Volume-5, Issue-6

November-December, 2019

Research Paper

1. Overview of rural marketing in India

Rural Marketing decides the doing of business exercises acquiring the progression of merchandise from urban divisions to the rustic locales of the nation just as the promoting of different items fabricated by the non-rural laborers from country to urban zones. A number of techniques like item, value, advancement, dissemination, showcasing and deals systems can assist different associations with capturing an enormous piece of the overall industry of country India. In any case, it isn't that simple to work in the provincial market as a result of a few issues, for example, immature individuals and immature markets, Inadequate Media inclusion for country correspondence, Multi-language and Dialects, Traditional Values, Lack of legitimate physical correspondence offices. Be that as it may, each issue has its answer. Along these lines, the issues of country promoting can be explained by improving framework, transportation, correspondence, warehousing, and pressing offices.

Published by: Aashka KakkaResearch Area: Marketing

Organisation: Indian School of Management and Entrepreneurship, Mumbai, MaharashtraKeywords: Marketing innovation, Rural area, Urban area

Research Paper

2. Growth of SHG-Bank linkage program in India [comparative study-region wise]

This paper examines the growth of the SHG-bank linkage program in India and also does a comparative study – region-wise based on the three major variables – savings, credit disbursed and loan outstanding by the SHGs which are further classified as total savings of SHG, average savings per SHG, total credit received by SHG, average credit received per SHG, total loan outstanding and loan outstanding per SHG. The data that has been used during this research is purely secondary data (NABARD’s annual report on the status of microfinance in India). The time period chosen is 5 years i.e. 2013-14 to 2017-18 and the six regions that are compared are the Southern region, Northern region, Western region, Eastern region, Central region and Northeastern region. The methods that have been used for the success of this research are - Pearson’s correlation and the regression Model. To draw interpretations, various charts and graphs for better and easy comparisons were also used. The findings of this research were that the SBL program was on an increase every year and then reach out to the Southern region was significantly very high and that of the North-Eastern region was very low. It was also found that there is an impact of savings per SHG on the credit received per SHG and there is an impact of savings on the loan outstanding per SHG as well but there is no significant impact of average credit received per SHG on average loan outstanding per SHG.

Published by: Prachi BhansaliResearch Area: Microfinance

Organisation: Christ (deemed to be) University, Bangalore, KarnatakaKeywords: SHG-bank linkage program, Microfinance, Savings by SHG, Credit disbursed by SHG, Loan outstanding by SHG

Research Paper

3. Openloop simulation of medium frequency induction melting furnace with 12 pulse rectifier and H-bridge inverter

The combination of 12-pulse Δ-Δ / ⅄ connected fully controlled rectifier and H-bridge inverter arrangement is fed the coreless medium frequency induction melting furnace. The current waveform is distorted because of the various characteristic current harmonics introduced in the source side due to non-linear IMF load on the power system.

Published by: Amitkumar Jivanbhai Patel, Gaurangkumar C. PatelResearch Area: Electrical

Organisation: Mahatma Gandhi Institute of Technical Education and Research Center, Navsari, GujaratKeywords: 12-Pulse rectifier, H-bridge inverter, Medium frequency induction melting furnace, Harmonics.

Research Paper

4. Using children’s literature across the curriculum at primary and secondary level: A study on Assamese children’s literature

The literature specifically designed and produced for children is the Children’s Literature and it has a significant need in developing children’s imagination, creativity, natural as well as emotional development. Every child is dreamer, the dreaming can be enhanced over by the children's literature in the textual format, Picture or as an audiovisual format. Such children's specific contents are usually applied in the course curriculum for the children and it plays a great role in the homologous extension of the aim to enhance children’s creativity as well as the imagination, because all of our children may not have enormous access of children literature. Using Children’s literature across the curriculum mitigates any kind of disparity to children in terms of thinking, imagining and dreaming about each world phenomenon. The Assamese Children Literature is very rich in terms of content, number and fruitful composition. Such literature has been added by the bodies of course curriculum with a motto to enhance children’s motivation towards new thinking again and again. It is usually applied at the juncture or before that age group, they able to cultivate inductive and deductive reasoning. It is a realistic agent to enhance rethinking on any fantasy and its road to reality. In this article, some crucial angles are taken for an account and studied accordingly.

Published by: Dr. Montu Kumar BorahResearch Area: Education and Assamese Literature

Organisation: Gauhati University, Guwahati, AssamKeywords: Children’s Literature, Inductive, Deductive

Research Paper

5. IR based image processing techniques for media applications

A compression artifact (or artefact) is a noticeable distortion of media that includes images, audio and video caused by the application of lossy data compression that involves discarding some of the media's data so that it becomes simplified enough to be stored within the desired disk space or be streamed within the bandwidth limitations. At low bit rates, any lossy block-based coding scheme introduces visible artifacts in pixel blocks and at block boundaries. These boundaries can be transforming block boundaries, prediction block boundaries, or both, and may coincide with macroblock boundaries. Because this quantization process is applied individually in each block, neighboring blocks quantize coefficients differently. This leads to discontinuities at the block boundaries. These are most visible in flat areas, where there is little detail to mask the effect.

Published by: Shalu Rana, Ramandeep KaurResearch Area: Computer Science Engineering

Organisation: Doaba Institute of Engineering and Technology, Kharar, PunjabKeywords: Artifact, IMAGE Processing, Nearest Neighbor, Medical

Case Study

6. Performance analysis of 1.6 Tbps Optical Code Division Multiple Access system using Multi-Diagonal Code

The rapid expansion of multimedia services could lead to improve network accessibility with multiple users simultaneously. The technological development in asynchronous communication considered system performance as one of the major issues. Simultaneous accessing of the channel from the multiple stations is one of the techniques. Traditionally multiple access for the channel is playing an important role in multiple asynchronies communication. Optical Code Division Multiple Access (OCDMA) is one of the advanced techniques used in accessing the asynchronous network due to its inherent capability. OCDMA provides dynamic bandwidth support for multimedia services. In this paper, the OCDMA system is designing using Multi Diagonal (MD) code and Direct Detection (DD) code to improve the Bit Error Rate (BER), Q-factor. The designed system is used to compare with the MD code and Modified Congruence Quadratic (MCQ) code to determine the performance improvement for multiple users.

Published by: Bharath Kumara, Deelip R.Research Area: Electronics and Communication

Organisation: Ramaiah University of Applied Science, Bengaluru, KarnatakaKeywords: OCDMA, MD, MCQ, BER, Q-factor, Multiple access, Direct Detection (DD)

Research Paper

7. Comprehensive study of software testing: Categories, levels, techniques, and types

Software Testing is the process of evaluating a software program to ensure that it performs its intended purpose. Software testing verifies the safety, reliability, and correct working of the software. The growing need for quality software makes software testing a crucial stage in Software Development Lifecycle. There are many methods of testing software, however, the choice of method to test a given software remains a major problem in software testing. Although, it is often impossible to find all errors in software, employing the right combination of methods will make software testing efficient and successful. Knowing these software testing methods is the key to making the right selection. This paper presents a comprehensive study of software testing methods. An explanation of Testing Categories was presented first, followed by Testing Levels (and their comparison), then Testing Techniques (and their comparison). For each Testing Levels and Testing Techniques, examples of some testing types and their pros and cons were given with a brief explanation of some of the important testing types. Furthermore, a clear and distinguishable explanation of two confused and contradictory terms (Verification and Validation) and how they relate to Software Quality was provided.

Published by: Mubarak Albarka UmarResearch Area: Computer Science and Technology

Organisation: Changchun University of Science and Technology, Jilin, ChinaKeywords: Software testing, Software testing categories, Software testing levels, Software testing techniques, Software testing types, Software quality, Verification and Validation

Research Paper

8. The influence of social media tools on public universities in Kenya

Students in public universities are among the most active users of social media tools and platforms. There is little research data on the influence of social media on public universities in Kenya. It is critical to study how social media affects the wellbeing and academics of public university students in Kenya. The objective is to determine the influence of social media on public universities in Kenya. The research utilized a qualitative research design facilitated by a systematic literature review methodology. Findings from 12 studies were comparatively analyzed to determine the degree of conformity in a bid to answer the research question. The findings included that the influence of social media on a student’s wellbeing and academics depends on the student’s engagement in social media activities and consumption of the corresponding content. Social media can be an educational resource, enhance engagement, communication, and participation in classroom activities, and improve professional networking. Social media can also be a source of distraction and cybercrime besides the fact that it can also lead to addiction. The influence of social media on public universities in Kenya depends on the students’ engagement with social media activities and content. Educators, higher education administrators, and parents should monitor and control how students use social media content.

Published by: Annette Munyiva, John Simiyu, Jackson TooResearch Area: Educational Technology

Organisation: University of Eldoret, Eldoret, KenyaKeywords: Social media, Social network, Academic performance, Distraction, Internet addiction, Cybercrime, Learning activities, Networking, Collaborative learning

Review Paper

9. Review on prediction of heart disease using data mining

The heart is the next major organ comparing to the brain which has more priority in the Human body. Prediction of occurrences of heart diseases in the medical field is significant work. Data analytics is useful for prediction from more information and it helps medical centers to predict various diseases. A huge amount of patient-related data is maintained monthly. The stored data can be useful for the source of predicting the occurrence of future disease. Some of the data mining and machine learning techniques are used to predict heart disease, such as Artificial Neural Network (ANN), Decision tree, K-Nearest Neighbor(KNN), Naïve Bayes and Support Vector Machine (SVM). This paper provides an insight into the existing algorithm and it gives an overall summary of the existing work.

Published by: Siddharth Mundra, Kiran Manjrekar, Nimit Lalwani, Nilesh RathodResearch Area: Information Technology

Organisation: Manjara Charitable Trust's Rajiv Gandhi Institute of Technology, Mumbai, MaharashtraKeywords: Cardiovascular disease, Data mining, Classification, Naive Bayes

Review Paper

10. Framework for information management through step sequencer

Data is now commonly stored in digital format because it is the most secure way to store, manage, access and share information across networks. However, there is always a risk that unauthorized users will access data and, in the worst case, that malicious hackers will modify the data. The symmetric cryptosystem is used in the approach proposed. The symmetric cryptosystem is used in the proposed method. Data is divided into two sub-blocks and each block is encrypted to provide enhanced security using three separate secret keys. This deterministic algorithm is implemented using the LabVIEW tool. One of the three keys that diffuses the one other keys provided by the information is for misunderstanding. In the proposed solution blocks the main search attacks heavily. There are two separate secret keys used and to improve the robustness of the algorithm, random rotation is applied.

Published by: R. Arun Chakravarthy, M. Arun, N. Kaleeswari, P. Manivannan, D. PrabhaResearch Area: Computer Science Engineering

Organisation: KGiSL Institute of Technology, Coimbatore, Tamil NaduKeywords: Cryptosystem, Random rotation, Symmetric cryptosystem

Research Paper

11. Impact of self-esteem upon academic performance of college students

Introduction: Self-esteem is a personal force or a potential effect and it referred as person's global judgements of competency regarding one's self-worth.This study aimed to assess the impact of self-esteem upon academic performance of the college students.Research methodology:A descriptive correlational study was conducted at selected nursing College,Chennai,with the sample size of 98 students who were selected through total enumerative sampling technique. Data was collected by using tools such as background variable proforma, Rosenberg Self-Esteem Scale(RSES) and proforma to assess the academic performance of the B.Sc(N) I year students.Results: There was a positive correlation (r=0.4) between self- esteem and academic performance which is statistically significant(p < 0.001) indicating the fact that improving one's self esteem can have positive impact on academic performance. Conclusion: The above findings revealed that self -est eem is most important factor that influences students'forecast of academic performance. Planning psychological interventions to boost the self -esteem of the students will be helpful in improving their academic performance.

Published by: Priya S., Dr. Latha Venkatesan, Hilda Rose Mary, Dr. K. VijayalakshmiResearch Area: Education

Organisation: Apollo College of Nursing, Chennai, Tamil NaduKeywords: Self - esteem, Academic performance, Nursing students

Research Paper

12. A search for the origin and cause of attractive and magnetic property in meteorites

Abstract. Meteorites are known to be attracted to a magnet, whether they possess magnetic property or not are unknown. Hence to study the attractive property and magnetic property in meteorites, seven meteorites, six iron meteorites namely Campo-del-Cielo 2 nos, Sikhote Aline 1 no., unknown iron meteorites 3 nos, and Chelyabinsk, a stony meteorite were investigated to study their attractive property and magnetic property. For the study purpose, three experiments were conducted through mariner compass, standard magnets of different strength and iron filings. The conclusion drawn from these experimental studies showed that meteorites do not possess any magnetic property. They are found to be strongly attracted towards a magnet because of Fe compounds i.e., [Fe (iron) and Ni (nickel)] and possibly may be due to unknown elements present in them. This paper reports the work carried on seven meteorites on a preliminary basis, to study the attractive and magnetic property in meteorites and to put on records the work carried out. This work is of prima facial in knowing and studying the attractive and magnetic property in meteorites by different and simple methods. This is a small attempt to solve the fundamental question about magnetic property in meteorites.

Published by: Raju D. Jadhav, Harishchandra B. MaliResearch Area: Maharashtra

Organisation: Independent ResearcherKeywords: Meteorites, Meteoroids, Asteroids, Magnetic property, Attractive property, Mariner compass, Magnets, Iron Filings

Research Paper

13. GSM based fire alarm system

In this project, we are going to describe the usage and numerous advantages of a Fire alarm system in daily life. It has a great scope in daily life as it can be used in various fields and the best part about it is, we will receive a text message if the fire is detected. This project can be implemented in industries mines, colleges, etc. Security and automation are prime worries in our everyday life. The way to deal with home and industrial automation and security framework design is nearly institutionalized these days. Everybody wants to be secured. So, every user can use this fire sensor, temperature sensor, gas sensor, the smoke sensor at home and enterprises. The objectives of this fire detector using Arduino is to sense the surroundings for the occurrence of fire with help of temperature sensor and send 3 SMS alerts to two mobile numbers stored inside the Arduino program if the fire is detected.

Published by: Dheeraj Munagala, Prathik Reddy, Syed Maseehuddin, Purumandra Kumar, Swarnalatha P.Research Area: Integration of GSM and Arduino

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Sensors, GSM, LM35, MQ-6, Fire, Gas, SMS

Research Paper

14. Smart license for E-Government

In rapid growing technology world, electronics has taken over a leap in every domain, storing the copious data into small chip. A smart card, chip card, or integrated circuit card (IC) is any pocket-sized card with embedded integrated circuits. Smart Cards are secure portable storage devices used for numerous applications especially security related to user confidential information involving access to system’s database either online or offline. Smart cards are manufacture using plastic, generally polyvinyl chloride (PVC). This research is chiefly to study the security principles of smart card and assess the security aspect effects on smart card technology usage and adoption. The proposed Smart License system for E-government is very useful for the purpose of denying the access of driving the vehicle without having Valid license. The project comprises microcontroller-based system having 89S52 controller, Smart Card, GSM Module and respective Sensors. The system does verification of the License expiry of the driver with the help of RTC Details. In case of license Expiry of the user system will send message to the RTO office number saved in the system. Along with License verification the system is also useful for LPG leakage detection in the car. The LPG Leakage detection helps user in order to avoid further accidental conditions and step towards to diminish excessive pollutant release by the particular car.

Published by: Shreyash Vijay Ankam, Shivani Vishal Patil, Dheeraj Dhanaji PatilResearch Area: Computer Science and Technology

Organisation: Pune Vidhyarthi Griha's College of Engineering and Technology, Pune, MaharashtraKeywords: AT24C04, 89S52, MAX 232 IC, MQ-6, ADC 0809, LCD, SIM 900, Buzzer

Dissertations

15. Impact of fluctuations in exchange rate on Sensex

This paper analyses the “Impact of Fluctuations in Exchange Rate on Sensex.” The scope of the study has been restricted to India only. The exchange rates used for the study are of Re/$. The issue of whether stock prices and trade rates are connected or not has gotten significant consideration. On the off chance that stock prices and trade rates are connected and the causation keeps running from trade rates to stock prices, at that point, the emergency in the securities exchanges can be counteracted by controlling the trade rates. In addition, creating nations can endeavor such a connection to pull in/invigorate outside portfolio interest in their very own nations. So also, in the event that the causation keeps running from stock prices to trade rates, at that point experts can concentrate on Local financial arrangements to balance out the securities exchange. On the off chance that the two markets/costs are connected then, financial specialists can utilize this data to anticipate the conduct of one market utilizing the data on other markets.

Published by: Rishabh JindelResearch Area: Financial Market

Organisation: Christ University, Bengaluru, KarnatakaKeywords: Financial Markets, Sensex, Exchange rate

Research Paper

16. Leaves recognition using back propagation Neural Networks

The main goal of this project is to develop a software model, to suggest remedial measures for pest or disease management in agricultural crops. Using this software, the user can scan an infected leaf to identify the species of leaf, pest or disease incidence on it and can obtain solutions for its control. The software system is divided into modules namely: Leaves Processing, Network Training, Leaf Recognition, and Expert advice. In the first module edge of the leaf and token values found. The second module deals with the training of the leaf to the neural network and finding the error graph. The third and fourth modules are to recognize the species of the leaf and identify the pest or disease incidence. The last module is aimed at matching the recognized pest or disease sample on to the database wherein pest-disease image samples and correcting remedial measures for their management are stored.

Published by: Rishabh RajResearch Area: Computer Science Engineering

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Leaf, Pest, Disease, Agricultural, Image Processing, Species, Processing, Training, Recognition, Token, Back propagation

Online paper publication is ongoing for the current issue and authors can submit their paper for this issue until 21st November, 2019.