Category Archives: Uncategorized

Creational Design Patterns for Dynamic Device Management in IoT Biometrics

Uncategorized

Creational Design Patterns for Dynamic Device Management in IoT Biometrics
Authors:- Dr. Vinayak Ashok Bharadi

Abstract:- This paper investigates the application of creational design patterns—specifically the Singleton and Factory patterns—in Java-based IoT frameworks for managing biometric devices. The study builds on Ramakrishna Manchana’s 2019 research on design patterns, demonstrating how these patterns can enhance scalability, modularity, and flexibility in IoT systems dealing with multimodal biometric data. By employing a dynamic configuration model, the proposed framework enables efficient device management and secure data processing, ensuring adaptability to evolving IoT requirements.

DOI: 10.61137/ijsret.vol.5.issue6.576

Published by:

Scaling Financial Data Warehouses with AI: Towards a Future-Proof Cloud-Based Ecosystem

Uncategorized

Scaling Financial Data Warehouses with AI: Towards a Future-Proof Cloud-Based Ecosystem
Authors:- Srinivasa Chakravarthy Seethala

Abstract:- In the financial sector, the scale and complexity of data have increased exponentially, pushing legacy data warehousing solutions to their limits. Cloud-based architectures, when combined with artificial intelligence (AI), provide financial institutions with future-proof, scalable data management solutions capable of processing massive datasets for real-time insights and predictive analytics. This paper examines how AI and cloud technologies are revolutionizing financial data warehouses, enabling institutions to scale their data assets and create future-proof ecosystems. We explore the synergies between AI, cloud computing, and advanced data warehousing techniques and how they are reshaping the landscape of financial data management and analysis. This article highlights the benefits of AI-driven ETL processes, real-time analytics, and scalable storage, while examining the security, compliance, and operational efficiencies achieved in a cloud-based financial ecosystem.

DOI: 10.61137/ijsret.vol.5.issue6.575

Published by:

Designing End-to-End Observability Architectures For High-Reliability .NET Cloud Applications In Production Environments

Uncategorized

Authors: Hema Latha Boddupally

Abstract: The increasing operational complexity of cloud-hosted .NET applications has elevated the need for observability architectures that extend beyond basic monitoring and support sustained reliability in production environments. As systems evolve toward distributed service models, traditional approaches centered on isolated logs or infrastructure metrics often fail to provide sufficient insight into runtime behavior, failure propagation, and performance degradation. This work examines the architectural design of end-to-end observability for high-reliability .NET cloud applications, focusing on how structured telemetry, correlation mechanisms, and operational feedback loops can be systematically integrated into production systems. The study adopts an architectural and design-oriented methodology, combining decomposition of observability layers with scenario-driven analysis of real-world operational conditions. It analyzes how logs, metrics, and distributed traces can be aligned with application boundaries, dependency interactions, and reliability objectives to support faster diagnosis, reduced mean time to recovery, and improved operational confidence. The findings indicate that observability treated as a first-class architectural concern enables clearer visibility into execution paths, more effective alerting strategies, and stronger alignment between development and operations practices. By articulating a reference architecture, instrumentation patterns, and operational workflows suitable for enterprise .NET environments, the work contributes a structured framework for building production-grade observability capabilities. The implications extend to teams responsible for maintaining mission-critical cloud services, offering practical guidance for designing systems that remain transparent, diagnosable, and dependable under continuous change and operational pressure.

DOI: http://doi.org/10.5281/zenodo.18042689

Published by:

MICROFINANCE: A SCIENTIFIC REVIEW OF SCOPE, PRACTICES, AND IMPACTS

Uncategorized

Authors: Anjanappa. T

Abstract: Microfinance has emerged as a powerful tool to combat poverty, stimulate economic development, and enhance financial inclusion across the globe. Originating as an innovative mechanism to extend small loans to the marginalized poor, particularly women, microfinance institutions (MFIs) have grown to encompass a wide array of financial services including savings, insurance, and capacity building programs. This paper examines the theoretical foundations and practical applications of microfinance, highlighting its importance, merits, and demerits. The discussion explores how microfinance empowers low income households, creates opportunities for entrepreneurship, and reduces dependency on informal moneylenders. Nevertheless, challenges such as high interest rates, over-indebtedness, and sustainability issues remain pressing concerns. Recent developments, including digital microfinance platforms, mobile banking integration, and micro-insurance schemes, demonstrate the sector’s adaptation to evolving socioeconomic realities. Applications are examined within rural and urban settings, emphasizing their transformative role in poverty alleviation, women’s empowerment, and inclusive development. Limitations such as operational inefficiencies, regulatory bottlenecks, and the mixed evidence of long term poverty reduction are critically analyzed. Through a synthesis of related literature and case based evidence, this study contributes to the broader understanding of microfinance as both an opportunity and a challenge in global development.

Published by:

Corporate Social Responsibility: A Contemporary Perspective

Uncategorized

Authors: Anjanappa. T

Abstract: Corporate Social Responsibility (CSR) has emerged as one of the most influential paradigms shaping the relationship between businesses and society. Once regarded as a voluntary philanthropic practice, CSR today is increasingly recognized as a strategic tool that integrates ethical responsibility, sustainability, and long-term value creation into business operations. This paper explores the conceptual foundations of CSR, its growing importance in the global economy, and the associated merits and demerits. Special emphasis is given to recent developments, including the integration of CSR with Environmental, Social, and Governance (ESG) standards, legal mandates such as India’s Companies Act (2013), and the shift towards stakeholder centric models of corporate accountability. The paper also discusses the challenges of CSR implementation, critiques such as green washing, and the evolving expectations from corporations in the post-pandemic world. Drawing on theoretical frameworks and case studies, the article argues that CSR is no longer peripheral but central to corporate sustainability and competitiveness. The findings highlight that companies engaging meaningfully in CSR are better positioned to build trust, enhance brand equity, and contribute to achieving Sustainable Development Goals (SDGs).

Published by:

IJSRET Volume 5 Issue 5, Sep-Oct-2019

Uncategorized

Suitability and Performance of Bubble Deck Slab: A
Review

Authors:- Victor Osaze Francis

Abstract:- Slabs are of extreme importance in any structural construction, as they are primary members. However, about 80% of the concrete in the middle of conventional solid slab are of little structural importance. Bubble deck slab (also known as voided slab) is a phenomenon that removes the structurally-inefficient concrete in the middle of slab by replacing it with high-density spherical plastic balls. This solution will solve the problems of high cost, shorter span, longer construction duration, and environmental pollution associated with the use of traditional slab. This review study investigates how bubble deck slab compares with traditional solid slab in everyday use, under loading condition, and consequently making informed recommendations to minimize the inadequacies of the bubble deck slab system.

A Secure Iot Communication against Reactive Jamming Attack in CRN Subtitle
Authors:- Nitesh Yadav, Dr. Abhishek Bhatt

Abstract:- The number of nodes or IoT devices is sense and control the communication. The primary users are more trustworthy than the secondary users, since these are authorized or licensed users. The purpose of CRN is to intellect the spectrum band and identify the free channels which will be used for un-authorized access user or attacker that flooded the unwanted packets to next node or destination node in network. CRN get better the efficiency of spectrum handling, but it also performance degrades due to new security threats with jamming attacks during the spectrum sensing process, which can corrupt the effectiveness of spectrum sensing. In this research we proposed security scheme against packet flooding Jamming attack. The performance is vitiated in high, medium and low jamming probability and applies the proposed scheme to reduces the flooding. The hop count value based on forward and reverse mechanism of detection and provides secure communication in IoT CRN . The reliability of link is equivalent from the forward and reverse path consistency i.e. more in proposed security scheme as compare to with Batch based SA-MAC scheme. The proper packet forwarding in particular link and the reverse and forward is counted properly but correctly, current node are in suspicious. The record value of hop count is based on the packets receiving but heavy flooding is also disturb it at starting connection establishment procedure.

A Review on Efficient Approach for Scheduling Tasks in Cloud Computing Environments
Authors:- Anjali Kumari, Manoj Lipton

Abstract:- Nowadays, Cloud computing is widely used in companies and enterprises. However, there are some challenges in using Cloud computing. The main challenge is resource management, where Cloud computing provides IT resources (e.g., CPU, Memory, Network, Storage, etc.) Based on virtualization concept and pay-as-you-go principle. The aim of this proposed algorithm is to minimize the completion time and cost of tasks, and maximize resource utilization. The performance of this proposed algorithm has been evaluated using Clouds toolkit. It schedules the entire task within a particular deadline while increasing the system performance. The cloud-sim simulator is used for evaluating the task scheduling like file uploading. In this module we have to initialize the performance of this proposed algorithm has been evaluated using Cloud Sim toolkit. It schedules the entire task within a particular deadline while increasing the system performance. Here we propose a VM Placement aims to distribute the dynamic workload smoothly to all the hosts in the cloud to gain an improvement in both the utilization of Resources and the speed of execution time. It allocates the incoming tasks to all available VMs. In order to achieve balancing and avoid congestion.

A Review on Parametric Study and Optimization of H-Type Finned Tube Heat Exchangers using Taguchi Method
Authors:- M.Tech. Scholar Ankit Raj, Asst. Prof. Brijendra Kumar Yadav

Abstract:- In order to improve the heat exchange efficiency and extend surface heat transfer, H-type finned tubes have been widely used in boilers and waste heat recovery in recent years. H-type finned tubes are derived largely from rectangle finned tubes. Because of their unique groove structure on the fin surface, H-type finned tubes have excellent anti-wear and anti-fouling performance.

Parametric Study and Optimization of H-Type Finned Tube Heat Exchangers using Taguchi Method
Authors:- M.Tech. Scholar Ankit Raj, Asst. Prof. Brijendra Kumar Yadav

Abstract:- Fin and- tube heat exchangers are the typical equipment with extended surface and widely used in many engineering applications, such as air conditioning units, compressor intercoolers, boiler economizers, etc. Heat exchangers are widely used in various industries, such as space heating, refrigeration, air conditioning, power stations, chemical plants, petrochemical plants, petroleum refineries and waste heat recovery process. A heat exchanger is a device used to transfer heat between one or more fluids, which may be separated by a wall to prevent mixing or may be in direct contact. In this study, a parametric study is performed to investigate the effects of geometric parameters on the heat transfer characteristic and the flow friction characteristic of H-type finned tube heat exchangers. The effectiveness of various parameters on the objectives is evaluated and the geometric structure of the H-type finned tube is optimized for the best performance using Taguchi method. The results show that fin height, transversal tube spacing and longitudinal tube spacing is statistically significant to the flow performance characteristics of the H-type finned tube. Hence, these three parameters must be firstly considered and paid more attention during the design and optimization of H-type finned tube heat exchangers. Analysis of variance also further validates that intuitive analysis is correct.

Review Thermal Performance Enhancement of Double Pipe Heat Exchanger With Wavy
Authors:- Research Scholar Kundan Kumar, Asst. Professor Sujeet Kumar Singh

Abstract:- In present study, wavy-tape inserts are introduced to help establish swirl flow inside a straight pipe. Three-dimensional models will be created to simulate the flow and heat transfer characteristics inside the pipe with wavy-tape inserts. CFD simulation will be carried out to investigate the effects of different tape angles on the thermal-hydraulic performance of pipe. The effect of wavy strip tabulators with different angles on the NU, friction factor and thermal performance enhancement factor of double tube heat exchanger was studied.

Thermal Performance Enhancement of Double Pipe Heat Exchanger with Wavy Tape
Authors:- Research Scholar Kundan Kumar, Asst. Professor Sujeet Kumar Singh

Abstract:- CFD simulation will be carried out to investigate the effects of different tape angles on the thermal-hydraulic performance of pipe. The effect of wavy strip tarbulators with different angles on the NU, friction factor and thermal performance enhancement factor of double tube heat exchanger was studied. The configuration, gain in heat transfer augmentation, cost in pressure loss, generated swirl flow character, heat transfer enhancement mechanism, optimal geometric parameters and overall thermal hydraulic performance of wavy-tape are successively expounded in this work. It was seen that the results obtained from the simulation for the plain tube are in a good agreement with those predicted by the standard correlations. It is noted that, in this case the discrepancy between the results is less than 9% for Nusse. lt number and 11% for the friction factor. The wavy-tape induces significant swirl flow inside the pipe. Particularly, pairs of tangential vortices are generated on the flanks of the tape. These vortices break the thermal boundary layer and intensify the fluid advection, which consequently lead to highly localized heat transfer enhancement on the pipe surface.

A Review on Optimization of Heat Transfer in Six-Start Spirally Corrugated Tubes using Taguchi Method
Authors:- M.Tech. Scholar Sanjoo Sahani, Professor Poonam Kumar Agade

Abstract:- Heat transfer devices have been used for conversion and recovery of heat in many industrial and domestic applications. Over five decades, there has been concerted effort to develop design of heat exchanger that can result in reduction in energy requirement as well as material and other cost saving. Heat transfer enhancement techniques generally reduce the thermal resistance either by increasing the effective heat transfer surface area or by generating turbulence. Sometimes these changes are accompanied by an increase in the required pumping power which results in higher cost. The effectiveness of a heat transfer enhancement technique is evaluated by the Thermal Performance Factor which is a ratio of the change in the heat transfer rate to change in friction factor.

Optimization of Heat Transfer in Six-Start Spirally Corrugated Tubes using Taguchi Method
Authors:- M.Tech. Scholar Sanjoo Sahani, Professor Poonam Kumar Agade

Abstract:- In this study, a parametric study is performed to investigate the effects of geometric parameters on the heat transfer characteristic, the flow friction characteristic and overall thermal-hydraulic performance of corrugated tube heat exchangers. The effectiveness of various parameters on the objectives is evaluated and the geometric structure of the corrugated tube is optimized for the best overall thermal-hydraulic performance using Taguchi method. The geometric parameters considered in the model include corrugation height and corrugation pitch. The results show that corrugation height have dominant influence on heat transfer characteristic with contribution ratios of 74.79% respectively while corrugation pitch has minor effects.

Development of Fluid Transfer System (FTS)
Authors:- Abutu Joseph, Oluleye, Atinuke Modupe, Oladosu, Lekan Temidayo, Emmanuel, Abakpa James, Lawal, Albert Sunday

Abstract:- In this study, a fluid transfer system was developed using standard design procedure outlined in literatures. The effect of viscosity on the flow rate of a fluid (water) from different sources was also investigated. The development of the system involved design calculations, fabrication of metal base as well as tank guides. Similarly, plumbing of the system was done using polyvinyl chloride (PVC) pipes, gates valves, other pipe fittings and a centrifugal pump. The Reynolds number and the fluid pressure drop was also determined to investigate the nature of fluid flow through the system and the pressure drop in the motion of the transferred fluid respectively. The results showed that the flow through the system is turbulent since the Reynolds number (Re) 4000 (Re = 9160) while fluid pressure drop results indicate that there was more drop in fluid pressure at the longer lengths of pipe compared to the shorter ones. Testing of the system was also conducted sing three sources of water (rain, tap and stream) and the experimental result revealed that rain water has a higher volume flow rate compared to other sources of water with stream water having the least rate of flow.

Human Engineering in Tractor Design- A Review
Authors:- Lecturer, Anil Kumar

Abstract:- In India agriculture is one of the important sectors which provide local employment and have significant contribution in our GDP. The large population in our country needs various types of food and other agriculture products. As the land available with the country for cultivation is limited therefore in order to increase agriculture output we should make best use our available cultivable land using farm equipment’s and implements. Tractor is one of the main reasons which helped to increase productivity of farming sector reducing dependency of our farmers on animals for tillage and irrigation activities. Tractor was one of the main components which helped in making India self-sufficient in producing food items for its large population and creating green revolution in our country. Unwanted accidents involving farm equipment and machinery especially involving tractors continue to happen. One of the reasons for these accidents is driver fatigue and non-implementation of human factors while designing tractors. There are many human factors which enhance the use of tractor in farming activities without any troubles to the driver/ Operator making it easy to use.. This paper will explain the details of those human factors which need to be taken care while designing a tractor.

K-Fold Cross-Validation Machine Learning Approach on Data Imbalance for Wireless Sensor Network
Authors:- Mandvi Tripathi, Ankur Taneja

Abstract:-Machine learning is used to teach machines how to handle the data more efficiently. Sometimes after viewing the data, we cannot interpret the pattern or extract information from the data. In that case, we apply machine learning with the abundance of datasets available. The purpose of machine learning is to learn from the data. Many studies have been done on how to make machines learn by themselves. Data imbalance problem become greatest issue in for machine learning algorithm. Imbalance problem occur where one of the two classes having more sample than other classes. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The minority samples are those that rarely occur but very important. There are different methods available for classification of imbalance data set which is divided into three main categories, the algorithmic approach, data-pre-processing approach and feature selection approach. We will apply on wireless imbalance data to identify correct information. In this research work systematic study for define which gives the right direction for research in class imbalance problem. After apply our K-fold cross validation Technique for imbalance to balance data and a random forest algorithm a classification approach for balanced data we achieved a good accuracy rate percentage.

Comparative Analysis of Multi Leaf Spring and Composite Leaf Spring using Finite Element Method Under Static Loading Condition
Authors:- M. Tech. Scholar Narendra Kumar Verma, Asst. Prof. Mukesh Hemnani, Rakesh Sharma

Abstract:- The work is carried out on the front end multi leaf spring of a commercial vehicle. In this analysis the conventional steel leaf spring is tested for static loading condition and results are compared with a virtual model of composite multi leaf spring. The material used for conventional steel leaf spring is 65Si7 (BIS) and for composite leaf spring E-Glass/ Epoxy. The CAD model of the multi leaf spring is prepared in Solid works 16 and analyzed using ANSYS 16. The FE analysis of the leaf spring has been performed by discretization of the model in infinite nodes and elements and refining them under defined boundary condition. Bending stress and deflection are the target results. A comparison of both i.e. experimental and FEA results have been done to conclude.

A Review on Thermal Performance Analysis of Simple Organic Rankine Cycle with and without Internal Heat Exchanger using EES Code
Authors:- M. Tech. Scholar Vinay Yadav, Asst. Professor Brijendra Kumar Yadav

Abstract:- Energy efficiency and conservation are gaining attention due to increasing trend of greenhouse gas emissions. Increasing energy demand urges the researchers to design energy efficient, environmental friendly and commercially viable systems. Integration of thermal systems (hybrid systems) improves the energy efficiency, fuel utilization factor and reduces the carbon emissions. Integration of renewable energy sources avail the advantage of decentralized applications. The study investigates the effects of internal heat exchanger on the thermo-economic performance of organic Rankine cycle (ORC) configurations based on fluid properties and heat sources.

Thermal Performance Analysis of Simple Organic Rankine Cycle with and without Internal Heat Exchanger using EES Code
Authors:- M. Tech. Scholar Vinay Yadav, Asst. Professor Brijendra Kumar Yadav

Abstract:- In this study, performance of a simple organic Rankine cycle (S-ORC) and organic Rankine cycle with internal heat exchanger (IHX-ORC) have been compared. Two ORC configurations are investigated as follows: S-ORC and IHX-ORC. With respect to different ORC configurations, the first law efficiency, second law efficiency and net work done will be compared under the conditions of different heat source temperatures and heat source flow rates. The effects of working fluid type, heat source temperature domains on the system, thermo-economic performance will be investigated. Furthermore, the effects of pinch point temperature difference in IHX on the IHX-ORC system are analyzed.

A Review on Spectrum Efficiency Improvement for Quasi-Constant Envelope OFDM

Authors:- M. Tech. Scholar Rishabh Shukla, Hod. Dr.Vineeta Saxena Nigam

Abstract:- Benefiting from low peak-to-average power ratio (PAPR), constant envelope OFDM (CE-OFDM) is a promising technique in coherent optical communication. However, the spectrum efficiency of CE-OFDM is only half of conventional coherent optical OFDM, which restricts its application. We proposed a novel quasi-constant envelope OFDM (Quasi-CE-OFDM) scheme with in-phase/quadrature (I/Q) modulator. Furthermore, a phase demodulation scheme based on Taylor series expansion is performed to reduce calculation complexity and avoid phase ambiguity. Simulation results show that the proposed scheme could double the spectrum efficiency effectively without losing the advantage of high nonlinearity tolerance.

Simulation Result of BER and OSNR Performance for Quasi-Constant Envelope OFDM

Authors:- M. Tech. Scholar Rishabh Shukla, Hod. Dr.Vineeta Saxena Nigam

Abstract:- Quasi-Constant Envelope OFDM transmits dual-stream simultaneously to improve the spectral efficiency of Constant Envelope OFDM. It can provide high data rate links and maintain a low PAPR to reduce the distortion caused by the nonlinear power amplifier. Thus, the quasi-constant envelope OFDM is suitable for satellite communication system. However, the carrier frequency offset (CFO) in satellite communication must be estimated and compensated before the demodulation. In this paper a CFO estimation scheme is proposed for quasi-constant envelope OFDM satellite system under additive white Gaussian noise (AWGN) channel. Since the null subcarrier at the transmitter can be considered as the prior information at the receiver, this null subcarrier can be used to estimate the CFO through phase demodulator and inverse discrete Fourier transform (IDFT) module at the receiver. Mathematical analysis reveals that the ideal estimation range of normalized CFO is nearly half of the size of IDFT under AWGN channel. Simulation results show that the proposed scheme performs well at moderate and high signal-to-noise ratio (SNR) conditions.

Grid-Connected Pv Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel , Professor Pragati Priya ,
Professor Manju Gupta

Abstract:-In the last decade solar power technologies became less costly and additional efficient, that have created it to an attractive resolution, being cleaner and additional environmentally friendly energy resource than traditional ones like fossil fuels, coal or nuclear. yet, a PV system continues to be rather more expensive than traditional ones, because of the high producing prices of PV panels, however the energy that drives them -the lightweight from the sun- is free, offered nearly everyplace and can still be present for many years, long in spite of everything non-renewable energy sources are depleted. One in every of the main benefits of PV technology is that it’s no moving components. Therefore, the hardware is very robust; it’s a long time period and low maintenance necessities. And, most significantly, it’s one resolution that gives environmentally friendly power generation. The efficiency of economic PV panels is around 15-20%. Therefore, it’s important that the power created by these panels isn’t wasted, by using inefficient power electronics systems. The efficiency and reliability of each single-phase and 3 part PV inverter systems is improved using transformer less topologies, however new issues related to escape current and safety need to be dealt with.

A Review on Grid-Connected Pv Inverter with Inductive Dc Link for Three-Phase Transformer Less
Authors:- M.Tech. Scholar Sameer Goel , Professor Pragati Priya ,
Professor Manju Gupta

Abstract:- The need for cleaner surroundings and also the continuous increase in energy desires makes localized renewable energy production more and additional necessary. This continuously-increasing energy consumption overloads the distribution grids in addition because the power stations, so having a negative impact on power availability, security and quality [1]. One among the solutions for overcoming this can be the Distributed Generation (DG) system. dg systems using renewable energy sources like solar, wind or hydro, have the advantage that the ability is made in shut proximity to wherever it’s consumed. This manner the losses because of transmission lines aren’t present.

Fabrication of Al 7068 Reinforced with Tur Husk Ash (THA) and Alumina Hybrid Metal Matrix Composite by Powder Metallurgy and Evaluating Its Microstructure and Mechanical Properties
Authors:- Mohammed Amair Sohail, Associate Prof. B.S.Motgi, Prof. Dr. G.K. Purohit

Abstract:- The applications of metal matrix composites are increasing day by day due to high strength to weight ratio. The hybrid aluminum composites can be considered as an outstanding material where high strength and wear-resistant components are of major importance, predominantly in the aerospace and automotive engineering sectors. In the present work , Al7068 reinforced with tur husk ash(THA) and Al2O3 hybrid metal matrix composite is prepared from sintering of mechanically alloyed powder (ball milling) in powder metallurgy process. Different combinations of compositions (Al7068 reinforced with 0%,4%,8%,12% 0F THA and Al2O3) were taken with total 16 combinations. Hardness was found to be increasing with increasing percentage of Al2O3 but was decreasing with increasing percentage of THA. The microstructure of the composites was studied.

Dc Micro grid Monitoring and Protection
Authors:- Veerpratap Meena, Dr. Vinay Pant

Abstract:- With the proliferation of distributed energy resources (solar, fuel cell, etc.) and DC loads, the installation and deployment of DC microgrid is seeking more attention in the contemporary paradigm of power system evolution. DC microgrid adds advantage of overall system efficiency increase due to decrease in the conversion losses and ohmic losses. Also, energy storage components are directly connected to the DC bus with the help of bidirectional converters, thus increasing the reliability of the system. However, this stochastic integration of renewable and dynamic operations of controlling poses protection problems for the DC microgrids. The main challenge in DC micro grid protection and control operations is the lack of standards and guidelines. The fault clearing time is also affected due to the lack of inertia and resistive of nature of the network. There is no zero crossing in DC system which affects the operation of the circuit breaker for fault isolation. The presented state-of-art is focused on identification of types of fault protection device, challenges in the DC microgrid system, architecture of DC microgrid controller strategies and different protection techniques are also discussed. This paper review various types of parameter estimation techniques are discussed in detail to improve the protection scheme. Superimposed current based unit protection scheme, protection using the oscillation frequency and transient power, and parameter estimation approach are help to determine the fault location and type of fault.

Investigation of Microstructure and Mechanical Properties of Hybrid Composite Aluminum 7068 Reinforced with Tur Husk Ash (THA) and Silicon Carbide (Sic)
Authors:- Shaikh Mohammad Tayyab Raza, Associate Prof. B.S.Motgi, Prof. Dr. G.K. Purohit

Abstract:- This paper deals with the fabrication of Al-7068 composites manufactured by powder metallurgy route reinforced with different weight percentages of tur husk ash (THA) and SiC A low pressure of 400 MPa was applied for compacting the composites and sintered at a temperature of 720oC for three hour. TG and XRD analysis of tur husk ash (THA) was done to obtain its chemical composition. SEM and EDX analysis was done to study the micro-structural behavior. Hardness and compression test were carried out. The hardness has been improved by adding the weight percentage of SiC but seems to be crash by adding the weight percentage of tur husk ash (THA). The compressive strength was found to be varying.

E-Mail Spam Classification Using Long Short-Term Memory Method
Authors:- M.E. Scholar (CSE) Shripriya Dongre, HOD (CSE) Prof. Kamlesh Patidar

Abstract:- In recent years, the single-modal spam filtering systems have hade high detection rate for text spamming. To avoid detection based on the single-modal spam filtering systems, spammers in jet junk information into the multi-modality part of an email and combine them to reduce the recognition rate of the single-modal spam filtering systems, there by implementing the purpose of evading detection.In view of this situation,a new model called text based data set module architecture based on model fusion (MMA-MF) is proposed, which use a text based dataset fusion method to ensure it could effectively filter spam whether it is hidden in the text. The model fuses a Convolution Neural Network (CNN) model and a Long Short-Term Memory (LSTM) model to filter spam. Using the LSTM model and the CNN model to process the text parts of an email separately to obtain two classification probability values, then the two classification probability values are incorporated into a fusion mode lt identify whether the email is spam or not. For the hyper parameters of the MMA-MF model, we use a grid search optimization method to get the most suitable hyper parameters for it, and employ a k-fold cross-validation method to evaluate the performance of this model. Our experimental results show that this model is superior to the traditional spam filtering systems and can achieve accuracies in the range of92.64–98.48%.

Review Paper on Analysis & Conduction of Certificate Examination in Cloud Environment
Authors:- Prof. C.U Chauhan, Priyanka Gupta, Snehal Gondane, Omeshwari Bobade, Roshan Gabhane, Sachi Gedam

Abstract:- Traditional Exam cell activity mostly includes a lot of manual paper work. The aim of the project is to build a centralized system. So that all the examination activities can be done effectively and efficiently for both students and admin . The final system would constitute a computerized module aimed at replicating offline exam cell process. The system is a new concept which came into existence because of a large amount of data being on paper. The automated system for exam cell department will benefit both the students as well as exam cell department staff to easily handle the entire task related to exam cell in contrast to the existing manual system. This system will make the procedure of exam cell in an organized manner. The admin can also generate the Transcripts and Letter of Recommendation, and can also verify, confirm the photocopy and revaluation of each applied student by using the CLOUD COMPUTING Technology.

Grid Tied One Megawatt Solar Photovoltaic Power Plant at Bhopal: A Feasibility Study
Authors:- M.Tech Scholar Lalit Kumar Goel, Prof. (Dr) Mukesh Pandey, Associate Prof. Dr Anurag Gour

Abstract:- With about 300 clear and sunny days in a year, the calculated solar energy incidence on India’s land area is about 5000 trillion KWh per year. India is densely populated and has been blessed with high solar insulation; it is a best combination for harnessing solar power. The way India is tapping the solar energy, the country is already a leader in solar power generation. In the solar energy sector, large projects have been proposed, and a 34,000 km2 area of the Western Desert has been earmarked for solar power projects, sufficient to generate 500 GW to 2,000 GW. Ministry of New and Renewable Energy(MNRE) has released the Jawaharlal Nehru National Solar Mission (JNNSM) Phase 2 Draft Policy, our Government is planning to install 10GW of Solar Power, and of this planning, 4 GW is under the central govt scheme and the remaining 6GW under state govt schemes.

Heart Rate Measurement using The Change of Color of Skin over Time Due To Blood Flow
Authors:- Soumyadip Chattopadhyay

Abstract:- Heart Rate is an important medical parameter in case of maintaining one’s health. There are some apps available in the market that can calculate the heart rate of a person by using a Smartphone camera. No external pulsometers are required. But, these applications also consists of different issues in measuring proper pulse, like motion, noise in capturing the video, premature ventricular contraction and many more. Also some human errors like low or high pressure on the mobile camera, misplacement of finger over the camera leads to countable amount of error in measurement of Heart Rate. In our case of study, we have developed an application using existing algorithms that can cut down these errors up to an extent and gives the user almost error less Pulse of him or her by using the video of change of color of skin over time. We have captured video to get the PPG using smart phone and used tan 1st order Butterworth (IIR) band pass filter with frequency domain analysis and Hann windowing for leakage reduction.

Production of High-Strength Concrete by Utilizing Volcanic Pumice Waste in KSA, Jazan Region: Particle Size Effect
Authors:- Abdullah M. Zeyad, Saeed A. Al-Qahtani, Hussain A. Al-Shehri

Abstract:- Volcanic areas are scattered in several areas of Saudi Arabia. This spread contributes to the diversity of the sources of volcanic substances and their chemical structures. This study assesses the use of volcanic pumice powder (VPP) obtained from volcanic residues in the western region of Saudi Arabia to produce high-strength concrete (HSC). Chemical analysis reveals that these volcanic residues consist of 76.01% pozzolanic materials. The VPP was used to replace part of the cement content of HSC, and the effects of replacing 10% and 20% of the cement mass with VPP on HSC properties were studied. In particular, the effects of granules measuring 4.96 µm (4VPP) and 63.6 µm (60VPP) in size were observed. The compressive strength, flexural strength, indirect tensile strength, porosity, and water absorption rate of the samples were determined after 7, 28, and 90 days of curing. The compressive strength of HSC samples containing 10% (4HSC10) and 20% (4HSC20) 4VPP improved by 12.0% and 16.6% compared with those of 60HSC10 and 60HSC20, respectively, after 28 days of aging. Water absorption decreased when the main particle size was 4 mm compared with that when the main particle size was 60 mm. The water absorption rate decreased by 12% after 28 days of curing when 20% of the cement mass was replaced with 4VPP.

Estbt- Enhance Secure Trust Based Transmission for Mobile Ad-Hoc Network
Authors:- Shailendra shrivastava, Sushma Kushwaha

Abstract:- Mobile Ad-Hoc network is most popular in current scenario but when this network popular increased as well as so many attacked or unauthorized access increased. In this article will analysis about secure and trust based communication. In any case, constructing a trust model that receives recommendation by different hubs in the system is a testing issue because of the danger of dishonest recommendation like bad-mouthing, ballot-stuffing and collusion. The attacks caused by badly behaving nodes when increasing recommendations in the existing trust models. A recommendation based trust model demonstrate with a protection plan, which uses clustering technique to powerfully filter out attacks related to dishonest recommendations between certain time in view of number of cooperation, similarity of data and closeness between the hubs. The model is observationally tried under a few mobile and separated topologies in which hubs encounter changes in their neighborhood prompting regular course changes. The experimental investigation exhibits vigor and precision of the trust demonstrate in a dynamic MANET condition. This model can be extended by weighting recommendations based on time and location to mitigate the influence of location and time dependent attacks.

Classifying Vehicle Activity Patterns from Iot Device & Remote Monitoring System
Authors:- M.Tech. Scholar Prachi Pandey, Asst. Prof. Ankur Taneja

Abstract:- By using the Internet of Things Technology can greatly enhance the performance, monitoring and maintenance of the vehicle. In this paper analysis is based on the Implementation of new cost effective methodology based on IoT to monitor vehicle health remotely for performance evaluation. This will facilitate preventive maintenance, fault detection, historical analysis of the vehicle in addition to real time monitoring. In this paper analysis The vehicle consist of onboard GPRS module which collect the CAN data from the CAN device fitted on the vehicle and send it to the remotely located server. Second phase work focus on Monitoring the temperature of the vehicle system avoid sparking of the vehicle and also providing the fuel consumption & Battery information of display and third phase of implementation using of GSM Module when vehicle is provide the unusual activity & driver is facing any problem then it give message to the owner of vehicle. In this proposed IoT system that allows the owner to monitor the data provided by the sensors available on a vehicle, and to control processes automatically, anytime and anywhere using cloud system analysis. We are Using Support-Weight Approach for classification of IoT Data, after that we compared some parameter like Computation Cost, Computation Time, Accuracy etc.

Parking System for Smart City using Internet of Thing
Authors:- M.Tech. Student Monika Bijore, Asst. Prof. Monika Raghuwanshi

Abstract:- – Recently parking has become a serious issue and even worse, because of the increasing number of automobiles everywhere. In this paper we propose an IoT based guidance for user as well as Upcoming self-driving vehicles to search parking space for the vehicle. it also help user to choose the right vehicles to travel according to the parking spaces available to the destination point. it provides an intelligent guidance to the user, user can choose their travelling vehicle as two wheelers, four wheelers or public transport according to the traffic density. It aims to develop an intelligent parking guidance system. which reduces difficulty in conventional parking system. The system can monitor the state of every parking slot by deploying a sensor node on the slot. Accordingly, sensor senses the status of parking slot and sends status to central node server controller. The controller unit collects the data from all sensor node and upload to the server using http protocol where user can check the parking status from anywhere using internet and any browser. The system can also integrate with the artificial intelligence network like google assistance and self-driving car. Google assistance assist user to choose right vehicle according to the traffic density and parking space available at the destination point. User can simply see the space available by clicking in google map of their destination building or social parking.

A Study on Design of Single Sided Linear Induction Motor and Controlling with Voltage Source Inverter Fed Convertor
Authors:-M. Tech. Scholar S. Venkata Sai Kumar

Abstract:- Now-a-days, Linear Induction Motors are widely used, in many industrial applications like transportation, conveyor systems, actuators, material handling, pumping of liquid metal, and sliding door closers, etc. The advantages of linear motor is that it requires no mechanical rotary-to-linear converters, high efficiency and economical. The linear induction motor is very useful at places requiring linear motion since it produces thrust directly and has a simple structure, easy maintenance, high acceleration/deceleration and low cost. Linear Induction Motor is basically a rotating squirrel cage induction motor opened out flat. Instead of producing rotary torque from a cylindrical machine it produces linear force from a flat one. The stator of the linear induction motor acts as the primary and the rotor of the linear induction motor acts as the secondary of linear induction motor. As a result, the stator is built with steel laminations and rotor is built with conductor sheet and black iron. The single sided linear induction motor construction is easy and low cost. The working principle of single sided linear induction motor is same as the conventional induction motor. In the secondary eddy current is generated due to an induced EMF. The EMF is induced because of relative velocity between travelling magnetic flux and secondary. The thrust force or linear force is produced due to interaction between travelling flux and eddy current. In this paper, a single sided linear induction motor design parameters are analyzed and prototype has been designed and motor will be control with Voltage Source Inverter Fed Convertor.

Grid Tied One Megawatt Solar Photovoltaic Power Plant at Bhopal: A Study on Performance Analysis Including Efficiency Calculation
Authors:- Research Scholar Lalit Kumar Goel, Prof. (Dr) Mukesh Pandey, Assistant Prof. Dr Anurag Gour

Abstract:- The growing energy demand in developing nations has triggered the issue of energy security. This has made essential to utilize untapped potential of renewable resources. India is focusing on development of its own sources of energy. For PV panels, the efficiency of converting solar energy to electricity is around 7%.Average solar radiation incident over India varies from 4kWh/day – 7 kWh/day. Grid connected PV systems have become the best alternatives in renewable energy at large scale. Performance analysis of these grid connected plants could help in designing, operating and maintenance of new grid connected systems. A 1MW photovoltaic grid connected plant commissioned at Bhopal is one of the commercial solar power plants with the site receiving a good solar radiation of 5.61 kWh/m2/day and annual temperature of about 31.2 oC . The plant is designed to operate with a fixed tilt. In this study the solar PV plant aspects along with its annual performance is elaborated.

A Review on Implementation of Queuing Theory Along with Lean Technique in Manufacturing Industry
Authors:- M.Tech. Scholar Bharat, Professor Vipul Upadhayay, Yogesh P Ladhe

Abstract:- Within the combinatorial scheduling community, there has been an increasing interest in modeling and solving scheduling problems in dynamic environments. Such problems have also been considered in the field of queuing theory, but very few research take advantage of developments in both areas, and previous surveys on dynamic scheduling usually make no mention of queuing approaches. In this research, we provide an overview of queuing theoretic models and methods that are relevant to scheduling in dynamic settings.

Automobile Technology A Study of Past, Present and Future
Authors:- Md. Shakil Hossain

Abstract:- This paper highlights the journey of automobile technology since the very beginning of invention to the present, also discuss the future development of this technology. Automobile technology is always of interest to those people who like to know and get touched with new invention of engineering. This paper can help one to recognize the development in vehicle technology for the past, present, and future. Lot of changes happened in automobile technology since 19th century, when the first radio controlled vehicles were designed. In the subsequent decades, automotive electric cars appeared which were powered by battery and embedded circuits in the roads. By the middle of last century, automotive cars were having approximately same electronic systems shown one by one. Various semi-autonomous type set up in modern cars such as lane keeping, automatic braking and adaptive cruise manage are based on such systems. It is forecasted that most companies will start fully autonomous vehicles by the coming of next decade. The future of autonomous vehicles is an ambitious era of safe and comfortable transportation.

Smart Sugarcane Crop Growth Monitoring System using IOT and Image Processing
Authors:- Someshwar Terkar, Saurabh Shinde, Sushma Potdar, Neha Chavan, Ms. K.S. Jadhav

Abstract:- Agriculture is the most important sector of an Indian economy. Sugarcane is the main source of sugar in India and holds a prominent position as a cash crop. People uses conventional way for the farming. Conventional way requires more human power. Around 55% people in India has been engaged in agriculture but only 15% goods we get from the agriculture. Though there is a large area under cultivation, we don’t get maximum yield. The fact that most of our farmers have the lack of proper knowledge makes it even more erratic. A large portion of farming and agricultural activities are based on the predictions, which at times fail. Due to this, farmers have to bear huge losses. Since we know the benefits of proper irrigation and soil nutrients in the growth of sugarcane crop, such parameters can’t be ignored. Diseases occurred to the sugarcane plant can affect the yield of sugarcane. Sothe “Smart sugarcane crop growth monitoring system based on IOT and image processing” is one of the best way to increase crop yields.

Data and Components Availability
Authors:- Atharva Manoj Kulkarni

Abstract:- Agriculture is the most important sector of an Indian economy. Sugarcane is the main source of sugar in India and holds a prominent position as a cash crop. People uses conventional way for the farming. Conventional way requires more human power. Around 55% people in India has been engaged in agriculture but only 15% goods we get from the agriculture. Though there is a large area under cultivation, we don’t get maximum yield. The fact that most of our farmers have the lack of proper knowledge makes it even more erratic. A large portion of farming and agricultural activities are based on the predictions, which at times fail. Due to this, farmers have to bear huge losses. Since we know the benefits of proper irrigation and soil nutrients in the growth of sugarcane crop, such parameters can’t be ignored. Diseases occurred to the sugarcane plant can affect the yield of sugarcane. Sothe “Smart sugarcane crop growth monitoring system based on IOT and image processing” is one of the best way to increase crop yields.

A Survey on Different Techniques of Static and Dynamic Load Balancing
Authors:- Ph.D Scholar Vinod Patidar, Dr. Shiv Shakti Shrivastava

Abstract:- As cloud computing have number of issues related to security, bandwidth efficiency, large information handling, load balancing, etc. Load balancing implies distribution of the workload to node or servers or assets with the goal that one can accomplish maximum utilization of resources, reduce execution time, increase system throughput and so on. This paper gives a concise study of cloud based service balancing methods proposed by different researchers. Here various features of service are detailed for the load balancing and planning. Different sorts of requirement of load balancing was additionally talked with their significance and limitations. So according to the module as well as steps used in techniques classification of load balancing algorithms are done with a comprehensive and comparative understanding of existing literature.

A Survey on Techniques and Features of Document Classification
Authors:- Ph.D Scholar Vinod Sharma, Dr. Shiv Shakti Shrivastava

Abstract:- Traditional information retrieval methods become inadequate for increasing vast amount of data. Without knowing what could be in the documents; it is difficult to formulate effective queries for analyzing and extracting useful information from the data. This survey focused on some of the present strategies used for filtering documents. Starting with different types of text features this paper has discussed about recent developments in the field of classification of text documents. This paper gives a concise study of methods proposed by different researchers. Here various pre-processing steps were also discussed with a comprehensive and comparative understanding of existing literature.

A Survey on Intrusion Detection System Techniques and Features for Identification
Authors:- Ph.D Scholar Raj kumar Pandey, Dr. Shiv Shakti Shrivastava

Abstract:- The intrusion detection systems (IDSs) are essential elements when it comes to the protection of an ICT infrastructure. Intrusion detection systems (IDSs) are widespread systems able to passively or actively control intrusive activities in a defined host and network perimeter. Recently, different IDSs have been proposed by integrating various detection techniques, generic or adapted to a specific domain and to the nature of attacks operating on. In this paper survey was done on the various techniques of intrusion detection system where some of supervised and unsupervised intrusion detection techniques are discussed. Here methodology of various researchers is explained with their steps of working. Different types of attacks done by the intruders were also discussed.

Design and Development of Text-Image Watermarking Based on Integer Wavelet Transform (IWT) and Discrete Cosine Transform (DCT)
Authors:- PhD Scholar Arpana Bhandari, Associate Professor Dr. Shailja Shukla, Professor Dr. Rajiv Shrivastava, Asst. Professor Dr. Vijay Bhandari

Abstract:-This paper investigates Text-images still has a great importance, despite the spread of electronic texts. Text-images are protected using digital watermarking. This paper proposes a watermarking method applied to text images. This method integrates two transforms: integer wavelet transforms (IWT) and discrete cosine transforms (DCT). For the watermark embedding, IWT is performed on the cover image and DCT is applied to the low frequency sub-band LL. The watermark image is inserted in the lower to medium DCT coefficients to achieve a high degree of robustness and imperceptibility. Experiments using different English text-images are performed to evaluate the proposed method in terms of imperceptibility and robustness. Results show that the proposed method has higher imperceptibility compared to other existing methods applied to English text-images. Also, the proposed method provides good robustness results, especially against compression and noise..

Smart Home Automation Technique using Unsupervised Machine Learning Algorithm
Authors:- Nikhil, Amit Sahni, Rishav Kumar Thakur

Abstract:-Smart home mechanization technique is getting highly considered these days because its wide selection of uses like security system, controlling home appliances, entertainment system, lighting etc. Large quantity information is accumulated from the past good home expertise by the user however these information isn’t absolutely used, but currently because of development of huge information and machine learning technologies these prediction is also accustomed manufacture a very intelligent system. Regarding this paper proposes user behavior prediction formula (UUBP) that uses a artificial neural network(ANN) and tells a couple of new and advanced conception of forgetting issue to contend with the shortcomings of previous algorithm. This formula shows high-learning ability and wants minimum human intervention. This formula may contend with the user influence and outdated records. UUBP formula shows more robust performance then different algorithms.

Comparative Analysis of Traffic Classification Algorithms in Deep Learning
Authors:- Goddeti Mallikarjun, A. Srinish Reddy, J. Manikandan

Abstract:- Traffic classification is an important algorithm to a wide range of applications from QoS provisioning and billing in ISPs to security-related applications in firewalls and intrusion detection systems. Port-based, information packet scrutiny, and classical machine learning ways in which area unit used extensively inside the past, but their accuracy has declined due to the dramatic changes in Internet traffic, particularly the increase in encrypted traffic. With the proliferation of deep learning ways, researchers have recently investigated these ways for traffic classification and according high accuracy. In this article, we tend to introduce a general framework for deep-learning-based traffic classification. We gift usually used deep learning ways and their application in traffic classification tasks. Then we have a tendency to discuss open issues, challenges, and opportunities for traffic classification.

Advanced Smart Road Deformation Detection System
Authors:- Reetu Jain, Aarav Amit Akali, Jai Jariwala, Tanay Nistala

Abstract:- Aging roads and poor road-maintenance systems resulted many potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly to find the location a data base as to be developed, which requires a specific pothole-detection system that can collect pothole information at low cost and over a wide area. However, pothole repair has long relied on manual detection efforts causing loss of time and money to government. Thus, in this paper, we introduced a pothole-detection system using a commercial “Road sepoy”. The proposed system detects potholes using vision-based tracking system and MATLAB algorithm specifically designed to work with road sepoy camera giving us accurately in real-time environment. Geo-mapping the pothole in google maps helps the exact location.

Automated Vehicle Identification and Toll Tax Collection
Authors:- Anwar A. Shaikh, Akshay B. Raskar, Sagar R.Sonne, Omkar S.Lalge, Prof. K.S. Jadhav

Abstract:- The ANPR (Automatic Number plate Recognition) system is based on image processing technology. It is one of the necessary systems designed to detect the vehicle number plate. In today’s world with the increasing number of vehicle day by day it’s not possible to manually keep a record of the entire vehicle. With the development of this system it becomes easy to keep a record and use it whenever required. The main objective here is to design an efficient automatic vehicle identification system by using vehicle number plate. The system first would capture the vehicles image as soon as the vehicle reaches the security checking area. The captured images are then extracted by using the segmentation process. Optical character recognition is used to identify the characters. The obtained data is then compared with the data stored in their database. The system is implemented and simulated on MATLAB and performance is tested on real images. This type of system is widely used in Traffic Control Areas, Tolling, Parking Area etc. This system is mainly designed for the purpose of security system.

A Survey on Cigs Solar Cell Technology
Authors:- Asst. Prof. J. Dinesh Kumar, Associate Prof. S. Prince Immanuel Alexander, Asst. Prof. G. Lavanya

Abstract:- Thin film solar cells are favorable because of their minimum material usage and rising efficiencies. The three major thin film solar cell technologies include amorphous silicon (α-Si), copper indium gallium selenide (CIGS), and cadmium telluride (CdTe). In this paper, the evolution of each technology is discussed in both laboratory and commercial settings, and market share and reliability are equally explored. The module efficiencies of CIGS and CdTe technologies almost rival that of crystalline solar cells, which currently possess greater than 55% of the market share. α-Si is plagued with low efficiency and light-induced degradation, so it is almost extinct in terrestrial applications. CIGS and CdTe hold the greatest promise for the future of thin film. Longevity, reliability, consumer confidence and greater investments must be established before thin film solar cells are explored on building integrated photovoltaic system.

A Review Article of Transportation Vehicles Routing Scheduling using Genetic Algorithm
Authors:- Kshitij Singh Chouhan, Professor Vinay Deulkar

Abstract:- The paper proposes a technique for the development of ‘‘optimal’’ transit route networks (for example, a bus route network) given the information on link travel times and transit demand. The proposed method, unlike previous techniques, primarily uses optimization tools for the development of the transit route network—the reliance on heuristics is minimal. In the proposed method, genetic algorithms, an evolutionary optimization technique, is used to develop the ‘‘optimal’’ set of routes. Results show that the proposed procedure performs better than the existing techniques.

A Survey on Optimization Techniques of Spectrum Sensing and Allocation in Cognitive Network
Authors:- Vivek Banerjee, Dr. Rajneesh Kumar Karn

Abstract:- Cognitive radio network increase spectrum as non-licensed users get chance to transfer their data. Hence IOT devices get dynamic access to the spectrum by sensing channel data. Spectrum sensing is a key enabler for cognitive radios technology in network implementation. Spectrum sensing identifies idle spectrum and provides attentiveness about the sensing radio environment. In this paper, a survey of the CRs technology is presented. Different papers of the spectrum sensing techniques are reviewed. Here paper has summarize techniques adopt by researchers to increase the detection rate, in different environment of ideal and real situation. Spectrum allocation algorithm also discuss as utilization depends on allocation as well. Comparison of sensing technique with their issues is tabularized. Paper has explained various evaluation parameters for comparison of spectrum sensing techniques.

Optimizing Garbage Collection for High-Performance
Machine Learning Applications in Java

Authors:- Rajesh S. Bansode, Dr. Professor

Abstract:- This paper explores the optimization of garbage collection (GC) techniques in Java Virtual Machine (JVM) to improve the performance of machine learning (ML) applications. By analyzing GC algorithms and leveraging tuning strategies from Ramakrishna Manchana’s 2018 research, this study addresses critical challenges in resource-constrained environments such as IoT. The proposed approach focuses on minimizing latency during model training and deployment while enhancing memory efficiency. A comparative analysis of various GC algorithms is presented, with experimental results demonstrating the effectiveness of GC tuning for high-performance ML workflows.

Corporate Social Responsibility: A Contemporary Perspective

Authors: Anjanappa. T

Abstract: Corporate Social Responsibility (CSR) has emerged as one of the most influential paradigms shaping the relationship between businesses and society. Once regarded as a voluntary philanthropic practice, CSR today is increasingly recognized as a strategic tool that integrates ethical responsibility, sustainability, and long-term value creation into business operations. This paper explores the conceptual foundations of CSR, its growing importance in the global economy, and the associated merits and demerits. Special emphasis is given to recent developments, including the integration of CSR with Environmental, Social, and Governance (ESG) standards, legal mandates such as India’s Companies Act (2013), and the shift towards stakeholder centric models of corporate accountability. The paper also discusses the challenges of CSR implementation, critiques such as green washing, and the evolving expectations from corporations in the post-pandemic world. Drawing on theoretical frameworks and case studies, the article argues that CSR is no longer peripheral but central to corporate sustainability and competitiveness. The findings highlight that companies engaging meaningfully in CSR are better positioned to build trust, enhance brand equity, and contribute to achieving Sustainable Development Goals (SDGs).

From Legacy To Agile How Linux Is Reshaping The Salesforce CRM Landscape

Authors: Aditya Reddy

Abstract: The transformation of enterprise customer relationship management (CRM) from legacy monolithic systems to agile, cloud-native platforms has accelerated with the adoption of Salesforce CRM. At the core of this transition, Linux has emerged as a strategic enabler, providing scalability, stability, and security across hybrid and multi-cloud environments. This review explores how Linux supports Salesforce CRM deployments by addressing legacy challenges, enhancing compliance, reducing operational costs, and enabling emerging use cases such as edge computing and AI integration. Case studies from industries including finance, healthcare, and retail illustrate Linux’s role in improving operational efficiency and driving innovation. The paper also critically evaluates the strengths and limitations of Linux in Salesforce ecosystems, offering a balanced perspective on its adoption. Future directions highlight the growing importance of containerization, automation, and compliance frameworks, positioning Linux as a foundational technology for agile CRM operations in the digital era.

DOI: https://doi.org/10.5281/zenodo.17140147

 

The UNIX Administrators Playbook Kickstarting A Modern Career In Hybrid Cloud

Authors: Arjun Reddy

Abstract: The evolution of enterprise IT from traditional data centers to hybrid cloud infrastructures has reshaped the role of the UNIX administrator. Once primarily tasked with maintaining stable and secure on-premises systems, administrators today are expected to integrate legacy UNIX workloads with cloud-native platforms, automation frameworks, and containerized environments. This review explores the challenges and opportunities presented by this transformation, highlighting the critical balance between reliability and agility that defines modern hybrid infrastructures. It examines skill gaps, training demands, and the complexities of managing multi-vendor ecosystems, while also emphasizing the growing importance of automation, predictive monitoring, and compliance frameworks. Real-world case studies across finance, healthcare, and government demonstrate how UNIX continues to play a foundational role in mission-critical operations, even as cloud adoption accelerates. By analyzing future trends such as AIOps, edge computing, and the convergence of system administration with site reliability engineering, the article underscores how UNIX administrators can future-proof their careers. The playbook presented here advocates for continuous upskilling, strategic adoption of hybrid technologies, and a mindset shift from maintenance to innovation. Ultimately, the UNIX administrator’s relevance in the hybrid era is not diminished but redefined, offering new pathways for professional growth and enterprise resilience.

DOI: http://doi.org/

The Qlik Journey: Building Data-Driven Cultures With QlikView, Qlik Sense And A Solid BI Lifecycle

Authors: Aarav Nikhil

Abstract: Business Intelligence (BI) has become a cornerstone of modern enterprises, enabling organizations to transform raw data into actionable insights for informed decision-making. Qlik, through its evolution from QlikView to Qlik Sense, has significantly influenced the BI ecosystem by bridging the gap between guided analytics and self-service, cloud-native intelligence. This review article examines Qlik’s contributions to building data-driven cultures, aligning with the BI lifecycle framework, and integrating with broader enterprise data fabrics. It explores the technical strengths and limitations of QlikView, the architectural advancements of Qlik Sense, and the role of Qlik Data Integration in supporting real-time analytics. Furthermore, it highlights governance, compliance, and adoption strategies, alongside comparative analyses with other BI platforms. Case studies across healthcare, finance, retail, and the public sector illustrate Qlik’s transformative potential, while the discussion of challenges and future directions underscores the need for strategic adoption. The findings suggest that Qlik not only delivers advanced analytics capabilities but also acts as a catalyst for organizational cultural transformation toward data-driven decision-making.

DOI: http://doi.org/

The Influence Of Container Orchestration Security On Microservices Reliability

Authors: Sonam D. Wangchuk

Abstract: Container orchestration systems have become the foundation of modern microservice architectures, enabling automated deployment, scaling, and management of containerized workloads. As organizations shift to cloud-native environments, the security of orchestration platforms such as Kubernetes, Docker Swarm, and OpenShift has emerged as a critical determinant of overall system reliability. Orchestration security ensures that applications maintain consistent performance, resilience, and integrity even in the face of evolving cyber threats. However, inadequate security controls within orchestration layers such as unprotected APIs, misconfigured network policies, and unencrypted communications can lead to severe vulnerabilities that disrupt service continuity. This review explores the intricate relationship between container orchestration security and microservices reliability. It analyzes the evolution of orchestration systems, common security challenges, and the impact of security mechanisms on microservices performance and stability. Additionally, it discusses best practices and emerging frameworks that integrate security and automation to ensure sustained reliability. The paper concludes by emphasizing the need for adaptive, intelligent orchestration mechanisms that integrate security and reliability by design, ensuring robust and scalable cloud-native infrastructures capable of withstanding future operational and security challenges.

DOI: http://doi.org/10.5281/zenodo.17880571

The Impact Of AI-based Forensic Systems On Post-incident Investigations

Authors: Anura J. Perera

Abstract: Artificial intelligence (AI) has revolutionized post-incident investigations by introducing automation, precision, and predictive intelligence into digital forensic processes. Traditional forensic techniques, dependent on manual log examination and human expertise, often struggle to handle the enormous data volumes and complex digital trails generated in modern cyber incidents. AI-based forensic systems leverage machine learning, natural language processing, and data mining to extract, analyze, and correlate evidence at unprecedented speed and accuracy. These systems can automatically detect anomalies, reconstruct attack timelines, and identify threat actors by learning from historical data patterns. The review explores the evolution of digital forensics, the integration of AI-driven tools, and the measurable improvements in investigation efficiency. It also highlights challenges such as model transparency, bias, explainability, and legal admissibility of AI-generated evidence. Moreover, it discusses emerging research opportunities, including explainable AI, blockchain-enabled evidence validation, and collaborative forensics through federated learning. By synthesizing academic research and industrial applications, this paper emphasizes that AI-based forensic systems are not merely tools but strategic enablers of resilience in cyber incident response. They represent a paradigm shift toward intelligent, adaptive, and self-learning investigation frameworks, crucial for addressing the growing sophistication of digital threats in enterprise and law enforcement environments.

DOI: http://doi.org/10.5281/zenodo.17880644

The Influence Of Cognitive Analytics On IT Compliance Auditing Accuracy

Authors: Malini R. De Silva

Abstract: The increasing complexity of regulatory requirements and the growing volume of enterprise data have made IT compliance auditing a challenging process for organizations. Traditional audit methods, reliant on static rule sets and manual inspection, often struggle to maintain accuracy and timeliness in dynamic digital environments. Cognitive analytics, integrating artificial intelligence, machine learning, and natural language processing, has emerged as a transformative approach to enhance audit precision and adaptability. By simulating human reasoning and contextual understanding, cognitive systems can analyze structured and unstructured data, interpret compliance documentation, and detect anomalies with greater accuracy. These systems not only automate evidence collection but also prioritize high-risk areas using predictive insights, thereby improving overall compliance efficiency. Furthermore, cognitive analytics enables continuous learning from historical audit outcomes, refining its models to adapt to evolving regulations. As a result, IT audit processes become more proactive, data-driven, and transparent. This paper reviews how cognitive analytics reshapes compliance auditing, improving reliability, speed, and accuracy while reducing operational overhead. The integration of cognitive intelligence represents a paradigm shift toward intelligent, adaptive, and autonomous compliance ecosystems capable of ensuring governance integrity in modern IT infrastructures.

DOI: http://doi.org/10.5281/zenodo.17880764

Published by:

Journal on Civil Engineering Topics

Uncategorized

IJSRET is an online platform which gives a way to scholars, researchers to share their research paper/review paper/survey paper in the field of civil engineering. There is no doubt that the demand and the need of engineers who are expertise in this field is increasing day by day. As the demand is increasing so the improvement is also required along with it. So, for an improvement we have created this platform in which a researcher and a scholar can find an number of civil engineering topics to publish their research paper or they can suggest if they have something new related. They can submit their paper by selecting submit option, they can also check the publication charge by clicking on check publication charges, after that their paper will be published within 3-4 days after the complete analysis of their research paper by our team.

Submit Your Paper 

Check Publication Charges

One can publish their journal by selecting the links given below –

Spark your career with IJSRET PUBLICATION

From then above ideas of topics of a journal, if a researcher haven’t find any according to their findings and research so, they can directly contact us or they can also leave a feedback for us. Our team will consider your topics if it is suitable. Through this platform a researcher can spark their career by publishing their research paper.</p?

Published by:

Research Paper Publication Sites

Uncategorized

Websites having valid ISSN number can publish papers on there portal. So scholars who are looking for research paper publication sites can cross check for valid publication house by the presence of eight digit number. Each of publication media has its own format for presenting there content to the globe with signature of its site like name, logo, ISSN number, etc. Sites for publishing research papers should be at-least three year old have papers in each volume and issue. It should be attentive for young researcher as well. Junior researchers who are new in this field of publication can read following point to filter good publication media.

  1. Valid E-ISSN number
  2. Good impact factor from reputed organizations.
  3. Global indexing
  4. Highly responsive for author in there paper submitting, publishing.
  5. Reviewer team for fast response

Submit Your Paper  / Check Publication Charges

Research paper publishing sites providing all above services are good journals. Scholars who are initializing their work can consult with mentor for the same for selection of international journal. One should cross check relevant content other paper on the site as this increase the journal relevance with the publishing site.

Published by:

International Journal of Scientific Research Impact Factor

Uncategorized

Impact factor is a parameter to judge a journal site means journal having high impact factor is good while lower is not so. International Journal of scientific research impact factor are good sites to publish there research paper. Here number of agencies provide impact factor to journals base on the paper content, readers, downloads, etc. Each have its own set of rules. Some of agencies provide this value between 0-10, 0-100, etc. All International journal have various set of indexing and impact factor which confuse a lot for the young researcher, so journals having following points are considered as better journals.

a. Atleast Four year old International Journal
b. Each volume and Issue should have papers
c. Good set of reviewer team
d. Provide Digital certificates after publication
e. Paper should visible with complete content on site
f. Journal validation like ISSN number should be clearly mention.

Submit Your Paper  / Check Publication Charges

So scholars who are searching international journal of scientific research impact factor can read this article and remain updated from sties showing high impact factor with very less number of volumes. Research should confirm publication charges as well before submitting paper as some of journal do not mention those which result in waste of time.

Published by:

IJSRET Volume 5 Issue 4, Jul-Aug-2019

Uncategorized

Energy Systems Management of Low Impact Manufacturing of Milk
Authors:- Osiatuma O. Samuel, Gabriel G. Ojo, James O. Akinyoola, Aderinsola M. Olawumi, Ifeoluwa E. Elemure, EstherI. Adetayo

Abstract:- Milk producers are productive by world standards, and average agricultural productivity has increased significantly in recent years. This is achieved by increasing land use for livestock, improving pastures and feeding management, and increasing machinery, agrochemicals and irrigation areas. Also, farms are often located in beautiful environments that are frequently visited by members of non-agricultural communities, and farms can be found in receiving areas that supply water to the landfill in the city. High rates of environmental concerns within the Community Life cycle analysis has been widely used in the assessment of industrial production systems and has increased interest in the implementation of agricultural production in recent years. This focuses on the initial assessment of the life cycle of the milk production system concerning energy management used in farms milk. Problems related to life cycle assessment methods and methods used in the application of high-level agricultural production systems with the energy required.

Implementation on Low Power and Less Area Multiplier Using Adder
Authors:- M.Tech. Scholar Sarvesh Mani Pandey, Asst. Prof. Anil Khandelwal

Abstract:- The main intention of the paper is to use booth multiplier algorithm for designing the binary multiplier with the help of Ripple carry adder. The reason for using the booth’s algorithm is that, using booth’s algorithm we can reduce the number of partial products during multiplication. The adder here we have used is ripple carry adder. This adder has a very simple architecture and is very easy to implement. As here we are dealing with high bits, If we see overall including the adder and booth’s algorithm we get a binary multiplier which has comparatively high speed because of less partial products and less power consumption because of the adder architecture we have used. The results are obtained by executing VHDL code in Xilinx 14.1 ISE ripple + booth2514 used out of 63400 power dissipated in the design 0.42WA And Total Delay 8.042the area occupied by the intended by calculating the number of LUTs used out of total available LUTs. Here in the intended the number of LUTs used is 1895 out of 63400 LUTs available. Design summary also gives other important information related to intend.

Experimental Analysis of Convective Heat Transfer from Plate Fin Array on a Exhaust Pipe of EGR System
Authors:- A.P.Bagal, Dr. J.H. Bhangale

Abstract:- In this research, experimentally investigate convection heat transfer of Exhaust Gas Recirculation system with an array of square fins and fin spacing of 10, 20, and 30 mm and fin height 5mm,10 mm,15 mm. By changing the surface temperature by varying the input power of the heating element.To measure the temperature of various points on each EGR. We used six thermocouples and measured its temperature under the steady-state condition. In addition, average natural heat transfer coefficient increases to a certain value and then decreases when fin spacing increases. In Exhaust Gas Re circulation system Nitrous Oxides are formed at higher Temperature. This Nitrous Oxides are Very harmful For Environment. To Improve Heat transfer Characteristics of EGR pipe by placing Fins at different spacing and height such that it reduces temperature of Exhaust gases so that it helps in reducing Nox pollutants from Diesel Engines. For this Purpose we used fins with 10mm spacing & height 5 mm, 20 mm spacing & height 10mm and spacing 30 mm &height 15 mm and heat transfer like convection heat transfer coefficient and convection heat transfer rate are observed.

A Review on Low Power and Less Area Multiplier Using Adder
Authors:- M.Tech. Scholar Sarvesh Mani Pandey, Asst. Prof. Anil Khandelwal

Abstract:- Speed of the multiplier is highly dependent upon the number of partial products generated and the adder architecture used to add these partial products. The main intention of the paper is to use booth multiplier algorithm for designing the binary multiplier with the help of Ripple carry adder. The reason for using the booth’s algorithm is that, using booth’s algorithm we can reduce the number of partial products during multiplication. The adder here we have used is ripple carry adder. The viper here we have utilized is swell convey snake. This snake has an extremely straightforward engineering and is exceptionally simple to actualize. As here we are managing high bits, If we see generally speaking including the viper and stall’s calculation we get a twofold multiplier which has nearly rapid on account of less halfway items and less power utilization as a result of the snake engineering we have utilized.

Investigation on Aerodynamic Performance of Elliptical and Secant give Nose Cones
Authors:- Danish Parvez, Sonia Chalia

Abstract:- In this paper, the computational and experimental approach was used to study the aerodynamic performance of elliptical and secant ogive nose cone profiles. The aerodynamic characteristic’s such as pressure, coefficient of pressure, axial velocity, total drag, dynamic pressure etc. for the secant and elliptical nose cone profiles were illustrated for low subsonic speeds for the same length to diameter ratio. Simulation were carried out with inlet velocity of 25 m/s, calculated for zero angle of attack to demonstrate the flow behaviour around the nose cone profiles. The data obtained from the computational analysis of the nose cone shapes was compared with the experimental data obtained from the wind tunnel analysis in order to find out the deviation. It was found out that the elliptical nose cone experienced less skin friction drag in comparison to secant ogive. Also, the velocity near the trailing edge in case of secant ogive was found out to be more when compared to elliptical nose cone. After comparing both the nose cones on the basis of coefficient of drag, skin friction drag and total drag experienced by the body, elliptical nose cone was found to be most efficient amongst the two.

Review on Properties of Concrete Using Silica Fume and Met kaolin as Partial Replacement of Cement
Authors:- Research Scholar Sukhendra Mani Tiwari, Asst. Prof. Sumit Rajak, Asst. Prof. K.G Kirar

Abstract:- The replacement of cement by various mineral admixtures as supplementary cementing materials for concrete has gained a global attention in recent years. This replacement becomes efficient not only by increasing the strength and durability of the concrete but also reduces the usage of the ordinary cement thereby curtailing the environmental hazardous due to cement manufacturing industries. This paper reviews the work carried out on the use of silica fume (SF)and Metakaolin (MK) as supplementary cementing materials for the partial replacement for cement. The literature demonstrates that both Silica Fume and Met kaolin are effective and causes significant improvement in various properties of the concrete in both fresh and harden state.

Experimental Investigation on Properties of Concrete Using Silica Fume and Met kaolin as Partial Replacement of Cement
Authors:- Research Scholar Sukhendra Mani Tiwari, Asst. Prof. Sumit Rajak, Asst. Prof. K.G Kirar

Abstract:- This experimental investigation is carried out to study the different strength characteristics of concrete with partial replacement of cement with Silica Fume and Metabolic. In this investigation cement of M25 grade of concrete is replaced with Silica Fume and Metakolin in different percentage as 5%, 10% and 15%. Experimental analysis of addition of Silica Fume and Metakolin in concrete has been done. Strength of concrete was determined by performing compression test (150mm x 150mm x 150mm) size cube, split tensile test (150mm diameter and 300mm length cylinders) and flexural strength (100mm x 100mmx 500mm) size beam.

Software Defined Data Center [SDDC] Concepts
Authors:- Logesh Rajendran

Abstract:- Data center is a facility built with IT equipment’s and support infrastructures, which enables an organization to delivery IT services. Data center predominantly contains compute, storage, networks interconnecting entire physical equipment’s using a communication network and this equipment’s helps businesses to organize, process, store, and retrieve large amount of data. Virtualization and Cloud have significantly impacted the data center infrastructures particularly in the network infrastructure. There are many additional demands in today’s data centers where the devices and applications are increasing. This paper explains the technology of server virtualization, storage virtualization and network virtualization present in the modern data center which is termed as Software Defined Data Center (SDDC).

Pure Water a Way to Get better Future Cloud Sucker Skyscrapers Pure Water’s Mine the Skyscrapers
Authors:- Gurveer Singh

Abstract:- This is the technique of getting pure water for fulfilling the various use of human needs. This technique is based on the principle of suction machine. This technique uses the cloud sucker machine within the skyscraper at some height from the ground. The cloud sucker machine is used for in halting the clouds from the sky. This is the easiest and the cheapest way of getting pure water in huge quantity for human needs. The use of skyscraper in modern era for getting water from the clouds is the biggest deal. As from the stone age to now we all depends on ground water but now when there is deficiency in ground water or when the ground water table goes on deceasing day by day may cause problem of deficiency of pure water for human need and may cause draughts. This innovation is better way of getting pure water in easiest way without any treatment and this innovation produces electricity from water without any water ponging method. This is the way to increase & protect the ground water table and water sources .There’s no need to purifying the sea water with costly method when the nature gives us lots of pure water on ground and in the sky also in the form of clouds.

A Survey on Demand side Management Various Requirements and Techniques
Authors:- Navin Kumar Sah, Prof. Ashish Bhargayah

Abstract:- Electricity demand in India is steadily increasing as electrical loads grows and largely due to population growth, as well as due to government subsidies which may lead to prices much lower than actual production cost. This growth represents a challenge that requires India power generation Company to invest huge amounts of money every year, for the construction of additional generation capacity along with the reinforcement of transmission network to meet the consumption growth. Also the demand varies frequently throughout the day, causing a waste of a large part of the energy. So the optimum solution lies in altering the load shape in order to have a better balance between customer’s consumption and power generation companies. Here detail survey of different demand side management (DSM) techniques was study. Here paper gives a brief review of research conduct by various other researchers in this field of DSM. Explanation of working architecture was also done.

Evaluation and Identification of Android Networking Libraries
Authors:- Jaydevi Bhade, Prof. Himanshu Yadav

Abstract:- Every single person in our population has mobile and most of the work doing through mobile phone. Now expansion of internet, mobile technology becomes more popular. For this android development has really charm for us. This research is study of different networking libraries used in mobile for network communication. Therefore, there are lots of open source network libraries that app developers use on a daily basis for development. In Old days, networking in android was a frightening. At this time the problem is find out which solution fits for better android app projects development necessities. Thus, android developers face the tendentiousness of selecting an appropriate network library for their specific mobile application. To reduce the challenge, this paper proposes an empirical method for bench marking, which includes a comprehensive study of selected libraries and a selection of representative metrics. This paper has four android networking libraries Http Client, Volley, Retrofit and Fast Android Networking are selected for study analysis. This research examines these libraries and find which library is suitable for developers as their necessities so that they provide better experience to mobile app users.

An Audit, Assessment and Cost Analysis of Road Accident for Road Safety at Selected Stretch of NH-52
Authors:- M.Tech. Scholar Juber Khan, Asst. Prof. Himanshu Bhardwaj, Prof. Dr. Bharat Nagar

Abstract:- Road traffic accident in India is taken as an event, not a evil event, it has a huge loss to country’s human, health and economical crises. Road traffic accident have great impact on individuals, communities and nation. This is leading cause for massive cost to frequent overburden healthcare system, productivity and prosperity with deep social and economic loss. The natural causes are due to the act of god and cannot be prevented but on the other hand road accidents are caused by the manmade environment and can be controlled WHO reports says that 1.24 million people suffered from road traffic accident i.e. 3400 person daily worldwide, and it is 1st leading cause for death in 15 -29 years age person. More than 90% of accident occurs in low-middle income countries, without any action it will leads to 1.9 million in 2030. In India, According to the MORTH report, road accidents on National Highways, State Highways and Other Roads are 30.4%, 25.0% and 44.6% respectively of the total road accidents. Reports also prevails that the number of accidents is more in rural area than urban develop area. This study comprises of finding cost of accident with respect to social and economical loss of nation so that I could give recommendations to minimize the risk and severity of accidents in study area, by analyzing the road safety features, and accident analysis using data and various research for achieving “BARSIALS ZERO ROAD ACCIDENT VISION 2020”.

Endoscopic Image Enhancement using Blind Denoising
Authors:- Snehal Pawar, Amarsinh Deshmukh, Rahul Mulujkar

Abstract:- Biomedical images such as endoscopic images, retina, MRI, X-ray plays important role in the analysis and diagnosis of the internal body structure. Endoscopic image is used during pregnancy, plastic surgery, orthopedic surgery, spinal surgery etc. to examine internal body structure. Endoscopic images are corrupted with various types of noise. The noisy image results into inaccurate diagnosis and thus the endoscopic image denoising is essential. In this paper a method known as blind denoising has been used to improve the visual quality of the images. In the proposed method we first estimate the noise level in the image obtained. Now having known the noise level we apply BM3D algorithm to denoise the endoscopic image. By the proposed method it is found that the PSNR of the test image is improved. The enhanced image will help the doctors for accurate diagnosis.

Enhancement of Free Convection Heat Transfer from Horizontal Rectangular Fin Array with antagonistic space& Stepped Rectangular Notch
Authors:- PG Student P.S.More, N.G.Narve, Emiritus Prof. N.K.Sane

Abstract:- Heat transfer thanks to free convection of air from compensative, full rectangular fin array are investigated through an experiment. For study purpose short fin array has been designated that show single chimney flow pattern. Middle portion of fin array becomes in effective thanks to vaso constrictor distinction between getting in to air &fin surface. Therefore in gift study, middle portion is removed by cutting rectangular notch and more wherever more recent air are available contact with fin expanse. Results are obtained over vary of spacing from 12mm to 25mm and warmth input from 25W to 100W. Length & height of rectangular fin array was unbroken constant. Comparison has been created between full, compensative rectangular fin arrays. it’s found that full rectangular fin array performed higher of course.

Implementation of Crowd Surveillance Iot System by Using Digital Image Processing Algorithm
Authors:- Research Scholar Sanjay Singh, Asst. Prof. Adesh Srivastava

Abstract:- Determining the size of crowd in real time is a major research area these days. The input regarding the crowd size to the security managements may serve a greater cause of safety. The manual detection of the crowd size from the CCTV by monitoring the video by human is accurate but it requires 24X7 continuous monitoring the video, which is not possible if the guard is observing more than one video. So the automatic detection of the crowd size will beneficial. The contribution of this thesis is in the field of crowd counting. Size of crowd is a important clue of a present scenario, therefore the maximum existing peoples counting methods have utilized the important scenario to count the existing crowd. Great challenge is to obtain an efficient method for crowd density now days. In this thesis, a novel approach is proposed which is based on local image features, which are specific to individuals and groups within a scene, so the total crowd estimate is the sum of all group sizes. An extensive analysis shows that local features consistently outperform holistic features. This thesis proposes a novel visual representation called textures of optical flow which captures the properties of motion patterns in crowded environments by applying traditional textural features directly to an optical flow field. Results demonstrate that the proposed approach outperforms existing algorithms on benchmark anomaly detection sequences. In order to bring an automated solution to this problem, we propose a novel approach.

K-Fold Cross-Validation Machine Learning Approach on Data Imbalance for Wireless Sensor Data:-A Review
Authors:- M. Tech. Scholar Mandavi Tripathi, Asst. Prof. Ankur Taneja, Asst. Prof. Lakhan Singh

Abstract:- Machine learning is used to teach machines how to handle the data more efficiently. Sometimes after viewing the data, we cannot interpret the pattern or extract information from the data. In that case, we apply machine learning with the abundance of datasets available. The purpose of machine learning is to learn from the data. Many studies have been done on how to make machines learn by themselves. Data imbalance problem become greatest issue in for machine learning algorithm. Imbalance problem occur where one of the two classes having more sample than other classes. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The most of algorithm are more focusing on classification of major sample while ignoring or misclassifying minority sample. The minority samples are those that rarely occur but very important. There are different methods available for classification of imbalance data set which is divided into three main categories, the algorithmic approach, data-pre-processing approach and feature selection approach. We will apply on wireless imbalance data to identify correct information. In this research work systematic study for define which gives the right direction for research in class imbalance problem. By review on K-fold cross validation algorithm we indentify problem as well as we will work on this solution to estimate the skill of the model on new data.

Green Synthesis of Silver Nanoparticles and the Detection of Urea in Milk Sample by Spectrophotometric Method Using Silver Nanoparticles
Authors:- Sadhan Jyoti Dutta

Abstract:- Synthesis of silver nano particles(AgNps) and the development of silver nanoparticles(AgNps) has been done using the green synthesis method. Tea extract(Camelia sinensis) has been used as the reducing agent(bioreductor) due to its presence of antioxidant property(Catechin compounds) which will help to reduce silver nitrate(AgNO3) to silver nanoparticles. The Ferrous Reducing Antioxidant Power(FRAP) assay was used to determine the antioxidant power of the plant extract(tea). Accordingly, the plant extract(tea) was added to the silver nitrate(AgNO3) solution to form silver nanoparticles (AgNps) and also citrate-capped AgNps. These two types of AgNps were then characterized with the help of UV-Vis Spectroscopy. The silver nanoparticles that were developed were then used for the detection of urea present in milk which is used as an adulterant to increase the protein content in milk. For this purpose, whey protein was prepared from milk using centrifugation and filtration, thus separating whey protein from casein. Stock samples were prepared by adding AgNps and citrate-capped AgNps to the whey protein with and without urea as contaminant. Visual changes were observed in the contaminated samples and also the change in absorbance was observed with the help of UV-Vis Spectrophotometer.

Automation in Fire Protection System Using Internet of Thing (IoT): A Review
Authors:- Vikash Kumar Singh, Lakhan Singh

Abstract:- In current scenario we all want automation in every important work like water saving, Electrical power saving fire protection system etc. By using Internet of thing we can achieve automation from anywhere or remotely. IoT is an important sector which deals with the data distribution and internet usage over the component communication. Fire is unpredictable situation and very dangerous if it happens. So, it is important to detect and act fast before the condition get worst. In this paper, we will study about an IoT based Fire Alerting System for buildings which can detect fire as early as possible using various sensors, act accordingly without any human interaction and send related information through IoT. In this Review paper will analysis of fire protection system and their solution.

Green Supply Chain Management with Artificial Intelligence Based Optimization
Authors:- Dhananjay Kumar Yadav, Mr. Kamlesh Gurjar

Abstract:- Green supply chain management is one kind of modern management patterns which changes the relationships between the traditional environment government and enterprise development, its development has the important influence on promoting the enterprise and society’s sustainable development. According to the circular economy theory and the structure of traditional supply chain, this paper constructs the green supply chain’s system structure based on the circular economy, which includes four cycles from small to large and from partial to whole as follows: Reuse cycle, Remanufacture cycle, Recycle, And analyzes the viewpoint that the own activity of human being only could pursue the semi-closed circulation, the completely closed macro cycle could only be realized by the union with nature, then proposes the way how to implement the green supply chain management in our country based on the idea of circular economy.

A Review On Multi Storied Building By Changing Different Shapes of Shear wall For Zone IV & V Under Plain And Sloping Ground Condition
Authors:- M. Tech. Scholar Shriya Chandrakant Agrawal, Prof. Pratiksha Malviya

Abstract:- In the seismic design of buildings, reinforced concrete structural walls, or shear walls, act as major earthquake resisting members. Structural walls provide an efficient bracing system and offer great potential for lateral load resistance. The properties of these seismic shear walls dominate the response of the buildings, and therefore, it is important to evaluate the seismic response of the walls appropriately. In this present study, main focus is to determine the solution for shear wall location in multi-storey building. Effectiveness of shear wall has been studied with the help of four different models. Model one is bare frame structural system and other three models are dual type structural system.

Big Data -The Future of the Next Big World
Authors:- Mohammad Azhar

Abstract:- Big data analytics has come out as a new important field of study for both researchers and practitioners, demonstrating the significant demand for solutions to business problems in a data-driven knowledge-based economy. Additionally, empirical studies examining the impacts of the nascent technology on organizational performance, especially the influence of organizational culture each type of organizational culture – hierarchy, clan, adhocracy, and market – has impacts on each Big V of big data. The framework suggests that firms, influenced by their organizational culture, have different views on how important each Big V’s should be. The study argues that organizations should develop, nurture, and maintain an adhocracy organizational culture that has a positive impact on each of the five Big V’s to harness the full potential of big data.

Digital Examination through Web Services
Authors:- M.Tech. Scholar Shaik Reshma, Asst. Prof. Shaik Nyamathulla

Abstract:- Digital examination through web services project is a web portal that is developed or implemented using ASP.Net and Database. It is helpful for the learners to practice different mock examinations from this site. In the present generation number of the entrance examinations for higher education’s like EAMCET, PGECET, GRE, GATE, government examinations like SSC CHSL, CGL, Bank job examinations, etc. are conducted through the online system. It will helpful for learners to practice different mock examinations from this website. Though there were already online existing examinations, no other service is providing the functionality of re-examination at the time of practice and there is no opportunity of logging out at the middle of the exam and re-starting from that particular question whenever logged in. This Digital Examination through Web Services provides these additional services and generates the report analysis of the user at every attempt. By this, it is providing the user to overcome their mistakes and get domain knowledge effectively. The Digital Examination service has two modules. They are the Admin and the Users. Admin can create an exam, prepare questions, and manage users. Each exam has a subject name and the system allows adding the questions of different types for exams by the admin. It also allows setting many exams. Here Admin could change the user details. User can take the exam and can track exams he has taken. While taking the exam, one question is to be displayed at once. There is no previous button. During exam progress, it displays the number of questions completed and the number of questions remained. Service allows the user to continue from the same question later if the user stops in the middle. Thus, it helps the students to ought to register with the application, choose interesting courses, and participate in the test digitally.

Evaluation of Android Networking Libraries
Authors:- Jaydevi Bhade, Prof. Himanshu Yadav

Abstract:- Every single person in our population has mobile and most of the work doing through mobile phone. Now expansion of internet, mobile technology becomes more popular. For this android development has really charm for us. This paper deal with networking libraries used in mobile for network communication. Therefore, there are lots of open source network libraries that mobile developers use on a daily basis for development. At this time the problem is find out which solution fits for better android app projects development necessities. Thus, android developers face the tendentiousness of selecting an appropriate network library for their specific mobile application. To reduce the challenge, this paper proposes an empirical method for benchmarking, which includes evaluation of selected libraries and a selection of representative metrics. Here we have four android networking libraries Http Client, Volley, Retrofit and Fast Android Networking are selected for evaluation. This paper examine these libraries and find which library is suitable for developers as their necessities so that they provide better experience to mobile app users.

Effect Of V-Cut Out Ratio On The Performance Of Flow And Heat Transfer Enhancement In A Horizontal Pipe
Authors:- Shailesh Pandey, Abhishek Arya

Abstract:- In this work, forced convection heat transfer through a horizontal pipe built-in with/withouttwisted tape-inserts is numerically studied under a uniform heat flux condition. Water is used as aworking fluid. The governing equations are numerically solved in the domain by a finite volumemethod (FVM) using the Realizable κ–ε (RKE) model. The computational results are performedfor a range of the Reynolds number (4000≤ Re≤ 12000), the twisted ratio 4. Two type of twisted tape which inserts across a circular pipe(P-TT) and (V-cut) are carried out. The influence of these parameters on the local, average Nusselt Number and the thermal performances were examined with a plain pipeunder similar conditions. The results show that the average Nusselt number and friction factorrise as the twisted ratio rise for any value of Reynolds number. Furthermore, thermal performance factor tended to increase with increasing Re and decreasing tape twist ratio. Obviously,the (V-cut) twisted- tape and (P-TT) twisted tape with TR = 4 gave a higher mean thermal performance factor (1.974 and 1.745) than that with TR = 4, respectively. In the proposed work we used three different cut ratios are 0.6, 0.8, 1, and 1.25 and get the better heat transfer factor on 1.25 cut ratio.

Optimization of Energy in Wireless Sensor Networks
Authors:- M.Tech. Scholar Priya Yadav, Assistant Prof. Mukesh Pathela

Abstract:- The stated goal was to achieve the maximum utilization of the resources offered by the set of nodes that forms the network, allowing simultaneously sending reliably and efficiently all types of content through them, and mixing conventional IP data traffic with multimedia traffic with stringent QoS and QoE requirements. Using the information gathered in the previous phase, we have developed a network architecture that improves overall network performance and multimedia streaming. In parallel, it has been designed and programmed a communication protocol that allows implementing the proposal and testing its operation on real network infrastructures. In the last phase of this thesis we have focused our work on sending multimedia in wireless sensor networks (WSN). Based on the above results, we have adapted both the architecture and the communication protocol for this particular type of network, whose use has been growing hugely in recent years.

A Survey on Various Features and Techniques of Social Bot Detection
Authors:- M.Tech. Scholar Rishi Tiwari, Prof. Amit Ganguli

Abstract:- This paper presents the study of various methods for detection of fake profiles. In this paper a study of various papers is done, and in the reviewed paper we explain the algorithm and methods for detecting fake profiles for security purpose. The main part of this paper covers the security assessment of security on social networking sites. This paper give a brief survey of social bot detection challenges. Here features of fake profiles are collect. Hence paper reveals the potential hazards of malicious social bots, reviews the detection techniques within a methodological categorization and proposes avenues for future research.

Human Face & Emotion Recognition Using Deep Neural Networks Based On Local Binary Patterns
Authors:- V. Bharath Kumar Reddy , T. Venkataramana , K. Suresh

Abstract:- Facial expressions play a major role in Face Recognition Systems and image processing techniques of Human computer Interface. There are several techniques for facial features selection like Principal Component Analysis, Distance calculation among face components, Template Matching. This algorithm describes a simple template matching based facial feature selection technique and detects facial expressions based on distances between facial features using a set of image databases. For interactive human computer interface (HCI) it is important that the computer understand facial expressions of human. With HCI the gap between computers and humans will reduce. The computers can interact in more appropriate way with humans by judging their expressions. There are various techniques for facial expression recognition which focuses on getting good results of human expressions. Most of these works are done on standard databases of foreign origin with six (Neutral, Happy, fear, Anger, Surprise, Sad) basic expression identification. We propose Zernike moments based feature extraction method with support vector machine to identify eight expressions including Disgust, and Contempt.

“Studies on Benzene & Toluene Pollutant & Their Removal by Vedic Yagya Over Meerut Area of Delhi NCR”
Authors:- Dr. Nidhi Rani, Abhishek Kumar Singh

Abstract:-In this paper, the practical work was carried for a duration approximately two years. Sampling of Benzene and toluene was carried Monthly basis & 24 hours twice in a month & data was collected. The present study is very useful to regulatory authorities & administration to understand problems of air pollution in the Meerut area of NCR & helpful in prevention of Air Pollution. Benzene & Toluene are considered as a characteristic of the carcinogenic and toxic contaminants of ambient air quality of Meerut. Benzene and toluene are carcinogenic and hazardous to biotic life and no safe level of exposure can be recommended. In Meerut City, the residential area, commercial and industrial area during four seasons at 3 different locations viz. summer, Monsoon, Post monsoon & Winter. Variations in levels of Benzene & Toluene were observed during these seasons. This paper also gives brief knowledge about effects of VadicYagya (hawan) on pollutants & their removal reaction between pollutants & environment.

A review of gear power transmission optimization by using genetic algorithm
Authors:- Aarti Jaiswal, Prof. Ganesh Kesheorey

Abstract:- This Review Paper gives the information about Bending and Contact Stress Analysis of Helical Gear. Thus, this review paper mainly focus on the ANSYS, MATLAB finite element methods and AGMA standards for computation of bending and contact stress on a root of helical gear. In this paper the bending stress and contact stress of the gear tooth are examined and are to be one of the main contributors for the failure of the gear in a gear set. Thus, the analysis of stresses has become popular as an area of research on gears to minimize or to reduce the failures and for optimal design of gears. Authors have use various Approaches and means to conclude their main objective of finding out the contact stresses and gear failure causes in static condition using Finite Element Analysis, AGMA Standards MATLAB. This review paper contains theoretical, numerical and analytical methods for the helical gear pair analysis.

Traffic Flow Control by using Ann Based Designing Toll Plaza Configuration
Authors:- ME Student Shubham Soni, Prof. Vinay Deulkar

Abstract:- Computer simulation is one of the popular approaches to the design of toll plazas. Toll plaza configurations such as toll collection methods, number of toll booths, and types of vehicles have been studied in the literature. Traffic flow types can be another influential factor when designing toll plazas, especially in case that traffic flow information is not available, but only the estimate of traffic volumes. Few studies have reported the effect of traffic types on toll plaza performances. In this article, aANN simulation method is used to analyze the sensitivity of toll plaza performance for different types of traffic flow. Two traffic patterns, deterministic and probabilistic traffic flow, is considered. This study is based on a proposed project for building a toll Plaza in the indirectly. The estimated future traffic counts for the toll bridge are used to study the difference between the two traffic patterns.

Reduction Power Loss in 33 Bus Systems with Improvement of Power Quality
Authors:- M.Tech. Scholar Haripratap Yadav, Assistant Professor Abhay Solanki

Abstract:- Penetration of distributed generation (DG) units in distribution network has increased rapidly stimulated by reduced network power loss, improved bus voltage profile, and better power quality. Appropriate size and allocation of DG units play a significant role to get beneficial effects. The objective of this study is to demonstrate a simple and fast technique to determine appropriate location and size of DG units. A voltage stability indicator (VSI) is derived which can quantify the voltage stability conditions of buses in distribution network. According to VSI, vulnerable buses of the network are arranged rank-wise to form a priority list for allocation of DG units. To determine the size of DG units, a feed forward artificial neural network is prepared in MATLAB environment (The Math Works, Inc., Massachusetts, USA). The effectiveness of the proposed methodology has been tested on a 52-bus radial distribution network. After appropriate allocation of DG units, voltage profiles of most of the buses are increased significantly. The results also indicated that the total loss of the distribution network has reduced by nearly 76.39%, and voltage stability conditions of buses are improved considerably. Voltage stability conditions of bus-10, bus-20, and bus-33 are raised by 23.16%, 29.23%, and 37.64% respectively.

Tag Based Recommender System for Scholarly Data
Authors:- Mohit Kumar, Prof. Shilpa Verma

Abstract:- Recommender Systems are being used nowadays in every field online and they help to play an important role in user/customer satisfaction and attraction. The motivation to write this article comes from the struggles that a research scholar goes through while finding the perfect paper to read. In this article, the aim is to generate recommendations to the users by eliminating the cold start problem. This paper works on finding a suitable article for the user by keyword matching from user profile and existing data set. Various different bibliometrics have been used in this article to apply the underlying method for generating a similarity index for the documents. The method of tf-idf score calculation has been used to find the similarity between the keywords the user is interested in and the keywords that occur in the content of a certain article. The scores were calculated for each document by finding the relevance between the user keywords and paper keywords to find level of relevance of the documents and hence generate the recommendations accordingly

Pso Based Power Loss Reduction in Ac-Dc Systems
Authors:- M.Tech. Scholar Suraj Kumar Kushwaha, Asst. Prof. Abhay Solanki

Abstract:- This paper presents a new optimization approach for solving the economic operation with consideration of wind, solar, micro-turbine, fuel cells, battery and load in an energy system. mathematical models of each micro source and the system model of the micro-grid economic operation are established, and the system model is solved by improved particle swarm optimization (pso) algorithm. the best output of each micro source and energy storage unit and the lowest operating cost comparing by improved pso is compared with the traditional pso. the matlab simulation indicates the high speed and accuracy of the improved pso, and verifies the effectiveness of the model..

Managing Data Truthfulness and Privacy Preservation in Data Markets
Authors:- M.Tech. Student J. Janardhanam, Asst. Prof. K.Suresh, Asst. Prof. K. Suresh

Abstract:- As a important business model, various online data platforms have developed to meet society’s requirements for person-specific data, where a service provider catches information from data providers and then suggestions value-added data services to data users. However, in the data trading layer, the data users encounter an important problem, i.e., how to check whether the service provider has accurately gathered and processed data? Moreover, the data givers are frequently opposed to sharing their sensitive individual data and original identities to the data users. In this paper, we propose TPDM, which proficiently associations Truthfulness and Privacy preservation in Data Markets. TPDM is structured inside in an Encrypt-then-Sign method, by partially homomorphism encryption and identity-based signature. It concurrently helps batch verification, data processing, and outcome verification, while maintaining identity protection and data confidentiality. We also instantiate TPDM with a profile matching service and a data-sharing service, and broadly assess their presentations on Yahoo! Music evaluations dataset and 2009 RECS dataset, correspondingly. Our study and assessment out comes show that TPDM reaches various excellent features while acquiring little calculation and communication overheads when establishing large-scale data markets.

SSSC FACTS Device in Reactive Power Flow Solution
Authors:- M.Tech.Scholar Divya Jaiswal, Assistant Prof. Abhay Solanki

Abstract:- This paper describe the reactive power flow solution based BBO to amend the performance of the power system. Biogeography-based optimization is incorporating flexible AC transmission systems (FACTS). Static Synchronous Series Compensator (SSSC) is type of FACTS device used in this paper. In this BBO Store best parent solution and apply mutation and migration process on remaining parents to produce best fitted child sets. This paper define the problem of optimal power flow solution is very severe in modern interconnected transmission system the control of reactive and real power has to be fast to insure that the system remains stable under all condition of operation. The use of thyristor based controllers enable a transmission system to be flexible using SSSC FACTS is a series connected FACTS controller. The proposed BBO method gives better solution quality compared to particle swarm optimization with static synchronous series compensator facts device. The simulation results show that the proposed BBO algorithm is effective, fast and accurate in finding the optimal parameter settings for FACTS devices to solve OPF problems. BBO algorithm is tested on IEEE 14-bus with SSSC FACTS device gives better solution to enhance the system performance.

Distribution Transformer Condition Monitoring System Using Artificial Intelligence
Authors:-M. Tech. Scholar Sakshee Naiwal, Asst. Prof. Abhay Solanki

Abstract:- Distribution transformer is an important asset in distribution network. Its operation and control are important aspects which determine the reliability and quality of power supply. A remote condition monitoring system for distribution transformer is discussed here. Different parameters are acquired and processed in remote terminal unit. This communicates the data to the operator end using internet. According to parameter values, health index of a transformer is found out at the operator end interface. Analysis is based on health index. This system is different from power transformer condition monitoring systems in condition monitoring techniques used and communication. A cheaper system is designed which precisely evaluates the health status of a transformer. The test results are taken from a specially designed transformer.

Enhancement of PI Voltage Controller Performance Based on Self-Excited Induction Generator STATCOM
Authors:-M. Tech. Scholar Rahul Kumar, Asst. Prof. Deepak Bhataniya

Abstract:- Principal objective of this paper is to investigate the behavior of STATCOM against SVC controller by setting up new control parameters. Essentially, STATCOM, and SVC linear operating ranges of the V-I and V-Q as well as their functional compensation capabilities have been addressed to meet operational requirement with certain degree of sustainability and reliability. Hereby, the other operating parameters likewise transient stability, response time, capability to exchange real Power and Power Losses have also been addressed in STATCOM against SVC control models. In addition to that, STATCOM-Controller’s pragmatic response has been identified and determined reliability level to maintain full capacitive output current at low system voltage. Therefore, it indicates that STATCOM device has more effectiveness than the SVC in improving transient stability (first swing).

Design and Implementation of Wind-Solar Hybrid Power Generation System
Authors:-M.Tech. Scholar Akshay Chouhan, Asst. Prof. Deepak Bhataniya

Abstract:- The ongoing upsurge in the interest of PV (AC/DC SMART GRID) frameworks is because of the way that they produce electric power without hampering nature by straightforwardly changing over the sun oriented radiation into electric power. Anyway the sun oriented radiation never stays consistent. It continues changing for the duration of the day. The need of great importance is to convey a consistent voltage to the network regardless of the variety in staggered inverter. We have planned a circuit to such an extent that it conveys steady and ventured up dc voltage to the heap. We have examined the open circle attributes of the PV exhibit with variety in staggered inverter levels. At that point we coupled the PV exhibit with the lift converter so that with variety in burden, the changing info current and voltage to the converter pursues the open circuit normal for the PV cluster intently. At different disconnection levels, the heap is shifted and the comparing variety in the info voltage and current to the lift converter is noted. It is noticed that the changing info voltage and current pursues the open circuit qualities of the PV exhibit intently.

Enhancement of Performance Speed Control of DC Motor Using Chopper
Authors:-M. Tech. Scholar Manish Yadav, Asst. Prof. Lavkesh Patidar

Abstract:- The speed of separately excited DC motor can be controlled from below and up to rated speed using chopper as a converter. The chopper firing circuit receives signal from controller and then chopper gives variable voltage to the armature of the motor for achieving desired speed. There are two control loops, one for controlling current and another for speed. The controller used is Proportional-Integral type which removes the delay and provides fast control. Modeling of separately excited DC motor is done. The complete layout of DC drive mechanism is obtained. The designing of current and speed controller is carried out. The optimization of speed controller is done using modulus hugging approach, in order to get stable and fast control of DC motor. After obtaining the complete model of DC drive system, the model is simulated using MATLAB(SIMULINK).The simulation of DC motor drive is done and analyzed under varying speed and varying load torque conditions like rated speed and load torque, half the rated load torque and speed, step speed and load torque and stair case load torque and speed.

An enhancement HVDC Transmission System
Authors:- M.Tech. Scholar Mritunjay Kumar, Asst. Prof. Abhay Solanki

Abstract:- The advantage of parallel ac-dc power transmission for the improvement of transient and dynamic stability and damp out oscillations have been established. Present paper proposes a simultaneous ac-dc power flow scheme through the same transmission line to get the advantages of parallel ac-dc transmission to improve stability and damping oscillations as well as to control the voltage profile of the line by controlling the total reactive power flow. Only the basic idea is proposed along with the feasibility study using elementary laboratory model. The main object is to emphasize the possibility of simultaneous ac-dc transmission with its inherent advantage of power flow control. Control methods based on selective harmonic elimination pulse-width modulation (PWM) techniques with fuel cell system offer the lowest possible number of switching transitions and improve the voltage level in SAF transmission system. This feature also results in the lowest possible level of converter switching losses. For this reason, they are very attractive techniques for the voltage-source- converter-(VSC) based high-voltage dc (HVDC) power transmission systems.

Computerized Segmentation and Recognition of Brain Tumor in MRI Using Genetic Algorithm
Authors:-M. Tech Scholar N. Viswavadha Reddy, Asst. Prof. & HOD P. Bhanu Prakash Reddy

Abstract:- Nowadays Image processing is the best developing and inspiring field. MR images act as the main source for the development of a classification system. Recognition of a brain tumor is a very collective disease in the current state of health care society. Image segmentation is used to remove the abnormal tumor portion in the brain. Segmentation of brain tissue in the magnetic resonance image (MRI) is very significant for identifying and presence of outlines of the brain tumor. The extraction, identification, and segmentation of affected area from the MR images of the brain are substantial but it is a time-consuming task for the medical experts. To overcome this drawback, it is most important to use computer-aided methods. To improve the accuracy and efficiency of medical image segmentation procedure, the proposed tumor segmentation is built on an adaptive threshold algorithm. Deep learning CNN classifier used to compare the test and trained data and produces the result for tumor. The proposed system results have been estimated and validated based on accuracy, sensitivity, and specificity. The detection, extraction, and classification of MR brain images are done by using MATLAB.

Classifying Vehicle Activity Patterns from IOT Device: A Survey
Authors:-M. Tech Scholar Prachi Pandey, Asst. Prof. Ankur Taneja

Abstract:- In this work, the Internet of Things Technology can greatly enhance the performance, monitoring and maintenance of the vehicle. In this paper analysis is based on the Implementation of new cost effective methodology based on IoT to monitor vehicle health remotely for performance evaluation. Information from the sensors is transmitted via the mobile radio network. The vehicle consist of onboard GPRS module which collect the CAN data from the CAN device fitted on the vehicle and send it to the remotely located server. Second phase work focus on Monitoring the temperature of the vehicle system avoid sparking of the vehicle and also providing the fuel consumption & Battery information of display and third phase of implementation using of GSM Module when vehicle is provide the unusual activity & driver is facing any problem then it give message to the owner of vehicle. This will facilitate preventive maintenance, fault detection, historical analysis of the vehicle in addition to real time monitoring. In this paper we analysis the different vehicle parameters via remote monitoring system.

Vehicle Number Plate Recognition System Using Morphological Operations
Authors:-M. Tech. Scholar Y. Harika, Asst. Prof. & HOD, P. Bhanu Prakash Reddy

Abstract:- The vehicle number plate recognition system depends on image processing technology. It is one of the most fundamental systems invented to identify the vehicle number plate. In today’s environment with the developing quantity of vehicle day by day, it’s not potential to manually hold a document of the whole vehicle. With the growth of this vehicle number plate recognition system, it enhances simple to hold a document and manage it whenever needed. The main purpose is to compose an effective vehicle number plate recognition system by using a vehicle number plate. The method first would obtain the image of the vehicle number plate as soon as the vehicle reaches the safety checking region. The obtained images are extracted by applying the segmentation process. Visual character recognition is employed to recognize the signs, numbers, and letters. The method is executed and simulated on MATLAB and performance is examined on original images. This kind of method is extensively utilized in Traffic control regions, toll gates, parking zone, etc. This system is essentially planned for the view of the protection policy.

A Glimpse: Comparison of Fog Computing and Cloud Computing
Authors:-Mr. Rakesh Kumar PGT (IT)

Abstract:- The term fog computing was coined by Cisco in 2014, so it is new platform and environment for the public. Nowadays, Fog and cloud computing are interconnected. Fog computing is also known as fogging. In nature, fog is closer to the earth than clouds; in the era of technology, it is just the similar, fog is closer to end-users, bringing cloud capabilities down to the ground. Fog Computing is an extension of cloud computing which is used broadly. This paper is generally consists of comparison of fog computing and cloud computing.

Historical Survey on Software-Defined Networking
Authors:-Juhi Roshan, Abdullah Mahmood

Abstract:- Technology advancement in terms of networking is urging computer networks for high accessibility, bandwidth, ubiquitous and dynamic management. The information and communication technologies, therefore, demand new challenges to the future internet. The traditional networking approaches are non-error-prone and cumbersome, and they can’t utilize the capability of the physical network infrastructure to its fullest.

Human Face Detection & Segmentation Based on Local Binary Patterns in Computer Vision
Authors:-M. Tech Scholar Vayalpad Murali, Asst. Prof. & HOD P. Bhanu Prakash Reddy

Abstract:- Face identification is a biometric software application able to identifying or testing a person by matching and examining patterns based on the person’s facial outlines. The face detection system is exciting research topics in the area of robotic vision. Various algorithms have been introduced to resolve any queries related to changes in the environment and flash situations. In this investigation, we present a novel algorithm for face recognition. The proposed system utilizes the well-known local binary patterns (LBP) algorithm and K-means clustering for face segmentation and supreme likelihood to analyses the amount of data. This proposed paper is producing effective face identification i.e. feature extraction and face identification system using local binary patterns (LBP) method. It is a texture-based algorithm for face verification which describes the texture and shape of images. The pre-processed image is broken into small pieces from LBP histograms are produced and then concatenated into a particular feature vector. This feature vector represents an active role in the representation of the face and is used to estimate similarities by measuring the distance among Images. This paper shows the principles of the technique and implementation to perform face identification.

Assessing Factors Affecting Income Diversification of Rural Households FagitaLokomaWoreda, Awi Zone, Ethiopia
Authors:-Feleke Shitu (BSc.), Advisor Alemayehu A. (MSc.), Associate Prof. M.Senapathy (Ph.D.)

Abstract:- This research was conducted on assessing factors that affect income diversification of rural households in FagitaLokoma district. Thus, the general objectives of the study was to examine factors that affect income diversification’s of the rural household’s and more Specifically; to analyze the factors that affect rural household’s level of income diversification and to identify determinants of level of income diversification.Multistage sampling technique was used; and the samples of 50 households were interviewed. Both descriptive and econometric analysis was made so as to achieve the objectives. As far as the extent of income diversification is concerned, about 48% of the sample households were found to diversify income whereas the majority(52%) were not diversify their income. The major reason,among others, for this might be land size, fertility of land, sex of respondents, age of respondents, etc. The study has revealed that households with large land size were less in income diversification when compared with those households with small land size. Moreover, relatively old people were found to diversify their income more than young people. Similarly, male headed households have high tendency to diversify income when compared with female headed households. The result of Binary LogitRegression Model has shown that six variables have significantly affected income diversification. Thus, sex of the household heads and primary occupation has negatively affected income diversification whereas age, land fertility, land size, and market access have positively affected income diversification. As market is crucial and important criteria in order to diversify income so the government has given the special protection and control of the market activities. Government should empower women in non/off-farm activities because sex was significant variable. Rural household should improve fertility of the land by using organic and inorganic fertilizer.

Simulation of Real and Reactive Power Flow Assessment with Facts Devices Connected to Transmission Lines
Authors:-M Tech Scholar Vikash Kumar Yadav, Asst. Prof. Neeraj Kumar Kumawat

Abstract:- The changeless objective in the field of electrical power networks is to discover better approaches for transmission and distribution of power as far as minimum cost and reliability. Due to explosive growths in the power demand, deregulation and distributed generation facilities, these systems are possible to be exposed to stability problems ever than before. The interline power flow controller (IPFC and UPFC) is one of the most recent age flexible AC transmission system (FACTS) controller used to control power flow of multi transmission lines. The fundamental control for the IPFC is with the end goal that the series converter of the UPFC controls the transmission line real/reactive power flow and the shunt converter of the (IPFC and UPFC) controls the bus voltage/shunt reactive power and the DC connect capacitor voltage. On account of the basic connection, any inverter inside the (IPFC and UPFC) can transfer real power to some other and accordingly encourage real power move among the lines of the transmission system. Since each inverter can give reactive compensation, the (IPFC and UPFC) can do a overall real/reactive power compensation of the whole transmission system. This ability makes it conceivable to even out both real/reactive power stream between the lines, move power from over-burden to under stacked lines, compensate against reactive voltage drops and comparing reactive line power and to expand the viability of the compensating system against system transients. In addition, a simulation model was brought and applied to two transmission line (11KV/6.6KV) and compare their results without UPFC and IPFC, with UPFC and IPFC ( Thyristor model) and UPFC and IPFC (IGBT and MOSFET).

A Review on Face Recognition Using SIFT Feature Extraction
Authors:-M-Tech Scholar Purnima Prakash Pathak, Asst. Prof. Anil Khandelwal

Abstract:- A facial recognition system is a computer application capable of identifying a person from a digital image or a video frame from a video source. One of the ways to do this is by relating particular facial features from the image and a face database. Recently Face recognition has received a lot of attention in biometrics, computer vision and network multimedia information access. Various methods are used for it. Comparison of various face recognition techniques has been done by several people. But so far no technique exists which has shown satisfactory results under all conditions. The system proposes new approach in extension with local binary pattern called DRLBP. By using these methods, the category recognition system will be developed for application to image retrieval. The category recognition is to classify an object into one of several predefined categories. The discriminative robust local binary pattern (DRLBP) is used for different object texture and edge contour feature extraction process. It is robust to illumination and contrast variations as it only considers the signs of the pixel differences. The proposed features retain the contrast information of image patterns. They contain both edge and texture information which is desirable for object recognition, the simulated results will be shown that used discriminative robust local binary pattern has better discriminatory power and recognition accuracy compared with prior approaches.

A Review Article of Hexagrid and Diagrid System in Multi Storey Buildings
Authors:-M.Tech. Scholar Deepak Laata, Asst. Prof. Mayank Mehandiratta

Abstract:- The advancement of technology and development of economy of the world have brought the new era of tall buildings. The most efficient building system for high rises has been the tube-type structural systems. Now-a-days, a particular structural system called a diagrid system has caught the attention of engineers. In order to improve the efficiency of tube-type structures in tall buildings, as both structural and architectural requirements are provided well, a new structural system, called “Hexagrid”, is introduced in this study. It consists of multiple hexagonal grids on the face of the building. However limited academic researchers have been done with focus on the structural behavior, design criteria and performance assessment of this structural system.

A Review on Analysis of Thermodynamic Performance of A Cascade Refrigeration System for Refrigerant Couples of R22/R404a, And R744/R404a
Authors:-M-Tech Scholar Mudasir Ul Islam, Prof. Sujeet Kumar Singh

Abstract:- The study of cascade refrigeration system. Cascade refrigeration system is the combination of two refrigeration cycle for maximum refrigeration effect can be obtained. In this system series of single stage vapor compression system are thermally coupled with the evaporator of HTC and condenser of LTC, this combination is known as cascade. This system is developed to achieve temperature up to -20°C for the applications like cold storage in malls and stores and in blood banks. The working fluid in system are R22 (LTC) and R134a (HTC), these particular refrigerant s are used due there suitable difference in boiling point for the desirable outcome from the system. These fluids are harmless to environment and GWP and ODP is negligible and do not violate the kyoto protocol. COP, work done, Refrigeration effect are the parameters studied from the system.

Implementation of Face Recognition Using SIFT Feature Extraction
Authors:-M-Tech Scholar Purnima Prakash Pathak, Asst. Prof. Anil Khandelwal

Abstract:- The main motive to design to recognize Automatic Face Recognition is the ability of person’s and identity based on facial characteristics. One of the ways to do this is by comparing selected facial features from the test image and a facial database. Usually, the face image of a test subject is matched to the gallery data using a one-to-one or one-to-many scheme. The one-to-one and one-to-many matching are called verification and identification, the feature extraction on the other hand is usually applied to obtain the relevant facial features such as face regions, variations, angles or measures etc. from the data. This phase has other applications like facial feature tracking or emotion recognition. Selection of suitable features plays a crucial role in the performance of the face recognition algorithm This phase involves a comparison method, a classification algorithm and an accuracy measure.

Analysis of Thermodynamic Performance of A Cascade Refrigeration System for Refrigerant Couples of R22/R404a, and R744/R404a
Authors:-M-Tech Scholar Mudasir Ul Islam, Prof. Sujeet Kumar Singh

Abstract:- This study presents a comparative analysis of thermodynamic performance of cascade refrigeration systems(CRSs) for refrigerant couples R22/R404a and R744/R404a to discover whether R22 and R744 is a suitable substitute for R404a. The discharge temperature, coefficient of performance(COP), exergy loss (X) and exergy efficiency (ɳ) are chosen as the objective functions. The operating parameters considered in this paper include condensing temperature, evaporating temperature in both high-temperature cycle (HTC) and low temperature cycle (LTC). The results indicate that overall R22-R404A has a better performance than R744-R404A in cascade refrigeration system.

Review of Medication Plan for Patient data using Block Chain Technology
Authors:-M. Tech. Scholar Harsha Gupta, Asst. Prof. Shailendra Tiwari, Tanmay Jain

Abstract:- This paper helps to prospect the block chain technology and smart contracts to build private ness and aware of applications. The main focal point is on medication plan containing doctors instructions that are built on smart contracts of block chain ,it is just an illustrations use case, but the outcome can be transmitted farther where the evidence of reliability is required and where the careful data is being allotted. Why the medication plan are in requirement of digitalization and why block chain technology is fitting technology for executing such an administration are the first problem to be presented being new and unaware of IT construct the block chain technology is described. After that a design is offered to resolve the issue.

Smart Grid Simulation Diversification of Demand Side Power Management
Authors:-M.Tech. Scholar Sheetal Mangal, Assistant Professor Neeraj Kumar Kumawat

Abstract:- The main objective of this thesis is to propose and develop a flexible simulation framework to study the behaviors and impacts of smart grid enabled household appliances. This proposed simulation framework should be accurate enough to reflect the general or average behaviors of traditional patterns of energy consumption. It should be designed to be flexible to allow expansions for other purposes, such as a study of the integration of renewable energy sources. It should be scalable to enable metro scale and also precise individual household simulations. it is desirable to have a smart grid centric test/simulation platform that is multipurpose and easy to expand to meet different needs. Whether developers need to evaluate the results of their product, or utility companies want to examine the effects of changing price profiles, it is beneficial to have a simulation framework that already implements the general energy consumption model, supply model, and information communication model.

Simulation Analysis on Integrated Control and Protection System for Photovoltaic Microgrids
Authors:-M.Tech. Scholar Gaurav Dilip Shirore, Asst. Prof. Dr. Prabodh Kumar Khampariya

Abstract:- The microgrid has shown to be a promising resolution for the integration and management of intermittent renewable energy generation. This paper appearance at vital problems surrounding microgrid control and protection. It proposes an integrated control and protection system with a hierarchical coordination control strategy consisting of a complete operation mode, a grid-connected operation mode, and transitions between these 2 modes for a microgrid. This approach provides a lot of reliable and strong grid because the systems will supplement one another. However, protection and control in a much meshed power network setup may be a challenge. this is often because a meshed microgrid has a lot of interconnections.

Three-Layer Privacy Preserving Cloud Storage Scheme in Fog Computing
Authors:-M. Tech. Scholar M. Rajani, Asst. Prof. B. Sai Sreenivas Rao, Asst. Prof. T. Sujilatha

Abstract:- Cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive. With the explosive growth of unstructured data, cloud storage technology gets more attention and better development. However, in current storage schema, user’s data is totally stored in cloud servers. In other words, users lose their right of control on data and face privacy leakage risk. Traditional privacy protection schemes are usually based on encryption technology, but these kinds of methods cannot effectively resist attack from the inside of cloud server. In order to solve this problem, we propose a three-layer storage framework based on fog computing. The proposed framework can both take full advantage of cloud storage and protect the privacy of data. Besides, Hash-Solomon code algorithm is designed to divide data into different parts. Then, we can put a small part of data in local machine and fog server in order to protect the privacy. Moreover, based on computational intelligence, this algorithm can compute the distribution proportion stored in cloud, fog, and local machine, respectively. Through the theoretical safety analysis and experimental evaluation, the feasibility of our scheme has been validated, which is really a powerful supplement to existing cloud storage scheme.

Predicating Early Reviewers Based on Their Rating Behaviors for Product Marketing on Websites
Authors:-M.Tech. Scholar Nandaluri Ahalya, Asst. Prof. M.Reddi Durga Sree, Asst. Prof. & HOD K. Suresh

Abstract:- Online reviews have become an essential source of data for users before making a notified buying choice. Initial surveys of stock manage to have a great impression on consequent product purchases. In this paper, we consider the initiative to study the behavioral aspects of advanced reviewers into their posted reports on a few real-world extensive e-commerce platforms, i.e., Amazon and Yelp. In particular, we classify product lifetime into three sequential stages, specifically beginning, bulk and stragglers. A customer who has posted a report in the opening stage is granted as an advanced critic. We quantitatively define advanced critics based on their grading behaviors, the usefulness scores obtained from others and the association of their reviews with product demand. We have noticed that (1) an early reviewer points to specify a greater average rating score, and (2) an advanced reviewer tends to post much more worthy reviews. Our analysis report of stock reviews also suggests that advanced reviewers’ grades and their received helpfulness scores are possible to influence product demand. By observing the review posting method as a multiplayer racing game, we introduce a unique margin-based embedding standard for the advanced critic prediction. Great experiments on two various e-commerce datasets have explained that proposed strategy exceeds the number of competitive baselines.

Resilient Hybrid Middleware Frameworks: Automating Tomcat, JBoss, And WebSphere Governance Across Unix/Linux Enterprise Infrastructures

Authors: Veerendra Battula

Abstract: This article examines the orchestration of Tomcat, JBoss, and WebSphere across hybrid Unix/Linux infrastructures, emphasizing the role of automation in creating resilient middleware frameworks. It explores the challenges of heterogeneous environments, including fragmentation, manual administration, compliance demands, and security risks. The discussion highlights how governance can be embedded into middleware provisioning, patching, and monitoring through tools such as Puppet, Chef, Ansible, Nagios, Zabbix, and Tripwire. Case studies from finance, telecommunications, healthcare, and government demonstrate how automated middleware governance improves resilience, compliance, and efficiency in mission-critical operations. The article also addresses challenges such as configuration drift, cultural resistance, and scalability while offering best practices for mitigation. Looking ahead, it identifies future directions including AI-driven predictive monitoring, cloud-native middleware orchestration, continuous compliance, and sustainability integration.

DOI: http://doi.org/10.5281/zenodo.16925647

Reengineering Workforce Agility By Leveraging Core HCM Compensation And Performance Modules In Workday Ecosystems

Authors: Santhosh Kumar Maddineni

Abstract: In a rapidly evolving business landscape, workforce agility has become a critical determinant of organizational resilience and long-term success. Enterprises must ensure that their human capital strategies are dynamic, responsive, and aligned with changing business needs. Workday offers a robust ecosystem that enables this transformation through its Core HCM, Advanced Compensation, and Performance Management modules. Core HCM provides the foundational framework by centralizing employee data, streamlining processes, and ensuring scalability across diverse geographies. Advanced Compensation empowers organizations to design transparent, equitable, and strategic pay structures that align rewards with performance and business objectives. Performance Management redefines traditional evaluation methods by fostering continuous feedback, development, and engagement. This article explores how these modules, when implemented together, create a synergistic system that drives workforce agility.

DOI: http://doi.org/10.5281/zenodo.16983392

MICROFINANCE: A SCIENTIFIC REVIEW OF SCOPE, PRACTICES, AND IMPACTS

Authors: Anjanappa. T

Abstract: Microfinance has emerged as a powerful tool to combat poverty, stimulate economic development, and enhance financial inclusion across the globe. Originating as an innovative mechanism to extend small loans to the marginalized poor, particularly women, microfinance institutions (MFIs) have grown to encompass a wide array of financial services including savings, insurance, and capacity building programs. This paper examines the theoretical foundations and practical applications of microfinance, highlighting its importance, merits, and demerits. The discussion explores how microfinance empowers low income households, creates opportunities for entrepreneurship, and reduces dependency on informal moneylenders. Nevertheless, challenges such as high interest rates, over-indebtedness, and sustainability issues remain pressing concerns. Recent developments, including digital microfinance platforms, mobile banking integration, and micro-insurance schemes, demonstrate the sector’s adaptation to evolving socioeconomic realities. Applications are examined within rural and urban settings, emphasizing their transformative role in poverty alleviation, women’s empowerment, and inclusive development. Limitations such as operational inefficiencies, regulatory bottlenecks, and the mixed evidence of long term poverty reduction are critically analyzed. Through a synthesis of related literature and case based evidence, this study contributes to the broader understanding of microfinance as both an opportunity and a challenge in global development.

The Salesforce Ecosystem Building A Scalable And Resilient CRM On Hybrid Infrastructure

Authors: Manish Dubey

Abstract: The Salesforce platform has emerged as a cornerstone for modern enterprises seeking to manage customer relationships, streamline operations, and leverage data-driven insights. As organizations increasingly adopt hybrid infrastructures that combine on-premises systems with cloud services, ensuring scalability, resilience, and performance of Salesforce deployments has become critical. This review explores strategies for designing, implementing, and managing Salesforce CRM in hybrid environments, emphasizing performance optimization, security, compliance, and automation. Key considerations include efficient data management, middleware integration, containerization, and CI/CD-driven deployment pipelines, which collectively enhance operational efficiency and reduce human error. The review also examines industry-specific applications, highlighting use cases in financial services, healthcare, and retail, where hybrid Salesforce ecosystems deliver high availability, regulatory compliance, and responsive user experiences. Security strategies, such as role-based access control, multi-factor authentication, encryption, and continuous monitoring, are evaluated for their effectiveness in mitigating risks associated with hybrid deployments. Furthermore, the review identifies challenges including integration complexity, cost optimization, skills gaps, and performance bottlenecks, and provides actionable mitigation strategies to address these concerns. Emerging trends, including AI-driven analytics, predictive scaling, microservices architectures, and serverless deployments, are discussed as enablers of next-generation CRM resilience and operational agility. By synthesizing best practices, technical insights, and practical guidance, this review serves as a comprehensive resource for enterprises seeking to optimize Salesforce CRM on hybrid infrastructures, ensuring business continuity, enhanced customer engagement, and long-term strategic advantage.

DOI: http://doi.org/

Kickstarting DevOps Automating Application Deployment With JBoss And Apache Tomcat

Authors: Riya Verma

Abstract: Automation is a core principle of modern DevOps, enabling reliable, repeatable, and efficient deployment of enterprise applications. JBoss and Apache Tomcat, widely used middleware platforms, require careful strategies for CI/CD integration, performance optimization, and security compliance. This review explores automated deployment pipelines, infrastructure-as-code, containerization, and orchestration with Kubernetes. It examines best practices for JVM tuning, thread management, load balancing, and security, including RBAC, encrypted communications, and compliance with standards like HIPAA, PCI-DSS, and GDPR. Case studies in financial services, healthcare, and retail illustrate real-world applications, demonstrating reduced downtime, increased scalability, and improved operational efficiency. Challenges such as legacy system integration, multi-environment complexity, and skill gaps are addressed with mitigation strategies. Emerging trends in AI-driven orchestration, serverless computing, microservices, and predictive analytics offer future enhancements for DevOps automation. The review synthesizes technical insights and practical guidance to help enterprises optimize deployment workflows and maintain high availability, security, and performance across hybrid and cloud-based environments.

DOI: https://doi.org/10.5281/zenodo.17139672

 

The Modern Datacenter A Blueprint For Unifying Solaris, AIX, And Centos Environments

Authors: Rahul Mehta

Abstract: The modern enterprise datacenter increasingly relies on heterogeneous environments combining Solaris, AIX, and CentOS servers to meet diverse workload requirements. While each platform offers unique advantages—Solaris provides stability and high availability, AIX delivers mission-critical performance with robust virtualization, and CentOS enables flexible, cloud-ready deployments—managing them together presents significant operational, security, and performance challenges. This review examines strategies for unifying multi-platform datacenters, including configuration management, centralized monitoring, patching, and automation. Performance optimization techniques such as kernel tuning, filesystem management, network configuration, and virtualization adjustments are analyzed across platforms. Security and compliance considerations, including role-based access control, identity management, and regulatory adherence (HIPAA, PCI-DSS, GDPR), are discussed in the context of heterogeneous infrastructures. Integration with cloud and hybrid architectures, containerization, and orchestration tools is explored to enable scalability, workload portability, and disaster recovery. Case studies from finance, healthcare, and retail illustrate practical applications and highlight the benefits of unified management in reducing downtime, enhancing operational efficiency, and maintaining compliance. This blueprint provides actionable guidance for enterprises seeking to harmonize Solaris, AIX, and CentOS environments, optimizing performance, security, and scalability in modern datacenters.

DOI: http://doi.org/

The Hybrid Cloud Security Imperative Integrating LDAP/AD With Modern Platforms For Protection

Authors: Sneha Saxena

Abstract: The rapid adoption of hybrid cloud architectures has created both opportunities and challenges for enterprise IT security. While hybrid models provide scalability, flexibility, and cost efficiency, they also expand the attack surface and complicate identity and access management. Fragmented authentication systems, inconsistent policies, and dispersed workloads increase risks of unauthorized access, data breaches, and regulatory non-compliance. This review examines the strategic role of LDAP (Lightweight Directory Access Protocol) and Active Directory (AD) in mitigating these risks. It explores how centralized identity management enables consistent authentication, role-based access control, and audit-ready logging across on-premises, cloud, and SaaS environments. The article discusses integration strategies with modern platforms, technical approaches for federation and synchronization, and compliance considerations aligned with GDPR, HIPAA, and PCI-DSS standards. Case studies from financial services, healthcare, and government illustrate practical benefits and best practices, including multi-factor authentication, Single Sign-On, and automated identity lifecycle management. The findings demonstrate that LDAP/AD integration is critical for hybrid cloud security, operational efficiency, and regulatory compliance, while positioning organizations to adopt emerging technologies such as AI-driven identity analytics and Zero Trust frameworks.

DOI: https://doi.org/10.5281/zenodo.17139902

 

Unlocking Performance Optimizing Hybrid Infrastructure With Oracle Enterprise Linux And Red Hat

Authors: Aditi Nair

Abstract: Hybrid infrastructures have become the backbone of modern enterprise IT, enabling organizations to achieve agility, scalability, and resilience while meeting performance and compliance requirements. Among the foundational elements of these infrastructures are enterprise-grade Linux distributions, with Oracle Enterprise Linux (OEL) and Red Hat Enterprise Linux (RHEL) standing out as two dominant platforms. This review provides a comprehensive analysis of how OEL and RHEL optimize hybrid infrastructures by balancing database-intensive workloads, containerized applications, and cloud-native services. The discussion highlights their performance optimization techniques, including kernel tuning, NUMA-aware scheduling, and workload consolidation. It further examines advanced security mechanisms such as SELinux, Ksplice, and compliance automation frameworks that ensure regulatory adherence in sensitive industries like healthcare and finance. Emphasis is placed on the role of orchestration technologies such as Kubernetes and OpenShift, which streamline interoperability across multi-cloud and hybrid models. Through detailed case studies in financial services, healthcare, and retail, the article illustrates practical implementations that leverage the complementary strengths of OEL and RHEL. The findings underscore that adopting a dual-Linux strategy empowers enterprises to optimize workload placement, reduce downtime, and future-proof IT operations, making OEL and RHEL a critical foundation for digital transformation.

DOI: https://doi.org/10.5281/zenodo.17139986

 

The Middleware Migration A Strategic Guide To Moving Jboss And Websphere To The Cloud

Authors: Komal Choudhary

Abstract: Middleware platforms such as JBoss and IBM WebSphere have long served as critical foundations for enterprise applications, yet they face mounting challenges in today’s digital-first landscape. High licensing costs, complex administration, and limited scalability increasingly hinder organizations that must deliver agility, resilience, and compliance at scale. This review article explores the strategic and technical dimensions of migrating legacy middleware to cloud environments. It examines common challenges in on-premises deployments, identifies key drivers such as cost optimization, DevOps enablement, and security enhancement, and evaluates multiple migration strategies ranging from rehosting to complete refactoring. Technical considerations—including application compatibility, data integration, and performance tuning—are analyzed alongside emerging cloud-native alternatives like WebSphere Liberty, JBoss on OpenShift, and serverless frameworks. Case studies from diverse industries highlight real-world migration successes and lessons learned, while best practices underscore the importance of assessment, automation, and compliance. Finally, future trends such as AI-driven middleware, container-native runtimes, and multi-cloud integration are considered as enablers of ongoing modernization. The findings emphasize that cloud migration is not simply an infrastructure shift but a business transformation, positioning enterprises to achieve faster innovation, reduced operational costs, and enhanced strategic flexibility.

DOI: https://doi.org/10.5281/zenodo.17140061

 

The Impact Of Sustainable AI Strategies On Reducing Carbon Footprint In Data Centers

Authors: Chathura S. Jayasinghe

Abstract: The rapid expansion of artificial intelligence (AI) applications has significantly increased global data center workloads, leading to rising energy demands and associated carbon emissions. Sustainable AI strategies are emerging as critical solutions to counteract these environmental challenges. This review examines the integration of AI-driven methodologies that promote sustainability within data center operations. It explores how AI can optimize energy use, reduce carbon footprint, and enable green computing practices through intelligent workload management, predictive cooling, and hardware efficiency improvements. The paper presents a synthesis of literature on carbon-aware computing, highlighting approaches such as AI-based energy forecasting, model optimization, and renewable energy integration. Furthermore, it evaluates case studies from industry leaders like Google and Microsoft, demonstrating quantifiable reductions in power usage effectiveness (PUE) and carbon usage effectiveness (CUE). Analytical frameworks and sustainability metrics are discussed to assess environmental performance, along with limitations such as data transparency and scalability challenges. Finally, the paper identifies future research opportunities in low-energy AI model development, federated learning for energy optimization, and policy-driven sustainability governance. The findings suggest that sustainable AI strategies can substantially mitigate the ecological footprint of modern computing infrastructures while ensuring computational resilience and efficiency. Through an interdisciplinary perspective, this review underscores the necessity of embedding sustainability principles into AI system design, operation, and lifecycle management. The collective insights affirm that the synergy between AI innovation and environmental responsibility is pivotal to achieving a carbon-neutral data center ecosystem.

DOI: http://doi.org/10.5281/zenodo.17882399

The Influence Of Advanced Access Control Models On Protecting Critical Infrastructure

Authors: Nirosha K. Fernando

Abstract: The increasing digitization of critical infrastructure systems has magnified the urgency of implementing robust access control mechanisms to prevent cyber intrusions, data breaches, and operational disruptions. Critical infrastructures spanning energy grids, transportation systems, healthcare networks, financial institutions, and defense installations are foundational to national security and economic stability. As cyber threats evolve in sophistication, traditional access control mechanisms such as Role-Based Access Control (RBAC) and Discretionary Access Control (DAC) are proving inadequate in addressing the dynamic and complex threat landscape. This review explores how advanced access control models such as Attribute-Based Access Control (ABAC), Risk-Adaptive Access Control (RAdAC), Policy-Based Access Control (PBAC), and Zero Trust Architecture (ZTA) enhance the security posture of critical infrastructures. These models employ fine-grained, context-aware, and adaptive mechanisms that respond to real-time risk assessments and user behavior analytics. The paper synthesizes existing literature, government frameworks, and industry case studies to evaluate the effectiveness of these models in mitigating unauthorized access, insider threats, and lateral movement within critical systems. It also examines the integration of artificial intelligence and behavioral analytics in access control for predictive risk mitigation. Finally, the review identifies ongoing challenges, including interoperability, policy complexity, and compliance barriers, while suggesting future directions such as AI-driven automation, blockchain-based identity systems, and quantum-resistant access frameworks. The study concludes that advanced access control models represent an essential evolution toward proactive, adaptive, and resilient cybersecurity architectures for safeguarding critical infrastructures.

DOI: http://doi.org/10.5281/zenodo.17882494

The Impact Of Zero-touch Provisioning On Enterprise Cloud Scalability

Authors: Asha L. Gurung

Abstract: Zero-Touch Provisioning (ZTP) represents a pivotal advancement in cloud infrastructure automation, designed to streamline deployment, reduce manual configuration errors, and accelerate scalability. In enterprise environments where cloud workloads fluctuate dynamically, provisioning speed and consistency are vital to maintaining performance and reliability. ZTP enables automated device and service configuration immediately upon connection to the network, eliminating the need for manual intervention. This review article explores the architectural principles, integration frameworks, and operational benefits of ZTP, with particular attention to its impact on enterprise cloud scalability. It evaluates how ZTP works synergistically with orchestration and automation platforms to enable elastic scaling and continuous availability in hybrid and multi-cloud environments. Furthermore, the paper identifies challenges such as configuration drift, security vulnerabilities, and legacy system constraints that can impede adoption. Finally, it highlights future innovations including AI-driven provisioning, intent-based networking, and predictive resource allocation as emerging directions for ZTP evolution. Through this comprehensive review, the study underscores the critical role of ZTP as a cornerstone of modern cloud management strategies, emphasizing its transformative potential in enhancing operational efficiency, agility, and scalability within large-scale enterprise cloud infrastructures.

DOI: http://doi.org/10.5281/zenodo.17882604

Pso-Based Optimal Tuning of Control Parameters in Vsc-Hvdc Systems for Improved Power Flow and Reduced Losses

Authors: Asst. Prof Anil Choubey

Abstract: This paper presents the estimation of harmonics in a voltage source converter based HVDC (VSC-HVDC) system for designing AC side filters. The extended VSC and PSO is well known for estimating amplitude, phase, frequency, and harmonic content of a signal corrupted with noise. However, the algorithm suffers from instability due to linearization and costly calculation of Jacobian matrices, and its performance deteriorates when the signal model is highly nonlinear. This paper, therefore, proposes an unscented to overcome these difficulties of linearization and derivative calculations for robust tracking of harmonics in VSC-HVDC system. The model and measurement error covariance matrices Q and R along with the VSC parameters are selected using a modified particle swarm optimization (PSO) algorithm. To circumvent the problem of premature convergence and local minima, a dynamically varying inertia weight based on the variance of the population fitness is used. This results in a better local and global searching ability of the particles, which improves the convergence of the velocity and better parameters. Various simulation results for harmonic signals corrupted with noise obtained from VSC-HVDC system reveal significant improvement in noise rejection and speed of convergence and accuracy.

Environmental Awareness And Education As Reagents For Sustainable Development

Authors: Dr. Ekata Singh

Abstract: Sustainable development needs to adopt a new way to interact with the environment and not only technological advances but also culturally. Environmental awareness and education are major components of this change and it is all to do with ecological literacy, ethical responsibility and sustainability-oriented decisions. This paper provides the background on environmental education and how it is used in higher education and chemistry for a sustainable future. Through the integration of sustainability theories into the curriculum it will enable students to develop a cognitive approach and a behaviour towards environmental protection. Green chemistry is a key source of knowledge in chemical science as it can help reduce pollution and resource use to make chemicals safer. Teaching methods which are concerned with environmental issues (problem-based learning, experiential training, interdisciplinary education and collaboration) are recognised as the best way to link theoretical knowledge with the real-world ecological problems. This research also demonstrates the role universities and research agencies play in the promotion of sustainability through curriculum reform, policy alignment and cooperation. But problems such as lack of uniformity in curriculum, poorly trained teachers and lack of resources continue to prevent the implementation of environmental education in much of the world including in developing countries. The research shows that environmental consciousness and education are the key sources of sustainable development and they are the drivers of ethical citizenship and work ethics. Systems-based education and interdisciplinary integration, as a result, are the key to solving the environmental challenges and achieving sustainability goals long term.

DOI: https://doi.org/10.5281/zenodo.19437118

Published by:
× How can I help you?