Category Archives: Uncategorized

Call For Papers 2018


Submit Your Paper  / Check Publication Charges

Researcher who are looking for publications in 2018 year can submit their paper on So this journal call for papers in 2018. Here authors are suggested to check below list of paper writing parameters as this reduce review process and publication time.


  1. Check paper title as it should be unique.
  2. Carefully write abstract and conclusion part of your paper.
  3. Remove plagiarism from the paper.
  4. Each graph and table should have proper title in the paper with clear use of each.
  5. All references of this paper should be used in the paper.


After submission author will get submission mail. Here after submission paper is under review peer review process. Author have to wait for few days. Once review process gets over than acceptance or paper improvement mail will be send with some suggestion. It is suggested to take quick action after this mail, such as improvement in paper as per reviewer comment, submission of copyright form, etc.

Published by:

IJSRET Volume 4 Issue 6, Nov-Dec-2018


Research on optimization of sand Moulding process
Authors: Manoj Bhandari, Mayank Sharma

Abstract:-Casting is a manufacturing process in which molten metal or liquid is converted into desired shape for its application in different fields like automobile parts, firefighting parts, valve parts, electrical equipment. The solid parts received after the whole process is known to be casting .This process have been known for thousands of years and is one of the most popular and simplest method of casting that allows products to be generate at reasonable cost at manufacturing industry. In order to meet the overgrowing demand of the consumer industry need to produce large amount accurate products at suitable time so the companies are trying every possible means In order to done casting most of them are using hit and trial method to casting. That results involvement of error, time consumption and loss of cost in the process of casting .Origination of casting defects is one of limitation that is need to be consider as to diminish the effect of defects in the final casting product. Defects like gas porosity, shrinkage, mold material defects. As to determine the optimum condition for sand casting is challenging task. In order to find out optimum condition as to acquire minimum defects for best possible results. Selection of material and process is very important task which we have to keep in mind. Selection various parameters like grain size of 300 and 600 mics ,moisture content of 26 % and 28 % as to produce the sand moldings and test the sample for tensile and compressive strength is key method of our working .In this project we have taken 4 samples with different condition of operation in the end made an comparison between them to find the optimized result . The results indicated that the selected process parameters significantly affect in improving casting defects like gas porosity, shrinkage in foundry lab. This paper illustrates the optimizing the process parameters of sand casting process including optimum levels and the case study are done in foundry lab. The result obtained in the experiment demonstrate that smaller grain size particles with medium level of moisture(300 mics sand & 28% water content) delivers optimum results for casting.

Magnonic Holographic Memory
Authors: Gunjan, Tushar Karmakar

Abstract:-Data storage has been fundamental part of the computing from the beginning. The technology for data storage has been evolving along other side over areas of computing technology. As these other areas of technology have developed the need for bigger and fastest storage has been evident. To meet the need for better storage new technologies are constantly being developed as the old technologies reaches its physical limits and become outdated. Holographic memory has received attention in recent years as a technology that can provide very large storage density and high speed. Information is recorded in holographic medium through interface of two coherent beams of light .We refer to information carrying beams as signal beam and interfering beam as reference beam. The resulting interference pattern causes an index grating (the hologram) to be written in the material. When hologram is to subsequently illuminate within one of the original reference beams, light is diffracted from the grating in such a way that the signal beam is reproduce. Many holograms can be multiplexed within the same volume of the material by angle, fractal, wavelength, and phase code; multiplexing. Holographic memory can read and write data in parallel allowing for much higher data transfer speeds. Unlike conventional storage media such as magnetic hard disks and CD-ROM’s which can access only 1 bit at a time, each access of a holographic memory yields an entire data page-more than a megabit at a time. Holographic random access memory design leads to the implementation of compact and inexpensive memory modules that can be used to construct large read-write memories.

A Study of Gulbarga(Kalaburagi) City(Karnataka), India
Authors:Mala Ramesh Ramchandra rao, Dr. K.Vijakumar

Abstract:-The maintenance of healthy nature is an integral part of urban planning. Well maintained greenery contributes immensely to various sectors and forms income generating program me, thereby enhances property value. Gulbarga is popularly known as a ‘Cement Kashi & Bowl Of Pulses’. The buildings in the city are architecturally beautiful and are endowed with well-maintained parks, open spaces One of the adverse effects of rapid and relative unplanned growth is heavy encroachment leading to the problem of shrinking green space and City Corporation resources are inadequate to fully meet the basic domestic needs of the city’s green spaces. Gulbarga has a total of 248 parks in addition to a large number of institutional open spaces and avenue plantations. The main objective of cultivation and management of trees is their contribution to the physical, social and economic well being of the urban community. The city has a only one Lake-Sharnabasaveshwar Lake, That Add To The Beauty And Environmental Value Of The City. This Lake Is Popular Picnic Spot and Is Frequented By Nature Lovers. The Sewage Water Increases The Capacity Of Local Lake During Monsoon.

Trends in Nursing Education
Authors: Asst. Prof. Beulah Jasmine Rao

Abstract:-Nursing is dynamic by its own way and this dynamism give rise to various trends. Sound empirical knowledge is the base of nursing as in any other profession. This knowledge is the base for all the innovations which in turn evolve as trends in nursing. The trends in nursing education are the cornerstone for the dynamic nature of nursing profession. The article outlines various trends in nursing education with reference to India. The trends are organized under the areas of Curriculum Innovations, Technology & Nursing, Student Population, Clinical Teaching Learning Process, Evaluation System, Quality Assurance, Knowledge expansion & Modes of Education.

Identity based Data Sharing and Profile Identifying For Healthcare Applications in Cloud Storage
Authors: M.Tech.Scholar D.Param Jyothi, Asst. Prof.T. Venkataramana, Asst. Prof. Karamala Suresh

Abstract:-Online social networks (OSNs) have become popular around the world due to its openness. Although cryptographic techniques can provide privacy protection for users in OSNs. Cloud computing and social networks are change the way of healthcare by providing real-time data sharing in a cost-effective manner. However, data security issue is one of the major goals to the extensive application of mobile healthcare social networks (MHSN), since health information is considered to be extremely sensitive. In this paper, we introduce a secure data sharing and profile matching scheme for MHSN in cloud computing. The patients can outsource their encrypted health records to cloud storage with identity-based broadcast encryption (IBBE) technique, and allocate them with a group of doctors in a secure and efficient manner. We then present an attribute-based conditional data re-encryption construction, which permits the doctors to convert a cipher-text into a new cipher-text of an identity-based encryption scheme for specialist without leaking any sensitive information. Further, we provide a profile matching mechanism in MHSN based on identity-based encryption with equality test, which helps patients to find friends in a privacy-preserving way, and achieve flexible authorization on the encrypted health. Moreover, this mechanism reduces the computation cost on patient side.

On Electric Power Supply Chain Model For Three Different Tariff Customers in South East Nigeria
Authors: Osisiogu, U. A., Okafor, C. N.

Abstract:-The study proposed a new model of electric power supply chain networks in the Nigeria situation for three different tariff category customers. The network allows for multiple power generators, transmission, and distribution, retailing and demand customers. The supply chain network introduces retailing of power from distributors to demand customers. We derived the optimality conditions of the decision- makers and proved that the governing equilibrium conditions satisfy a variation inequality problem. The variation inequality problem for a single power generator, single transmission, single distributor, single retailer and a demand customer was used to illustrate the method. The multi start optimization method was used to solve the inequality using specified start up value obtained from the Nigerian Electricity Regulatory Commission (NERC) for residential customers with single phase supply with single meter with consumption on 50KWH and below (R1) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors ; for customers with single phase supply with single phase meter with consumption above 50KWH (R2S) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors ; for customers with three phase supply with three phase meter with consumption below 45KVA (R2T) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors, The result of the analysis showed that the least cost of power regardless of the category of customer is N 469.15 while the highest cost is N 473.32. It found that the highest shadow price was N 978.93 for R1 customers while the least was N 928.61 for R2T customers.

A Survey on Internet of Things
Authors: Research Scholar Deepika. N, Professor Dr.M. Anand

Abstract:-The study proposed a new model of electric power supply chain networks in the Nigeria situation for three different tariff category customers. The network allows for multiple power generators, transmission, and distribution, retailing and demand customers. The supply chain network introduces retailing of power from distributors to demand customers. We derived the optimality conditions of the decision- makers and proved that the governing equilibrium conditions satisfy a variation inequality problem. The variation inequality problem for a single power generator, single transmission, single distributor, single retailer and a demand customer was used to illustrate the method. The multi start optimization method was used to solve the inequality using specified start up value obtained from the Nigerian Electricity Regulatory Commission (NERC) for residential customers with single phase supply with single meter with consumption on 50KWH and below (R1) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors ; for customers with single phase supply with single phase meter with consumption above 50KWH (R2S) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors ; for customers with three phase supply with three phase meter with consumption below 45KVA (R2T) tariff demand customers, the startup value employed were the average daily of power distributors receive from power generators and the unit cost of power by distributors, The result of the analysis showed that the least cost of power regardless of the category of customer is N 469.15 while the highest cost is N 473.32. It found that the highest shadow price was N 978.93 for R1 customers while the least was N 928.61 for R2T customers.

Need Ride Friend Carpooling and Chat Using Android System
Authors: I. Piranavanath, Mathula. T

Abstract:-One in every five people in the world has a Smartphone. Use of Smartphone is increasing day by day. The aim of this system is to user using carpooling with messaging android app in the smart phone. This project is about creating a social media application to explore the uses of augmented reality which can be used to improve the user experience in social media. Through the application the users will be able to rate live locations like restaurants, supermarkets, Shopping malls, Arcades and also free places and save live memories in a virtual world created by the augmented reality application. This is going to be very interesting because this social media has these enormous features. The user will feel more lively. They can do useful things through this social media. This will be an android platform. Assume a user wants to go to a place. User can search that place through our social media. Then user will get the list of ratings which were given by his friends. Also when user reaches a place, user can switch on the camera and by our augmented reality application the user can see the friends lively in that specific area. The project will use cloud storage to have a database of the users. It will use Google maps Application program interface (API) in order to get the users locations to the exact point. This application also can understand when the user is entering as well as exiting the place. So while exiting the place the user will get a feedback form to be filled. So that, it will help the user to rate the driver ride.

Structural Properties of Pr1-xSrxFeO3 materials
For Solid Oxide Fuel Cells

Authors: Padigela Srinivas Reddy, V. Prashanth Kumar, Suresh Sripada

Abstract:-Pr1-xSrxFeO3 (0≤x≤0.6) is a cathode material, which are set up by sol-gel method. In the example the powders are framed in the scope of 6000C – 7000C. The Sol-Gel is unit for the examples; these described as single stage GdFeO3 kind of perovskite structure utilizing powder XRD. For the example the Orthorhombic distortion diminishes with expanding x esteem. The decrease of pseudo cubic cross section steady is down to earth with Sr content. The crystallite measure for undoped test is in the range 25nm to 30nm and 55nm to 60nm as-incorporated and burn powders individually. The weight reduction is 3% to 26% and in augmentation of x esteem the weight reduction is diminished for as-synthesized powders.

IOT Based Secured Smart Home Automation System Using Raspberry Pie
Authors: Ansari Huzaifa, Ansari Affan, Shaikh Mohammed Ahmed, Shaikh Adeen Shaikh, Mohammed Ashfaque

Abstract:-This documentation presents a home automation system implemented using the Raspberry pi. This paper is a proof of project for a home that can be controlled remotely through the use of device. A controlled home like this can make life more convenient and also safer. The device monitoring aspect of this project demonstrates the ability of being able to know what is going on with different systems at home which can be used for control and safety. For example, the state of some sensors for intruder detection and the state of different devices like fans or lights at home. It is also demonstrated using a few motors, how one can control different systems at home using the Internet. So, a virtual “switch” available in the cloud UI can be toggled to turn on/off a fan at home. This project has a large scope and can be accommodate with many other systems like smart electronic appliances at home. This documentation describes the project implementing the basic framework to achieve such a connected home. It gives a combination of use of hardware and software in the current implementation of the project, future improvements and scope. This project also adds a CCTV camera at the door for intruder detection.

Review of Prediction of Product Recommendation Using Clustering Technique and Voting Scheme
Authors:M. Tech. Scholar Versha Patel, Asst. Prof. Pritesh Jain

Abstract:- On the Internet, the place the number about Decisions might overpower, there will be need will channel, organize Also adequately pass on vital information so as on alleviate those issue of larger part of the information over-burden, which require made a plausibility issue will enormous numbers Internet client. Recommenders methods work out this issue by glancing through enormous volume for quickly made lion’s share of the information on outfit client with redo substance and administrations. This paper examines the different angles and possibilities for particular expectation procedures secured close by suggestion methods set up with serve concerning delineation a compass to Scrutinize and act in the field of proposal strategies.

Review of Study of Stock Market Prediction
Authors:M.Tech.Scholar Sachine Kumawat, Asst. Prof. Pritesh Jain

Abstract:- OSecurities trade conjecture incorporates predicting future estimation of association stock or other cash related instrument traded on an exchange. Distinctive sorts of trading ought to be conceivable in securities trade. It could be at this very moment trading or even whole deal trading anyway if someone can envision the regard or class of that component, it can yield incredible return for the endeavor done. Going before improvement of automated world, markers continued using paper work procedures like essential and particular examination. Distinctive important particular markers like SMA, EMA, and MACD saw to be uncommonly valuable yet with the happening to PC headways and computations, estimate moved into mechanical area. Specialists started fabricating desire structure using Neural Network, Support Vector Machine, Decision Trees, and Hidden Markov Model. Figure precision really improved using algorithmic methodology. This overview covers diverse traditional as well as developmental data burrowing systems used for securities trade desire.

Identity-based Data Auditing and Hiding for Secure Cloud Storage
Authors:M.Tech. Scholar R. Haritha, Asst.Prof. M. Reddi Durga Sree, Asst.Prof. Karamala Suresh

Abstract:- Cloud computing is one of the significant developments that utilizes progressive computational power and upgrades data distribution and data storing facilities. With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others. Remote data integrity auditing is proposed to guarantee the integrity of the data stored in the cloud. In some common cloud storage systems such as the electronic health records system, the cloud file might contain some sensitive information. The sensitive information should not be exposed to others when the cloud file is shared. Encrypting the whole shared file can realize the sensitive information hiding, but will make this shared file unable to be used by others. How to realize data sharing with sensitive information hiding in remote data integrity auditing still has not been explored up to now. In order to address this problem, we propose a remote data integrity auditing scheme that realizes data sharing with sensitive information hiding in this paper. In this scheme, a sanitizer is used to sanitize the data blocks corresponding to the sensitive information of the file and transforms these data blocks’ signatures into valid ones for the sanitized file. These signatures are used to verify the integrity of the sanitized file in the phase of integrity auditing. As a result, our scheme makes the file stored in the cloud able to be shared and used by others on the condition that the sensitive information is hidden, while the remote data integrity auditing is still able to be efficiently executed. Meanwhile, the proposed scheme is based on identity-based cryptography, which simplifies the complicated certificate management. The security analysis and the performance evaluation show that the proposed scheme is secure and efficient.

Prediction of Diabetes Mellitus Using Data Mining Techniques A Review
Authors: M.Tech.Scholar Varsha Rathour, Asst.Prof. Pritesh Jain

Abstract:- Data mining strategies are utilized to discover intriguing examples for restorative finding and treatment. Diabetes is a gathering of metabolic illness in which there are high glucose levels over a delayed period. This paper focuses on the general writing review identified with different information digging strategies for foreseeing diabetes. This would assist the specialists with knowing different information digging calculation and technique for the expectation of diabetes mellitus.

Review Paper of Corresponding job on Multi-core Processors
Authors:-M.Tech.Scholar Anil Malviya, Assistant Professor Mr.Pritesh Jain

Abstract:- Multi-focus processor advancement has been enhanced awesomely and it is sensibly extraordinary in execution than single focus processors in this way having the ability to engage estimation concentrated nonstop applications with correct arranging confinements. By and large standard multiprocessor nonstop arranging is stick to Sequential models which slight intra-undertaking parallelism while Parallel models, for instance, Open MP have the ability to parallelize specific areas of assignments, thusly provoking shorter response times when possible. In this paper diverse research papers have been assessed and are named Sequential Real-Time Task based Research and Parallel Real-Time Task based Research. Furthermore unique strategies, for instance, attempted part frameworks, arranging methodologies and systems used are considered for differentiating progressing errand booking in multi-focus processors.

Secure VANET Using Trust Management System
Authors:-M.Tech. Scholar Rakesh Mukati, Asst. Prof. Mr. Pritesh Jain

Abstract:-Sooner rather than later we realize that vehicles will speak with one another to make Vehicular specially appointed system and gives the idea of wise transportation framework. In this paper we displayed the survey of security in VANET. Thusly, a few specialists spoke to the attacks and arrangements in vehicular correspondence we investigated a portion of the security issues and proposed answers for defeated it. We talked about the requirement for hearty Vehicular Ad hoc organizes, which is unequivocally subject to their security and protection highlights. This paper will audit the current attacks in VANET in the point of view approach of security. We likewise gave the arrangements to the specific attack in VANET.

Control of Statcom to Enhance Stable Power System Operation
Authors:-M.Tech.Scholar S. Reddiah Raju, Asst. Prof. P., Asst.Prof. V.Sunil Kumar Reddy

Abstract:-In this paper, two control methods namely adaptive voltage control method and d-q axis control method are proposed to ensure proper operation of static synchronous compensator (STATCOM) to provide an efficient and effective means of controlling power system stability. In the aforesaid control methods PI controller has been used to regulate the constant DC link voltage in the DC link capacitor as well reactive power, grid voltage and current. The simulations are conducted in MATLAB/SIMULINK platform. The performance of the STATCOM is investigated both for normal state and disturbances of the power system network. The obtained results ensure that the STATCOM with the mentioned controller has performed well to maintain power system stability by controlling both bus voltages and reactive power in the power system network.

A Survey of Load Balancing in Cloud Computing
Authors:- M. Tech. Scholar Komal Malakar, Assistant Professor Pritesh Jain

Abstract:-Load Balancing is basic for productive activities in circulated situations. As Cloud Computing is developing quickly and customers are requesting more administrations and better results, stack adjusting for the Cloud has turned into an extremely fascinating and vital research zone. Numerous calculations were recommended to give proficient components and calculations to doling out the customer’s solicitations to accessible Cloud hubs. These approaches intend to upgrade the general execution of the Cloud what’s more, give the client all the more fulfilling and effective administrations. In this paper, we explore the diverse calculations proposed to resolve the issue of load adjusting and undertaking planning for Cloud Processing. We talk about and contrast these calculations with give a review of the most recent methodologies in the field.

A Comparative Study of Delay-Tolerant Network And It’s Various Methods
Authors:- Rohit Hirvey, Ranjan Thakur

Abstract:-Currently the applications along with the research work on the domain of delay-tolerant network has now become very famous these days. Within the delay-tolerant-network there are few storage space is available in each node. Therefore in the absence of the links on the nodes the packets may be stored within the storage space. Delay-tolerant-network is capable to enable the services for communication within the unreachable and mostly in unfriendly areas. Actually the delay-tolerant-network forwarding-algorithms may route the traffic towards the specific nodes to increase the delivery rate and reduces the delays, whereas the traffic required raising these nodes that are now become not useful. In this paper, represent the review on the architecture of the delay-tolerant-network which is discovered at with the some features of the Delay-Tolerant-Mobile-Network routing=protocol within the delay-tolerant-network’s problems.

Analysing of Impact of Code Refactoring on Software Quality Attributes
Authors:-Himanshi Vashisht, Asst. Prof. Sanjay Bharadwaj, Sushma Sharma

Abstract:-Code refactoring is a “Process of restructuring an existing source code.”. It also helps in improving the internal structure of the code without really affecting its external behavior”. It changes a source code in such a way that it does not alter the external behavior yet still it improves its internal structure. It is a way to clean up code that minimizes the chances of introducing bugs. Refactoring is a change made to the internal structure of a software component to make it easier to understand and cheaper to modify, without changing the observable behavior of that software component. Bad smells indicate that there is something wrong in the code that have to refactor. There are different tools that are available to identify and remove these bad smells. Software has two types of quality attributes- Internal and external. In this paper we will study the effect of clone refactoring on software quality attributes.

Review of Image Retrieval System Using Three Level Searching
Authors:-M. Tech. Scholar Saloni Verma, Asst. Prof. Sachine Mahajan

Abstract:-The enormous advanced picture databases are yielded by the across the board of shrewd gadgets alongside the exponential development of virtual social orders. If not combined with effective Content-Based Image Retrieval (CBIR) apparatuses, these databases can be counter-profitable. The presentation of promising CBIR frameworks had been seen a decade ago which advanced applications in different fields. In this publication, an investigation on best in class content-based picture recovery which incorporates hypothetical and observational work is propounded. This work contains distributions that cover parts of research significant to CBIR territory. In other words, unsupervised and administered instruction and mix strategies alongside which the low-level picture visual descriptors have been accounted for. Moreover, difficulties and applications that seemed to convey CBIR explore have been examined in this work.

Survey Paper of Wireless Sensor Network
Authors:-M.Tech. Scholar Akshay Gupta, Asst. Prof. Megha Singh

Abstract:-In recent years there is a quick advancement in the field of Wireless sensor network. This paper gives brief introduction of Wireless sensor associate with its applications in the field of condition, structure checking, keen home watching, Industrial application, prosperity, military, vehicle recognizable proof, blockage control and RFID tag. With movement in WSN, little and simplicity sensor centers end up available, which have limits of Wireless correspondence, recognizing diverse sorts of biological conditions and data getting ready. There are different sorts of coordinating traditions depending on application and framework designing. Guiding traditions give route in the framework and capable multi-skip correspondence. WSNs can be found in various applications like normal native and military by and large which get a handle on enemy interference area, challenge following, calm watching, living space checking, fire acknowledgment and cutting edge.

Dissolved Gas Analysis of Transformer
Authors:-Viral R Avalani, Kishan V Dave

Abstract:-The Dissolved Gas Analysis has been widely used by utilities throughout the world as the primarily diagnostic tool for transformer maintenance. The gas generated in mineral oil of power transformer can be monitored by all conventional methods, online DGA system and by application of various Artificial Intelligence practices. Assessment techniques for judging power transformer conditions and lifespan has been eye-catching. Dissolved Gas Analysis (DGA) has proved to be useful tool for diagnostic of incipient and potential faults in power transformers. This paper discusses pros and cons of the various DGA methods in practice and also deals with an experimental investigation carried out to study relation between gas generation and partial discharge. In the second part, a fuzzy logic based interpretation method (FLI), which is based on fuzzy set theory is described and implemented as an improved DGA interpretation method that provides higher reliability and precision of the fault diagnostics.

Iot Based Healthcare Environment System
Authors:- Assistant Professor D.Thilagavathi

Abstract:-The Internet of Things (IOT) evolved in various application areas that include medical care or health care. This technology helps for the patients and doctors to forecast the a variety of diseases exactly and diagnose these diseases according to result, to development of Internet of Things (IoT) more sensors, actuators and mobile campaign have been deployed in to our daily life. The IoT of things has numerous applications in healthcare, from remote monitoring to smart sensors and medical device integration. It has prospective to not only keep patients safe and healthy, but to get better how physician distribute care as well. IoT data generated by multi-modal sensors or devices show great differences in formats, domains and types. The full application of this paradigm in healthcare area is a shared hope because it allows medical centers to function more knowledgeably and patients to obtain better treatment, data semantization in IoT, generous out flows, extensive techniques, including its backgrounds, existing challenges and open issues.

Cycle Time Optimization in Injection Moulding
Authors:- M.Tech.Scholar Munendra Koli

Abstract:-Injection moldings is plastics equivalent of metal die casting. This is the most widely used method of mass producing to close tolerance three dimensional articles over a wide range of sizes and variety of shapes. The parameters are evaluated against the problem of optimizing the cycle time for each part. The Experimental data were collected on IIM Milacron following the designed experiment procedures, and a statistical analysis was performed to give a basis for process improvement recommendations. The results of the experiment showed a way to achieve the goal of optimizing the cycle time in injection molding in a sensible and cost efficient way. In this paper we studied that how to minimize cycle time, how many possible ways are there to optimize the cycle time, what factors influences the cycle time.Any manufacturing activity would like to have optimized productivity and quality. In injection moldings of plastics, if quality is taken care of by part design, mold design and mold precision, then is also ensured on account of zero defect moldings without rejection and optimized cycle time.

Analysis about Classification Techniques on Categorical Data in Data Mining
Authors:- Assistant Professor P. Meena

Abstract:-In recent years, huge amount of data is stored in database which is increasing at a tremendous speed. This requires need for some new techniques and tool to intelligently analyze large dataset to acquire useful information. This growing need demands for a new research field called Knowledge Discovery in Database (KDD) or data mining. The main objective of the data mining process is to extract information from a large data set and transform it in to some meaning full form for future use. Classification is the one of data mining techniques which is used to classify categorical data item in a set of data in to one of predefined set of classes or groups, in this paper, the goal is to provide a comprehensive analysis of different classification techniques in data mining that incudes decision tree, Bayesian networks, k-nearest neighbor classifier & artificial neural network.

A Study of Fraud Identification in Online Payment Instruments Using Data Mining Techniques
Authors:- Assistant Professor R. Ramya

Abstract:-The aim of the present work is to survey and analyze the use of electronic payment instruments and fraud detection on banks across the country using statistics and information retrieved from the Central Bank and the data mining techniques. For this purpose, initially, according to the volume of the transactions carried out and using the K-Means algorithm, a label was dedicated to any record. Viewing profile data mining solution that valuable but hidden in mass volume of online transactions, gives valuable information related to this criminal process loses. We analyze some of the recent approaches and architectures where data mining has been applied in the fields of e payment systems. In this study we limit our discussions to data mining in the Context of e-payment systems.

A Study on Image Mining Tools Techniques and Framework
Authors:- Assistant Professor C. Rukmani

Abstract:-Image mining is a vital method which is used to mine knowledge from image. Image segmentation is the primary phase in image mining. Image mining handles with lot of unknown information extraction, image data association and additional patterns which are not clearly accumulated in the images. Image data represents a keystone of many research areas including medicine, forensic criminology, robotics and industrial automation, meteorology and topography as well as education. Therefore, obtaining specific information from image databases has become of great importance. Images as a special kind of data differ from text data as in terms of their nature so in terms of storing and retrieving. Image mining as a research field is an interdisciplinary area combining methodologies and knowledge of many branches including data mining, computer vision, image processing, image retrieval, statistics, recognition, machine learning, artificial intelligence etc. This paper aims at reviewing the current state of the IM as well as at describing challenges and identifying directions of the future research in the field.

Product Development Process Using Tendering and Bidding
Authors:- Akash Borasi, Prof. Ravi Nagaich

Abstract:- The development process model is very important to integrated product development. In this paper, the integrated product development architecture was established based on the detail analysis of customer relations between product model and its corresponding process model, where the product data management system was viewed as the exchanging interface and operating platform of information. The integrated development mode by the coupling of product model main line and process model main line was presented. In this mode, both product model and process model are modified synchronously, and this modification is dynamic and mutual. The coupling mechanism between product model and its corresponding process model was established, and the algorithm was also given to evaluate the model coupling effect.

An Enhancement Synchronous Reference Frame (SRF) based of SAF Transmission system
Authors:- M.Tech. Scholar Shivani Patel, Astt. Prof. Gaurav Katare

Abstract:- The advantage of parallel ac-dc power transmission for the improvement of transient and dynamic stability and damp out oscillations have been established. Present paper proposes a simultaneous ac-dc power flow scheme through the same transmission line to get the advantages of parallel ac-dc transmission to improve stability and damping oscillations as well as to control the voltage profile of the line by controlling the total reactive power flow. Only the basic idea is proposed along with the feasibility study using elementary laboratory model. The main object is to emphasize the possibility of simultaneous ac-dc transmission with its inherent advantage of power flow control. Control methods based on selective harmonic elimination pulse-width modulation (PWM) techniques with fuel cell system offer the lowest possible number of switching transitions and improve the voltage level in SAF transmission system. This feature also results in the lowest possible level of converter switching losses. For this reason, they are very attractive techniques for the voltage-source- converter-(VSC) based high-voltage dc (HVDC) power transmission systems.

An Implimentation of Safety Management Practices And Hazard & Operability Study In Multinational Api Bulk Drugs Company
Authors:- M. Tech. Scholar Abhishek Rawal, Astt. Prof.Vivek Shukla

Abstract:-Hazard and Operability Analysis is a structured and systematic technique for system examination and risk management. In particular, HAZOP is often used as a technique for identifying potential hazards in a system and identifying operability problems likely to lead to nonconforming products. HAZOP is based on a theory that assumes risk events are caused by deviations from design or operating intentions. Identification of such deviations is facilitated by using sets of “guide words” as a systematic list of deviation perspectives. This approach is a unique feature of the HAZOP methodology that helps stimulate the imagination of team members when exploring potential deviations.

Model for the Creation of Electricity within a Piezoelectric Material under Strain
Authors:- Ramasombohitra NivonjyNomenAhy, Rastefano Elisée

Abstract:-This paper introduces the basis about piezoelectric effect. The reason why electricity is created in piezoelectric material under an external constrain is discussed in detail. The investigation is based on the basic structure of a molecule that composes piezoelectric crystals.

Evolution of Cryptography Based Sheltered Messaging System
Authors:- Assistant Professor L. Gandhi

Abstract:-This paper introduces the basis about piezoelectric effect. The reason why electricity is created in piezoelectric material under an external constrain is discussed in detail. The investigation is based on the basic structure of a molecule that composes piezoelectric crystals.

Load Balancing Using Time Complexity of Proposed Algorithm on Cloud Computing
Authors:- M.Tech. Scholar Smriti Verma, Asst. Prof. Ashish Tiwari

Abstract:-Cloud Computing is a developing field and lean toward by numerous one at current yet it’s rage is part more rely upon its execution which thusly is excessively rely upon the powerful booking algorithm and load adjusting . In this paper we address this issue and propose a algorithm for private cloud which has high throughput and for open cloud which address the issue of condition awareness likewise with execution. To enhance the throughput in private cloud SJF is utilized for planning and to conquer shape the issue of starvation we utilize limited pausing. For stack adjusting we screen the heap and dispatch the activity to the minimum stacked VM. To acquire advantage and to have open door for future upgrade out in the open cloud condition cognizance is the key factor and for better execution and load adjusting likewise wanted. While stack adjusting enhances the execution, the earth awareness increment the benefit of cloud suppliers.

Dark Channel and Laplace Based Under Water Image Restoration
Authors:- M.Tech. Scholar Sonam Shrivastav, Asst. Prof. Priya Jha

Abstract:-As the digital world is increasing day by day so number of digital image processing issues are cover by different researchers. Out of those this work focus on under water noise removal which is also known as visibility restoration refers to different methods that aim to reduce or remove the degradation that have occurred while the digital image was being obtained. This paper has utilized the Laplace base distortion detection with dark channel technique for image restoration. Combination of both these techniques helps in identifying the actual color values present in the original image scene. Experiment is done on many images of different environment or category. Results shows that LEDCR (Laplace Edge Based Dark channel Restoration) is better as compare to CBF CBF in [8].

Customer Relation Management an Impact in Tirupur Garment Industries
Authors:- K. Prabha Kumari, S.Tamilvanan

Abstract:-Customers are the most important stake holders in running the business efficiently in the market. In order to retain the customers the CRM act as a tool for managing and servicing the customers. CRM is the step by step process where the manufacturing organizations are following to sustain their customers. In Tirupur most of the Textile manufacturers are using Customer Relation Management as a strategy to retain the customers. In this analysis the researcher taken the impact of CRM and how the CRM act as a tool for efficient increase in turnover of the business. The manufacturers using CRM Software to enable the smooth vendor relationship with internal sales activities, automatic workflow rules, better data organization and enhanced communication to the customers. CRM is the significant component in the business to perceive by prospects of the customers. In this study the impact of CRM was analysed and number of suggestions are given to the manufacturers to develop the customer relationship management in the Tirupur city.

Comparision of High Performence Exclusive or Gate Using 130nm Fet Technology

Authors:- M.Tech.Scholar Pankaj Kumar Sikdar, Asst. Prof. Rajesh Kumar Paul

Abstract:- An adder is a switch based digital circuit that performs addition of numbers. In many computers and other kinds of processors adders are used in the arithmetic logic units. They are also utilized in other parts of the processor, where they are used to calculate addresses, table indices, increment and decrement operators, and similar operations. Full Adder/Half Adder is one of the smallest elements used in the complex data processing unit to perform fast arithmetic/logical operations which is designed by EX-OR/EX-NOR gate. The main aim of this paper is a design of existing systematic cell design methodology (SCDM) based three input EX-OR gate and compare it with older one. Intension behind a novel SCDM based design is to improve propagation delay and reduce Energy/power dissipation. Traditional dynamic N-channel FET, dynamic P-channel FET and new hybrid type systematic cell design methodology (SCDM) is designed and compare with proposed on the basis of following parameter like propagation time delay, average dynamic power consumption, energy consumption, and Area on SoC. It is observed that the SCDM based design has least delay, power dissipation, energy consumption and occupies minimum no. of transistor.

Static and Materialistic Analysis of Crankshaft
Authors:- PG. Scholar Surabhi Sharma , Dr. P.K. Sharma

Abstract:- Crankshaft is one of the large components with a complex geometry in internal combustion engine which converts the reciprocating displacement of the piston into a rotary motion. the main reason of failure was determined as lower surface hardness followed by rapid wear due to the contact of crankpin and bearing surface. The contact was resulted due to absence of oil and improper lubrication The modeling of the single cylinder petrol engine crankshaft is created using Auto-Cad Software. Finite element analysis (FEA) is performed to obtain the variation of stress at critical locations of the crank shaft using the ANSYS software. The material of the crankshaft EN-19 has been changed to ADI (Austempered Ductile Iron) and then the properties were compared with previous material.

A Survey on Outsourced Data Privacy Preserving Techniques Association Rule
Authors:- Phd. Scholar Ravindra Tiwari, Associate Prof. Priti Maheshwary

Abstract:- Protecting user personal knowledge is a crucial concern for society. The daily use of the word privacy concerning secure data sharing and analysis is commonly imprecise and should be dishonest. To protect privacy of individual, many strategies will be applied on knowledge before or on the method of mining. The branch of study that embody these privacy considerations are referred as Privacy Preserving Data Mining (PPDM). So this paper focuses on this problem of increasing the robustness of the data. Here various approaches adopt by researchers are detailed with their field of security. Some of issue related to the papers are also discussed. Various approaches of association rule mining are explained for finding the or hiding the hidden information as well.

Optimal design of Renewable Energy, Water and sewage Pumping System for a community, Case Study New El-Farafra Oasis, Egypt
Authors:- M. Osama abed el-Raouf, Adel. Mallawany, Mahmoud A. Al-Ahmar, Fahmy M El Bendary

Abstract:- The design and evaluation of a stand-alone hybrid renewable energy system for pumping underground water for a newly proposed community in EL-Farafra-Egypt are presented. Solar radiation, wind speed and environmental conditions for the proposed location are given. Moreover the loads are calculated carefully according to Egyptian codes, the optimal size of the system components are obtained using the simulation tools HOMER based on economic optimization criteria represented in the net present cost and the cost of energy. The compared water pumping systems are; PV only, Wind turbine only, PV/wind turbine. The study was illustrated for climatic conditions of an isolated area in El-new Farafra oasis, Egypt. Water pumping system is simulated for drinking purposes in the proposed site. The results show the NPC and COE are lower in the case of PV only and increased by using a wind turbine system due to the lower wind speed rates in the specified location. The COE was0. 215 $/kWh for PV only and 0.835$/kWh for Wind only.

Enhancing Colour Development of Photo chromic Prints on Textile
Authors:- Asst. Prof. D. Anita Rachel, T.S. Thirumalaivasan

Abstract:- Textile UV-radiation sensors has lately been introduced to the field of smart textiles. Inkjet printing has been used as means of application due to the effective and resource efficient process. UV-LED radiation curing has been used in combination with inkjet printing in favour of low energy requirements, solvent free solution and reduced risk of clogging in the print heads. The problems arising when exposing photo chromic prints to UV-radiations are that oxygen inhibition during the curing and photo-oxidation in the print reduces the prints ability to develop colour. It is the oxygen in the air in combination with UV-radiation that gives the photo-oxi dating behavior. The aim of the study is to with the aid of physical protection reduce the effect of oxygen inhibition and photo-oxidation in the prints. Three types of physical treatments were used, wax coating, protein based impregnation and starch based impregnation. Treatments were applied before curing as well as after curing and the colour development after activation during 1 min of UV-radiation was measured with a spectrophotometer. Multiple activations were also tested to see how the treatments affected the fatigue behaviour of the prints over time. The aim was to have as high colour development as possible reflecting reduced oxygen inhibition and photo-oxidation. Results showed significantly higher colour development for samples treated with wax and whey powder before curing, but reduced colour development for amylase impregnation. Over time whey powder before curing showed highest colour development due to highest initial colour development. Lowest fatigue was seen for washed samples containing the chemical stabilizer HALS, showing an increased colour development. In reference to earlier studies the protective properties of wax and whey powder is due to their oxygen barrier properties protecting the print. The tested treatments have shown that it is possible to reduce the effect of photo-oxidation during curing leading to prints giving higher colour development. This gives a great stand point when improving existing and future application of photo chromic prints on textiles.

Design of Cost Aware Secure Routing (CASER) Protocol in Wireless Sensor Network
Authors:- M.Tech.Scholar G. Vamsiviraj, Asst. Prof. A. Uday Kishore

Abstract:- Remote sensor system of all inclusive circulated self-ruling sensors to screen physical or ecological conditions, for example, temperature, commotion, weight and so on and to helpfully go their information through the system to a primary area. CASER convention is utilized to build the lifetime of the system. Vitality utilization and security are the two clashing issues in WSN. In this paper, first propose a novel secure and proficient Cost-Aware Secure Routing (CASER) custom to address these two clashing issues through two compact parameters: vitality equity control (EBC) and probabilistic-based abstract strolling, at that point affirm that the noteworthiness use is really disproportional to the uniform essentialness plan for the given system topology, which fantastically reduces the lifetime of the sensor structures. To manage this issue, we propose proficient non-uniform vitality affiliation logic to move the lifetime and message development degree under a similar importance asset and security fundamental. Correspondingly give a quantitative security examination on the proposed controlling convention. For the non-uniform centrality plan, our examination displays that we can expand the lifetime and the aggregate number of messages that can be passed on under a similar Speculation. Also propose rest prepared state means complete a high message transport degree while anticipating organizing blocking strikes.

Socioeconomic Impacts of Tertiary Institution Cultism on Nigeria Youths History and Overviews
Authors:- Agha Romanus Urom, Okpani Otunta ESQ, Farouk Agha Uche, Emmanuel Ogbonnaya Egwu

Abstract:- Cultism is one of the significant indecencies standing up to the Nigerian instructive area today. The exercises of these gatherings have caused the passing of many. Mystery Cult bunches are widespread in higher foundations in the Country and have turned into a smear on the correct improvement of the Nigerian youth. The fundamental conditions for continued scholarly culture have been disintegrated in tertiary establishment. Also, it has been a negative effect in tertiary establishment which little consideration has been given to the outcome. Here and there understudies are assaulted, killing with acids, charms, cleavers, Knives, firearms, sunlight and pack rapping, death toll, property and badgering of female understudies. There is no harmony in grounds, arrangement of examination negligence, murdering of teachers. Advertising as critical thinking correspondence are relied upon to make methodologies to illuminate the understudies and make them mindful of what is required of in a scholastic.In order to tackle this problem successfully this paper recommends that both the students and general public and the government should take the challenges upon themselves. It focuses on the relevance measures in which public relations and any external body could adopt to solve social phenomenon in tertiary institution in Nigeria. Therefore this paper tries to portray the relationship and effect on socioeconomic wellbeing of youths in Nigeria tertiary institutions.

A Review on Smart Grid and its Application
Authors:- PG. Scholar Kiruthiga Devi V, Prof. Venkatesan T, Asst.Prof. Sri Vidhya D

Abstract:- Electricity is most versatile and widely used form of energy. The growing worldwide population is dynamic and will create more increase of electricity. Providing stable and sustainable electricity supply is a heavy stress on today’s grid. The power grids must be modernized to meet the needs of 21st century society and economy, which increasingly rely on digital and electronic technologies. The Conventional energy sources like coal are also depleting day by day. The Smart Grid pays way to deliver the Growing demand for power and to minimize the increased complexity of power grids. Smart Grid integrates modern technologies and renewable energy resources in to future power grid in order to supply more efficient and reliable electric power. This paper gives overview about the role of fault current limiter, phase measurement unit in smart grid, the demand side management, voltage stability problems in smart grid and application of smart grid in hybrid vehicle.

Techniques for Fully Integrated Intra/Inter Chip Optical Communication
Authors:- Mrs. K.P. Joshi

Abstract:- Inter/ Intra chip optical communication eliminates all data and control pads generally present in conventional chip. It replaces them with a new type of ultra-compact, low power optical interconnect communication technique. It enables entirely optical through-chip buses that could service hundreds of thinned stacked dies. Even in tight power budgets, very high throughputs and communication density could be achieved. The core of the optical interconnect is a CMOS single-photon avalanche diode (SPAD) operating in pulse position modulation. CMOS compatible optical interconnect techniques based on miniaturized optical channels. By using optical communication technique one can achieve high throughputs i. e. several gigabits per second at very low cost in terms of area and power dissipation, so as to represent a real alternative to conventional systems. In this seminar communication between inter/intra chip will be discussed using optical communication technique.

Highly Confidential Security System Using Otp
Authors:- M.Tech. Scholar Alka Porwal, Asst. Prof. Ajit Saxena

Abstract:- In today’s crazy busy life style it is not very uncommon for us all to be forgetful. We often fail to remember our passwords, mail ids, pan card numbers, passport details, study certificate numbers etc. this kind of data is confidential and at present we store them manually (i.e mobiles, sticky notes) which is very easy to lose or even hacked. The “Highly Confidential Security System” Aims at developing a web application through which user can store his confidential data in a very secured way.

Image Stenography Using Reversible Texture Synthesis
Authors:- M.Tech.Scholar Sheshank Porwal, Asst. Prof. Ajit Saxena

Abstract:- Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. This paper is intended as a high-level technical introduction to stegano graphy for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of stegano graphy without delving into the mathematics, although references are provided to some of the ongoing research for the person who needs or wants additional detail. Although this paper provides a historical context for steganography, the emphasis is on digital applications, focusing on hiding information in online image or audio files. Examples of software tools that employ steganography to hide data inside of other files as well as software to detect such hidden files will also be presented.

Image Processing Based Optical Character Recognition
Authors:- M.Tech.Scholar Bhawna Singh, Asst. Prof. Ajit Saxena

Abstract:- Handwritten Character Recognition by using Template Matching is a system which is useful to recognize the character or alphabets in the given text by comparing two images of the alphabet. The objectives of this system prototype are to develop a program for the Optical Character Recognition (OCR) system by using the Template Matching algorithm . This system has its own scopes which are using Template Matching as the algorithm that applied to recognize the characters, which are in both in capitals and in small and the numbers used with courier new font type, using bitmap image format with 240 x 240 image size and recognizing the alphabet by comparing between images which are already stored in our database is already . The purpose of this system prototype is to solve the problems of blind peoples who are not able to read , in recognizing the character which is before that it is difficult to recognize the character without using any techniques and Template Matching is as one of the solution to overcome the problem.

Supervised learning in data mining using Transformation Regression Technique
Authors:- M. Tech. Scholar Karan Bahal

Abstract:- The presented paper focuses on supervised learning in data mining and machine learning areas for small data sets. In the paper, the precision of data mining regression model is increased by special transformation technique, which transforms the original regression task into a new regression task, equivalent with the original. In the paper, transformation was successfully applied on synthetic and real data sets with positive results.

Impact of Bromocresol Purple in Organic and Inorganic Matrix on Optical Properties
Authors:- Mohd Nasha’ain Nordin, Nik Mohd Aziz Nik Abdul Aziz, Ahmad Aswad Mahaidin

Abstract:- Sol-gel matrix derived from from organic and inorganic moieties offer interesting features such as chemical and mechanical stability. Mixture of organic vinyltriethoxysilane (VTES) and inorganic tetraethoxysilane (TEOS) produce sol-gel matrices with improvement in density, flexibility and optical properties. Bromocresol purple and 18-crown-6-ether are added into the sol-gel mixture with 75:25 of VTES to TEOS ratio. The effect of incorporated bromocresol purple and 18-crown-6-ether to the sol-gel matrices is study using SEM, TGA, FTIR and UV-Vis. It is found that sol-gel matrices incorporated with bromocresol purple and 18-crown-6-ether improves response sensitivity and has the prospect to be developed as a new sensing materials.After a while a pH-sensitive indicator bromocresol purple (BCP) and surfactant were incorporate into the sol-gel mixture. The percentage of sodium dodecyl sulfate (SDS) and polyethylene glycol (PEG) which act as surfactant were varied to observe the effect of improving host material’s nanostructure as well as the interaction between BCP and sol-gel matrices. The absorption peak of the BCP dye changed significantly in the presence of surfactant compared to pure VTES: TEOS mixture (control) in the range of 400 to 450nm.

Distribution of Electric Field InElectro Osmotic Consolidation of Soil
Authors:- Yaju Sayami

Abstract:- In earlier times, Electro-osmosis of soil was used to extract minerals like gold, iron etc from the soil but in recent days, electro-osmosis has been used for consolidation of soil. Electro-osmosis of soil has been a great boon in the field of geotechnical engineering. Many improvements have been brought to this field like replacing electrodes as Electro-Kinetic Geosynthetics(EKG), which has greatly reduced electric consumption. However, it still has many problems like the soil around the electrodes are found to be more consolidated and dry. In this paper, we will be discussing the different causes and solutions on how to eliminate or reduce this problem by studying the distribution of the electric field in the soil. This is a simulation-based experiment, two models with different dimension and positioning of EKG will be compared, in which distribution of the electric field will be obtained as results. By analyzing the results, the effective positioning of EKG is determined.

A Review Paper for Face Emotion Reconization
Authors:- M. Tech. Scholar Bhawana Choubey, Asst.Prof. Shiv Bhatnagar

Abstract:- Those biometric might be an examination of humanity’s lead method Furthermore Characteristics. Face recognition will be a strategy from asserting biometric. Distinctive philosophies require help used for it. A survey for realize these frameworks is in this paper for dismembering Different computations Also strategies. Face recognition will create expansion from guaranteeing biometric for security as no stands up to might make vanquished Likewise a security approach. Thus, how we could see a face for that help for workstations is accommodated in this paper.

A Literature Survey on Zigbee
Authors:- M. Tech. Scholar Bhawana Choubey, Asst.Prof. Shiv Bhatnagar

Abstract:- This hypothetical tells about a Wireless Technological Device which is notable for to an extraordinary degree Low Power, and Low Bit Rate Wireless PAN Technology called ZigBee. ZigBee is proposed for remote Automation and other lower data endeavors’, for instance, splendid home motorization and remote checking. ZigBee is an insignificant exertion, low-control, remote work sorting out standard. The insignificant exertion empowers the advancement to be for the most part passed on in remote control and watching applications, the low power use permits longer presence with smaller batteries, and the work sorting out gives high steadfastness and bigger expands. Due to the negligible exertion and low power utilize this remote development is commonly used in Home Automation, Smart Energy, Telecommunication Applications, Personal Home, and Hospital Care. ZigBee enables new open entryways for remote sensors and control frameworks. ZigBee is standard based, negligible exertion, can be used all around, strong and self-repairing, supports tremendous number of center points, easy to pass on ,long battery life and secure.

Analysis of Secant Algorithm for Optimal Path Length of Point-To-Point Microwave Link
Authors:- Ezenugu, A. Isaac, Onwuzuruike, V. Kelechi

Abstract:- In this study, Secant algorithm was developed for computing the optimal path length of a point-to-point microwave. Also, the impact of various parameters on the convergence of the algorithm is also presented. Mathlab program was developed and used to carry out sample numerical computations of optimal path length and other performance parameters for a given microwave link. The results showed that convergence cycle of 5 is achieved for a microwave link operating at the frequency of 12 GHz and in rain zone N, with percentage availability of 99.99% . Also, the results showed that the secant algorithm , as presented in this study is suitable for the occasion when rain fading dominates. In that case, the convergence cycle of the secant algorithm is quite stable, maintaining values between 5 and 6 even in the face of variations in frequency, percentage availability and rain rate. In any case, the secant method can still be improved to yield low convergence cycle in the face of multipath fading. Furthermore, the iterative secant method may not be needed when the multipath fading dominate since it is possible to develop close form mathematical solution to determine the optimal path length when the multipath fading dominates.

Development of Empirical Model for Estimation of the Vertical Profile of Radio Refractivity
Authors:- Onwuzuruike, V. Kelechi, Ezenugu, A. Isaac

Abstract:- Values of meteorological parameters vary with altitude. As such, models that can be used to estimate the parameters need to include altitude as one of the variables. In this paper, empirical model is developed for estimating the vertical profile of radio refractivity based on available meteorological data and the altitude at which parameters were obtained. The study was based on Cross River state meteorological data obtained from Radio sounde measurement carried out by Nigerian Meteorological Agency (NIMET). The empirical model estimates radio refractivity as a function of altitude. The model has maximum absolute percentage error of 0.0176%. The model was validated with meteorological data for Akure in the South Western of Nigeria and the model gave maximum absolute percentage error of 0.0849%. The empirical model provides simpler way to determine the vertical profile of radio refractivity from the basic atmospheric parameters, namely, temperature, pressure and relative humidity.

A Survey Diabetes Prediction Using Machine Learning Techniques
Authors:- M.Tech.Scholar Arvind Aada, Prof. Sakshi Tiwari

Abstract:- Diabetes is a one of the main source of visual impairment, kidney disappointment, removals, heart disappointment and stroke. When we eat, our body transforms sustenance into sugars, or glucose. By then, our pancreas should discharge insulin. Insulin fills in as a “key” to open our cells, to enable the glucose to enter – and enable us to utilize the glucose for vitality. In any case, with diabetes, this framework does not work. A few noteworthy things can turn out badly – causing the beginning of diabetes. Type 1 and sort 2 diabetes are the most widely recognized types of the malady, yet there are additionally different sorts, for example, gestational diabetes, which happens amid pregnancy, just as different structures. This paper centers on ongoing advancements in AI which have had noteworthy effects in the recognition and analysis of diabetes.

Zigbee on Wireless Sensor Network
Authors:- M.Tech. Scholar Amol Ramdas Kasar, Prof. Sakshi Tiwari

Abstract:- A wireless sensor network (WSN) comprises of sensors which are thickly conveyed to screen physical or ecological conditions, for example, temperature, sound, weight, and so on. The sensor information is transmitted to organize organizer which is heart of the remote individual zone arrange. In the cutting edge situation remote systems contains sensors just as actuators. ZigBee is recently created innovation that chips away at IEEE standard 802.15.4, which can be utilized in the wireless sensor network (WSN). The low information rates, low power utilization, minimal effort are fundamental highlights of ZigBee. WSN is made out of ZigBee organizer (arrange facilitator), ZigBee switch and ZigBee end gadget. The sensor hubs data in the system will be sent to the organizer, the facilitator gathers sensor information, stores the information in memory, process the information, and course the information to proper hub.

Security on Android Devices
Authors:- M. Tech. Scholar Ronak Jain, Prof. Sakshi Tiwari

Abstract:- This paper contains profundity depiction of security models of current portable working framework like Android, iOS and Windows Phone. These security models are foundations of security on current stages. Regardless of various methodologies of security they share a great deal of for all intents and purpose. This paper additionally contains the most examined security issue of these days, Malware. Depiction of pernicious programming is from Application-based view. Be that as it may, present day working framework has solid assurance against infections and different kinds of disease through its security display, the weakest purpose of cell phones are still clients. These clients for the most part introduce extra programming into their gadgets. This paper centers on Android malware contamination and gives a couple of assurance strategies against this sort security risk.

Rumors detection in Social networking on twitter
Authors:- M.Tech. Scholar Garvesh Joshi , Prof. Sakshi Tiwari

Abstract:- Online internet based life sites like Twitter has turned out to be a standout amongst the most mainstream stages for individuals to get or spread data. Notwithstanding, without any balance and utilization of publicly supporting, there is no certification that the data shared is valid or not. This makes online web based life profoundly vulnerable to the spread of bits of gossip. As a major aspect of our work, we research all things considered a dataset on which talk identification was done in the past in 2009 and perform AI calculations like k-closest neighbor and gullible bayes classifier to recognize tweets spreading bits of gossip. We present the after-effects of our review investigation and extraction of client properties. A calculation for pre-processing on tweet content is proposed to hold key data to be passed on to learning calculation to acquire improved outcomes to the extent gossip discovery precision is concerned.

Identification of Vulgar Comments on social Media using data mining
Authors:- Jash Parekh, Harshad Shewale, Aman Mahajan

Abstract:- Data Mining is the process of finding anomalies, pattern and co- relations within large data sets to predict outcomes. These outcomes can then be manipulated to get our desired results and then work accordingly. Social media has greatly enriched people’s lives, allowing them to share or post their feelings through posting various comments or pictures. Some friends or people comments are such vulgar that usually the person sharing the post deletes the post. Our approach is to detect such vulgar comments and delete them immediately, as soon as they are posted by someone and even after deleting such comments the user on who’s post the comment was posted, gets to know the name of the person and comment which was posted. We are using Quick Sort algorithm for sorting comment. Through this project we aspire to remove negative comments and thus keep posts clean.

Data mining Approach for High utility Mining as Outlier Detection: A Survey
Authors:- Rashmi Rohitas, Prof. Ruchi Dronawat

Abstract:-Data mining is the process of identifying patterns in data sets by applying appropriate methods with cluster of machine learning techniques. In recent decades, high utility item set (HUI) mining has become the emerging research area, which focuses on frequency and also on utility related with the item sets. Each item set has a value like profit or user’s interest, called as the utility of that item set. HUIs are present in customer transaction databases which yield a high profit. The target of HUI is to discover the item sets that have utility value higher than the threshold value. The issues faced in HUIs are dealing with negative item values and number of database scans, mining in XML database, candidate sets and distributed computing network. This paper presents a survey of various algorithms and their restrictions in mining HUIs and the performance analysis of the surveyed algorithms.

A Novel Scheduling Algorithm for Wireless Optical Network
Authors:- Omprakash Choudhary, Alok Shukla

Abstract:- With the increasing of the business carried by the wireless private network and the continuous development of the new network technology, the problems in the traditional mode of wireless private network are becoming more and more obvious. So optical wireless channel were scheduled by observing the packets requirement and available channels. In this work two renowned scheduling algorithm First come First Serve and Shortest data first were compared. Scheduling of optical wireless channel obtained from WDM were done in same environment of data packets delivery. Experiment and results shows that proposed optical wireless channel scheduling by SDF was better than FCFS algorithm on various evaluation parameters.

Published by:

Wire Transfer / Telegraphic Transfer Details


Dear Author: Kindly use below transaction details for the “Wire Transfer / Telegraphic Transfer”. Transfer amount is mention in your acceptance mail.

Correspondent Bank Details
  • Bank Name: YES Bank
  • Account Number: 011961900001439
  • IFSC Code: YESB0000119
  • Branch Address: MP NAGAR Zone 1 BHOPAL M.P. India
Further Credit To
  • Beneficiary Name:Deng Infotech solutions Pvt LTD
  • Beneficiary Account No: 011961900001439
  • Purpose: Paper / Article Publication Charges
Published by:

Call For Paper International Journal


International Journal IJSRET invite researcher of Science and Engineering field to submit their latest review paper or research paper or study paper or letter or implementation paper. Here Editor has call for paper international journal publication under following points:

  • Paper or article should have innovative title with latest research area content.
  • Paper must have good content with deep understanding of topic
  • Paper should not be highly plagued
  • Proper reference should be used in the paper
  • Papers written in English language are invited

Submit Your Paper  / Check Publication Charges

Paper publication sites when Call for Paper International Journal

Number of question present in authors mind are list below with their answer.

Q1. Validity of international journal?

Ans: Type 8 digit number ‘2395566X’ of journal on www.portal.issn .org, you can get validity and year of publication Open website

Q.2 Impact factor of journal?

Ans: 3.24 is impact factor

3 Review time after submission?

Ans: Normally it takes 3 to 4 days.

4 Jounal Processing fees ?

Ans: Check Journal Processing fees:

5 Jounal paper submission?

Ans: Submit paper through:

6 Journal Increase processing fees as per number of author?

Ans: No, journal do not increase processing fee. Its constant.

7 Journal Increase fees as per number of pages?

Ans: No, journal do not increase processing fee. Its constant.
Published by:

Best Journals To Publish Research Papers


In order to find the research validity of any field researcher publish paper on Journal. But this take to other confusion of finding the best journals to publish research papers. So scholars who have just start there research carrier need to check following points of an journal and find that either journal is good or not.

  • Journal should have ISSN number (It’s a 8 digit Id)
  • Journal should have high Impact factor obtain from various resource
  • Journal should be at-least three year old
  • Journal should Journal should have proper submission form with Email-Id
  • Journal should have reviewer list
  • Journal should have valid Payment Gateway (People ask for person account payment is not good)
  • Communication should be responsive by email or chat
  • Journal should have copyright form and Paper format

Submit Your Paper  / Check Publication Charges

So how can one come to know about this:

Open this site and type 8 digit number of journal: www. portal. issn .org, you can get validity and year of publication.

Be aware of journal who show improper indexing by images or just type name of good indexes only. So Best Journals To Publish Research Papers have following links

Published by:

IJSRET Volume 4 Issue 5, Sep-Oct-2018


Development of Secure Image Transposal Algorithm Using 16 *16 Quantization Table
Authors: Vijay Bhandari, Dr. Sitendra Tamrakar, Dr. Piyush Shukla, Arpana Bhandari

Abstract:–Computerized picture scrambling can make an picture into a totally diverse good for nothing picture amid modification,and it is a preprocessing amid stowing away data of the computerized picture, which too known as data camouflage.Picture scrambling innovation depends on data cover up innovation which permits non-password protection computation for data cover up.Data stowing away innovation driven to a insurgency in the fighting of organize data,since it brought a arrangement of unemployed combat computations,and a part of nations pay a part of considerations on this zone. Organize data fighting is an imperative portion of data fighting, and its center thought is to utilize open organize for private data transference.The picture after scrambling encryption computations is chaotic,so aggressor cannot disentangle it.A few made strides advanced tidemarking innovation can apply scrambling method to alter the dispersion of the mistake snippet in the picture to move forward the strength of computerized tidemarking innovation.Arnold scrambling computation has the highlight of effortlessness and periodicity, so it is utilized broadly in the computerized tidemarking technology.

Enhancement of Thermal Plant Efficiency by Using Double Pipe Heat Exchanger
Authors: M. Tech. Scholar Indrajit Patidar, Asst. Prof. Nilesh Sharma

Abstract:–The heat exchanger section of a thermal power plant uses water as a coolant, which is incapable of extracting the low grade heat input in the heat exchanger section. This results in loss of a major chunk of heat energy from the thermal power plant. However, with the use of a proper coolant in the heat exchanger section, it is possible to utilize the heat available in the heat exchanger. This can be done by introducing a secondary cycle for energy generation along with the conventional primary cycle. Isobutane, with its appropriate physical properties, proves to be a good coolant in the secondary cycle for energy extraction from the low grade heat available in the heat exchanger section. The efficiency of a conventional thermal power plant can be improved from 80% to around 87 – 87.65% by incorporating this change. Although, the paper details the improvement of efficiency in a thermal power plant, same methodology can be used in any steam operated power plant, such as in nuclear power plants, in geothermal power plants, or in solar thermal electric power plants. The improvement in efficiency leads to lesser burden on non-renewable resources, such as coal and nuclear fuel, and also lowers the pollution effects on the environment. Proper practical implementation of the proposed model has the potential to revolutionize the energy generation paradigm of the world.

A Study of Customer Satisfaction with Business-To-Business Customers Model
Authors: Shashanka. B. K

Abstract:– Most benefit looking for associations are at last kept running by cash and the specific retail stores are the same in that. In retail markets the customers are the hotspot for benefits and organizations trying to procure them are continually growing new techniques keeping in mind the end goal to get the aggressive edge that baits the customers in to their stores. At the point when a company offers products and services that satisfies the requirements of the customer and produces extra esteem, satisfaction and saw quality appropriately then the company has the best possibilities for progress. High customer satisfaction is one focused edge a company can have and one reason why it is such a critical piece of a company’s methodology and has seen such a large number of researches and concentrates after some time is its association with gainfulness. The customers for the situation company X comprise of ordinary family unit purchasers and business-to-business customers. X conducts periodical studies that measure the satisfaction of the ordinary family unit buyers yet no research have yet been done to quantify the satisfaction of the business customers. This research will in this manner give new information to X and the aftereffects of this study can be valuable to the company for increasing better outcomes. As per this study the B2B customers are somewhat happy with the services and products of X. The desires for the customers were likewise met great. The most noteworthy factor for the B2B customers to visit in X was observed to be the area of the company, which had a definitive impact to the expenses for the customers.

Comparison Study of Flash & Fire Point of Bio-diesel Produced by Mustard and Soya Bean Oil
Authors: Asst. Prof. Mahesh Chand Saini, Mayank Sharma, Manoj Bhandari, Md. Nazwazish

Abstract:–Consumption of fossil fuel is increasing day by day that results decrease in amount of fossil fuels present on earth. After 30-40 years these sources are in danger of extinction so as to meet the requirement of human beings there is a need of using the alternative source of fuels. One of them which cause as alternative fuel that is derived from the vegetable oils and fatty acids. It is a key source as an alternative fuel. The process of biodiesel production is completed by the trans-etherification process and it is the chemical reaction between oil and alcohol in the presence of catalyst which results separating bio-diesel and glycerin. The process is completed in 2-4 hours and also depends upon the type of vegetable oil. Properties of Bio-diesel are also depends on the used oil. This paper illustrates the comparison between Soya bean and mustard oil Bio-diesel which is followed by different parameter such as Flash & Fire Point. Various ratios of blends of Bio-diesel (5%, 10%, 15%and 20%) are taken. Both edible and non-edible oil are used for producing the bio-diesel.

A Review of Methods of Analysis and Mitigation of Landslide
Authors: Emmanuel Arinze, Paul Chibundu Enyinnia, Aju Daniel Ekan, Anthony Chibuzo Ekeleme

Abstract:–Cities around the world that are located on a hilly and mountainous areas are always faced with the challenge of landslide, which can be disastrous and always result to loss of life and properties when it happens, and large expenditures are being incurred by Governments on the investigation, design and implementation of mitigation and preventive measures to reduce the likelihood of the loss of life and economic losses due to landslides. Landslide analysis can be based on hazard or susceptible. The formal is based on evaluation of probability of a landslide failure within a specified period of time and within a given region, while the later is based on classifying the region into several successive classes with different potentials of landslide. Based on the forgoing this paper is focused on the review of landslide hazard analysis and mitigation. There are four ways to a modern landslide hazard analysis which include Inventory approach, Heuristic approach, Statistical approach and Deterministic approach. Mitigation of landslide is based on the type of landslide, the different types of landslide has its own mitigation method which was discuss in this paper type by type. The four approaches can be applied for regional landslide hazard mapping. All the approaches have their shortcomings. The inventory analysis require a lot of maps which require interpretation, the heuristic analysis require a long- period landslide data, which may be insufficient in length of historical records, incompleteness in inventory and a possible mixing of extreme events, the statistical approach looks better as comparing with the weakness of the other three approach, but there still are some further development needed to predict landslide.

Reversible Image Data Embedding using Modified Histogram Feature
Authors: M. Tech. Scholar Kanchan Sahu, Asst.Prof. Pravin Malviya

Abstract:–With the increase in the digital media transfer and modification of data is very easy. So this work focus on transferring data by hiding in image. In this work carrier image was used to hide data where Low Frequency Region was utilized. Here whole data hiding is done by modified by using histogram feature shifting method. This approach was utilized to the point that hiding information and image can be effectively recovered. Investigation is done on genuine dataset image. Assessment parameter esteems and demonstrates that proposed work has keep up the SNR, PSNR values with high security of the information.

An Improved Approach for Tracking in Maneuvering Target Environment
Authors: M. Tech. Scholar Umesh Kumar Ahirwar, Asst. Prof. Nitin Choudhary

Abstract:–A Modern sensor networks, we need most important parameter is Self-organizing capacity for tracking maneuvering (non-constant) targets. for performance gained lot of attention to point out the control and coordination problem in self-organizing sensor network environment used flocking based methods. In this paper we are these type two well-known algorithms, namely, the Flocking and the Semi-Flocking algorithms. Although these two algorithms have demonstrated promising performance in tracking linear target(s), they have deficiencies in tracking maneuvering targets. Flocking algorithm is applied for tracking the target in maneuvering environment. In this paper we are analyzing the performances of flocking-based algorithms, both with and without the proposed approach, are examined in tracking both linear and maneuvering targets. Experimental results demonstrate how flocking algorithm yields better tracking of maneuvering targets, and how applying flocking concept on the target tracking process to improves the quality of tracking and increases the speed of convergence.

A Review on Different Algorithms for Tracking in Maneuvering Target Environment
Authors: M. Tech. Scholar Umesh Kumar Ahirwar, Asst. Prof. Nitin Choudhary

Abstract:–Self-organizing capacity is the most important need of modern sensor networks; particularly for tracing or tracking maneuvering (non-constant) targets. In this paper we presented the different technique of maneuvering Tracking algorithm & also we are proposing which technique is best for this tracking system. In this research brief literature review of different existing algorithm for maneuvering tracking system and proposed a system for maneuvering tracking system for modern sensor network.

Digital Image Retrieval Using Annotation, CCM and Histogram Features
Authors: M. Tech. Scholar Shalinee Jain, Asst. Prof. Sachin Malviya

Abstract:– As the quantity of web clients are expanding every day. This work concentrate on the retrieval of pictures by using the visual and annotation characteristics of the images. In this work two kind of features are utilized for the bunching of the picture dataset. So Based on the comparability of annotation, CCM and histogram components of the picture bunches are made. For bunching here genetic approach was utilized. Here client pass two kind of queries first was content while other is image, this assistance in choosing suitable cluster for retrieval of picture. Analysis was done on genuine and artificial set of pictures. Result demonstrates that proposed work is better on various assessment parameters as contrast with existing strategies.

Development of Safety and Productivity Correlation for A Rolling and Wire Drawing Factory
Authors: M. Tech. Scholar Kamal Shukla, Asst. Prof. Vijay Shankul

Abstract:– The work productivity of workers in a company is affected by several factors, one of which is occupational safety and health program and there is a significant effect of safety and health program on work productivity of workers either simultaneously or partially. A poor safety standard primarily originates from the belief that safety and productivity are mutually exclusive objectives, one eating away the other. But in practice they are correlated. The knowledge of exact nature of dependence of productivity with safety and health in industry is `therefore highly significant in the context of production. In this project safety and productivity are the two parameters have been focused and the mutual correlation between the two has been analyzed on the basis of the data obtained from the industries various department of safety and productivity and has been presented in the tabulated form by using the data with respect to safety and productivity. The developed correlation is a functional relation between total factor productivity and safety elements and cost of production. Hence, the developed correlation can be used to predict total factor productivity (TFP) from the knowledge of the values of input safety elements and planned cost of production.

Garbage Management for Smart Cities Using Internet of Things
Authors: M. Tech. Scholar Anjali Urmaliya, Dr. Neeraj Shukla

Abstract:– Garbage Management of smart city using “Internet of Things”. In our daily life we produce a lot of waste or garbage as last few years witnessed a tremendous rate of population, and it’s also important to manage that garbage properly generated by peoples. By using Internet of things it will easy to manage all the garbage. I will use some IOT devices for the management of garbage of smart city, smartly. The Devices that will make it complete are “Arduino Uno, Raspberry Pi, ESP8266, MQTT Protocol. It Is will also support the “Swachha Bharat Abiyan” campaign by Prime Minister Of India. The purpose of the mission is to cover all the rural and urban areas of the country to present our country as an ideal country to the world. Waste Management is one of the primary things to solve the problem that the world faces to developing country. The main aim of the work is to develop a smart intelligent garbage alert system to for proper management of garbage.

Controller Analysis of Reaction Wheel System for Counter Torque
Authors: Ye Min Htay, Thu Thu Aung

Abstract:– This work addresses the reaction wheel system (RWS) for a Nano satellite and simulator which shows the function of it. The object is to design flywheels that counteract the disturbance torques experienced by satellite in the harsh space environment and to stabilize the platform of simulator. The performance of reaction wheels is analyzed to achieve the stable for system. The satellite and simulator utilizes three reaction wheels as actuators. The controller is designed to change the rotational speed of reaction wheels to adjust the satellite and simulator in the desired position. The mathematical model of reaction wheel system using angular kinetic equation is developed. Control theory is then applied for a required response that deals with both non linarites in equations and disturbance sources. Simulation of closed loop system shows that all desired specification of closed loop (rising time, settling time and steady state error) are robustly satisfied.

Probing the Effect of Parameters of Wire-EDM on Cutting Speed and Surface Integrity for D2 Steel
Authors: Nitin Kumar, Dinesh Panchal, Naveen Gaur

Abstract:– The indent of alloy steel of high toughness, hardness and strength is proliferating in present era of materials .These materials are used for typical Purpose. As difficulty is encountered in machining of these materials by traditional methods of machining. Wire cut EDM is used to machine them. It has been become an important machining process because it avails an effective way out for generating components made of materials like titanium, zirconium and complex shapes , which are rather difficult to attain by other machining methods. Due to large number of process parameters and responses, a lot of researches have tried to optimize this process. A remarkable amelioration in process efficiency may be obtained by optimization of parameters which recognize the region of censorious process control factors which leads to required response ensuring a lower cost of production.

A Survey on various Techniques of Energy Management in Wireless Sensor Network
Authors: M.Tech.Scholar Prakash Kumar Singh

Abstract:– The availability of sensor devices allow a wide variety of applications to emerge. However, the resource constrained nature of sensors raises the problem of energy: how to maximize network lifetime despite a very limited energy budget. This paper gives a concise study of WSN (Wireless Sensor Network) energy balancing methods proposed by different researchers. Different sorts of requirement of protocols for managing WSN was additionally talked with their significance and limitations. In this study as per working steps of techniques are categorized, so a comprehensive and comparative understanding of existing literature was detailed.

A Survey on Online Social Network Based User Community Identification Techniques and Features
Authors: Asst.Prof.Raju Sharma

Abstract:– As the amount of web customers are extending each day. Presently a user connecting the social personality over the distinctive web-based social networking stages is of basic significance to business intelligence. In this paper, a survey of similarity based user community detection methodologies were discussed for finding the exceptional arrangement of users. Here different features of the social user profiles were identified as per there requirement. So current issues are summarized in the paper for the solution of the work.

GSM Based Gas Leakage Detection System
Authors: Mohit Nankani, Vinay Nagrani, Ajay Mandliya, Jemila Rani

Abstract:– Gas leakage is a major problem with industrial sector, residential premises and gas powered vehicles like CNG (compressed natural gas) buses, cars. One of the preventive methods to stop accident associated with the gas leakage is to install gas leakage detection kit at vulnerable places. The aim of this paper is to present such a design that can automatically detect and stop gas leakage in vulnerable premises. In particular gas sensor has been used which has high sensitivity for propane (C3H8) and butane (C4H10). Gas leakage system consists of GSM (Global System for mobile communications) module, which warns by sending SMS. However, the former gas leakage system cannot react in time. This paper provides the design approach on both software and hardware.

A Study of the Learning Curve of the Japanese Keyboard on Smartphone
Authors: Muhammad Suhaib

Abstract:– Japanese (Nihongo) is an east Asian Language, extensive use of Chinese character called KANJI and Phonetic Characters called KANA (hiragana and katakana). Many people assume Japanese Keyboard on smartphone is difficult to use that’s why I decide to conduct study to determine how easy to learn Japanese Keyboard for new users. Two user with no experience with Japanese keyboard on smart phone were asked to enter some Japanese sentences as fast as they can at least 20 times and same thing was asked to experienced users as well.

Dominance of Artemisia community and Stragalus community in arid area of Iran:True or not?
Authors: Reza E. Owfi

Abstract:– As mentioned in the most of the relevant sources, in other parts of the arid regions of Iran the dominance of theArtemisiaand Astragaluscomunity may vary from an Astragalus species to another species of it, whether individually or in combination. Here are two previous researches on vegetation coverage in two regions of Iran which are located in a group of arid areas and on the other hand, have a large distance from each other: Catchment area of farm Haj Hassan in Yazd province and Maharloo Lake in Fars Province. After examining the two researches, the results of these studies were evaluated and, in the end, analyzed the information obtained from the above studies, which indicates the validity of the aforementioned claim.

Social Security’s Allowances in Nepal and Its Impact on Rural Economy Evidence From Chandrapur Municipality Rautahat
Authors: PhD. Scholar Kirti Raj Subedi

Abstract:– Social security’s allowances program (SSAP) is being popular day by day in Nepal. Nepal’s national social protection program (SPP) aims to control multidimensional deprivations, life cycle risks, and providing people with a basic minimum livelihood. Nepal has launches many social protection program. Nepal have five social security’s allowances program (SSAP) include five schemes targeting: Children of Dalit under-five years of age , Widows and single women over 60 years of age , People with disabilities , Senior citizens over 70 years of age (over 60 years of age in the case of Dalit) , Highly marginalized indigenous ethnic groups (Janajatis). Theses SSAP schemes are managed by the Department of Civil Registration (DoCR) under the Ministry of Federal Affairs and General administration (MoFAGA), and delivered through local governments.The UN has proposed in Sustainable Development goal (SDG) to provide social security’s for all by 2030. (world Bank, 2015).The developing countries are introducing social security’s allowances program with large range with different modalities. Nepal has expending on social security’s 2.3 % of its Gross domestic Product (GDP). Nepal governmenthas providing more than 89 social security’s allowances schemes to the citizens through the various ministry.
Social protection is inevitable for the better lifestyle to the pro poor and the political support also highly acceptable in Nepal but the economic condition and the paying capacity of the government is very low so here is a matter to diabetes how much , to hum should pay by the government. Nepal has just successfully complete the election of three tier government. The social security’s allowances only manage by the federal government and some social protection scheme lunched by the local government. Nepal has several social protection schemes but they have not adequate in term of cash transfer. Lack of integrated social protection policy the cost of government is growing up to manage the social protection program.

Improvement in Cloud Storage Auditing with Verifiable Outsourcing of Secure Key
Authors:M.Tech.Scholar Tanuj Sharma, Asst.Prof. Lakhan Singh, Asst.Prof. Ankur Taneja

Abstract:– Presentation Cloud registering is a current mechanical advancement in the processing field in which for the most part centered around outlining of administrations which can be given to the clients in the same route as the fundamental utilities like nourishment, water, gas, power, and communication. Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been proposed to protect data from those who do not have access. In Existing system, there are following associate problems which are worked on our proposed work AES-256 is quite common and easily available for hacker activity in case it desire to break. Highly indexed data structure is not taken in the Existing system. In this paper we are using a stander SHA-2 algorithm for message key generation and for data encryption used optimized Bluefish algorithm after the completed of these process we also find the proxy server in cloud system. For simulation we used cloudsim a java based simulator.

Analysis of Tuberculosis Surveillance Tools at the Ministry of Health:The Case for Computerise/Mobile Surveillance Systems
Authors:Bernard Rotich

Abstract:– Tuberculosis (TB) is a major global health concern, causing nearly ten million new cases and over one million deaths every year. In Kenya, it remains a major cause of morbidity and mortality affecting a substantial percentage of the population. Early detection of TB through surveillance is an effective intervention measure against Tuberculosis. [The general objective of the study was to investigate how TB Surveillance is done in Kenya. The specific objectives of the study were to: establish the current challenges facing TB Surveillance system, review current state of TB surveillance systems, identify the requirements for TB surveillance system, design and develop a mobile integrated prototype system for TB surveillance Qualitative data was analysed to provide a deeper understanding of user requirements of the system which then were used to design and develop a TB surveillance system using Prometheus agent design methodology. The system was implemented on PHP, MySQL for database and Java Agent Development Framework for multi-agent platform. The designed TB surveillance system enabled the medical practitioner to interact with the patient. The tests included the use of mobile phones to capture data from the remote centres. Usability and functionality tests were performed which indicated that the application was an effective surveillance and responsive tool. Finally the study concluded by pointing out the keys areas of future improvements on the existing system and recommendations for future research.

Digital Energy Meter and Fuel Theft Detection Using PIC Microcontroller
Authors:A Jemila Rani

Abstract:– Today’s world haveso many techniques for measurement of any quantity al fuel.Fuel meter areanalog so that we trying to make it digitized to show the fuel value digitally. In our project we show the amount of fuel present in fuel tank digitally .Also fuel theft is a problem in all over world. In our undertaking we demonstrate the measure of fuel present in fuel tank carefully .Also fuel burglary is an issue in all over world. In our venture if fuel gets robbery then instant message will send to proprietor of bicycle likewise ringer influences commotion so proprietor of bicycle to get mindful. In conventional vehicle framework fuel burglary of bicycle can be maintained a strategic distance from.

Power Generating Low Cost Green Electric Vehicle
Authors:Riddik Adhikari, Subrata Mondal

Abstract:– It is low cost much more efficient than present electric cars. We took the concept of Tesla cars and hybrid car concept for our low cost electric vehicle. We have used the motor generator concept. The vehicle will run on green energy and will emit no harmful gases. Moreover it is an eco-friendly concept. It has no complicated machinery so that the maintained cost is less compared to other ICE (Internal combustion Engine) vehicle. We will replace ICE with Motor generator concept which will help in propulsion of car. Hybrid car are popular in these days but the main drawback is that Hybrid are not eco-friendly as it has ICE along with electric motor, battery and several other electrical components. This concept will be more efficient as compared to other electric, ICE and Hybrid vehicles. Having more millage it will be more efficient than present electric cars which will make this concept the best. Last but not the least the importance of the car is that efficiency will not much more difference with respected to loaded and unloaded condition of the car.

Image Optimization and Segmentation by Selective Fusion in K-Means Clustering
Authors: D. Malathi M.E., Asst.Prof.A.Mathan Gopi

Abstract:– We present a simple, reduced-complexity and efficient image segmentation and fusion approach. It optimizes the segmentation process of colored images by fusion of K-means clusters in various color spaces, in order to finally get a more reliable, accurate and a non-overlapped image. The initial segmentation maps are produced by taking a local histogram of each pixel and allocating it to a bin in the re-quantized color space. The pixels in the re-quantized color spaces are clustered into classes using the K-means (Euclidean Distance) technique. K-means clustering tends to find clusters of comparable spatial extent, while the expectation-maximization mechanism allows clusters to have different shapes and a selective fusion procedure is followed to reduce the computational complexity and achieve a better-segmented image. The parameters considered for selection of initial segmentation maps include entropy, standard deviation, and spatial frequency etc. The performance of the proposed method is analyzed by applying on various images from the Berkeley image database. The result aims at developing an accurate and more reliable image as compared to other methods along with reduced complexity, processing time and hardware resources required for real-time implementation

Image Optimization and Segmentation by Selective Fusion in K-Means Clustering
Authors: M.Tech.Scholar Sonam Shrivastava, Asst.Prof. Priya Jha

Abstract:– As the digital world is growing with various kind of data like text file, image, video. Out of those image plays an important role in different field such as remote sensing, social media, etc. The degradation in image quality may be attributed to absorption and back-scattering of light by suspended underwater particles. Moreover, as the depth increases, different colors are absorbed by the surrounding medium depending on the wavelengths. So maintain the image quality is done by Digital image processing on various issues. This paper give a brief survey of haze and underwater image enhancement techniques for various condition. As environment condition vary from time to time by the presence of fog, dust, water. Image analysis features are describe in this paper with there requirements.

Synthesis Characterization and application of Resins Obtained from Agricultural Waste to Remove Cu (II) from Waste Water
Authors: Mohammad Azam, Dr.Gulrez Nizami, Nida Tanveer,Mohammad Arshad, Sheela

Abstract:– The objective of the work is to a removal of the heavy metal ion of Cu(II) from the wastewater of different industries such as mining and, smelting, plating, brass manufacture, petroleum refining, electroplating industries and Cu- based agrichemicals. In this work, some waste agriculture materials are used as the adsorbent for the elimination of copper particle from the wastewater of Copper plants. Some agricultural materials like rice straw, rice bran, rice husk, rice hyacinth roots, coconut shell and, neem leaves were crushed in roll crusher and then grinded to prepare powdered material and then dried in an oven, then it was used as a copper adsorbent in different pH solutions of copper wastewater. Their resulted solutions were measured by FTIR and some other techniques.

A Review of Factors of Cost Overrun in Developing Countries
Authors: Ijaz Ahmad Khan

Abstract:– The accomplishment of any improvement activities is as well as its convenient fruition within the targeted on funds, with the simplest attainable fine and setting is of great concern. Price invades are perceived as leading confinement in varied development enterprises of developing nations. To take a look at price overwhelm in development endeavor is commonplace worldwide and therefore the development venture in developing nations is not any exemption. Price overwhelm is while not question one in all the most problems in building ventures. The explanations of improvement rate overwhelm might vary from nation to country due to the truth of the amendment in political, cash connected, social, and ecological conditions. This example is extra serious in developing nations wherever these overwhelm a moment surpasses (100%) of the wander planned expense. To dodge price overwhelm, the essential and very central advance is to acknowledge and build up the explanations and factors up to speed for price invades. Thus, this paper is planned to make up the various factors up to speed for improvement rate overwhelm in making international areas which is able to fill in because the manner by that ahead for future add adapting to those invades. This work could be a diagram of the clarifications of the speed invade in several building countries because it has been seen that {each} one in all the clarifications aren’t like each trip in developing worldwide are as albeit a number of them are regular like terrible administration, vacillation of texture prices incorrect texture gauges and monetary fame of the temp.

Total Factor Productivity and Gross Value Addition In Services Sector of India From 2000 To 2010
Authors: Dr. Manish Tongo

Abstract:– Service sector of India has lately played a role of igniter so far as growth rate of GDP is concerned. Post globalization, Service sector alone emerged as a largest contributor to the GDP of India. Earlier by default an agrarian economy of India took a drastic turn and service sector today has occupied a driver’s seat in steering the growth of India economy. This divergence from a product economy to service economy has not only accelerated the growth of India but it certainly has elevated the brand image of India across the world. It won’t be out of place to mention here that before globalization of Indian economy the image of India in the eyes of the developed nation was far more negative than one could conceive of.

A Survey on Frequent Pattern Rules Techniques for Privacy Preserving mining
Authors: M.Tech. Scholar Shivani Pandey, Asst.Prof. Monali sahoo

Abstract:– Information sharing among the organizations is a general movement in a few zones like business advancement and showcasing. As portion of the sensitive rules that should be kept private might be revealed and such revelation of sensitive patterns may impacts the benefits of the organization that possess the information. Consequently the principles which are sensitive must be covered before sharing the information. In this paper to provide secure data sharing sensitive rules are perturbed first which was found various techniques are discussed. Here techniques of privacy data mining was also detailed.

Automatic Irrigation System on Sensing Soil Moisture Content Using PV and GSM
Authors:Rohith Chilumula, Rahul Peddibhotla

Abstract:-Agriculture and Gardening works are not trivial. There is a wide range of crops and plants and many varieties of each plant or crop. Various plants and crops have different requirements for water, fertilizers and sun. Soil ripeness for any strain or planting society is for the most part made a decision by the level of supplements and dampness in it. Various occasions and nursery workers are not ready to sustain the dirt with enough compost or water, while ordinarily just you do it.This undertaking is to encourage ranchers and nursery workers keep up control of the dirt dampness level

Speed Synchronization of DC Motors by Using Microcontroller
Authors: Karthik Reddy Solipuram, Nennuru Gopala Krishna Reddy

Abstract:-In this venture, another control approach for ongoing pace synchronization of numerous enlistment motors amid speed increasing speed and load changes is produced. The control technique is to settle speed following of every motor while synchronizing its movement with other motors’ movements so differential speed blunders among various motors merge to zero. In industry many procedures required speed synchronization of more than one motors required all the while. Speed control of motor is imperative particularly in the fields including mechanical applications, apply autonomy, material factories, and so on. In all these application motor speed synchronization is animate in transport line driven by different motors. Sudden changes in load cause chasing and oscillatory conduct in DC machine. This conduct can be unsafe to the procedure. There are such a variety of strategies which is utilized for controlling the DC machines. Among all these strategy ace slave synchronization is a broadly utilized method. The ADC is accessible in microcontroller chip which make criticism circle. A driver circuit is utilized to drive the motor. In this strategy, the direction of motor’s speed is accomplished by changing the voltage of the motor which is balanced by the obligation cycle of PWM.

Facial Detection Based on K-means and Local Binary Patterns
Authors: M.Tech. M. Muralidhar Reddy, Asst.Prof. G.Varaprasad, Asst.Prof. Karamala Suresh

Abstract:– Face detection and recognition are challenging research topics in the field of computer vision. Several algorithms have been proposed to solve lot of problems related to changes in environment and lighting conditions. In this research, we introduce a new algorithm for face identification or detection. The proposed method uses the well-known local binary patterns (LBP) algorithm and K-means clustering for face segmentation and maximum likelihood to classify output data. This method can be summarized as a process of detecting and recognizing faces on the basis of the distribution of feature vector amplitudes on six levels that is, three for positive vector amplitudes and three for negative amplitudes. Detection is conducted by classifying distribution values and deciding whether or not these values compose a face.

Security and Privacy Issues in EHR Systems Towards Trusted Services
Authors:M.E. G.Kavita, Asst.Prof. K.Bala

Abstract:-As of late saw an across the board accessibility of electronic medicinal services information record (EHR) frameworks. EHR were produced during the time spent treatment in therapeutic focuses, for example, healing facilities, centers, different establishments. With the end goal to enhance the nature of social insurance benefit, EHR could be shared by an assortment of clients, so noteworthy security ought to be delivering to make EHR commonsense. EHR framework not totally settled out the protection challenges. In this paper an orderly writing survey was led the protection issue in EHR and make sense of the utilized security models. Additionally a novel Context-mindful Access Control Security Model (CARE) is proposed to catch the situation of information interoperability and bolster the security basics of human services frameworks alongside the capacity of giving fine-grained get to control.

Reverse Logistic Management in Construction
Authors:Mr. Anish Kanti Bera

Abstract:-Reverse logistics in construction refers to the movement of products and materials from rescued buildings at a new construction site. Given the various facets of the reverse logistics series, there is a large number of studies, but there is no systematic review of literature on this important topic applicable to the construction industry. Therefore, the purpose of this study is to integrate the fragmented body of knowledge on reverse logistics in the construction, with the aim of promoting the concept among the stakeholders of the industry and the wider construction community. Through qualitative meta-analysis, the study synthesizes the findings of previous studies and presents some of the tasks required by industry stakeholders to promote this concept in the context of real interest. First, the research and terminology tendency for reverse logistics has been introduced. Second, it detects the main advantages and constraints of reverse logistics in construction, while providing some tips for using these benefits and reducing these constraints. Finally, it provides future research direction based on the review. Unlike the manufacturing context, due to inadequate RL literature in the construction sector, this could be one of the reasons. Consequently, the knowledge of RL and its applications in the construction sector is limited. To solve this issue, this study attempts to identify and highlight the fundamental aspects of the RL concept, which dramatically affects its adoption and implementation through an integrated review of literature.

Relationship between Stock Prices and Rupee Dollar Parity in India
Authors:Prof. Anchit Jhamb, Ms. Swati Aggarwal

Abstract:-The dynamic linkage between rate of exchange and stock costs has been subjected to extensive analysis for over a decade and attracted goodly attention from researchers worldwide throughout the Asian crisis of 1997-98. The difficulty is additionally necessary from the perspective of recent massive cross-border movement of funds. In Bharat the difficulty is additionally gaining importance within the liberalization era. With this background, the current study examines the causative relationship between returns available market and forex market in Bharat. victimization daily knowledge from March 1993 to December 2002, so to found that causative link is mostly absent although in recent years there has been sturdy causative influence from exchange come back to forex market come back. The results, however, are tentative and that is the needfor any in-depth analysis to spot the causes and consequences of the findings.

Intelligent Spam Detection Microservice with Serverless Computing
Authors:Prachi Mahajan, Snehal Bhoite, Asst.Prof.Abhijit Karve

Abstract:-Today for personal and business purpose most of the users uses email as one of the most important source for communication. The use of email is increasing day by day without being affected by alternative ways of communication such as social networking sites, SMS, mobile applications, electronic messages. As frauds using email classification is increasing due to extensive use of emails, it becomes very important issue to classify mails as fraud or normal mails. The Intelligent Spam Detection System (ISDS) provide automatic way to classify emails as SPAM i.e. fraud mail and HAM i.e. normal mail using multiple machine learning algorithms.

An Analysis of Land Use & Land Cover Mapping Using Geo- Spatial technology A case study of Pat watershed in Jhabua District, Madhya Pradesh, India
Authors:Chetan Singh Hada, Bahul Kumar Vyas, Jyoti Sarup, Dr.D.C. Gupta

Abstract:-Remote Sensing (RS) as an immediate assistant to field, as of late assuming an essential job in the examination and assessed the regular asset in any piece of the world. Quickly changes in land utilize and arrive cover, arrive utilize are regularly thought to be indistinguishable, they are fairly very unique. Land cover might be characterized as the biophysical earth surface, while arrive utilize is frequently formed by human, financial and political effects on the land. Remote Sensing, coordinated with Geographical Information System (GIS), give and helpful instrument to examination of land utilize and arrive cover changes at a territorial level. The geospatial innovation of RS and GIS holds the potential for opportune and cost compelling assessment5 of common assets. The systems have been utilized extensively in the tropics for creating valuable data on backwoods cover, vegetation compose and arrive utilize changes. Accordingly, we have been utilized RS and GIS to contemplate arrive utilize arrive cover changes in Pat watershed, Jhabua region, Madhya Pradesh, India covering a region of around 817.93sq/km. In this view the present work has been taken up to contemplate and evaluate a portion of the regular assets and ecological capability of study territory which is falling in the Survey of India toposheets No: 46I/8, 46I/12, 46J/5 and 46J/9. Under this investigation three topical maps, for example, area delineate, guide, and land utilize and arrive cover maps were readied. The land utilize and arrive cover examination on the investigation region has been endeavored dependent on topical mapping of the zone comprising of developed land, Agricultural land, Forest, Waste land and Water bodies utilizing the satellite picture. The examination presumes that there is a fast development of developed region. Land utilize and arrive cover data, when utilized alongside data on other normal assets, similar to water, soil, hydro-geomorphology, and so on. will help in the best land utilize arranging at the full scale and small scale level.

A Review Article of Micro Grid Power Boosting Technique
Authors: M.Tech.Scholar Chandra Kant Sharma, Prof. Pragati Priya

Abstract:-Energy, especially alternative source of energy is vital for the development of a country. In future, the world anticipates developing more of its solar resource potential as an alternative energy source to overcome the persistent shortages and unreliability of power supply. In order to maximize the power output the system components of the photovoltaic system should be optimized. For the optimization maximum power point tracking (MPPT) is a Promising technique that grid tie inverters, solar battery chargers and similar devices use to get the maximum possible power from one or more solar panels. Among the different methods used to track the maximum power point, Perturb and Observe method is a type of strategy to optimize the power output of an array. In this method, the controller adjusts the voltage by a small amount from the array and measures power, if the power increases, further adjustments in that direction are tried until power no longer increases. In this research paper the system performance is optimized by perturbs and observes method using buck boost converter. By varying the duty cycle of the buck boost converter, the source impedance can be matched to adjust the load impedance to improve the efficiency of the system. The Performance has been studied by the MATLAB/Simulink.

Water Quality mapping using Remote Sensing and GIS- a case study of Pampawa Watershed in Jhabua Dist, Madhya Pradesh, India
Authors:Chetan Singh Hada, Bahul Kumar Vyas, Jyoti Sarup, Dr.D.C. Gupta

Abstract:-Groundwater serves as the main sources of water in the urban environment, which is used for drinking, industrial and domestic purposes and often, it is over exploited. Now these days, the groundwater is facing terrorization due to anthropogenic activities. In this study, groundwater sample collects in pre and post monsoon seasons for total 56 villages from 61 predetermined bore wells and open wells representing Pampawa Watershed in Jhabua District, Madhya Pradesh, India. The water samples analyzed for physico-chemical parameters like TDS, Chloride, Fluoride, pH, Hardness and Turbidity using standard techniques in the laboratory. Also, geographic information system-based groundwater quality mapping in the form of visually communicating contour maps was developed using ArcGIS-version 10.1 software to delineate spatial distribution in physicochemical characteristics of groundwater samples.

Removal of Calcium and Magnesium ions from Ground Water in the Jaffna Peninsula, Sri Lanka by using Chemically Modified RiceHusk
Authors:Anushkkaran. P, Asharp Sharmec. G, Mazenod Denorth .V.A

Abstract:-Water hardness due to the calcium and magnesium ions in groundwater have been a devastating effect to the freshwater in the dry zone in Sri Lanka, mainly in the Jaffna peninsula. Jaffna peninsula depends on ground water as there are no other freshwater sources and the rain fall is not sufficient. Study on the removal of calcium and magnesium ions using rice husk (RH) as a low-cost adsorbent was investigated in groundwater of calcium and magnesium ions in the Jaffna peninsula, Sri Lanka. This study was conducted to evaluate the ground water quality and removal of hardness. Fifteen wells were selected in different regions in Jaffna peninsula for ground water samplings. Impact of operational conditions, such as the dosage amount of rice husk and contact time were analyzed for chemically modified rice husk. Here we used HCl and NaOH to modifying the rich husk by chemically at pH 4 and pH 8 respectively. Statistical analysis revealed that the highest removal of Ca2+ and Mg2+ ions are at pH 4, adsorbent dosage 10 g/L water and 30 minutes of settling time.

Solar PV – Battery Storage with DVR for Power Quality Enhancement

Authors:K.Venkatrami Reddy, P. Chinnaiah, V.Sunil Kumar Reddy

Abstract:-The consumption of electric power is very high due to high invention and more number of non-linear loads. The most of the loads are nonlinear loads, causes the harmonic electric currents in the system. These harmonic currents in turn create system resonance, capacitor overloading, decrease in efficiency, voltage magnitude changes. Power quality has become an increasing concern to utilities and consumers. The power transmitting in a distribution line is needed to be of very high quality. One of the major power quality issues is considered in the distribution system called Voltage sag and it can mitigate with the help of dynamic voltage restorer (DVR). In this paper, Focusing on the new integration of solar PV-Battery based Dynamic Voltage Restorer is implementing in the distribution system to meet the required power and for power quality enhancement. Solar photovoltaic with boost converter is implemented by incremental conductance method to track the Maximum power. The performance of solar photovoltaic, Battery with Dynamic Voltage restorer is simulated under dynamic conditions of the load in MATLAB-SIMULINK software.

Published by:

Publish Research Paper


As young researcher always get trouble for there first paper to publish on International journal. So this article help those researcher to publish research paper. Here we describe each step since from paper writing to final publishing. So you question for

How to publish research paper is resolve?

  • Researcher Need to cover following points in paper (Title, Abstract, Introduction, Literature survey, Problem Identification, Proposed Work, Results, Conclusion References)

  • Check for unique title as similar title may be rejected by journals.

  • Check Plagiarism of the paper by any software, try to reduce plagiarism below 18%.

  • Prepare paper in format like content and heading font size should be same.

  • Select journal as per your mentor suggestion.

  • Submit paper through selected journal website.

  • Check publication cost of the journal.

  • Ask for digital certificate cost or number of author cost.

  • Check minimum number of paper length for publication in mention fees.

  • Wait for acceptance letter once you submit paper.

In this way one can submit paper on journal for publication of research / survey paper.

Submit Your Paper  / Check Publication Charges



how to publish a paper
how to publish research paper
Published by:

IJSRET Volume 4 Issue 4, July-Aug-2018


Modern Manufacturing and Automation Technology Approach for Rubber to produce Tire and Safety With Pollution Control Guide
Authors: Hitender Chhikara, Asst. Prof. Vikas Kumar, Prof. Sanjay Kumar, Research Scholar Vinay Singh

Abstract:–Tire or Tyre Automotive Industry has emerged as an important field of research under manufacturing and automation technology with environment pollution factors in the last few years. Vehicle Tire Automotive Industry is a set of processes that seek to change the automotive market pattern of knowledge processing to enhance both it and its outcomes. Tire Industry is a core concept involving manufacturing and automation technology and various management practices working for the betterment of the Automotive Industry market are becoming more knowledgeable about technology intensive; they are hiring “minds” more than the hands. The tire industry has become one of the critical approaches for the automotive market as a manufacturing sector and business scenarios. So that many definitions and history of describing a vehicle tire, manufacturing and automation technology Industry has been discussed in the first chapter. A literature review of the process has been discussed in the chapter second. The process is affected by various factors that support and hinders the automotive Industry. These factors were implemented in small and medium levels of the working of technology for tire manufacturing process and their importance has been found out in the research. These factors were mentioned in the chapter third. A Modern Manufacturing & Automation Tire Technology, under in process, today used the latest machines technology for manufacturing of tires with help of automation technology. These factors are mentioned in chapter fourth. In chapter five, tire terminology is very important factors discussed for tire performance and accuracy for working on the road or off-road. A tire is depending on raw- material based upon natural, synthetic rubber and others material, so these materials mentioned in chapter six. The tire is related to rubber, in that case, recycling time many types of pollution work in at surrounding, these concepts discussed in chapter seven. It was the first rubber tire developed in the 1800’s after the analysis and various important factors related to work performance. The important parameters are identified and self-interaction matrixes proposed with the help of Interpretive Technology structure modeling which evaluates the inhibiting power of these parameters. This index can be used in the comparison of different factors responsible for manufacturing processes. Eight chapter of the research includes concluding Remarks of the study, Limitations of the study and Scope of the future work.

Modern Manufacturing and Automation Technology Approach for Rubber to produce Tire and Safety With Pollution Control Guide
Authors: M.Tech.Scholar Sanjay Patware, Asst. Prof. S.S. Gawande

Abstract:–The microprocessors in the modern era are propelled by high speed, small area and low power circuits. Dynamic logic circuits are used for high performance and high speed applications. Wide OR gates are used in Dynamic RAMs, Static RAMs, high speed processors and other high speed circuits. In spite of their high performance, dynamic logic circuit has high noise and extensive leakage which has caused problems for the circuits. To overcome these problems Domino logic circuits are used which reduce sub threshold leakage current in standby mode and improve noise immunity for wide OR gates. High noise sensitivity is the result of sub threshold leakage current that flows through the evaluation network. With the advancements in CMOS manufacturing process to scale down into the ultra deep sub-micron regime, the leakage current becomes an increasingly more important consideration in VLSI circuit design. According to the simulations in HSPICE at 90nm and 65nm CMOS technology, the proposed circuit shows the improvement of Average power consumption upto for 8 input OR gate 30% compared existing domino logics. This control circuit produces small voltage at the source of the pull down network in the standby mode. It improves the noise immunity of the domino circuits. The performance of these circuits has been evaluated by HSPICE using a BSIM4.

Modern Manufacturing and Automation Technology Approach for Rubber to produce Tire and Safety With Pollution Control Guide

Authors: Ganesh B. Salomi Ch., Prof. Sri Rami Reddy D

Abstract:–Carbonate producing bacteria have attracted lots of interest as promising natural, environmental friendly novel technique to the improvement of concrete characteristics. Considerable research has been conducted on utilizing microbial induced carbonate precipitation to mitigate several concrete problems such as crack repair, reduction and modification of porosity and permeability. Furthermore, bacterial carbonate precipitation has shown positive influence on compressive strength improvement of concrete. In general, cracks in the concrete structures are early signs of distress which have to be diagnosed properly otherwise the repair of same crack takes place again and again causing loss of time and money. This led to the evolution of self healing concrete. Self Healing Concrete is a term that is used for cement-based materials that repair themselves after the material or structure gets damaged due to some sort of deterioration mechanism. The vast literature review indicated that self healing mechanism can be achieved in various ways, by using certain polymers or by the use of certain species of bacteria. Self healing concrete prepared by using bacteria is called Bio-concrete. There are three approaches for bio-concrete, namely, autogenous, vascular, and capsule-based self-healing. Based on these factors, the present study attempted to interpret the efficiency of Bacillus subtilis as a self healing agent and to study the change in the properties of concrete due to the addition of this species. In the view of this, the primary objectives of this study were to analyze the healing capacity of Bacillus subtilis and the effect of its addition on the compressive strength of concrete. Basic tests such as sieve analysis, determination of specific gravity, compression tests on concrete and serial dilution technique were also performed.

Experiential Investigation on the Stabilization of Expansive Soil with Lime

Authors: San San Myint

Abstract:–Subgrade is an important component in the pavement structure. The performance and durability of pavement also depends on type of subgrade soil and its engineering properties. Expansive soil is one of the major soil deposits of Myanmar. In this research, expansive soil is taken from East and West sides of Mandalay-Madayar Road. Based on Atterberg limit values and particles size analysis, the group symbol of research soil is CL according to Unified Soil Classification System (USCS). The plasticity index of research soil is about 25% and has high degree of expansion. Stabilization is needed for research soil to reduce the expensive potential. Lime increases the optimum water content for compaction, which is an advantage when dealing with wet soil and also increases the strength of clayey soil. In this study, stabilization of expansive soil has been carried out using lime. The plasticity index decreases with increase in lime content which varies from 24.66 to about 10.95 in East side and from 26.5 to about 10.64 in West side. This shows that the degree of expansion decreases to low range when increase in lime content. From the unsoaked CBR test results, the CBR values for natural soil in east and west sides are 44.5 and 20 respectively. When expansive soil treated with lime, the peak value of CBR occurs at 3% and 7% of lime in east side of soil and the CBR value decreases as increase in addition of lime in west side of soil. Therefore, the both sides of soil are suitable for sub- base material in dry condition.Keywords- –Bio concrete, bacteria, bacillus subtilise, Polymers, carbonate producing bacteria.

Augmented & Virtual Reality in Iris Recognition A Modern Approach

Authors: M.Tech.Scholar Rajat Verma, Harshita Mishra

Abstract:–Today, the humanity is living in the domain of technology. This is clearly depicted in this paper. A view to technology is illustrated in this paper. The structure of an eye is also mentioned in this paper. Augmented and Virtual Reality concepts are also mentioned in this paper. All this will certainly contribute in the research sector of biometric dimension. The recognition sector can be of any kind that includes speaker, iris etc. It is expanding at a tremendous rate and also contributing in the dimension of research.

An Innovating Methodology for Measuring The Effective Implementation of OHSMS (Occupational Health And Safety Management System) in Small and Medium Scale Industries

Authors: PG Scholar Saurabh Tiwari, Asst.Prof. Vivek Shukla

Abstract:–The small and medium scale enterprises(SME) have immense growth in the recent years due to the social and economic development of the country, but the safety aspects followed in the SME are very poor, and it becomes highly risky to the employees life, so safety aspects in SME requires huge amount of improvement. In this thesis we propose behavior of small and medium scale industry for safety management. The first target of the industries has to improve the implementation of Occupational Health and Safety Management Systems, especially for small and medium enterprises (SMEs). Safety investments are uncompetitive if compared to other investments, especially for SMEs, due to responsibility attribution management that does not guarantee the exemption of responsibility in the case of unpredictable accidents and to an insufficient incentive policy for enterprises, virtuous in safety investments. For SMEs safety investments are un-profitable also because the individual SME has no real perception of accident risks due both to difficulties in assessing and monitoring the real risk and to the small number of employees. The project has introduced an index (Efficacy Index) to objectively quantify the effective implementation of an Occupational Health and Safety Management System (OHSMS). The paper shows how the index can be practically applied to a company and what kind of information can be collected and processed to determine the effective implementation of the OHSMS. It helps to reduce the accident rate and incident rate of SMEs, highlighting the safety awareness in SMEs from the management level to the employee in order to improve the safety management in SMEs.

Automatic Alcohol Detection and Vehicle Controlling System for Prevention of Road Accidents

Authors: Sunkavalli Raviteja, Aluru Jawahar, P Harsha Vardhini, Y Thejaswi

Abstract:–Our paper proposes a new design to control the fatal road accidents caused due to the drunken drivers with the help of automatic alcohol detection and vehicle controlling unit (ADVCU). Now-a-days, most of the detection model’s senses alcohol but unable to control the vehicle automatically. Here, we developed a new design which prevents the movement of vehicle when the driver was detected with consumption of alcohol. The proposed system determines the amount of alcohol consumed by the driver and if it exceeds the permissible limit, the vehicle will be automatically stopped for stipulated time and message along with vehicle location will be sent to concerned personnel. For this purpose, we have used breath-analyser (MQ3), ATMEGA 328P microcontroller, NEO-7M GPS, SIM 800L GSM Module. The breath analyser senses the level of alcohol present in the breath of driver and acknowledges to Microcontroller. If it is beyond the limit then ATMEGA 328P will drive the signal to GSM, GPS modules and immediately bike engine will be stopped and location from the GPS module will be sent to the person concerned through text message from GSM module.

Natural Language Processing (Nlp) : A Comprehensive Study

Authors: M.Tech. Scholar Rajat Verma

Abstract:–we the people, are living in this modern era of Artificial Intelligence. This is clearly depicted in this paper. The combination of lexical, syntactic, semantic usage in the domain of social networking which is an application of NLP is also mentioned in this paper. Turing Test is also mentioned in this paper. The individual functionalities of lexical, syntactic and semantic analysis is also illustrated in this paper. These all features will clearly increase the usage of all 3 will bring a better tomorrow in the field of Natural Language Processing.

Assessment of Toxicity Index and Consequence Analysis using Aloha in Pharma Industry

Authors: M.Tech. Scholar Rahul Parmar, Asst.Prof. Vivek Shukla

Abstract:– Chemicals are highly hazardous in nature. Starting from the initial stage of manufacturing till the storage of raw chemicals is dangerous to human life. This study has been done in pharma industry where the workers are exposed to hazardous chemicals such as chlorine dioxide, hydrogen peroxide, methanol and the same. The physical and chemical properties of the chemicals are studied. The second step is Checklist analysis where the needed data are gathered which are going to be used for further steps. At next step, to select a highly hazardous chemical, Toxicity Index Calculation is used to rank the chemicals based on the data collected from checklist. After the selection of the hazardous chemical, the next step is to find out what is the next event going to happen if there is a release. For which, Event Tree Analysis (ETA) is used in this step. The next step after finding the final event from ETA is to find the how it is dispersed into atmosphere and how much distance it covered. It can be easily found out using the ALOHA Dispersion Software. The next step is human health and safety loss calculation using the distance found out by software and compensation amount gathered from law. The final step is to make the precautionary & preventive measures to avoid the toxic dispersion into atmosphere and the emergency preparedness should be prepared for what should be done during the toxic release.

Electric Wheel using Non Rotating Tri Spoke

Authors: Shoeb Muzaffar Khan, Sayyad Asef Bashir, Sayyed Sohel Mushiroddin, Vasil Bhisti, Prof.P.D.Kulkarni

Abstract:–The main motto of this review paper is to present the idea and design of electric wheel. There are many electric vehicles are present in market but the innovative thing about our project is the position of all components like motor, battery, controller, generator fixed in wheel. Traveling plays the very important role in human being .as we go forward the need of vehicle increases day by day which in turn increase the now there is need of another substitution of petrol based vehicle which should be durable, efficient, time taking for traveling should be less and also it should be economical and easily available as compared to present transportation and traveling system.

Implemented Image Processing operationsusing Python

Authors: M.Tech. Scholar Rajat Verma

Abstract:–In today’s modern world, many programming as well as scripting languages are present. Python is one of them which has made its dimension particularly clear that it will rule the scenario of computer science. Many popular websites like Google, YouTube and Yahoo all uses the scripting language python. Python is high level language which is closer to the user rather than the machine. The concepts of Object Oriented Programming is clearly mentioned in this paper. Hand Tracking, Eye tracking and face blurring is also mentioned in this paper. Edge detection in Video and image cartooning is also mentioned in this paper. Calibrating and estimating Output is also mentioned in this paper. Maze solver is also there in this paper. This all will definitely contribute to research sector in some extent.

Analysis of Risk and occupational Hazards in Foundry

Authors: M.Tech. Scholar Sailesh Choudhary, Asst.Prof.Vivek Shukla

Abstract:– Foundry business is taken into account to be a high risk space since it contains the venturous operations. manu factory operation use extraordinarily hot temperature method and enormous quantity of nephrotoxic mud and warmth square measure discharged. The processes utilized in metal casting square measure terribly uproarious. inexperienced sand manufactory manufacture endless pollutants within the surroundings – each operating and close surroundings. throughout the operations, staff might doubtless scraped and plagued by unhealthiness issues. Assessing and dominant the chance is completed in step with the aspects of activity health and safety in manufactory. HIRA study was done to spot the hazard in manufactory business. it had been found that Heat, Dust, Noise and activity square measure the main hazards. Heat stress calculation was done. it’s finished with appropriate management live to scale back major hazards found.

Perfect Semi Complete Graphs

Authors: N. Abdul Ali, M. Shajahan, S.Selvaraj, A.Dhanasekaran

Abstract:– As perfect semi- complete graphs play a vital role in tacking defense problem, a complete study of these graphs gives as overall view to apply them in our practical problems. In this paper a further study about perfect semi-complete graph is made. Path connector set, Edge path connector set, Perfect semi complete graphs are introduced and discussed.

A Study on Normality of Meromorphic Functions

Authors: M.Phil.Scholar Sreejil. K., Rajakumari. N.

Abstract:– A heuristic principle attributed to Andr´e Bloch and P. Montel says that a family of holomorphic functions is likely to be normal if there is no nonconstant entire function with this property. We discuss this principle and survey recent results that have been obtained in connection with it. We pay special attention to properties related to exceptional values of derivatives and the existence of fixed points and periodic points, but we also discuss some other instances of the principle.

Topological Groups and Different Types of Measures

Authors: M.Phil.Scholar Suma Joseph, Dr.B.SenthilKumar

Abstract:– Applying Haar’s Measure theory to probability theory to understand and generalize the uniqueness of invariant measure in the situation of risk and uncertainty. If T is finite topological group and X be subgroup of T then µ(X)|µ(T).

A Study on Unique Factorization an Integral Domain

Authors: M.Phil.Scholar Suja Joseph, Dr.B.Senthilkumar

Abstract:– We take a broad view the notion of “unique factorization domain” in the spirit of “half-factorial domain”. We show that new generalization of UFD implies the now well known notion of half factorial domain. As a consequence, we discover that the one of the normal axioms for unique factorization domains is union scientiouslyred undant.That is, we interested in factoring numbers in integral domains so we have to scrutinize distribution, and so this post will begin with a fairly cursory look at the properties of distribution. Then we will introduce the crucial ideas of units and associates. (In the integers, ±1 are units and ±n, for any fixed n, are associates).

A Study on Distance Pattern of Vertices in a Graph

Authors:M.Phil.Scholar Jeffy Johnson, B. Amutha

Abstract:– This paper discuss about the distance pattern of vertices in a graph. The distance between two vertices is the basis of the definition of this graph parameter. There are several distance related concepts and parameters. We also present several fundamental results on open distance pattern uniform graphs and open distance pattern uniform number of a graph.

A Survey on Robust Image Watermarking Techniques and Different Applications

Authors: M.Tech. Scholar Kanchan Sahu, Asst.Prof. Pravin Malviya

Abstract:– Image Watermarking is used for copyright protection, authentication and ownership of the intellectual property. Visual cryptography is technique in which secret data is decomposed into number of shares and distributed to participants, So that only participants can read that data. Image Visual Cryptography is used to keep the data private from unauthorized users. Here detail survey of different image watermarking techniques used by various researcher are detailed. Various properties of the image data hiding was explained.

Fuzzy Based Electric Springs for Distributed Voltage Control
Authors: Asst.Prof.V.Sunil Kumar Reddy, M.Tech.Scholar E.Subramanyam

Abstract:– Electric spring which was developed recently has become the effective means of enhancing the load voltage regulation and stability of the system. This paper deals about the use of electric spring for distributed voltage control. The basic idea behind this is to maintain the constant voltage across the critical (C) loads by varying the power consumption of non-critical (NC) loads with the help of electric springs. A comparison is made between distributed voltage control using electric spring and general single point STATCOM control in terms of reactive power handling capability noncritical load voltage variation.A low-voltage single-phase power system with different types of loads has been built for the realization of electric springs. Simulation results show the effectiveness of electric springs in maintaining good voltage regulation and lead to demand side response.

Study of user’s behaviour in Structured E-Commerce Websites
Authors: M.Tech.Scholar B. Thejaswini, Asst.Prof.Reddi Durga Sree, Karamala Suresh

Abstract:– Online shopping is becoming more and more common in our daily lives. Understanding users’ interests and behavior is essential in order to adapt e-commerce websites to customers’ requirements. The information about users’ behavior is stored in the web server logs. Nowadays, the growth of World Wide Web has exceeded a lot with more expectations. The internet is growing day by day, so online users are also rising. The interesting information for knowledge of extracting from such huge data demands for new logic and the new method. Every user spends their most of the time on the internet and their behaviour is different from one and another. Web usage mining is the category of web mining that helps in automatically discovering user access pattern. Web usage mining is leading research area in Web Mining concerned about the web user’s behaviour. In this paper emphasizes is given on the user behaviours using web server log file prediction using web server log record, click streams record and user information. Users using web pages, frequently visited hyperlinks, frequently accessed web pages, links are stored in web server log files. A Web log along with the individuality of the user captures their browsing behaviour on a website and discussing regarding the behavior from analysis of different algorithms and different methods.

A Study on Normality of Meromorphic Functions and Discrete Exceptional Sets
Authors: M.Phil.Scholar Sreejil. K., Rajakumari. N.

Abstract:–We consider a class of Normality of meromorphic functions, denoted by K in this paper, which are meromorphic outside a compact and countable set Q (f), investigated by P. Bolschin his thesis in 1997. The set Q (f) is the finish of isolated indispensable singularities. We review main definitions and properties of the Fatou and Julia sets of functions in class K. It is studied the role of Q (f) in this context. Following Eremenko it is defined escaping sets and we prove some results related to them. For instance, the dynamics of a function is extended to its singularities using escaping hairs. We give an example of an escaping hair with a wandering singular end point, where the hair is contained in a wandering domain of f ∈ K.

Analysis of Performance Metric of FinFet Based SRAM Cell
Authors: M.Tech.Scholar Meenakshi, Raghwandra Singh

Abstract:– For molecules to be used as components in molecular machines, methods that couple individual molecules to external energy sources and that selectively excite motion in a given direction are required. Significant progress has been made in the construction of molecular motors powered by light and by chemical reactions, but electrically driven motors have not yet been built, despite several theoretical proposals for such motors. Here we report that a butyl methyl supplied molecule adsorbed on a copper surface can be operated as a single-molecule electric motor. Electrons from a scanning tunneling microscope are used to drive the directional motion of the molecule in a two-terminal setup. Moreover, the temperature and electron flux can be adjusted to allow each rotational event to be monitored at the molecular scale in real time. The direction and rate of the rotation are related to the chiralities of both the molecule and the tip of the microscope (which serves as the electrode), illustrating the importance of the symmetry of the metal contacts in atomic-scale electrical devices.

Health Risk Assessment of Heavy Metals in Water Samples from Hand Dug Wells in isoko Local Government Areas, Delta State, Nigeria
Authors: K. Emumejaye , Solomon U. Edogho

Abstract:– Water is of major importance and is intensively exploited for domestic and industrial uses. Some hand dug wells in Isoko South and North local government areas of Delta State were analyzed for heavy metals using the Atomic Absorption Spectrophotometer (AA320N). For the samples analyzed, Iron, zinc, nickel, chromium and lead concentration range were 0.001 – 0.743mg/l, 0.001 – 0.105mg/l, 0.001 – 0.050mg/l, 0.001 – 0.062 and 0.001 – 0.053mg/l respectively. All water samples were within the WHO and SON permissible limits and fit for drinking with the exception of few wells. Also, the estimated health quotient for Fe, Zn, Ni, Cr, and Pb were less than the safety threshold of 1 except Fe in sample from well2 in Oleh that is 3. Although, these values are relatively low, exposure through the regular consumption of well water in the study area over a long period of time may pose potential health issues to the population. It is recommended that relevant authorities should help to enlighten the people on the necessity for treatment of the water before they can be used for drinking and domestic purposes.

Optimization of a LED Heat Sink using Multi Objective Genetic Algorithm and Computational Fluid Dynamics
Authors: M.Tech.Scholar Suresh Babu, Manjunatha A, Dr.M.Shivashankar, Vijay Kumar Mishra

Abstract:– Light Emitting Diode (LED) devices generate excessive heat during its operation, dissipation of this heat to surroundings is essential for efficient operation of LED unit. Excess of heat from LED unit is dissipated by Heatsink (fins). The volume of the Heatsink should also be as minimum as possible to suit the compact design structure of modern electronic component. In order to obtain the optimal structure size of Heatsink, multiple geometric design parameters that influence the performance of Heatsink are analysed by combining the evolutionary algorithm with computational fluid dynamics. The influences of the geometric variables on the two objective functions are first analysed by commercial code CRADLE scSTREAM through the various samples of design parameters generated by the design of experiments with the help of commercial optimization code EOopti. Using the surrogate model and Multi-Objective Genetic Algorithm (MOGA) the Pareto-optimal solutions are generated. The competitive relationship between the objective functions is depicted in the Pareto front. The values of objective functions obtained from the Pareto front are validated with numerical analysis. The results obtained are within 5% of numerical error. The Pareto solution of objective function values, LED temperature of 65.2474ᵒ C and Heatsink volume of 4.53492 x 10-5 m3 is found to be better solution to the application among the Pareto solutions, which has better trade-off relationship with both the objectives.

Analysis of Customer’s behavior in E-commerce website
Authors: M.Tech.Scholar M. Bhavana, Asst.Prof. T.Venkatarammana, K. Suresh

Abstract:– Online shopping is becoming more and more common in our daily lives. Understanding users’ interests and behaviour is important in order to adapt e-commerce websites to customers’ requirements. The information about customers’ behaviour is stored in the web server logs. The analysis of such information has focused on applying data mining techniques where a rather static characterization is used to model users’ behaviour and the sequence of the actions performed by them is not usually considered. Therefore, incorporating a view of the process followed by users during a session can be of great interest to identify more complex behavioural patterns. To address this problem, this paper proposes a linear-temporal logic model checking approach for the analysis of structured e-commerce web logs. By defining a common way of mapping log records according to the e-commerce structure, web logs can be easily converted into event logs where the behaviour of users is captured. Then, different predefined queries can be performed to identify different behavioural patterns that consider the different actions performed by a user during a session. Finally, the usefulness of the proposed approach has been studied by applying it to a real case study of e-commerce website. The results have identified interesting findings that have made possible to propose some improvements in the website design with the aim of increasing its efficiency.

Test Suite Minimization and Parallel Scheduling
Authors:M.Tech.Scholar Shammi, Asst.Prof.Nitin Bansal

Abstract:– Testing is a vital but luxurious task vital for the assembly of elevated quality software. As such, there is outstanding possible for each useful method that enables the detection of extra faults alongside manipulated software assessing funds. One assessing strategy is to orient the assessing regimen concerning concrete, attainable criteria. Regression assessing is one of the vital maintenance hobbies, but it needs a outstanding deal of period and effort. Often, software firms have pressures alongside period and budget, so luxurious and time-consuming regression assessing might be a main burden for them. To vanquish these design and cost-related concerns alongside regression assessing, countless researchers have counseled assorted price competent regression assessing methods in particular, examination case prioritization methods have been actively learned because they furnish appealing benefits, such as flexibility for testers who demand to adjust their assessing efforts for the manipulated period and budget. The Counseled Examination case Minimization methods endeavor to design examination cases in an killing order according to given criterion. The main intention of this Minimization is to rise the likelihood that if the examination cases are utilized for regression assessing in the given order, they will extra closely encounter the goal than they should if they were gave in a little supplementary order.

Disruptive Analysis of opportunities for block chain and Distributed Ledgers in Telecom Industry
Authors: Deepanshu Rathi, Sushant Kumar, Suraj Singhal, Shivjeet

Abstract:– Block chain technology has huge opportunities in many industries and contexts. To a large degree, its trajectory will be driven by sectors like Financial services, international shipping and healthcare. But that will bring along telecoms with it – and there are also numerous signs of “grassroots” effort by the communications industry, especially when linked to new areas such as IoT.This fragmentation of effort also means that multiple vendors, integrators and block chain platforms (private, but also potentially public block chains) are likely to be relevant.

Assessment of Heavy Metal Concentration in Surface Water in Evwreni Town, Delta State
Authors: B.T.Sawere , K. Emumejaye

Abstract:– This study was designed to determine the concentration of heavy metals in samples of surface water collected randomly from within and around Evwreni Town, Delta state. Ten samples of the surface water were collected and taken to the laboratory for physicochemical properties analysis. The pH value ranged between 6.0 to 6.5. the Conductivity, between 106 to 217µs/cm, TDS was 61.3 to 87.9 and TH ranged between 84.1 to 143. The heavy metal concentration were as follows: Pb ranged from 0.001 to 0.005,Cu from 0.3 to 0.5, Fe from 0.4 to 0.9, Zn 0.2 to 0.6, Cr5 0.01 to 0.05 Co. from BDL to 0.04 and Ni from 0.01 to 0.04. All the concentration values for the heavy metals were lower than the set maximum acceptable concentration by WHO.

An Improve Revocation Mechanism Using Public-Key Concept with Validation for Delay Tolerant Networks (DTN)
Authors: M.Tech.Scholar Ritika Ujjainiya, Khandelwal

Abstract:– Delay –disruption Tolerant networks are sparse wireless network which is recently being used by the existing /current network for the purpose to connect devices or the underdeveloped area of the world that works in challenging environment. Network security protocol is always required in any of the secure area, such as military. Delay-disruption Tolerant networks are sparse wireless network which is recently being used by the existing /current network for the purpose to connect devices or the underdeveloped area of the world that works in challenging environment. Network security protocol is always required in any of the secure area, such as military. In DTN there majority of time does not exist the total path from resource to target which is leads to the difficulty of how to route the packet in such environment. Routing in such network is very difficult and for that different routing protocols are developed. In this work we discuss about various routing Strategy. DTN requires mechanism to authenticate messages at each node before forwarding it in the network. So, certificate revocation lists (CRLs) being distributed in DTN network will need to be authenticated and validated for issuer certificate authority (CA) at each node. In this study we work on CRL and update public-key collision in hash table is replaced by secure hash function algorithm SH2 with proper validation by CA. and improve network packet delivery ratio, average latency and throughput. For implementation we use the one simulator.

A Survey on Privacy Preserving Mining Features and Techniques
Authors: M.Tech.Scholar Deepa Agrawal, Asst.Prof. Jayshree Boaddh

Abstract:– The daily use of the word privacy concerning secure data sharing and analysis is commonly imprecise and should be dishonest. The branch of study that embody these privacy considerations are referred as Privacy Preserving Data Mining (PPDM). So these papers focus on this problem of increasing the robustness of the data. Here various approaches adopt by researchers are detailed with their field of security. Some of issue related to the papers is also discussed. Various approaches of association rule mining are explained for finding the or hiding the hidden information as.

A Study on Satisfaction level of Recruitment Training and Development programmes practiced among faculty members with special reference to T.john group of institutions, Bangalore
Authors: Saniya Bahar, Associate Professor Dr.Soniya K

Abstract:– The present study investigates that the Recruitment, Training and Development and its impact towards Job Satisfaction with special reference to T John Group of Institutions, Bangalore. The Recruitment, Training and Development are the elements of Human Resource Management which is predominantly worried about individuals at work and with their relationship inside the association. Enrollment is the way toward drawing in people on an auspicious premise, in adequate numbers and with fitting capabilities. Occupation fulfillment might be characterized as a pleasurable positive enthusiastic state coming about because of the evaluation of one’s activity or employment encounters. It is in this manner vital to have a decent comprehension of a person’s aggregate identity and esteem framework so as to comprehend and portray his/her activity fulfillment. The Training and Development programs insufficiencies in representatives. Preparing makes the representatives flexible. Preparing is the nerve that does the trick the nerve of familiar and smooth working of work which helps in improving the nature of work life of representatives and hierarchical improvement as well. Improvement is a procedure that prompts subjective and additionally quantitative headways in the association, particularly at the administrative level; it is less worried about physical aptitudes and is more worried about information, qualities, mentalities, and conduct notwithstanding particular abilities. Thus, improvement can be said as a ceaseless procedure while preparing has particular regions and goals. Along these lines, each association needs to examine the part, significance and focal points of Recruitment, Training and its positive effect on Development for the development of the association.Preparing suggests valuable advancement in the hierarchical intentions in ideal improvement of nature of work life of the representatives. These sorts of preparing and advancement programs help in enhancing the workers conduct and disposition towards the activity and furthermore inspire their resolve. Thus, the recruitment procedures practiced in the organization and the behaviour and attitude of the HR executive towards the applicants, the training and development programmes of the selected applicants/employees are important aspects which are needed to be studied and focused on from the organizational perspective. This paper focuses and analyses the literature findings on the job satisfaction of the faculties based on the HR Department’s contact with them, the satisfaction level of attending the different training programmes held at T. John Group and the participation and its impact on the faculties for various development programmes.

Internet of Things (IoT) Challenges and Applications
Authors: Asst.Prof.Rohit Tiwari, Asst. Prof. Monika Kohli

Abstract:– The Internet can be taken as a prodigious amalgamation of the powers of a system having Hardware and Software, as they say, you may like it or dislike it, but you cannot ignore the Internet. The Internet is said to be one of the most remarkable inventions of its time and it is the most used form of intercommunication, be it person to person or person to the machine. But there is one more form of intercommunication, getting popular nowadays, is Machine to Machine, wherein machines at both sides are not explicitly supervised by a person at that very time. The Internet of Things (IoT) is behind the evolution of this very form of intercommunication and also works as the backbone technology for the same. This research paper is an effort by the researchers to put some light on some of the most fundamental aspects of this phenomenal technology known in the world of technology, as the Internet of Things (IoT).

A Study on Topological Groups and Haar Measures
Authors: M.Phil.Scholar Suma Joseph, Dr.B.Senthil kumar

Abstract:– Compact right topological groups arise in topological dynamics and in other settings. Following H. Furstenberg’s seminal work on distal flows, R. Ellis and I. Namioka have shown that the compact right topological groups of dynamical type always admit a probability measure invariant under the continuous left translations; however, this invariance property is insufficient to identify a unique probability measure (in contrast to the case of compact topological groups). We amplify on the confirmations of Ellis and Namioka to show that a right invariant probability measure on the compact right topological group G exists provided G admits an appropriate system of normal Subgroups, that it is uniquely determined and that it is also invariant under the continuous left translations. Using Namioka’s work, we show that G has such a system of subgroups if topological centre contains a countable dense subset, or if it is a closed subgroup of such a group.

Investigation of the Bike Wheel Rims With Modified loop Wheel Reinvents
Authors: M.E.Scholar Shweta R. Chandure, Dr. S. M. Kherde

Abstract:– In today’s world, Bicycles are the most favorite choice when it comes to causes like health, pollution, and environment. Several researches have been done in order to make the ride comfortable. Distinctive sorts of cycles have been produced for different applications like Commuter Bikes, Mountain Bike, and Racing bicycle. This undertaking report introduces the Loop wheel which is outlined to such an extent that the suspension framework is coordinated inside wheel for higher stun engrossing execution and better comfort. Loop wheels offer you a smoother ride. Circle wheel springs are generally comprised of a steel material precisely created to offer ideal pressure and horizontal soundness and quality and strength. The three circles in each wheel work along as a self-amending framework. This spring framework between the center point and the edge of the wheel gives suspension that constantly acclimates to uneven landscape padding the rider from anomalies in the street wheel. The spring design allows the torque to be exchanged easily between the center point and the edge. In this project report loop wheel manufactured using C20 steel material and the analysis is done on ANSYS Workbench R15 to determine the stress developed during forces acting on wheel, maximum deflection, principle stresses.

Development of an Efficient and Secure Image Transposal Algorithm Using 16 *16
Quantization Table

Authors: Vijay Bhandari, Dr.Sitendra Tamarkar, Dr. Piyush Shukla

Abstract:– In later a long time, different mystery sharing plans for computerized pictures have been created in arrange to advance communication security. Past strategies in the writing have made endeavours efforts endeavours to accomplish the merits properties for a great mystery picture transposing such as execute (k,n) limit, basic recuperation, no pixel development, the produced covert image are important, the arrange of pictures is elective and lossless recuperation of the mystery image. To the leading of our information, no past mystery sharing scheme accomplishes all the over properties with great quality of important pictures. In this paper, we proposed puzzle image montages based on data stowing away hypothesis to make stride the quality of important pictures with lower computation and great expansibility.In the light of, the proposed plans have the important points of lossless and elective arrange recuperation and no pixel development expansion extension development.This is observing with past advance appear the execution of the planned conspires. The calculations displayed permit distinctive aligned of protection for the data covered up in the covering-documen.

An Online Based Question and answer system in Cloud Environment
Authors: M.Tech.Scholar P. Thilothama, Asst.Prof. K. Suresh

Abstract:– Question and Answer (Q&A) systems play a fundamental role in our daily life for information and knowledge sharing. Users post questions and choose questions to answer in the system. Due to the rapidly growing user population and the number of questions, it is not likely for a user to stumble upon a question by chance that they can answer. Also, humanity does not encourage all users to provide answers, not to mention high quality answers with a short answer. The major objective of this manuscript is to develop the performance of Q&A systems by dynamically forwarding questions to users who are proficient and willing to answer the questions.Social Q&A leverages the social network properties of common-interest and mutual-trust relationship to identify a reader through friendship, who are more likely to answer the question, and enhance the user security. We also improve Social Q&A with safety measures and efficiency enhancements by protecting user privacy and identifies, and retrieving answers automatically for recurring questions. We describe the architecture and algorithms, and conducted complete large-scale simulation to evaluate Social Q&A in comparison with other methods. Our results suggest that social networks can be leveraged to improve the answer quality and reader’s waiting time. We also designed a real web application of Social Q&A, and analyze the Q&A behavior of real users and questions from Social Q&A system.

A Survey on Image Retrieval Approaches with Features Utilization
Authors: M..Tech.Scholar Shalinee Jain, Asst.Prof. Ravi Gedam

Abstract:– Image search refers to finding the precise images related to the user inquiry. Image re-ranking is an efficient way for web-based image search. In image re-ranking, users' intention is captured by one-click on the query image. This assists in providing better search results to the users. This paper presents survey of various techniques which are used for image identification was utilized uptil now is condensed with benefits and drawbacks of these prior proposed work. Here various visual image features are also explained for relevant image detection. Firstly it introduces the object queries which
gives result images specific to some kinds of objects and retrieval models.

A Review Transformer soft Computing Ann, Svm and Genetic Algorithem
Authors: M.Tech.Scholar Sanjay Varfa, Prof.Khushboo Nagar

Abstract:– Transformer soft computing has a very important in the power system such as energy consumption demand Soft computing (ECDF) and peak Transformer Soft computing (PLF). It is a useful tool for a unit commitment and fuel reserve planning in power system. The Transformer demand is depended many variables like industrial index, consumer price index, fuel price, salary index, money exchange, temperature, humidity, and wind speed. Transformer forecast can be classified into four differential types. Very short term Transformer soft computing have period time in a minute, it is importance for real time operation. Short-term Transformer soft computing have period time in a minute to three months, it is importance for unit commitment and operation. Mid-term Transformer soft computing have period time in three months to three years, it is importance for fuel reserve planning and unit commitment. Finally, Long- term Transformer Soft computing have period time in three years to not over fifteen years, it is importance for generation and power plant planning. In this research will offer the energy consumption demand forecasts. It is a very important for fuel reserve planning and unit commitment in power system.

Privacy Protection and Intrusion Avoidance for Patient Medical Data Sharing in Cloud Computing
Authors:M.Tech.Scholar B.Siva Kumar Reddy, Asst.Prof.K. Suresh, Asst.Prof.K. Suresh

Abstract:– With the popularity of smart electronic devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing chain of medical data mainly includes data collection, data storage and data sharing, etc. Traditional healthcare system often requires the delivery of medical data to the cloud, which involves users’ sensitive information and causes communication energy consumption. Practically, medical data sharing is a critical and challenging issue. Along these lines in this paper, we develop a novel human services framework by using the adaptability of cloudlet. The elements of cloudlet incorporate security assurance, information sharing and interruption location. In the phase of information accumulation, we initially use Number Theory Research Unit (NTRU) technique to scramble client’s body information gathered by wearable gadgets. Those information will be transmitted to close-by cloudlet in a vitality productive form. Also, we introduce another trust model to assist clients with selecting trustable accomplices who need to share put away information in the cloudlet. The trust demonstrate additionally causes comparable patients to speak with each other about their illnesses. Thirdly, we partition clients’ therapeutic information put away in remote billow of healing facility into three sections, and give them appropriate insurance. At long last, keeping in mind the end goal to shield the medicinal services framework from malignant assaults, we build up a novel cooperative interruption discovery framework (IDS) strategy in view of cloudlet work, which can viably keep the remote social insurance huge information cloud from assaults. Our examinations show the viability of the proposed conspire.

Evaluation of Hazards by Event Tree Analysis and Assessment of Toxicity Index using Aloha In Pharma Industry
Authors: M.Tech.Scholar Rahul Parmar , Asst.Prof.Vivek Shukla

Abstract:– Chemicals are highly hazardous in nature. Starting from the initial stage of manufacturing till the storage of raw chemicals is dangerous to human life. This study has been done in pharma industry where the workers are exposed to hazardous chemicals such as chlorine dioxide, hydrogen peroxide, methanol and the same. The physical and chemical properties of the chemicals are studied. The second step is Checklist analysis where the needed data are gathered which are going to be used for further steps. At next step, to select a highly hazardous chemical, Toxicity Index Calculation is used to rank the chemicals based on the data collected from checklist. After the selection of the hazardous chemical, the next step is to find out what is the next event going to happen if there is a release. For which, Event Tree Analysis (ETA) is used in this step. The next step after finding the final event from ETA is to find the how it is dispersed into atmosphere and how much distance it covered. It can be easily found out using the ALOHA Dispersion Software. The next step is human health and safety loss calculation using the distance found out by software and compensation amount gathered from law. The final step is to make the precautionary & preventive measures to avoid the toxic dispersion into atmosphere and the emergency preparedness should be prepared for what should be done during the toxic release.

A Review Article of FPGA ALU Unit Design Based on GA
Authors: M.Tech.Scholar Sakshi Samaiya, Asst. Prof. Anupreksha Jain

Abstract:–The paper primarily deals with review for the construction of arithmetic Logic Unit (ALU) using Hardware Description Language (HDL) using Xilinx Vivado 14.7 and implement them on Field Programmable Gate Arrays (FPGAs) to analyze the design parameters. ALU of digital computers is an aspect of logic design with the objective of developing appropriate algorithms in order to achieve an efficient utilization of the available hardware. Speed, power and utilization of ALU are the measures of the efficiency of an algorithm. In this paper, we have simulated and synthesized the various parameters of ALUs by using VHDL on Xilinx Vivado 14.7 and Basys 3 Artix 7 FPGA board.

Distance Based Accident Avoidance System Using Arduino
Authors: M.Tech.Scholar Shraddha Boshat, Asst. Prof. K. Priyanka Sahu, Asst. Prof. Shubham Yadav

Abstract:–In this paper, we present another system in car innovation about how to forestall street mishap on India in these we keep 10 meter remove between one vehicle and another vehicle, with the goal that the vehicle don’t crash or cause any activity issue. The point of the framework is to avert mischances mostly because of not knowing the accompanying separation (i.e., 5m) between one vehicle and another vehicle. The proposed framework contains a thought of having security while turning around a vehicle, recognizes any question inside the accompanying separation, and presentations the separation between one vehicle and another vehicle to the driver utilizing LCD. We have utilized ultrasonic sensors to distinguish any vehicle on both front and posterior of our vehicle. This framework is additionally utilized as a part of vast crane which is principally worked in harbor zone. On the off chance that the auto achieves 10 meter, green shading light will gleam. At 8 meter separate yellow shading light will shine. When it achieves 5 meter remove red shading light will gleam. The separation is likewise demonstrated to the vehicle driver. By this proposed framework the security is kept up on swarmed zones and in vehicle turning around process.

A Review Article of Instrumental Amplifier 16 Bit Pipelining ADC
Authors: M.Tech.Scholar Meenu Jain, Asst. Prof. Anupreksha Jain

Abstract:–Analog to digital converter is the important component in signal processing and communication system. It is a mixed system which converts the analog signals into the digital signals for transformation of sensor data. There are many types of ADC’s available such as pipeline ADC, successive approximation ADC, delta sigma ADC etc. In present day CMOS technology the flash ADC is composed by utilizing the dynamic method, it reduces the power, and delay. A flash ADC is extremely valuable for fastest speed operations when it is compared with the other ADC architectures. Comparator and Encoder are vital part of flash ADC. This paper presents review of Efficient Low Power High Speed Flash ADC Techniques.

Measure the Dynamics of Malaria Transmission Using Entomological Approaches at Natitingou, Northern-East of Benin
Authors: Yadouleton Anges, Aïkpon Rock, Klotoe-Jean Robert, Agbanrin Ramziyath, Tchibozo Carine, Ahissou Fabrice, Houndeton Geraldo, Agolinou Achaz, Kpodo Edwige, Kpodjedo Jeanne, Akogbeto Martin

Abstract:–To evaluate the level of malaria transmission at Natitingou Northern-East of Benin, a cross sectional entomological study was carried out from April 2016 to March 2017 in urban and rural areas of this city. Adult mosquitoes were collected in both areas by Human Landing Catch and Indoor Pyrethrum Spray Catches (PSC). Entomological parameters like the human biting rate (HBR ; the number of mosquitoes biting a person during a given time period (bites/p/t, time being night, month or year); the Circunsporizoite protein (CSP) rate (CSP; the proportion of mosquitoes found with Plasmodium falciparum CSP over the total number of mosquitoes tested and the Entomological Inoculation Rate (EIR; the number of infective bites of anopheline per person per unit of time (bi/p/t) and calculated as the product of the HBR by the CSP rate) were evaluated in the city. A total of 21,018 mosquitoes were collected between April 2016 and March 2017. Culex Spp was the dominant and represented 82.08%. Anopheles spp which contributed to malaria transmission represented 17.09%. The remaining (0.8%) were Aedes spp and Mansonia spp populations. Moreover, the highest bites of An. gambiae s.l. during the rainy season was found in August at urban (33.75bites/p/n) and rural (25.83 bites/p/n) but, there is no significant different between the average HBR of An. gambiae s.l. in urban area (11.41 bites/p/n) and in the rural area (8.21 bites/p/n) (P>0.05). Transmission was high during the rainy season (June to November) and low during the dry season (December to May) and was vehicled by An. gambiae Colluzzi (65%). and An. arabiensis (35%). The EIRs were significantly higher in the dry season in urban area (0.125bi/p/n) than in rural area (0.021 bi/p/n) (P < 0.05). However, during the rainy season, there was no significant difference between the EIRs from urban and rural areas (P > 0.05). These findings showed that malaria is permanent at Natitingou both in urban and in rural area and was vehicle by An. Coluzzi and An. Arabiensis. These results will be useful to implement a strategy against malaria in this city.

A Review Article of Various old Methods to Improve Thermal Plant Efficiency
Authors: M. Tech. Scholar Indrajit Patidar, Asst. Prof. Nilesh Sharma

Abstract:–This research paper analyses the operational parameters of a thermal power plant to improve effectively& efficient running of the machine while ensuring a degree of compliance with statutory regulations. This study aims to identify the operational gaps associated with running operational parameter in power plant process. It is focused to detect a different thermodynamic variable involved, being multivariate and automatic. For variation of each one of this operational parameters, performance calculations are find out to configure a database of energy variation. The variable data sets now can be used as assessment criteria based on detecting deviations from a reference system that has been updated during plant-performance tests. Although the most important outcome is the highly precise and valuable information that will be obtained on the live operating mode, leading to a head improvements in the cycle efficiency and achieved in the overall control system of the thermal plant. The main aim is to detect any abnormality, reacting as quickly as possible to return the plant to a normal operation mode at best efficient manner.

Factorization in Integral Domains
Authors: M. Phil Research Scholar Suja Joseph, Dr. B. Senthil kumar

Abstract:The M-evaluated spaces R = M Rm, which are nearly Schreier are classified under the suspicion that the fundamental conclusion R of R is a root augmentation of R, where M is a without torsion, commutative, cancellative monoid. For the situation that D[M] is a commutative monoid area it is demonstrated that if M funnel shaped and D[M] ⊆ D[M] is a root augmentation, at that point D[M] is nearly Schreier if and just if M and √D are nearly Schreier. On the off chance that R = Æ[nx] is a request in a quadratic augmentation field $( d) of $, it is demonstrated that the conditions; R[X] is IDPF; R[X] is inside factorial; R[X] is nearly Schreier; R[X] ⊆ R[X] is a root expansion; and each prime divisor of n likewise partitions the discriminant of the augmentation K/$; are equal conditions.

A Comparative Chemical Analysis of Phyto-chemicals Content of Green Cabbage and Red Cabbage
Authors: Nida Tanveer, Gulrez Nizami, Mohammad Azam, Mohammad Arshad, Sheela, Farman Ali, Shifa Rehman Merajuddin

Abstract:–Cabbage is very grandly essential vegetables in the whole world. It becomes into the Brassicaceae family. In this investigation of phytochemical, comparative study of red cabbage and green cabbage were carried out. Some phytochemical were present in both red cabbage and green cabbage while some phytochemical were absent. The phytochemical analysis of red cabbage powder extracts indicated with exist certain phytochemical compound. Some phytochemical in powder extracts such as saponin, tannin, flavonoids, glycosides, and alkaloid were present in a large amount and phytosterols found in only methanol extract. In the analysis of red cabbage juice tannin, phytosterols, flavonoids, and alkaloid were present in each extract of red cabbage juice but the glycoside was present in methanol extract and saponin was found in methanol extract and water extract. The phytochemical detection of green cabbage powder and juice extracts confirmed that the phytochemical is found in a small amount. The phytochemical analysis of green cabbage and red cabbage powder or juice founded that the Phytochemicals were present a small amount in green cabbage as compared with red cabbage. The phytochemical analysis of green cabbage juice and water revealed that the phytochemicals were present in a small amount as compared with red cabbage.

A Study on Only Kind of Real Number an Integral Domain
Authors: M. Phil Research Scholar Suja Joseph, Dr. B. Senthil kumar

Abstract:We take a broad view the notion of “unique factorization domain” in the spirit of “half-factorial domain”. We show that new generalization of UFD implies the now well known notion of half factorial domain. As a consequence, we discover that the one of the normal axioms for unique factorization domains is unconscientiously redundant. That is, we interested in factoring numbers in integral domains so we have to scrutinize distribution, and so this post will begin with a fairly cursory look at the properties of distribution. At that moment we willpower bring in the crucial ideas of units and acquaintances. In the Real number, 1 are units and n, for any fixed n, are associates.

Centrally Suspended Cage-less Differential Gearbox
Authors: Jay Ghodke, Mihir Gajendragadkar, Deepesh Dubey, Ishwari Dighe

Abstract:In the 21st century, the technological advancements are at its peak. Considering the automobile industry, vehicles with better performance parameters are at our disposal compared to the former vehicles and their technologies. The centrally suspended cage-less differential gearbox is one such innovation which aids the performance of the vehicles like improved cornering efficiency, reduced weight, equal torque distribution and elimination of uneven centre of gravity compared to the conventional differential gearbox. In this study the theoretical designs of the gearbox were obtained using standard design formula. The CAD models were designed on CATIA V5. The models were analysed using ANSYS workbench. After obtaining satisfactory results, manufacturing of the gearbox assembly was carried out.

Published by:

International Journal of Mechanical Sciences, Journal of Engineering and Applied Sciences


Submit Your Paper  / Check Publication Charges

This journal provide Provide High impact factor for the publish papers as reach of this journal is good. Here researcher not only publish paper but also used papers of this journal for there references. So its an international journal of mechanical sciences where students / scholars from Mechanical branch include thermal, automobile, material science etc. This IJSRET journal accept paper from other branch  also so its an journal of engineering and applied sciences as well. As number of researcher submit and publish paper in these field of mechanical sciences and engineering.


So we call all researchers / students to find and submit there research work of mechanical sciences of engineering and applied sciences to come on IJSRET for following reasons:

  • We provide fast publication process.
  • Live support in paper submitting by chat / emails.
  • Instant payment option through our website from various sources of national and International researchers.
  • Quick response for each submitted paper by forwarding to respected reviewer.
  • Provide proper guideline for improving the quality of the paper as well.
  • Do paper formatting at journal end only.

So we call people who are looking for

International Journal of Mechanical Sciences, Journal of Engineering and Applied Sciences to come and publish papers.

Published by: