, foresight-driven optimization.

DOI: https://doi.org/10.5281/zenodo.19492433

Machine Learning For Network Anomaly Detection In High-Speed Networks

Authors: Andi Pratama

Abstract: The unprecedented escalation in global data traffic, driven by 5G expansion, hyperscale cloud computing, and the Internet of Things (IoT), has fundamentally altered the threat landscape for high-speed networks. Traditional Network Intrusion Detection Systems (NIDS) that rely on manual signature matching or basic statistical thresholds are increasingly incapable of processing traffic at terabit-per-second scales, leading to significant visibility gaps. This review examines the paradigm shift toward Machine Learning (ML)-based anomaly detection as a solution to the "data deluge" in high-speed environments. By focusing on flow-level metadata and statistical behavioral patterns rather than computationally expensive deep packet inspection (DPI), ML models can identify malicious intent within microseconds. We categorize current methodologies, ranging from unsupervised clustering for zero-day discovery to deep learning architectures like Convolutional Neural Networks (CNNs) for spatial traffic analysis and Long Short-Term Memory (LSTM) networks for temporal sequence modeling. This article explores how these models mitigate "alert fatigue" by providing high-precision filtering of benign noise while identifying subtle "low and slow" adversarial tactics. Furthermore, the review addresses the critical challenges of real-time inference at the network edge, the necessity for model quantization to fit within limited hardware buffers, and the emerging risk of adversarial machine learning. By synthesizing recent academic breakthroughs and industrial implementations, this paper provides a strategic roadmap for building "Cognitive Defense" systems. The findings suggest that ML-integrated anomaly detection is the only viable mechanism for maintaining network resilience and integrity in an increasingly automated and high-velocity digital ecosystem.

DOI: https://doi.org/10.5281/zenodo.19492447

Published by:

Google Scholar Journals

Uncategorized

Know the Process of Selecting Compatible Google Scholar Journals

Submit Paper Now

Article Processing Charges

Finding the right journal from the Google scholar journal list is not an easy task. Only a genuine and appropriate audience can understand the importance of your research. But many researchers get depressed and finally publish a paper in any journal in lieu to get at least their paper to publish but this is a wrong strategy. Due to their particular act, they lose the impact that their research would lose. IJSRET would like to mention some important parameters that every researcher should check in a journal before he wishes to publish their paper there.

Stay Away from Predators and Advertisements 

These days as the researchers are more and more eager to publish their papers many journals are taking advantage of their condition and taking high charges from them for publishing their work. You have to stay away from them as they would try to contact you or advertise their services on the internet. It is very easy to start a journal and it just needs a domain, a registration and a well-built impressive website to attract the researchers. You should stay away from all such journals and find quality Google Scholar Journals.

Never get confused with Impact Factor of any Journal

Many researchers often get impressed by knowing the impact factor of any journal. By this, they measure the prestige of any journal and wish to publish their paper in such journals. You should also know the fact that the impact of any journal is different for different areas of study. For example, a journal having an excellent impact on electronics research but can have an average or poor impact in the medical domain. So you should check that the journal that you have selected has a high impact factor in that particular area in which your research lies. These were some of the common ways to determine good Google Scholar Journals.

Published by:

Journal of Advanced Scientific Research

Uncategorized

A Guide to How to Select the best journal of advanced scientific research

It is a difficult task to select a journal of advanced scientific research after a researcher has completed his laborious work. The process is complex because one has to seek such a journal that matches his domain of work. One should also check the expectation level of the journal before submitting also. IJSRET would like to guide such researchers in selecting a suitable journal-

Submit Paper Now

Article Processing Charges

Tips to Select journal of advanced scientific research

# Make a List of Available journals

It is necessary to develop some knowledge about the journals available as per your requirement or that lies in your research area. You can consult your friends, colleagues, or professor for this or can browse through the internet.

# Know the Journal Impact

The rank of the journal and its readers play an important role in determining the impact of any journal. Submitting your paper in a low-impact journal will degrade the quality of your research and your work will not be visible to the audience that you wished for. Visiting the website of your selected journal will provide you with such information about the journal.

# A Journal Should Match your need

The subject area which the journal covers is also one of the important factors that one should look for. This helps in finding suitable readers who will admire your work. Also, you should check their editorial policies and the practices which the journal follows along with their reviewing process and the time they take for publication. For this, you have to check the instructions that they give to authors and it is present in nearly all the journals on their website.

After you have completely satisfied with any journal of advanced scientific research, you can proceed further with the publication process.

Published by:

Journal of Materials Science

Uncategorized

Importance of Journal of Material Science 

Scholars working in the field of material science really work hard, as preparing samples is a tough task. Chemical composition of different materials for specific product requirement is a deep study of science.  We would like to share some of the advantages of choosing this field to make the researchers realize this unique and trending field. As the name suggests it is the study of properties of material and knowing its boundaries in different environmental conditions so that one can profitably use such products in day-to-day application.

Submit Paper Now

Article Processing Charges

Advantages of Choosing Material Science as a Subject

  • It is an interesting area of study and also contains multiple disciplines within it
  • There is a lot of potential in this area as per job and career is concerned
  • Researching in the material science field will lead to better career growth and chances to settle abroad.

Material science is all about knowing the property of the material or creating new material from the current to help in the advancement of science. Industries these days are falling short of researchers of material science and often look for a capable researcher who helps them by providing them with advanced knowledge. There are many sub-branches of material science in which one can proceed with the research. For example materials in electronics where one can proceed to study the behavior of silicon chips, transistors, etc, and manipulate the materials to make their products better. In short, the subject is best in itself and no one can deny this.

 IJSRET is one of the best journals of materials science in which researchers can easily publish their work without any problems as we provide fast and reliable service to our customers.

Published by:

Peer Reviewed Journal List

Uncategorized

IJSRET is one of the leading journals in peer reviewed journals list in India. It accepts work from several engineering scholars, researchers, lecturers, and subject experts. Journal provides both free and paid publication process on several subjects such as civil, mechanical, electronics, machine learning, etc. Through the journal, authors can maximize the chance to get their work read by the new audience in the entire world.

Submit Paper Now

Article Processing Charges

Advantages of Publishing in peer reviewed journal:

  • It is a good way to get your work checked by experts so that you will get aware of the validity of your work.
  • It also provides you with feedback reports by which you can learn about the improvement that can be done on the research paper before publication.
  • Sometimes there is a multi-level of peer reviews that give their expert reviews in some of the peer reviewed journals list in India, which is further better to improve the quality of the paper.
  • Majority of researchers voluntary likes to publish their work in such peer reviewed journal to authenticate their work.

Apart from the advantages, there are some disadvantages with such peer-review process such as-

  • It causes a delay in collecting the shreds of evidence related to research to authenticate a paper
  • It is a time-consuming process and causes a delay in the publication of any research paper.
  • It is not 100% effective as several journals have a low standard of the peer review process and they can publish a low-quality paper by mistake.

Many journals often charge more money just for the reason they had a peer review committee.

Published by:

IJSRET Editorial Board Member Dr. Jeyalakshmi Poornalingam

Uncategorized
Dr. Jeyalakshmi Poornalingam

Affiliation Assistant Professor of English, V.O.C. Agricultural College and Research Institute, Tamil Nadu Agricultural University, Killikulam, Vallanad, India
Email-Id: poornalingamjeyalakshmi@gmail.com
Publication:

Books:

  • Humanism: Amitav Ghosh. Chennai, India: Emerald Publications, 2015.
  • Time and Space: Amitav Ghosh. Chennai, India: Emerald Publications, 2014.
  • A Call for Student Centred Syllabus: A discrepancy Model of Investigation and
    Syllabus Designing Chennai, India: Emerald, 2014.

Papers:

  • Poornalingam, J. (2023). Assessing language acquisition behavioral patterns in adults. The Literary Herald, 9(3).

  • Elenchezhian, T., Senthilnathan, S., Kalirajan, V., Jeyalakshmi, P., Rajendran, T., Prahadeeswaran, M., Kiruthika, N., Parimalarangan, R., & Karthick, V. (2023). A study on income, expenditure and resource use pattern of paddy in Tiruvannamalai district. International Journal of Plant and Soil Science.

  • Elenchezhian, T., Senthilnathan, S., Kalirajan, V., Jeyalakshmi, P., Rajendran, T., Kiruthika, N., Prahadeeswaran, M., Karthick, V., & Parimalarangan, R. (2023). Estimation of income, expenditure and resource use pattern of groundnut in Thandrampattu block of Tiruvannamalai district. Journal of Experimental Agriculture International.

  • Elenchezhian, T., Senthilnathan, S., Rajendran, T., Kalirajan, V., Jeyalakshmi, P., Kiruthika, N., Prahadeeswaran, M., Parimalarangan, R., & Karthick, V. (2023). Analysis of income, expenditure and resource use pattern of sugarcane in Tamil Nadu. Journal of Experimental Agriculture International.

  • Senthilnathan, S., Elenchezhian, T., Mathiyazhini, M., Ravishankar, M., Aliya, S., Aravindrajan, S., Ranjith, P. J., Jeyalakshmi, P., Kiruthika, N., Parimalarangan, R., Karthick, V., & Rajendran, T. (2023). Growth performance of groundnut in India—An instability and decomposition analysis. Asian Journal of Agricultural Extension, Economics & Sociology, 41(12), 350–356.

  • Elenchezhian, T., Senthilnathan, S., Kalirajan, V., Jeyalakshmi, P., Rajendran, T., & Kiruthika, N. (2023). Area, production and productivity of rice in the world, India, and Tamil Nadu. Agrigate.

Published by:

where can I publish my research paper

Uncategorized

Research publish journals is a medium to get worldwide access to your paper. Your paper will be reviewed by several experts throughout the world. So if you are thinking of where can I publish my research paper for free here are some of the answers to it. Choosing the right journal is important and gives a huge impact on your work. Choosing a journal that is not relevant to your work will fail all your months and years of hard work. Before publishing your paper it is better to follow these steps

  • Get your paper to cross-check by some colleague, friend, or professor to eliminate the typo, grammatical, spellings, and punctuation errors
  • After this revise your paper again according to the comments made by your reviewers
  • Prepare a manuscript according to the chosen journal’s needs and requirement
  • Now if you feel everything is done submit your paper
  • You have to be patient and never panic after you have submitted your journal and are waiting for approval

Submit Paper Now

Article Processing Charges

where can I publish my research paper?

IJSRET is one of the leading publications Journal and answers the question of where can I publish my research paper in INDIA, they will meet all your requirements. We offer paper publishing services to researchers, scholars, students, etc at a nominal cost. We also solve the queries of our customers as we have 24*7 chat support. Here some of the domain from which we publish the paper-

  • Electronics
  • Computer Science
  • Civil
  • Machine Learning,
  • Nanotechnology
  • Civil
  • Electrical Topics
Published by:

AI-Enabled Secure Monitoring of Computer Vision Data in 5G IoT-Based Healthcare Systems

Uncategorized

AI-Enabled Secure Monitoring of Computer Vision Data in 5G IoT-Based Healthcare Systems
Authors:- Research Scholar Ms. Komal Garg, Professor Dr. Narender Kumar

Abstract:- The integration of 5G-enabled IoT networks has significantly transformed the healthcare sector, enabling real-time monitoring, data collection, and advanced diagnostics through the Internet of Medical Things (IoMT). This study investigates the application of artificial intelligence (AI) models for securing sensitive patient data in IoMT networks, addressing the escalating threats of cyberattacks and privacy violations. By leveraging historical datasets, the research develops an AI-driven framework for anomaly detection and threat classification, optimizing data security through federated learning, encryption, and adaptive defences. The results demonstrate the model’s exceptional performance, with accuracy rates exceeding 99% across various threat scenarios and robust anomaly detection capabilities validated through real-world simulations. Additionally, the framework achieves a high AUC score of 0.999, showcasing its reliability and precision in securing IoMT networks. These findings underscore the efficacy of the proposed approach in mitigating security risks, enhancing system reliability, and ensuring the seamless operation of smart healthcare systems. This work highlights the critical role of 5G and AI technologies in creating robust, secure, and scalable IoMT ecosystems, contributing to improved healthcare accessibility and patient outcomes.

DOI: 10.61137/ijsret.vol.7.issue1.192

Published by:
× How can I help you?