Volume-5, Issue-2

March-April, 2019

Research Paper

1. Fingerprint detection using enhanced minutiae singular point matching technique

Fingerprint matching is the procedure used to decide if two arrangements of unique finger impression edge detail originate from a similar finger. There exist numerous calculations that do unique mark coordinating from multiple points of view. A few techniques include coordinating details focuses between the two pictures, while others search for likenesses in the greater structure of the unique finger impression. In this proposed work, we propose a method for fingerprint matching based on singular point minutiae matching technique. The term "minutia" is used to refer to small ridge details found in fingerprints; most often, they are termed as main points described on ridge structures. Minutiae pi and qi are considered to coordinate if their traits are inside a certain Limit.

Published by: Rozi Kumari, Puneet JainResearch Area: Electronics And Communication Engineering

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: Fingerprint pattern matching, Minutiae, FRR, FAR, ROC, EER

Review Paper

2. Experimental study on waste foundry sand and steel slag concrete

Generation of waste foundry sand as by-product of metal casting industries causes environmental problems because of its improper disposal. Thus, its usage in building material, construction and in other fields is essential for reduction of environmental problems. Similarly, in foundries (where the ferrous and non-ferrous metals are melted.), the slag is produced after the completion of the melting process it can also be used as a building material, construction and in other fields. This research is carried out to produce low-cost and eco-friendly concrete. This paper demonstrates the use of waste foundry sand as a partial replacement by fine aggregate and slag is as coarse aggregate in concrete. An experimental investigation is carried out on concrete containing waste foundry sand in the range of 0%, 20 %, 40% by weight and slag is fully replaced (100%) for M-25 grade concrete (OPC). The material was produced, tested and compared with conventional concrete in terms of workability and strength. These tests were carried on a standard cube of size 150mm×150mm×150mm for 7, 14 and 28 days to determine the mechanical properties of concrete.

Published by: Chandrashekhar D. Sahare, Kishor T. Jadhao, Sohan R. Dudhe, Pallavi S. Godichore, Ashwin D. Parate, Nikeeta B. DetheResearch Area: Concrete Technology

Organisation: J D College of Engineering and Management, Nagpur, MaharashtraKeywords: Waste foundry sand, Steel slag, Cement (OPC), Low-cost concrete, Eco-friendly, Compressive strength, Split tensile strength

Research Paper

3. Design and implementation of agrobot by using IoT

Many advances in technology have made the agriculture business a much less labor-intensive industry. Farmers are looking for new ways to implement technology to cut costs and reduce labor hours. One of the ways that farmers are beginning to explore new technologies in farming come from the automatic machines. Internet of Things (IoT) technology has brought revolution to each and every field of common man’s life by making everything smart and intelligent. IoT refers to a network of things which make a self-configuring network. The Agriculture stick being proposed via this paper is integrated with Adriano Technology, Here we use two applications to show the working of a robot which is going to do crop harvesting and fertilizing in a real-time manner. Other accessories are slaves performing specific operations. The approach is now to develop smarter machines that are intelligent enough to work in an unmodified or semi-natural environment.

Published by: S. Mutharasu, Divya V., Dhivya Bharathi K., Elakkiya M. V., Janani E.Research Area: IoT

Organisation: Vivekanandha College of Engineering for Women (Autonomous), Tiruchengode, Tamil NaduKeywords: Arduino Uno, IoT

Research Paper

4. Hybrid electrical vehicle battery parameters monitoring system on smart phone through bluetooth

Through this project, we have tried to implement a battery management system for a hybrid electric vehicle. The idea of this project came from an electric vehicle safety system. In the electrical vehicle there is a possibility of battery explosion due to excessive temperature, high current or may be improper working due to high discharge current for monitoring these parameters on Smartphone we have designed circuit for same and also for efficient fuel consumption we introduce accelerometer based circuit for slope detection for fuel source change. By using reverse back emf of vehicle tires we can charge a battery. We have used ATmega328p, Bluetooth, accelerometer sensor, lead-acid battery as the hardware part and programming is done in Embedded C using Arduino tool and for Android App, we used MIT app inventor 2. This paper highlights the use of Bluetooth instead of ZigBee in communication.

Published by: Sachin Katmande, Pratik Kangane, Pravin Lokhande, Vishwalata LaksheResearch Area: Embedded Automation

Organisation: Dr. D. Y. Patil Institute of Technology, Pune, MaharashtraKeywords: Accelerometer sensor, Bluetooth, ATmega328, Lead acid battery

Research Paper

5. Advanced billing system for government departments

Making payments for electricity, water, a property is more of a routine job which needs to be done but often delayed mainly due to its tedious nature. Also getting access to various details of the same is also tedious. Earlier the existing system was manual payment methods where the user needed to visit the nearby payment center and pay their respective bills. The proposed system is more secure, error-free and easily incorporable to any further developments and changes to building an application program to reduce the manual work of managing amount of units consumed by the costumers and generating the bills for various departments like the municipality, electricity and water department.

Published by: Ranjitha H. T., Chethana M.Research Area: Billing System

Organisation: Bangalore Institute of Technology, Bengaluru, KarnatakaKeywords: Billing system, Bill payment, Bill generation

Review Paper

6. Recommendation of food tourism using Artificial Neural Network – A survey

According to “Global Report on Food Tourism” of the World Tourism Organization (UNWTO), food tourism is commented as a fast-growing segment of the tourism industry. Food tourism means traveling to seek enjoyment via eating and drinking experiences at the destination. movies. Such a system can suggest a set of recipes to users based on their interest, or the popularities of the dishes. For tourism services like"TripAdvisor" , the most successful online forum in the travel and tourism industry which recommends the food items based on the search history. Here, we using the ANN algorithm to predict that which algorithm is better to analyses the datasets of food recipes. Finally, it can make some recommendations for the tourist with better-personalized traveling experience and food services.

Published by: Suruthi P., Varsa Sukirthana S., Raguvaran S.Research Area: Data Analysis

Organisation: KPR Institute of Engineering and Technology, Coimbatore, Tamil NaduKeywords: Analysis, ANN Algorithm, Datasets, Neural Networks

Survey Report

7. Forward secure ID based ring signature for data sharing

Cloud computing provides services where one can access information from any place, from anywhere, at any time. So basically cloud computing is subscription based service where one can obtain network storage space and computer resources for data storage as well as data sharing. Due to high fame of cloud for data storage and sharing, a large number of participants gets attracted to it. The security is the biggest concern for the adoption of the cloud. The major issues in this regard are efficiency, data integrity, privacy, and authentication. In order to handle these issues concept of a ring, the signature has been introduced for data sharing amongst a large number of users. Ring signatures are used to provide user’s anonymity and signer’s privacy. But the expensive certificate verification within the ancient Public Key Infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. ID-based ring signature had been introduced which eliminates the process of certificate verification. Further enhancement of security with forwarding security concept has been introduced. According to this idea, if a secret key of any user has been compromised; all previously generated signatures that embrace this user still stay valid. This property is very vital to any giant scale knowledge sharing system because it is not possible to raise all knowledge data owners to re-authenticate their data whether or not a secret key of 1 single user has been compromised. Thus we propose a secure ID-based ring signature with forwarding security.

Published by: Swati Khatal, Tabassum MaktumResearch Area: Cloud Security

Organisation: Terna Engineering College, Navi Mumbai, MaharashtraKeywords: Authentication, Data sharing, Cloud computing, Forward security

Research Paper

8. Comparison of recovery profile of sevoflurane and propofol as induction agent in day care surgery

Daycare surgical procedure is those procedures which are performed in a hospital or an outpatient setting/surgeon’s office where the patient is discharged within 24 hours. 1% Propofol and 8% sevoflurane are commonly used induction agents for such procedures. It is of great importance to select a better induction agent with rapid onset and recovery with minimal side effects. Our study comprises of 60 cases undergoing various daycare surgical procedures that were admitted in National Institute of Medical Sciences and Research Hospital, Jaipur from January 2017-June 2018. This study was carried out to compare which out of propofol and sevoflurane is a better induction agent for day care procedures. In our study, we found that induction was faster and with fewer complications with propofol as compared to sevoflurane which was associated with a higher incidence of postoperative nausea and vomiting. We concluded that propofol is a better induction agent than sevoflurane for daycare surgical procedures.

Published by: Robin Lohia, Dr. Meenaxi SharmaResearch Area: Medical

Organisation: National Institute of Medical Sciences and Research, Jaipur, RajasthanKeywords: Propofol, Sevoflurane, Recovery, Daycare surgery

Research Paper

9. Content based Image Retrieval System using K-Means Clustering Algorithm and SVM Classifier Technique

The dramatic rise in the sizes of pictures databases has blended the advancement of powerful and productive recovery frameworks. The improvement of these frameworks began with recovering pictures utilizing printed implications however later presented picture recovery dependent on substance. This came to be known as Content Based Image Retrieval or CBIR. Frameworks utilizing CBIR recover pictures dependent on visual highlights, for example, surface, shading and shape, rather than relying upon picture depictions or printed ordering. In the proposed work we will use various types of image features like colour, texture, shape, energy, amplitude and cluster distance to classify the images according to the query image. We will use multi-SVM technique along with clustering technique to compare the features of the input image with the input dataset of images to extract the similar images as that of the query image.

Published by: Harleen Kaur Maur, Puneet JainResearch Area: Electronics and Communication Engineering

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: CBIR, SVM, Content Based Image Retrieval, Modified SVM, Clustering based SVM Technique.

Research Paper

10. Multi domain sentiment classification approach using supervised learning

Digital info out there on the net is increasing day by day. As a result of this, the demand for tools that facilitate individuals to find and analyzing of these resources also are growing in variety. Text Classification, particularly, has been terribly helpful in managing the information. Text Classification is that the method of assignment language text to 1 or a lot of classes supported the content. Its several necessary applications within the globe. As an example, finding the sentiment of the reviews, denote by people on restaurants, movies and different such things area unit all applications of Text Classification. During this project, the focus has been ordered on Sentiment Analysis that identifies the opinions expressed in a very piece of text. It involves categorizing opinions in text into classes like 'positive' or 'negative'. Existing works in Sentiment Analysis centered on decisive the polarity (Positive or negative) of a sentence. This comes below binary classification, which suggests classifying the given set of components into 2 teams. The aim of this analysis is to handle a unique approach for Sentiment Analysis known as Multi category Sentiment Classification. During this approach the sentences area unit classified below multiple sentiment categories like positive, negative, neutral then on. Classifiers area unit engineered on the prognostic Model, that consists of multiple phases. Analyses of various sets of options on the info set, like stemmers, n-grams, tf-idf then on, are thought of for classification of the info. Totally different classification models like Bayesian Classifier, Random Forest and SGD classifier area unit taken into thought for classifying the info and their results area unit compared. Frameworks like woodhen, Apache driver and sickest area unit used for building the classifiers

Published by: Parineeta Jha, Sajid KhanResearch Area: Machine Learning

Organisation: Technocrat Institute of Technology, Bhopal, Madhya PradeshKeywords: Sentiment, Positive, Negative, Sentiment analysis

Research Paper

11. Evaluating Alzheimer’s patients' assistance systems in HCI Domain

Nowadays, computer systems play a very important role in the health care context. However, many of these systems are also becoming increasingly complex. In particular, the design of these systems should be compatible with Alzheimer’s situation, as the condition of Alzheimer patients is growing worse, especially with the poor understanding of the disease, lack of support language difficulties, and memory loss. These systems should meet the various needs of such patients. In this paper, we are focusing on evaluating Alzheimer's assistance systems. Usually, in designing those systems, the human-computer interaction (HCI) is left behind. Thus, we demonstrate several aspects to improve Alzheimer’s patient ability to interact with these systems. Moreover, we discussed the key factors that affect the success or failure of those systems taking into consideration criterion such as bringing down health care costs, learnability, usability, dependability, readability, and facilitate automating. At the end, the paper illustrates using charts, and tables to show the impact of applying HCI when designing an interface to achieve user-friendly, intuitive interfaces, and higher usability of the systems.

Published by: Master Prince, Bashayer A. Alafri, Maram S. Alqueflie, Reem A. Almijmaj, Yassmeen A. AlnasserResearch Area: Computer Science

Organisation: Qassim University, Buraydah, Saudi ArabiaKeywords: Alzheimer patients, Human-Computer Interaction, Usability, Intuitive interfaces, User-friendly

Research Paper

12. Analysis of psychological variables between training under a coach and self training athletes

Sports Psychology addresses the interactions between psychology and sports performance, including the psychological aspects of optimal athletic performance, the psychological care and well-being of athletes, coaches, and sports organizations, and the connection between physical and psychological functioning. Sports psychologists can participate in various activities, mostly focused on working to understand what motivates athletes and how athletes can improve their performance. The purpose of the study is to find out Psychological variables between training under a coach and self-training athletes. Thirty athletes training under a coach (15) and self-training (15) was selected randomly from Virudhunagar district, their age group between 22 to 26 years. The subjects were divided into two groups as under a coach group and self-training group. As per the available works of literature, the standardized questioners were used to collect relevant data on the selected variables as stress, anxiety, achievement motivation, and happiness. The collected data were statistically analyzed by using an independent t-test. In all the cases 0.05 level of confidence was fixed as a level of confidence to test the hypothesis. The result shows that there was significantly different between training under a coach group and self-training group on stress, anxiety, achievement motivation, and happiness.

Published by: Dr. G. Peter Michael RajResearch Area: Physical Education

Organisation: Arul Anandar College, Karumathur, Tamil NaduKeywords: Coach, Self-training athletes, Data

Survey Report

13. A survey on motion picture prediction using data mining

In this study, a mathematical model used to predict an upcoming movie success class. This will help to suggest as your interest before release based on several attributes and It will take the suggestion from different linked social sites to determine the interest of the audience. It also shows the most interesting result on top of your list. Many film studios collectively produce several hundred movies every year; the budget of this movie is of the order of hundreds of millions, making their Box office success absolutely essential for the survival of the Industry. Knowing which movie is going to succeed and which are going to fail before the release could benefit the Industry. In this paper, we have enlisted some existing movie prediction using data mining for predicting success and failure by considering their advantages and disadvantages.

Published by: Abhishek More, Sharique Khan, Thabreez IzzudeenResearch Area: Data Mining

Organisation: K.C. College of Engineering, Mumbai, MaharashtraKeywords: Data mining, Predictive analysis, YouTube, Twitter, IMDb

Dissertations

14. Family impact on students’ motivation in Kanyakumari district

This study tries to identify the impact of some family important variable on students' Motivation. Several studies had stressed out the significance of study students' motivation as a move toward to improve their academic performance and develop the firm image. The families and society's changing values and cultures have a great impact on the students' motivation and their academic integration and recital. The questionnaire has consisted of some items. Results showed that students tend to attribute their academic success to internal factors such as hard working while they feature their failure to external factors such as family crisis.

Published by: T. Karthika DeviResearch Area: Kanyakumari District

Organisation: University of Jerusalem, Chennai, Tamil NaduKeywords: Family, Emotional impact, Peer group, Family situation impact

Review Paper

15. Multifunctional robots: A review

Robots replace humans in performing repetitive and dangerous tasks which are guided by a computer program or electronic circuitry. The goal of a robot is to reach remote areas and perform various tasks such as locomotion, sensing harmful gases, metal detection, sound sense, live video streaming and so on. Since these robots perform many functions, they are referred to as multifunctional robots. There are various types of robots. Robots which are used to keep an eye, supervisory control on intrusion thereby function as spy robots. Military robots are used to carry out many risky jobs that cannot be done by the soldiers, thereby saving human lives and reducing manual error in the field of defense. A wireless multipurpose robot can be navigated around the disaster areas to find the humans who need help and also to identify forest fire. Combat robot is designed to tackle cruel terror attacks which can be radio operated, self-powered and has all the controls like a combat vehicle. Soft spider robots are used to perform delicate surgical procedures in the human body which is too unpredictable to be performed by rigid robots. Camouflage robot is designed to duplicate the colors on which it moves on, hence being impersonated by the outside world. Rescue robots are a type of mobile robots which are used to complete search and rescue missions during natural disasters and other emergency situations. Therefore, robots play a very important role in making the tasks performed by humans easier, faster and efficient, thereby increasing speed and productivity.

Published by: S. B. Soumya, Seemab Sultana, S. M. Shivani, Vamaravelli Kavya, Pushpa Y.Research Area: Electronics and Communication Engineering

Organisation: Atria Institute of Technology, Bangalore, KarnatakaKeywords: Multifunctional, Supervisory control, Impersonated

Research Paper

16. Comparative analysis of ECC and Hessian Elliptic curve based message cryptosystem

Security is the major concern in nowadays in many applications, many algorithms were proposed majorly categorized into symmetric and asymmetric key cryptographic algorithms. The limitations with symmetric key cryptography are the scope of knowing the shared key between the communicators to intruders. Hence, asymmetric key cryptography algorithms were performed, among those ECC is one best mechanism. This paper is aiming at the analysis of time complexity, efficiency and security levels of Elliptic Curve Cryptography(ECC) and based upon the analysis, further extension to a strong encryption and decryption algorithm. In addition to that ECC will be extended to other ECC based derived algorithms include Hessian algorithm. Due to the many important properties making the model attractive in cryptography, a paper code is implemented in the Magma software to ensure the correctness of formulas in this work. A comparative analysis will be done among the ECC and Hessian algorithm.

Published by: Palaka Venkata Gangadhar Naveen, Nayana Rao, Dr. R. SivaranjaniResearch Area: Cryptography

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: ECC, Hessian curve, Encryption, Decryption, Security analysis

Research Paper

17. Intelligent model for predicting water quality

Over the decades, water pollution has been a real threat to the living species. The real-time monitoring of drinking water is nothing less than a challenging task. This paper aims to design and develop a low-cost system for the real-time monitoring of water quality using Internet of Things (IoT) and Machine Learning (ML). The physical and chemical parameters of the water such as temperature, level, moisture, humidity, and visibility are measured using respective sensors. ESP8266, the core controller is employed to process the measured values from the sensors. The data acquired from Sensors are sent to the Django server. Random Forest (RF) and K-Nearest Neighbours (KNN) algorithm are used in the analysis and prediction of water quality.

Published by: Ashwini K., J. Janice Vedha, D. Diviya, M. Deva PriyaResearch Area: Computer Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Water quality, Internet of Things (IoT), Machine Learning (ML), K-Nearest Neighbours (KNN), Random forest

Research Paper

18. Hear global on reality index base

As urban environments grow and become even more complex, businesses need highly accurate location intelligence technology to stay ahead. Building a scalable network that detects and identifies objects as fast as your brain starts with the vision of the vehicle. Forward-facing cameras and radar will soon be standard equipment in all cars. This project aims at every car learning from every car, car Parking place identification and continuing to enable an autonomous world with the help of tracking device (precise, end-to-end tracking and accurate, real-time, and historical locations for devices, people, and things). By combining open data with proprietary sources and technologies car sensor data and AI, the HEAR location platform offers a uniquely complete location data set along. The raw images captured by cameras may contain noises, the lighting of workspaces, a flickering of light sources. The preprocessing includes filtering out the noises, images conversions into different color spaces, blurring the image, edge detection, line detection, circle detection. The current project paper comprises of the development of image processing based parking space management. This project will implement based on the theories of Background subtraction algorithm. The usage of this algorithm will be used as a mapping method to reduce the error of detecting the vehicle. The explanation of algorithms such as Background subtraction algorithm and the implementation of Open CV as software to manipulate the image program will be used throughout the project

Published by: Pureti Anusha, Koncha Tejaswini, Mula Srilakshmi, Dhulipalla Sai kumar, Darla SrujanaResearch Area: Data Analytics

Organisation: QIS College of Engineering and Technology, Vegamukkapalem, Andhra PradeshKeywords: Photogrammetric, Image enhancement, Cascaded file, Background subtraction, Pixel transforms

Research Paper

19. Extraction of Neem (Azadirachta Indica) oil using blends of hexane, ethyl acetate and acetone by sonication

Neem oil is a very beneficial oil for human utility in various fields and is commonly extracted by a solvent like hexane and ethanol. This work stresses on investigating the usability of blends of pure solvents while adopting a new technology of sono assisted extraction for the extraction of oil from neem seeds. The prepared blends have been analyzed on the basis of total pressure, bubble point temperature, molecular weight for the different compositions solvents that is to be mixed to form the blends. In this work, it is proposed to use ethyl acetate + acetone, hexane + acetone and hexane + ethyl acetate binary blends with the comparison to unary pure solvents and also recording the solvent recovery in each case after distillation. The reusability of the solvents recovered after the first sets of extraction is also a topic of major concern.

Published by: Priyanuj Bhuyan, Saikat Sen, Vivek BihariResearch Area: Chemical Engineering

Organisation: Guru Ghasidas University, Bilaspur, ChhattisgarhKeywords: Neem Oil, Blends, Sono Assisted Extraction, Hexane, Ethyl Acetate, Acetone

Research Paper

20. Importance of healthcare dietitians’ communication skills

The nutritional professional competency and the communication competency together are very important for a dietitian to provide quality nutritional care to the patients. Dietitians provide nutrition counseling to patients and it is very important that Dietitians should master the art of communication. This article stresses the need and importance of possessing good communication skills by dietitians who are an integral part of the patients’ treatment care.

Published by: S. Ramesh, B. Manimegalai, Annie ValsanResearch Area: Management

Organisation: Christian Medical College and Hospital, Vellore, Tamil NaduKeywords: Communication skills, Healthcare dietitian, Nutrition

Research Paper

21. A non-intrusive approach for drowsy and drunk driving using computer vision techniques

This paper presents a holistic, non-intrusive approach for drunk and drowsy detection of the driver using computer vision techniques of facial landmark detection and motion detection. The driver's continuous real-time video feed is observed with the help of a smartphone camera. A single scalar quantity, Eye Aspect Ratio (EAR) which characterizes persistent eye blinks continuously analyses this feed. Simultaneously the system checks the body and the head movements using the differential imaging technique, which operates in real-time. A severity score indicating the fitness to drive is generated cumulatively using both methods. The driver is notified with the sound of an alarm if the results are positive based on a threshold value of the severity score.

Published by: Madhu, Khushboo Mishra, Shubham Karki, S. R. DhoreResearch Area: Computer Vision

Organisation: Army Institute of Technology, Pune, MaharashtraKeywords: Computer vision, Real-time processing, Motion detection, Facial landmark detection, Eye Aspect Ratio, Severity score

Review Paper

22. Open CV based border security surveillance robot

At present, the surveillance of International border areas is a headache for border guarding forces. The border guarding forces patrolling the border seriously, but it is not possible to monitor the border at each and every moment. Robot becomes an essential requirement of the surveillance when a trespasser enters the restricted area and it report’s nearby board security control unit. The use of robots in the border for surveillance reduces the risk factor of soldiers. The spy robot uses Raspbian operating system with remote monitoring and control algorithm through the Internet of Things (IoT) has been developed which reduces manual error and prevents the entry of unknown persons. The spy robot system comprises of Raspberry Pi (small single-board computer), Pi camera and sensors. PIR sensor detects the living objects and sends information regarding the detection of the living object is sent to the users through the web server and pi camera capture the moving object which gets transferred through mail simultaneously. The user controls the robot with wheel drive control buttons on the webpage. This surveillance system using a spy robot can be modified in different ways for the use in industries, banks, and shopping malls.

Published by: Jeevanantham R., Hemanth Thethan S, Akash K. P., S. PadmavathiResearch Area: Computer Science Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Border security, Raspbian OS, IoT, Spy Robot, Raspberry Pi, PIR sensor

Research Paper

23. Machine learning approach for flight delay prediction

In the cutting edge world, aircraft assume an essential job for transporting individuals and products on time. Any deferral in the timings of these flights can unfavorably influence the work, what's more, the business of thousands of individuals at any given minute. Estimating these postponements is essential amid the arranging procedure in business aircraft. A few procedures have just been proposed for outlining models to gauge the deferral in takeoff time of air ship. In our paper, a two-stage predictive model was developed employing supervised machine learning algorithms for the prediction of flights. The first stage of the model performs binary classification to predict the occurrence of flight delays and the second stage does the regression to predict the value of the delay in minutes. Then, each of the algorithms’ prediction accuracy and the receiver operating characteristic (ROC) curve were compared. Furthermore, an application was fabricated utilizing the model which uses highlights that are promptly accessible before the takeoff of a plane furthermore, can educate travelers and aircraft about flight delays in advance, To reduce the monetary losses.

Published by: Neelima SahuResearch Area: Machine Learning

Organisation: K. J. Somaiya College of Engineering, Mumbai, MaharashtraKeywords: Flight delay prediction, Classification, Regression, Machine learning, FDP application

Review Paper

24. Tooling Platform – Future of software forge

Tooling platform is an open-source software forge. Software forge is a web-based collaborative software platform which can be used for both developing and sharing software applications. Different independent projects can be stored and shared using the Tooling platform. It also acts as a place for maintaining the source code developed by the software development team. It also provides the way for version control of the stored source code. Documentation feature provided in the Tooling platform provides easy maintenance of the developed software application. For users, it can also act as a repository of computer applications. Software forges have gained a lot of popularity in recent years. Forging software is proven to be a successful software development model for many software projects. Tooling platform is used for managing source code repositories, bug reports, discussions, wiki pages, blogs for single or any number of individual projects.

Published by: Swathi NayakResearch Area: Software Engineering

Organisation: N.M.A.M. Institute of Technology, Nitte, KarnatakaKeywords: Software Forge, Software Engineering, Software Development

Research Paper

25. Importance of good nutrition during hospitalization

Good nutrition is deemed mandatory during hospitalization to prevent patients from vulnerable infections, enabling speedy recovery, fast wound healing and avoid frequent hospital readmissions. Clinical dietitian in a healthcare setup is the right person to ensure that patients are getting enough nutrition. Dietitians discuss and find out the nutritional status of the patient and provide support during the course of hospitalization as well as provide a nutritional plan to be followed at home at the time of discharge.

Published by: B. Manimegalai, S. RameshResearch Area: Clinical Dietetics

Organisation: Christian Medical College and Hospital, Vellore, Tamil NaduKeywords: Clinical dietitian, Nutrition screening, Nutrition tool, Nutrition assessment

Review Paper

26. Study on effect of rice husk ash (pozzolanic and green supplementary material) on concrete

Rice Husk Ash (RHA) is a highly reactive Pozzolanic material that can be used for replacement of cement at various percentages. The Rice milling industry generates a huge amount of rice husk during milling of paddy which comes from the agricultural field. This rice husk can be used as supplementary cementing material with Ordinary Portland cement. The main aim of this review paper is to show the modified properties of concrete made from the addition of RHA in different percentages. The effects of RHA on concrete properties such that compressive strength, workability, tensile strength shall be investigated.

Published by: Bhupendra Kumar, Pooja SemwalResearch Area: Civil Engineering

Organisation: Faculty of Technology, Suddhowala, Dehradun, UttarakhandKeywords: Rice husk ash, Compressive strength, Workability of concrete

Research Paper

27. A comparative analysis of IoT features between AWS and Azure

The technological advancements in the area of “Internet of Things” (IoT) have taken a big leap in the last few years. IoT has changed our surrounding in many ways, some of which is noticeable and some are unnoticeable. These days Organizations are investing huge funds in the field of IoT. Internet of Things (IoT) is basically the identification of objects in the LAN or WAN by providing the objects a unique IP address. Objects, pets or humans are equipped with embedded sensors, which helps them to routinely transfer data over the LAN/WAN without any human intervention. IoT is a swiftly growing technology which is making customers life more prolific and enjoyable. In this paper, we will try to compare the features of services offered by AWS and Azure with respect to the IoT Platform. Both Azure and AWS are market leaders in cloud-based IoT and offers numerous services for users to work on the IoT platform.

Published by: Prashant Dutta, Pranay DuttaResearch Area: Internet of Things

Organisation: Madhya Pradesh Poorv Kshetra Vidyut Vitaran Company Ltd., Jabalpur, Madhya PradeshKeywords: Internet of Things (IoT), Azure, Amazon Web Service (AWS), MQTT (Message Queuing Telemetry Transport)

Case Study

28. Challenging role of dietitian to improve oral food intake in a post bone marrow transplant patient – A case report

Bone Marrow Transplantation (BMT) involves the administration of high doses of chemotherapy, immunosuppressive medications, and infusion of marrow cells. During and after treatment, patients may develop a poor appetite, mucositis, anorexia and gastrointestinal failure which severely affect the food intake and leads to malnutrition (1, 2). It is important to follow dietary guidelines for post bone marrow transplant patient to improve or maintain nutritional intake. The dietary approach varies from patient to patient based on their condition. This case report explains the crucial role of a dietitian to improve the nutrient intake and nutritional status of the post bone marrow transplant patient.

Published by: K. Priya, K. Jayalakshmi, S. Ramesh, B. ManimegalaiResearch Area: Clinical Dietetics

Organisation: Christian Medical College and Hospital, Vellore, Tamil NaduKeywords: BMT, TPN, AML, Nutrition Support, ONS

Research Paper

29. IoT based interactive warehouse monitoring system integrated with Android application

An integrated warehouse management module is provided enabled by IoT (Internet of Things) The system and method are providing capacity and capability of remotely managing the warehouses consists, edible materials including food grains and providing of vital information like moisture contents, contamination levels if any to the warehouse managing team. The device is enabled with necessary facilities for storing of vital information in cloud-based utilities for enabling the team which manages the warehouse to take instantaneous decisions on the materials stacked. Fire alert mechanisms and providing information related to earthquakes in the vicinity of the warehouse to nearby police and other agencies are provided/incorporated in the device. Information on marked variations on a weight of the contents of the stacked materials inside the warehouse can be instantaneously shared to the warehouse management team with the help of cloud services and android application and steps to curb pilferage of the contents are incorporated in the system.

Published by: Hariharan P. R., Karthik Hariraj, kalpanasonika RResearch Area: Warehouse Management

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Internet of Things, Warehouse management, Cloud storage, Cloud services, Android application

Review Paper

30. History of dental implants, in memoriam: Dr. Per-Ingvar Branemark, the man who made people smile

Dr. Per-Ingvar Branemark, the father of modern implant dentistry died unexpectedly on December 20, 2014, in his birthplace Gothenburg, Sweden at the age of 85 by a heart attack. He was a Swedish professor of anatomy who accidentally discovered an intimate bone-to-implant contact with titanium, the phenomenon that he called it “osseointegration”. Few scholars and even fewer individuals in the world haven’t heard his name due to his valuable innovation and noteworthy favor to humanity. This article is written in order to appreciate his invention and asking God for forgiveness at his first death anniversary.

Published by: AliResearch Area: Dentistry

Organisation: Mashhad University of Medical Sciences, Mashhad, IranKeywords: Dental implants, Dr. Per-Ingvar Branemark

Review Paper

31. Design and analysis of hybrid fiber metal on street lamp post

Half and half materials of any class are basic for current requests. This paper manages the corrosion of composites made flax/E-Glass strands which are created by hand layup strategy utilizing LY556 Epoxy and HY951 hardener. The properties of this composite are dictated by testing like hardness and the corrosive quality which are assessed tentatively as per ASTM gauges. The consequence of the test demonstrates that half and a half composite of flax/E-glass fiber has obviously better properties than that of the metal components.

Published by: Rabin P., Mahesh S., Pranav PrakashResearch Area: Composite Material

Organisation: Dhanalakshmi College of Engineering, Chennai, Tamil NaduKeywords: Hybrid fiber metal, LY556 Epoxy and HY951 hardener

Research Paper

32. Application of machine learning techniques in estimation of crop yield

It is a process in which we can know what happened in the past. And we know that past is the best forecaster of the future. In this research paper we apply evocative analytics in the agriculture production domain for sugarcane crop to find efficient crop yield estimation. In this paper we have three datasets like as Soil dataset, Rainfall dataset, and Yield dataset. And we make a combined dataset and on this combined dataset we apply several supervised techniques to find the actual estimated cost and the accuracy of several techniques. In this paper three supervised techniques are used like as K-Nearest Neighbor, Support Vector Machine, and Least Squared Support Vector Machine. It is a comparative study which tells the accuracy of training proposed model and error rate. The accuracy of training model should be higher and error rate should be minimum. And the proposed model is able to give the actual cost of estimated crop yield and it is label like as LOW, MID, and HIGH.

Published by: Keerti Mulgund, Rupa S. G.Research Area: Machine Learning

Organisation: Smt Kamala and Sri Venkappa M. Agadi College of Engineering and Technology, Lakshmeshwar, KarnatakaKeywords: Crop yield estimation, Support Vectors, Least square Support Vector Machine, Data analytics, Agriculture analytics

Research Paper

33. Fusion of two and three colored and gray scale images using modified – Laplacian Pyramid Technique

Image fusion is a process of blending the complementary as well as the common features of a set of images, to generate a resultant image with superior information content in terms of subjective as well as objective analysis point of view. The goal of this exploration work is to build up some novel picture combination calculations and their applications in different fields, for example, split identification, multi-spectra sensor picture combination, restorative picture combination and edge location of multi-center pictures and so forth. The initial segment of this exploration work manages a novel break identification system dependent on Non-Destructive Testing (NDT) for splits in dividers smothering the assorted variety and multifaceted nature of divider pictures. It pursues diverse edge following calculations, for example, Hyperbolic Tangent (HBT) sifting and shrewd edge recognition calculation. The combination of locator reactions are performed utilizing Haar Discrete Wavelet Transform (HDWT) and most extreme guess with mean-detail picture combination calculation to get increasingly noticeable identification of split edges. In the proposed framework we have performed picture combination for two just as for three pictures. The proposed framework gives improved edge location in pictures with unrivaled edge confinement and higher PSNR.

Published by: Kajal, Puneet JainResearch Area: Image Processing

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: Image fusion, Laplacian Pyramid Technique, Discrete Wavelet Transform (DWT)

Research Paper

34. Graft materials in lateral window approach for maxillary sinus lift procedure before implant placement

Endosseous dental implants have been widely used in the past decades for rehabilitation of edentulous area as a successful and predictable treatment strategy. Achieving the adequate volume of bone is the prerequisite and a challenging issue for severely atrophic areas. Several reconstructive procedures have been used for vertical and horizontal bone augmentation before implant placement. Maxillary open sinus lift procedure is a conventional technique for elevating the sinus floor and placing the bone graft in the posterior atrophic maxilla before implant placement. This article represents the graft materials used for lateral approach sinus lift surgery.

Published by: AliResearch Area: Oral Surgery

Organisation: Mashhad University of Medical Sciences, Mashhad, IranKeywords: Graft material, Maxillary sinus lift

Research Paper

35. Intelligent model to identify the duplicate products in catalog management

Nowadays electronic catalog management provide more information about the products to the customers. Catalog management in the e­commerce system supports the definition, storage, retrieval, and management of product information in the e­commerce process. In which electronic catalog contains a duplicate of the product so it reduces the customer’s experiences and it should not provide much more relevant information about the products in the search recommendations. This paper presents the method to solve the duplicates of the product and increase the search recommendations with the help of the Relational Database Management System (RDMS) and (DBMS). So, it creates a systematic and impressive catalog that helps the customers to get all the product descriptions and images they need and reduces the duplicates to make a buying decision

Published by: M. Kavitha, Akilandeswari E., P. Tamije SelvyResearch Area: Computer Science Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Electronic commerce, Catalog, Merchant, Eliminate duplicate

Review Paper

36. The Future of Cyber Security

In the near future, cyber security will play a dominant role in personal and business applications. As society is becoming more and more digitized, there are more chances to win by exploiting this. As a result of the growing proliferation of digitization and connected devices, the demand for cyber security solutions is growing at a relatively high rate. The complexity and connectivity of digitized systems have a direct impact on their security. The goal of this review is to summarize the logical predictions of the future of cyber security.

Published by: Adharsh Krishnan, M. Deva PriyaResearch Area: Cyber Security

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Cyber security, Information security, Cloud systems, IoT systems, Digitization, Cyberspace, Cyber defense

Review Paper

37. ATM- Security using machine learning technique in IoT

The idea of designing and implementation of the real-time ATM security project came with the incidents of accessing the ATM by the unauthorized users instead of an authorized user. This project will give access to the user only after identifying the image of the user taken by the CCTV in the ATM and compare the identified image with the image of the user that was stored in the database created during the account creation which comes under the banking session of banks. In some cases the authorized user is not able to use the ATM for some emergency purposes, in such cases, the OTP is sent to the users registered mobile number and the person who came instead of the authorized user have to enter the OTP that the authorized user received. This method will reduce the risk of ATM usage by common people. The face detection and face recognition are done using deep learning techniques and machine learning. The IOT components like Camera, RFID reader, Tag, Relay, Motor were used. The Raspberry pi 3 (2015 version) is used as the main component. Here the open CV is used as the platform and the python language is used for the deep learning techniques and face detection Haar cascade is used for face detection. The face recognition module is done by Local Binary Patterns (LBP) algorithm. And an alert message is sent to the authorized user as a text message if the user is found to be the third party user.

Published by: Udhaya Kumar N., Sri Vasu R., Subash S., Sharmila Rani D.Research Area: IoT

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: ATM, Camera, RFID reader, Tag, Relay, Motor, Raspberry Pi 3 deep learning, Open CV, Python, Haar cascades, CCTV, Local binary patterns, Alert message

Research Paper

38. Accident detection system based on Internet of Things (IoT)- Smart helmet

The objective of our smart helmet is to provide the means for detecting and reporting accidents. The working of this smart helmet is very simple; vibration sensors are placed in different places of the helmet where the probability of hitting is more, which are connected to the microcontroller board. When the rider met with an accident and the helmet hits the ground, these sensors sense and gives to the microcontroller board, then controller extracts GPS location using the GPS module that is interfaced to it. When the data exceeds the minimum stress limit then the GSM module automatically sends a message to the registered emergency contacts and the link through which the location and the speed of the victim will be displayed in the mobile application and in the web application.

Published by: Kabilan M., Monish S., Dr. S. Siamala DeviResearch Area: Computer Science And Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Camera, Emergency contacts, GPS, Internet of Things, Raspberry Pi, Smart helmet

Others

39. Restaurant management system Android application

The main target of this paper is to conduct a thorough and in-depth analysis of the vast field of Software engineering and at the same time explore the opportunities and the conditions that could lead into building a successful Android app. The simplicity and ease of access to a menu is the main component that facilitates ordering food in a restaurant. A user-friendly menu completely changes the patron’s dining experience. Existing programs provide an app that restaurants can use to enter their menus into Android-based tablets and make it easier for the diners to flip, swipe and tap through the menu. This system is used to provide the restaurants with a tablet menu that would recommend dishes based on a recommendation algorithm which has not been implemented elsewhere. This system uses a cloud-based server for storing the database.

Published by: Sucharita M. Samantaray, Karan Dhoke, Pranay Pawar, Rina MishraResearch Area: Computer Technology

Organisation: Bharati Vidyapeeth Institute of Technology, Navi Mumbai, MaharashtraKeywords: Restaurant management system, Android App, E-commerce, Food ordering system

Research Paper

40. Decentralized secure money transfer using blockchain

A blockchain is just a chain and a list of blocks. Each block, in the blockchain, will have its own digital signature. Each block doesn’t just contain the hash of the block, but its own hash in part, calculated from the previous hash Calculating and comparing the hashes allow us to see if a blockchain is invalid. We create a system that Allows users to create wallets and Provides wallets with public and private keys using Elliptic-Curve cryptography. Secures the transfer of funds, by using a digital signature algorithm to prove ownership and finally allow users to make transaction your blockchain

Published by: Suganya T., Vignesh A., Vignesh Kumar N., Vivin Kumar D.Research Area: Block Chain

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Blockchain, Netbeans, MySql

Research Paper

41. The association between Myopia and near work activities in young adults in Durgapur, West Bengal

Myopia is one of the most prevalent refractive error that can be defined as a state in which the eye fails to see distant objects properly. Most of the young adults are affected by myopia in the world due to many factors. A few researchers showed in their research articles that near work activities lead to the progression of myopia. The main objective of this paper is to identify all the main factors of myopia in young adults in the southern region of West Bengal, especially in Durgapur. To meet this objective a sample of 2500 young adults were selected using simple random sampling procedure and examined through Snellen’s Chart and retinoscope and found 575 young adults have been suffering from various grades of myopia. In the next phase, we have identified the relevant factors of near work activities such as types of light used, time spent on near work per day, uses of the cell phone. We have analyzed the data through SPSS 16.0 software and interestingly we found some significant associations among them.

Published by: Atanu Maulik, Dr. Kavita BhatnagarResearch Area: Optometry Science

Organisation: NIMS University Rajasthan, Jaipur, RajasthanKeywords: Myopia, Refractive error, Near work activities, Retinoscope, Snellen’s chart

Review Paper

42. Patient health monitoring system

Health is one of the primary capabilities that a human need to go on with his life. That is the main reason the healthcare provided to the human must be bestowed in ample means and effective ways to ensure his health based on health monitoring parameters and the medical assistance being provided directly. The new technological development and its implementation now involve the internet and the sensors often known as the Internet of Things (IoT), which enables the worldwide approach to the health care base system development. This steers to the health system management that in a real-time approach it supplies a set of particulars relevant to the patient being monitored. In all the countries the death rates are becoming high due to the absence of well-timed medical treatments. These can be shut out through standard health care. The paper puts forward an IoT approach for a superior health monitoring system, by involving the sensors where they sense the body temperature plus the heartbeat and tells the doctor or the attending staff of the patient about the state of the patient. The project uses the KNN algorithm to predict the shape and condition of the sufferer to prevent them from going into further bad state. When the bad condition of the patient is predicted and detected by the system, it sends mail to the doctor in the most emergency situation or else in other cases it keeps on updating the sensed values in the web page created. The system also includes a buzzer beeping situation, where the beeping occurs when the nurse has to be notified of the state of the patient. Whereas, the previous systems developed did not do the predicting part, which plays the most important role in taking care of the patient. Thus, the project results in taking the greatest possible measure in helping the patients improve their situation.

Published by: Siva Priya S., Shruthi M. G., Sruthi S.Research Area: Internet Of Things

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: IoT, Machine learning, KNN, Emergency

Others

43. Drowsy driving warning and traffic collision information system using IoT

Driver lassitude induced drowsiness accounts for a major of road accidents. To avoid such accidents, a precautionary system is needed. The idea is to develop driver sleep detection, drunk and drive monitoring system. Digital Image Processing (DIP) technique is used to detect fatigue. Haar cascaded algorithm is used for eye detection. In this paper, a system is proposed to avoid road accidents using the alert system along with collision information system. IOT module is used to get location information and to send messages. Wi-Fi module is used to update location information in the server.

Published by: Madhan Kumar A., Kabilan M., Karthikeyan S. B., Sathiyapriya S.Research Area: Embedded System

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Haar cascade algorithm, DIP, IOT, Wi-Fi

Research Paper

44. Sensor design system and power adjustment of transmitter in FSO communication

The main problem related to FSO communication is atmospheric attenuation. To cope with such problem and maintain a dedicated connection, the transmitter power has to be adjusted continuously depending upon the weather condition of that particular time. Here we propose a design where we utilize the precipitation detection sensor and visibility sensor of ASOS. The weather conditions are detected using these sensors and some statistical data collected over time. Each condition provides some set of rules and equations which interlinks the power of receiver and transmitter. The transmitter if operated on such equation would yield the maximum efficiency. This results in power saving of the model. An automatic power device for FSO could be designed. In the below-discussed idea, we strictly restrict ourselves on atmospheric attenuation domain. Other factors like pointing Loss, Free space loss, Divergence loss are not taken into consideration. To take these issues into consideration, calculations have to be complex. While designing a real model, these factors would be taken as an important factor of attenuation too. Here Noise Equivalent Power and transmission power equation have been proposed which has visibility as a variable.

Published by: Diptangshu ChattopadhyayResearch Area: Communication Engineering

Organisation: Jalpaiguri Government Engineering College, Jalpaiguri, West BengalKeywords: Power, Attenuation, ASOS, FSO, Precipitation, Visibility, Atmosphere

Review Paper

45. Walking stick with heart attack detection

The Walking Stick with Heart Attack Detection is equipment that is used daily to indicate a heart condition, to detect heart attack and to call for emergency help. It was designed specially to help senior citizens and patients with heart disease. It consists of three basic sub-projects Circuit, Analysis Algorithm, and Bluetooth Communication. The first unit is worn on the user’s wrist captures abnormal heartbeat signal from the patient., and the rest two are installed in the stick. The microcontroller on the stick runs a heart attack algorithm. A warning is given out to the person about his heart condition. The Bluetooth emergency calling system calls for medical help at the moment of the heart attack. The effectiveness of the proposed method is confirmed by experiments on a commercially available walking stick. Each of the three subprojects responded positively.

Published by: Cheedella Sai TejaResearch Area: Electronics Engineering

Organisation: Sathyabama Institute of Science and Technology, Chennai, Tamil NaduKeywords: EGC, Heart beat, Heart attack, Bluetooth, Stick

Review Paper

46. License plate detection and string conversion using Haar-like cascade classifier

This paper presents a core module for intelligent transportation based on the method Haar-like cascade classifier for high accuracy license plate detection. Many real-time car license plate detection is reasonable and effective only under certain conditions and assumptions. Therefore a real-time method Haar-like cascade and Tesseract search for Optical Character Recognition (OCR) has been proposed. Using accurate prediction and fast analysis strategy our proposed system can constructively out pass the problems in real-time scenarios. After binge analyzing the system with various inputs to establish that the proposed system is superior to the existing systems in terms of accuracy and time consumption.

Published by: Ashwin B., T. Goutham, P. KalpanaResearch Area: Computer Science Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Haar-like feature, Optical character recognition, Convolutional neural network, Tesseract, Edge features, Adaboost, Cascading classifiers, Recurrent neural network, Long short term memory

Research Paper

47. Role of splenorrhaphy in selected cases of splenic trauma

The term splenorrhaphy actually represents a variety of “spleen sparing” techniques aimed at controlling the hemorrhage from a splenic injury while sparing the patient from the long-term immunologic consequences of splenectomy. This is a hospital-based observational interventional study done on 50 cases in Department of General Surgery NIMS University and Medical College and Hospital, Jaipur during January 2017- June 2018. The severity of the splenic injury can objectively be described with a grading system developed by the American Association for the Surgery of Trauma.

Published by: Dr. Gulrez Siddiqui, Dr. Ashok Kumar GuptaResearch Area: Medical

Organisation: National Institute of Medical Science and Research, Jaipur, RajasthanKeywords: Splenectomy vs. splenorrhaphy, Complication of splenectomy, Advantages of splenorrhaphy

Research Paper

48. Automatic speed control of a vehicle using RFID technology

Most of the road accidents occur due to traffic violation and over speeding. Running vehicle avoiding the traffic lights has become a major issue now a day. Observing traffic violation manually has become tedious and too complicated, on account of expanding the number of vehicles on the road. The number of a road accident is continually expanding and has turned into a noteworthy region of concern. To decrease the number of road accident we propose a system which controls the speed of vehicle consequently in any basic zone, without significant inconvenience to the driver. Here, we review a model dependent on RFID innovation. One RFID reader set inside the vehicle which reads the RFID tag set either at the traffic light or at speed limit board. A decision is taken by a controlling module in the vehicle and controls the speed appropriately.

Published by: D. Pavankumar, A. Selvarani, C. R. Vigneshkumar, Nimmalapalli Sri HarshaResearch Area: Elecronics

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: RFID (Radio Frequency Identification), ECU (Electronic/Engine Control Unit), Driver assistance systems

Thesis

49. Analysis of object-oriented system quality model using soft computing techniques

Quality plays very important role in software industry because the objective of every software industry is to produce good quality software with in time and budget. Number of quality models have been proposed and used by various authors to build good quality software and these software quality models are also responsible for improving the performance, this improvement directly reflects the quality, increase users satisfaction and decrease the cost of quality. This report we have discussed and compared various quality models and soft computing techniques used for predicting the quality of software product and software system. It is found from the literature that there are lots of quality models and we measure quality based on their characteristics, so here, in this work we gives the characteristics definition and then comparison of quality models related to quality characteristics. In this study we exploring the information about soft computing technique for predicting the quality of a system or product and also develop a new quality model using soft computing (Fuzzy, Neural Network and Neuro-fuzzy) approach which is responsible to predict the software quality of an object-oriented system. In this report, we also identifies the most important factors of object-oriented system like Efficiency, Reliability, Reusability and Maintainability and also proposed a model based on these four factors that evaluating the quality of object-oriented system using soft computing technique i.e. Fuzzy Logic, Neural Network and Neuro-Fuzzy.

Published by: Anil KumarResearch Area: Software Quality

Organisation: Saroj Institute of Technology and Management, Lucknow, Uttar PradeshKeywords: Software quality model, Soft computing techniques, Neural Network, Fuzzy Logic

Review Paper

50. Weather adaptive traffic prediction and analysis of accidents using machine learning algorithms

Predicting traffic flow is one of the fundamental needs for comfortable travel, but this task is challenging in vehicular cyber-physical systems because of ever-increasing uncertain traffic big data. Although live data with outstanding performance recently have become popular, most existing models for traffic flow prediction are fully deterministic and shed no light on data uncertainty. Also, they are many inventories in automobile industries to design and build safety measures for automobiles, but traffic accidents are unavoidable. There is a huge number of accidents prevailing in all urban areas. In this study, a novel dynamic approach is proposed for predicting citywide traffic flow based on weather. The proposed system utilizes the neuro-wavelet algorithm to select the required features for traffic prediction. The system also proposes the K Nearest Neighbor algorithm to predict the accuracy of accidents occurred in urban regions.

Published by: S. Bharath, Dr. S. Siamala Devi, M. Guruswamy, M. AravindResearch Area: Data Analytics

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Traffic prediction, Feature selection, Classifier methods, Accident analysis

Review Paper

51. Exploring the relative predictive efficiencies of spatial regression models

Spatial regression models are standard tools for analyzing data with spatial correlation. These models are broadly used in the social sciences for predicting the socio-economic factors. In this paper, we discuss about various spatial regression models and explain the concepts based on real data to demonstrate how to obtain and interpret relevant results. We describe prediction efficiencies of various predictors relative to the efficient minimum mean square error predictor in spatial models containing spatial lags in both the dependent variable and the error term. We consider Multiple Linear Regression Model (MLRM), Spatial Autoregressive Models (SAR), Spatial Autoregressive in the Error-term Model (SEM) and Spatial Durbin Models (SDMs) to estimate the literacy progress in the districts in Odisha as a result of changing socio-economic factors over time. The goodness of fit of the different models are compared along series of hypotheses about the performance of the specifications considering spatial relationships among the observations. The spatial analysis proved the existence of positive spatial autocorrelation and persistence of disparities in literacy attainment level across the regions during the analyzed period. The results of econometric analysis confirmed the expected positive impact of economic growth on literacy progress level as well as the necessity to incorporate the spatial dimension into the model.

Published by: Bhabani Shankar Das Mohapatra, Dr. E. G. RajanResearch Area: Spatial Data Mining

Organisation: Jawaharlal Nehru Technological University, Hyderabad, TelanganaKeywords: Spatial regression, Spatial analysis, Exploratory spatial data analysis, ML method, Euclidean distance, Lagrange multiplier tests

Others

52. Passenger service system

Increased competition in the commercial transportation industry has made service quality of every transportation agencies as one of the key competitive measures to attract passengers against their rivals in-flight services, particularly food delivery and waste collection, have a notable impact on perception of the overall airline’s service quality because they are directly and indirectly provided to passengers during flight. This is the scenario in every industry. This project consists of two sections, passenger section, they can request their needs by pressing a button in the keypad and it sends to the control room section and it is displayed on an LCD control room section. The requested needs may be food, water and if it is “any other help”, the air hostess directly goes to the requested person.

Published by: Abhiram P. S., Mohammed Aslam, Sreebal Anil V. A., Minnuja ShellyResearch Area: Computer Science

Organisation: Universal Engineering College, Thekkumkara, KeralaKeywords: Flight, Passengers, Airline, Services, Air hostess

Others

53. A text reader for the visually impaired using Raspberry Pi

In this paper, an innovative, efficient and real-time beneficial technique that enables the user to hear the contents of text images instead of reading through them has been introduced. It uses the combination of Optical Character Recognition (OCR) i.e. Tesseract and Text to Speech Synthesizer (TTS) in Raspberry Pi. This kind of system helps visually impaired people to interact with computers and day-to-day text effectively through vocal and keyboard interface. Text-to-Speech is a device that scans and reads English alphabets and numbers that are in the image using the OCR technique and changing it to voices. We are including obstacle detection via ultrasonic sensor and color detection. This device consists of three modules, image processing module, voice processing module and an object detecting module. The device was developed based on Raspberry Pi 3 Model R, Clock Speed of 1.2 GHz.

Published by: C. Ebenezer Durai, A. Selvarani, S. Siva Suthan, M. Anwin KushalResearch Area: Embedded

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Raspberry Pi, OCR, Camera, Image processing, Tesseract, Voice processing, Obstacle detection, GPS detection

Research Paper

54. Survey on generative adversarial networks

GAN stands for Generative Adversarial Networks.GANs are the most interesting topics in Deep Learning. The concept of GAN is introduced by Ian Good Fellow and his colleagues at the University of Montreal. The main architecture of GAN contains two parts: one is a Generator and the other is Discriminator. The name Adversarial stands for conflict and here the conflict is present between Generator and Discriminator. And hence the name adversarial comes to this concept. In this paper, the author has investigated different ways GAN’s are used in real time applications and what are the different types of GAN’s present.GAN’s are mainly important for generating new data from existing ones. As a machine learning model cannot work properly if the size of the dataset is small GAN’s are here to help to increase the size by creating new fake things from original ones.GAN’s are also used in creating images from the given words that are text-to-image conversion.GANs are also applied in image resolution, image translation and in many other scenarios. From this survey on GAN author aim to know what are the different applications of GAN that are present and their scope. The author has also aimed at knowing the different types of GAN’s available at present. The author has also aimed at knowing the different applications of GAN and different proposed systems by various authors.

Published by: N. Yashwanth, P. Navya, Md. Rukhiya, K. S. V. Prasad, Dr. K. S. DeepthiResearch Area: Deep Learning

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Generative Adversarial networks, Generator, Discriminator, Neural network, Deep Learning

Survey Report

55. Answer script evaluator: A literature survey

Every college, university, school conduct exams and most important part of exams are the results. In order to get these results, the exam papers have to be evaluated one by one manually. This process of evaluating the exam papers is time-consuming and requires more manpower. To overcome this solution, we have come up with a thought that removes the manual evaluation process. Our project focuses on developing a system that evaluates an answer script against a pre-uploaded marking scheme. Initially, the answers are taken in digital format and those digital answers are processed using algorithms such as word2vec where the word’s similarity index is extracted and the words similar to it are noted. Using this we can also get the meaning of the paragraph and we can match it with the answer key and get the match percentage. Using this percentage, we can calculate the marks to be awarded.

Published by: Sachin B. S., Shivaprasad K., Somesh T., Sumanth Hegde, Radhika A. D.Research Area: Machine Learning

Organisation: Vidyavardhaka College of Engineering. Mysore, KarnatakaKeywords: word2vec, Deep Neural Networks, doc2vec

Research Paper

56. Smart helmet to detect and prevent accident

The impact when a motorcyclist involves in a high-speed accident without wearing a helmet is very dangerous and can cause the fatality. Wearing a helmet can reduce shock from the impact and may save a life. There are many countries enforcing a regulation that requires the motorcycle's rider to wear a helmet when riding on their motorcycle, Malaysia is an example. A smart helmet is a special idea which makes motorcycle driving safer than before. This is implemented using GSM and GPS technology. The working of this smart helmet in IoT is very simple, vibration sensors are placed in different places of the helmet where the probability of hitting is more which are connected to microcontroller board. So when the rider crashes and the helmet hit the ground, these sensors sense and gives to the microcontroller board, then controller extract GPS data using the GPS module that is interfaced to it. When the data exceeds minimum stress limit then GSM module automatically sends the message to ambulance or family members. It also has an alcohol detector sensor which detects whether the person is drunk and switches off the engine if the sensor output is high.

Published by: L. Sindhu, G. Swedha, G. Nandhini, S. J. Raffel, M. RashikaResearch Area: Internet of Things

Organisation: Dhirajlal Gandhi College of Technology, Salem, Tamil NaduKeywords: IoT, GPS, GSM, Sensors, Helmet

Review Paper

57. IoT based smart energy meter

In the recent digital era, technology starts to find new ways of improving and enhancing human lives, all the devices are getting smarter than we could expect it would be. In the same way, we have an idea of making the energy meters of Electricity Board highly smarter using the technology “Internet of Things (IoT)”. The smart energy meter is connected with Electricity Board, household appliances and the user through IoT and mobile application. We are focusing on making the smart energy meter too smartly connect with the household appliances through IoT and also to connect with the authorized persons through a mobile application to have control over it.

Published by: Ahin Shapiro R., Dr. A Balamurugan, D. Satheesh Kumar, G. SwaminathanResearch Area: Internet of Things

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Internet of Things, Smart systems, Energy meter, Electricity board

Review Paper

58. Study on bamboo reinforcement concrete structure

Bamboo is used as a construction material from earlier days of construction. It was used as reinforcement in a rural area and as formwork also. Concrete is a brittle material so it cannot be used as a single material in construction due to its low tensile strength. In this study, we tried to find out the properties of bamboos from past studies. and from the past study, we can find out the better way to improve the strengths of bamboo as a reinforcement in concrete structures.

Published by: Rajneesh Bhandari, Pooja SemwalResearch Area: Civil Engineering

Organisation: Uttarakhand Technical University, Dehradun, UttarakhandKeywords: Bamboo, Concrete, Reinforcement

Review Paper

59. Detailing aspects of the reinforcement in reinforced concrete structures retaining wall: A case study

This thesis studies the impact of reinforcement detailing on the behaviour of a reinforced concrete structure. Using a retaining wall as a case-study, the performance of two commonly used alternative reinforcement layouts (of which one is wrong) are studied and compared. Reinforcement Layout 1 had the main reinforcement (from the wall) bent towards the heel in the base slab. For Reinforcement Layout 2, the reinforcement was bent towards the toe. This study focused on the reinforcement details used in the D-region, and on how it impacts the capacity, joint efficiency and failure mode of the structure.

Published by: Vipin Singh, Pooja SemwalResearch Area: Civil Engineering

Organisation: Faculty of Technology, Suddhowala, Dehradun, UttarakhandKeywords: Modeling, Analyzing, Reinforced concrete structure, D-region

Research Paper

60. Removal of cardiac atherosclerosis

Atherosclerosis is a condition in which the plaque, made up of organic and inorganic substances such as fat, cholesterol, and calcium gets deposited in the inner walls of the arteries. This result in the narrowing of the arteries that prohibits the supply of the oxygen-rich blood to the heart and the other parts of the body. The stent is a miniaturized mesh-like tube structure that pushes the plaque depositions against the arterial walls and restores the normal blood flow in the artery. In this paper gives the study of the deformation of a coronary stent that is deployed in the coronary artery of the heart. The catheter inserted into the arteries of blood vessels. Using an ultrasonic sensor to predict the distance by applying an ultrasonic wave. The ability to use a laser that generates an intense beam of coherent monochromatic light will assist to breach the plaque. A Motor being used for a centrifugal fan to grind the broken plaque. GSM is proving for telecommunications. This proposed model can detect the plaque in arteries and remove the plaque by using devices. We have done this process in the prototype model by using a microcontroller.

Published by: Asif Farhan S., Niranjana E., Kaviyaa R., Prabavathi R.Research Area: Biomedical

Organisation: Rajiv Gandhi College of Engineering and Technology, PondicherryKeywords: Catheter, Laser, GSM, Prototype, Microcontroller

Review Paper

61. Share market analysis for share selection using data mining technique

The share market has been a field of vast interest both for those who wish to make money by trading shares in the share market. Generally, there is an opinion about share markets like high risk and high returns. Even though we have a huge number of potential investors, only very few of them are invested in the share market. The main purpose is they are not able to take risk of taking the skill of investors. Though get low returns they want to save their money. One important reason for this problem is that they don’t have proper guidance for making their portfolio. In this paper we focus the real-world problem; we had selected three indices such as SENSEX, NIFTY. The analysis is purely based on the data collected from the past three years. The Data mining technique, Time series interpretation is applied for the Data analysis to show the ups and downs of a particular index. The correlation and Beta are the tools which give the suggestion about the share and its risk. The correlation tool is used to identify the relationship between the index and the company individually. This Beta is used to identify the risk associated with the share.

Published by: Munaf Patel, Zahir AalamResearch Area: Data Analysis

Organisation: Thakur College of Engineering and Technology, Mumbai, MaharashtraKeywords: Linear regression, Data analysis, Correlation, Beta, Time series

Research Paper

62. IoT based accident detection and prevention system with android application

A system of accident detection and prevention powered by IoT((Internet of Things) The method helps in detecting and preventing vehicular accidents with immediate intimation and information like real-time tracking of the vehicle to closed ones, vehicular speed met. The device is connected over the cloud to use its basic functionalities of storage and perform historical analysis. Vital information’s that help over as an aid at the red-zone is passed over to the nearest police stations, hospitals, highway authorities, etc. Information is instantaneously notified and shared to the closed ones of the victim using the cloud services and mobile application at the time of the accident to avoid delay of information and aid and

Published by: Johnny Antony Puthur, Dr. S. Siamala DeviResearch Area: Computer Science and Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Internet of Things, Accident detection, Accident prevention, Bluetooth low energy, Cloud storage, Cloud services, Android application

Research Paper

63. An adaptive approach to prognosticate an individual’s capability for emolument through Machine Learning

One of the major integrant to be considered while granting a loan is the customer‟s ability to pay back the amount to the bank as per the bank's provided a schedule. Our work focuses on the analysis of all the attributes that might affect the customer‟s ability to pay the loan. It is basically a credit scoring mechanism used by the bank to make sure a customer's intentions to apply for a loan are legit using Ensemble Algorithms. Our work gives a probabilistic predictive model or a scorecard to estimate the probability of defaulters in the current global scenario. Our work is due diligence fulfilled by the investors involved with the bank. Our aim is to prognosticate correct credit worth which will cause a significant increment in the profits of commercial institutions.

Published by: Jujjuri Goutham, T. Anitha, S. Joshua Johnson, Routhu Dhanunjay, Vemuri Susmitha, Nagavarapu SravaniResearch Area: Machine Learning

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Random forest classifier, Defaulters, Mathew's correlation coefficient, Credit scoring

Others

64. Use of housing society

Over the last few years, we have observed a focus on engineering science has been established whose products are likely to create a large market in the near future. It has been known ''Housing Society". First, a user must be registered in the system so that his password can be identified. This impression is securely stored in a central database or a smart card given to the user. The impression is fetched when an individual needs to be verified. Depending on the information, a software system can operate either in a verification (authentication) or a recognition mode.

Published by: Sanket Vikas Sagare, Zishan Usman Baig, Niranjan Bapuso kadam, Faique ShaikhResearch Area: Computer Engineering

Organisation: AISSMS Polytechnic, Pune, MaharashtraKeywords: Algorithms, Security, Authentication, Ridges, Valleys, Authorization, Database

Research Paper

65. Development of particle reinforced composite by plastic and e-waste

The main aim of this project is to develop Particle reinforced composites. Thermoplastic is taken as matrix material. Thermosetting plastics and E-Waste glass powder of 60µm is taken as particles. The formed structure exhibits high strength, low mass density and less weight compare to wood and steel. Due to its superior performance, the composite reinforced materials are mainly used indoors, frames, the automobile industry, especially for vehicle body applications. In this project particle reinforced Composite formed from Plastics and Electronic wastes. A formed specimen is subjected to tensile, hardness and bend test. It exhibits high tensile and bending strength.

Published by: A. Kanagaraj, C. Franciskennathamreth, M. Ajithkumar, V. Anandh, R. NagarajResearch Area: Material Science

Organisation: Akshaya College of Engineering and Technology, Coimbatore, Tamil NaduKeywords: MCC, Surface hardness, Fiber volume ratio

Research Paper

66. A novel prototype to secure network using malware detection framework against malware attack in wireless network

A new and novel proposed algorithm based on malware detection has been used that overcomes the disadvantages of the existing algorithms and helps to eliminate viruses and worms from entrusted environment. In the wireless networks suffers from various spyware programs that prevents access to legitimate users who obtains services from target web server. In our proposed prototype helps to authenticate the sender to make the dynamic rule set to avoid the formations of unavailable networks which any user who obtain web services. In our proposal architecture diagnose malware whether malware based data has been really being sent to the valid user or is it being morphed by the attacker in the middle. The proposed algorithm has been tested against various existing algorithms to study how effectively the algorithm is working, and how effectively it is overcoming the drawbacks of the present malware detection algorithms. The algorithm is projected to serve the purpose of prevention of being used malware based programs to drop it by the user and also to identify that the non-infectious message is reaching only to the valid user.

Published by: G. Jagadish, L. Jaswanth, K. Sowjanya, P. Sri Harsha, M. Nikhil KumarResearch Area: Security

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Virus and worms, Malware detection framework, Client, server, Wireless LAN

Review Paper

67. Enormous information for Internet of Things

With the quick advancement of the Internet of Things (IoT), Big Data innovations have risen as a basic information examination instrument to convey the learning inside IoT frameworks to all the more likely meet the reason of the IoT frameworks and bolster basic leadership. In spite of the fact that the point of Big Data investigation itself is widely examined, the dissimilarity between IoT areas, (for example, social insurance, vitality, transportation furthermore, others) has disconnected the advancement of Big Data approaches in each IoT area. Along these lines, the common understanding crosswise over IoT areas can propel the advancement of Big Data examine in IoT. In this work, we along these lines direct a study on Big Data innovations in various IoT areas to encourage and animate information sharing over the IoT spaces. In light of our audit, this paper talks about the likenesses and contrasts among Big Data advances utilized in various IoT spaces, proposes how certain Big Data innovation utilized in one IoT area can be re-utilized in another IoT space, furthermore, builds up a reasonable system to plot the basic Big Data advancements over all the audited IoT spaces.

Published by: P. Mounika, N. NaliniResearch Area: Internet of Things

Organisation: Saveetha School of Engineering, Kuthambakkam, Tamil NaduKeywords: Big data, Animate, Innovation, Bolster

Research Paper

68. Extended hybrid approach for detecting spammers on Twitter

One of the biggest social networks is Twitter for providing message posting and use direct message services via “tweets”.366 million currently active users on Twitter, Is the second largest space to share common news or message post. These features are also used by spammers on Twitter, spammers are not new on Twitter. spammers must be detected in improving the quality of Twitter message services. In this spammer detected by using metadata, content, interaction, and community-based features methods. Tweet meta information extracted and analyzed based on user-id, tweets,tweet-time and tweet-type. Content Features are extracted based on user posting content with URL, Mention-tags and hash-tags. Interaction and community-based features are analyzed by following and follower information. The proposed approach to introducing network-based features for spammer ratio detection by using unique IP address based user classification. Spammers can be detected by analyzing their tweets based on the extended hybrid approach by using the random forest, decision tree, and Bayesian network on the Twitter dataset that has benign users and spammers.

Published by: Subash G., S. Yuvalatha, V. Lenin Kumar, G. ManimegalaiResearch Area: Network Security

Organisation: Sree Sakthi Engineering College, Karamadai, Tamil NaduKeywords: Spammer detection, Spammer detection in Twitter, Network-based Twitter spammer detection, Extended hybrid approach

Research Paper

69. Bunch ensemble with averaged co-association matrix maximizing the expected margin

The problem considered is cluster analysis with the usage of the ensemble approach. The paper proposes a method for finding optimal weights for the averaged co-association matrix applied to the construction of the ensemble partition. The main idea is to find such weights for which the expectation of ensemble margin takes its maximum value. A latent variable pairwise classification model is used for determining margin characteristics dependent on cluster validity indices. To construct the ensemble partition, we apply a minimum spanning tree found on the averaged co-association matrix as an adjacency matrix. The efficiency of the method is confirmed by Monte-Carlo simulations with artificial data sets.

Published by: A. V. S. N. Kaushik, D. Harsha vardhan, Dr. M. Rama Krishna Murthy, B. Sai Chaitanya, G. Nikhil DasResearch Area: Data Mining

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Cluster ensemble, Weighted co-association matrix, Latent variable model, Cluster validity index, Margin expectation, Minimum spanning tree

Review Paper

70. Automatic opening and closing of railway gates and signaling in railways using IoT

The Internet of Things (IoT) is a group of devices which are connected together in the network. It is used in sound vibrator and ZigBee transceiver which will receive frequency of the vibration and the time from which the train reaches the sensor from the server. In this, we are using a sound vibrator which will detect vibrations from the track and the signal is transferred to the gear motor and the gate will get closed automatically. When the train passes the gate another sound vibration sensor is fixed at another end and it will transfer the signal to the gate and gate will open automatically. Here the additional features added are we can calculate the current speed of the train and we can also track the track damage. The main objective of this work is to provide automatic closing and the opening of gates and railway system. We can avoid careless mistakes done by the gatekeeper and we can reduce manpower in the railway system.

Published by: Dinesh Kumar S., Prem Kumar R., Venkatesan G., Vinston Raja R.Research Area: IoT

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: IoT, Zigbee, Sound vibration detecting sensor, Arduino

Research Paper

71. Child in safety with localization awareness

Aiming at a increasing security to children, this paper implements safety to the children by using a safety monitoring system using our android mobile phones. In particular a feeling of insecurity will be among the minds of the parents when the child is being alone. In fact nowadays, child kidnapping is happening frequently and that too it is too common among girl child. This system helps the children to be safe and monitors the child’s daily environment. This system allows to send the child location along the photos and videos to the parent mobile by means of GPS (Global Positioning System) and GSM module (Global Space for Mobile communication).

Published by: Dhinesh Kumar M., Devaram Gnanendra Reddy, Appadi Sumanth Teja, V. JeyaramyaResearch Area: Embedded

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Safety monitoring of the child, Mobile communication, RFID module, GPS module, GSM module, Raspberry Pi, Raspbian Jessie, Python programming

Research Paper

72. A graphical password authentication approach for secure banking

Authentication is the process to provide sure information security and the graphical password authentication method is an accessible and easy process to provide authentication. The major problem of user registration, approximately text base password, is well known. If the login user is inclined to select a simple password which is frequently in his mind it becomes straightforward for attackers to guess. If the password is machine generated it is mostly over complex for the user to keep in mind. User authenticated password using cued click points graphical password scheme includes memo ability, usability and security evaluations. This paper is on enhanced user graphical password authentication with a usability and memo ability, so that users select more random or more difficult to guess passwords. In click-based graphical passwords, image or video frames provide the database to load the image and then give authenticated access to all information in the database.

Published by: Neha Prakash Patil, Shraddha Rajesh Patil, Dipali Vinayak Khadse, Priti Murlidhar Patil, Sudesh L. FarpatResearch Area: Malkapur

Organisation: Padm Dr VB Kolte College of Engineering and Polytechnic, Malkapur, MaharashtraKeywords: User Authentication, Cued Recall, Graphical Password Scheme, Security, Memorability

Research Paper

73. Simulation of grid connected photovoltaic system

Nowadays, we can see that the demand for energy increasing rapidly. To fulfill this demand we need to produce more and more energy. As compared to conventional energy sources we can use non-conventional energy sources which are a noiseless operation, easily available and pollution free for our environment. We can see the solar energy has a great potential to meet the energy demand acting as a standalone system or grid-connected mode, but the main problems with the solar system are irradiation level and temperature condition fluctuation and synchronization of AC power with the grid. In this project we can try to solve this problem by using MPPT for improving the efficiency, we should get maximum output under varying conditions which can be tracked continuously by a special technique called maximum power point tracking. In this project, we can make a MATLAB simulation of the solar PV system, along with i-v and p-v curves. Simulation of P&O algorithm with converters which is carried out with a grid-connected solar PV system and get maximum output under varying conditions.

Published by: Anjana PatelResearch Area: Renewable Energy

Organisation: Mahatma Gandhi Institute of Technical Education and Research Center, Navsari, GujaratKeywords: PV system, MPPT, Boost converter, Inverter

Research Paper

74. Modeling and simulation of D-STATCOM for reactive power compensation and voltage regulation

Flexible AC Transmission Systems (FACTS) technology opens up new opportunities for controlling power and enhancing the usable capacity of the present as well as new and upgraded lines. D-STATCOM is a FACTS device which can independently control the flow of reactive power in the distribution system. Most of the loads in this system, being inductive in nature consume more reactive power. As a result, the power factor of load deteriorates and this limits the active power flow in the line. So, developing a D-STATCOM, based on voltage source converter, which injects the reactive power in the distribution line. The output voltage of D-STATCOM is made leading to that of system voltage for the purpose of controlling VAR generation

Published by: Bijal Chandrakantbhai KansaraResearch Area: Power Quality

Organisation: Mahatma Gandhi Institute of Technical Education and Research Center, Navsari, GujaratKeywords: D-STATCOM, VSC, Reactive power, SRF theory

Research Paper

75. Face attendance

Educational institutions’ administrators in our country and the whole world are concerned about the regularity of student attendance. Student overall academic performance is affected by it. The conventional method of taking attendance by calling names or signing on paper is very time consuming, and hence inefficient. The system is made up of a camera which takes the photos of individuals and a computer unit which performs face detection (locating faces from the image removing the background information) and face recognition (identifying the persons) First, face images are acquired using a webcam to create the database. Face recognition system will detect the location of the face in the image and will extract the features from the detected faces.

Published by: Pankaj Phanse, Aditya Nitin Tilekar, Pranav Aminbhavi, Pooja Dherange, Snehal RokadeResearch Area: Pune

Organisation: AISSMS Polytechnic, Pune, MaharashtraKeywords: Algorithms, Security, Authentication, Ridges, Valleys, Authorization, Database

Research Paper

76. Design of semi-autonomous vehicle

A web-controlled and partially autonomous vehicle system is presented in this paper. It highlights the idea to develop a remote-controlled car which can be driven from anywhere using the Internet over a secured server. This car will also have automation features like obstacle avoidance system and lane detection system so that it can drive itself safely in case of connectivity failure. The main goal here is to minimize the risk of human life and ensure the highest safety during driving. At the same time, the car will assure comfort and convenience to the controller. A miniature car including the above features has been developed which showed optimum performance in a simulated environment.

Published by: Ajith Narayanan K., Monish V., Pavalan E., L. Ashok KumarResearch Area: Embedded

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: ARM-LPC 2148, Semi-autonomous driving, Collision detection, Internet, Instruction, Web-server, Robotics, Embedded systems

Research Paper

77. Bio-medical texture characterization using DOST

We present a new efficient approach for detecting tumor of cancer in the human body based on a recently published discrete orthonormal space-frequency transform known as the DOST. We develop a frequency-domain implementation of the DOST in two dimensions for the case of dyadic frequency sampling. This manual detection may have chances of false detection. So a computerized method for cancer detection is needed. A feature selection algorithm based on statistical two-sample t-test method is used for the selection of significant coefficients from the high dimensional DOST(Discrete Orthonormal Stockwell Transform) coefficients. The selected significant coefficients are used as features for the classification of human body tumor as benign or malignant.

Published by: Sravani Palika, K. S. N. Sarat Chandra, K. Lavanya, S. A. BhavaniResearch Area: Image Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: DOST, Frequency domain, Spatial domain, Biomedical image processing

Research Paper

78. Digital image steganography using LSB and pseudo-random technique

This paper purposed an image based steganography that uses the Least Significant Bits (LSB) techniques and pseudo-random encoding technique on images to enhance the security of the communication. In the L-SB approach, the fundamental thought is to replace the Least Significant Bits (LSB) of the cover picture with the Bits of the messages to be covered up without pulverizing the property of the cover image significantly. The LSB-based method is the most difficult one as it is hard to separate between the cover-object and stego-object if few LSB bits of the cover are replaced. In Pseudo-Random technique, an arbitrary key is utilized as a seed for the Pseudo-Random Number Generator is required in the inserting procedure. Both the systems utilized a stego-key while installing messages inside the cover picture. By utilizing the key, the chance of getting attacked by the attacker is reduced.

Published by: Naveen Kalia, Manit Kapoor, Dr. Naveen DhillonResearch Area: Steganography

Organisation: Ramgarhia Institute of Engineering and Technology, Phagwara, PunjabKeywords: Steganography, LSB, Random-key, Image, Secret message, Stego-key, Cover image, Techniques

Thesis

79. An arduino based intelligent shopping system-mechatronics approach

Internet of Things (IoT): Let devices and physical objects connect each other by their sensing, communicating and processing capabilities. This paper develops an intelligent shopping using the shopping cart system to provide IoT service in a hypermarket. The major instances are difficulty in finding the specified products and standing in a big queue in the billing section. This really takes a long time and creates customer un-satisfaction to the owner. Each cart is provided with an RFID based smart shopping system with an IoT enabled technology. It proposes the quick pathfinding schemes which help the customer to find the location of the product. The main facility that the proposed model provides the customer only needs to carry an RFID smart card. It also provides a centralized and automated billing system using RFID technology. The whole information will be sent to IoT cloud server through a GSM module. If the product is purchased the number of product availability is low. The IoT cloud server alerts the seller through SMS. The system facilitates faster billing and standing in a queue reduces the average time required for shopping.

Published by: Dr. J. Krishnakumar, A. Aruljothi, M. Pavadharani, A. SaraswathiResearch Area: Mechatronics

Organisation: Avvaiyar College of Engineering and Technology for Women, PuducherryKeywords: Shopping, RFID tag, RFID reader, GSM, IoT

Review Paper

80. Review – IoT used for health monitoring

The day-by-day development of the Internet of Things causes a revolution in modern technology, which makes our life easier and automated. Due to a busy schedule and irregular lifestyle, health hazard is not an age-dependent factor in the recent era. Under these circumstances, Internet of Things has provided a much easier solution for remote real-time health monitoring of patients from the hospital as well as home. One such healthcare application is to monitor the patient health status Internet of Things makes medical equipment more efficient by allowing real-time monitoring of patient health, in which sensor acquire data of patient's and reduces the human error. The significant challenges in the implementation of the Internet of Things for healthcare applications are monitoring all patient’s from various places. Thus Internet of Things in the medical field brings out the solution for effective patient monitoring at a reduced cost. The purposed work will explain the concept of monitoring of patients health using a microcontroller and different sensors and the reports are accessible through the mobile application.

Published by: Devyani Mashale, Dr. Rupali J. ShelkeResearch Area: Embedded System

Organisation: Walchand Institute of Technology, Solapur, MaharashtraKeywords: Heart rate, Blood pressure, Respiration rate, Body temperature

Research Paper

81. Semantic text analysis using machine learning

As the amount of information on the World Wide Web grows, it becomes increasingly burdensome to and just what we want. While general-purpose search engines such as Ask.com and Bing high coverage, they often provide only low precision compared to others, even for detailed and relative queries. When we know that we want information about a certain type, or on a certain topic, a domain-specific search engine can be a powerful tool. Like www.campsearch.com allows complex queries over summer camps by age-group, size, location, and cost. Domain-specific search engines are becoming increasingly popular because they increase accuracy not possible with general, Web-wide search engines. Unfortunately, they are also burdensome and time-consuming to maintain. In this paper, we use machine learning techniques to greatly automate the creation and maintenance of domain-specific search. It describes new research in semi-supervised learning, text classification, and information extraction. We have built a demonstration system using these technics like Web Scrapping, Fuzzy C-Means and Hierarchy Clustering for a search engine which gives accurate results which is a more advantage when compared to other Search engines. Searching with a traditional, general purpose search engine would be extremely tedious or impossible to perform search operations. For this basis, domain-specific search engines are becoming popular. This article mainly concentrated on Project an effort to automate many aspects of creating and maintaining domain-specific search engines by using machine learning techniques. These techniques permit search engines to be created quickly with less effort and are suited for re-use across many domains.

Published by: Bhargavi Joga, Sarath Sattiraju, Venkatesh Kandula, Narayana Murthy Kallempudi, Mandava Kranthi KiranResearch Area: Machine Lerning

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Machine learning, Web scrapping, Reference management software

Research Paper

82. An IoT based smart traffic control system

An automated Pi based traffic control system using webcams and sensors that help in reducing traffic density in busy traffic junctions. The design of this traffic infrastructure can help to avoid traffic congestions. This paper describes a system where webcams are integrated with the Raspberry Pi to operate the lanes of traffic junction based on the count of traffic and RFID Sensors for emergency vehicles to be prioritized for the safety of passengers. As a result, the improvement in the traffic system can be exponentially improved, which can lead to progressive in the overall traffic system.

Published by: Bevara Atchyuth, Irugatla Sarat Kumar, Swarna Datla, Ganta Ajay RahulResearch Area: IoT

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Internet of Things (IoT), Raspberry Pi, Web Cam, RFID, Traffic Control

Research Paper

83. Partial replacement of PPC with glass powder

Disposal problem of waste material is becoming critical day by day. A million tone of waste glass powder generated every year in the world. In this topic, an attempt has been made to utilize glass powder, which is a waste of glass industry. The research work is a determination of the effect of the use of Glass powder as a replacement of cement to assess the pozzolanic nature of fine glass powder when mixed in concrete and compare the difference in performance with other pozzolanic materials are mixed in concrete like silica fume and fly ash. The concrete in place of cement to some extent i.e., 10%, 20%, 30% and mechanical properties of M40 (Design Mix) are investigated. Cube specimen of 36 numbers were cast, cured and tested for 3, 7, and 28 days strength. Compression was conducted and the results were compared. The finding revealed an increase in compressive strength with the increase in the replacement of cement by Glass powder. To reduce the demand for cement, glass powder decreases the unit weight as well as the porosity as indicated by a decrease in water absorption. It reduces the quantity of cement to be used in concrete. Also, glass powder is proved to be economical and is considered an environmentally friendly construction material.

Published by: Shubham G. Keshattiwar, Vipul Rathod, Dhiraj Wankhede, Saurabh Kurrewar, Aishwarya H. MeshramResearch Area: Civil Engineering

Organisation: Jagadambha College of Engineering and Technology, Kinhi, MaharashtraKeywords: Glass powder, Replacement to PPC, Compressive and tensile strength, Cost effective material, M 40 (Design Mix)

Research Paper

84. Image enhancement by averaging histogram equalization

Image Processing is defined as the process of converting an image into digital form and perform operations on it, in order to get an enhanced image or to extract some useful information from it. Image Processing has various categories in which Image Enhancement is one of them. Image enhancement is defined as the process of adjusting digital images such that the results are more suitable for display or further image analysis. The fundamental requirements for any vision based application are contrast enhancement and brightness preservation. The existing systems don’t satisfy both the requirements simultaneously. In this paper, a system is proposed which consists of step by step processes like color stretching, histogram averaging and re-mapping. The proposed system employs a search process to find optimal algorithmic parameters, such that the mean brightness difference between the input and output images is minimized. The proposed system is tested against different images to test the working of the system.

Published by: Anurag Cherukuri, B. Ravi Kiran, Buela Rani Badugu, Ravali Sujatha Alamuri, Yashwanth AythaResearch Area: Image Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Color stretching, Histogram averaging, Remapping

Research Paper

85. Neuromarketing: Understanding why we buy what we buy

In recent times, there has been an emerging field of study called neuromarketing, it has taken the marketing world by storm.it makes use of neuroscience research in a marketing context. The purpose of this paper is to understand how neuromarketing is carried out and to evaluate the influence of neuromarketing tools on traditional marketing inputs in order to give a deeper understanding of consumer behavior. The job of any marketer has less to do with designing attractive ads and more to do with understanding consumer behavior. It is said that people buy with emotions and justify it with logic, but this has proven to be true by neuromarketing research. Neuromarketing seeks to replace the traditional type of market research. Every year, nearly 450 billion dollars is invested in various advertising campaigns. still, traditional ways for testing and predicting the success and efficiency of those advertising campaigns have usually failed because they depend on customers’ willingness and capacity to describe how they react or feel when they are exposed to an advertisement.

Published by: Yogesh Maniyar, Atif Ahmed, Yash TyagiResearch Area: Marketing

Organisation: Christ (Deemed to be University), Bengaluru, KarnatakaKeywords: Neuromarketing, Consumers, Packaging

Research Paper

86. Decentralized file sharing application in a global approach

Use of semantic technologies has been prevalent in sharing files and media over the internet. This project proposes a new cooperative file sharing and storage system that allows users to store, share and find files over a robust and scalable network. This system is based on peer-to-peer technologies and provides a self-managed, decentralized, efficient and distributed way to store and retrieve files on peer nodes. Each node donates storage space to the system. The system also provides its users with a global hierarchical directory structure to browse for files like a file-system maintaining RDF Graphs forming Ontology in individual systems with the implementation of peer to peer communication in global scenario overcoming the drawbacks of Network Address Translation using TCP Hole Punching technique.

Published by: K. Mohan Krishna, M. Kranthi Kiran, P. Kiran Kumar, M. Tejasmika, K. Ravi Teja Reddy, K. SandeepResearch Area: Semantic Desktop, Networking

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Resource description framework, TCP hole punching, Decentralized

Research Paper

87. Color detection and shade matching in dentistry

It is a challenge for every aesthetic dentist to determine and replicate the appearance of teeth, as it requires humility, patience and perseverance to mimic natural tooth to its closest sense and form. To provide the patient with an aesthetic restoration the dentist must consider the scientific basis of color as well as the artistic aspect. The shade matching using digital processing techniques gives accurate results by eliminating subjective errors. In this work, the captured image is processed through MATLAB in PC and the exact shade of tooth is determined.

Published by: Dr. S. Mangai, A. Mathi Vadhana, A. Arshiya, P. Gomathi, M. DiwakarResearch Area: Digital Image Processing

Organisation: Velalar College of Engineering and Technology, Erode, Tamil NaduKeywords: Tooth restoration, Shade detection, Image processing, Aesthetic

Research Paper

88. A rule based sentiment analysis in Telugu

Sentimental Analysis in the English language is a relatively easier task to perform as it has a predefined set of rules followed and accepted universally. But, when it comes to Indian languages, there isn’t a benchmark dataset. Moreover, if a dataset exists, it cannot be validated as a similar sentence may differ in the meaning as the regional languages are very unpredictable and have no proper rules. In this paper, we used a Rule-Based Approach for Telugu sentiment analysis using Telugu SentiWordNet. Here, we obtained the sentiment using SentiWordNet and validated the results using ACTSA which is an annotated corpus data set.

Published by: Pravarsha Jonnalagadda, Krishna Pratheek Hari, Sandeep Batha, Hashresh BoyinaResearch Area: Computer Science

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: SentiWordNet, SentiPhraseNet, PoS tagger

Review Paper

89. A review on three-dimensional performance analysis of wavy fin tube heat exchangers in laminar flow regime

In recent years, thousands of numerical and experimental studies have been performed on heat exchangers with different configurations. Mainly heat transfer and frictional characteristics have been studied in detail with respect to different geometrical parameters in various ranges of Reynolds number. Further, these studies have been cross-verified with researches already performed in this field. With the advent of new tools like CFD for the study of thermo-hydraulic characteristics, it has become easier to understand flow phenomena around the tubes for different rows and also in rest of flow regions. These studies also bring about some correlations so as to easily find the values of colburn and friction factor for various different geometrical parameters so as to suit the different industrial conditions and requirements. An overview of the work already done on plate-fin heat exchangers is presented in this paper.

Published by: Dhananjay Kumar Yadav, Amit KumarResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: Plate-and-fin heat exchangers, Wavy fins, CFD

Research Paper

90. Controlling game using head movements

The Project aim is to develop a game which replaces a computer mouse and keyboard for people who suffer from Acheiropody or Amputees. This application which can be stand-alone or web-based is based on tracking the head movements to control the actions in the game. This idea is an extension of a project from Tom Mitchell's “Machine Learning” book. We used neural networks to recognize the face and also to track the movements of the head, which requires us to have knowledge of the Tensor Flow framework which supports large computational power.

Published by: Bhavya Siripurapu, K. Rohini, P. Sumathi, A. Kranthi, Suresh KurmallaResearch Area: Neural Networks

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: TensorFlow, Mobile net, Depth wise separable convolution networks, Artificial Intelligence

Review Paper

91. A review on thermodynamic analysis of organic Rankine cycle with different working fluids

The development of the world today has largely been achieved through the increasingly efficient and extensive use of various forms of energy. Over the past decades, the growth in energy consumption around the world has shown that fossil fuel energy source alone will not be capable of meeting future energy demands. With the increase in fossil fuel consumptions, more and more industrial activities produce an increasing amount of waste heat. Energy generated as a result of industrial activities that are not practically utilized is referred to as industrial waste heat. Several studies have shown that the specific amount of industrial waste heat is poorly measured, it is estimated that 25 to 55% of the input energy in industries are actually used while the remaining are discharged as waste heat.

Published by: Sanjeev Kumar, Brijendra Kumar YadavResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: ORC, EES, Simulation model, Rankine cycle, First law efficiency, Second law efficiency, Turbine size factor

Survey Report

92. Secure data outsourcing in mobile cloud computing

With the popularity of mobile cloud computing, mobile devices are used to store/retrieve data to/from the cloud storage from anywhere at any time. Thus, cloud security issues become more severe. There are different studies conducted to solve cloud security problems. Due to the limited computing capabilities of mobile devices, most of the techniques are not applicable for a mobile cloud. Thus, a lightweight scheme is needed that can provide both confidentiality and integrity to the cloud data.

Published by: Vidhya Vijayan, Shandry K. K.Research Area: Computer Engineering

Organisation: College of Engineering, Kidangoor, KeralaKeywords: Mobile cloud computing, User revocation, Algebraic signature

Review Paper

93. Review paper on design and development of hybrid two wheeler

This work deals with the design and fabrication of hybrid two-wheeler system. In recent days availability of fuel is depleting day by day and also pollution is increasing globally with an increased number of vehicles. This leads to the evolution of various alternative fuels and concepts, in that HEV system (hybrid electric vehicle) is one of the effective systems. This paper involves the fabrication of two-wheeler which is driven by both fuel and electric energy with the help of engine and Electric motor. The electric motor is the hub motor which drives the front wheel which is driven by the battery and the engine drives the rear wheel. The goal of this paper is to implement the most efficient and less polluting vehicle. In our project, the hybrid vehicle model combines the internal combustion engine of a conventional vehicle with a battery and electric motor of an electric vehicle.

Published by: Ravikumar R., Chethan M., Neeloy Debnath, Ajay P. Kumar, Prajwal L SandyalResearch Area: Hybrid

Organisation: Acharya Institute of Technology, Bengaluru, KarnatakaKeywords: Hybrid vehicle, Fabrication, Two wheel hybrid vehicle

Research Paper

94. Optical wireless data transmission with Vigenere cipher encryption

The project is designed to share data with high frequency. And ultimately establish communication as secure as possible. For secure communication, the data is send using encoded form so the unauthorized user can’t access the data and if he receive data then data will be in the encoded format. So it’s of no use to an unauthorized user. This paper is based on the concept of Li-fi. Here, transmitted data are encrypted by a Vigenere cipher algorithm in order to ensure secured optical communication. Further, the encrypted data is decrypted on the receiver portion. In today's digitalized era, for the proper functioning of our daily professional life, we need effective communication. Whereas the limitations like low bandwidth and data rate in Wi-Fi, Microwave and RF along with EMI interference hampers the interactions. The Optical Wireless Data Transmission overcomes the above limitations. This innovative and new technology provides high-speed wireless access that offers significantly greater data capacity than Wi-Fi along with inherent security properties that eliminate unwanted external network intrusion. For security purpose, a secured encryption system has been designed based on the Vigenere Cipher technique which is impossible to break. The project consists of an LED at the transmitter section to transmit encrypted data which can be received at the receiver using the IR sensor by any angle with high reliability. In addition, the integration of wireless data transfer along with encryption generates a measurable reduction in both infrastructure complexity and energy consumption

Published by: Pooja Patil, Sayli Wangikar, Minakshi Patil, Rajendra MohiteResearch Area: Extc Engineering

Organisation: Bharati Vidyapeeth College of Engineering, Navi Mumbai, MaharashtraKeywords: Optical wireless transmission, LED, Data rate, Encryption, IR sensor

Research Paper

95. Three-dimensional performance analysis of wavy fin tube heat exchangers in laminar flow regime

The current study is focused on two fin configurations, the wavy-fin in-line and the wavy-fin staggered. These two fin configurations are numerically investigated in both staggered and in-lined tube layouts. Heat transfer and pressure drop characteristics of the heat exchanger are investigated for Reynolds numbers ranging from 200 to 2000. Model validation is carried out by comparing the simulated case friction factor (f) and Colburn factor (j) with the experimental data of Bhuiyan et al. [2013]. In this study the effect of geometrical parameters such as fin pitch, longitudinal pitch and transverse pitch of tube spacing are studied. Results are presented in the form of friction factor (f) and Colburn factor (j). This study reveals that the flow distinction between plain and wavy fin has a profound influence on the heat transfer and flow friction performance of these configurations when compared on the basis of tube layouts. For laminar flow conditions heat transfer and friction factor decrease with the increase of longitudinal and transverse pitches of tube spacing whereas they increase with fin pitches for both in-line and staggered configurations.

Published by: Dhananjay Kumar Yadav, Amit KumarResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: Heat transfer, Fluid flow, Laminar flow, Heat exchanger

Research Paper

96. Thermodynamic analysis of organic Rankine cycle with different working fluids

An ORC is a suitable means of carrying out this purpose. The ORC works with a high molecular mass organic working fluid with the characteristic of having a phase change of liquid to vapor occurring at a temperature which is lower than the phase change of water to steam for a given pressure. The recovery of low-grade heat can be achieved using organic fluids. These low-grade heat sources can be from biomass energy, solar energy, geothermal energy, and industrial waste. This work presents an analysis of the organic Rankine cycle (ORC) using R143a, R600a, R134a, and RC318 as working fluids under constant external conditions. An EES program has been developed to parametrically compare the first and second law efficiencies and turbine size factor with an increase in turbine entry temperature, heat source temperature, turbine efficiency and pinch point temperature difference.

Published by: Sanjeev Kumar, Brijendra Kumar YadavResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: ORC, EES, Simulation model, Rankine cycle, First law efficiency, Second law efficiency, Turbine size factor

Others

97. Scan and drive: An Android-based application

Recently we have noticed that there is huge congestion that is escalating at the toll plaza on the expressways and highways. These toll plaza mostly uses the traditional way of issuing toll ticket which causes heavy traffic of vehicles on the road. In the traditional way of issuing ticket manual ways are used because of which a lot of time is wasted of the travelers. To avoid such problems we are developing the android application which will make easier for the travelers to get the toll ticket without wasting any time. This application which will display the toll price of the different toll plaza and if you are visiting through that toll plaza you just need to make a payment online. After your payment, a QR code will be given to you and while visiting at toll plaza you just need to scan the QR code. QR code generated will be unique for each transaction made by the traveler.

Published by: Rahul Sirisilla, Akshay Loke, Neel Dave, Aditya ShetyeResearch Area: Information Technology

Organisation: Vidyalankar Institute of Technology, Mumbai, MaharashtraKeywords: QR code, Toll plaza, Transaction, Android application

Research Paper

98. SentiPhraseNet: An extended SentiWordNet approach for Telugu sentiment analysis

Sentimental Analysis in English language is a relatively easier task to perform as it has a predefined set of rules followed and accepted universally. But, when it comes to Indian languages, there isn’t a benchmark dataset. Moreover, if a data set exists, it cannot be validated as a similar sentence may differ in the meaning as the regional languages are very unpredictable and have no proper rules. In this paper, we used a Rule-Based Approach to build SentiPhraseNet. Here, we obtained the sentiment using SentiPhraseNet and validated the results using ACTSA which is an annotated corpus data set.

Published by: Abhinav Garapati, Naveen Bora, Hanisha Balla, Mohan SaiResearch Area: Natural Language Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: NLP, Sentiment analysis, POS tagging, Rule based, SentiWordNet, SentiPhraseNet

Research Paper

99. Artistic style transfer using deep learning

In this paper, we are implementing the style transfer using convolutional neural networks. The style transfer means to extract the style and texture of a style image and applying it to the extracted content of another image. Our work is based on the work proposed by LA Gatys. We use a pre-trained model, VGG 16 for our work. This work includes the content reconstruction and style reconstruction from the content image and style image respectively. Now the style and content are merged in a manner that the features of content and style are retained.

Published by: P. Mounica, A. Nagaratnam, Mohammad Farzana, K. MuralidharResearch Area: Neural Networks

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Style transfer, Artistic style, Content loss, Style loss, Gram matrix, VGG16, CNN, Texture transfer, Image synthesis, Imagenet

Research Paper

100. Finding rising stars in co-author networks

Finding rising stars is a challenging and interesting task which is being investigated recently in many organizations and Academic networks. This paper addresses the problem of finding rising stars in Co-author networks. Predicting future rising stars is to find talented researchers in Co-author Networks. An effort for finding rising stars named PubRank is proposed, which considers the mutual influence and static ranking of conferences or journals. In this work, modification of PubRank is proposed by considering attributes like mutual influence based on authors’ contribution, co-authors’ citations, the order of appearance and publication venues. This method can be effectively used for mining the Co-author networks to search for rising stars in the research communities and organizations.

Published by: Akil Reddy Gopavarapu, K. S. D. Sai Sowmya, B. Shanmuk Abhishek, P. Vinod BabuResearch Area: Computer Science Engineering

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Rising stars, Co-author networks, Citations, Author order, Publication venue score

Review Paper

101. Text mining methods and techniques- A survey

Text Mining is an area where the goal is to discover and extract information such as relations and patterns that are hidden in the Text. The main objective of this paper is to get a deeper knowledge of the text mining techniques and text classification methods used in text mining. This paper describes different methods and algorithms used in text mining like text preprocessing, vector-space model Information- Retrieval and TF-IDF

Published by: Shitanshu Jain, Dr. S. C. Jain, Dr. Santosh Kumar VishwakarmaResearch Area: Data Mining

Organisation: Amity University, Gwalior, Madhya PradeshKeywords: Knowledge discovery, Text mining techniques and methods

Research Paper

102. Effective width of cold-formed C-section by IS:801 and comparing it with AISI:2007

Buildings built with cold formed sections as primary members (frames) and secondary members (purlins) offers viable alternative solutions for wide range applications of social sectors like housing, education etc. Design of cold formed sections has obvious complexity in view of buckling of sections and stress in the compression element, especially in flexure. In this study, using IS: 801 equations, effective section properties of C section are calculated for a wide range of configurations with different b/t ratios for flange subjected to maximum allowable stress. The study also includes simple design tools and few standard colds formed sections having a similar configuration but for thickness to be used for residential or community shelters for different wind zones. A resource is made to compare the results with similar studies using AISI code.

Published by: Pratik Thakre, Pallavi P. Gawande, Ankur H. Akre, Sneha J. Rodke, Sachin D. Dadhey, Kushalkumar YadavResearch Area: Steel Structure

Organisation: J D College of Engineering and Management, Nagpur, MaharashtraKeywords: Cold formed section, Primary members, Buckling of section, B/T ratio, IS: 801, AISI

Review Paper

103. Review on the factors influencing tourist’s impulse buying behavior in luxury restaurants in Sri Lanka (reference to Kandy city)

Impulsive buying behavior is common and ordinary behavior that most people makes on purchasing from time to time. There are empirical studies that discussed the impulsive buying behavior of the customers. In Sri Lankan context as an emerging industry, most of the tourist follow impulsive buying behavior in the restaurants due to various reasons. Accordingly, paper investigates the concept of impulsive buying behavior and factors that influence to impulsive buying behavior in luxurious restaurants in Sri Lanka. Paper accomplishes research propositions in line with the empirical justifications encouraging future research priorities.

Published by: Jayasooriya S. S. W.Research Area: Tourism Marketing

Organisation: University of Kelaniya, Colombo, Sri LankaKeywords: Sri Lankan tourism industry, Impulsive buying behavior, Consumer buying behavior

Survey Report

104. Customer purchases in e-commerce by using big data – Literature survey

In the epoch of Bigdata, the customers view the surplus of the economy, while social commerce grows enormously. This paper started with the concept of providing the customers trustworthy product with reasonable discount and quality products in e-commerce websites. As well as, this determines the better product comparing some of the e-commerce websites. This is done by using the result of the dataset which comprises the details of distrust level, a range of discounts and the customer feedback that is analyzed using the Apriori algorithm in RStudio. The frequent quality product purchased is displayed to the customers in a user-friendly website.

Published by: Shobhanjaly P. Nair, Abhinayaa K. S., Arthi U., Harshini S.Research Area: Big Data

Organisation: Anand Institute of Higher Technology, Kazhipathur, Tamil NaduKeywords: Big Data, Apriori algorithm, E-commerce, Social commerce

Research Paper

105. Qualitative data analysis on contextual advertisements

The internet advertising market is growing day by day much faster than any other advertising platform. The technology and methods used for advertising online go more and more towards automated processes that analyze the content of the page and then matches the ads with these parameters. Advertisers in web pages like Facebook and LinkedIn have some preferred set of users they wish to reach by showing their ads. Some sites offer fine-grained sets of user characteristics – including their career, wealth, education information, etc — that advertisers can specify for targeting their audience, and each of these characteristics requires different amounts of money for targeting. Generating contextual advertisements for websites is a problem of growing interest. The recent $240 million investment by Microsoft in Facebook clearly reaffirms the opportunity in contextual advertising for online social networks. Content-contextual advertisement programs such as Google AdSense and Yahoo Contextual Match work by automatically spotting keywords in web pages and displaying ads based on the keywords. The displayed ads are also referred to as Contextual Advertisements. Contextual advertising allows advertisers to display ads relevant to the content of the website rather than using the data about the visitor. Contextual ads can complement the content. Contextual ads are very effective for particular kinds of content. Some studies indicate they can increase click-through rate by 63%. These ads are generally represented by a URL along with a textual description that is also used to match the ad with the target page. User activity on venues such as forums, marketplaces, and groups on social networking sites are excellent targets for monetization.

Published by: Bayyavarapu Kranthi Kumar, Dadi Sharmila, Buraga Srinivasa Rao, Gedda PoojithaResearch Area: Contextual Advertisements

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Content-based advertising, Contextual advertising, RAKE, Scrapy, Advertising

Research Paper

106. Developing an advanced smart parking system using IoT

Internet of Things (IoT) plays an important role in connecting the surrounding things of an environment to the network and provides easy access from the remote location. It is essential that the people should be update along with the growing technology. In a present world, there are numerous number of vehicles owned by the people. Due to this large number of vehicles, there will be a lot of discomfort for parking of a vehicle at public places such as shopping complexes, function halls, and cinema theatres. In such places it is very difficult to find an vacant place to park the vehicle, even though it is a paid facility along with the security guard. In this study we design an Advanced Smart Parking System (ASPS) which identifies the vehicle and displays an empty slot on the display at the entrance gate of the parking. So that the person will know whether there is any availability or not before entering into the parking place. This system of design also provides the shortest path from the entrance gate to the assigned parking slot by showing the directions through LED’s. This process of implementation does not involve human interaction except the payment collection.

Published by: Dharmana Satyanarayana, Mounika Dulla, Abhinav Andrews Giduturi, DVVR Sarat Chandra, S. PrathapResearch Area: Internet Of Things

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Automatic license plate recognition, Smart parking system, Available parking slots

Research Paper

107. Smart irrigation using IoT

Smart Irrigation can transform agricultural discipline from being manual and static to automatic and dynamic resulting in higher production with lesser human intervention. This model maintains the desired soil moisture level in the soil and sends the data to Arduino. The Arduino acts as a control unit. Based on the sensed values, water will be supplied to the plant which can help us to avoid over-irrigation and under irrigation. Water sensor is used to sense the amount of water still available in the tank. Information from the two soil moisture sensors will be regularly updated to the web page using WIFI module and message alert will be sent to the user. Sensor values are uploaded to the thingspeak channel to generate graphs for analysis, the same can be viewed in-app and motor can be controlled. Real-time data can be viewed in thingspeak cloud.

Published by: Himavamshi, Yamini R., Vishnu Chaithanya Reddy K.Research Area: Internet of Things

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Automation, Two soil sensors, Wi-Fi, Real-time data

Others

108. Smart mobile devices using ultrasound proximity networking model in IoT applications

For sending a small amount of data such as URLs, IoT commands or encryption key are extremely common in IoT applications. Smartphones are used to transfer text commands to interact with IoT devices. This application uses ultrasound as a means of data transmission for proximity networking on commodity, consumer hardware. This application closely examines different modulation or demodulation schemes that are inaudible to humans and achieve a high data transfer rate. This application is designed a library to run well on low- powered devices, and provide a socket-like interface for easy deployment. This helps protect users from various attacks improving the security of our system.

Published by: Saranya S., S. Suma Christal Mary, Gayathri N., Anushree K.Research Area: Networking

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Modems, Smart devices, Transceivers, Filters, Device-to-device computing, Internet of Things, Acoustics

Research Paper

109. Exploring the potentials, issues, and challenges for community-based tea tourism development (with reference to Hanthana mountains)

The community-based tourism could be one way of creating a more sustainable tourism industry. Community based tourism brings numerous benefits to the wider community by increasing the standard of living in rural areas, which helps in reducing migration to urban areas. The study begins with an assessment of potential tea tourism products that could be developed in the community of Hanthana and the neighboring communities. The research based on qualitative approach in-depth interview and potential identification tool to identifying the tea tourism potentials within the Hanthana area. According to the findings, Hanthana can remark as the most suitable place to promote the tea tourism in Sri Lanka. Paper accomplishes research propositions in line with the empirical and theoretical justifications encouraging future research priorities

Published by: Jayasooriya S. S. W.Research Area: Tourism

Organisation: University of Kelaniya, Colombo, Sri LankaKeywords: Sri Lankan tourism industry, Tea tourism, Community based tourism, Sustainable tourism

Research Paper

110. Harassment- The threat to engineers’ life

This study has been done to investigate the events of harassment happening in an engineering college in India. Here the pie chart has been used to analyze the data that we have obtained from engineering students. The places and different ways a student is being harassed is brought to light here. Based on the answers by the participants, suggestions or initiatives to be taken to reduce harassment is stated below.

Published by: Mugunthan B.Research Area: Social Science

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Harassment, Ragging, Findings, College, Engineering

Research Paper

111. Purification of Noyyal River by using phytoremediation technology

Noyyal River is one of the highest polluting rivers in India and heavy metals present in river water is out of standard level. The effluent water of textile industries and spinning mills present in Trippur district discharged into the Noyyal River which polluted the Noyyal river. Because of this contamination affects the crop yields and human health. But purification of River Noyyal by using physical and chemical methods are highly expensive and complicated. In this study phytoremediation technology used for the purification of Noyyal river. Lesser Indian reedmace (Typha angustifolia) serve as a phytoremediation plant which helps in the cleaning up of contamination from the polluted river. The test results show that after phytoremediation treatment COD, BOD, cadmium, chromium, lead, zinc, copper and mercury level gradually reduced within 0 to 15 days interval. Lesser Indian reed mace plant easily grows in the banks of the river. If plantation of Lesser Indian reedmace planted in banks of the river which helps on the removal of heavy metals present in the water gradually. From the result, it can be concluded that the phytoremediation technology is suited for purification of Noyyal river.

Published by: Abarna M., D. RoopaResearch Area: Environmental Engineering

Organisation: Gnanamani College of Engineering, Namakkal, Tamil NaduKeywords: Noyyal River, Phytoremediation technology, Typha Angustifolia, Lesser Indian reed mace

Review Paper

112. Review on haze removal technique using advanced dark channel prior filter

This paper reviews and correlates various haze removal techniques to improve the atmospheric light estimation because the intensity of the dark channel is a rough approximation of the thickness of the haze. Images of outdoor scenes are usually degraded by the turbid medium (e.g., particles, water-droplets) in the atmosphere. Haze, fog, and smoke are such phenomena due to atmospheric absorption and scattering. The irradiance received by the camera from the scene point is attenuated along the line of sight. Furthermore, the incoming light is blended with the air light. The degraded images lose the contrast and color fidelity. In poor weather condition, fog removal from an image is an unavoidable problem. Various methods of fog removal have been described in literature. Initially, methods using multiple images which included the use of polarization filter. This method suffers from high time complexity and requirement of multiple images, resulting in non-suitability to real-time applications. This leads to the development of single image fog removal technique such as Dark Channel Prior (DCP), Improved Dark Channel Prior (IDCP), Dark channel prior with Histogram Specification, Anisotropic Diffusion and Improved Dark Channel Prior using Guided Filter. In proposed method, the dark channel is used to improve the atmospheric light estimation because the intensity of the dark channel is a rough approximation of the thickness of the haze. This property is used to estimate the transmission and the atmospheric light. A number of techniques has been proposed by various researchers to improve the atmospheric light estimation and to calculate air-light. The main intent of this review paper is to study and compare the distinct techniques of haze removal along with its drawbacks

Published by: Rakesh Sharma, Maninder KaurResearch Area: Image Processing

Organisation: I. K. Gujral Punjab Technical University, Kapurthala, PunjabKeywords: Image, Dehaze, Haze, Air-light, Contrast, Attenuation, Dark channel

Research Paper

113. Experimental investigation of clayey sand with plastic gunny bag as reinforcement

The soil which is generally weak and possesses high deformation values in vast areas are covered with soil deposits having low shear strength and high compressibility. Clayey sands (SC) mostly tend to exhibit high liquid limit (LL) and plastic limit (PL). The technique of combining any two materials of different strengths to form a composite single material of greater strength is the frequent procedure followed in civil engineering practice. The soil is quite good in compression and weak in tension can’t bear the load alone. When a material of high tensile strength is introduced in the soil as a reinforcing material, the soil turns into a composite material and tends to possess relatively very high strength and attains the ability to carry loads of heavyweights. Reinforced earth is a technique primarily used to increase the ease of construction and cost-effectiveness. Keeping in view the research findings outlined about, in the present experimentation, it was carried out to investigate the efficacy of plastic gunny bags stabilizing the weak soil, thereby, improving the shear strength and bearing capacity of the soil. A systematic methodical process followed involving experimentations in the laboratory under controlled conditions. It was observed that 1cm thickness and 0.03mm thickness of plastic gunny bags with clayey sand effectively improved the shear strength and bearing capacity of the soil.

Published by: A. Harika, V. Jagadeesh, S. Navya Sri, P. Manikanta, Ch. Praveen KumarResearch Area: Geo Technical Engineering

Organisation: Gayatri Vidya Parishad College for Degree and P.G. Courses (A), Visakhapatnam, Andhra PradeshKeywords: Clayey sand, Reinforced earth, Plastic gunny bags, Shear strength, Bearing capacity

Research Paper

114. Brake pad wear detection using machine learning

Most of the vehicles use a brake disk and brake pad system to stop the vehicle. Brake pad wear is a very important parameter in this system it has a direct effect on the braking performance of the vehicle. A machine learning approach, without using any intrinsic properties like the coefficient of friction of the brake pad material or the area of the brake pads or the composition of the brake pad material, has been proposed. The braking performance of the vehicle is reflected in its stopping distance and hence it is essential to relate the stopping distance and the brake pad wear. The same has been proposed in this document.

Published by: Chetan C. Harlapur, Priyatamkumar Kadiyala, Ramakrishna S.Research Area: Machine Learning, Automobile

Organisation: KLE Technological University, Hubballi, KarnatakaKeywords: Brake pad thickness, Stopping distance, Multivariate linear regression, Second order curve

Research Paper

115. Gesture based car control with gyroscope sensor and IoT based controlling

With many new devices to control the daily life products, we have our smart phones, when connected to a network with suitable supporting software is capable of controlling many other objects or devices it is connected to via the network. These Devices use any one of the protocols available for Internet communication to communicate between them. A Web controlled vehicle system is presented in this project work. It highlights the idea to develop a remote-controlled car which can be driven from within the car using the Internet over a secured server. This car has Ultrasonic sensors to measure the safety distance between itself and any other vehicle or any other obstacle. The main goal here is to minimize the work done or needed to drive a car with ease of driving experience. At the same time, the car will assure comfort and convenience to the controller. A miniature car including the above features has been developed which showed optimum performance in a simulated environment.

Published by: Kalaichelvan M., S. Sathiyapriya, Ch. Sai Ravi Teja, Jinka SumanthResearch Area: Microcontroller

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Remote control, IoT, Vehicle

Research Paper

116. Case study on LinkedIn, a media for career development

Social media is becoming a necessity in today’s world, more than ever before. Social media is delivering everything we want to know about pretty much anything, in a split second, and at our fingertips. While some embrace it and use social media regularly, others still don’t for multiple reasons; finding it difficult or they don’t want it to be intrusive or a mainstay in their lives. There are also more contemporary methods of obtaining professional contacts, such as networking online. Social networking sites such as Facebook, Twitter and LinkedIn are ideal for contacting and becoming noticed by employers that you otherwise wouldn’t have been able to speak with in person. For instance, did you know that according to the Bullhorn Reach Report, 97% of users registered with LinkedIn use it to source candidates for jobs? LinkedIn has several groups that you can engage in to showcase your knowledge and allow you to meet new people. This paper attempts to Highlights to understand. To know the various application usages, To know the purpose of using the LinkedIn, To know the role of LinkedIn in networking professional. & To know various professionals using it for career development. The results revealed that 44% of the respondents used LinkedIn for getting knowledge, to maintain relationship with professionals and for developing their career, 44% viewed LinkedIn is ranked as excellent in application usage, 46% said that LinkedIn meet their needs very well, 50% of the respondents said somewhat agreed that LinkedIn has helped them in networking professionally& 70% responded that they use LinkedIn for their profession.

Published by: Dr. Veena C. AngadiResearch Area: HR

Organisation: Global Institute of Management Sciences, Bengaluru, KarnatakaKeywords: Social media, Career development, Application usage

Research Paper

117. Luminance-chrominance-gradient high dynamic range imaging with improved bitonic filter tone mapping technique

In this paper, we will discuss a new process for High-Dynamic-Range Imaging. In contrast to the traditional method, we are processing the High-Dynamic-Range imaging process in luminance-chrominance-gradient space rather than RGB space. The main motive is to get the more efficient technique and also to avoid color-distortion generating from three different color channels. We introduced a camera responsive function for luminance channel so that we can find out the HDR luminance. On the other hand, for chrominance channels, we introduced weighting in relation to the saturation level. Our technique produces more natural tone-mapped images with more information. Once the luminance, chrominance, and gradient values are extracted from the image, based on logarithmic of the luminance value, the tone mapping technique approximates the appearance of the HDR image. In local tone mapping, there is a detail loss, artifact and higher computation time because of the tone mapping technique. To increase the image quality and to increase the performance of tone mapping is the main idea of the research. Improved Bitonic Tone Mapping (IBTM) is a new technique proposed for efficient tone mapping. In this method, edges have high weights than flat surfaces and a weight factor is added to the bitonic filter. When compared to different tones mapping algorithms like Reinhard, Drago, Exposure, and Gamma, Local adoption etc. shows that from the proposed technique we can achieve higher performance.

Published by: Ravi Teja Sankuratri, B. Ravi Kiran, Mohan Teja Chitturi, Pavan Kumar Rudhramahanti, Samhita RevuResearch Area: Image Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Improved bitonic filter, Luminance, Chrominance, Gradient, Tone mapping, High-Dynamic-Range

Research Paper

118. Land use and land cover change detection for Velachery using remote sensing and GIS techniques

The knowledge of land use/land cover changes is very important in understanding natural resources, their utilization, conservation, and management. Though urban growth is seen to be a worldwide phenomenon, in countries like India the rate of urbanization is very fast. India possessed a number of fast-growing cities. This paper presents the land use/land cover changes that have taken place in Velachery, from 2008 to 2018. To classify the urban land use and land cover supervised classification method has been employed. The GIS is used to prepare the different layers belonging to various land uses identified from remotely sensed data. The land use and land cover classification maps were prepared through Remote sensing and GIS technology. Nowadays in the analysis of temporal data at the district and city level, Remote sensing and Geographical Information System have gained great importance as vital tools in the analysis process. The results indicate that there was a significant increase in the built-up land decrease in the vegetation.

Published by: S. Thangaperumal, S. Aishwarya, H. GowsalyaResearch Area: Civil Engineering

Organisation: St. Joseph's College of Engineering, Chennai, Tamil NaduKeywords: Land use and cover, Change detection, Urban growth, Remote sensing, Geographical Information System

Review Paper

119. IoT based crack and pollution detection using Raspberry pi

The IoT integrate heterogeneous end system, which provides open access to a large selected set of information for the advancement of digital service. To surveil the safety of high rise buildings and the small deform of surroundings by contaminants are a pivotal task. We should ensure the fire safety, safety from excessive loads, vibrations, etc…. and it is essential to observe the strength of the clear-cut constructions in the event of infrastructures and we should ensure the environmental changes around us because of natural changes in the habitat. In recent years, a major consideration should be given to framework health monitoring technology to Diagnose condition of the framework using a sensor attached to them, and the number of research projects on the health monitoring of architectural structures is on the rise. If life-cycle cost is to be reduced for the building from fabrication to sustainment, much attention should be given to strength of the building. The detecting issues on the crack and pollution in the buildings play a major role in our project. Cracks can significantly increase the rate of gas and liquid transport into a structure. Although there is a general awareness that cracking can be caused when the building is not that much strength to face external issues. The cause of the cracking is important as it may have profound implications on the crack morphology, which can greatly influence the relative contribution to transport and the subsequent impact on overall performance. Prevention is better than cure, we need to be alert before the pollution level crosses the safer limits and to monitor the building before the arrival of distracts.

Published by: Jayachitra R., Kanusiya Devi T., Johned Blessy J., Harihara Sudan K., M. VivekkumarResearch Area: Embedded and IoT

Organisation: Sri Eshwar College of Engineering, Kondampatti, Tamil NaduKeywords: Raspberry Pi, Python IDE, Sensors, Crack, Pollution

Research Paper

120. Agricultural mapping and statistical analysis of Thanjavur district using remote sensing and GIS

Mapping and analyzing the agricultural lands using remote sensing and GIS technique is faster and cost-effective compared to conventional site verification method. Thanjavur is a district in Tamil Nadu which rich in agriculture. It is a lower riparian of Cauvery river. It is rich in alluvial soil, but its crop production is falling due to urbanization and water insufficiency. Failure of monsoon and insufficient river water are also major reasons. Since agricultural lands are depleting, the cost of agricultural products is increasing. LANDSAT 7 imagery is processed using ARC MAP 10.4 and classified using ERDAS IMAGINE 2014. By analyzing the results obtained through the process for decade 2009-2018 we concluded the percentage in area change for agricultural lands with crops and without crops, barren lands, urban areas, and water bodies. The study is to determine the drop in agricultural lands and its causes.

Published by: Thangaperumal S., T. Velan, J. Gnana JeevaResearch Area: Civil Engineering

Organisation: St. Joseph's College of Engineering, Chennai, Tamil NaduKeywords: GIS, LANDSAT, ERDSAS, Urbanization, Remote sensing

Research Paper

121. Automatic Waste Management

With an increase in population, the situation of cleanliness with relevancy garbage management is degrading hugely. The overflow of garbage publicly areas creates unhealthful condition within the surroundings. It is going to unfold many serious diseases amongst the folks living close. It conjointly degrades the valuation of the realm. To avoid this and to boost the improvement, Garbage Management System is projected during this paper. This paper presents a system to spot a garbage full condition which is able to be set by sensors (weight and level) during a timely manner and to alert the area |room} concerning constant. The role of the room is to seek out the current standing of auto and to send the SMS to the motive force alongside garbage container’s position. the motive force would then attend a given location and collect the rubbish. With the assistance of the system, we are able to offer an answer to this problem in Garbage Management System.

Published by: Manisha Rawal, Asha Sale, Mohammad Sayed, Rohan Mishra, Hrishikesh KagdeResearch Area: Electronics and Telecommunication Engineering

Organisation: Bharati Vidyapeeth College of Engineering, Navi Mumbai, MaharashtraKeywords: Sensors, Garbage management, Control room

Review Paper

122. Antibiotic Prophylaxis before dental procedures in patients at risk of Bacterial Endocarditis, a review article

Several studies show that dental procedures especially in case of gingivitis, peri-apical lesions and periodontitis with inflamed periodontal tissues or infected pocket epithelium surrounding the teeth may be a cause of bacterial invasion through the bloodstream and resulting in Infective endocarditis which is a severe disease that may affect the heart valves or the endocardium. The most common bacteria responsible for bacterial endocarditis are alpha-hemolytic streptococci like Streptococcus viridians but oral pathogens like Eikenella corrodens, Aggregatibacter actinomycetemcomitans, Capnocytophaga, and Lactobacillus species can cause bacterial endocarditis. In this review, we searched the United States National Library of Medicine at the National Institutes of Health (PubMed) to make out all articles that included the terms endocarditic, prophylaxis, oral or dental in the title. Several published sources of information relating to dental procedures, bacteremia, and infective endocarditis were reviewed. This review is focused on the patients that need prophylactic antibiotics and the recommended antibiotics for adults and children for dental procedures in which the prophylaxis is necessary. Antibiotic prophylaxis is indicated for patients with prosthetic cardiac valve, history of infective endocarditis, distinct Congenital Heart Diseases (CHD) and Cardiac transplant recipients with cardiac valvular disease. The most important pathogen responsible for endocarditis during dental procedures is S viridans (alpha-hemolytic streptococci). Antibiotic regimens for endocarditis prophylaxis are used against S viricians, and the recommended standard prophylactic regimen is a single dose of oral amoxicillin. For patients with high cardiac risk, antibiotic prophylaxis is recommended for all dental procedures like manipulation of gingival tissue or the periapical area of teeth or perforation of the oral mucosa.

Published by: Ali Forouzanfar, Hamideh Sadat Mohammadipour, Lohrasb DehghaniResearch Area: Dentistry

Organisation: Mashhad University of Medical Sciences, Mashhad, IranKeywords: Bacteremia, Infective Endocarditis, Oral, Dental procedures

Research Paper

123. Analysis in the changes in Chennai-Pallikaranai Wetland

The deterioration of Wetlands has become a devastating issue in the current scenario. Wetland, being the source for several species is a major Biodiversity which is under extreme danger. These wetlands also play a major role in flood control and in groundwater recharge. The major cause for this problem is Urbanization and Industrialization. The change caused in these wetlands reflects on its biodiversity which depletes the natural resources in and around the area. Based on its extent of deterioration, respective remedial measures might be taken to replenish the environment and in saving the endangered species. This could be achieved by the help of several LANDSAT images from USGS and with the help of remote sensing software ArcGIS. This project shows various wetland maps for Pallikaranai from 2008 – 2018, compares the rate of depletion/expansion of wetland’s water surface area and identifies the variation in dump yard area in the Pallikaranai wetland. The results indicate that there was a significant increase in the dump yard area land.

Published by: Thangaperumal S., Barath E.Research Area: Civil Engineering

Organisation: St. Joseph's College of Engineering, Chennai, Tamil NaduKeywords: Deterioration, Wetlands, Biodiversity, Remote sensing

Survey Report

124. Facebook spam detection

SPAM is any unwanted message or material in any form posted by so many fake peoples. Social networking sites play an important role because near about all peoples are spending more time on social sites just like Facebook, Instagram, We-chat, WhatsApp. The main thing is that all spammers know they can easily spread spam or fakes news through social sites. This project also provides the reason how user become victim to spam attack. A technique is proposed in the end discusses how to handle different types of spam or fake news.

Published by: Sajid Shaikh, Chaitali Jagdale, Mrunali Ghate, Sharad BabarResearch Area: Social

Organisation: MIT Polytechnic, Pune, MaharashtraKeywords: Facebook, Spam Detection, Caption, Spam, Secure Post

Thesis

125. Automation in body control module of a car

The number of automobile users is increasing day by day. At the same time, the number of people prone to accidents continues to rise. This is because drivers are exposed to a number of distractions. In order to reduce this, automation came into existence. Over the past two decades, the automotive industry has aggressively researched ways to exploit modern computing and electronic advances in body control modules to provide safety, reliability, comfort and entertainment technologies for users. In this paper, the automation system deals with the development of a Body Control Module (BCM) including features providing automatic control of windshield wipers, headlamps, sunroof, power window regulators with an anti-pinch feature. Developments of these features were accomplished using a PIC micro-controller 16F877A along with components like sensors, actuators, current drivers & signal conditioning circuits. The developed automation system is tested on a general purpose PCB with DC motors and LED.

Published by: Madhu A. R., Pradeepika R., Sandhiya P.Research Area: Engineering

Organisation: R. M. K. Engineering College, Kavaraipettai, Tamil NaduKeywords: BCM, Sunroof control, Power window, Anti-pinch, Windshield wiper, Headlight control, PIC16F877A

Review Paper

126. PSoC based haemoglobin measurement system

Globally, anemia is ranked to be the third killer disease and it continues to be a serious problem for health as well as social and economic development. It is estimated that iron-deficiency anemia affects 42% of children under age 5 and 53% of children from 5 to 14 years of age. In worldwide, the majority of the 56 million pregnant women and 468 million non-pregnant women affected by anemia live in sub- Saharan Africa and Southeast Asia. Also, children affected by anemia will result in impaired cognitive performance, motor development and language development. This project is that of a hemoglobin measurement system using PSoC. Hence the proposed project aims at constructing a non-invasive system for haemoglobin measurement.

Published by: Meera N., Akilandeswari S., Revanth S., Venkata Vivek, Veera AmudhanResearch Area: Electronics and Communication Engineering

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Haemoglobin, PSoC, LED

Research Paper

127. Smart Street light system using IoT

Nowadays conservation of energy is an essential part of day and day by day energy resource are getting reduced so our generation may face a lot of problem due to this lack of resource. In order to save energy, we have automated the street light which helps cities to save energy, cost and maintenance. The project aims to describe a method for modifying street light illumination by using sensors at minimum electrical energy consumption. When presence is detected, all surrounding street lights glow at their brightest mode, else they stay in the dim mode. LED bulbs shall be implemented as they are better than conventional incandescent bulbs in every way. This shall reduce heat emissions, power consumption, maintenance and replacement costs and carbon dioxide emissions. Also, a demonstration with a real-time prototype model involving costs and implementation procedure has been developed using the internet of things (IoT) to visualize the real-time updates of street processing and notifying changes to occur. The street light will obtain power from the solar panel. During the rainy season, it gets power from the government supply.

Published by: Kiruthika M., Kaviya R., Indhuja M.Research Area: IoT

Organisation: RMK Engineering College, Gummidipoondi, Tamil NaduKeywords: Street light, LDR Sensor, PIR Sensor, Solar Panel, IoT

Research Paper

128. Design and fabrication (development) of e-bike

The technology has been changing day by day, every day new invention and new technology will arrive. Whenever a new technology invented is to solve a past, existing problems. In this era the major problem is pollution and future problem is fossil fuel scarcity. In order to solve these problems, much new technology has been invented. In this invention, one of the best inventions is electric vehicles. These vehicles are free from pollution and also it will help to preserve some amount of fuel to the future generation. The current rate of usage of fuels continuously for the next 5 decades there will be arising of fuel drought.

Published by: K. Sai Chandu, G.M.V Siva Kumar, Kannaji, B. Kiran Kishore, P. Rama KrishnaResearch Area: Design

Organisation: Avanthi Institute of Engineering and Technology, Narsipatnam, Andhra PradeshKeywords: Bi-cycle , Motor (BLDC Motor with Hub), Battery, Dynamo, Throttle, LED Light

Research Paper

129. Maximize lifetime of Wireless Sensor Network by optimal sink deployment and sensor to sink routing

Wireless sensor networks typically contain hundreds of sensors. The sensors collect data and relay it to sinks through single hop or multiple hop paths. Sink deployment significantly influences the performance of a network. Since the energy capacity of each sensor is limited, optimizing sink deployment and sensor-to-sink routing is crucial. In this paper, this problem is modeled as a mixed integer optimization problem. Then, a novel layer-based diffusion particle swarm optimization method is proposed to solve this large-scale optimization problem. In particular, two sensor-to-sink binding algorithms are combined as inner layer optimization to evaluate the fitness values of the solutions. Particle swarm optimization constitutes currently one of the most important routing algorithms. Its popularity has stimulated the emergence of various variants of swarm-inspired techniques, based in part on the concept of pairwise communication of numerous swarm members solving the optimization problem in hand. PSO is a population-based optimization method. PSO consists of a swarm of particles which move towards an optimal solution of the problem. Particle uses their position and velocities (P Best & G Best) to find an optimal route. This paper show better result of Maximizing lifetime of wireless sensor networking by using PSO routing Fully Informed Particle Swarm Optimization (FIPSO) and Diffusion PSO Performance of those algorithms is also evaluated over a set of benchmark instances Compared to existing methods that the sinks are selected from candidate positions, our method can achieve better performance since they can be placed freely within a geometrical plane. Several numerical examples are used to validate and demonstrate the performance of our method. The reported numerical results show that our method is superior to those existing. Furthermore, our method has good scalability which can be used to deploy a large-scale sensor network.

Published by: Manpreet SinghResearch Area: Wireless Sensor Network

Organisation: Adesh College of Engineering and Technology, Faridkot, PunjabKeywords: Wireless Sensor Network, Sink placement, Particle Swarm Optimization (FIPSO and Diffusion PSO), Lifetime, Energy

Research Paper

130. Bus tracking system using Android and web application

Transportation becomes very difficult in cities like Mumbai. The public transports, especially BUSES are developing around the globe. Such public transports reduce the usage of personal vehicles so reducing fuel consumption and mollifying traffic congestion. The problem with BUSES is that the commuters DO NOT know the exact temporal arrangement of the arrival of BUSES at their stops. This leads to looking ahead to BUSES for 30-35 minutes because the commuters are not aware of what time exactly the BUS is to arrive. The approximate arrival time of BUSES is known but there could also be a delay in arrival thanks to traffic. Seeing that people started avoiding public transports and started victimization non-public vehicles, many applications were developed; but these applications were unable to mitigate the problems. Some applications provided only the arrival time and point in time of BUSES at their supply and destination. Some of them provided time-tables, but even they weren't correct as they failed to contemplate the delay thanks to unpredictable factors like – traffic, harsh weather situation, etc. The timetables were not timely updated leading to waiting for BUSES.

Published by: Mayur Kharat, Manoj Mishra, Sanket Panchal, Pooja Walve, Suyog KadgeResearch Area: Engineering

Organisation: Atharva College of Engineering, Mumbai, MaharashtraKeywords: Arduino, LED display, Wi-Fi module, JAVA JDK, ANDROID STUDIO 3.1, ASP.NET

Case Study

131. Anomaly detection in code base

Any product when under development, goes through numerous changes before finally being released to the customer. While these changes are being done, it adds new features, modifies existing ones. How do we know if a product is in good shape to be released? Yes, we test the product, run the existing unit, functional, performance tests etc. What if the number of tests is in 10000s. How do we analyse each test result? Is there an automated way to detect the overall health of the product using the results of regression tests? Anomaly Detection using machine learning algorithms gives us a way to find out the overall health of the product. Using Anomaly Detection, we can quickly find out about the code base and if new changes should be allowed in before the existing code base is stabilized. It helps to determine, how far the existing code base is away from being released to the customer. It can help the code base to be almost always stable irrespective of the number of code changes that are merged into it.

Published by: Sudipto NandanResearch Area: Machine Learning

Organisation: Oracle India Private Limited, Bengaluru, KarnatakaKeywords: Anomaly detection, Regression results, Isolation forest, Principal Component Analysis

Survey Report

132. Twitter sentimental analysis

This paper presents the effectiveness of linguistic features to identify the sentiment of Twitter messages using the apache storm framework. We calculate the effectiveness of present lexical resources and features that capture information about the informal and creative language used in microblogging. In the past few years, there has been a huge growth in the use of microblogging platforms such as Twitter. Influenced by intensification, companies, and media organizations are increasingly seeking ways to excavate Twitter information about what people think and feel about their products and services. Here we download Twitter messages for a particular hashtag and carry out sentiment analysis i.e. to find a positive, negative or neutral sense of that tweet using apache storm framework. Each hashtag may have 1000 of comments and new comments are added every minute, in order to handle so many live tweets we are using apache storm framework.

Published by: Mandar Menjoge, Vedant Bhawalkar, Mazhar Sayyad, Jainam GosaliyaResearch Area: Social

Organisation: MIT Polytechnic, Pune, MaharashtraKeywords: Sentiment analysis, Apache storm framework, Preprocessing, NLP, K-means clustering, Porter stemming algorithm

Case Study

133. Fire monitoring system using RF module

The objective of this project is to design and monitor system for the fire alerts in the surrounding environment using Flame sensor. It is transmitted wirelessly using an RF module. The output is displayed in LCD and Lab-VIEW GUI.

Published by: Vedashree J., Abinaya S., Ganesh Babu C., Muchenedi Hari KishorResearch Area: Embedded

Organisation: Bannari Amman Institute of Technology, Erode, Tamil NaduKeywords: Open-source platform, Flame sensor, Lab-VIEW

Research Paper

134. Forensic Criminology

This research focuses on the history development of forensic science and also shed light on the fusion of science and law that is how forensic science has brought in the administration of justice. This research aims to point out the flaws in the laws with reference to forensic evidence.

Published by: Barani ManikantanResearch Area: Role of Forensic Science Under Law

Organisation: CMR Law School, Bengaluru, KarnatakaKeywords: Forensic, Criminal justice, Judicial approach

Research Paper

135. 3D reconstruction of regular objects from multiple 2D images using a reference object

The dimensional analysis of an object from an image reduces a lot of burden for a user, like the traditional measuring tape method. Using the dimensions will make reconstruction of the 3D model of the real-time object easier. However, this method is not used in the current implementation. Dimensional analysis can also be helpful in online shopping where the user’s availability for fitting is not possible. 3D model replaces the fitting stage in online shopping. Once the dimensions of an object’s surface are found, it is easy to calculate surface areas, given surface areas we can calculate volume. But the calculation of volume requires more than one dimension of the object. In this paper, an approach using a reference object, whose real-time dimensions are already known is used. The whole process is divided into three tasks - Object detection using SURF algorithm, Dimensional Analysis of the 2D object using pixel per metric ratio given that there is a reference object on the same plane and 3D reconstruction using Structure from Motion algorithm.

Published by: Krishna Sai Joga, K. Kavya Sree, Navya Spandana, G. Gowri PushpaResearch Area: Image Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Object detection, SURF, Dimensional analysis, Pixel per metric, 3D reconstruction, Structure from motion

Research Paper

136. Secure distributed cloud service using trusted third party

Cloud storage is a system with a distributed data center that takes advantage of virtualization technology and provides an interface for data storage. It makes servers or data centers able to work together for conveniently sharing and accessing resources. Enterprise cloud user demand that there is a secure supply chain and that every step in that supply chain can be verified in real-time and when things go wrong it is more possible to figure out what went wrong and that there is someone who can be held accountable. Before storing data to an untrusted cloud server, some measures should be adopted to guarantee the security of data. However, the communication overhead will increase when users transmit files encrypted by traditional encryption schemes. Remote data integrity checking enables a data storage server to prove to a verifier that it is actually storing a data owner’s data honestly. We use Hadoop file system to provide high throughput access to user data. If the semi-honest cloud server does not delete the data honestly and returns an incorrect deletion result, the misbehavior of the cloud server can be detected by the data owner with an overwhelming probability. The user cannot deny after requiring the cloud server to delete the data. This implies that the proposed scheme can support traceability.

Published by: Hari Kumar P., Chandra Sekar S., Dinesh Kumar V., Gopikrishna G.Research Area: Cloud Computing

Organisation: SRM Easwari Engineering College, Chennai, Tamil NaduKeywords: Data integrity, Cloud storage, Cloud security, Hadoop file system

Research Paper

137. A study on impact of stress levels among students using random forest algorithm

Mental health presents one of the greatest and real challenges to the current generation of students. The competitive lifestyles cause them to manage different challenges to achieve their goals and people to be eager to achieve something, causing them to manage multiple frustrations and demands. In this pressurized and highly technical environment, anxiety disorders have slowly occupied their mental health. Nowadays Generalized Anxiety Disorder (GAD) is one of the mental health problems among students. It has been reported that about 2-5% of them. Here our raw data like questionnaire is a valuable resource, but it is underutilized at some circumstances. It could potentially be converted into useful and understandable knowledge via data mining technology. Data mining is capable to identify hidden patterns and relationships that can be used for predicting different disorders. For effective prediction, the random forest approach is one of the classification data mining techniques which produces good predictive characteristics. Therefore, this research adopts a random forest approach to predict different disorders like Generalized Disorder, Anxiety Disorder, Depression, and the accuracy of the predictive result is reported.

Published by: Pinninti Kusuma, Dokkari SivaResearch Area: Data Mining

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Data mining, Random forest, Generalized anxiety disorder, Knowledge

Research Paper

138. Neonatal incubator monitoring system using IoT

There are many innovations occurring in the medical field like needle-free diabetes, robotic check-up, etc. But still, medical accidents are happening in today world due to improper care which even leading to death. We are aware that many infants were dead in recent times due to both human error and machine error. Hence we discuss the advancements that can be brought to the present machines such that the newborn babies would be safe and thus leading to the prevention of accidents that occur in the incubator. To control the accident, need to monitor continuously with better involvement, it is done only through automation. The medical staff can monitor anytime, anywhere. Prevent the infant from the fire and also keep them safe.

Published by: Vignesh T. C., Jai Kumar S., Hari Krishna R., Krishna Raj M.Research Area: Information Technology

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Health, Monitoring system, Nenotel patients, Incubator alert messages

Research Paper

139. Deforestation: A quantitative analysis using remote sensing and GIS

Deforestation and forest degradation are the second leading causes of greenhouse emissions and fossil fuel combustion, which is responsible for over 17% of global carbon dioxide emissions. Deforestation and forest degradation have become an important issue concerning climate change mitigation, highlighted in the Governmental Panel on Climate Change Fourth Assessment Report in 2007. About 75% of the emissions from tropical deforestation and forest degradation have been from developing countries containing large areas of tropical forest, including India. Global initiatives such as the United Nations Framework Convention on Climate Change program on Reducing Emissions. In this thesis, we are mapping about the deforestation for maintaining future of living organisms.

Published by: Thangaperumal S., k.Jaya Surya, Anbin B. BervinResearch Area: Civil Engineering

Organisation: St. Joseph's College of Engineering, Chennai, Tamil NaduKeywords: Deforestation, Remote sensing, Mapping, Forest degradation

Research Paper

140. Impact of CSR Spending on firm’s financial performance

This paper examines the impact of CSR spending on the firm’s financial performance. The government has made CSR spending mandatory by which the organizations can significant contributions to the benefit of the public. The data for the study was collected for 5 years and the study takes into consideration the top ten companies for CSR spending. In order to find out whether CSR spending has an impact, three variables are taken into consideration such as ROA, EPS, Net Profit. Independent Pooled OLS Regression, Fixed Effect and Random effect method was used. The findings were that the Net profit has a significant relationship with the CSR Spending whereas ROA and EPS have no impact.

Published by: Grizel MenezesResearch Area: CSR

Organisation: Christ University, Bangalore, KarnatakaKeywords: CSR Spending, Financial Performance, EPS, ROA, Net Profit

Research Paper

141. A study of groundwater quality and mapping using GIS techniques in Kodungaiyur, Chennai

Groundwater quality in Kodungaiyur, Chennai district has special significance and needs great attention of all concerned since it is the major alternate source of domestic, industrial and drinking water supply. The present study monitors the groundwater quality maps using GIS techniques for a part of Kodungaiyur. Physico-chemical analysis data of the groundwater samples collected at predetermined locations forms the attribute database for the study, based on which, spatial distribution maps of major water quality parameters are prepared using curve fitting method in Arc View GIS software. GIS has been used extensively to assess the water quality all over the world, advancement of Geographical Information System (GIS) and Spatial Analysis help to integrate the laboratory analysis data with the geographic data and to model the spatial distributions of water quality parameters, most robustly and accurately. The objective of the study is to evaluate the water quality map in Kodungaiyur. For this purpose, Inverse Distance Weighed (IDW) spatial interpolation technique has been used to estimate the spatial distribution of the water quality parameters and WHO standards. The results are compared with WHO permissible limits from the point of view of the suitability of groundwater for human consumption.

Published by: S. Thangaperumal, S. Monica Shree, D. P. Noel Bhuvana RaniResearch Area: Civil Engineering

Organisation: St. Joseph's College of Engineering, Chennai, Tamil NaduKeywords: Groundwater, Quality, GIS, Image interpretation, Thematic, Spatial distribution, Attribute database, Water quality Index

Review Paper

142. Towards privacy preserving content based image retrieval in cloud computing

Content-Based Image Retrieval applications have been rapidly developed along with the increase in the quantity availability and importance of images in our daily life. However, the wide deployment of Content-Based Image Retrieval scheme has been limited by its the server computation and storage requirement. Privacy-Preserving Content-Based Image Retrieval scheme, which allows the data owner to outsource the image database and Content-Based Image Retrieval service to the cloud, without revealing the actual content of the database to the cloud server. Local features are utilized to represent the images, and Earth Mover's Distance is employed to evaluate the similarity of images. The proposed scheme transforms the Earth Mover's Distance problem in such a way that the cloud server can solve it without learning sensitive information. The security analysis and experiments show the security an efficiency of the proposed scheme using a Secure Hash Algorithm.

Published by: M. Meena, C. S. Kavya, K. Balaji, M. Kishore, P. Suman KumarResearch Area: Computer Science

Organisation: Mother Theresa Institute of Engineering and Technology, Chittoor, Andhra PradeshKeywords: Cloud Computing, Searchable Encryption, Image Retrieval, Local Search, Earth Movers Distance

Research Paper

143. Any time medical assistance and medicine vending machine using machine learning

This research aims to bring one step solution to the people for their medical treatment which includes online diagnosis, online consultation with medical experts and providing generic medicines. A major advantage is that people can access this ATMAMVM in public places available 24x7. This project provides basic medical treatment facilities within the reach of the people not benefited so far due to their location and also in concern of physically challenged and aged people. It is mainly focused to treat minor health ailments and to provide first aids.

Published by: Sivasubramaniyan S., Srivarshini M., Deepthi P. S., Dr. Janarthanan P.Research Area: Healthcare Using Computer Science Technology

Organisation: Sri Venkateswara College of Engineering, Sriperumbudur, Tamil NaduKeywords: Medical equipment, Patients, Drugs/medicines

Research Paper

144. A study on stress and its management among young adults- An empirical study

Stress is a physical, mental or emotion factor which causes mental tension. Everyone needs stress free life irrespective of their life span. But how many do live stress-free life is the big question nowadays. Stress has become a common worry for every individual in this present generation people. Mainly students are facing lots of stress from different factors and are not able to control their stress levels and suffer with some health issues which are a huge damage for the younger minds of this generation, which in turn damages the new ideologies which are to be generated as the nation’s development is in the hands of young minds. The main objective of the study is to find the stress levels and reasons of stress and the ability of handling stress among young adults (17-22 years) and the sample size is 84 where 64 males and 24 females are responded for the survey and data is collected through primary data collection method with a questionnaire of 25 questions and the results found the factors and level of handling stress among them.

Published by: P. Sai Dheeeraj Reddy, P. Venkata Subbu PadminiResearch Area: Business Administration

Organisation: Sree Vidyanikethan Institute of Management, Tirupati, Andhra PradeshKeywords: Stress, Younger minds, Generation, Ideologies

Research Paper

145. Footings resting on a trench of waste glass material

One of the best method used to improve the bearing capacity of a soil is by making a trench filled with granular material. Present study focused the effect of providing waste glass as a replacement material in the trench. The results shows that, glass is a good replacing material at an optimum configuration with rectangular shaped trench.

Published by: Athira C. H., Binil GopinathResearch Area: Ground Improvement

Organisation: St. Thomas Institute for Science and Technology, Thiruvananthapuram, KeralaKeywords: Bearing capacity, CBR, Plate load test, Trench, Waste glass

Research Paper

146. Characterization of municipal sewage sludge and reprocess as fertilizer at Jijiga University sewage treatment plant

Jigjiga University is one of the new universities in Ethiopia, which is established from 2009. The total area of this campus is 350 hectares and the total population is 21374 students and 2155 teaching as well as non-teaching staff. The maximum quantity of sewage flow in the campus is 882337 lit/day approximately. University constructed a treatment plant in the campus and the following treatment process is followed like Screening, sedimentation (primary and secondary), coagulation, oxidation ditch, sludge digestion, and oxidation pond. But here they are focusing only on the sewage treatment process. But here I am focusing to use sewage sludge as a fertilizer after the treatment process. The profitable indicators selected were money, process and administration, and user costs because they resolve the profitable affordability of a particular technology to society. Environmental indicators include energy use because it in some way measures resource utilization, and performance of the technology. Find the treated sewage sludge nutrients such as potassium, ammonia, nitrogen, phosphorus, and other compost. These indicators also determine the reuse possibilities of the treated wastewater sludge as fertilizer. Community indicators detain educational recognition of the technology through public participation and also measure whether there is an improvement in the community from the specific technology. The overall results of this study prove that sewage sludge having fertility content and we can use sewage sludge as a fertilizer by sewage treatment technology.

Published by: Udhaya Kumar, Ismail Mahamud MahamedResearch Area: Environmental Engineering

Organisation: Jijiga University, Jijiga, EthiopiaKeywords: Municipal sewage sludge, Screening, Fertilizer, Nutrients, Community, Treatment technology

Review Paper

147. Achieving secure file download by traffic and energy saving encrypted search technique and generate key image using BVCS

Cloud Computing is a model of Internet-based computing where resources like storage space, online software are provided by different cloud service providers to different types of cloud users who need cloud services. When a cloud user outsources the data on cloud, it has to provide more security for outsourced data preventing data manipulated or accessed by unauthorized users. To maintain data integrity, each and every cloud service has to be stored securely. For easier accessing of files and to generate file indexes, each file is stored in cloud server. Now cloud users search files and again send download request to cloud server. This process is time consuming and also there is a chance that the cloud service provider might access those files which is stored in the cloud server, because both the encrypted file with correspondent keys and file indexes are stored in cloud server. To overcome these problems, this system introduces storage nodes for storing file indexes and encrypted files and cloud server stores files keys. When a cloud user uploads file, the file index is generated automatically and file is encrypted by using AES algorithm with automatically generated key. After that by Visual cryptography scheme, the key is converted into image and then generated as key image and source images respectively. The encrypted file and the file indexes are stored in storage node, key and source image are stored in cloud server and key image is passed to file owner. Whenever file owner or file users want to download or access files then perform search and then put key image as an input. If valid, it matches the key with the source image and later it can be downloaded.

Published by: Jeshima Firdouse R., Shivani G.Research Area: Cloud Computing And Security

Organisation: Velammal Institute of Technology, Chennai, Tamil NaduKeywords: BVCS, Traffic efficiency, Energy efficient, FAH Algorithm, AES Algorithm

Research Paper

148. Studies on optimization of fermentative hydrogen production by an isolated strain

Facultative strain of bacteria capable of producing hydrogen was isolated from soil sample rich in decomposed biomass. The isolated strain was characterized and the process parameters, namely pH, temperature and fermentation time were optimized for the maximum hydrogen production. The optimum conditions were found to be: pH-7, temperature-34oC and fermentation time-42hrs. Under these optimum conditions, the isolated strain achieved the highest hydrogen production rate of 2.84 ml H2/L.h

Published by: Manikkandan T. R.Research Area: Bio Fuel

Organisation: Annamalai University, Chidambaram, Tamil NaduKeywords: Biohydrogen, Facultative bacteria, pH, Temperature, Fermentation time

Research Paper

149. Design and analysis of velocity profile of air in engine inlet manifold

This project deals with the improvement of the performance and to achieve the even distribution of flow at each cylinder, to select the best turbulence model for the analysis of intake manifold using computational fluid dynamics, to achieve the maximum mass flow rate through the runners. To achieve the even flow of distribution and improve the volumetric efficiency, we divided his analysis into four different parts. In each part, a different iteration of inlet manifold used in Maruti Gypsy’s G13BB engine is used. In this analysis, plenum size is only changed in small values to show the effects of the shape of runners on output. Dividing the work into four different parts provide the greater refinement in the result. Runner shape is determined by the operating conditions of the engine assembly in which the inlet manifold is used. The intake runner diameter influences the point at which peak power is reached while the intake runner length will influence the amount of power available at high and low RPM. To find the best results, we perform the experiments in Ansys Fluent for possible designs and find the effect of curved and branched runners were providing higher volumetric efficiency and even flow of distribution to each cylinder. For designing final intake manifold we select the best design from all four parts and perform the experiment using computational fluid dynamics software Ansys Fluent. This project work brings the design concept and analysis method of “DESIGN AND ANALYSIS OF VELOCITY PROFILE OF AIR IN ENGINE INLET MANIFOLD”.

Published by: Josbin C Mathew, Dharmadurai R., Ajay Krishnan P., Mohammad Shabeeb P. K., Dr. P. ManiiarasanResearch Area: CFD Stimulation

Organisation: Nehru Institute of Engineering and Technology, Coimbatore, Tamil NaduKeywords: Intake manifold, Plenum, Volumetric efficiency, Computational fluid dynamics

Research Paper

150. Classification of attack types for intrusion detection system using machine learning algorithm: Random forest

In the current era of Big Data, a high volume of data is being grown in vast and the speed of generating the new data is accelerating quickly. Machine Learning algorithms are used for such large datasets to teach computers how to reply to and act like humans. In machine learning with the help of generalization ability, the increase in the size of the training set increases the scope of testing. In this paper, we analyze the results of the attacks classified using Intrusion Detection System, and the training time of Random Forest algorithm is measured by increasing the size of the KDD dataset in intervals thereby observing the changes in the final evaluation metrics obtained

Published by: Dasari Sree Lalitha Chinmayee, C. Visishta, Garbhapu Navya, Sajja Ratan KumarResearch Area: Network Security

Organisation: Anil Neerukonda Institute of Technology and Sciences, Bheemunipatnam, Andhra PradeshKeywords: Classification, Intrusion detection system, KDD dataset, Evaluation metrics

Research Paper

151. Fault detection monitoring and controlling of induction motor using Zigbee

Our project is basically based on monitoring and controlling of the induction motor by the use of a Zigbee module. Microcontroller and other sensors play an important role in this monitoring and controlling of the induction motor. This type of monitoring helps to take preventive measures against induction motor when a fault occurs.

Published by: Niraj, Tejas Borde, Prasad MulumkarResearch Area: Electrical

Organisation: Universal College of Engineering and Research, Pune, MaharashtraKeywords: Fault detection, Zigbee

Research Paper

152. Android mobile hacking using Linux

Backdoors are one of the most complicated types of Android malware. A normal backdoor carries out its functionalities such as installing itself into the system directory, disabling system apps, or gaining access to app’s data, to steal and upload sensitive info, download and ask to install applications and set up mobile botnets when setting proper Android permissions. This project focus on how Android devices are hacked using backdoors and how they can be stopped from doing so. The backdoor application when installed and turned on the mobile allows an attacker to read, write and modify the data. Due to Backdoor attacks Confidentiality, Integrity, and Accountability of the information security are lost. When the application is installed on the victim's mobile and the victim opens the application it creates the meter-preter session which permits the attacker to access functions like webcam, contacts, read SMS, send SMS, read call log, write call log, access storage, install applications.

Published by: Arulpradeep S. P., Vinothkumar P., Nilavarasan G. S., Sai Harshith Kumar S., Naveen P.Research Area: Android

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Kali Linux, Android, Back-doors, Meter-preter, Metasploits , Apache2 server, Payload, MSF-venom

Research Paper

153. Artificial Lampyridae Classifier (ALAC) for coronary artery heart disease prediction in diabetes patients

Soft computing techniques and its applications extend its wings in almost all areas which include data mining, pattern discovery, industrial applications, robotics, automation and many more. Soft computing comprises of the core components such as fuzzy logic, genetic algorithm, artificial neural networks, and probabilistic reasoning. In spite of these, recently many bio-inspired computing attracted attention for the researchers to work in that area. Machine learning plays an important role in the design and development of decision support systems, applied soft computing and expert systems applications. This research work aims to build an artificial Lampyridae classifier and also compared with Takagi Sugeno Kang fuzzy classifier and ANN classifier in terms of prediction accuracy, sensitivity, specificity, and Mathew’s correlation coefficient. The significance of MCC is to test the ability of the machine learning classifier in spite of other performance metrics. Implementations are done in Scilab and from the obtained results it is inferred that the built ALC outperforms that that of TSK fuzzy classifier and ANN classifier.

Published by: B. Narasimhan, A. MalathiResearch Area: Computer Science

Organisation: Government Arts College, Coimbatore, Tamil NaduKeywords: Soft Computing, Fuzzy logic, Machine learning, CAHD, Diabetes, Artificial neural network, Applications of soft computing

Research Paper

154. Development of conducting organic polymer film by R. F. plasma polymerization

Electrodeless R.F. capacitive coupling is used to make plasma polymer. The thickness of the film measured to be 8.0 µm. The film is made conducting by doping with Iodine. The resistivity measured with Vander Pauw’s Method and it was found to be 1.7 KΩ cm. Hopping conduction mechanisms found to be the probable mechanism of charge transport in the obtained polymer film

Published by: Mukesh NigamResearch Area: Plasma Physics

Organisation: Lakshmi Narain College of Professional Studies, Gwalior, Madhya PradeshKeywords: R.F.Power, Polymer, Capacitively coupled, Doping, PolyAcetylene

Review Paper

155. College bus tracking system

This project is based on a Real-Time College Bus Tracking Application which runs on the website. This enables students to find out the location of the bus so that they won't get late or won't arrive at the stop too early. The main purpose of this website is to provide the exact location of the student's respective buses in Google Maps besides providing information like bus details and distance. College students use this website. It is a real-time system as the current location of the bus is updated every moment in the form of latitude and longitude which is received by the students through the website on Google maps. The application also estimates the time required to reach a particular stop on its route. This mode of communication can be useful for the bus tracking system.

Published by: Sangavi K. A., Vinitha N., Vimala R., Ramesh A.Research Area: Electronics And Communication Engineering

Organisation: Sri Eshwar College of Engineering, Kondampatti, Tamil NaduKeywords: GPS, Arduino UNO, Wi-Fi module

Review Paper

156. Non-destructive testing by liquid penetrant testing and ultrasonic testing – A review

Non-destructive testing (NDT) is commonly thought of as a broad field. However, at its core, it refers to a good cluster of tested review ways to analyze the soundness of a cloth, part or structure while not with chemicals or physically neutering it. When it involves correct results, non-destructive testing is reliable due to the variability of obtainable and complementary choices. Any given piece of kit or machinery may be subject to a variety of NDT that eliminates the danger of oversight or quality. This paper consists of a detailed review about the latest researches carried out for finding out the defects using LPT and Ultrasonic method and how it improves the quality of the products by reducing the time taken for testing. NDT is one of the finest and accurate quality tool used in reducing the costs of testing. The Liquid Penetrant Testing (LPT) technique is usually used for the scrutiny of non-ferrous materials and non-magnetic materials like Al, chrome steel in addition as alternative materials which may not be inspected by the Magnetic Particle technique. Ultrasonic testing is mostly used for finding minute deflections and flaws in the materials using transducers.

Published by: C. Chris Roshan, Raghul C., Hari Vasanth Ram, Suraj K. P., John SolomonResearch Area: Non-Destructive Testing

Organisation: Hindustan Institute of Technology and Science (Deemed to be University), Chennai, Tamil NaduKeywords: Non-Destructive Testing (NDT), Liquid Penetrant Testing (LPT), Ultrasonic Testing (UT), Transducers, Non-ferrous, Non-magnetic, Magnetic particle technique

Others

157. Accident detection and rescue information system

Nowadays accidents have been a quite common problem for the people who are in highly populated countries. Every day most of the people here are met with accidents and losing their lives. At least if there is an availability of emergency facilities there is a chance of saving lives. This project is to overcome the drawback mentioned if any vehicle met with an accident immediately a vibration sensor in the pre-installed device kept in the vehicle gets activated and sends signals to the Arduino microcontroller. Now the microcontroller will send an alert message through GSM modem includes the location coordinates to the police station or to the rescue team so that the rescue team or police can be able to locate the location easily using GPS modem to provide emergency facilities or they will take them to the nearest hospital once the information received. The proposed system has been simulated and practically designed using hardware components and the results are satisfied with the explanation.

Published by: K. Ramamohan Reddy, M. Lavanya Latha, B. Mallikarjuna ReddyResearch Area: Electronics and Communication

Organisation: Audisankara Institute of Technology, Nellore, Andhra PradeshKeywords: Arduino, GPS, GSM, Vibration Sensor

Technical Notes

158. Event detection and identification using social media data stream

Today Social Media plays an important role in our life. Some popular social media platform such as Facebook, Twitter etc. Using these we can be connected with each other. We Create and share the Events on social media. Events such as Earthquake, conference, News, Weather news. To detect and identify the specific event from a group of the event is the crucial task. Traditional methods are not efficient for the detecting events and it requires more human intervention and having less accuracy. Our Aim is to detect and identify the events with less human intervention and higher the accuracy using LDA, HITS method.

Published by: Uday Pradip Patare, Abhishek Gajre, Ankita Mahajan, Pradnya Patil, Y. S. DeshmukhResearch Area: Information Technology

Organisation: Sanjivani College of Engineering, Kopargaon, MaharashtraKeywords: Event detection, LDA, HITS, Twitter

Research Paper

159. Performance analysis of Vortex tube refrigeration system

This paper represents the experimentation of the Vortex Tube Refrigeration system. Vortex tube also known as Ranque-Hilsch Vortex tube. A Vortex Tube is a Mechanical Device, which generates cold and hot streams from a single injection of pressurized gas. Without any moving parts or chemical reaction within the tube, the intersecting phenomenon of energy separation results only from fluid dynamic effects. The Control valve is a screw located at the hot end and cold end with thread on it which is used to restrict the flow of air due to which the small forced vortex takes place after stagnation point and free vortex get away through the hot end as hot air and cold end as cold air. At the other end small orifice plate is located to further reduce the temperature Drop. The 2.5 HP compressor is used for experimentation for low pressures. Also, for higher pressures it is difficult with a low capacity compressor to get the accurate results. For this purpose, a model has been developed using experimental data to predict the results for the pressure range of 1to 6 bar. We have attached Thermo-electric module to system to generate electricity without affecting the efficiency of the system.

Published by: Jitendra Patil, Saurabh Murkute, Ketul Chauhan, Abhishek Dahake, Yogendra Borje, Shinu Philipose, Anmol Arora, Md. Hasan AkhtarResearch Area: Mechanical

Organisation: S. B. Jain Institute of Technology, Management and Research, Nagpur, MaharashtraKeywords: Vortex Tube, Design of vortex tube, Thermoelectric module

Research Paper

160. Women protection system using microcontroller and Android application

Women Protection System aims at helping women from any type of physical attack. A Conductive Belt having magnetic circuit is used which will prevent any kind of attack from occurring. A mobile application is to be implemented that informs the user-defined numbers about the emergency alert and location of the use. This application can be accessed automatically as well as manually. The microcontroller is used to achieve this purpose. The connectivity between the microcontroller and the mobile is maintained through the Bluetooth modem. At the same time, women are facing problems like kidnapping, harassment, molestation etc. The women security issue has become most important. The women security system has considered for providing a solution to different problems. The important part of the system is the prevention of incident & communication through a wireless medium. A security system in which prevention will be the highest event & communication is the second event.

Published by: Gayatri Sanjay Chopade, Pramod Rodge, Pournima Fulwade, Pranit BandkarResearch Area: Computer Engineering

Organisation: Shivajirao S. Jondhale College of Engineering, Thane, MaharashtraKeywords: Conductive belt, Microcontroller, Bluetooth modem

Research Paper

161. Particulate emission control and direct carbon dioxide capture

The atmosphere is one of the valuable resources which needs to be protected for future generation. It’s being increasingly polluted every year. In the past 10 years the air in the many regions of our country such as Delhi, Mumbai is seriously polluted. Due to modernization and development, the use of automobiles was increased which emit harmful exhaust toxic gases with particulate emission. The level of CO2 content in the atmosphere was increased up to 410 ppm. In the meantime, CO2 is also the raw products for many industries such as food processing industries, Pharmaceutical industries, fire extinguishers etc. We have conducted experiments to capture carbon dioxide from direct air. This process is carried out using a carbon absorbent solution made to react with atmospheric air in the reaction chamber in which carbon dioxide present in the air directly captured in the absorbent solution. Air is constituents of various gases. Here we discussed in capturing the carbon from the air. Direct air capture is leading technology to capture CO2 from the air. Here various concentrations of solutions are made to effective capture of carbon dioxide. In addition, Electrostatic precipitator is implemented to control the particulate emission. It holds the small micro dust particles up to 2.5 PM. The operation performs in controlling particulate and capturing carbon dioxide from the air.

Published by: A. Kanagaraj, M. Hariharan, R. Ajith, S. Nandha Kumar, P. DeepanResearch Area: Mechanical

Organisation: Akshaya College of Engineering and Technology, Coimbatore, Tamil NaduKeywords: Atmosphere, Particulate emission, Electrostatic precipitator, Direct air capture

Others

162. An approach to develop a smart and intelligent wheelchair

We live in a world, where the technology is growing to the next level every day. But it is very strange to see paralyzed people depending on someone's help for there mobility. In this project, we have developed a smart wheelchair which helps the completely paralyzed patient to move on their own. This is achieved by the voice control method by using an android application connected to the accelerometer. Another method is a hand gesture control method. In this method, we use the flex sensor to control the motion of the wheelchair. Hand gesture control can be used only by partially paralyzed patients. The Android-based voice control through the Bluetooth has been designed in the motor, the motor is controlled by the predesigned embedded C software.

Published by: Naveen Kumar K., T. Swetha M. E., B. S. Sai Kumar, K. RahulResearch Area: Embedded C

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Flex, Voice controller, Accelerometer

Review Paper

163. Food adulteration prediction using data mining algorithms

Major food adulteration and contamination events seem to occur with some regularity, such as the widely publicized adulteration of milk products with melamine.With globalization and rapid distribution systems, these can have international impacts with far-reaching and sometimes lethal consequences. These events, though potentially global in the modern era, are in fact far from contemporary, and deliberate adulteration of food products is probably as old as the food processing and production systems themselves. This review first introduces some background into these practices, both historically and contemporary, before introducing a range of the technologies currently available for the detection of food adulteration and contamination. These methods include the vibrational spectroscopies: near-infrared, mid-infrared etc. This subject area is particularly relevant at this time, as it not only concerns the continuous engagement with food adulterers, but also more recent issues such as food security, bioterrorism, and climate change. It is hoped that this introductory overview acts as a springboard for researchers in science, technology, engineering, and industry, in this era of systems-level thinking and interdisciplinary approaches to new and contemporary problems. In food safety and regulation, there is a need for a system to be able to make predictions on which adulterants are likely to appear in which food products. The aim is to identify the minimum detectable limit for the adulterants in milk. There are many adulterants that are added to milk including water, flour, starch and even urea in quantitative measures making it undetectable. MATLAB was used to write the algorithm code.

Published by: J. Sathyaleka, R. Sangeetha, R. Ramya, S. Prince Sahaya BrightyResearch Area: Data Mining

Organisation: Sri Ramakrishna Engineering College, Coimbatore, Tamil NaduKeywords: Naive Bayes, Decision tree

Research Paper

164. Bus detection for blind people using RF transceiver

This paper presents a bus detection system using RF MODULE technology that aims to ease the traveling and movement of blind people. The proposed system consists of two detection subsystems, one on the buses and the other on the bus stations, database system. In the bus detection subsystem, the nearby stations will be easily detected and then announced through a voice message inside the bus. Moreover, any existing blind person in the surrounding area of the station will be detected by the bus subsystem to alert the bus driver about the number of blind persons. In the bus station subsystem, the coming buses will be detected and then announced in the station in order to alert the blind people. A complete system prototype has been constructed and tested to validate the proposed system. The archived results show that the system performance is promising in terms of system functionality, safety, and cost.

Published by: Sunil Kumar S., M. Krishnaraj, A. Jeevarathinam, A. Rahul RajResearch Area: Information Technology

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: RF module, System integration, Engineering design, Blind, Detection

Research Paper

165. The graphical secret code in internet banking for improved security transaction

Internet Banking is a course of action of organizations given by a gathering of sorted out bank workplaces. Bank customers may get to their assets from any of the part branch or working environments by means of web. The main problem in Internet Banking is the realness of the client. On account of unavoidable hacking of the databases on the web, it is difficult to accept on the security of the information on the web. Phishing is a kind of online information misrepresentation that expects to take tricky information, for instance, electronic keeping cash passwords and cash exchanges information from customers. One importance of phishing is given as "it is a criminal activity using social planning techniques. Secret word based verification is a standout amongst the most broadly utilized techniques to verify a client before allowing gets to anchored sites. The wide selection of secret key based validation is the consequence of its minimal effort and effortlessness. Customers may enroll different records on a comparable site or over various goals, and these passwords from similar customers are presumably going to be the same or practically identical. We proposed framework having the character for each individual note and a proficient viable client verification conspire utilizing use diverse cryptographic natives, for example, encryption and pixel distinguishing proof and clients have extra pixel recognizable proof framework. In proposed framework implies that for every last cash in in our application surrendered by the client we will produce the interesting id for each money, when the sum is exchanged from source to goal not just the sum and check of the money will be taken notwithstanding that one of a kind id will likewise be exchanged with the goal that we can track the way of the cash going around. The unprecedented development of internet keeping money and web based business frameworks has prompted a gigantic increment in the quantity of usernames and passwords oversaw by singular clients.

Published by: P. Jebaselvi, Dr. C. K. GomathyResearch Area: Computer Science Engineering

Organisation: Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, Enathur, Tamil NaduKeywords: Password, Web Service, Privacy transaction, Secret code transaction, Service sector secure transaction, Internet banking, Graphical secret code

Review Paper

166. Electrocardiography signal interpretation system using filters with FPGA

In this proposed method, for analyzing electrocardiography signals system design used. This Procedure manipulates high pass least-square linear phase filtering technique to filter out the standard wander noise ingrained in the input ECG signal which is more effective than the existing filter. Discrete Wavelet Transform and support vector machine exploits to extract the reduced feature set from the input ECG signal and classifying the signal. They are implemented in the Xilinx system generator (XSG).

Published by: Hannah Maria John, N. G. Elakiya, A. Deepika, K. Priya, S. L. BharathiResearch Area: Signal Processing

Organisation: Panimalar Engineering College, Chennai, Tamil NaduKeywords: DWT, XSG, ECG

Research Paper

167. Multibanking system

Multi Banking system - The main idea is to implement a web application through which users can perform different bank accounts transactions on a single platform. This concept is a new idea for improving future banking and increasing confront for users. In general, users need to log into different online bank accounts to perform transactions which require many security issues and time taking process but using this application user can save their time and use all features that are available in every bank. Transaction calculations and updations are maintained by admin and provide customer support for users. This system will act as a mediator between banks and users. Users can maintain single username and password and contact only one customer care service for any problems.

Published by: Sudharshana Rajendran, Harshavartini D., P. S. SmithaResearch Area: Service Composition Of Bank Transactions

Organisation: Velammal Engineering College, Chennai, Tamil NaduKeywords: Multibanking, Single interface, Integrated system, Dynamic service composition, Service-oriented architecture, Service Composition

Research Paper

168. Kulumi- The diary app

The Diary App is a web application which user can write everyday activities, thoughts, and feelings, take selfies in each episode of their life story and make memories with their friends that will last for a lifetime. By this application the user can attach images, video, audio, and important messages can be starred and can be viewed. The data user composed is securely stored in a database the privacy is in handoff the user. There is a search box by which we can specifically filter out the required information according to the date so that the user can view the date’s activity easily. There is also another feature by which a user can share his/her memories globally so that other users can see the shared event.

Published by: U. K. Adithya, Karthigeyan S., M. Guru VenkateshResearch Area: Application

Organisation: RMK Engineering College, Kavaraipettai, Tamil NaduKeywords: Kulumi, Slambook, Moments

Research Paper

169. BOT kitchen

Nowadays everyone is concerned with how to make life easier and IoT is one such field which makes peoples life easy and less hectic. The kitchen is an integral part of a humans life. People go to the kitchen on a regular routine to make food for themselves, making food is a tedious job and managing it is more of a headache. So our aim is to reduce the risks as well as reduce the headache of managing the kitchen by introducing BOT KITCHEN, which in itself will be efficient enough to make cooking food easier. The application of this product is that it would manage kitchen inventory using RFID. Another important application is that it would manage dustbin by identifying the waste that is whether it is biodegradable or non-biodegradable.

Published by: Shaifali Phogat, Pranav Kapur, Dr. M. Uma DeviResearch Area: Internet of Things

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: IoT, RFID

Research Paper

170. Using various materials as a partial replacement of cement

Day by bay population growth rate is increasing as the same construction growth rate is also rising. Since a large number of natural resources and materials were used. Also, cement is used in a huge quantity which causes rising Co2 pollution, so because of this, we need to find a new substitute for cement. Disposal problem of waste material is becoming critical day by day. Millions tone of waste is generated every year in the world. In this topic, an attempt has been made to utilize, which is waste of industry, municipal solid waste, agricultural waste. The research work is the determination of the effect of the use of various waste as a replacement of cement to assess the pozzolanic nature. Also comparing the chemical compositions of various waste materials, physical and chemical properties were studied. Then final result concluding the best materials which are most widely used globally in a bulk quantity. Reduce the demand for cement, glass powder decreases the unit weight as well as the porosity as indicated by the decrease in water absorption. It reduces the quantity of cement to be used in concrete. Also, glass powder is proved to be economical and is considered as environmentally friendly construction material.

Published by: Shubham G. Keshattiwar, Siddharth S. Tode, Shubham M. Menewar, Akshay H. Shirbhate, Akshay Khadse, Girish V. Mahalle, Aishwarya H. MeshramResearch Area: Yavatmal, Maharashtra

Organisation: Jagadambha College of Engineering and Technology, Yavtamal, MaharashtraKeywords: Glass powder, Silica flumes, Fly ash, Sugarcane bagasse ash, GGBS, Rice husk ash, Paper pulp ash replacement to PPC, Cost-effective material

Research Paper

171. The impact of parent brand on the brand extensions on the purchase decision in the food industry

Brand extension is one of the most used and successful expansion strategy that brands have used and can use to gain advantages in the market. This project focuses mainly on two brands- Cadbury and Kellogg’s- and their brand extensions. Consumers’ viewpoints about the two brand and their extensions were gathered and analysed. The main objective of this research was to understand whether parent brand consumption, parent brand visibility and awareness of brand extensions had an impact on the performance of brand extensions and the purchase decision of brand extensions by consumer.

Published by: Anoushka L ShyamanoorResearch Area: Marketing

Organisation: Christ University, Bengaluru, KarnatakaKeywords: Parent Brand, Brand Extensions, Parent Brand Consumption, Parent Brand Visibility, Awareness of Brand Extensions, Purchase Decision of Brand Extensions, Performance of Brand Extensions

Research Paper

172. Deposition of CaO (lime) on rocks near the temples submerged in the waters of Lonar crater, Maharashtra, India

At Lonar Crater on the northern side, near the water body, the base part of the temples submerged in the waters which were never exposed for the last 22 years due to constant rise of water level, are now exposed due to decrease of water level to a large extent, debris of rocks of unknown origin are found to be covered by a white layer. To investigate in detail whether the white layer on these rocks near the temples otherwise found to be submerged in the waters of Lonar crater and now exposed, are of SiO₂ (silica) origin or NaCl (common salt, sea salt) origin, or any other component, a search was conducted to find the source, its origin and the cause for these phenomena through this study. Representative samples of these rocks from debris near the temple towards north side of the crater was collected and stored in a polythene bag for further investigation. XRF analysis carried out of two rocks of both sides i.e., of sample No. 1, white layered part 16 elements with their oxides were detected of which CaO (Calcium Oxide i.e., quicklime) – 76.000% being the major content and others such as Fe₂O₃, SiO₂, Al₂O₃, MgO etc., in minor quantities. Similarly of sample No.2, the white layered part showed that 16 elements with their oxides were detected of which CaO – 85.900%, being the major content, and others such as SiO₂, MgO, Al₂O₃, SO₃, Fe₂O₃, P₂O₅ etc., in minor quantities. The original rocks i.e., the black part of both the samples showed that major component was SiO₂, Al₂O₃, Fe₂O₃, CaO, MgO, and TiO₂, with other components in minor quantities. For the first time such a high percentage of CaO (Calcium Oxide i.e., quicklime) has been detected which is found to be deposited on the surface of debris of rocks near the temples on the northern side of the crater. White rusting/white coating of SiO₂ (Silica) has been observed and reported by Jadhav and Mali. This work being of preliminary investigation, a search was conducted to know the cause and how CaO (Calcium Oxide i.e., quicklime) found in such a high percentage deposited on the rocks or the rocks were found to be coated or encapsulated by a white layer of CaO and to record and document this phenomena with detail studies.

Published by: Raju D. Jadhav, Harishchandra B. MaliResearch Area: Maharashtra

Organisation: Independent ResearcherKeywords: Lonar crater, Deposition of CaO on rocks, Submerged temples in waters, Debris of rocks

Review Paper

173. Remote operated car body cover – A literature review

It is not possible to park the car in a safe place all-time so anyone requires a body cover which can cover the car immediately by pressing a switch without any kind of contact with the car. In this paper, the remote operated car body cover literature is reviewed which can cover the car by pressing one remote key. This cover is motor driven and has another mechanism that helps to cover the whole car with a very quick operation. It covers the whole car with a thin and strong material that protects the car against the various conditions like sunlight, rain, dust, mud, minor scratches in a parked condition.

Published by: Syed J. M., M. V. GudadheResearch Area: Production Engineering

Organisation: Prof. Ram Meghe Institute of Technology and Research, Amravati, MaharashtraKeywords: Car cover, Battery, DC motor, Semi-automatic

Research Paper

174. Effect of cutting conditions on surface roughness and cutting forces in hard turning of AISI 4340 steel

In the present work, the comparison study for surface roughness and main cutting force is studded between Dry, Wet lubricant and Solid lubricant condition during the turning the AISI 4340 steel, hardness 60 HRC with CBN insert. The water-based lubricant used as a wet lubricant and boric acid in powder form is used as a solid lubricant. The objective of this study is to know about optimum machining parameters and best conditions with dry or solid lubricants for hard turning operation and it is also important to find the research gap through different studies. The results indicated that there is a significant effect on surface roughness (Ra) and main cutting force (Fc) when cutting under different conditions (Dry, Wet and Solid condition) with different cutting parameters. It has been found that with solid lubricants surface roughness value decreased as compare to dry hard turning. The proper selection of lubricants in the solid state along with cutting conditions and tool angles is essential for achieving the overall improvement in hard turning process. With the use of lubricants in the solid form hard turning may become a viable alternative to dry and wet hard turning process.

Published by: Rishi SharmaResearch Area: Manufacturing

Organisation: Abhilashi Group of Institution, Mandi, Himachal PradeshKeywords: Hard turning, Cutting conditions, Surface roughness, Response surface methodology

Survey Report

175. Survey of mobile social network middleware: Data dissemination, routing and forwarding, and social awareness

Due to the increase of an internet of things, there are different techniques and systems are developed, from these technology ones is a Middleware, for Mobile Social Network (MSN). MSN is the intersection and combination of a social network and mobile communication. This paper summarizes about the different types of Middleware that are applied on MSN for Data Dissemination, Routing and Forwarding, and Social Awareness. The target of this paper is to criticize middleware’s grounded on their characteristics, platform that they implement it and also based on architecture. In this paper different practices are such as location-based mobile social matching and place-based ad hoc social practices, and based on their result of response for a different amount of user are discussed, in addition to GIS (Geographic Information System), LBS and J2ME technology are used.

Published by: Abraham Teklu, Ajeet Singh, Aynishet AlemuResearch Area: Mobile Social Network

Organisation: Assosa University, Asosa, EthiopiaKeywords: Data dissemination, Routing and forwarding, Social awareness

Research Paper

176. Advanced image enhancement (brain tumor) DWT-SVD method using CNN

The mind tumors, are the most widely recognized and forceful illness, prompting an exceptionally short future in their most elevated evaluation. In this manner, treatment arranging is a key stage to improve the personal satisfaction of patients. For the most part, different picture methods, for example, Computed Tomography (CT)and ultrasound picture are utilized to assess the tumor in a mind, lung, liver, bosom, prostate… and so forth. Particularly, in this work, CT pictures are utilized to analyze tumor in the cerebrum. Anyway, the colossal measure of information produced by CT examines thwarts manual grouping of tumor versus improvement tumor in a specific time. In any case, it has some impediment (i.e) exact quantitative estimations is accommodated a predetermined number of pictures. Subsequently trusted and programmed order plot is basic to keep the passing rate of a human. The programmed cerebrum tumor characterization is extremely testing errand in extensive spatial and basic changeability of encompassing locale of mind tumor. In this work, programmed mind tumor identification is proposed by utilizing Convolutional Neural Networks (CNN) grouping. The more profound engineering configuration is performed by utilizing little parts. The heaviness of the neuron is given as little. Test results demonstrate that the CNN chronicles rate of 97% precision with low multifaceted nature and contrasted and the all other condition of expressions techniques.

Published by: Abubakkar Sithik, Dr. G. RanganathanResearch Area: Image Processing

Organisation: Gananmani College of Technology, Namakkal, Tamil NaduKeywords: CT-scan, DWT-SVD, CNN

Research Paper

177. Temperature-humidity monitoring using PLC and HMI

This paper presents the monitoring system for a warehouse which consists, temperature and humidity. Temperature and humidity sense by HTS711 sensor and monitor by PLC. These values display on HMI. This system also detect any unwanted movable object entering in the warehouse by using the Proximity sensor

Published by: Sneha Kamble, Rushikesh Sagar, Vaibhav MasenwarResearch Area: Automation

Organisation: Dr. D. Y. Patil College of Engineering, Pune, MaharashtraKeywords: Programmable logic controller, Human-machine interface, Proximity sensor, HTS711, IF2OF2 analog input-output module

Research Paper

178. Cloud based data storage by securing it through face recognition mode

Trust of Clients cannot be completely trusted or beneficial through the cloud. Many information gets corrupted due to the unwanted users by the employees in the hierarchy of an Organization. Separate Organization handles the data securely, but in many cases, data is being given away for money because of the single level Management. We move forward to an advanced safe Technology to overcome this issue, where data are downloaded by an Organization or a set of admins in a hierarchy through face detection mode. If any of the admin rejects in accepting the request the file cannot be downloaded and thereby the data is made secure. Advanced Encryption Algorithm is the medium to make this technology secure and beneficial. Many such technologies can offer such a new form of security based work for efficient and brand form of storage process in the software as well as any other field in cloud computing.

Published by: Nadar Steffy Felicia Inbamani, Kumar P.Research Area: Cloud Computing

Organisation: Rajalakshmi Engineering College, Chennai, Tamil NaduKeywords: AES, DES, CLOUD, SaaS, PaaS, IaaS

Research Paper

179. Smart industry automation

In this new era, everyday life is filled with technology from the startup till to bed. Internet of Things (IoT) is fast becoming a disruptive technology business opportunity, with standards emerging primarily for wireless communication between sensors, actuators, and gadgets in day-to-day human life, all, in general, is referred to as “Things”. This offers the capability to measure for understanding environment indicators. This paper addresses how to accomplish factory/Industry environment and get the data out of it check the possibility of planned IIoT use case and building up Proof of concept(POC) which will simulate factory/Industry environment to solve it.

Published by: B. Raakesh, S. Lakshmanan, K. Gowtham, R. Rajitha Jasmine, S. Dinesh KumarResearch Area: Information Technology

Organisation: R.M.K. Engineering College, Chennai, Tamil NaduKeywords: IoT, POC, Industry 4.0

Research Paper

180. Purification and properties of three novel monocot lectins from the family Zingiberaceae

Three new monocot lectins from the members of Zingiberaceae, namely, Alpinia galanga L. (AGTL), Curcuma amada Roxb. (CARL) and Elettaria cardamomum M. (ECSL) have been purified by sepharose and agarose affinity chromatography. These lectins possess similar physicochemical and biological properties. In SDS-PAGE, all the lectins gave a single band corresponding to a subunit of 16 and 17kDa and yielded single band peak on PAGE (pH 4.5). The lectins agglutinate rabbit and sheep red blood cells (RBCs) but are inactive towards chicken and human ABO erythrocytes. The haemagglutination activity of these lectins is inhibited by mannose and their derivatives while other simple sugars D-galactose, D-maltose, D-fructose, sucrose, lactose, D- sorbitol, D-mannitol did not react. The lectins activity were enhanced at acidic but stable at physiological pH range of 6- 8. Lectins were stable at 50°- 60° C but able to agglutinate for a short period when it increases.

Published by: P. Sathyapriya, S. ArvinthResearch Area: Plant Molecular Biology

Organisation: UPASI Tea Research Foundation Tea Research Institute, Coimbatore, Tamil NaduKeywords: Monocot lectins, Rhizome, Seeds, Tubers, Zingiberaceae

Research Paper

181. Impact of celebrity brand endorsements on buying behaviour towards luxury brands

Celebrity Endorsements are an important aspect of marketing that helps the brands to gain attention and improve their brand image. There are many aspects of celebrities that appeal to consumers, such as trustworthiness, credibility, attractiveness, expertise and product-celebrity match. Endorsements don’t only add to the brand image of the company, but it also increases the image of the celebrity endorser. Luxury brands require endorsements in order to improve consumer perception through the endorser’s personality. This paper helps to see the impact of celebrity brand endorsements on buying behavior towards the luxury brands and affirms the attributes that appeal to the consumers.

Published by: Rini AnandResearch Area: Marketing

Organisation: Christ University, Bengaluru, KarnatakaKeywords: Celebrity endorsements, Buying behaviour, Consumer perception, Brand image

Others

182. Role of community in enhancing the learning level of Government school Children: My experience in Mayurbhanj district, Odisha

A report: How the relationship between community and school played a big role in enhancing the learning level of children in Government schools of Mayurbhanj in the state of Odisha, India. The current scenario depicts the non-association of schools with communities. In order to build a strong relationship between schools and communities for an overall development of Children aged between 6 to 9 years, CARE India during its intervention in Mayurbhanj district initiated some actions to bridge the gap between school and community. The results mentioned in this paper are quite visible in the community library study report prepared by CARE India.

Published by: Lokesh Prasad DashResearch Area: Education

Organisation: CARE India, Bhubaneshwar, OdishaKeywords: Government school Children, Learning level, CARE India

Research Paper

183. Student feedback prediction using machine learning

Advances in natural language processing (NLP) and educational technology, as well as the availability of unprecedented amounts of educationally-relevant text and speech data, have led to an increasing interest in using NLP to address the needs of teachers and students. Educational applications differ in many ways, however, from the types of applications for which NLP systems are typically developed. This paper will organize and give an overview of research in this area, focusing on opportunities as well as challenges. In the proposed methodology, we are collecting student feedback about classroom, exam and lab facilities. After that, we are predicting the dataset using natural language processing. In NLP, we will use 2 approaches: NLTK toolkit and the random forest algorithm approach. After predicting the data, we will be analyzing the positive, negative and neutral nature of the data. This will help in effectively improving the performance of the institution and to create plans to enhance institutions’ teaching and learning experience. Student’s feedback improves communication between the lecturer and the students, allowing the lecturer to have an overall summary of the student’s opinion.

Published by: Nilesh Singh Sengar, Kartik Chourey, Shraddha Bajaj, S. AbinayaaResearch Area: Information Technology

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: NLP, NLTK, Random forest algorithm

Others

184. Deep learning architectures for crime occurrence detection and prediction

Due to the escalation in the rate of crimes, there is a requirement of the system that will detect and predict crimes at the dynamic time. The objective of this survey is to learn Data Mining techniques that will go on to help in detecting and predicting crimes using association rule mining, decision trees & naive Bayes, k-means clustering and Machine learning techniques such as deep neural network and artificial neural network. Noticeable findings from this survey were that when the dataset instances have a large number of missing values pre-processing becomes an important task and crime does not occur uniformly across urban landscapes but concentrates in specific areas. Hence, predicting crime hotspots is a very crucial task and also applying post-processing will help in decreasing the rate of crimes.

Published by: Arnav Singh Bhardwaj, Divakar K M, Ashini K A, Devishree D S, Sheikh Mohammad YounisResearch Area: Computer Science And Engineering

Organisation: S. J. C. Institute of Technology, Chikkaballapura, KarnatakaKeywords: Predict crimes, Data mining techniques, Decision trees, Post-processing

Review Paper

185. Bioavailability enhancers: An overview

Oral absorption of the drug is a very important issue especially when the drug is poorly bioavailable, given for long periods and expensive. Poorly bioavailable drugs remain sub-therapeutic because a major portion of a dose never reaches the plasma or exerts its pharmacological effect unless and until very large doses are given which may also lead to serious side effects. Any significant improvement in bioavailability will result in lowering the dose or the dose frequency of that particular drug. Bioenhancers are chemical entities which promote and augment the bioavailability of the drugs which are mixed with them and do not exhibit a synergistic effect with the drug. The various bio enhancers available are piperine, garlic, Carum carvi, Cuminum cyminum, lysergol, naringin, quercetin, aziridine, glycyrrhizin, stevia, cow urine distillate ginger.

Published by: Tulasi Iswariya, Shivani GuptaResearch Area: Pharmacy

Organisation: Gitam Institute of Pharmacy, Visakhapatnam, Andhra PradeshKeywords: Oral absorption, Bio enhancers, Improve bioavailability

Research Paper

186. Characterization of hybrid thin films for application in the field of solar cells – A response to climate change

The enhancement of greenhouse gases due to the increased usage of fossil fuels leads to global warming followed by climate change. To overcome these researchers have been concentrating on renewable energy. Solar energy is an inexhaustible source of energy. It could supply all the present and future energy needs of the world. The amount of solar radiation reaching the earth differs from the radiation reaching the top of the earth’s atmosphere. Flat-plate collectors are used to collecting solar energy and the collected energy is stored in different types of energy storage systems and used for different applications like water heating systems, thermoelectric systems. Solar cells are used for the direct conversion of solar energy into electrical energy. In this study, the importance of more economic hybrid thin films for application in the field of solar cells and photodetectors were highlighted. The optical absorption and photoconductivity for the hybrid thin films were found to increase with increasing concentration of zinc telluride.

Published by: C. S. A. RajResearch Area: Thin Films

Organisation: Arul Anandar College (Autonomous), Karumathur, Tamil NaduKeywords: Hybrid thin films, Renewable energy, Photoconductivity, Climate change

Research Paper

187. Customer satisfaction survey of quick-service restaurant with special reference to subway: A study in Navi Mumbai

This research evaluates the extent of customer satisfaction for Subway food chain marketing strategies. In the present scenario, a lot of big and small QSRs are trying to win the customer share of heart and develop loyalty. So, the first basic need is to know the customer liking and disliking for the services provided by the food chains. Here the research will try to explain the factors which affect the customer satisfaction for QSR services. The objective of the study is to find out the effect of the food quality, service quality, ambiance and price on customers’ satisfaction in the Subway restaurant of Kharghar and Sea wood. To research that convenience sampling technique was used to collect the data. The questions were rated on a 5-point Likert scale

Published by: Arpita Pandey, Saritprava DasResearch Area: Primary Research

Organisation: ITM Business School, Mumbai, MaharashtraKeywords: Customer satisfaction, QSR, Fast-food

Research Paper

188. Test case recommendation system

A code transaction modifies a set of code files and runs a set of tests to make sure that it does not break any of the existing features. But how do we choose the target set of tests? There could be 1000s of tests. Do we run all those tests? In that case, are we not wasting resources, and delaying the whole process of merging a code change? Can we choose a static set of tests? In that case, we have a chance of missing a set of tests which may be related to the code changes. How do we find out the optimal set of tests for a given code change – is the goal which we are trying to solve using the Recommendation System.

Published by: Sudipto NandanResearch Area: Machine Learning

Organisation: Oracle India Pvt. Ltd., Bengaluru, KarnatakaKeywords: Test case selection, Singular value decomposition, SVD, Recommendation system, Latent factor collaborative filtering, Alternating least square

Research Paper

189. Linear programming problem applications in engineering curriculum

The goal of this paper is to submitting linear programming methods and the applications in Engineering Education through a scientific approach in the Curriculum. In solving Linear Programming and Optimization Problems we utilized operation research techniques and according to gathered date, the decision making was recognized systematically and linear programming a model was formed after model solving and execution it in academic semesters and comparing the results with the previous semester.

Published by: Dr. N. Ramya, Indira SinguluriResearch Area: Operation Research

Organisation: Vignan's Institute of Information Technology, Visakhapatnam, Andhra PradeshKeywords: Scientific approach, Optimization problems, Decision making, Research techniques

Research Paper

190. Seismic base shear variation between regular and irregular RCC structure in various zones by STAAD.PRO

Multistorey structures are frequently caused by the earthquake by the scarcity of provision. Earthquake often occurs on zone 4 and zone 5 region due to lack of remedies building cannot be elevated beyond the certain height. This present study was done base shear variation between regular and irregular configuration informs of the various zone such as zone II, zone III, zone IV, & V various soil conditions such as Medium, Soft, Hard respectively. So, such preliminary data were considered to get better performance of buildings as well as two designs were done such as manual design & software design by Staad.pro. Eventually, base shear performance was found for between different zone region and soils respectively. This SLA was assumed out by considering different seismic zones & soils. As per data, ACP was done for Regular & Irregular structure to get a view of the plan.

Published by: R. Arun, K. Suhana, L. Saicharan ReddyResearch Area: Design Project

Organisation: Sir Vishweshwaraiah Institute of Science and Technology, Madanapalle, Andhra PradeshKeywords: Staad.Pro, Static Load Analysis, Auto Cad Plan

Others

191. Crime scene prediction and analysing its accuracy with frames using deep neural network

Crime scene prediction without human intervention can have an outstanding impact on computer vision. In this paper, we present DNN in the use of a detect knife, blood, and gun in order to reach a prediction whether a crime has occurred in a particular image. We emphasized the accuracy of detection so that it hardly gives us the wrong alert to ensure efficient use of the system. This paper use Nonlinearity ReLu, Convolutional Neural Layer, Fully connected layer and dropout function of DNN to reach a result for the detection. We use Tensorflow open source platform to implement NN to achieve our expected output. This system can achieve the test accuracy of 90.2 % for the datasets we have that is very much competitive with other systems for this particular task.

Published by: Devishree D. S., Divakar K. M., Ashini K. A., Arnav Singh Bhardwaj, Sheikh Mohammad YounisResearch Area: Computer Science Engineering

Organisation: S. J. C. Institute of Technology, Chikkaballapura, KarnatakaKeywords: Crime scene, Neural Layer, Convolutional, Tensorflow

Research Paper

192. Tracking the prisoner location and escape prevention

The main aim of the project is to track the prisoner whether he or she is inside or outside the prison by using RSSI(Received Signal Strength Indication) and using GPS. The location of the prisoner can be viewed by jailor wherever and whenever by using IOT device. If the prisoner is trying to move outside the jail it automatically indicates through buzzer in the control room based on the signal strength. When the signal strength is low the device automatically activates the neuron simulator. If the prisoner is trying to break the module is sensed by the vibration sensor, it will automatically produce alarm in the prisoner section and control section.

Published by: Venkateswararao P., Vengatesh D., Vetrivel R., Haresh R., Ajay Karthik B.Research Area: IoT

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Prisoner Location, IOT, RSSI, GPS, Latitude, longitude, Neurostimulator.

Research Paper

193. Net metering based bi-directional power flow system and power quality improvement using multilevel inverter

Recent advancements in Power Electronics converters has led to the development of Multilevel Inverters that has proved to be one of the most promising solutions for the medium voltage, high power applications. Multilevel Inverters are considered to be the best available choice for the Grid-connected Photovoltaic Modules (PV) as they (PV Modules) comprise of several sources on the DC side. By the use of MLI, output with high quality and with less harmonic distortions can be obtained which can further be improved by increasing the level of the Multilevel Inverter. This paper presents a model of a 15-level Cascaded H-Bridge MLI interfaced suitably with a Boost Converter and PV arrays. The proposed 15-level inverter is modeled and simulated in MATLAB 2018a using Simulink and Sim Power System toolboxes. Passive filters for power quality improvement is also used at the output stage of Multilevel Inverter.

Published by: Himanshi SikarwarResearch Area: Renewable Energy

Organisation: Government Mahila Engineering College, Ajmer, RajasthanKeywords: MLI, H-bridge, SM, SG, AMR, Net meter

Review Paper

194. Construction of predictive modelling for cardiac patient using probabilistic neural network

Coronary Artery Disease (CAD) is a major disorder in heart rhythm invoices the reduction or blockage of blood flow due to the narrow artery which results in coronary artery disease Our project is to investigate and detect the occurrence of coronary artery disease (cardiac block) using a probabilistic neural network. We would apply the probabilistic neural network to CT Images and, Feature extraction by using the Gray Level Co-Occurrence Matrix (GLCM). Image recognition and image compression are done by using the Gaussian bilateral filter method and also large dimensionality of the data is reduced. Automatic cardiac block classification is done by using a Probabilistic Neural Network (PNN). The segmentation process is done by using the K-means clustering algorithm and also detects the cardiac block spread region. PNN is the fastest technique and also provide good classification accuracy.

Published by: Nivetha P., Keerthi S., Kamalesh S.Research Area: Machine Learning

Organisation: Velammal College of Engineering and Technology, Madurai, Tamil NaduKeywords: Cardiac detection, PNN, GLCM, Feature extraction, K-means cluster, Machine learning

Others

195. P2DB-chat

The project titled peer-to-peer distributed blockchain database messaging presents the development of an instant messaging application based on the concept of peer-to-peer using Inter Planetary File System (IPFS) and Blockchain. The P2P architecture is a decentralized architecture, where neither client nor server status exists in a network. Every client act as a server. This report describes one possible way to implement a chat system using a Peer-To-Peer model instead of a client/server model without the need to sign up for the specified service to be able to use it.

Published by: Kesavan S., Charles R., Raja Prithya P., Rajavel V., B. KirubaResearch Area: Decentralised

Organisation: Hindusthan Institute of Technology, Malumichampatty, Tamil NaduKeywords: Decentralized applications, Dapps, IPFS (Interplanetary Filesystem), P2P network, Peer-to-Peer, P2DB-chat

Research Paper

196. Replacement of fine aggregate by using glass material in concrete

Glass powder (GP) used in concrete making leads to a greener environment. In shops, damaged glass sheets & sheet glass cuttings are going to waste, which is not recycled at present and usually delivered to landfills for disposal. Using GP in concrete is an interesting possibility for the economy on waste disposal sites and conservation of the environment. This project examines the possibility of using GP as the fine aggregate replacement in concrete. Natural sand was partially replaced (0%-20%) with GP in concrete. Compressive strength (cubes and cylinders) up to 28 days of age were compared with those of high-performance concrete made with natural sand.

Published by: Ratilal Narayan Patil, Dr. S. L. Patil, Chetan Pandurang Patil, Suvarna Namdev Patil, Pratima Tedgya Valvi, Puja Vishwas GadeResearch Area: Civil Engineering

Organisation: Shrama Sadhana Bombay Trust's College of Engineering and Technology, Jalgaon, MaharashtraKeywords: Compressive strength, Durability, Split tensile strength, Waste glass concrete, Workability, Economy

Research Paper

197. Aerodynamic optimization of passenger vehicle

The growth in computational fluid dynamics has brought about a rapid increase in the study of vehicle aerodynamics aiding to meet the stringent fuel economy and pollution laws. Though there has been a lot of research in the segment of sedans and sports vehicles, there has been considerably less amount of research on the hatchback segment of vehicles. This paper aims at a study in the computational fluid dynamic simulations of a widely used passenger hatchback vehicle and a proposed model to obtain the reduced coefficient of drag value for the proposed model based on the initial widely used model and to understand the effect of the shape of a vehicle on the drag value of the vehicle. The widely used hatchback passenger vehicle (initial model) is designed based on a body, similar to that of a typical hatchback model widely sold in the Indian market. The drawbacks of the initial model are obtained via the CFD simulations and the proposed model is designed to overcome those drawbacks and offer minimal resistance to air thereby reducing the Coefficient of Drag value.

Published by: Hussain Ezzy, Mohammed Zain M., Dr. N. PrakashResearch Area: Automobile Engineering

Organisation: Hindustan Institute of Technology and Science, Chennai, Tamil NaduKeywords: Drag Optimization, Computational Fluid Dynamics, Vehicle Aerodynamics, Wake Effect, Hatchback

Technical Notes

198. Mathematics in financial market

It is about the use of mathematics and its theories in Financial Market.

Published by: Yash DroliaResearch Area: Mathematics

Organisation: NMIMS Anil Surendra Modi School of Commerce, Mumbai, MaharashtraKeywords: computational finance, Mathematical Finance, measure theory, sobol sequences for random numbers, poisson processes

Research Paper

199. Identification of novel compounds to treat Alzheimer’s disease

Alzheimer’s disease or Alzheimer’s is a brain disorder characterized by progressive loss of neural functions and dementia in elderly people. It has perilous effects on memory and other cognitive activities. Apolipoprotein (APOE) is responsible for delivering cholesterol-rich lipoproteins to the bloodstream. The maintenance of optimum levels of cholesterol is absolutely necessary as an imbalance might lead to cardiovascular and neurological diseases. Out of the four alleles for the APOE gene, the main causative agent for the onset of Alzheimer’s is the e4 allele. APOE e4 allele leads to the production of amyloid plaques which further cause the accumulation of amyloid β peptide. The excess build-up of such toxic products leads to neuronal death giving rise to early symptoms of the disease. Our research mainly focuses on the identification of potential inhibitors against Sortilin (SORT1), an APOE receptor associated with Alzheimer’s. We have employed scientific software to identify the specific conformations of ligands that show the maximum interaction with the target compound and further analyzed these results by generating descriptors computationally for QSAR studies. The optimum model was generated with r2 = 0.794, s= 0.108. We have been able to select two ligands which can be used as potential drugs to treat Alzheimer’s.

Published by: Kusumitha Shrinivasan, Swarnali Sarkar, Anand Prem RajanResearch Area: Neurobiology

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Alzheimer’s Disease, Amyloid precursor protein

Research Paper

200. EPOT- Earning Point On Time

EPOT refers to the systematic process of searching for prospective employees and stimulating them to apply for jobs in an organization. Candidates search jobs mostly using online job searching sites and applications, but these sites provide only permanent jobs. People moving to a new location they did not get any contacts for household works. Our system proposes a solution for the above-mentioned problems by providing time-based jobs as well as part-time jobs. By using the Google map API, our application may get the users locations and gives a contact for the work they needed. As it helps the user to identify the correct person according to ratings and feedback.

Published by: Ranjani M., Dinesh Kumar T., Saranya P., Vetrichelvi V. N., Nagajothi S.Research Area: Android Application

Organisation: Hindusthan Institute of Technology, Malumichampatty, Tamil NaduKeywords: Job searching, Part-time job, Full-time job, Service-based job, EPOT, Earning point on time, Android app

Research Paper

201. Framework for enhancing privacy of files in web using random key generation technique

In general online websites contain millions of articles related to different domains. The major flaw found in these websites is the absence of security for files uploaded without any protection. It is made in such a way as it is simply available for any users to change the content of these files. Thus, to overcome the above drawback we propose the system “Framework for Enhancing Privacy of the Files in Web Using Random Key Generation Technique” which makes all the files protected using key generation and encryption techniques so that no other invalid user is allowed to access the file. Even the authorized user must request to the admin to get the key for the particular file from the database to access it. Thus the system provides secured data access with original information uploaded by the data owner, it also avoids the duplication of the same content from different users of the web.

Published by: Anjana K., Kumar P.Research Area: Cloud Security

Organisation: Rajalakshmi Engineering College, Chennai, Tamil NaduKeywords: AES, Cloud, Key Generation

Research Paper

202. Implementing Li-Fi protocols

LI-FI is the latest technology in the Field of wireless communication. Nowadays many people are using internet to fulfill most of their tasks through wired or wireless networks. As the number of users is increasing, the rate of data transmission in the wireless network automatically decreases. WI-FI provides us speeds near about 150mbps as per IEEE 802.11n but still it is not able to fulfill the requirement of the user because of such reason we are introducing the LI-FI. According to the German physicist Harald Hass, LI-FI provides much higher data transmission speeds (10gbps and max up to 224gbps per second) by using visible light. In this condition the LI-FI/WI-FI is analyzed. It’s the same idea band behind infrared remote controls but is more powerful. Haas says his invention, which he calls D-LIGHT, can produce data rates faster than our average broadband connection. Nowadays, parking vehicles is one of the most tedious jobs. Hence, in order to solve this problem, a reliable system is proposed. Our system solves the current parking problems by offering guaranteed parking reservations with the lowest possible cost and searching time for drivers and the highest revenue and resource utilization for parking managers.

Published by: Nikhil Bajirao Belhekar, Anurag Sanjay Autade, Vishakha Sanjay Dhamdhere, Abhishek Ramesh DarekarResearch Area: Computer Science

Organisation: Trinity College of Engineering and Research, Pune, MaharashtraKeywords: Dynamic pricing, Dynamic Resource Allocation, Li-Fi, Smart car parking, VLC

Review Paper

203. Railway trail defense structure based IoT

The only scientific solution to natural calamities is the development of a system to predict, detect and take preventive measure using recent advancement in technology, Railway trail defence structure based on IoT. Using two types of sensor to sense and detect the obstacles. In this project, we implement an idea such as using a camera for live stream monitoring and the sensor to detect the obstacles. The main part of this paper is RPI3 which controls all the operation and passes the information through a webpage. The camera mounted on the front of the vehicle. PIR and ultrasonic sensor are used for sensing the moving and non-moving obstacles. Detecting any obstacles the signal will be sent to RPi3and it will transmit the signal to the webpage. The webpage will be transmitted to the monitor within the monitor the image of the object will appear and the locomotive pilot will turn off the engine. We also used GPS to track the train through the entire path and in which it stops due to any problems.

Published by: R. Senthil Kumar, I. Kirubakaran, A. Loganathan, K. Janani, Pyndaplang KharkongorResearch Area: Automation

Organisation: Adithya Institute of Technology, Coimbatore, TamilnaduKeywords: Raspberry Pi-3, IoT, Ultrasonic Sensor, PIR Sensor, Webcam Monitoring, GPS

Research Paper

204. College bus tracking system

Continuous Campus University Bus Tracking Mobile Application is a versatile application to help grounds individuals distinguish the present area of the transport progressively. Constant Campus University Bus Tracking Mobile Application is a mixture portable application. In any case, for this advancement, it is created for Android client as it were. It can indicate refreshed estimation time entry and the number of people inside the transport. This undertaking utilizing two gadget's implanted inside the transport, which is GPS Tracker gadget and IoT individuals counter gadget. All gadgets will transmit the information into a cloud database which is Firebase. Constant Campus University Bus Tracking Mobile Application is created as a stage for the client to get the information transmitted from the database. Other than that, Student will know the time entry of the transport and the present amount of individuals inside the transport to lead them to stay away from dawdled realizing that they hang tight for the transport that pack of traveler. The understudy additionally to make grumbling and input by means of the stage. Moreover, this task utilizing PhoneGap as an instrument stage to build up the application. The GPS Tracker gadget utilizing Arduino and IoT individuals counter utilizing Raspberry PI to transmit information. By and large, this undertaking utilizing the reusability procedures and Agile technique to finish all the framework which is included four associations to make it full framework fill in of course.

Published by: Arun S., Shibu J., Vennila S., Kalaiselvi T., Mugundhan V.Research Area: Computer Science and Engineering

Organisation: Hindusthan Institute of Technology, Malumichampatti, Tamil NaduKeywords: College Bus Tracking System, Depot, GPS, PhoneGap

Research Paper

205. Online voting system using blockchain

Blockchain as a secure trusted and decentralized architecture is used to create secure schemes, which can serve economics and society with trusted parties. Normally the concept of the voting system is spread wide all over the world. In different generations, different methods of voting system are followed. At the initial stage, the voting system was done by using the paper. Then the second level of development is that the voting is done through the Electronic Voting Machine (EVM). But there were some issues regarding the results. There were some safety issues regarding voting results. In order to increase security, we introduced the concept of blockchain in the voting system. This provides secure results and if any changes are done they can be identified easily. We will introduce a new concept called nonce. The nonce value is calculated by using the SHA256 algorithm.

Published by: Santhosh Kumar T. P., Lakshmi Shree R., Sridhar D., Sachin M., Velusamy A.Research Area: Web Application

Organisation: Hindusthan Institute of Technology, Coimbatore, Tamil NaduKeywords: Blockchain, EVM, SHA256 algorithm

Research Paper

206. Arduino based smart street light system with accident avoidance in U-turns

In this paper, we are going to discuss the streetlight system and the accident avoidance system which may help society to reduce the number of accidents which is usually happening in u-turns and also with the help of IOT based smart street lights, we can reduce the energy consumption. Streetlights play an important role in cities which means to avoid accidents, secure roads and provide better vision since evening to morning. As the world is ready to accept the technology, we need to upgrade that street light system which will reduce the energy consumptions and save energy. Also one of the major problems happens in cities is accidents, so we are applying IR mechanism to avoid the accidents that usually happens in u-turns. As our goal is to save energy, so we are using LEDs which is directional light source it can emit light in a specific direction thereby optimizing the efficiency of streetlights. The IR sensors detect the objects and set the intensity of LEDs to high for some time. The work has achieved better performance and reduces energy consumption as compared to the current system.

Published by: Rushikesh Bharatrao Choudhery, Shraddha M. Bute, Akash M. Nikam, Nividita R. Bhujade, R. S. SawantResearch Area: IoT

Organisation: Jagadambha College of Engineering and Technology, Yavatmal, MaharashtraKeywords: LED (Light Emitting Diode), IR (Infrared Sensor)

Research Paper

207. Comparative analysis of lasers in optical communication system

This paper investigates the comparative study of various lasers by varying the bit rate and dispersion. The suitability of various lasers like vertical cavity semiconductor emitting laser, directly modulated laser and Continuous wave laser for an optical transmission link is evaluated. The results have been carried out by evaluating the value of Quality factor and BER at different values of bit rate and dispersion. It is found that using Continuous wave laser; the signal can travel up to transmission length of 71 km with acceptable BER and Q factor. In addition, the effect of dispersion has also been discussed.

Published by: Satnam Singh, Puneet JainResearch Area: Optical Communication System

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: Vertical Cavity Surface Emitting Lasers (VCSEL), Pseudo-Random Bit Sequence (PRBS), Continuous Wave (CW) Lasers Directly Modulated (DM) Laser

Research Paper

208. Prognostication of breast cancer using data mining and machine learning

In this study, WPBC that is Wisconsin Prognostic Breast Cancer (original) dataset to find an efficient predictor algorithm, to predict the recurring and non-recurring nature of breast cancer. Breast cancer is the most common disease found among the women, it is difficult for the physicians to know the exact reason behind breast cancer, and they need a smart system for predicting the illness on time before it is too late to be treated. It is one of the crucial reasons for death among females all over the world. The cancer tumor is generally categorized into benign and malignant tumors. Using machine learning and data mining techniques it can easily identify the cancer cells, provide benefits to the medical system. Use of classification algorithm C5.0 and XGBOOST sums up to have a considerably better result, improving the performance of the system. İn Classification, the calculation separates the information into unmistakable gatherings. It fundamentally pursues two stages of preparing first to learn and after that to a group.

Published by: Shriya D. Narvekar, Ameya Patil, Jagruti Patil, Saniket KudooResearch Area: Computer Engineering

Organisation: VIVA Institute of Technology, Virar, MaharashtraKeywords: C5.0, Confusion matrix, F1 score, WPBC dataset, Xgboost, Breast cancer

Research Paper

209. Automotive control system using CAN protocol

In the latest years, various developments are done in Automobiles Industries. This automobile is being developed by more of electrical parts for efficient operation and development of CAN based automobile control system CAN is a standard protocol for efficient and reliable communication between the sensor, actuator, controller and other nodes in real-time applications. CAN enable us to connect all the devices together using only two wires. The efficient data transfer rate up to 1Mbps. The CAN Protocol is used to exchange information between ECU. To provide an accurate result to the driver different sensors are used like Temperature sensor, Fuel level sensor, RPM sensor Ultrasonic Sensors, etc. CAN bus to implement the system to alert the driver. This paper provides the development and implementation of various previously presented systems, which are useful to improve the driver vehicle interface.

Published by: Surekha P. Gaikwad, Atmeshkumar S. PatelResearch Area: Electronics And Communication Engineering

Organisation: Matsyodari Shikshan Sanstha's College of Engineering and Technology, Jalna, MaharashtraKeywords: CAN (Controller Area Network), ECU (Engine Control Unit), Temperature sensor, Fuel level sensor, RPM sensor, Ultrasonic Sensors

Research Paper

210. Decentralized secure money using blockchain

The blockchain is a decentralized transaction and managing the data. This technology introduced on the first for Bitcoin cryptocurrency which makes more easier for the transaction. Blockchain technology has highly raised up in 2008. The main purpose of the Blockchain technology is to provide security, anonymity and data integrity without any third party organization in control of the transactions. This helps on improving in research areas especially from the perspective of technical challenges and limitations. In this research, we have conducted survive mapping study with the goal of presenting the Blockchain technology. The main objective of the researchers is to make the challenges in understanding the current research areas. This the future way to developing more and more on Blockchain technology. A blockchain is just a chain and list of blocks which secures the transfer of funds, by using a digital signature algorithm to prove ownership. Each block in the blockchain will have its own digital signature. We create a web page that contains the login and registration page. We create a key pair of each user that contains the private key and public key. Every time we check this blockchain is valid or not. The main reason for the paper is to research and focus on revealing and improving limitations of Blockchain from privacy and security perspectives. On the basis of this studying the blockchain we highly recommend the researchers to develop in the future.

Published by: Dr. S. Gunasekaran, Dr. G. Ravi Kumar, S. Nirmal Balaji, Gokul R., R. Mahilan, Pooja M.Research Area: Blockchain Technology

Organisation: Coimbatore Institute of Engineering and Technology, Coimbatore, Tamil NaduKeywords: Blockchain, Cryptocurrency, Transaction, Security, Data integrity, Anonymity, Peer-to-peer computing Ethereium

Research Paper

211. Optimization of generation-specific buying plan for premium lingerie brand

Buying a plan is the most important aspect of a profitable retail business. Retail buying plan includes sales forecast process by analyzing the factors affecting it namely aggregation of sales and exogenous variables. The conventional buying plan is centered around a common customer profile. However, in the future, we need a generation specific buying plan catering to their specific design expectations. In this study propose a new replenishment strategy formulated for Gen Z customers. The new buying plan strategy weighs the recent trends and prevailing sales scenarios to forecast the replenishment quantity and re-order point. The evolved strategy carries its references to sales history data, trends, aggregation of data for the product topology, especially for Gen Z customers.

Published by: Vinosha B., Nithyaprakash V.Research Area: Retail Management

Organisation: Bannari Amman Institute of Technology, Sathyamangalam, Tamil NaduKeywords: Forecast quantity, End of month stock, Actual sales quantity, Absolute deviation

Research Paper

212. Analysis and prevention of suicides using World Health Organization (WHO) data

Youth committing suicides is the major public health issue in the world. It is the third leading death reason in the United States of America for ages between 13-18. Many adults who have suicidal thoughts or make a decision of committing suicide plan never approach any professional for help or advise. Most of the cases, people attempting suicide don’t express it a lot in person due to the judgmental attitude of society. We have come with an idea of using WHO published data on suicide. With this we evaluate results to recognize and reduce the suicidal risk of the age group committing more suicides. We can use the same data to target the right audience through social media and campaigns to prevent it and reduce the cases. Linear regression and Random Forest algorithms are used which can predict the possible cases of suicides. We included a prediction algorithm called fbprophet. Once the analysis of the dataset is completed, we visualize the data and the group of audience committing more suicides will be targeted on social media. In the part of prevention, the audience is targeted on Facebook by using a parameter like the age, sex, and region. For this Facebook provides a paid medium through which we can provide awareness and motivation for targeted people.

Published by: Ronanki Bharath, Janaki S., Bhanu Narra, Rishabh Gupta, S. RamaResearch Area: Data Analytics

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: WHO Data, Prediction, Fbprophet, Suicide, Linear Regression, Random Forest

Review Paper

213. Eliminating the redundant data for side channel in cloud

In recent years, the amount of data stored at the cloud storage is increasing rapidly due to the prevalence of data outsourcing. In order to be cost-effective and to reduce the bandwidth consumption, cloud stores use cross-user client-side data deduplication which eliminates the need to store redundant copies by keeping only a single copy of the data at the cloud storage. Cloud storage providers generally adopt data deduplication, a technique for eliminating redundant data by keeping only a single copy of a file, thus saving a considerable amount of storage and bandwidth. Even then, the attackers use many deduplication protocols to steal information. For example, an attacker can perform the duplicate check to verify whether a file (e.g., a pay slip, with a specific name and salary amount) is already stored (by someone else), hence breaching the user privacy.

Published by: C. V. Usha Kiran, C.Reddineelima, B. Lijitha, K.Somesh, G.VenugopalResearch Area: Computer Science and Engineering

Organisation: Mother Theresa Institute of Engineering and Technology, Dandapalle, Andhra PradeshKeywords: Cloud Storage, Side Channel, Data Deduplication, Privacy

Research Paper

214. Application of 8D methodology for productivity improvement in assembly line

Productivity rate means the number of products produced for a specific amount of time. For an Industry to meet the customer demands on time, the productivity rate should be high. This research paper deals with the application of the 8D methodology for increasing the productivity by reducing the cycle time of the process in a wheel and rim assembly line. The 8D methodology is problem-solving eight disciplinary methods which help in identifying, analyzing, providing solutions and eliminating the reoccurrence of the problems. This paper deals with identifying the root cause of the problem and providing the solutions and also to prevent reoccurrence of the problem. This paper also deals with Value Stream mapping and Cause and Effect Diagram for analyzing the problem. This methodology helps to identify and solve the problem through the simplest approach by a step by step procedure.

Published by: Pradeep S., Ganesh Kumar S., Karthik R., Sai Suraj A., Gopi Kishore S.Research Area: Manufacturing Methodology

Organisation: Hindustan Institute of Technology and Science, Chennai, Tamil NaduKeywords: Productivity improvement, 8D methodology, Value stream mapping, Cause and effect diagram

Research Paper

215. A survey on empowering women in the workplace special reference to Kurukshetra University, Kurukshetra

Today the empowerment of women has become one of the most important concerns of the 21st century. But practically women empowerment is still an illusion of reality. The career priorities of working professionals are consistent across genders, women in the workplace continue to face issues limiting their growth trajectory within organizations. There is still a dearth of strong female leaders in organizations that women can look up to as role models. By reviewing major strands of the theoretical, methodological, and empirical literature on women empowerment from the different fields and attempt to summarize what we know and don’t know about what leads to women’s empowerment in the education sector. This paper attempts to analyze the status of women empowerment in Kurukshetra University, Kurukshetra by randomly collecting data from various faculty members of different departments. and highlights the reasons why working women in university feel they are under-represented in leadership positions. Based on the analysis, this study will provide some concrete recommendations regarding the key drivers which will facilitate working women in their careers within the university.

Published by: ShivaniResearch Area: Management

Organisation: Kurukshetra University, Kurukshetra, HaryanaKeywords: Women Empowerment, Leadership, Kurukshetra University

Research Paper

216. Smart route potential generation by using insolent plate system combined with cosmic panel

Through this project, we have tried to generate the electricity through the insolent plate system and cosmic panel. The idea of this project came from a road power generator. The smart route potential generation system is a new type of unconventional source of energy as well as combined a cosmic panel for a more need of binary generation. As it works by reusing the wasted energy from vehicles and cosmic rays, the kinetic energy can be converted to electrical energy. Millions of vehicles are traveling on our roads and panel is the field of technology and research related to the devices which directly convert sunlight into electricity. Which can be both combined process are used in powering roadway signs, street lights, and storage systems for back-up and emergency power. This will help the economy by producing electricity at less cost than petrol and nuclear. In this paper, an experimental approach is presented in order to prove the concept of operation of the SRPG system as a usable form of energy.

Published by: N. Mohamed Asif, K. MaheswaranResearch Area: Electronic and Electrical Communication

Organisation: M.I.E.T Engineering College, Tiruchirappalli, Tamil NaduKeywords: Insolent Plate, Cosmic Panel, Power Generation, Alternative Energy, Renewable Energy, Flywheel, Belt Drive

Research Paper

217. E-Cycle

Nowadays personal and efficient modes of transportation used in India include bicycles, mopeds, and motorcycles. These mopeds and motorcycles tend to be more costly in terms of initial buying cost, ever-rising prices of fuels required for driving these vehicles & high maintenance costs. Also, the fossil fuel deposits are getting depleted day by day and it’s hard to find the new ones to replace them. Moreover, pollution due to these fuels is jeopardizing the environment continuously. On the other hand, the low buying cost and zero running cost of traditional bicycle sometimes tend to be inconceivable as lots of muscle power is wasted by rider propelling the pedals to rotate the driving rear wheel. Keeping all this in mind, we proposed a new way to cater to people as well as to provide a solution for environmental pollution. Thus Solar Energy is one of the freely available energy sources in nature which could be harnessed easily and converted to electrical energy using a low-cost mechanism such as solar panel and used for the purpose of instilling mobility. Hence, a Solar Powered Electric Bicycle is proposed over here. Our solar powered electric bicycle developed is driven by Brush-less DC motor. The solar panels mounted, on the bicycle, which will charge the battery, which in turn drive the motor.

Published by: Rahul Bodar, Shrikishan Agarwal, Brijen VasaniResearch Area: Mechanical/ Mechatronics

Organisation: SVKM’s NMIMS Mukesh Patel School of Technology Management and Engineering, Mumbai, MaharashtraKeywords: E-cycle, E bike, electric cycle

Research Paper

218. Fully automatic solar based grass cutter using AT89S52 microcontroller

In our day to day life, Automation is a very important part of the invention. Presently manually handled devices are commonly used for cutting the grass over the lawn or gardens. Because of this, there is pollution and loss of energy. The old grass cutters need to be replaced by automated one where sensors are used for guidance and obstacle detection using the battery as a power source. In our project solar panel will be attached to the top of the robot this will reduce the more power consumption. This paper presents an overview of hardware and software technological development for making efficient and costs effective grass cutter.

Published by: Ankita Ambatwar, Nikhita Nakhate, Dhanashri Shinde, Shubham DhargaveResearch Area: Electronics Engineering

Organisation: Priyadarshini College of Engineering, Nagpur, MaharashtraKeywords: Solar panel, Battery, Grass cutter, Ultrasonic sensor, Motors, 8051 series microcontroller

Others

219. Smart glove for hand gesture recognition

Human beings have a natural ability to see, listen and interact with their external world. Unfortunately, there are some people who are differently abled and do not have the ability to use their senses to the best extent possible. Such people depend on other means of communication like sign language. This presents a major roadblock for people in the hearing and speech impairment communities when they try to engage in interaction with others who are unfamiliar with the sign language, especially in their educational, social and professional environments. Therefore, it is necessary to have a gesture recognition or sign language detection system to bridge this communication gap. The main aim of the proposed system is to develop a smart glove for real-time gesture recognition using IoT. A mobile application is used as an interface to convert gestures into speech or voice output.

Published by: Bhavana Madabathula, Geethika Dantuluri, Alekhya Sripada, Gompa Haasini, Anusha VangalaResearch Area: IoT

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Flex, IMU, Bluetooth TTS, DOF

Review Paper

220. Drowsiness detection with driver assistance for accident avoidance based systems

This concept proposes a new approach to automotive safety and security with automatic car system based on autonomous region. We are proposing three concepts that are different but nearly related to tired driver detection system and an external traffic detection system based on intrusion. In recent times, automotive crashes related to fatigue have actually magnified. We have proposed a driver alert system to minimize these issues by observing the driver's eyes and sensing using IR sensor as well as a driver based local environment recognition using ultrasonic sensor.

Published by: Vikas Chauhan, Sanjay Patel, Prudhvi Chowdary, Dharshen R. S., Sai Siva Reddy, A. Mohammed ArifResearch Area: Electronics and Communication Engineering

Organisation: SRM Institute of Science and Technology Chennai, Tamil NaduKeywords: Drowsiness detection, Advanced driver assistance system, Driving-system design, Eyes Detection, Face Detection

Research Paper

221. Measurement of VO2 in sedentary healthy females: A normative study

To measure normal values of VO2 in sedentary healthy females aged 18-25 years. To know normal values of VO2 in sedentary healthy females aged 18-25 years. 20 healthy females aged 18-25 years were selected as per the inclusion & the exclusion criteria. The study was conducted after taking consent from the subjects, personal details were obtained through performance, instructions about the procedure were given and required materials were used. Normal values of VO2 were measured using power lab machine with the treadmill. VO2 values of healthy females appear lower than those standards reported for females of comparable age, weight, and height in western countries. Current study presented normative data of VO2 in sedentary healthy females aged 18-25 years

Published by: Dr. Aishwarya S. Rangari, Dr. Subrat Samal, Dr. Snehal SamalResearch Area: Cardio-respiratory

Organisation: Shri K R Pandav Ayurved College and Hospital, Nagpur, MaharashtraKeywords: VO2, Aerobic capacity

Research Paper

222. Augmentation of information management protection in hybrid clouds

As the growing technology of cloud, tremendous information is generated every day from multiple sources. Information is receiving from the distinct data center as a collaborated service nature of computing technology. Hybrid cloud model will hold the business critical content securely and on-premises control enables the process of consumer grade level alternative solutions. However, there will be a process specific security controls in the content-specific environments, it is important to manage all generic type of information and its sources in hybrid cloud access platform. Hybrid cloud platform deals with the various business insights, which increases the volume of cloud systems. Any private and public users can request for cloud services and use it as a model of on-demand services. It is necessary to monitor and regulate the security systems for controlling access from generating a large amount of data. So, the proposed system will bring the solution for a secured level of information management in a hybrid cloud service model.

Published by: Dr. R. PoorvadeviResearch Area: Cloud Computing

Organisation: Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, Kanchipuram, Tamil NaduKeywords: Cloud Vendor, Hybrid Cloud, Information Process, Service Level Agreement, Identity And Access Management, Cloud Service Provider, Service Provisioning

Technical Notes

223. Utilization of waste plastic in fly-ash bricks

The main aim of our project is to utilize those plastics and fly ash in the manufacturing of bricks. In this project, plastic bricks were cast with different proportions with quarry dust & fly-ash. The plastic percentage is varied by 5%,10%,15%,20% with the casting of quarry dust and fly-ash was constant. The tests are conducted compressive strength test, water absorption test, and efflorescence test. Here the strength properties of plastic bricks comprising of waste plastics, fly ash as the constituents and the design considerations for pavement block incorporating waste plastic bags is presented. A comparative economy, etc. compression strength test was performed on the plastic brick and its strength was found to be 6.66 N/MM2 which is higher than red clay bricks which have a compressive strength of 3-5 N/mm2.

Published by: Etaveni Madhavi, Darshak Sai Ginjipelli, Kadavaluru Uday kumar, Gachu Shekar, Lavudya ApoorvaResearch Area: Concrete Materials

Organisation: St. Mary's College of Engineering and Technology, Hyderabad, TelanganaKeywords: Plastic Waste, Flyash, Compressive Strength, Water Absorption

Research Paper

224. Offline speech recognition on android device based on supervised learning

Offline Android Smartphone Assistant is a virtual personal assistant which is implemented to perform basic functionalities of the smartphone in offline mode with speech commands. The task includes open apps, toggle wi-fi, toggle Bluetooth, call a person, send messages, control brightness, open torch, etc. The key functionality of the Offline Android Smartphone Assistant is the capability of performing each and every task without the use of the internet. The users can interact with the assistant through natural voice commands. Many companies had established several virtual assistants like Google Assistant, Apple’s Siri, Amazon Alexa, etc. However, the virtual assistants established by several companies do not provide many offline functionalities. In this proposal, we provide easy to access every system functionality without using the internet using Speech Recognition. This application will help people in areas where internet connectivity is hardly possible. The application also provides the functionality of a screen overlay. The application uses Natural Language Processing for processing the voice commands and performing the required tasks.

Published by: Reeta Bandhu, Nikhil Kumar Singh, Betawar Shashank SanjayResearch Area: Computer Engineering

Organisation: Sinhgad Institute of Technology, Lonavala, MaharashtraKeywords: Natural language processing, Speech recognition, Offline application, Voice commands, Screen overlay

Research Paper

225. Cloud based employee attendance management system using NFC and Face Recognition

For every organization, the attendance process is one of the important aspects to consider employee performance. Yet it is something that should be done swiftly and efficiently, without giving any effort into it. Manual attendance system could be time-consuming and error-prone, and other new system developed could prove to be complex and costly. Hence, the proposed system called as “Cloud-Based Employee Attendance Management System using NFC and Face Recognition” provides several important operations such as captured attendance records using NFC, automatic time calculation, leave and overtime checking, working hour’s evaluation, real-time updated information access, and generating reports. In order to add on to the security of genuine attendance tracking, facial recognition mechanism is embedded, so the system could not be fooled. An online portal is developed for managers to keep track of this process and manage employee attendance easily. The system can be used by any companies from small to medium size to implement cheap and efficient attendance tracking mechanism.

Published by: Ankit Rana, Vipul Pugaokar, Akshay Sawant, Arti GoreResearch Area: Computer Engineering

Organisation: Saraswati College of Engineering, Navi Mumbai, MaharashtraKeywords: Attendance management system, Face Recognition, Cloud Computing, NFC, Web Portal

Research Paper

226. A research paper on: Automatic switching of relays according to set limits of voltage on distribution side

This Paper Presents The Design, Construction And Working Of Protective Mechanism For Single Phase Devices Against Over Voltage And Under Voltage Stage. Which Circuit Is Fabricated Using Microcontroller Atmega328, Voltage Regulator Ic, Comparators, Relays, And Other Devices. In Over Voltage Conditions, When The Supplied Voltage Is 240 V Or Above, The Relay Operates With Buzzer, However In Under Voltage, When Voltage Is 180 V Or Less, The Relay Operates With Buzzer, On Such Conditions,16×2 LCD indicates the status of the voltages as regulated voltage, low voltage and over voltage. Buzzer also beeps when over or low voltage detected. The Main Advantage Of This Protective Circuit Is That, It Can Protect The Single Phase Household Equipment As Well As On Distribution Side. In Future, This Model Can Be Modified For The Protection of Three-Phase Power System And Industry Level Equipments.

Published by: Jitendra Laxman Lohar, Ganesh Ghashiram Chawla, Kshitij Pramod khachane, Shivdas Santosh Gai, Shubham Gajanan KachareResearch Area: Power Distribution (Single Phase)

Organisation: Padm. Dr. V. B. Kolte College of Engineering and Polytechnic, Buldana, MaharashtraKeywords: Microcontroller Atmega328, Over voltage, Under voltage, Buzzer, LCD display

Research Paper

227. Machine learning algorithms for intrusion classification

The usage of the Internet, the amount of network traffic volume is rapidly raising high. Preventing such huge, sensitive data from security attacks is equally important. Monitoring network traffic may indicate a possible intrusion in the network and therefore anomaly detection is important to detect and prevent such attacks. One of the approaches to anomaly detection is based on machine learning classification techniques. Here we apply seven different machine learning techniques: K-Means, K-Nearest Neighbours (KNN), Fuzzy C-Means (FCM), Support Vector Machine (SVM), Naïve-Bayes (NB), Radial Basis Function (RBF) and Ensemble method (Weighted average method) comprising of K-Nearest Neighbours and Naïve-Bayes (NB) on NSL-KDD dataset and evaluate the performance of these techniques. We also deduced how the change in the training size can affect the training time and the accuracy of each algorithm

Published by: Alapati Avinash, Alla Haripriya, B. SandeepResearch Area: Computer Science And Engineering

Organisation: Anil Neerukonda Institute of Technology and Sciences, Bheemunipatnam, Andhra PradeshKeywords: Intrusion, Anomaly detection, NSL-KDD dataset

Others

228. Design development of women’s casual wear (travel jacket)

The present generation of women who are under the age category of 18-25 are the ones who travel a lot. Out of which most of them are gallivanter, fashionistas, early adaptors, and digital natives. They are in search of something new. They wish to travel seeking new experiences that are filled with fun, adventure, and activities that get them the at most pleasure. This thirst for pleasure makes them go on trips very often. Travel jackets have become an essential part of the traveler’s kit. They search for travel jackets to complement their travel plans. Wearing travel jackets make them happier and also comfortable during travel. These travel jackets create an emotional feel to the wearer, every time they wear it. In this paper, the expectations and the needs of the target customer are collected and travel jackets are designed and developed to fulfill their needs and expectations. Through our study, we tried to incorporate these details into the garment through the emotional design process.

Published by: Pragatheswari, Nithya Prakash V.Research Area: Design Development

Organisation: Bannari Amman Institute of Technology, Sathyamangalam, Tamil NaduKeywords: Travel, Jacket, Emotional design, Women, Pleasure, Happiness, Fun

Research Paper

229. Video transmission using Li-Fi

Light Fidelity is a wireless communication technology which uses light to transmit data from one location to another by virtue of light emitting diodes. The vision of our project is to design a system capable of transmitting data at a high data rate over the visible light spectrum and infrared radiation. In the existing system, only audio can be transmitted, but the intricacies were fixed and now video can also be dispatched. The video to be transmitted is chosen and it is fed to the LI-FI module with the aid of the microcontroller. The receiver module now sends the video to the laptop where it can be viewed.

Published by: Senthamizhselvi R., Raghul S., Karthikeyan B., Nandha Kumar G.Research Area: Communication

Organisation: SRM Easwari Engineering College, Chennai, Tamil NaduKeywords: Video transmission, Li-Fi, Micro controller, Data rate, Quality

Research Paper

230. Developing a neuro-fuzzy based framework for labour productivity assessment

Labour productivity assessment is the key to optimal planning and allocation of resources for a construction project. In this study, a detailed questionnaire covering major factors influencing work productivity has been identified by surveying the labourers and their supervisors. The relative importance index (RII) has been used to consolidate the responses and identify the key factors. Based on the factors identified a field study is conducted to develop an automatic productivity assessment tool. The worker performance is estimated using data collected from wearable devices. The data is calibrated against the site supervisor estimated labour performance by training a neuro-fuzzy interference system. The developed model can serve as a framework for the automatic assessment of labour performance in a construction site. This can find extensive applications in making the resource allocation process in major construction sites more rational.

Published by: Anushya Bharathi, Dr. G. Chitra, S. VaidyanathanResearch Area: Civil Engineering

Organisation: Thiagarajar College of Engineering, Madurai, Tamil NaduKeywords: Labour productivity, Neuro-fuzzy system, Activity study, Expert system, Resource optimization

Thesis

231. Diagnosing the obstructive sleep apnea from encountered multi parameter values

Patients suspected of suffering sleep apnea and hypopnea syndrome (SAHS) have to undergo sleep studies such as expensive polysomnography to be diagnosed. Healthcare professionals are constantly looking for ways to improve the ease of diagnosis and comfort for this kind of patients as well as reducing both the number of sleep studies they need to undergo and the waiting times.

Published by: Navin R., Palur Sai Vivek, Pulu Gulla Lakshmi Vineeth, V. Sathya Narayanan, D. Padmapriya M. E.Research Area: IoT And Embedded Systems

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Obstructive sleep apnea diagnosis, SAHS, Sleep studies

Research Paper

232. Preliminary screening of suitable clones for manufacturing green tea from the existing released clones in northeast India

In India, the existing clones and variety of tea plants have been developed for manufacturing of black tea (CTC & Orthodox Tea). But till now no clone & variety of tea has been identified exclusively for manufacturing of Green Tea (steamed/ roasted) So one humble attempt was made to identify tea clones from the existing released clones for preference of manufacturing Green Tea on the basis of their taste & their Polyphenol: Amino Acid ratio. Selected ten clones representing the China Jat, Assam Jat, Cambod Variety and Industry released Clones of Assam on the basis of their availability and potential quality on CTC and Orthodox Tea were analyzed with their morphological character,chemical analysis and green tea taste by tea taster indicates that TV-1, TV-7, P126 have the best potentiality for manufacturing green tea.

Published by: Bhupen DekaResearch Area: Tea

Organisation: Tocklai Tea Research Institute, Jorhat, AssamKeywords: Green tea, Catechin, Epigallocatechin-3-gallate, Antioxidants, CTC (Curling Tearing Crushing), Orthodox, Cambod, Industry released

Research Paper

233. Factors to be considered for location selection for affordable housing

Due to the rise in population in metro cities, there has been a substantial rise in the demand for houses. This demand, however, is more from the service-going employees which majorly falls under lower and medium income group. To fulfill this increasing demand and meet these uprising challenges, affordable housing has more or less become the necessity of our developing country. Affordable housing is a challenge that many countries are currently dealing with. “Affordable housing refers to any housing that meets some form of affordability criterion, which could be income level of the family, size of the dwelling unit or affordability in terms of EMI size or a ratio of house price to annual income.” Along with constructing the right number of houses, constructing it within the right budget is also equally necessary. With an increase in the rate of land parcels in and around the metro cities, selection of appropriate land parcel plays an important role in keeping the project within the desired budget. Budget is the most crucial constraint of the project and not much buffer is available for the same. Undertaking an affordable housing project should be such that the profitability of the developer company is achieved as well as the financial needs of the consumer are complimented. It should be a win-win situation for both parties. To execute such a project, the location for the project should be well planned. This is especially important for targeting the pricing sensitivity to locational advantage. Selecting the appropriate location will solemnly solve the budgetary restriction for the developer and the tenements. In this research paper, we will discuss the factors to be considered while selecting an appropriate location to execute a successful affordable housing project.

Published by: Sarvesh S. Nerurkar, Swati SakpalResearch Area: Construction Management

Organisation: MIT College of Management, Pune, MaharashtraKeywords: Affordable housing, Right budget, Appropriate land parcel, Profitability of the developer

Case Study

234. Outcome Based Education, need for the hour- NBA

Outcome-Based Education (OBE) model is being adopted at a fast pace at Engineering colleges in India at the moment. It is considered as a giant leap forward to improve technical education in India and help Indian Engineers compete with their global counterparts. Outcome Based Education (OBE) is an important demonstration Tool for student-centered instruction that focuses on measuring student performance through outcomes. Outcomes include Engineering Knowledge, Problem Analysis, Ethic, Individual and Team Work, Communication etc... It enables the students to perpetuate these outcomes as they perceive over the years of engineering. The students are evaluated for all the required parameters (Outcomes) during the course of the program. The attainment, defined by the NBA, gives a substantial opportunity for Tier-II students to bridge this gap of employability. In this present paper, a case study is developed through CO-PO mapping and attainment for Mechanical Engineering Students of Tier-II. The formulated rubrics assessment is indicative of a continuous improvement strategy that can be easily adaptable by faculty and students across engineering streams.

Published by: S. Nithya PoornimaResearch Area: Education

Organisation: BMS Institute of Technology and Management, Bengaluru, KarnatakaKeywords: CO-PO Mapping, Outcomes, Rubrics, Attainment

Research Paper

235. To find out correlation between the temperament and the parameters of a smile: A photographic study on visagism

In order to design a more life-like smile, it is necessary to co-relate it to the personality of the subject. It is possible using a novel concept of “Visagism”. With the Visagism concept, clinicians can design a smile that blends the patient’s physical appearance with his/her personality and desires. Aim: To find out as to whether the concept of Visagism is present in dentate individuals. Setting and Design: A self-reporting questionnaire was formulated which highlighted the reaction of female subjects to different situations in life and hence their personality was determined. Materials and Methods: The photographs of teeth of the same subjects were taken, and their tooth forms, long axes, and embrasure lines were drawn using the software. Statistical Analysis Used: These parameters were then statistically analyzed and correlated with the individual personality. Results and Conclusion: A definite correlation was found between the temperament and the parameters of a smile. The parameter of tooth form was more closely related to the personality and the most common temperament was found out.

Published by: Dr. Pradnya V. Bansode, Dr. Seema D. Pathak, Dr. M. B. Wavdhane, Dr. Devika M. KalaskarResearch Area: Dentistry

Organisation: Government Dental Hospital and College, Aurangabad, MaharashtraKeywords: Esthetics, Personality, Smile design, Visagism

Research Paper

236. Quality improvement in carbon bush machining

This paper presents a Lean Six Sigma improvement in a production line of the company’s Carbon Bush Machining Sector, in order to eliminate losses that cause low productivity, affecting the fulfillment of the production plan and customer satisfaction. The use of Lean methodology following the DMAIC (Define, Measure, Analyze, Improve and Control) stages allowed analysing the factors that cause wastages of carbon bush. The root cause for wastages were identified with helps of quality tools like (control chart, Pareto chart, cause and effect and diagram, etc). The major problem and cause that contributes for wastage which we assumed were through handling of work pieces (carbon bush), done by both machines and humans. The solution was generated after collection of various data through inspection.

Published by: Kamatchi T., Kishore S., Bhuvanesh M., Karthikeyan M., Arun Senthil Kumar A.Research Area: Six Sigma

Organisation: Velammal College of Engineering and Technology, Madurai, Tamil NaduKeywords: Lean Six Sigma, DMAIC, Carbon Bush, Quality Tools

Research Paper

237. Design and development of wheel spray pump

In the agricultural sector generally, the farmer uses the traditional way that means spray carried on back and spraying crop. This becomes time consuming, costly and human efforts is a major concern, these problems can be overcome by using mechanically operated wheel spray pump. It facilitates the uniform spread of the chemicals, it is capable of spraying chemicals at the desired level, precision made nozzle tip for adjustable stream and capable of throwing foggy spray as per requirement. In our project we use the slider-crank mechanism to convert rotational motion into a reciprocating motion to operate the pump, thus the pesticide is spread through the nozzle. This work gives a continuously foggy flow of pesticide at the required pressure and height. A special arrangement is implemented in this project to adjust the pressure as high or low. We also use two wheels at the back of the frame to balance the complete assembly. By using the wheel spray pump, spraying time and human efforts reduce and results in cost reduction.

Published by: Akash Manoj Holam, Bharat Maruti Kadwaikar, Manish Mahendra Pawar, Abhijeet Gurunath Naik, Rahul Damodar BelekarResearch Area: Automobile Engineering

Organisation: Rajendra Mane College of Engineering and Technology, Ambav, MaharashtraKeywords: Cost, Nozzles, Pump, Spraying time, Reduced human efforts, Back pain

Research Paper

238. Implementation of ROS-I on industrial robot simulation environment

This paper presents the procedure for the implementation of ROS-I architecture into the Robotic simulation offline programming environment. The Implementation is done by developing the packages which are necessary for implementing into ROS-I that are related to modeling and Configuring of the Industrial Robot. The Communication between ROS-I and Roboguide will be established, and motion planning can be performed through Rviz moveit! Interfaces.

Published by: Prasanth T.Research Area: Mechanical Engineering

Organisation: Bannari Amman Institute of Technology, Sathyamangalam, Tamil NaduKeywords: ROS-I, Rviz, Moveit

Research Paper

239. Software defect prediction

Software Defect Prediction is an important aspect in order to ensure software quality. Deep Learning techniques can also be used for the same. In this paper, we propose to extract a set of expressive features from an initial set of basic change measures using Artificial Neural Network (ANN), and then train a classifier based on the extracted features using Decision tree and compare it to three other methods wherein features are extracted from a set of initial change measures using dimensionality reduction techniques that include Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Kernel PCA. We use five open source datasets from NASA Promise Data Repository to perform this comparative study. For evaluation, three widely used metrics: Accuracy, F1 scores and Areas under Receiver Operating Characteristic curve are used. It is found that the Artificial Neural Network outperformed all the other dimensionality reduction techniques. Kernel PCA performed best amongst the dimensionality reduction techniques.

Published by: Sree Abirami S., Umavathi R., Benula L., Mathiyalagan P.Research Area: Journal

Organisation: Sri Ramakrishna Engineering College, Coimbatore, Tamil NaduKeywords: Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), Kernel PCA

Research Paper

240. Event management and social media marketing

Event management is a multidisciplinary occupation, it is an exciting and continuously growing industry. It attracts people who possess creative talents, and organizational skills which they use to execute all event and event-related functions. Event managers are in a work environment in which no two days are the same. Events not only provide people with Entertainment, Unique, and Memorable experiences but also have the ability to reflect and mold a society. Thus it becomes important for an Event Manager or Event Management organisation to understand their Capabilities, Target Market and the Trends in the Event Management Industry, the marketing of their services also need to be done right in order to keep the present customers informed and attract new potential customers, not to forget to remain a step ahead of the competition in this ever-evolving industry. Social Media Marketing is gaining more and more acknowledgment with various industries increasing brand awareness and focusing on increasing their interactions with their customer. Similar practices of using social media to promote the event and event-related content can be useful for an organization in the event management industry too.

Published by: Namratha J., Dr. A. Thiruchelvi, Natasha J. Research Area: Tourism Management

Organisation: Anna University, Chennai, Tamil NaduKeywords: Event management, Event managers, Events, Event management organizations, Social media and social media marketing, Promotion, Brand awareness

Research Paper

241. Anticipating thyroid disorders using data mining techniques

Anticipating the Thyroid disease is one of the currents focuses in Medical research. The most difficult undertaking of the restorative field is to give the infection analysis at the beginning period with higher precision. The sickness forecast assumes a critical part in information mining. Information mining is mostly utilized as a part of medicinal service associations for basic leadership, diagnosing malady and giving better treatment to the patients. It is a procedure for investigating huge informational collections to discover a few examples. These examples can be useful for forecast demonstrating. In this theory, the principal objective is an order of thyroid ailment. An investigation of thyroid sickness finding systems utilized as a part of information mining. The thyroid is one of the impulsive syndromes in the restorative field. Thyroid hormones control the body's metabolic rate. Also, information mining methods have been connected in different areas the order, after the effects of the restorative informational index which helps the method for medications to the patients. In proposing a procedure, look at different calculations, for example, naval forces' bayer, random backwoods, irregular tree, REP Tree, D tree to discover which calculation to give the best outcome for thyroid ailment expectation. An exploratory examination is conveyed out our calculation to accomplish better exactness. There are numerous information mining grouping Algorithms, for example, naval forces, REP Tree, arbitrary tree, irregular forest, D tree and k-overlap cross approval et cetera. The proposed Algorithm gives exactness 99.80% with cross approval k=6.

Published by: S. Sai Vasavi, S. Shruthi, S. Sai Sri Harshini, VNVLS SwathiResearch Area: Data Mining

Organisation: CVR College of Engineering, Pocharam, TelanganaKeywords: Classification, D tree, Information mining, REP tree, Thyroid disease, WEKA

Research Paper

242. Importance of use of sanitary napkin during menstruation cycle

In respect to carrying the present research paper, the main aims are to provide the importance of using sanitary napkins in the menstruation cycle. Awareness and essential information need to provide to all female in rural areas so that effectiveness will be developed in a systematic manner. Furthermore, thematic analysis has been implemented that assists to find effective information towards the aim. Descriptive research design also ascertains that make proper outcomes in business will in-depth information in the society

Published by: Garima WadhwaniResearch Area: Social Issue

Organisation: Cognus Technology, Jaipur, RajasthanKeywords: Napkin, Mensuration, Female, Care, Awareness

Research Paper

243. Elimination of cylinder head valve guide wrong fitment

The Engine is powered by burning the air-fuel mixture inside the combustion chamber and the power is delivered to run the Vehicle. The mixture of air-fuel is required in the correct quantity to attain maximum efficiency. There are two valves present in the Engine cylinder head which is inlet and exhaust valve. This two valve will have different parameters, in which the exhaust valve is small and the inlet is big compared to the exhaust valve. Valve Guides and valve seats are very important for the continuous proper working of the inlet and exhaust valves. The valve guide is helpful for the valve to sit in the correct position with respect to the valve seat. Valve Guide is a cylindrical piece which is manually loaded in the machine and pressed into the cylinder head during the cylinder head machining process. Since the valve guide is inserted in the valve guide press machine manually there is a chance of inserting in the wrong direction inside the cylinder head. This problem leads to a drastic amount of scrap and increases in material cost. The solution to this problem can be solved by adding an airline and pressure sensor in the valve guide holder in valve guide press machine. This can eliminate the problem and also improves in the quality time and in the reduction of the amount of scrap.

Published by: Deepak Sekar, Mohan Y, Mithun CResearch Area: Manufacturing

Organisation: Hindustan Institute of Technology and Science, Chennai, Tamil NaduKeywords: Cylinder Head, Valve Guide, Poke-Yoke

Research Paper

244. Analysis of David Fincher as an Auteur

Director David Fincher is an acclaimed director and is one of the most sought after directors presently working in Hollywood. His films have elements which set him apart from other filmmakers. His choices of shots in his films and camera work in his film qualify him as an auteur of his films. This paper will closely examine all of his ten feature films which show his style of film making over the years. The films that will be taken under observation are Alien 3 (1992), Se7en (1995), The Game (1997), Fight Club (1999), Panic Room (2002), Zodiac (2007), The Curious Case Of Benjamin Button (2008), The Social Network (2010), The Girl With The Dragon Tattoo (2011) and Gone Girl (2014). This paper will examine the idiosyncrasies observed over the years in his films during different narrative plot points. Using the variation of auteur theory as laid out by American film theorist Andrew Sarris, this thesis will explore the signature elements of Fincher’s camera positioning, camera motion, and camera angling in order to qualify Fincher as an auteur. Their usage will help us understand the narrative function that these shots play in his films.

Published by: Mayank ShuklaResearch Area: Film

Organisation: Amity School of Communication, Noida, Uttar PradeshKeywords: Auteur Theory, Camera Angle, Camera Movement, Camera Positioning, David Fincher, Alien 3, Se7en, Fight Club, Panic Room, Zodiac, Gone Girl

Transaction Paper

245. Air and water quality monitoring system

The degradation of water resources and air pollution has become a common problem. The conventional methods of monitoring involve the manual collection of water and air sample from different locations. These samples are tested in the laboratory using rigorous skills. Such approaches are time-consuming and are no longer to be considered to be efficient. Moreover, the current methodologies include analyzing various kinds of parameters of quality such as physical and chemical. The old method of quality detection and communication is time-consuming, low precision and costly. Therefore, there is a need for continuous monitoring of water and air quality parameters in real time. By focusing on the above issues, a low-cost monitoring system is using that can monitor air and water quality in real time using IoT. Each device has a unique identification and must be able to capture real-time data autonomously. Basic building blocks of IoT consist of sensors, processors, gateways, and applications. In the system, water quality parameters are measured by different sensors such as pH, turbidity, dissolved oxygen, temperature, CO2 level and Air quality for communicating data onto a platform via microcontroller based system.

Published by: Aditya Pradeep Kavathekar, Swastika Anil Jadhav, Krutika Gajanan Gaikwad, Pooja Pramod Pataki, Kartik K. NikamResearch Area: IoT

Organisation: Sanjay Bhokare Group of Institute, Miraj, MaharashtraKeywords: IoT, Sensor, Air, Water, Quality, NGO, Government

Research Paper

246. Effective student attendance system

Taking attendance in a class can often be a time-consuming and a manual process, which is prone to human error(s) and hence recording incorrect data. Also, querying the data per student can be, the tedious process since it involves some sort of manual tracking/counting of days attended. With advent of smartphones and tablets which are very handy to use, this process can be made completely automated and error free by using the right technologies. For this project, we are creating an android based application that can be used for Attendance tracking which is easy to use and free from any manual tasks. Users (Professor/Course Instructor) just have to add courses he/she plans to take for Fall/Spring/Summer semester in the application. Once the student ID is recorded, an application will update the appropriate attendance database for that particular course.

Published by: Tejashri Mansur Desai, S. G. Bavachkar, Aditya Jayant Desai, Hemangi Suresh Salunkhe, Sumitra Rajendra Teli, Pravin Chandrakant PatilResearch Area: Collage Managment System

Organisation: Sanjay Bhokare Group of Institute, Miraj, MaharashtraKeywords: Admin Model, Teacher Registration, Assistance Registration

Research Paper

247. Attacks and threats in Wireless Sensor Networks

Wireless sensor networks is a rising subject to research and improvement, The advances and traits in Wireless Communication technology have made the deployment of small, low fee wireless sensor nodes connected through a wireless medium, known as Wireless Sensor Networks (WSNs), technically and economically possible. These WSNs have were given several packages in diverse fields like an army, environmental monitoring, fitness, enterprise and so on. Security has already ended up a primary subject for WSNs because of the wide utility of WSNs in security-vital regions. In this paper, we check out the security-related troubles and demanding situations in wi-fi sensor networks. We identify the security threats, overview proposed safety mechanisms for wi-fi sensor networks

Published by: G. V. Pavan Nikhil, Anisetti Kalyan Rahul, Chikoti Akash, Prathik Reddy, K.ManikandhanResearch Area: Networks and Communication

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Wireless Sensor Networks (WSNs), Security, Attacks and challenges, Security mechanism

Research Paper

248. Product aspect ranking and its application

E-commerce is a transaction of buying or selling something online. E-commerce allows the customers to overcome the barriers of geographical and also allows them to purchase anytime and from anywhere and also consumers having the privilege to review positively or negatively on any product over the online. The consumer review is very important in knowing the product’s aspect and feature and it also very useful for both other consumers and firm. So in the way of finding the product aspect ranking we have proposed the methodologies in which it extracts the reviews and preprocessing, finding the aspect identification of the product, classifying the positive, negative and neutral reviews of the product by the sentiment classifier and also proposing the ranking algorithm used for the product ranking. In the data preprocessing there are methods available in which it initially differentiates the meaning and meaningless words and also it removes the postfix from each word and then tokenize each sentence by removing the emotion icons and also space. In aspect identification, we will identify the aspect from the numerous review which is given by the consumer whether it is positive or negative and on its basis of high or low score we will give a ranking. The main aims of sentiment classifier are to classify the review. The concurrent consideration of the aspect frequency and the pressure of consumer’s opinion given to each aspect on their overall opinions in the products aspects ranking and in its application.

Published by: Thirunagari Lakshmi Narasimha Vedavyas, Vanam Udayram, Kateeb Shaik Sharukh Mastan, V. EthirajuluResearch Area: Computer Science Engineering

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Product aspects, Aspect ranking, Aspect identification

Research Paper

249. An experimental study on partial replacement of perlite powder and GGBS with cement in ternary blended concrete

In the present scenario in the world, the cost and environmental pollution of cement are very high which is obtained from the cement industries. Alternately we want to decrease the cost and environmental pollution by adding waste industrial materials. Among the many types of admixtures, Perlite Powder (PP) is a material with very low thermal conductivity & GGBS from industries which can be made blended concrete with perlite and GGBS powder. For the strength purpose, partial replacement of cement is carried out by GGBS at 20%. In this work different tests have been performed on M30 grade of concrete like compression test, tensile test, water absorption test. The Present work describes the comparative study of partial replacement of Perlite and GGBS powder in cement. And the Compression and Tensile tests were performed for 7days and 28days and 56 days of curing at 4% PP + 20% constant of GGBS, the compressive strength and tensile strength both are observed to be increased by 0.54% and 1.68% respectively as compared to the conventional concrete of M30 grade. And also did water absorption at 1050C and by taking of perlite powder in Mix which controls the thermal properties of concrete.

Published by: K. N. Lakshmaiah, G. Devika, D. Harish Babu, N. V. NarayanaResearch Area: Structural Engineering

Organisation: Narasaraopeta Engineering College (Autonomous), Guntur District, Andhra PradeshKeywords: Perlite powder, GGBS, Blended concrete, Compressive strength, Tensile strength

Research Paper

250. Ensure the securities in IoT for smart home monitoring system

Smart building using IOT technique is used to maintain home automation in a smart way. In order to improve security in the home, the various sensor is used. In that PIR and MQ-6 sensors plays a major role. The data from various sensors are sent to the Arduino board and get stored in the cloud. In this paper home monitoring system with intrusion, detection technique is used. For data security, wireless sensor network (WSN) playa a major role. To facilitate data encryption, a method namely DES based on efficient key generation mechanism was proposed.

Published by: Kaviya S., Divya Lakshmi R., Jenifa G.Research Area: IoT

Organisation: KPR Institute of Engineering and Technology, Coimbatore, Tamil NaduKeywords: IoT tecnique, Intrusion detection, DES, RSA

Research Paper

251. A research paper on control of an elevator in case of failure of rope holding the inside cage

This paper explains a safety system in the current elevators which would ensure that passengers are safe even if the rope of elevator cage breaks. Elevators are largely used to ease work of human being and reduce the time of traversing up and down a multi-story building. Hence it has become equipment of prime importance. The safety of people in the elevator thus brings us to the idea of developing a low-cost and simple mechanism which can be installed in every elevator ensuring rope breakage safety of the people.

Published by: Rushikesh Rajendra Khadilkar, Jayesh Totaram Bharambe, Ajinkya Goroba Keskar, Eshwar Rajendra DhandeResearch Area: Mechanical Engineering

Organisation: PES Modern College of Engineering, Pune, MaharashtraKeywords: Elevator, Rope, Safety, Brakes, Sensors, Solenoid, Controller, Cage

Review Paper

252. Comparative study on the working of two non-governmental organizations in India – Make A Difference (MAD) and Latika Roy Foundation (LRF)

This review paper entails various details regarding a national level NGO (Make A Difference (MAD)) and a regional level NGO (Latika Roy Foundation (LRF)). A study regarding the individual structures and functions of these organizations has been done and suggestions as to how these two organizations can work in a coordinated manner have also been provided. MAD has a more macroscopic impact whereas LRF has a more microscopic impact. It is the amalgamation of these two impact levels which forms the foundation of the review paper. A macroscopic entity can have a more profound effect if it is enhanced microscopically, and a microscopic entity can have more outreach if provided with the required macroscopic resources. This is precisely the reason, for suggesting a coordinated helping system between a national level NGO and a regional or a state level NGO. Such a system is not only self-sustained but also mutually beneficial to the two organizations as explained earlier. Reasons for the selection of the said NGOs, their structures, recruitment processes, funding sources, and functioning have been covered in remarkable detail as well.

Published by: Kusumitha Shrinivasan, Meenakshi Jaikumar, Dr. Anand Prem RajanResearch Area: Public Relations

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: National, Regional, Impact, Structures, Functioning

Research Paper

253. Design scheme for copyright management system based on digital watermarking and blockchain

In the past, traditional digital copyright protection system based on digital watermarking focused on implementation of watermarking text or image ignored the generation and storage of watermark information. In this paper, a new design scheme of a copyright management system based on digital watermarking and blockchain is proposed which combines digital watermarking, blockchain, perceptual hash function, Quick Response (QR) code, and Inter Planetary File System (IPFS). The blockchain is used to securely store watermark information that implements to provide a timestamp authentication. A perceptual hash function is used to generate a hash value based on the structure information of the watermark image can be confirmed without the original image. A QR code is used to generate a QR image containing image hash and copyright information of the owner. IPFS is used to store and distribute watermarked images without any centralized server and can reduce information-leakage, improves security and transparency of information to facilitate circulation in the network. Here we give BST to check the perceptual hash values to see whether the image is copyrighted or not.

Published by: Orisi Pravallika, K. Soma Sekhar, CH. Seshadri RaoResearch Area: Ieee

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Copyright management, Digital watermarking, Blockchain, DHA, QR code, IPFS, BST

Research Paper

254. Optimization of CNC turning process parameters for surface roughness of AA3003 using ANN Tool on MATLAB

The aim of the present research focuses on the prediction of machining parameters that improve the quality of the surface finish. The surface roughness is one of the important properties of workpiece quality in the CNC turning process. An effective approach of optimization techniques “ANN tool on MATLAB” and Response surface methodology has been implemented.T he factors investigated was spindle speed, feed rate and depth of cut. The parameters that affect the turning operation are vibration, tool wear, surface roughness, etc. Among this surface roughness is an important factor that affects the quality of the manufacturing process. The main objective of this report is to predict the surface roughness on AA 3003, by optimizing the input parameters such as spindle speed, feed rate and depth of cut by using carbide tool. A second order mathematical model is developed using “Taguchi method and optimization of surface roughness using ANN tool on MATLAB for response surface methodology.” The experimental results indicate that the proposed mathematical models suggested could adequately describe the performance indicators within the limits of the factors that are being investigated. The feed rate is the most significant factor that influences the surface roughness and however, there are other factors that provide secondary contributions to the performance indicators. Therefore, this study attempts the application of response surface methodology and “ANN tool on MATLAB” to find the optimal solution of the cutting conditions for giving the minimum value of surface roughness.

Published by: Krishan Kant Sharma, Kanaram Choudhary, Himanshu Prabhakar, Laxmikant Prajapat, Rohan Pradhan, Ravi Choudhary, Vijay Kumar JangidResearch Area: Mechanical Engineering

Organisation: Sri Balaji College of Engineering and Technology, Jaipur, RajasthanKeywords: Optimization CNC Process Parameters, Artificial Neural Network Tool, MATLAB

Research Paper

255. Analysis of speech recognition techniques

This paper focuses on speech recognition techniques such as LPC(linear predictive coding), MFCC(Mel-frequency Cepstral coefficients) with Hidden Markov Models, LPCC(linear predictive Cepstral coding), and RASTA and will compare these techniques to find a most accurate and efficient way to recognize speech. Speech recognition is the process in which program or machine do the identification of words or phrases and convert them to machine-readable format. Additionally, this paper also focuses on NLP(natural language processing) techniques used with the speech recognition process. Once the speech signal is converted to text then NLP is used to understand and generate what has been said. NLU(natural language understanding) and NLG(natural language generation) are two important steps in NLP, through this paper, we will compare and analysis techniques to find out which we can use with speech recognition for effective results. The Objective of this paper is to find out the best technique which is currently used.

Published by: Pranit Gadekar, Mohmmad Hilal Kaldane, Dipesh Pawar, Omkar Jadhav, Anita PatilResearch Area: Artificlal Intelligence

Organisation: Ramrao Adik Institute of Technology, Mumbai, MaharashtraKeywords: LPC, LPCC, MFCC, Hidden Markov model, NLP, NLU, NLG

Research Paper

256. Kinesics of engine assembly line using lean management

This paper explains the use of kinesics and visual management to improve line productivity in engine assembly. We use principles of visual management and lean production together to reduce losses and reduce the time taken to produce one complete engine. Since the assembly is done by hand, humane factors such as vagueness, error, speed and many more affect the productivity. These can be reduced by using signs and symbols which help workers to make the right decision in the shortest time. we will explain in detail how this can be done, and how effective results can be, along with the better organization of the factory floor and better communication without any verbal intervention. This will help increase productivity and reduce losses hereby helping the line to maintain its lean standards.

Published by: Rajesh Kannaa T. J. N., Damian LaffreyResearch Area: Total Quality Business Management

Organisation: Hindustan Institute of Technology and Science, Chennai, Tamil NaduKeywords: Kinesics, Assembly line, Lean management

Others

257. Monitoring healthcare system using IoT

The project looks at the construction of a simple device that will be capable of transferring the data of a patient's vital signs to a remote device wirelessly. The necessity of this project is to alleviate the difficulty that is encountered by medical experts in monitoring multiple patients simultaneously. The project will enable them to observe patients without having to be physically present at their bedside, be it in the hospital or in their home. A patient's body temperature, heart rate, and blood pressure are transferred wirelessly through an agent such as Bluetooth technology and stored in a database using SQL yag. The interface between application and database is web service using NetBeans java servelets

Published by: Chinta Prudhvi Kiran, Mandava Omkar Chowdary, Dr. A. MuruganResearch Area: IoT

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Vital signs, Remote device, Bluetooth technology, SQL yag, Java servelets

Research Paper

258. Eradication of hydraulic anamolies using smart sewer inspection robot

This paper presents a robotic mechanism for detecting and eliminating blockages in sewage pipes. It is a robot that will be used to clean the interior of the pipes using a brushing mechanism. One of the critical areas of the oil and gas industry is the transport of oil and other fluids through a network of pipes. Over time these pipes have accumulated the amount of slug and other deposits; this leads to a decrease in pipeline carrying capacity, reduced reliability, loss of power due to higher pumping pressure required and irregular flow. This will not only clean the interior of the pipe but also be able to send live video feedback to the personnel on the ground depicting the kind of residues found in the pipes. The robot can also be added with additional sensors to relay any other critical information.

Published by: P. KavithaResearch Area: Electronics And Communication Engineering

Organisation: MAM School of Engineering, Siruganur, Tamil NaduKeywords: Sewage, Cleaning, Blockages, Robot, Detection, Rotating. Pipelines

Research Paper

259. Location based reminder application

The aim to develop Location based reminder system provides an interactive user-friendly environment to user's as well as privacy about their saved location and current location. Location-based service, provide many facilities for smart mobile phone users. They can navigate the map, set location while driving. With the using of “Location Based Reminder System” the user can set their task or reminder for a particular location. When the user is near about the location, it will automatically remind for a saved task. Location Based Remind System consumes the low data because in this project the user’s data saved in the local system.

Published by: Babeetha S., Sundar A, Dharshini K, Ajitha GResearch Area: Android Development

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Location based reminder system, LBS, GPS

Review Paper

260. The scope and market of alternative medicine and India’s potential to become a global distributor

The use of alternative medicine and therapies has been on a rise in the last few decades. Herbal medicine has become popular not just in developing countries but in Europe and America as well. India, with it's rich heritage of non-conventional medical treatments and therapies along with it's the natural abundance of flora and fauna can become an international hub for herbal medicine. In this paper, we explore the scope of alternative medicine and analyze the market available for the same both domestic and foreign. We also try to narrow down on significant hurdles which Indian herbal exports face and solutions for the same.

Published by: Pragati Gupta, Anjika ShuklaResearch Area: Global Herbal Market

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Herbal medicine, Market potential, Market share, India, Export

Case Study

261. Affordable eye care services: A case study on Aravind Eye Hospitals

With the goal of giving affordable eye care services to a nation which has around 20 million blind citizens and 80% of it because of curable cataracts, at 58 years old, Dr. V. Begun, the Aravind Eye Hospital. Famously known as the McDonald's of cataract surgery, with a bed quantity of in excess of 4000 beds and serving 0.25 million patients consistently, this is one of the world's biggest eye care frameworks cooking generally to the poor populace. Destitute individuals with cataract can recover their visual perception at a cost as low as $40 or even free, on the off chance that they can't manage. It was exhibited by this non-benefit framework that it is for all intents and purposes conceivable to consolidate high quality, low cost, world scale, and maintainability. It has been viewed as one of a kind plan of action by numerous organizations and has demonstrated that care given at low cost can likewise yield maintainability and even gainfulness. Aravind framework's effective assembling unit, Aurolab, has created 6%-7% of the lowcost focal points worldwide in 2002, which were sold in excess of 100 nations. This Organization has been a wellspring of contextual investigations to national, however International offices too.

Published by: Nripendra Mishra, Anand Prem RajanResearch Area: Social Entrepreneurship

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Case study, Affordable eye care, Aravind Hospitals

Review Paper

262. Automated essay scoring using machine learning

Through this project, we aim to build a linear regression model for automated essay grading. Essays form a huge part of certain college applications and are a part of major competitive exams such as GRE, GMAT etcetera. Manually grading the essays can be extremely time consuming and pressurizing for the instructor. To make these tasks simple, we can train an essay grading program to do the grading automatically. The aim of the grader would be to predict the score of the essay with as much accuracy as possible. The machine assigns scores and should be near the human grader’s score. A dataset of around 2000 essays was used. The essays were graded on the basis of parameters like word count, coherence, number of long words, correct grammar, etc. Feature selection is used to arrive at the most accurate score prediction.

Published by: Aarnav Singh, Daksh PantResearch Area: Computer Science

Organisation: SRM Institute of Science and Technology Chennai, Tamil NaduKeywords: Automated, Essay, Scoring, Linear, Regression, Model, Quadratic, Weighted, Kappa

Review Paper

263. Design and fabrication of automatic and multifunctional pneumatic machine

A pneumatic machine is for sheet metal industry and can be made into multiple machines and should be used as “U” shaped clamp and also circle cutting cum straight cutting machine. This machine is simple to maintain easy to operate. Hence we tried out hands-on Pneumatic Shearing Machine In shearing operation as the punch descends upon the metal, the pressure exerted by the punch first cause the plastic deformation of the metal. Since the clearance between the punch and the die is very small, the plastic deformation takes place in a localized area and the metal adjacent to the cutting edges of the punch and die edges becomes highly stressed, which causes the fracture to start on both sides of the sheet as the deformation progresses. And the working of the pneumatic system depends upon air compressor, which converts mechanical energy into, pressure energy of compressed air. The compressed air should be proposed to move the piston of the pneumatic cylinder. The linear movement of the piston and piston rod can be used to get various mechanical operations like bending, cutting, punching, and hammering etc.

Published by: Jhunjhun Kumar MishraResearch Area: Pneumatic System

Organisation: Sathyabama Institute of Science and Technology, Chennai, Tamil NaduKeywords: Design and modeling of components, Designing components of pneumatic system, Fabrication of pneumatic sheet metal clamp making machine

Research Paper

264. Dynamic double tail comparator proposed having low-voltage low-power using 180nm technology

The necessity for ultra-low-power, high speed, and area efficient analog-to-digital converters is driving toward the use of dynamic regenerative comparators to maximize speed and power regulation. This paper describes the Double Tail Dynamic Comparator designed in 180nm CMOS Technology. The circuit works on very less power supply of 200mV. The power dissipation of the circuit is approx. 160 nW. The slew rate of the circuit is quite high. The design work at the 1 GHz of frequency it is shown that in the proposed dynamic comparator both the power consumption and delay time are significantly reduced.

Published by: Sapna Balayan, Anshu GuptaResearch Area: Electronics And Communication

Organisation: Mody University of Science and Technology, Adawala, RajasthanKeywords: Dynamic clocked comparator, Double-tail comparator, High-speed Analog-to-Digital converters (ADCs), Low-power analog design, Super Source Follower (SSF), Instrumentation Amplifier (IA), Pseudo-Differential Amplifier (PDA)

Research Paper

265. Aquaculture monitoring and control system: An IoT based approach

Internet of things(IoT) is one of the rapidly developing fields for giving social and financial points of interest for rising and creating an economy of the nation. Presently IoT field is flourishing in areas like medical, agriculture, transportation, training, etc. This is of most importance because of aquaculture is a backward region of applied science. contrasted with other zones like agriculture, consequently, it’s essential to determine the issues that are in this area with the assistance of technology. Water quality might be a basic issue, it mainly depends upon numerous parameters like dissolved oxygen, carbonates, turbidity, ammonia, nitrates, salt, pH, temperature, etc. The proposed system continuously monitors the water quality parameter using sensors, the detected information is conveyed to the aqua-farmer mobile via the cloud. accordingly, actions will be taken in time to reduce the losses and improve productivity. Among the issues, the slow latent period within the care of water quality, and therefore the wastage of resources like water, in cultivation are the necessary problems has to be addressed. The proposed system monitor the aquarium and uses the waste water from the aquarium to grow the plants, in turn, the pH and ammonia neutralized water from hydrogen clay pellets in grow bed is fed back to the aquarium.

Published by: Preetham K., Mallikarjun B. C., K. Umesha, Mahesh F. M., Neethan S.Research Area: Aquaculture and Agriculture

Organisation: Siddaganga Institute of Technology, Tumakuru, KarnatakaKeywords: Aquaculture, Machine to Machine (M2M) Connectivity, Round Trip Time (RTT)

Review Paper

266. Raid hailing services guardian system

While cabs have become the new idea of public transport, the increase in cab users has also given way to more crime. In cases of harassment of female passengers traveling alone in cabs in the cities has reported where the victims have been unable to escape due to locked rear doors using Child lock. This feature is indeed dangerous at the time of any disaster or emergency. The paper aims at providing passenger security in public transportation vehicles (/cabs) by providing child lock control to the passenger and also generating reliable driver profile to ensure the safe journey. The Driver profile is cumulative with respect to the passenger feedback and behavioral analysis of driver. The behavior analysis parameters such as alcohol consumption and sudden change in velocity, direction, abrupt brakes, are detected using suitable sensors. The profile would be generated using Cognitive Agents which provides reliability to the system.

Published by: Seema B. Hegde, Vinay Kumar G., Srinidhi Patil, Subrahmanya M.Research Area: Engineering

Organisation: Siddaganga Institute of Technology, Tumakuru, KarnatakaKeywords: Cognitive agent, Child lock, Driver profile, Behaviour analysis, Cumulative performance evaluation

Research Paper

267. Dominating electrons,causes of earth’s magnetic field

The inner core of the earth is made of molten iron due to the extreme heat the electrons have been removed from their higher orbit and ionized. Ionization is the remove (or) escaping of electrons of the atoms from their orbit. The electrons thus ionized rising, flee towards the surface of the earth from south pole to the North pole distinctly paths on the Earth's surface and stirs the electrons in the higher orbit of the atoms of Soiled, Oceans and atmosphere causing a great magnetic field. Those stirred electrons which cause the magnetic field are called Dominating Electrons.

Published by: Einstein KannanResearch Area: Physics

Organisation: Independent ResearcherKeywords: Ionization, Stirred electrons

Others

268. SBT to assess the impact of BDA on customer’s online behaviour

With the rise of social network sites, almost every person has a profile. This profile contains various likes and dislikes about various items. It also contains their valence about other users on the network. In this paper a cloud-based recommendation engine is proposed which provides recommendations about various products given that a user likes a product X taking the balance theory of likes and dislikes over the network. This project can be used to provide personalized recommendations for advertisements or can be used by the user to explore other potential items that he may be interested in.

Published by: D. Madhu, Dr. T. Hanumantha ReddyResearch Area: Data Mining

Organisation: Rao Bahadur Y. Mahabaleswarappa Engineering College, Bellary, KarnatakaKeywords: Structural Balance Theory, Hybrid collaborative filtering, Singular Value Decomposition, Recommendation system

Research Paper

269. Disease detection using image processing

Malaria is a life-threatening disease which is caused by a Plasmodium parasite which is transmitted by infected mosquito’s bite. Similarly, Dengue fever is a very painful mosquito-borne disease caused by the dengue virus. Manual Detection of both of the diseases takes too much time and tropical and sub-tropical areas are experiencing these diseases at the high level and due to detection taking too long an automated system for detection of these diseases has become a need which consumes less time and cost. There are existing techniques for prediction of malaria using neural networks, multi-layer perceptron. Based on the survey in this paper we propose a system for prediction of malaria and dengue using image processing concepts such as segmentation techniques and morphological operations such as flood fill. In many laboratories, the blood cell count is done manually and needs to be done by an expert. This project uses a digital camera which works with a traditional microscope where the camera provides microscopic images to the computer. The proposed hardware is cost-efficient.

Published by: Naresh Mali, Shreya Nalawade, Saurabh Singh, Shweta Babar, Swapnil ShindeResearch Area: Image Processing

Organisation: Ramrao Adik Institute of Technology, Mumbai, MaharashtraKeywords: Malaria, Dengue, Image processing

Research Paper

270. Nap detection and alert system using OpenCV

In recent years driver fatigue is one of the major causes of vehicle accidents in the world. A direct way of measuring driver fatigue is measuring the state of the driver i.e. drowsiness. So it is very important to detect the drowsiness of the driver to save life and property. This project is aimed towards developing a prototype of a drowsiness detection system. This system is a real-time system which captures image continuously and measures the state of the eye according to the specified algorithm and gives a warning if required. Though there are several methods for measuring the drowsiness, this approach is completely non-intrusive which does not affect the driver in any way, hence giving the exact condition of the driver. For detection of drowsiness eye aspect ratio value of the eye is considered. So when the closure of eye exceeds a certain amount then the driver is identified to be sleepy. Corrections for drowsiness include both in and out vehicle alarms and its repetition turns the engine off after giving a signal to the vehicles behind. We are also providing security for the owner i.e., if the vehicle is driven by another person and does any kind of suspicious activities then ,not the actual person but the owner will face problems, in order to avoid the problem for the owner, when the engine starts we automatically capture the image of the driver along with date and time without knowledge of the driver. Then he can easily identify the person who is driving and the owner will be saved.

Published by: Bapathu Ramakrishna Reddy, Bitragunta Lakshmi Durga Pratyusha, Chakicherla Bala Sai Vagdevi, Annapureddy Venkata Ajaya Kumar Reddy, Ajay Rahul HariResearch Area: Transportation

Organisation: NRI Institute of Technology, Vijayawada, Andhra PradeshKeywords: Face Detection, Locating Eyes, Eye-Aspect Ratio, Security, Drowsiness

Review Paper

271. Development of a cabin crew utility application (JEDZENIE)

This project is based on advanced computer software named as “JEDZENIE” provided in the aircraft for user-friendly customer care and crew management. The project will be used as advanced software installed in passenger seat utility screen. This software will be handled by airline crew members. This software includes the home page, login page & admin page. The passenger login with his/her seat no. & select the food that needed & proceed. The time when he/she order the food, the information is passed to the screen that is placed in the front of the cabin crew. So the project helps to reduce the work of cabin crews and easily access to passengers regarding food & other services. This will help to take the function into more advances in this generation and also for upcoming advanced passengers. This project is more useful in the case of physically/mentally challenged customers

Published by: M. R. Ranjith, Vignesh V. NairResearch Area: Aviation

Organisation: Regional Institute of Science and Management, Thiruvananthapuram, KeralaKeywords: Aircraft, Cabin crew, Passenger, Food order

Research Paper

272. An exploration of the indian women writers

This work is to analyze the progress of Indian women in the field of writing right from the creation and sense the glitches faced by them. The themes of sexuality and man-woman relationship from the origin till the contemporary authors are discussed which became the theme of writing this paper. But they are found not merely as the raw material and each has engrossed various angles and given inimitable solutions. Their versatile treatment of women's issues reveals their sensitive nature as a woman writer, and this quality affirms their works as an outstanding contribution to Indian literature in English proving their uniqueness.

Published by: Dr. S. Bharathi, G. VadivelmuruganResearch Area: English

Organisation: IFET College of Engineering, Villupuram, Tamil NaduKeywords: Sufferings, Emotion, Relationship, Problems

Research Paper

273. Altered particle swarm optimization based attribute selection strategy with improved fuzzy Artificial Neural Network classifier for coronary artery heart disease risk prediction

The application of soft computing in decision support system in disease prediction is one of the emerging interdisciplinary research areas in the field of computer science. Machine learning algorithms plays an important role in risk prediction of diseases. Attribute selection among the dataset is the key factor that influences prediction accuracy. Mathew’s correlation coefficient performance metric is also taken into account. Particle swarm optimization algorithm is altered and applied for performing attribute selection. Improved fuzzy artificial neural network classifier performs the prediction task.

Published by: B. Narasimhan, Dr. A. MalathiResearch Area: Computer Science

Organisation: Government Arts College, Coimbatore, Tamil NaduKeywords: Soft computing, Attribute selection, Feature selection, Artificial Neural Network, Classification, Mathew’s correlation coefficient, Particle swarm optimization

Research Paper

274. D2D Smart Billing System

“D2D (Day to Day) Smart Billing System” is developed that abets a person in everyday shopping in malls involving some automation in customarily practiced process. Malls and supermarkets are self-service shops offering a wide variety of food and household products. This system helps the customer in everyday shopping by minimizing the time required and increase the shop productivity. The main objective is to provide a robust techno-savvy trolley with low-cost, high efficiency and easily adaptable system. Each techno-trolley is set up with a Raspberry Pi that is a unique identification device for that trolley. The camera scanner on the trolley will scan the purchased product and display it on LCD that is interfaced to the raspberry pi. The web-based application for trolleys and mobile-based application for baskets are designed to minimize the waiting time in “Queue” at the billing counters. At the billing counter, the confirmation of the total bill is done and the same is forwarded to the admin.

Published by: Pushkar P. Saraf, Arati D. Khanolkar, Akshada S. Pawar, Uddhav B. Ghodake, Snehal J. Salokhe, Dr. G. A. PatilResearch Area: Computer Science and Engineering

Organisation: D. Y. Patil College of Engineering and Technology, Kolhapur, MaharashtraKeywords: Raspberry Pi, LCD, hybrid mobile app, web app, productivity, time, supermarket, malls, QR, Barcode, scanner

Research Paper

275. Load rebalancing for distributed file systems in clouds

The key building blocks for cloud computing applications are Distributed File Systems which are based on the Map Reduce programming paradigm. Nodes simultaneously serve computing and storage functions In such file systems. A file is partitioned into a number of chunks allocated in distinct nodes in order so, over the nodes, MapReduce tasks can be performed in parallel. However, failure is the norm in a cloud computing environment. In the system, nodes may be either upgraded, or replaced, or added. Files can also be dynamically created, or deleted, and appended. Our algorithm is compared against a centralized approach in a production system and a competing distributed solution presented in the literature. The results indicate that our proposal is comparable with the existing centralized approach. It also considerably outperforms the prior distributed algorithm in terms of load imbalance factor, movement cost, and algorithmic overhead.

Published by: Harsh Vardhan Pawar, Aditya Sinha, Richa Sharma, S. BabeethaResearch Area: Cloud Computing

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Chunk, DHT, MapReduce

Review Paper

276. Old age people problem’s and their importance in everyone’s life

The old people population is huge and becoming issue day by day because of human health issues. These individuals are challenged with various physical, mental and social changes that challenge their feeling of self and ability to live joyfully. Numerous individuals experience isolations and sorrow in seniority, either because of living alone or because of the absence of close family ties and diminished associations with their way of life of the source, which results in a failure to effectively take an interest in the public works. With progressing age, it is unavoidable that individuals lose association with their companionship systems and that they th ink that it is progressively hard to start new bonds and to have a place with new systems. The present examination was led to explore the connections among dejection, depression and friendliness in older individuals.

Published by: Anjali Kumari, Tanvi Nagrale, Tripti Pragyan Mohapatra, Anand Prem RajanResearch Area: Social Development

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Old age people issues, Importance, old age homes

Research Paper

277. Designing homes for senior citizens

From the designer's perspective, we ideally look to answer several considerations catering to the end user needs. It is always challenging to design concerning specific age groups where we tend to respond beyond the design standards as such. This paper will help you to comprehend that there is a list of things you ought to keep in mind while designing homes for elderly people.

Published by: Adarsh Manoj SamaniResearch Area: Construction Management

Organisation: MIT College of Management, Pune, MaharashtraKeywords: Senior citizen home, Designing, Designer's perspective, Design standards

Research Paper

278. MAAK – A smart security device for women and children’s safety

In Today’s world, many women and children are abused on a regular basis. BBC (British Broadcasting Corporation) says that about four children are being physically or sexually abused every hour and India is said to be the most dangerous country for women. Hence, Our objective is to develop a device using sensors that get activated if women or children get in a dangerous environment and sends an emergency signal via Short Message Service (SMS) to the programmed contacts which reveal the location using Global Positioning System (GPS). In addition to that, it also reveals the nearest Police station for the user

Published by: Madhav, R. Ambrish, J. Karthick, G. Raghav, Mythili ShankarResearch Area: Information Technology

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: GPS, Sensors, IoT, Android Application, Package-SMS

Research Paper

279. Development and evaluation of polyherbal foot care cream

Feet are an important organ of the human body but are often neglect. Feet need to be taken care for comfort, beautification, and protection from various microorganisms. The object of the present work is to formulate and develop foot care cream with polyherbal ingredients having various activities like healing and antimicrobial. The various herbs have been reported to having antimicrobial activities are to be selected, aqueous and ethanolic extract of it has been incorporated in foot care cream and was evaluated for its activities. It has been concluded that the product has been good foot care property.

Published by: Ashitosh Chandrakant Edake, Aditya Vishnu Deokar, Onkar A. Dindore, Rajkumar B. Dhule, Pooja Dhavne, Kirti DhanakeResearch Area: Pharmacy

Organisation: D. S. T. S. Mandal's College of Pharmacy, Solapur, MaharashtraKeywords: Foot care, Polyherbal cream, Aqueous extract, Ethanolic extract, Antimicrobial

Research Paper

280. Implementation of TTL based packet marking for IPV4

There are more chances nowadays for a network to be attacked The common attacks are DoS and DDoS attacks. They are mainly responsible for causing disturbances for the network. There are so many mechanisms in preventing these attacks like packet marking. This packet marking is mainly used to find the source of an attack. While solving this process, the main problem is to minimize the number of IP packets used in the tracing of the attacks. The number of packets that are beginning from the individual sources is not adequate to trace back the aggressors and consequently, a proficient bundle checking plan is required in this unique circumstance. This paper focusses on finding the source of the attack using the less number of hops counts. For implementing this project we are mainly using NS2 and prove that it is more efficient than existing algorithms of finding the attacker.

Published by: Kolipakula Yuvanaga Venkata Manishankar, Samayamanthula Navyasainarayana Datta, D. Nagasai Shanmuka Sreenivas, K. ManikandanResearch Area: Computer Science Engineering

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Denial of Service (DoS), Distributed Denial of Service (DDoS), Probabilistic Packet Marking (PPM), Deterministic Packet Marking (DPM)

Research Paper

281. Buck boost flyback converter to fed LED’s

Street lighting, which is one of the major factors in energy waste and light pollution at nights. To meet this challenge, Light Emitting Diodes (LED) are adopted due to low power consumption and less maintenance compared to conventional lights. In led street lights capacitance and Total Harmonic Distortion (THD) is more. These can be reduced by injecting the additional current into the multiplier input by using the buck-boost flyback converter. Using this converter also leads to an increase in the lifetime of LEDs.

Published by: K. Sarath Bhushan, T. Mahesh, Y. Suresh, M. Divya JyothiResearch Area: Power Electronics

Organisation: KKR and KSR Institute of Technology and Sciences, Guntur, Andhra PradeshKeywords: Integrated converters, Power LEDs, Long lifetime converters, Street lighting

Review Paper

282. A literary review of MANET security

Mobile ad-hoc network is a wireless network that can be formed without any pre-existing infrastructure. MANET consist of both that is the legalized node and the malicious node and every node within the network acts as a router to relay packets to the destination. In this paper, current security threats and the various attacks in the MANET are investigated and various attacks such as active attack, passive attack, external attack, and internal attack.

Published by: Nitika Sharma, Dr. Rashmi PopliResearch Area: MANET Security

Organisation: J. C. Bose University of Science and Technology, YMCA, Faridabad, HaryanaKeywords: MANET, Security, Attacks, Ad-Hoc Network

Research Paper

283. Intelligent helmet for bike safety

A clever helmet protected built-in electronics offering safety and convenience features. Helmet points include a global finding system. The helmet is conscious of the user's location and interactions with the environment. The helmet can furnish records to a user, screen the user's actions and condition, and send records to others about user's place and condition. Biker’s protection is incredibly comprised if they don’t wear a helmet which is a nicely recognized fact. But then also humans keep away from carrying a helmet. Besides each time accident occurs, humans are reluctant to help a victim and the time lengthen in attaining of an ambulance can decrease existence saving possibilities of the victim. Many a times mother and father are additionally involved and don’t comprehend of where about of son. Even if our bike is stolen then probabilities of getting it lower back are also slim. For all the above problems, we motive a totally new applied sciences solution, where a circuit working is reader will be installed internal the bike. When this reader will feel the RF Id signal from helmet transmit sign only if the helmet is positioned on the head due to the fact of which a hidden swap gets activated and helmet transmits the RF signal.

Published by: Sanket Patil, Raju Kavaldhari Yadav, Mudra DoshiResearch Area: Bike Safety

Organisation: Universal College of Engineering, Mumbai, MaharashtraKeywords: Intelligent helmet for bike safety, IR sensor, Alcohol sensor, LCD, Buzzer

Research Paper

284. Optimizing the level of pressmud compost for bhendi

A field experiment was conducted in a sandy clay loam soil with bhendi as the test crop (cv. Arka Anamika) in Sivapuri village, Chidambaram Taluk, Cuddalore district, Tamil Nadu. to study the effect of pressmud compost on plant growth, yield attributes, yield and nutrient uptake by bhendi. The presumed compost was applied @ 5, 7.5, 10, 12.5, 15, 17.5 and 20 t ha-1 as a basal dose. All the experimental plots received a common fertilizer schedule of 100:60:50 kg NPK ha-1 (RDF). The results of the experiment clearly revealed that application of pressmud compost had a significant influence on growth, yield, and uptake of nutrients. Increasing levels of pressmud compost gradually increased the growth attributes. The significantly maximum value was recorded with the application of 15 tonnes of pressmud compost ha-1. Thereafter, there was no significant improvement. A similar trend was observed in the yield attributes and yield of bhendi. Regarding nitrogen, phosphorus and sulphur uptake by plant and fruit, significantly higher values were recorded with 15 tonnes pressmud compost. However, the subsequent increase in pressmud compost application failed to attain the level of statistical significance.

Published by: K. N. N. Arvindh Ramnathan, Dr. P. Poonkodi, Dr. A. AngayarkanniResearch Area: In Sivapuri Chidambaram

Organisation: Annamalai University, Chidambaram, Tamil NaduKeywords: Bhendi, Pressmud compost, Nutrient uptake, N, P and S

Review Paper

285. A novel approach for active safety system

In this modern day automotive world, the occurrence of accidents is much more due to several factors. This can be avoided when the driver is alert. So a system has to be developed which gives the driver the information about the nearby vehicles whether it is a danger, no danger, potential danger. This paper presents you how to classify the vehicles in its ROI and categorize their stage of danger. Specifically, stereo cameras and Millimeter Wave (MMW)-radar are fused to help the driving ego-vehicle. Cameras are used to identify near lateral dynamic objects and MMW radar to detect far longitudinal objects. This process is simulated using python using CV2 library, numpy library.

Published by: Devaharsha Meesarapu, V. V. Sai Rama Datta, G. Sai Krishna ChaitanyaResearch Area: Automotive

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Camera, MMW-Radar, Python, OpenCV

Review Paper

286. Geofencing for disaster information system

Due to the lack of effective and coordinated disaster management system which consists of the stages like disaster mitigation, preparedness, response, and recovery has led to both the increase in the loss of both life and property. The paper proposes an effective disaster information system which uses the geofencing technique so as to detect the movement of users. This technique creates a geofence around the user and thus monitors the user’s entry and exit from the fence. This model uses a K-Nearest Neighbour (KNN) algorithm along with real-time data collected from smartphones. For crowd disaster mitigation and real-time alert to avoid an occurrence of a stampede, this android application is an easily deployable context-awareness mobile Android Application Package. The application provides high accuracy when the user is in the fence.

Published by: Diksha Kewat, Vaishnavi Tonpe, Kiran Baxani, Dr. Sanjay SharmaResearch Area: Computer Science

Organisation: New Horizon Institute of Technology and Management, Thane, MaharashtraKeywords: Geofencing, KNN, Disaster management, Google API

Research Paper

287. An energy efficient approach for data aggregation in wireless sensor networks based on sink mobility

A network that does not include any central controller and allows nodes to enter or leave the network at any time is known as a wireless sensor network. There are very small sized nodes deployed in these networks in large areas. The energy consumption of the nodes in these networks is a major concern since it directly affects the lifetime of the network. These dead node cause several problems. To enhance the network lifetime mobile sink is introduced which improve network performance. But mobile also leads to another challenge such as mobile sink scheduling and (re)routing. The complete network is divided into fixed size clusters and based on the energy and distance, cluster heads are chosen from the clusters. The remaining nodes of the cluster are considered to be individual. Several clustering algorithms have been designed by researchers which can be broadly categorized based on the manner in which clusters are formed and the kinds of parameters included during the selection of cluster heads. This research focuses on aggregating the data from cluster heads by deploying multiple mobile sinks. The bee colony algorithm is used to make the base station mobile. The simulation of the proposed technique is performed in MATLAB and results are analyzed in terms of various parameters.

Published by: Baljinder Singh, Amit Verma, Manit Kapoor, Dr. Naveen DhillonResearch Area: Wireless Sensor Network

Organisation: Ramgarhia Institute of Engineering and Technology, Phagwara, PunjabKeywords: WSN, Mobile sink, Energy efficient

Review Paper

288. The future of food preservation: Nanotechnology

Nanotechnology has been used to treat illnesses for a long time. It has been successfully employed as a means of drug discovery. However, it's used in food preservation is yet to become commonplace. Through this review paper, the authors wish to throw light on the application of nanoparticles in the preservation of food, to improve food color, texture as well as flavor. We also explore the use of nanotechnology in the encapsulation of the foodstuffs as a means of preservation. The article includes details about the usage of nanoparticles in the nutraceutical industry as well as its usefulness as a nanosensor. The purpose of the paper is to make use of nanotechnology in the food industry a well-known application of nanoparticles. It will be useful for professionals working in the food industry or entrepreneurs who wish to venture into the field of food preservation. Scientists may use the information and data provided in the paper to further their research.

Published by: Pragati Gupta, Anjika Shukla, Ujjawal Sharan, Anand Prem RajanResearch Area: Food Nanotechnology

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Nanotechnology, Food, Preservation, Ingredients, Biosensors

Research Paper

289. Prediction of Pneumonia using deep learning

The project is to classify pneumonia by processing the image of chest X-ray using diverse deep learning algorithms. For classification purpose, we have to develop an algorithm which can most accurately predict on a validation set of chest X-rays. Deep learning is very helpful in automatically discovering chest diseases at the experts level, providing the two Liberian radiologists with some respite and used for saving countless lives potentially worldwide. The problem is solved using Convolution neural networks[9]. Convoluted neural networks are used to classify where each neuron is tightly connected to other neurons. Inception network was used in the development of CNN classifiers. Inception network was heavily engineered. It used a lot of tricks to improve performance in terms of speed and accuracy. With much more robust and large dataset our project can intervene in all domains.

Published by: A. Raghavendra Reddy, G. Sai Ravi Teja, D. Sai Tej, P. Vinod BabuResearch Area: Deep Learning

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Pneumonia, Deep learning, Classification, InceptionV3, Convolution neural networks, Prediction, Django

Review Paper

290. Enhanced fingerprint recognition and OTP to improve ATM Security

In the previous few years’ robberies of ATM is increasing and becoming a problem for Banks. In the current system, we operating ATM using a PIN number which can be stolen or guessed and can be hacked during the transaction. That raises a question on the present security and demands something new in the system which can provide the second level of security. So for that in this paper, there is added some extra security to the current ATM Systems. We use the fingerprint system and One Time Password (OTP) which is sent to the user registration mobile number through GSM Module system. After that, the user will be able to complete the transaction securely. The working of this ATM machine is when the customer places his finger on the fingerprint module when access it automatically generates different 4-digit code as a message every time to the mobile of the authorized customer through GSM modem which is connected to the microcontroller [1]. The code received by the customer should be entered by pressing the keys on the keypad provided. This proposal will go a long way to resolve the problem of bank account safety and transaction.

Published by: Shivam Kumar Rajput, Aniket R. Patne, Amit Varma, Girish VisheResearch Area: Electronics Engineering

Organisation: K.C. College of Engineering and Management Studies and Research, Thane, MaharashtraKeywords: ATM, OTP, Biometric, Security, Fingerprint, GSM

Research Paper

291. Mitigation of voltage sag/swell using dynamic voltage restorer

In this paper complete design procedure of the DVR is described. Among the power quality problems sag/swell are occur both on the transmission and distribution side. These power quality problems are solve by the DVR. DVR is the series connected device to compensate the voltage sags and swells on the distribution side. Here the detection of voltage sag and swell is carried out by the SRF theory, where as the control of the voltage injected by DVR is done by the SPWM technique. IGBT based full bridge voltage source inverter fed by the constant DC voltage source is used to convert the DC voltage to AC voltage at desired voltage and desired frequency.

Published by: Kalpeshkumar Babubhai PatelResearch Area: Electrical

Organisation: Mahatma Gandhi Institute of Technical Education and Research Center, Ethan, GujaratKeywords: Dynamic voltage restorer, Voltage sag, Voltage swell, PLL, SRF theory, SPWM.

Research Paper

292. Correlation between shoulder performance and scapular muscle strength among college students

Shoulder girdle motion is complex and involves a synchronous movement of the scapula and humerus. The scapula serves as the platform for humeral motion. Shoulder injuries are common in the course of the student population. A decrease in shoulder strength plays an important role in the decrease in scapular muscle strength. The hand does not function as an independent factor, but it also depends on the proximal joint stability. Therefore the focus of the study is to correlate shoulder performance and scapular muscle strength among college students. 55 college students with the age group of 18-25 years, both male and female were analyzed. Shoulder performance was assessed by using Closed Kinetic Chain Upper Extremity Stability Test (CKCUEST) and scapular muscle strength was assessed by using push-pull dynamometer. Statistical analysis was done by using Karl Pearson’s correlation coefficient test with p<0.05. There was a statistically significant correlation between shoulder performance and scapular muscle strength among college students.

Published by: Priya S., Abhilash P. V., Sujina K.Research Area: Physiotherapy

Organisation: Laxmi Memorial College of Physiotherapy, Mangalore, KarnatakaKeywords: Shoulder performance, Scapular muscle strength, Closed Kinetic Chain Upper Extremity Stability Test, College students

Research Paper

293. Analysing current online health services and proposing a model for health consultancy for baby care

In this paper, we are going to analyse the current online health services provided by the government and our major focus will be in the field of baby healthcare. Baby care is one of the toughest jobs in life. Caring for a newborn in itself is a challenge. There are various things which need to be kept in mind for the good health of the baby. Our idea is to propose a model of “health consultancy for Baby Care”. The model is an online medical consultancy service which will keep the parents of the newborn baby well informed about the various aspects which should be kept in mind during the baby care. Baby health is a very important aspect when it comes to a healthy society. A healthy baby in the initial stages of life is essential because this will make the baby grow into a healthy human being in the future. So this proposal is an effort from us to enlighten the people with some important techniques which can be helpful for them to take care of their babies.

Published by: Suyash Gupta, Akash Deep Saha, Anand Prem RajanResearch Area: Social Sciences, Social Entrepreneurship

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Healthcare, Online health consultancy, Baby care

Research Paper

294. Motion and Bluetooth controlled office automation cum power saver

The Motion & Bluetooth Controlled Office Automation Cum Power Saver, where the lights in the room will automatically turn on upon detecting a human motion and stay turned on until the person has left the room or there is no motion. Initially, when there is no human movement, the PIR Sensor does not detect any person and its OUT pin stays LOW. When the person enters the room, the change in infrared radiation in the room is detected by the PIR Sensor. The output of the PIR Sensor becomes HIGH. Since the Data OUT of the Sensor is connected to Digital Pin 8 of Arduino, whenever it becomes HIGH, Arduino will activate the relay by making the relay pin LOW as the relay module is an active LOW module. This will turn the Light ON. The light stays turned ON as long as there is movement in front of the sensor. If the person takes a nap or leaves the room, the IR Radiation will become stable (there will be no change) and hence, the Data OUT of the PIR Sensor will become LOW. This, in turn, will make the Arduino turn OFF the relay (make the relay pin HIGH) and the room light will be turned OFF. Along with Motion controlled this system will have control in users hand on Android mobile; the user can turn ON/OFF Load in a single click. The Android application will help the user to monitor the current status of Motion Sensor as well as to update new Delay Time to keep the load on even there is no Motion. By using the Android application it will be possible for the user to say after what time the system will shut down the load. The system will start buzzing if time to Shut Down the load is less than 30 Sec.

Published by: Sagar W. Warade, Sagar V. Kharche, Swapnil V. Phirke, Amit S. Wale, Umesh S. Khachane, Amarjeet R. RamResearch Area: Electrical

Organisation: Padm Dr. VB Kolte College of Engineering, Buldhana, MaharashtraKeywords: PIR sensor, 8 pin Arduino, Bluetooth module, Buzzer

Research Paper

295. Module for DYSPRAXIA

In India 6 to 10 % of the population is affected by dyspraxia with 2% are severely affected by dyspraxia. It is defined as the Developmental Coordination Disorder (DCD) of the brain in childhood causing difficulty in activities requiring coordination and movements. Developmental coordination disorder may occur alone or with other developmental disorder such as DYSLEXIA, Attention /Hyperactivity Disorder (ADHT). It usually continues to adulthoods. The main objective of this module is to improve the child's disability. To support individual and families affected by DCD and to help perfection in health and educate to assist that dyspraxia/DCD. The further most important objective is to educate teachers and school-based therapists to increase the awareness and understanding of DYSPRAXIA. The major aim of the project is to improve the child’s gross motor movements. To increase the mental confidence of dyspraxia patients. To identify great scientist to the world with this disorder. Better living conditions and more hope in the life of people with DYSPRAXIA. And to create awareness about DYSPRAXIA in future and Mainly to save many people’s life.

Published by: Joel Andrews, Joseph A., Dr. V. Thulasi BaiResearch Area: Dyspraxia

Organisation: KCG College of Technology, Chennai, Tamil NaduKeywords: DYSPRAXIA, Movement disorder, Difficulty in running, Walking, Stairs, Neurological problem, Coordination difficulty

Research Paper

296. Coal mine safety system using Li-Fi technology

In this project, we tend to propose a mine safety system that utilizes visible radiation communication technology which that emitting diode lights and a geomagnetic correction technique, which direct towards supporting mine operating people who travel underground. To verify the effectiveness of this system, we conducted an experiment targeting mining people. Although getting correct gas run data and police work voices inside are tough, we confirmed that using this system, accurate voice information, and gas detection can be obtained utilizing Visible Light communication technology which employs LED lights. In this project we are using Visible Light Communication (VLC) system based on white LEDs has emerged as an eco-friendly IT green technology using THz visible light spectrum in the provision of both lighting and wireless access.

Published by: Kolli Pardha Sri Sai Vignesh Naidu, P. Visalakshi, P. Chervith ChowdaryResearch Area: Smart Communication Society

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: VLC-Visible Light Communication, LED-Light Emitting Diode.

Research Paper

297. A study to assess the knowledge and attitude of secondary school teachers regarding first aid management of selected emergencies among school children, at selected secondary schools at Ghataprabha, in view to prepare information booklet

"There is nothing more precious to a parent than a child and nothing more important to our future than the safety of our children.” Bill Clinton. First aid and emergency care should be provided by the teachers in situations like accidents, vomiting, convulsions, injuries, etc. A teacher should have adequate training regarding first aid and emergency measures since teachers act as a pivot in the school health services. The objectives of the study were 1. To assess the knowledge of secondary school teachers related to First aid management of secondary school children, in selected emergencies. 2. To identify the attitude of secondary school teachers regarding selected emergencies and First aid management, in secondary school children. 3. To find the association between knowledge and of secondary school teachers with selected demographic variables. 4. To find out the correlation between knowledge and attitude of secondary school teachers regarding selected emergencies and First aid management, in secondary school children. 5. To prepare an Information booklet based on selected First aid emergencies management for secondary school teachers. Methods A descriptive approach with descriptive correlation design was used for 50 secondary school teachers drawn through purposive sampling technique in a selected high school at Ghataprabha. The conceptual framework for the study was developed from Orem’s self-care theory. Incorporated with a modified model. The hypotheses formulated were that there will be an association between knowledge and selected demographic variables. The content validity and reliability of the tools were established. The pilot study was conducted using a structured knowledge questionnaire and Likert five-point scale. Each participant observation of the attitudes of teachers with the help of five-point Likert scale, a questionnaire was administered which was collected on the same day. An average of 4-5 observation was done per day following which the knowledge questionnaire was administered to the participant. The collected data were analyzed using descriptive and inferential statistics. The study findings revealed that Majority (48 %) of teachers had poor knowledge & (36%) of teachers had average knowledge & only (16 %) teachers had good knowledge. Age is associated with the level of knowledge of school teachers (2 = 14.92 P>0.05.) & Experience is associated with the level of knowledge of school teachers (2 = 12.99 P>0.05). It was also found that there is a positive correlation between knowledge & attitude of school teachers regarding first aid management of emergencies. The ‘r’ value computed was 0.72. Interpretation And Conclusion Majority (48 %) of teachers had poor knowledge of first & emergency management of selected emergencies.& (36%) of teachers had average knowledge & only (16 %) teachers had good knowledge. Majority of 15 female respondents have poor knowledge of First aid management of selected emergencies; whereas 9 Male has poor knowledge of first aid management. Only Six Male & two female have good knowledge. Age is associated with the level of knowledge of school teachers (2 = 14.92 P>0.05.) & Experience is associated with the level of knowledge of school teachers (2 = 12.99 P>0.05).

Published by: Grace Chetan GaikwadResearch Area: Nursing

Organisation: Yashwant Nursing Institute, Kolhapur, MaharashtraKeywords: First aid management, Emergencies, Knowledge, Attitude, Secondary school teachers

Research Paper

298. Estimation of chlorophyll content in young and adult leaves of some selected plants in polluted areas

In the present study chlorophyll a (Chl. a) and b (Chl. b) content of ten different plants have been recorded. The qualitative difference of chlorophyll a (Chl.a) and b (Chl.b) content between young and adult leaves were observed. A total of ten plant species were selected namely Mango (Magnifera indica L.), Hibiscus (Hibiscus rosa-sinensis L.), Neem (Azadiracta indica Juss), Ashoka (Polyalthia longifolia (sonner)Thw, Enum), Ficus (Ficus benghalensis L.) andNerium indicum Mill. Gard Datura stramonium L, Acacia nilotica(L) Willd .ex Del.ssp.indica (Benth)Brenan. and Bogainvillea spectabilisWilld, Ficus religiosa L.were used for analysis of chlorophyll content. In all the cases the adult leaves showed higher chlorophyll content in comparison to young leaves. This has been proved that the age of leaves was an important factor for chlorophyll content.

Published by: Jayashri Mulay, Samrudhi KokateResearch Area: Botany

Organisation: New Arts, Commerce and Science College, Ahmednagar, MaharashtraKeywords: Young and Adult leaves, Chlorophyll a and b

Review Paper

299. Chatbot generation and integration: A review

In the modern era of technology, chatbot is the next big thing in the domain of conversational services. A chatbot is a virtual person who can effectively talk to any human being using interactive textual as well as verbal skills. There are many statistics available which suggest that integration of chatbot in any business as a part of their customer service increases the business progress and customer satisfaction exponentially. Hence it becomes crucial to understand the crux of the chatbot technology. Owing to extensive research in this field, there are numerous methodologies available to create a conversational entity. It becomes quite confusing to decide a perfect method to generate conversational agent for the desired purpose. Also, generation of chatbot is one issue and successful integration is in itself another problem which is many times overlooked. This paper provides some valuable insights on how to generate as well as how to integrate a chatbot.

Published by: Aarsh Trivedi, Vatsal Gor, Zalak ThakkarResearch Area: Computer Science, Software Engineering

Organisation: Parul University, Vadodara, GujaratKeywords: Chatbot, AIML, ChatScript, REST API, Human computer interaction

Research Paper

300. Intelligent automatic traffic control using IoT

With an outsized population and enormous quantity of vehicles, there's conjointly a giant hassle of automotive accidents or road accidents, and with these overcrowded roads, there's a problem of delay in first aid service. To overcome this delay in first aid service, our project gives a solution that is “Intelligent Automatic Traffic Control with Ambulance Using IoT” which includes alerting and tracking mechanism with automatic traffic light controlling system such that the ambulance can achieve a freeway in order to provide the first aid to the patient as fast as possible. To monitor the traffic level, we use IR sensors. The level of the traffic is updated in the server page using IoT. The RF Transmitter and receiver is used to detect the ambulance arrival. The traffic signal is controlled automatically.

Published by: S. Giridhar Manikanta, G. Malar Selvi, K. Surya Narayana RajuResearch Area: Smart Communication Society

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: RF Module, Arduino Uno, IR Sensor,Alarm, IoT

Research Paper

301. Design and development of web portal for IT service management

Through analyzing the IT service management framework and associated processes of Organization, this paper establishes various indicators of IT service management process. The weights of each measure are calculated with a logical hierarchy process (AHP), and the evaluation was executed in the Organization. And the suggestions are proposed with the meditation of both the evaluation results and the real position of Organization’s IT service management. The case is extremely considered in the views of IT service management objectives and misunderstandings, customer fulfillment model of IT service management, knowledge supporting formation of IT service management. It is terminate that if the organization wishes to successfully contraption IT service management’s customer satisfaction model, it should eliminate the misunderstandings of IT service objectives first, while the advocacy of knowledge supporting structure of IT service management can play a number of effects.

Published by: Mukunda Vijay Dahake, Mahesh Arun Pandit, Minal Nago Rane, Komal Sanjay SharmaResearch Area: Computer Science And Engineering

Organisation: Padm Dr. VB Kolte College of Engineering and Polytechnic, Malkapur, Buldana, MaharashtraKeywords: Management, Process, Application, Development, Documents, Web

Research Paper

302. Face recognition based door unlocking system using Raspberry Pi

Today we are facing security issues in every aspect. So we have to resolve these issues by using updated technology. In this project, we are using the Face recognition module to capture human images and to compare with stored database images. If it matches with the authorized user then the system will unlock the door by an electromagnetic lock. The need for facial recognition system that is fast and accurate that continuously increasing which can detect intruders and restricts all unauthorized users from highly secured areas and aids in minimizing human error. Face recognition is one of the most Secured System than biometric pattern recognition technique which is used in a large spectrum of applications. The time and accuracy factor is considered about the major problem which specifies the performance of automatic face recognition in real-time environments. Various solutions have been proposed using multicore systems. By considering the present challenge, this provides the complete architectural design and proposes an analysis for a real-time face recognition system with LBPH Algorithm. In this algorithm, it converts the image from color to greyscale image and divides into pixels and it will be allocated in a matrix form and those images will be stored in the database. If an image is detected then microcontroller will send power to the motor driver unit then the electromagnetic lock will unlock the door and it will lock again when there is no power supply to that unit.