Volume-4, Issue-1

January- February, 2018

Research Paper

1. Stabilization of Black Cotton Soil Using Sodium Chloride

Stabilization is the process of physical and chemical alteration of soils to enhance their engineering properties and thus improving the load-bearing capacity of a sub-grade or a sub-base to support pavements and foundations. Sodium chloride has been used for many years as a stabilizing admixture in selected base course materials. Sodium chloride added to raw soil were found to have negligible effects on soil plasticity while increasing compacted density and decreasing optimum moisture content. In this project, the stability of soil is found out by adding Sodium chloride (Nacl) and thus compared with the stability of soil without adding Sodium chloride (Nacl) followed by different laboratory tests.

Published by: Ramkumar Guttikonda, Nadakuditi Abhilash

Research Area: Soil Stabilization

Review Paper

2. A Review Article of Fundamental Video Pre-processing Image Quality Enhancement Technique by Using Segmentation Approach

All Color image segmentation may be a terribly rising analysis topic within the space of color video frame extracting image analysis and video Quality sweetening. Several progressive algorithms are developed for this purpose. But, usually, the segmentation results of those algorithms appear to be laid low with miss classifications and over-segmentation. The explanations behind this are the degradation of video frame extracting image Quality throughout the acquisition, transmission and color area conversion. So, there arises the necessity of Associate in nursing economical image sweetening technique which might take away the redundant pixels or noises from the color image before continuing for final segmentation. During this paper, an endeavor has been created to check and analyze completely different image sweetening techniques and thereby checking out the higher one for color image segmentation. Also, this comparative study is finished on 2 well - known color areas HSV and color saturation on an individual basis to seek out that color area supports segmentation task additional expeditiously with relation to those sweetening techniques.

Published by: Baviskar Vaibhavkumar, S. R Goyal

Research Area: Image Processing

Research Paper

3. Formulation of Natural Mosquito Repellent

Medicinal plants contain numerous biologically active compounds which are helpful in improving the life and treatment of diseases and these are the primary source of synthetic and traditional herbal medicine. The presence of various life-sustaining constituents in plants made scientists investigate these plants for their uses. The objective of the work was to formulate a mosquito repellent product containing Curcumin and Embelin obtained from Curcuma longa and Embelia ribes respectively. Isolated Curcumin and Embelin were confirmed by TLC technique. Bands were compared with standards by calculating Rf 0.74 and 0.60 respectively at visual detection and 254 nm. The formulation of cream was evaluated for various parameters like smooth texture and spreadability with a pH 7 which is non-irritant and suitable for the skin. There is no phase separation during thermal stability. From the present work, it was concluded that 1% Curcumin and 1.5% Embelin containing cream is safe, effective, usable for the skin and stable too.

Published by: Dr. Sneha Agrawal, Nidhi Haldankar, Aniket Jadhav

Research Area: Pharmaceutics and Pharmacognosy

Research Paper

4. Calibration of MQ-7 and Detection of Hazardous Carbon Mono-oxide Concentration in Test Canister

The most active research in recent years is estimating the noxious waste which has a very high influence on the human health. There are many gases which have adverse effects on human health. Here carbon monoxide(CO) is considered as one of toxic gas which is considered to cause various health issues based on the concentration the casualty is exposed. In this paper, we ensure the presence of hazardous gases and also provide the procedure to estimate the concentration of the same with the help of the MQ-7 sensor and test setup. The calibration of the sensor is carried out with a canister of known volume and the estimation of the CO in the test environment is also determined.

Published by: K. Senthil Babu, Dr. C. Nagaraja

Research Area: Electronics and Communication

Research Paper

5. Automatic Feature Selection from EHR & DNN Modeling

Recently there are a lot of advancements in healthcare technology. Amongst, Electronic Health Record (EHR) is an upcoming trend which stores patients’ demographics, lab tests & results, medical history, habits etc. collaborated in electronic form. EHR is huge data, which is difficult to maintain and retrieve. So the idea of health risk prediction is formulated in this work. To get the relevant data from EHR, feature selection technique is used. Feature selection is responsible to collect only important and needed data from the dataset. For feature selection regression method is used in which loss function is proposed due to which accuracy and performance of the model are increased. Further risk prediction is done using neural network model. Deep Neural Network (DNN) is best suited for pattern learning and prediction purpose. It consists of various layers which have their specific function. DNN uses transfer learning to avoid repeated training for the whole system. Dataset considered here is of hypertension. EHR data is also synthetically created for analysis.

Published by: Shreyal Gajare, Shilpa Sonawani

Research Area: Data Analytics

Survey Report

6. A Literature Survey on Smart Home Automation Security

This paper presents a detailed description of different technologies and home automation systems from a security point of view. This paper highlights various security flaws in existing home automation systems and how the concept of security and the meaning of the word “intruder” have evolved over time.  We studied the challenges in home automation security from point of view of home owner and security provider. This work considers home automation systems like central controller based home automation systems, context-aware home automation systems, Bluetooth-based home automation systems, Short Messaging Service-based home automation systems, Global System for Mobile communication or mobile-based home automation systems, and Internet-based home automation systems. The work is concluded by giving future directions home automation Security Research.

Published by: Rohit Ragmahale

Research Area: Internet Of Things

Research Paper

7. Energy Aware Node Mobility Prediction in Mobile Adhoc Networks

The analysis of human location histories is currently getting an increasing attention, due to the widespread usage of geopositioning technologies such as the GPS, and as well as online location-based services that allow users to share this information. Tasks such as the prediction of person’s movement can be addressed through the usage of this data, in order for offering support for more privileged applications, such as adaptive mobile services through proactive context-based functions. Here we aim to develop a simple and effective scheme to predict when the user will leave the current location and where he will move to future position. This paper presents a hybrid method for predicting human mobility on the basis of Mobility Markov Chain Models (MMCs). The proposed approach clusters location histories according to their characteristics, and later trains the MMC model based on mobility history to obtain transition matrix. The usage of MMC allows us to take information of location characteristics as parameters, and also to account for the effects of each individual’s previous actions. The proposed system is a mobility prediction with adaptive duty cycling approach in reducing energy consumption, with a mobility model called Mobility Markov Chain (MMC) for predicting the future location. We report a series of experiments with a real-world location history dataset and from the LifeMap dataset, showing that the prediction accuracy is in the range of 65 to 85 percent.

Published by: Ram S. Kale

Research Area: Mobility

Research Paper

8. Analysis and Design of Multistorey Building G+4

A multi-storey is a building that has multiple floors above the ground. It can be a residential or commercial building. in this project the analysis and design of multi-storey building G+4. In general the analysis of multi-storey is elaborate and rigorous because those are statically indeterminate structures. Shears and moments due to different loading conditions are determined by many methods such as portal method, moment distribution method and matrix method. The present project deals with the analysis of a G+4 building. The dead load & live loads are applied and the design for beams, columns, footing is obtained Manually. The Analysis part of the structure is done using Kani’s Method and the values are taken for design.

Published by: Mohd Zohair, K. Mounika Reddy

Research Area: Structural Engineering

Case Study

9. Consumer's Acceptance to Green Building Concept for Sustainable Construction in India

The changing consumer demands for eco-friendly products and services in all industrial sectors have paved way for constant growth and development of the real estate sector, especially in Delhi-NCR. The growing interest towards green products in real estate can be attributed to the fact that quality of air is decreasing day by day. According to few reports, buildings consume more than 30% of energy utilizing 40% of resources while simultaneously generating 40% of wastes and 35% of harmful greenhouse gases. So this study is focused on consumer’s acceptance and willingness to pay more for green building products in Delhi-NCR. For the purpose of the study 150 commercial property owners were contacted to identify the factors stimulating them to pay premium prices for sustainable buildings over conventional buildings. From the results, it was found that environmental attitude, green awareness, architectural factors and social influence significantly influence the customer willingness to pay higher prices for green buildings. Social Influence is the strongest factor that has positively influenced the customer inner will to pay premium prices for green buildings. The research also provides an in-depth understanding of factors stimulating customers to go green in the context of construction industry specifically in Delhi-NCR region.

Published by: Ankit Kumar Jat, Prithviraj Dilip Mane

Research Area: Green Buildings and Sustainable Construction

Review Article

10. Sliding Window Control Based High Utility Pattern Mining For Industrial Use

Value of the item set is considered as an utility of that item set and find out the high utility of the item set is the aim of utility mining .Some time database parameters are considered to find out high utility pattern eg. Profit, cost etc. In day to day life high utility pattern mining play important role in applications. Its current hot topic in today’s research area. Different existing algorithms are present in this area .It first of all identify the candidate itemsets by using their utilities, and simultaneously identify the exact utility of that candidate pattern. Problem of using this algorithm is large number of candidate itemsets are generated. But after computing exact utility it’s clear that most of the candidate having no high utility. For generating profitable product manufacturing plan its very important to understanding the customer preferences in industrial area. One of the approach in pattern mining, by considering the quantity, quality and cost of each product for generating high profitable product set, which employed to find out high utility pattern. For establishing highly profitable manufacturing plan which allow corporation to maximize its revenue, high utility pattern mining is important aspect. Large amount of stream data related to customer purchase behavior used for establishing manufacturing plan. Recent preference of the customers also helps in generating manufacturing plans. This survey work contains a list structure and a novel algorithm for generating high utility pattern over large data, on the basis of Sliding Window Control Mode. This approach avoid the generation of candidate pattern. Due to that algorithm not required large amount of memory space as well as computational resources for verifying candidate patterns. Due to this it’s very efficient approach.

Published by: Swapnali Londhe, Rupesh Mahajan

Research Area: Computer Engineering

Review Article

11. Application of the Hash Function on Secret Message and Provide it Security with the Help of Invisible ASCII Character Replacement Technology

Most widely used technique over the internet for communication is the text-document exchange. This text document may contain valuable data or some general information of any kind. If this text document contains some important information and if gets hacked then they may change information about it or may misuse that information. Because of all these reasons we need some technique for information hiding within a text document while communication over the internet. Although there are lots of text-based information hiding techniques present and proposed by many authors but these techniques have some drawbacks such as poor robustness, lower embedding rate, and semantic clutter. Due to all these flaws in the existing system many time the information is hacked or extracted by the interceptors. To mitigates all these drawbacks of existing system or techniques we proposed a new technique based on the hash function and the invisible ASCII character replacement method. In this approach, we first find the binary formatted information which is added by even numbers of 1’s for even parity, after that the space character in every carrier is replaced by SOH with the help of some replacement algorithm. In the third stage, a hash value is generated. At last the hash value is compared with the encoded secret information.

Published by: Swati Dandekar, Dr. Jyoti Rao

Research Area: Computer Engineering

Research Paper

12. Big Data Classification of Users Navigation and Behavior Using Web Server Logs

Users for online shopping are increasing day by day because of easy to get and time-saving property of online shopping. Having a proper understanding of users interest for certain type of product or different products for online shopping becomes important to create personalized service for a target market. An important property of successful e-commerce website is the ability to provide useful content at the right time to users. And because of all this, personalization techniques are introduced to create adaptive shopping application in which user interfaces change according to users interest. User’s behavior information is stored in web log files, and to get the information data mining techniques are used in which they use statistical characters to model users behavior and not considering the sequence of action performed by uses. It becomes helpful if we follow user’s session to understand complex user behavior. Therefore to eliminates all these issues this paper proposes a linear-temporal logic model checking approach for the analysis of structured e-commerce weblogs. If we consider a common way of mapping log records according to e-commerce structure, weblogs can be easily converted into event logs by which behavior of the user is captured. After getting users behavior by performing different predefine queries to identify different behavioral patterns that consider the different actions performed by a user during a session.

Published by: Prajakta Ghavare, Prashant Ahire

Research Area: Computer Engineering

Survey Report

13. A Literature Survey on Intrusion Detection and Protection System using Data Mining

In the modern world of security many researchers have proposed various new approaches; among those techniques application of data mining for Intrusion detection is one of the best suitable approaches.The system proposes a security system, name the Intrusion Detection and Protection System (IDPS) at system call level, which creates the personal profile for the user to keep track of user usage habits as the forensic features. The IDP uses a local computational grid to detect malicious behavior in a real-time manner. In this paper, a security system, named the IDPS is proposed to detect insider attacker at SC level by using data mining and forensic techniques.

Published by: Chaitali Choure , Leena H. Patil

Research Area: Data Mining

Research Paper

14. A Study on the Volatility and Return with Reference to Stocks of Bank Nifty

Study on stock market trends has been an area of vast interest both for who wish to make a profit by trading stock in the stock market. India is one of the emerging economies, which has witnessed significant developments in the stock markets during the liberalization policy initiated by the government. However, investing in banking shares include high risks which can be guided but not controlled. The banking sector is the backbone of country’s economy. This sector has given very good return to the investors in the past. But the recent financial crisis has proved, that the Banking stocks tend to be more volatile than other stocks. This paper is a humble attempt to measure the volatility of the Bank index stocks and compare it with that of the volatility of NIFTY. Stock markets, in general, are considered volatile and volatility plays a key role in measuring the risk-return trade-offs. Estimating volatility enables the pricing of securities and, understanding stock market volatility or individual stock price volatility enables good decisions on the part of investors.  Investors who are risk-averse would not be happy to invest in a highly fluctuating stock, whereas those with a thirst for riskiness would happily invest in a highly volatile market. The study evaluates the performance of banking stocks mainly to identify the required rate of return and risk of a particular stock based upon different risk elements prevailing in the market and other economic factors.

Published by: Rohith U J

Research Area: Security Analysis and Portfolio Management

Research Paper

15. DNA Methylation Data Analytics in Cancer Research

Many studies demonstrated that the DNA methylation, which occurs in the context of a CpG, has strong correlation with diseases, including cancer. There is a strong interest in analyzing the DNA methylation data to find how to distinguish different subtypes of the tumor[1]. However, the conventional statistical methods are not suitable for analyzing the highly dimensional DNA methylation data with bounded support. DNA methylation is one of the most extensively studied epigenetic marks, and is known to be implicated in a wide range of biological processes, including chromosome instability, X-chromosome inactivation, cell differentiation, cancer progression and gene regulation[4]. Identification of cancer subtypes plays an important role in revealing useful insights into disease pathogenesis and advancing personalized therapy. In order to explicitly capture the properties of the data, a deep neural network is used, which composes of several stacked binary restricted Boltzmann machines, to learn the low-dimensional deep features of the DNA methylation data.

Published by: Apoorva Patil, Rashmi A. Rane

Research Area: Data Analytics

Case Study

16. Case Report-Post Cataract Surgery Herpes Simplex Keratitis and its Management

Herpes simplex keratitis (HSK) is a leading cause of corneal opacification and infection-related visual loss. Even though an individual may not have had the clinically apparent disease, high fever, immune-suppression, and sometimes surgery can reactivate latent herpes1. Its presentation can be distinctively divided into two types, epithelial keratitis or stromal keratitis due to a difference in pathogenesis, this inevitably postulates treatment difference. In this report, a case of postoperative herpes simplex virus (HSV) keratitis after a cataract surgery is described. The diagnosis and medical management of herpes simplex keratitis are discussed.

Published by: Dr. Nishant Vardhan

Research Area: Ophthalmology

Survey Report

17. Survey on Removal of Rain or Snow From a Single Color Image

It is well-known that a bad weather, e.g., haze, rain, or snow, affects severely the quality of the captured images or videos, which consequently degrades the performance of many image processing and computer vision algorithms such as object detection, tracking, recognition, and surveillance. Rain/snow removal from a video or a single image has been an active research topic over the past decade. Today, it continues to draw attention to outdoor vision systems (e.g., surveillance) where the ultimate goal is to produce a clear and clean image or video. Here, the most critical task is to separate rain/snow components from the other part.

Published by: Binju Bentex, Dr. K S Angel Viji

Research Area: Image Processing

Review Paper

18. An Approach to Multi-Cloud Securities

The use of multi-cloud provides highly scalable and reliable application for IT leaders to transforming their data center architectures to move from a reactive, inflexible organization to being a more proactive, a multi-cloud deployment is appropriate. Multi-cloud denotes the use of multiple independent clouds by a client or a service. Since the multi-cloud services will be migrating from single cloud to different cloud service providers it is challenging quest to procure Security issues in multi-cloud. Hence there is a need to ensure storage security in multi-cloud. So to provide the storage security at multi-cloud, we adopted the cryptography techniques in our proposed method. In cryptography, we are focusing on Deffie-Hellman key exchange protocol and elliptic curve for a reliable key generation. In this paper, we majorly focused on multi-cloud, need, benefits and security aspect relating to multi-cloud.

Published by: P. Sabitha, Dr. V. B Narasimha

Research Area: Cloud Computing

Research Paper

19. Resolving Multi-party Privacy Conflicts in Social Media

Information shared through Social Media may affect more than one user’s privacy e.g., Information that depicts different users, comments that mention different users, events in which different users are invited, etc. Many types of privacy management support in present mainstream Social Media foundation makes users unable to appropriately control the sender and receiver. Computational mechanisms that are able to merge the privacy preferences of different users into a single policy for an item can help solve this problem. Merging different user’s personal preferences is difficult hence conflicts occur in privacy preferences, so methods to resolve conflicts are needed. Moreover, these techniques need to consider how users’ would actually reach an engagement about a solution to the conflict in order to propose solutions that can be acceptable by all of the users affected by the information to be shared. present approaches are either too demanding or only consider fixed ways of aggregating privacy preferences. Here, we introduce the basic computational procedure to overcome problems in Social Media that is able to adapt to different situations by modeling the concessions that users make to reach answers to the conflicts. The present results of a user study in which our introduced mechanism outperformed other present approaches in terms of how many times each approach matched users’ action. Computational mechanisms that are able to merge the privacy preferences of multiple users into a single policy for an item can help solve this problem. However, merging multiple users’ privacy preferences is not an easy task, because privacy preferences may conflict, so methods to resolve conflicts are needed. Moreover, these methods need to consider how users’ would actually reach an agreement about a solution to the conflict in order to propose solutions that can be acceptable by all of the users affected by the item to be shared. Current approaches are either too demanding or only consider fixed ways of aggregating privacy preferences. In this project, we propose the first computational mechanism to resolve conflicts for multi-party privacy management in Social Media that is able to adapt to different situations by modeling the concessions that users make to reach a solution to the conflicts. We also present results of a user study in which our proposed mechanism outperformed other existing approaches in terms of how many times each approach matched users’ behavior.

Published by: M. Premkumar, Dr. Selvaraj

Research Area: Social media

Survey Report

20. Pollution Human Rights and Environmental Protection

In terms of international awareness, the connection between human rights and Environmental protection is steadily grown significantly, given that environmental protection became an important issue on the international agenda. Over the years, environmental legislation has evolved being involved in human rights and recognizing the fundamental rights in relation to the environment. A considerable number of legal instruments at international, regional and national levels have been approved and established specialized bodies to respond to problems identified in human rights and environmental protection. Environmental instruments increasingly include protection of human rights and principles, including the specific procedural rights such as access to information and access to justice and the principles of implementation. At the same time, the development of environmental norms has affected human rights. This paper highlights some of the developments that have occurred at the international, regional and national levels in recognition of the link between the protection of the natural environment and human rights and the impact that they have in achieving the aims of each other.

Published by: Vishal Bhardwaj

Research Area: Environmental Engineering

Technical Notes

21. BContri- An Algorithm for Monitoring Construction Site using RFID, GPS and GSM

Construction is recognized internationally as one of the information-intensive industry and subject to harsh conditions (e.g., rain and dust) and is often criticized for delivering projects late and over budget. Collection of detailed, accurate and a sufficient volume of information and timely delivery of them are vital to operating a well-managed and cost-efficient construction project. This paper investigates the fully automated data collection using integrated applications of Radio Frequency Identification (RFID), Global Positioning System (GPS) and Global System for Mobile Communication (GSM) technologies in the construction industry which focused on the real-time exchange of information between the construction site and off-site office, how this technology could change current practice. Therefore, the main objective of this study is to propose a system to improve efficiency and cost-effectiveness, practical communication and control among participants, and increase flexibility in terms of information delivery and response time on and off construction sites. Most of the used technologies in this research are commercially available and are inexpensive (RFID, GPS, GSM). Some application of advanced tracking and data storage technologies used in construction information management are discussed briefly.

Published by: Afiya V N

Research Area: Construction Management

Survey Report

22. Neural Network Ensemble Model with Back Propagation for Classifying Melanoma on Dermoscopy Images-A Survey

Dermoscopy is the examination of the skin using skin surface microscopy. We develop a novel method for classifying melanocytic tumors as benign or malignant by the analysis of digital dermoscopy images. In this paper before classification pre-processing and segmentation, feature extraction is to be carried out. Then introduce the classifier based on neural network ensemble is used to classify the melanocytic tumors as benign or malignant. To improve the neural network's generalization performance proposes an effective neural network ensemble approach with an idea. One is to apply neural network's output sensitivity as a measure to evaluate neural network's output diversity at the input near training samples so as to able to select a diverse individual from a pool of well-trained neural network. Lesions are extracted using SGNN. Lesions are classified using a classifier based on neural network ensemble model.  

Published by: Jeena Johnson, Asha Vijayan

Research Area: Image Processing

Research Paper

23. Adsorption Potential of BF Slag and BF Flue Dust towards Removal of Aqueous Phenol

The present work focuses the removal of phenol present in industrial wastewater (Steel Industry) using granulated BF slag and BF flue dust (generated as waste material in the steel industry). Several kinds of solid waste like granulated BF slag and BF flue dust and liquid toxic effluents are generated at different units process of integrated iron and steel plants. The study will help us to assess self-adsorption characteristics in plant generated solid water Vs in plant toxic effluents. In the study shows that granulated BF slag and BF flue dust are efficient adsorbents for the removal of phenol from the industrial wastewater.

Published by: Dr. Kalpataru Rout, Manoj Kumar Sahoo, Dr. CR Sahoo

Research Area: Environment Science and Engineering

Case Study

24. A Study on Role of Media in Women Empowerment in India

This research paper deals with the problems of women in general and focuses on the role of media in women Empowerment. It is an attempt to analyze the status of women by analyzing various indicators like socio, economic and decision-making powers.After independence, Government of India took several initiatives, programmes, and policies, apart from constitutional and legal safeguards for the empowerment of women in the country. As we know Women's are the wealth of India and they have contributed in almost every field and made the country feel proud at every occasion. They are in front, leading the country, making milestones and source of inspiration for many. However, another reality of Indian society is that there are systematic discrimination and neglect of women's in India, which could be in terms of limited access to education, health and property rights and domestic violence etc. The fear of sexual violence has been a powerful factor in restricting women's behavior and sense of freedom. The struggle against violence is actually the struggle against the unequal distribution of power both physical and economic between the sexes. Women empowerment in India is still a distant dream. There still exists a wide gap between the goals enunciated in the constitution, legislation, policies, plans, programs and related mechanisms on the one hand and the situational reality of the status of women in India, on the other hand. India is fast developing but women's in India continue to be discriminated. Media is the mirror of society and media reports are the reflection of happenings in the society. Communication is extremely important for women’s development and mass media play a significant role. It is to be noted that growth of women’s education and their entry into employment has contributed to the growth of media. Media has immense power to influence the masses and communication and IT revolution has further increased its importance. The study is based on primary and secondary sources. The study concludes with an observation that access to education and employment are only the enabling factors to empowerment, achievement towards the goal, however, depends largely on the attitude of the people towards gender equality.

Published by: Dr. Sonia Gupta

Research Area: Women Empowerment

Review Article

25. To Design and Develop Intelligent Exercise System

As the population increases day by day, the pollution and chances of traumas are increases. The health monitoring is also important to make physically strong. A load of physiotherapist is increased which result in poor performance of the patient exercise. The system is developed which increases the efficiency of a physiotherapist. Kinet based exercise system is developed which monitor and assign an exercise to the person. In defensive and rehabilitative healthcare, physical exercises are powerful involvement. However, a program may need in the range of thousands of practice repetitions, and many people do not adhere to the program making the exercise futile, or even dangerous. In recent years, applications developed based on Kinet are getting admired since human poses can be more easily estimated based on the sensed RGB-D information. There is no accurateness of doing free-hand exercise prescribed by physiotherapy Doctor. On the other, doing exercise is not that much interesting to do alone.

Published by: Nitu Sanjay Sharma

Research Area: Image Processing

Research Paper

26. Design of Low Voltage two Stage CMOS Operational Amplifier

The method that presented in this paper is to design a low voltage CMOS operational amplifier, which operates at the ±1V power supply. Due to this, the demand for low voltage silicon chip systems has been increased. The supply voltage is scaled down to reduce the overall power consumption of the system. The objective of this project is to design a low voltage CMOS operational amplifier. The designed OP-AMP is a two-stage CMOS OP-AMP which exhibits a gain of 59.50 dB, the phase margin of 79.431 and unity gain bandwidth is 7.717 KHz. Design and Simulation have been carried out in LT Spice tools.

Published by: Merlyn Mariyam Varghese, Kusumam Joseph

Research Area: VLSI

Research Paper

27. Utilizing Twitter Lists to Find Topical Authorities in Twitter using a Combined Approach of Focused Crawling and Query-Dependent PageRank

Discovering topical experts in micro-blogging sites (such as Twitter) is a vital information-seeking task. Here, we explain an expert-finding algorithm for Twitter which combines traditional link analysis with text mining. It relies on Twitter lists (crowd-sourced data) to build a labeled directed graph called the endorsement graph. Given a text query, this algorithm dynamically sets the weights on the edges of the graph followed by applying an improved version of query-dependent PageRank to find important nodes in the graph, which correspond to topical experts. Scalability and performance issues posed by large social networks is addressed by pruning the input graph via a focused-crawling algorithm. This approach is evaluated with a seed set of inputs to show this is competitive with Twitter’s own search system (WTF) while using less than 0.05% of all Twitter accounts.

Published by: Jenifa Anna Agness

Research Area: Social Network Analysis

Research Paper

28. Layout Design of 5 Transistor D Flip Flop for Power and Area Reduction and Performance Comparison in Different Scaling Technologies

Due to increase in demand for portable devices low power dissipation is an essential need for device design. Due to advances in low power applications low power digital CMOS has become more important, and the process technology has been advanced. In this paper, an SET D flip-flop with 5 transistors is proposed. This D flip-flop has been implemented using different scaling technologies such as 180 nm, 90 nm, 70 nm and 50 nm. Both power dissipation as well as area has been compared. The layout of the 5 transistor D FF is designed. It has been observed from simulation result that the fully custom design has shown 39% reduction in area and 37% reduction in power as compared to fully automatic design. This design technique achieves lowest power consumption with reduced transistor count. It can be used in applications like buffers, registers, digital clocks etc.

Published by: Shermina M. Meera, Shahanaz M. Meera, Nishi G. Nampoothiri

Research Area: VLSI

Survey Report

29. A Survey on Sparsity Based Single Image Super Resolution of Colour Images

There are several methods for improving the resolution of images. The usual approach is by sparsely representing patches in a low-resolution input image via a dictionary of an example low-resolution patches and then using the coefficients of this representation to generate the high-resolution output via an analogous high-resolution dictionary. However, most existing methods focus on luminance channel information only and neglect the colour channels. The present method achieves sparsity-based super resolution by considering multiple colour channels also along with luminance channel Information. Edge similarities among RGB colour bands are used as cross channel correlation constraints. A dictionary learning method specifically to learn colour dictionaries that encourage edge similarities is also used. The advantages of this method are demonstrated both visually and quantitatively using image quality metrics.

Published by: Helena Thomas, Anitha R

Research Area: Image Processing

Research Paper

30. VHDL Implementation of 32-Bit Microprocessor

The digital design is a very broad field. Its applications can be found in our daily life such as in laptops, calculators, cameras etc. The VHDL has become an essential tool for designers in the world of digital design[1]. This paper presents the VHDL implementation of a 32-bit microprocessor. The structural VHDL model of the microprocessor is designed to perform 16 operations which include both logical and arithmetic operation. Here the microprocessor is divided into various sub-modules and each of them was programmed using VHDL. The VHDL implementation and functionality test of the 32-bit microprocessor are done by using the Xilinx tool.

Published by: Kusumam Joseph, Merlyn Mariyam Varghese

Research Area: VLSI

Review Paper

31. Making of Two South Korean Chaebols: Samsung and Hyundai

The management system of South Korean companies has been influenced by their traditional beliefs and values of Confucianism bought up by Chinese in the 15th century. Yet, this Confucius management style was shifted to western style after the Asian financial crisis of 1997. Few prominent conglomerate led to the growth of South Korea from developing the country to one the wealthiest country in the world. This paper aims to evaluate this management transition in two major South Korean companies i.e. Samsung and Hyundai. This paper shows how management system changed in South Korea in five main major vectors: (A) Decision-making style, (B) shift to corporate governance, (c) change in performance management, (D) corporate social responsibility, (E) government intervention and support

Published by: Hardik Jain , Shantanu Kaushik

Research Area: Management

Review Paper

32. Catercam- A Sliding Camera Mechanism Using Gimbal Assembly

In the current era of 21st century technocrats focus on building more efficient, compact, power efficient and cheap substitute for technology presently used. A CCTV camera is a widely used product for surveillance, but many times just to cover a small area it is required to have more than one camera at the same place viz. a parking space which requires 180 degrees coverage or a ‘U’ shaped road requires at least two cameras to have a complete footage of the sector area. Similarly for recording a remote area which is seldom used. Furthermore, in some areas cameras are installed to work for just a small amount of time for viz. CCTV in the classroom to check how many students were present in the class. Adapting this technology will reduce the number of camera units used in a particular area, work of maintenance department and moreover a huge amount of energy is saved which can be utilized for villages where people face scarcity of electrical energy.

Published by: Kashyap Kirtikar, Shubham Ghodke, Atharva Shirode, Vismita Nagrale

Research Area: Security (CCTV)

Review Paper

33. Hybrid Wallace Tree Multiplier Using 4:2 Compressor in Carry Save Addition Mode

The multiplier is one of the important elements in most of the digital processing system such as FIR filters, digital signal processors, and microprocessors etc. The speed of a system depends upon how a faster an arithmetic operations are performed within the structure for which mostly multiplication should be carried out at a faster rate which thus improves the system performance. The two important parameters of a multiplier are its area and speed that are inversely proportional. Multipliers are of great significance in today’s Digital Signal processing applications like DFT, IDFT, FFT, IFFT, and ALU in Microprocessor.  Wallace tree multiplier along with a Ripple Carry adder is hybridized and formed a hybridized multiplier which delivers high-speed computation along with the reduction in power consumption. Here, Wallace tree multiplier is used to increase the speed of addition and a Ripple Carry Adder is used for final accumulation. This hybrid multiplier produces better results in terms of speed and power than the conventional designs. The proposed circuit is designed and the results are discussed in the paper. This proposed work is evaluated in the basic area, power, and delay.

Published by: Ankur Katkar, Sunil Kuntawar, Vijay Roy

Research Area: Digital Multiplier

Research Paper

34. Fast Moving Consumer Goods Market in Rurban Bihar: A Fast Changing Landscape

India is an agro-based economy from the time immemorial. Though the contribution of agriculture and allied sectors in national GDP has been diminishing over the years, yet the biggest portion of the labor force is employed here. This has resulted in low disposable income at the hands of the farmers. Bihar being a primarily agrarian state and with the largest chunk of the youngest of the population provides huge customers base with very high aspirational values and immense market potential for Fast Moving Consumer Goods (FMCG), but with very low purchasing power. This is an anomalous situation for a marketer. However, even with economics being at odds, the young generation with modern technology, having better information and capabilities provides an encouraging future prospect of FMCG market. The pattern of consumption of FMCG goods is surely northbound. This has led to the opening of many large format retail stores in almost all Rurban cities of Bihar. The increasing number of retail stores is creating a competitive challenge for retailers and consumers as well. In view of this, the retailers are focusing more on offering innovative products, customized services, which are suitable for specific customer needs. FMCG being the basic daily need products, the retailers will have to focus on understanding customer segments based on economic background, value, variety, and aspirations of the customer. This study finds that the key factors affecting consumption pattern of FMCG products in the rural-urban market of Bihar are hidden in value proposition and offering of everything that’s Lux but affordable.

Published by: Himanshu Shekhar Singh, Dr. Arvind Kumar Shukla

Research Area: Management (Marketing)

Review Paper

35. Underground Drainage Monitoring System Using IoT

India has announced a project of making 100 smart cities. For making a smart city one needs to consider many parameters such as smart water, smart electricity, smart transportation etc. There will be a need of smart underground infrastructure which includes underground water pipelines, communication cables, gas pipelines, electric flow, etc. As most of the cities in India have adopted underground drainage system, it is very important that this system should work in the proper manner to keep the city clean, safe and healthy. If they fail to maintain the drainage system the pure water may get contaminated with drainage water and can spread infectious diseases. So different kind of work has been done to detect, maintain and manage these underground systems. Also, leaks and bursts are unavoidable aspects of water distribution system management and can account for significant water loss within a distribution network if left undetected for long period. This project represents the implementation and design functions for monitoring and managing underground drainage system with different approaches. It also gives a description of water-wise system and detection method to detect leakage defects in sewer pipeline. Also, some part of condition rating model for underground Infrastructure Sustainable Water Mains and Intelligent system for underground pipeline assessment, rehabilitation and management are explained.

Published by: Yash Narale, Apurva Jogal, Himani Choudhary, S. P. Bhosale

Research Area: IoT

Research Paper

36. Design of Flip-Flops for High Performance VLSI Applications Using Different CMOS Technology’s

In this paper low power, high-speed design of SET, DET, TSPC and C2CMOS Flip-Flop are designed and analyzed. As these flip-flops have a small area and low power consumption they can be used in various applications like digital VLSI clocking system, buffers, registers, microprocessors etc. The Flip-Flops are analyzed at 90nm technologies. The above designed Flip-Flops and Latches are compared in terms of its transistor count, power dissipation and propagation delay using DSCH and Micro wind tools. This project proposes low power high-speed design of flip-flops in which True Single-Phase Clocking (TSPC) and C2CMOS flip-flop compared with existing flip-flop topologies in term of its transistor count, power dissipation, propagation delay, parasitic values with the simulation results in micro wind.

Published by: Shillu Elsa Thomas

Research Area: VLSI

Survey Report

37. Security and Clustering Of Big Data in Map Reduce Framework: A Survey

For maintaining the authenticity, privacy and confidentiality of larger dataset are outsourced to the cloud in the encrypted format. Cloud storage provides data management and reduces the costs. Various clustering methods like K mean, K nearest neighbouring, DBSCAN clustering methods are implemented to cluster massive data that are related to each other using the map-reduce framework in big data analytics. Clustering was done on encrypted partitioned data in order to protect the information from the third party access. Various approaches have been used for securing and maintaining the efficiency and performance of millions of dataset with variety, velocity, and volume.

Published by: Anju Abraham, Shyma Kareem

Research Area: Big Data

Research Paper

38. Trade Embargo by China on Singapore and Taiwan: An Economic War (A Hypothetical Situation)

This article gives an idea about the trade relations between the Asian Dragon, People Republic of China and its two neighbors, Singapore and Taiwan (Republic of China). The article gives a gist about the development of the two nations and the involvement of China in the process. Focusing on the economic boom that the four Asian dragons had in the late twentieth century and the early two thousand, a research has been done on the trade with Asian Giant, China and the two countries, Singapore and Taiwan which are two of the four Asian dragons. There are tensions in the South China Sea for a very long time; the expansionist policy of China is bringing a threat to the peace in the South Asian region. China is not in good conditions with the two nations as it was earlier. The economic growth of the two nations is also very good from the past few years. But both the countries are heavily dependent on China for raw materials, labor etc., The two Asian dragons are taking decisions that are against China when it comes to territory issues and also in some other international matters, hence the question arises as to What if China imposes embargo on these two nations, and the answer is here in the article.

Published by: J B Bhalacharan, Rahul bharatiya K

Research Area: Pacific Rim - Asian Societies

Review Paper

39. Impact of Motivation on Management Student’s Academic Performance in Relation to overall Advancement

Motivation plays a significant role in everything we do. Without motivation it would be hard for people to perform routine work, set an aim in life, work towards its accomplishment or even spend time with family and friends. Motivation is required at each phase of life and especially for students, it’s very important as it will show them the path to work, discipline their life and provide them zeal to accomplish their objectives. In this paper, we are discussing various parameters that affect student’s motivation and thus monitor their individual accountability. Student motivation affects every aspect of college life, from attendance to academic performance, to extra-curricular activities. Also, teachers have to establish a cooperative atmosphere in their work with a class, among the students, with their colleagues in school, with parents and also within the broader community. In today’s time, all the colleges are continuously under pressure to improve test scores, responsibility, and accountability. Because of these pressures, teachers bombard students with the promise of rewards; stickers for good presentations, appreciation for completing assignments and projects on time etc. Thus the importance of motivation has been stressed. Various research has been done in the subject in recent time and it is analyzed that motivation is one of the few factors that have an impact on everything we do and experience, for example with our work, family, friend and of course, the basic needs.

Published by: Shruti Srivastava

Research Area: Management

Review Paper

40. Comparative Analysis of Controller Techniques Used in Doubly Fed Induction Generators in Wind Turbines

The interest in the variable speed wind turbines has increased due to their very attractive features. The fundamental feature of the DFIG is that the power processed by the power converter is only a fraction of the total wind turbine power, and therefore its size, cost and losses are much smaller compared to a full-scale power converter. The aim of the control strategy is usually to maximize the output power, maximize efficiency of energy conversion besides minimizing output power oscillations or minimizing wear of the mechanical components of the power plant, e.g., train drives, while maximizing the economic profit. Many different topologies have been proposed to achieve the desired speed control on wind generators. Among the various controllers considered based on classical control theory like PI controllers and nonlinear controllers based on Fuzzy logic PI controller using Fuzzy logic, Heuristic algorithm, Genetic Algorithm, Swarm optimization and Sliding Mode controllers were compared. It has been observed that among various controllers the fully fuzzy scheme was best in terms of stabilization times and reduction in asymmetries. However from the tuning of PI controller the swarm optimization technique is best suited for optimizing the parameters of the controller.

Published by: Mohamed Samir, Dr. Gagan Singh

Research Area: Control System - Controllers used in DFIG

Online paper publication is ongoing for the current issue and authors can submit their paper for this issue until 30th January, 2018.