Volume-4, Issue-1

January- February, 2018

Research Paper

1. Stabilization of Black Cotton Soil Using Sodium Chloride

Stabilization is the process of physical and chemical alteration of soils to enhance their engineering properties and thus improving the load-bearing capacity of a sub-grade or a sub-base to support pavements and foundations. Sodium chloride has been used for many years as a stabilizing admixture in selected base course materials. Sodium chloride added to raw soil were found to have negligible effects on soil plasticity while increasing compacted density and decreasing optimum moisture content. In this project, the stability of soil is found out by adding Sodium chloride (Nacl) and thus compared with the stability of soil without adding Sodium chloride (Nacl) followed by different laboratory tests.

Published by: Ramkumar Guttikonda, Nadakuditi Abhilash

Research Area: Soil Stabilization

Review Paper

2. A Review Article of Fundamental Video Pre-processing Image Quality Enhancement Technique by Using Segmentation Approach

All Color image segmentation may be a terribly rising analysis topic within the space of color video frame extracting image analysis and video Quality sweetening. Several progressive algorithms are developed for this purpose. But, usually, the segmentation results of those algorithms appear to be laid low with miss classifications and over-segmentation. The explanations behind this are the degradation of video frame extracting image Quality throughout the acquisition, transmission and color area conversion. So, there arises the necessity of Associate in nursing economical image sweetening technique which might take away the redundant pixels or noises from the color image before continuing for final segmentation. During this paper, an endeavor has been created to check and analyze completely different image sweetening techniques and thereby checking out the higher one for color image segmentation. Also, this comparative study is finished on 2 well - known color areas HSV and color saturation on an individual basis to seek out that color area supports segmentation task additional expeditiously with relation to those sweetening techniques.

Published by: Baviskar Vaibhavkumar, S. R Goyal

Research Area: Image Processing

Research Paper

3. Formulation of Natural Mosquito Repellent

Medicinal plants contain numerous biologically active compounds which are helpful in improving the life and treatment of diseases and these are the primary source of synthetic and traditional herbal medicine. The presence of various life-sustaining constituents in plants made scientists investigate these plants for their uses. The objective of the work was to formulate a mosquito repellent product containing Curcumin and Embelin obtained from Curcuma longa and Embelia ribes respectively. Isolated Curcumin and Embelin were confirmed by TLC technique. Bands were compared with standards by calculating Rf 0.74 and 0.60 respectively at visual detection and 254 nm. The formulation of cream was evaluated for various parameters like smooth texture and spreadability with a pH 7 which is non-irritant and suitable for the skin. There is no phase separation during thermal stability. From the present work, it was concluded that 1% Curcumin and 1.5% Embelin containing cream is safe, effective, usable for the skin and stable too.

Published by: Dr. Sneha Agrawal, Nidhi Haldankar, Aniket Jadhav

Research Area: Pharmaceutics and Pharmacognosy

Research Paper

4. Calibration of MQ-7 and Detection of Hazardous Carbon Mono-oxide Concentration in Test Canister

The most active research in recent years is estimating the noxious waste which has a very high influence on the human health. There are many gases which have adverse effects on human health. Here carbon monoxide(CO) is considered as one of toxic gas which is considered to cause various health issues based on the concentration the casualty is exposed. In this paper, we ensure the presence of hazardous gases and also provide the procedure to estimate the concentration of the same with the help of the MQ-7 sensor and test setup. The calibration of the sensor is carried out with a canister of known volume and the estimation of the CO in the test environment is also determined.

Published by: K. Senthil Babu, Dr. C. Nagaraja

Research Area: Electronics and Communication

Research Paper

5. Automatic Feature Selection from EHR & DNN Modeling

Recently there are a lot of advancements in healthcare technology. Amongst, Electronic Health Record (EHR) is an upcoming trend which stores patients’ demographics, lab tests & results, medical history, habits etc. collaborated in electronic form. EHR is huge data, which is difficult to maintain and retrieve. So the idea of health risk prediction is formulated in this work. To get the relevant data from EHR, feature selection technique is used. Feature selection is responsible to collect only important and needed data from the dataset. For feature selection regression method is used in which loss function is proposed due to which accuracy and performance of the model are increased. Further risk prediction is done using neural network model. Deep Neural Network (DNN) is best suited for pattern learning and prediction purpose. It consists of various layers which have their specific function. DNN uses transfer learning to avoid repeated training for the whole system. Dataset considered here is of hypertension. EHR data is also synthetically created for analysis.

Published by: Shreyal Gajare, Shilpa Sonawani

Research Area: Data Analytics

Survey Report

6. A Literature Survey on Smart Home Automation Security

This paper presents a detailed description of different technologies and home automation systems from a security point of view. This paper highlights various security flaws in existing home automation systems and how the concept of security and the meaning of the word “intruder” have evolved over time.  We studied the challenges in home automation security from point of view of home owner and security provider. This work considers home automation systems like central controller based home automation systems, context-aware home automation systems, Bluetooth-based home automation systems, Short Messaging Service-based home automation systems, Global System for Mobile communication or mobile-based home automation systems, and Internet-based home automation systems. The work is concluded by giving future directions home automation Security Research.

Published by: Rohit Ragmahale

Research Area: Internet Of Things

Research Paper

7. Energy Aware Node Mobility Prediction in Mobile Adhoc Networks

The analysis of human location histories is currently getting an increasing attention, due to the widespread usage of geopositioning technologies such as the GPS, and as well as online location-based services that allow users to share this information. Tasks such as the prediction of person’s movement can be addressed through the usage of this data, in order for offering support for more privileged applications, such as adaptive mobile services through proactive context-based functions. Here we aim to develop a simple and effective scheme to predict when the user will leave the current location and where he will move to future position. This paper presents a hybrid method for predicting human mobility on the basis of Mobility Markov Chain Models (MMCs). The proposed approach clusters location histories according to their characteristics, and later trains the MMC model based on mobility history to obtain transition matrix. The usage of MMC allows us to take information of location characteristics as parameters, and also to account for the effects of each individual’s previous actions. The proposed system is a mobility prediction with adaptive duty cycling approach in reducing energy consumption, with a mobility model called Mobility Markov Chain (MMC) for predicting the future location. We report a series of experiments with a real-world location history dataset and from the LifeMap dataset, showing that the prediction accuracy is in the range of 65 to 85 percent.

Published by: Ram S. Kale

Research Area: Mobility

Research Paper

8. Analysis and Design of Multistorey Building G+4

A multi-storey is a building that has multiple floors above the ground. It can be a residential or commercial building. in this project the analysis and design of multi-storey building G+4. In general the analysis of multi-storey is elaborate and rigorous because those are statically indeterminate structures. Shears and moments due to different loading conditions are determined by many methods such as portal method, moment distribution method and matrix method. The present project deals with the analysis of a G+4 building. The dead load & live loads are applied and the design for beams, columns, footing is obtained Manually. The Analysis part of the structure is done using Kani’s Method and the values are taken for design.

Published by: Mohd Zohair, K. Mounika Reddy

Research Area: Structural Engineering

Case Study

9. Consumer's Acceptance to Green Building Concept for Sustainable Construction in India

The changing consumer demands for eco-friendly products and services in all industrial sectors have paved way for constant growth and development of the real estate sector, especially in Delhi-NCR. The growing interest towards green products in real estate can be attributed to the fact that quality of air is decreasing day by day. According to few reports, buildings consume more than 30% of energy utilizing 40% of resources while simultaneously generating 40% of wastes and 35% of harmful greenhouse gases. So this study is focused on consumer’s acceptance and willingness to pay more for green building products in Delhi-NCR. For the purpose of the study 150 commercial property owners were contacted to identify the factors stimulating them to pay premium prices for sustainable buildings over conventional buildings. From the results, it was found that environmental attitude, green awareness, architectural factors and social influence significantly influence the customer willingness to pay higher prices for green buildings. Social Influence is the strongest factor that has positively influenced the customer inner will to pay premium prices for green buildings. The research also provides an in-depth understanding of factors stimulating customers to go green in the context of construction industry specifically in Delhi-NCR region.

Published by: Ankit Kumar Jat, Prithviraj Dilip Mane

Research Area: Green Buildings and Sustainable Construction

Review Article

10. Sliding Window Control Based High Utility Pattern Mining For Industrial Use

Value of the item set is considered as an utility of that item set and find out the high utility of the item set is the aim of utility mining .Some time database parameters are considered to find out high utility pattern eg. Profit, cost etc. In day to day life high utility pattern mining play important role in applications. Its current hot topic in today’s research area. Different existing algorithms are present in this area .It first of all identify the candidate itemsets by using their utilities, and simultaneously identify the exact utility of that candidate pattern. Problem of using this algorithm is large number of candidate itemsets are generated. But after computing exact utility it’s clear that most of the candidate having no high utility. For generating profitable product manufacturing plan its very important to understanding the customer preferences in industrial area. One of the approach in pattern mining, by considering the quantity, quality and cost of each product for generating high profitable product set, which employed to find out high utility pattern. For establishing highly profitable manufacturing plan which allow corporation to maximize its revenue, high utility pattern mining is important aspect. Large amount of stream data related to customer purchase behavior used for establishing manufacturing plan. Recent preference of the customers also helps in generating manufacturing plans. This survey work contains a list structure and a novel algorithm for generating high utility pattern over large data, on the basis of Sliding Window Control Mode. This approach avoid the generation of candidate pattern. Due to that algorithm not required large amount of memory space as well as computational resources for verifying candidate patterns. Due to this it’s very efficient approach.

Published by: Swapnali Londhe, Rupesh Mahajan

Research Area: Computer Engineering

Review Article

11. Application of the Hash Function on Secret Message and Provide it Security with the Help of Invisible ASCII Character Replacement Technology

Most widely used technique over the internet for communication is the text-document exchange. This text document may contain valuable data or some general information of any kind. If this text document contains some important information and if gets hacked then they may change information about it or may misuse that information. Because of all these reasons we need some technique for information hiding within a text document while communication over the internet. Although there are lots of text-based information hiding techniques present and proposed by many authors but these techniques have some drawbacks such as poor robustness, lower embedding rate, and semantic clutter. Due to all these flaws in the existing system many time the information is hacked or extracted by the interceptors. To mitigates all these drawbacks of existing system or techniques we proposed a new technique based on the hash function and the invisible ASCII character replacement method. In this approach, we first find the binary formatted information which is added by even numbers of 1’s for even parity, after that the space character in every carrier is replaced by SOH with the help of some replacement algorithm. In the third stage, a hash value is generated. At last the hash value is compared with the encoded secret information.

Published by: Swati Dandekar, Dr. Jyoti Rao

Research Area: Computer Engineering

Research Paper

12. Big Data Classification of Users Navigation and Behavior Using Web Server Logs

Users for online shopping are increasing day by day because of easy to get and time-saving property of online shopping. Having a proper understanding of users interest for certain type of product or different products for online shopping becomes important to create personalized service for a target market. An important property of successful e-commerce website is the ability to provide useful content at the right time to users. And because of all this, personalization techniques are introduced to create adaptive shopping application in which user interfaces change according to users interest. User’s behavior information is stored in web log files, and to get the information data mining techniques are used in which they use statistical characters to model users behavior and not considering the sequence of action performed by uses. It becomes helpful if we follow user’s session to understand complex user behavior. Therefore to eliminates all these issues this paper proposes a linear-temporal logic model checking approach for the analysis of structured e-commerce weblogs. If we consider a common way of mapping log records according to e-commerce structure, weblogs can be easily converted into event logs by which behavior of the user is captured. After getting users behavior by performing different predefine queries to identify different behavioral patterns that consider the different actions performed by a user during a session.

Published by: Prajakta Ghavare, Prashant Ahire

Research Area: Computer Engineering

Survey Report

13. A Literature Survey on Intrusion Detection and Protection System using Data Mining

In the modern world of security many researchers have proposed various new approaches; among those techniques application of data mining for Intrusion detection is one of the best suitable approaches.The system proposes a security system, name the Intrusion Detection and Protection System (IDPS) at system call level, which creates the personal profile for the user to keep track of user usage habits as the forensic features. The IDP uses a local computational grid to detect malicious behavior in a real-time manner. In this paper, a security system, named the IDPS is proposed to detect insider attacker at SC level by using data mining and forensic techniques.

Published by: Chaitali Choure , Leena H. Patil

Research Area: Data Mining

Research Paper

14. A Study on the Volatility and Return with Reference to Stocks of Bank Nifty

Study on stock market trends has been an area of vast interest both for who wish to make a profit by trading stock in the stock market. India is one of the emerging economies, which has witnessed significant developments in the stock markets during the liberalization policy initiated by the government. However, investing in banking shares include high risks which can be guided but not controlled. The banking sector is the backbone of country’s economy. This sector has given very good return to the investors in the past. But the recent financial crisis has proved, that the Banking stocks tend to be more volatile than other stocks. This paper is a humble attempt to measure the volatility of the Bank index stocks and compare it with that of the volatility of NIFTY. Stock markets, in general, are considered volatile and volatility plays a key role in measuring the risk-return trade-offs. Estimating volatility enables the pricing of securities and, understanding stock market volatility or individual stock price volatility enables good decisions on the part of investors.  Investors who are risk-averse would not be happy to invest in a highly fluctuating stock, whereas those with a thirst for riskiness would happily invest in a highly volatile market. The study evaluates the performance of banking stocks mainly to identify the required rate of return and risk of a particular stock based upon different risk elements prevailing in the market and other economic factors.

Published by: Rohith U J

Research Area: Security Analysis and Portfolio Management

Research Paper

15. DNA Methylation Data Analytics in Cancer Research

Many studies demonstrated that the DNA methylation, which occurs in the context of a CpG, has strong correlation with diseases, including cancer. There is a strong interest in analyzing the DNA methylation data to find how to distinguish different subtypes of the tumor[1]. However, the conventional statistical methods are not suitable for analyzing the highly dimensional DNA methylation data with bounded support. DNA methylation is one of the most extensively studied epigenetic marks, and is known to be implicated in a wide range of biological processes, including chromosome instability, X-chromosome inactivation, cell differentiation, cancer progression and gene regulation[4]. Identification of cancer subtypes plays an important role in revealing useful insights into disease pathogenesis and advancing personalized therapy. In order to explicitly capture the properties of the data, a deep neural network is used, which composes of several stacked binary restricted Boltzmann machines, to learn the low-dimensional deep features of the DNA methylation data.

Published by: Apoorva Patil, Rashmi A. Rane

Research Area: Data Analytics

Case Study

16. Case Report-Post Cataract Surgery Herpes Simplex Keratitis and its Management

Herpes simplex keratitis (HSK) is a leading cause of corneal opacification and infection-related visual loss. Even though an individual may not have had the clinically apparent disease, high fever, immune-suppression, and sometimes surgery can reactivate latent herpes1. Its presentation can be distinctively divided into two types, epithelial keratitis or stromal keratitis due to a difference in pathogenesis, this inevitably postulates treatment difference. In this report, a case of postoperative herpes simplex virus (HSV) keratitis after a cataract surgery is described. The diagnosis and medical management of herpes simplex keratitis are discussed.

Published by: Dr. Nishant Vardhan

Research Area: Ophthalmology

Survey Report

17. Survey on Removal of Rain or Snow From a Single Color Image

It is well-known that a bad weather, e.g., haze, rain, or snow, affects severely the quality of the captured images or videos, which consequently degrades the performance of many image processing and computer vision algorithms such as object detection, tracking, recognition, and surveillance. Rain/snow removal from a video or a single image has been an active research topic over the past decade. Today, it continues to draw attention to outdoor vision systems (e.g., surveillance) where the ultimate goal is to produce a clear and clean image or video. Here, the most critical task is to separate rain/snow components from the other part.

Published by: Binju Bentex, Dr. K S Angel Viji

Research Area: Image Processing

Review Paper

18. An Approach to Multi-Cloud Securities

The use of multi-cloud provides highly scalable and reliable application for IT leaders to transforming their data center architectures to move from a reactive, inflexible organization to being a more proactive, a multi-cloud deployment is appropriate. Multi-cloud denotes the use of multiple independent clouds by a client or a service. Since the multi-cloud services will be migrating from single cloud to different cloud service providers it is challenging quest to procure Security issues in multi-cloud. Hence there is a need to ensure storage security in multi-cloud. So to provide the storage security at multi-cloud, we adopted the cryptography techniques in our proposed method. In cryptography, we are focusing on Deffie-Hellman key exchange protocol and elliptic curve for a reliable key generation. In this paper, we majorly focused on multi-cloud, need, benefits and security aspect relating to multi-cloud.

Published by: P. Sabitha, Dr. V. B Narasimha

Research Area: Cloud Computing

Research Paper

19. Resolving Multi-party Privacy Conflicts in Social Media

Information shared through Social Media may affect more than one user’s privacy e.g., Information that depicts different users, comments that mention different users, events in which different users are invited, etc. Many types of privacy management support in present mainstream Social Media foundation makes users unable to appropriately control the sender and receiver. Computational mechanisms that are able to merge the privacy preferences of different users into a single policy for an item can help solve this problem. Merging different user’s personal preferences is difficult hence conflicts occur in privacy preferences, so methods to resolve conflicts are needed. Moreover, these techniques need to consider how users’ would actually reach an engagement about a solution to the conflict in order to propose solutions that can be acceptable by all of the users affected by the information to be shared. present approaches are either too demanding or only consider fixed ways of aggregating privacy preferences. Here, we introduce the basic computational procedure to overcome problems in Social Media that is able to adapt to different situations by modeling the concessions that users make to reach answers to the conflicts. The present results of a user study in which our introduced mechanism outperformed other present approaches in terms of how many times each approach matched users’ action. Computational mechanisms that are able to merge the privacy preferences of multiple users into a single policy for an item can help solve this problem. However, merging multiple users’ privacy preferences is not an easy task, because privacy preferences may conflict, so methods to resolve conflicts are needed. Moreover, these methods need to consider how users’ would actually reach an agreement about a solution to the conflict in order to propose solutions that can be acceptable by all of the users affected by the item to be shared. Current approaches are either too demanding or only consider fixed ways of aggregating privacy preferences. In this project, we propose the first computational mechanism to resolve conflicts for multi-party privacy management in Social Media that is able to adapt to different situations by modeling the concessions that users make to reach a solution to the conflicts. We also present results of a user study in which our proposed mechanism outperformed other existing approaches in terms of how many times each approach matched users’ behavior.

Published by: M. Premkumar, Dr. Selvaraj

Research Area: Social media

Survey Report

20. Pollution Human Rights and Environmental Protection

In terms of international awareness, the connection between human rights and Environmental protection is steadily grown significantly, given that environmental protection became an important issue on the international agenda. Over the years, environmental legislation has evolved being involved in human rights and recognizing the fundamental rights in relation to the environment. A considerable number of legal instruments at international, regional and national levels have been approved and established specialized bodies to respond to problems identified in human rights and environmental protection. Environmental instruments increasingly include protection of human rights and principles, including the specific procedural rights such as access to information and access to justice and the principles of implementation. At the same time, the development of environmental norms has affected human rights. This paper highlights some of the developments that have occurred at the international, regional and national levels in recognition of the link between the protection of the natural environment and human rights and the impact that they have in achieving the aims of each other.

Published by: Vishal Bhardwaj

Research Area: Environmental Engineering

Technical Notes

21. BContri- An Algorithm for Monitoring Construction Site using RFID, GPS and GSM

Construction is recognized internationally as one of the information-intensive industry and subject to harsh conditions (e.g., rain and dust) and is often criticized for delivering projects late and over budget. Collection of detailed, accurate and a sufficient volume of information and timely delivery of them are vital to operating a well-managed and cost-efficient construction project. This paper investigates the fully automated data collection using integrated applications of Radio Frequency Identification (RFID), Global Positioning System (GPS) and Global System for Mobile Communication (GSM) technologies in the construction industry which focused on the real-time exchange of information between the construction site and off-site office, how this technology could change current practice. Therefore, the main objective of this study is to propose a system to improve efficiency and cost-effectiveness, practical communication and control among participants, and increase flexibility in terms of information delivery and response time on and off construction sites. Most of the used technologies in this research are commercially available and are inexpensive (RFID, GPS, GSM). Some application of advanced tracking and data storage technologies used in construction information management are discussed briefly.

Published by: Afiya V N

Research Area: Construction Management

Survey Report

22. Neural Network Ensemble Model with Back Propagation for Classifying Melanoma on Dermoscopy Images-A Survey

Dermoscopy is the examination of the skin using skin surface microscopy. We develop a novel method for classifying melanocytic tumors as benign or malignant by the analysis of digital dermoscopy images. In this paper before classification pre-processing and segmentation, feature extraction is to be carried out. Then introduce the classifier based on neural network ensemble is used to classify the melanocytic tumors as benign or malignant. To improve the neural network's generalization performance proposes an effective neural network ensemble approach with an idea. One is to apply neural network's output sensitivity as a measure to evaluate neural network's output diversity at the input near training samples so as to able to select a diverse individual from a pool of well-trained neural network. Lesions are extracted using SGNN. Lesions are classified using a classifier based on neural network ensemble model.  

Published by: Jeena Johnson, Asha Vijayan

Research Area: Image Processing

Research Paper

23. Adsorption Potential of BF Slag and BF Flue Dust towards Removal of Aqueous Phenol

The present work focuses the removal of phenol present in industrial wastewater (Steel Industry) using granulated BF slag and BF flue dust (generated as waste material in the steel industry). Several kinds of solid waste like granulated BF slag and BF flue dust and liquid toxic effluents are generated at different units process of integrated iron and steel plants. The study will help us to assess self-adsorption characteristics in plant generated solid water Vs in plant toxic effluents. In the study shows that granulated BF slag and BF flue dust are efficient adsorbents for the removal of phenol from the industrial wastewater.

Published by: Dr. Kalpataru Rout, Manoj Kumar Sahoo, Dr. CR Sahoo

Research Area: Environment Science and Engineering

Case Study

24. A Study on Role of Media in Women Empowerment in India

This research paper deals with the problems of women in general and focuses on the role of media in women Empowerment. It is an attempt to analyze the status of women by analyzing various indicators like socio, economic and decision-making powers.After independence, Government of India took several initiatives, programmes, and policies, apart from constitutional and legal safeguards for the empowerment of women in the country. As we know Women's are the wealth of India and they have contributed in almost every field and made the country feel proud at every occasion. They are in front, leading the country, making milestones and source of inspiration for many. However, another reality of Indian society is that there are systematic discrimination and neglect of women's in India, which could be in terms of limited access to education, health and property rights and domestic violence etc. The fear of sexual violence has been a powerful factor in restricting women's behavior and sense of freedom. The struggle against violence is actually the struggle against the unequal distribution of power both physical and economic between the sexes. Women empowerment in India is still a distant dream. There still exists a wide gap between the goals enunciated in the constitution, legislation, policies, plans, programs and related mechanisms on the one hand and the situational reality of the status of women in India, on the other hand. India is fast developing but women's in India continue to be discriminated. Media is the mirror of society and media reports are the reflection of happenings in the society. Communication is extremely important for women’s development and mass media play a significant role. It is to be noted that growth of women’s education and their entry into employment has contributed to the growth of media. Media has immense power to influence the masses and communication and IT revolution has further increased its importance. The study is based on primary and secondary sources. The study concludes with an observation that access to education and employment are only the enabling factors to empowerment, achievement towards the goal, however, depends largely on the attitude of the people towards gender equality.

Published by: Dr. Sonia Gupta

Research Area: Women Empowerment

Review Article

25. To Design and Develop Intelligent Exercise System

As the population increases day by day, the pollution and chances of traumas are increases. The health monitoring is also important to make physically strong. A load of physiotherapist is increased which result in poor performance of the patient exercise. The system is developed which increases the efficiency of a physiotherapist. Kinet based exercise system is developed which monitor and assign an exercise to the person. In defensive and rehabilitative healthcare, physical exercises are powerful involvement. However, a program may need in the range of thousands of practice repetitions, and many people do not adhere to the program making the exercise futile, or even dangerous. In recent years, applications developed based on Kinet are getting admired since human poses can be more easily estimated based on the sensed RGB-D information. There is no accurateness of doing free-hand exercise prescribed by physiotherapy Doctor. On the other, doing exercise is not that much interesting to do alone.

Published by: Nitu Sanjay Sharma

Research Area: Image Processing

Research Paper

26. Design of Low Voltage two Stage CMOS Operational Amplifier

The method that presented in this paper is to design a low voltage CMOS operational amplifier, which operates at the ±1V power supply. Due to this, the demand for low voltage silicon chip systems has been increased. The supply voltage is scaled down to reduce the overall power consumption of the system. The objective of this project is to design a low voltage CMOS operational amplifier. The designed OP-AMP is a two-stage CMOS OP-AMP which exhibits a gain of 59.50 dB, the phase margin of 79.431 and unity gain bandwidth is 7.717 KHz. Design and Simulation have been carried out in LT Spice tools.

Published by: Merlyn Mariyam Varghese, Kusumam Joseph

Research Area: VLSI

Research Paper

27. Layout Design of 5 Transistor D Flip Flop for Power and Area Reduction and Performance Comparison in Different Scaling Technologies

Due to increase in demand for portable devices low power dissipation is an essential need for device design. Due to advances in low power applications low power digital CMOS has become more important, and the process technology has been advanced. In this paper, an SET D flip-flop with 5 transistors is proposed. This D flip-flop has been implemented using different scaling technologies such as 180 nm, 90 nm, 70 nm and 50 nm. Both power dissipation as well as area has been compared. The layout of the 5 transistor D FF is designed. It has been observed from simulation result that the fully custom design has shown 39% reduction in area and 37% reduction in power as compared to fully automatic design. This design technique achieves lowest power consumption with reduced transistor count. It can be used in applications like buffers, registers, digital clocks etc.

Published by: Shermina M. Meera, Shahanaz M. Meera, Nishi G. Nampoothiri

Research Area: VLSI

Survey Report

28. A Survey on Sparsity Based Single Image Super Resolution of Colour Images

There are several methods for improving the resolution of images. The usual approach is by sparsely representing patches in a low-resolution input image via a dictionary of an example low-resolution patches and then using the coefficients of this representation to generate the high-resolution output via an analogous high-resolution dictionary. However, most existing methods focus on luminance channel information only and neglect the colour channels. The present method achieves sparsity-based super resolution by considering multiple colour channels also along with luminance channel Information. Edge similarities among RGB colour bands are used as cross channel correlation constraints. A dictionary learning method specifically to learn colour dictionaries that encourage edge similarities is also used. The advantages of this method are demonstrated both visually and quantitatively using image quality metrics.

Published by: Helena Thomas, Anitha R

Research Area: Image Processing

Research Paper

29. VHDL Implementation of 32-Bit Microprocessor

The digital design is a very broad field. Its applications can be found in our daily life such as in laptops, calculators, cameras etc. The VHDL has become an essential tool for designers in the world of digital design[1]. This paper presents the VHDL implementation of a 32-bit microprocessor. The structural VHDL model of the microprocessor is designed to perform 16 operations which include both logical and arithmetic operation. Here the microprocessor is divided into various sub-modules and each of them was programmed using VHDL. The VHDL implementation and functionality test of the 32-bit microprocessor are done by using the Xilinx tool.

Published by: Kusumam Joseph, Merlyn Mariyam Varghese

Research Area: VLSI

Review Paper

30. Making of Two South Korean Chaebols: Samsung and Hyundai

The management system of South Korean companies has been influenced by their traditional beliefs and values of Confucianism bought up by Chinese in the 15th century. Yet, this Confucius management style was shifted to western style after the Asian financial crisis of 1997. Few prominent conglomerate led to the growth of South Korea from developing the country to one the wealthiest country in the world. This paper aims to evaluate this management transition in two major South Korean companies i.e. Samsung and Hyundai. This paper shows how management system changed in South Korea in five main major vectors: (A) Decision-making style, (B) shift to corporate governance, (c) change in performance management, (D) corporate social responsibility, (E) government intervention and support

Published by: Hardik Jain , Shantanu Kaushik

Research Area: Management

Review Paper

31. Catercam- A Sliding Camera Mechanism Using Gimbal Assembly

In the current era of 21st century technocrats focus on building more efficient, compact, power efficient and cheap substitute for technology presently used. A CCTV camera is a widely used product for surveillance, but many times just to cover a small area it is required to have more than one camera at the same place viz. a parking space which requires 180 degrees coverage or a ‘U’ shaped road requires at least two cameras to have a complete footage of the sector area. Similarly for recording a remote area which is seldom used. Furthermore, in some areas cameras are installed to work for just a small amount of time for viz. CCTV in the classroom to check how many students were present in the class. Adapting this technology will reduce the number of camera units used in a particular area, work of maintenance department and moreover a huge amount of energy is saved which can be utilized for villages where people face scarcity of electrical energy.

Published by: Kashyap Kirtikar, Shubham Ghodke, Atharva Shirode, Vismita Nagrale

Research Area: Security (CCTV)

Review Paper

32. Hybrid Wallace Tree Multiplier Using 4:2 Compressor in Carry Save Addition Mode

The multiplier is one of the important elements in most of the digital processing system such as FIR filters, digital signal processors, and microprocessors etc. The speed of a system depends upon how a faster an arithmetic operations are performed within the structure for which mostly multiplication should be carried out at a faster rate which thus improves the system performance. The two important parameters of a multiplier are its area and speed that are inversely proportional. Multipliers are of great significance in today’s Digital Signal processing applications like DFT, IDFT, FFT, IFFT, and ALU in Microprocessor.  Wallace tree multiplier along with a Ripple Carry adder is hybridized and formed a hybridized multiplier which delivers high-speed computation along with the reduction in power consumption. Here, Wallace tree multiplier is used to increase the speed of addition and a Ripple Carry Adder is used for final accumulation. This hybrid multiplier produces better results in terms of speed and power than the conventional designs. The proposed circuit is designed and the results are discussed in the paper. This proposed work is evaluated in the basic area, power, and delay.

Published by: Ankur Katkar, Sunil Kuntawar, Vijay Roy

Research Area: Digital Multiplier

Research Paper

33. Fast Moving Consumer Goods Market in Rurban Bihar: A Fast Changing Landscape

India is an agro-based economy from the time immemorial. Though the contribution of agriculture and allied sectors in national GDP has been diminishing over the years, yet the biggest portion of the labor force is employed here. This has resulted in low disposable income at the hands of the farmers. Bihar being a primarily agrarian state and with the largest chunk of the youngest of the population provides huge customers base with very high aspirational values and immense market potential for Fast Moving Consumer Goods (FMCG), but with very low purchasing power. This is an anomalous situation for a marketer. However, even with economics being at odds, the young generation with modern technology, having better information and capabilities provides an encouraging future prospect of FMCG market. The pattern of consumption of FMCG goods is surely northbound. This has led to the opening of many large format retail stores in almost all Rurban cities of Bihar. The increasing number of retail stores is creating a competitive challenge for retailers and consumers as well. In view of this, the retailers are focusing more on offering innovative products, customized services, which are suitable for specific customer needs. FMCG being the basic daily need products, the retailers will have to focus on understanding customer segments based on economic background, value, variety, and aspirations of the customer. This study finds that the key factors affecting consumption pattern of FMCG products in the rural-urban market of Bihar are hidden in value proposition and offering of everything that’s Lux but affordable.

Published by: Himanshu Shekhar Singh, Dr. Arvind Kumar Shukla

Research Area: Management (Marketing)

Review Paper

34. Underground Drainage Monitoring System Using IoT

India has announced a project of making 100 smart cities. For making a smart city one needs to consider many parameters such as smart water, smart electricity, smart transportation etc. There will be a need of smart underground infrastructure which includes underground water pipelines, communication cables, gas pipelines, electric flow, etc. As most of the cities in India have adopted underground drainage system, it is very important that this system should work in the proper manner to keep the city clean, safe and healthy. If they fail to maintain the drainage system the pure water may get contaminated with drainage water and can spread infectious diseases. So different kind of work has been done to detect, maintain and manage these underground systems. Also, leaks and bursts are unavoidable aspects of water distribution system management and can account for significant water loss within a distribution network if left undetected for long period. This project represents the implementation and design functions for monitoring and managing underground drainage system with different approaches. It also gives a description of water-wise system and detection method to detect leakage defects in sewer pipeline. Also, some part of condition rating model for underground Infrastructure Sustainable Water Mains and Intelligent system for underground pipeline assessment, rehabilitation and management are explained.

Published by: Yash Narale, Apurva Jogal, Himani Choudhary, S. P. Bhosale

Research Area: IoT

Research Paper

35. Design of Flip-Flops for High Performance VLSI Applications Using Different CMOS Technology’s

In this paper low power, high-speed design of SET, DET, TSPC and C2CMOS Flip-Flop are designed and analyzed. As these flip-flops have a small area and low power consumption they can be used in various applications like digital VLSI clocking system, buffers, registers, microprocessors etc. The Flip-Flops are analyzed at 90nm technologies. The above designed Flip-Flops and Latches are compared in terms of its transistor count, power dissipation and propagation delay using DSCH and Micro wind tools. This project proposes low power high-speed design of flip-flops in which True Single-Phase Clocking (TSPC) and C2CMOS flip-flop compared with existing flip-flop topologies in term of its transistor count, power dissipation, propagation delay, parasitic values with the simulation results in micro wind.

Published by: Shillu Elsa Thomas

Research Area: VLSI

Survey Report

36. Security and Clustering Of Big Data in Map Reduce Framework: A Survey

For maintaining the authenticity, privacy and confidentiality of larger dataset are outsourced to the cloud in the encrypted format. Cloud storage provides data management and reduces the costs. Various clustering methods like K mean, K nearest neighbouring, DBSCAN clustering methods are implemented to cluster massive data that are related to each other using the map-reduce framework in big data analytics. Clustering was done on encrypted partitioned data in order to protect the information from the third party access. Various approaches have been used for securing and maintaining the efficiency and performance of millions of dataset with variety, velocity, and volume.

Published by: Anju Abraham, Shyma Kareem

Research Area: Big Data

Research Paper

37. Trade Embargo by China on Singapore and Taiwan: An Economic War (A Hypothetical Situation)

This article gives an idea about the trade relations between the Asian Dragon, People Republic of China and its two neighbors, Singapore and Taiwan (Republic of China). The article gives a gist about the development of the two nations and the involvement of China in the process. Focusing on the economic boom that the four Asian dragons had in the late twentieth century and the early two thousand, a research has been done on the trade with Asian Giant, China and the two countries, Singapore and Taiwan which are two of the four Asian dragons. There are tensions in the South China Sea for a very long time; the expansionist policy of China is bringing a threat to the peace in the South Asian region. China is not in good conditions with the two nations as it was earlier. The economic growth of the two nations is also very good from the past few years. But both the countries are heavily dependent on China for raw materials, labor etc., The two Asian dragons are taking decisions that are against China when it comes to territory issues and also in some other international matters, hence the question arises as to What if China imposes embargo on these two nations, and the answer is here in the article.

Published by: J B Bhalacharan, Rahul bharatiya K

Research Area: Pacific Rim - Asian Societies

Review Paper

38. Impact of Motivation on Management Student’s Academic Performance in Relation to overall Advancement

Motivation plays a significant role in everything we do. Without motivation it would be hard for people to perform routine work, set an aim in life, work towards its accomplishment or even spend time with family and friends. Motivation is required at each phase of life and especially for students, it’s very important as it will show them the path to work, discipline their life and provide them zeal to accomplish their objectives. In this paper, we are discussing various parameters that affect student’s motivation and thus monitor their individual accountability. Student motivation affects every aspect of college life, from attendance to academic performance, to extra-curricular activities. Also, teachers have to establish a cooperative atmosphere in their work with a class, among the students, with their colleagues in school, with parents and also within the broader community. In today’s time, all the colleges are continuously under pressure to improve test scores, responsibility, and accountability. Because of these pressures, teachers bombard students with the promise of rewards; stickers for good presentations, appreciation for completing assignments and projects on time etc. Thus the importance of motivation has been stressed. Various research has been done in the subject in recent time and it is analyzed that motivation is one of the few factors that have an impact on everything we do and experience, for example with our work, family, friend and of course, the basic needs.

Published by: Shruti Srivastava

Research Area: Management

Review Paper

39. Comparative Analysis of Controller Techniques Used in Doubly Fed Induction Generators in Wind Turbines

The interest in the variable speed wind turbines has increased due to their very attractive features. The fundamental feature of the DFIG is that the power processed by the power converter is only a fraction of the total wind turbine power, and therefore its size, cost and losses are much smaller compared to a full-scale power converter. The aim of the control strategy is usually to maximize the output power, maximize efficiency of energy conversion besides minimizing output power oscillations or minimizing wear of the mechanical components of the power plant, e.g., train drives, while maximizing the economic profit. Many different topologies have been proposed to achieve the desired speed control on wind generators. Among the various controllers considered based on classical control theory like PI controllers and nonlinear controllers based on Fuzzy logic PI controller using Fuzzy logic, Heuristic algorithm, Genetic Algorithm, Swarm optimization and Sliding Mode controllers were compared. It has been observed that among various controllers the fully fuzzy scheme was best in terms of stabilization times and reduction in asymmetries. However from the tuning of PI controller the swarm optimization technique is best suited for optimizing the parameters of the controller.

Published by: Mohamed Samir, Dr. Gagan Singh

Research Area: Control System - Controllers used in DFIG

Research Paper

40. Data Mining Techniques in Prediction of Risk Factors of Diabetes Mellitus

Diabetes mellitus is a chronic disease, lifelong condition that affects the body's ability to use the energy found in food. The level of morbidity and mortality due to diabetes and its potential complications are enormous and pose significant healthcare burdens. It is a complex and time-consuming task in detecting the risk of acquiring diabetes mellitus when a large amount of data is manually processed in the clinical environment. The objective of this paper is to simplify the process of analyzing and detecting the risk of developing diabetes. Patients’ details are gathered and stored in the form of Electronic medical record (EMR). Association rule mining and decision tree induction are applied to the records stored, in order to obtain the set of rules that are to be satisfied. C4.5 or Support vector machine is used to classify the data set accordingly and summarization techniques are used to summarize resultant possibility of acquiring diabetes.

Published by: Omana .J, Sujithra .S, Vishali .S, Yuvashree .K

Research Area: Data Mining

Review Paper

41. Basic Minor and Major Ramifications of Service Quality in Retail Banking

Nowadays the quality plays a vital role at everyplace, whether it is a service quality or product quality. In this Journal I am focusing on the service quality, that how much it gives an impact on the customer’s loyalty and satisfaction towards the Retail banking. Sometime’s the perception of the customers tend to the public sector retail banking due to the trustworthiness apart from the private banks. The only thing which may develop a difference between these two Sectors is only a Service Quality. The Service quality revolves around the customer mind and that’s the time when any of these two banking sector’s put their positive or negative impact on the customer's attitude. There are numerable researchers which had done research work on the service quality which flashes the light on the basic and straightforward views which describes some of the causes that affect the Service Quality in Retail banking.

Published by: Dr. Manvinder Tandon, Amritpal Singh

Research Area: Retail Banking

Research Paper

42. Idle Speed Control of an Engine Model using PID Control System

An engine model has been developed and controlled by the system to prevent stalling conditions when the automobile is at rest. The main input for the engine is throttle position in degree angle and the main control output is the engine speed in rpm. The engine speed is controlled by the amount of air supplied to the engine. Idle speed control is an automotive issue in which fuel gets consumed more during idling state of an automobile while driving and so its predictive rate will increase in the future based on the increase in traffic requirements. The PID control technique is used to tune the parameters of non-linear plant model into linearized conditions for stable equilibrium. Through this intelligent technique, we are able to define control parameters for the Idle Speed Control system of the engine model.

Published by: Abhishek Chaturvedi

Research Area: Automation Control Systems

Survey Report

43. Big Data Analysis Using Apache Hadoop

Traditional data management, warehousing, and analysis systems fall short of tools to analyze this data. Using traditional DBMS techniques like Joins and Indexing and other techniques like graph search is tedious and time-consuming. In this paper, we suggest various methods for catering to the problems in hand through Map-Reduce framework over Hadoop Distributed File System (HDFS). Map Reduce is a Minimization technique which makes use of file indexing with mapping, sorting, shuffling and finally reducing. Map Reduce techniques have been studied in this paper which is implemented for Big Data analysis using HDFS.

Published by: Suruchi Padhy, Dr. Shashi Kumar D R

Research Area: Computer Science

Review Paper

44. Bioaugmentation of Chlorinated Solvents in Groundwater Using Dehalococcoides

With the era of industrialization and excessive dependence on chemicals, there is increased indiscriminate disposal of especially chlorinated solvents causing a variety of environmental problems. Chlorinated solvents including trichloroethylene (TCE) and perchloroethylene are significant groundwater contaminants causing severe health effects. Various technical strategies have been developed and applied, often with limited success. Time frames for remediation tend to be long, usually measured in decades. In this review we focus on remediation of chlorinated solvents in groundwater by the addition of exogenous microorganisms, specifically members of the genus Dehalococcoides (DHC) referred to as bioaugmentation. Many potential technologies for remediation of chlorinated solvents, its past, present and future as well as how bioaugmentation is superior to these techniques are discussed.

Published by: Anjali Sudheesh

Research Area: Environmental Engineering

Research Paper

45. An Experimental Approach to Study the Effect of Process Parameters on Tensile Strength of Friction Welded Interface of Dissimilar Metals AISI304/4340

Rotary Friction Welding is successfully used for joining of stainless steel 304 and low alloy steel 4340 by varying three parameters namely rotational speed, friction pressure and friction time at three different levels. Fixed parameters are length and diameter of the specimen. Taguchi approach is used to design experimental layout. A total number of experiments conducted is nine. For each experiment, three specimens are made. In this study, it is found that for achieving a sufficient tensile strength on the joint-interface, the friction time should be held as short as possible, while the rotational speed and friction pressure should be as high as possible.

Published by: Navtarndeep Singh Doad, Ankur Gill, Dhiraj Parkash Dhiman

Research Area: Manufacuring Engineering

Research Paper

46. Advancement of Process Parameters in Ultrasonic Machining of Tungsten Carbide Using Gray Taguchi

The principal target of this paper is to contemplate the impact of working parameters of ultrasonic machining (USM) of tungsten carbide (WC) on the machining qualities like MRR and SR. The viability of the ultrasonic machining process with tungsten carbide is assessed as far as the material evacuation rate and the surface complete nature of the work piece created. Tungsten carbide as a super hard and high wear-safe material has been utilized broadly in enterprises. Dark social examinations are connected to decide the reasonable determination of machining parameters s. The Gray hypothesis can give an answer of a framework in which the model is uncertain or the data is inadequate. In addition, it gives a proficient answer for the vulnerability, multi-input and discrete information issue. As indicated by the Taguchi quality outline idea, a L9 orthogonal array. In this investigation, the impact of different information parameters; Abrasive size , Amplitude of vibration, recurrence of vibration viz., metal expulsion rate (MRR), Surface Roughness (SR) are examined.Social examination and investigation of difference (ANOVA) have been performed to upgrade the levels of info parameters.

Published by: Y. Chandrasekhar Yadav, Dr. M. Yohan, P. Kamal Kumar

Research Area: Mechanical Engineering

Research Paper

47. Public Awareness of Dental Implants in Randomly Selected Sample in Kashmir

Aim: The aim of this survey was to assess the public  awareness of dental implants in patients attending  the Department  Of  Prosthodontics in Government Dental College & Hospital, Srinagar, Kashmir Methodology: This Questionnaire-based study was conducted during Feb-Apr 2017, for a period of 3 months. All patients attending the outpatient Department Of Prosthodontics in Government Dental College & Hospital, Srinagar, Kashmir were included in the study. Results: Mean age of the study population was 44.99 + 16.273, male outnumbered by 1.6 and most of the study population was less educated and unemployed and unskilled workers. The primary reason for outdoor consultation was for replacement of lost tooth/teeth (81.7%). Only 35% of the people in Srinagar were aware of dental implants as a treatment modality. The high cost of the implants is one of the major limiting factors working against the willingness of patients to undergo this treatment. Majority of the studied patients were not aware of details of dental implants, procedure, advantages, and disadvantages. Conclusion: Majority of the study population was unaware of the dental implant. There was the significant association between education and occupation and knowledge about dental implant procedure, advantages, disadvantages, willingness for implant and knowledge about the cost of the dental implant.

Published by: Raisa Rashid, Dr. Sandeep Kour, Dr. Imtiyaz Magray

Research Area: Dental Science

Review Paper

48. Solar AC Power Generator with Arduino Control Circuit

We all know that sun provides a never-ending source of energy. This energy is called as Solar energy and it comes under the category of Renewable energy resources. Renewable energy resources are clean and non- polluting energy resources. Non-Renewable energy resources like the fossil fuels, oil, natural gas, coal and nuclear energy are not that much sustainable because they all take longer time for formation. Hence we expect more renewable energy resources and the device associated with these resources. The demand for solar cells or PV cells is increasing day by day. Solar cells convert solar energy into electrical energy. We can use this electrical energy according to our purpose of interest. The electrical power we obtained can be either in the  DC or AC form. The output of Solar cells is strictly DC. From previous researchers, it is seen that we can directly produce AC power from solar cells without any use of inverter by simply arranging the solar cells in a circular pattern over a spinning disc and alternately exposing them. Although it eliminates the cost of the inverter, the major problem arises in controlling the speed of this spinning disk.The type of material for making the circular arrangement also plays an important role in better efficiency. The voltage and power obtained from the previous researchers are also less. In this paper, we modify the arrangement with proper speed controlling circuit by using Arduino in our circuit. The voltage and power obtained from this arrangement are more and hence efficiency is increased. The sine wave obtained is also of less distortion.

Published by: Syed Faiz

Research Area: Engineering and Technology

Review Paper

49. A Review on Process Parameters on Tensile Strength and Hardness Testing of Friction Stir Welding Joint of Aluminium Alloys with Different Tool Pin Profile

Friction-stir welding (FSW) is a solid-state joining process that uses a third body tool to join two faying surfaces. Frictional heat between the welding tool and the work pieces causes the latter to soften without reaching the melting point, allowing the tool to traverse along the weld line. In this work, CNC Milling Machine is used to weld the parts together. The parts being welded are aluminium alloy AA5086 H32-AA6061 T6. The detailed mathematical model is simulated by Minitab17. In this investigation, an effective approach based on Taguchi method, has been developed to determine the optimum conditions leading to higher tensile strength. Experiments were conducted by varying rotational speed, transverse speed, and constant welding depth using L9 orthogonal array of Taguchi method. Effect of different tool pin profiles on the quality of the welded joint is also studied for welding. Different tool pin profiles considered are threaded, taper, circular/round and square. The tools are designed using Pro/E and are manufactured on a Lathe machine. After the parts are welded, various practical tests are performed on the welded parts that include the tensile strength and the Vickers’s hardness test.

Published by: Pawan Parashar, Arun Patel

Research Area: Mechanical Engineering

Review Paper

50. The Terrestrial Alien Invasives of Family Asteraceae in Punjab (India) and their Ecology

Punjab, a northwestern state of India, is one of the main agricultural states of the country which produces wheat, rice, and sugarcane in massive scale every year. The state is rich in terms of biological diversity. However, the invasion of alien species is posing a risk not only to the community composition but also to the agricultural economy of the state. Among several terrestrial invasives of India, mainly two species of family Asteraceae, Ageratum conizoides, and Parthenium hysterophorus that are native to South America, are considered as the most obnoxious weeds to agriculture, ecology, and economy of the state of Punjab. These alien invasives are known for their persistence, adaptability, competitive exclusion and reproductive capabilities. All of these unique characteristics have made these species establish successfully in this new ecological region outside their native ranges.

Published by: Dr. Kirandeep K. Dhami

Research Area: Environmental Sciences/Conservation Biology

Review Paper

51. GPS Based Real Time Vehicle Tracking System for Kid’s Safety Using RFID and GSM

The reports from international crime bureau that a child goes missing for every three minutes in the world. This is the big issue which has to roll in parents mind. They always worry when they send their children to a place behind their eyes the places like school. To lessen the parent’s anxiety about their children, a vehicle positioning system is formulated by merging radio frequency identification and global positioning system. The system consist of RFID tags and reader which is designed to scrutinize the entry and exit of a person in vehicle each person is assigned the tag which holds the precise identification details when children enters the vehicle, the readers reads the person tag and stores the details of entry and exit. This information is notified to the concerned authority via android app and website. The proposed system facilitates to know about the area where the vehicle has crossed the path using RFID. The GPS technology connected with this system helps in acquiring updated in the school server. This proficient tracking structure with enriched feature is designed and implemented for the purpose of protection in various stream. It is up and coming technology in the field of communication and network. The tag on road model is an evolving and just able technique in the future world. The projected system here is planned to be implemented is school chilies for the safety of the students and it can also be installed in the professional security system.

Published by: Amit Bhoyar, Rajeev Varma

Research Area: Child Safety in School

Research Paper

52. Performance Evolution and Comparison Analysis of OFDM System for Channel Estimation

A Multiple inputs multiple output (MIMO) structures in wireless communication exchange are referred as a wireless communication system where a couple of antennae is used in both aspects of the communication exchange route i.e. Transmitter side and Receiver aspect. The communication exchange structures, which use more than one transmit and multiple obtain antennas are commonly referred to as a couple of input more than one output (MIMO) structures. The coverage place and the transmission ability of a wireless communication exchange system can be progressed by way of the usage of this Wi-Fi networking generation. In digital signal processing, the processing algorithms for interference suppression are becoming complicated with a couple of antenna at each end of the transmission channel. Additionally, the growing demand for those networks has become the frequency spectrum into a treasured aid. For that reason, there is a sturdy need for a method which could pack more and more bits/Hz. Any such device is known as multiple inputs multiple output (MIMO) gadget. The uplink insurance and capacity of OFDM structures with the traditional multi-user detector receiver are interference restricted. In particular, at some stage in the rollout segment, the coverage of OFDM machine is uplink restricted. A less expensive answer to improving the general overall performance is using serial interference cancellation (SIC) at the base station. In this research work, a sophisticated receiver structure for interference cancellation primarily based on advanced Least Square Error Algorithm set of rules for multiple inputs multiple outputs orthogonal frequency division multiplexing (MIMO-OFDM) structures is proposed. The proposed method no longer simplest increases the capability of the device but additionally low down the Bit Error Rate. It could make full use of the channel correlations in the area, time, and frequency to estimate the channel state information for diverse systems, together with pilot-image assisted structures, pilot-embedded structures, and blind structures. MATLAB R2013a has been used to evaluate the performance of proposed algorithm the usage of Wireless Communication toolbox and preferred MATLAB toolbox. The overall performance of the proposed technique and existing technique is measured using BER.

Published by: Anjani Kumari

Research Area: Wireless Communication

Research Paper

53. High Speed Vedic Multiplier Design using FPGA

Vedic mathematics is an ancient system of mathematics, which was formulated by Sri Jagadguru Swami Bharati Krishna Tirthaji (1884 - 1960). After a research of eight years, he developed sixteen mathematical formulae from Atharvana Veda. The sutras (aphorisms) covered each and every topic of Mathematics such as Arithmetic, Algebra, Geometry and Trigonometry, Differential, Integral, etc.The word “Vedic” is derived from the word “Veda” which means the power house of all knowledge and divine. The proposed Vedic multiplier is based on the “Urdhava Triyagbhayam” sutra (algorithm). These Sutras have been traditionally used for the multiplication of two numbers in the decimal number system. It literally means “Vertically and crosswise”. Shift operation is not necessary because the partial product calculation will perform it in a single step, which in turn saves time.  16×16 Vedic multiplier is designed by using Urdhava Tiryakbhyam sutra and using rca adder .The 16 bit Vedic multiplier and array multiplier are designed by using Xilinx Spartan-3E FPGA.

Published by: B. Shubhaker, E. Amareswar

Research Area: VLSI Design

Review Paper

54. Post Exposure Consequences of Methyl Isocyanate Gas Among Inhabitant of Bhopal During and After Bhopal Gas Tragedy

Bhopal gas tragedy of 3rd December 1984 occurred due to the sudden leak of methyl-isocynate . After decades of the exposure, severe illness, lung ailments, eye problems, stomach ailments still continue to haunt the lives of survivors of the tragedy. Most affected organs after the exposure include eyes, respiratory tract, and skin. Substantial neurological, reproductive, neurobehavioral, psychological effects, immunotoxicity and genotoxicity were also observed. Scientific debates about the causes of the accident, the spectrum of health effects and their toxicology are presented with a view of understanding the toxic substances released in the gas cloud and their roles in the causation of health effects. Using cutting edge technologies studies on ocular, respiratory, reproductive, psychological, genetic, and immunological aspects must be continued if we have to understand the harshness of long-term effects associated with this tragedy. The authors recommend long-term monitoring of the affected area and use of appropriate methods of investigation that include well-designed cohort studies, case-control studies for rare condition, characterization of personal exposure and accident analysis to determine the possible elements of the gas cloud. 

Published by: Dr. Chanchal Chauhan

Research Area: Medical Science

Research Paper

55. Crop Water Requirement of Major Crops of Udaipur Region

The study was carried out to estimate a reference crop evapotranspiration (ETr) and actual evapotranspiration for Udaipur Region (latitude 24°52”N and longitude 74°21”E) at 522 Mean sea the level in the north-western zone, Udaipur. Actual major crop evapotranspiration was determined by the crop coefficient (kc) approach where the effects of various weather conditions were incorporated into reference crop evapotranspiration and crop characteristics into crop coefficient. The average ETr values over the year (2012) by Penman-Monteith method were determined. The the result was shown that the average annual values of water to be applied per crop for a season of green gram, maize and sesame crop for Udaipur district are: 471, 586.52 and 552.86 mm by penman method.

Published by: Appasaheb Maruti Ransing, S. R Bhakar, A.B. Joshi

Research Area: Irrigation Water Managment

Research Paper

56. Green Synthesis of Silver Nanoparticles using Barringtonia Acutangula (l.) Gaertn. and its Invitro Anticancer Property

Green synthesis of silver nanoparticles (AgNPs) is very safe and eco-friendly to the environment as well as human. Plants provide a better platform for nanoparticles synthesis as they are easily available, safe, eco-friendly and free from toxic chemicals as well as provide natural capping agents. Secondary metabolites are the reducing agents in the synthesis of silver nanoparticles. In the present study, the medicinal plant Barringtoniaacutangula leaf extract was used as reducing agent. The presence of phytoconstituents of Barringtoniaacutangula was analyzed. The formation of silver nanoparticles was confirmed by color change and the characterization was done by UV-Vis, FTIR and SEM. The maximum absorbance of silver nanoparticles was attained at 435 nm wavelength. Protein molecules are act as capping agents of silver nanoparticles was suggested by FTIR. Size of the silver nanoparticles above 100nm which were detected by SEM analysis. The antibacterial activity of silver nanoparticles also reported on two species such as Escherichia coli and Staphylococcus aureusby well diffusion method. Antioxidant analysis of silver nanoparticles was done and the EC50 value was determined. The EC50 value of reducing power method is 0.813 mg/ml and total antioxidant capacity is 1.95mg/ml. The in vitro anticancer activity of silver nanoparticles was done by MTT assay on two cell lines such as HeLa (Human cervical carcinoma) and MCF-7 (Human breast adenocarcinoma) and the IC50 value calculated. For HeLa cell line, the IC50 value was obtained as 45.4 µg/ml and the IC50 value of MCF-7 is 5.6µg/ml.

Published by: S. Prem Kumar, Ms. S. Rubavathi, Dr. J. Phillip Robinson

Research Area: Nanotechnology

Research Paper

57. Taiwan Miracle - Taiwan’s Rapid Economic and Industrial Growth Period and Post Miracle Changes

Taiwan’s economic progress can be ascertained from a major political transformation and rapid industrialization. The period of economic development had transformed the country completely and Taiwan became to known as one of the ‘’Four Asian Tigers’’ during this period. The country’s so called economic progress gradually fell down to earth gradually as the year’s passed by due to various reasons.  

Published by: Maneesh B. R, Naman Kedia

Research Area: Pacific Rim and Asian Societies

Review Paper

58. Legacy Network Management Process and Transition to Self-Organizing Network (SON) and SELFNET

Telecommunication sector over the years have undergone rapid transformation catering to high consumer demands and evolving to innovative technologies advancing towards digital convergence. Telecom network system has become more complex and in order to achieve seamless inter-operability among network systems and new technological services along with consistent service delivery in terms of technological and operational change, operators seek more efficient network maintenance practices while reducing capital and operational expenditures. Telecoms will not be able to achieve this without updating to better and automated network management practices thus reducing frequent manual intervention. The transition from manual driven legacy network management process to automated Self-Organizing Networks (SON) for LTE network and to SELFNET for 5G(or beyond 4G network) will enhance existing operations resulting in cost effective, more automated and flexible & cognitive network system integration.

Published by: Soumya

Research Area: Telecom

Review Paper

59. Survey of Generative and Discriminative Appearance Models in Visual Object Tracking

Visual object tracking is a challenging task in computer vision applications. The basic statistical appearance modeling techniques are discriminative and generative. In both cases, online learning is very essential to nullify the error due to large pose changes, illumination variations and appearance changes of the tracking framework. This paper briefly introduces the challenges and applications of visual tracking and focuses on discussing the state-of-the-art online-learning based tracking methods by category. In this paper, the existing statistical schemes for tracking-by-detection are reviewed according to their appearance model creation mechanism; generative and discriminative.  

Published by: Remya K. V, Vipin Krishnan C. V

Research Area: Image Processing

Research Paper

60. Confucianism and Changing Gender Roles

Confucianism in South Korea instills the concept of male superiority over women. Although the laws in South Korea establish women’s rights, the practice and norms of society still engender male domination. Korean family norms promote the unity of the family while placing women in a subservient position, the traditional culture requires obedience to a father and then to a husband and sons. Family norms also place the power of family decisions with husbands. Men keep contact politically and socially at village meetings and exchange use of resources and production. As women take on greater productive roles and earn income, their involvement in decision-making increases. Female power within the family has increased also due to increased women's education. Over that last three decades, these traditional views on gender roles influenced by Confucianism have changed drastically, although it is still looked down upon for women to work outside the house, it is slowly being accepted and almost 54% of the female population in South Korea is actively participating the workforce. On the other hand, the male domination over the woman of the house has eased out, and many men do help out with household chores and looking after children while the woman works. Although this is a very small percentage of the population, much lesser than would be desired, it is still a change from the Confucianist principles where the male remains dominant and authoritative. The expectation is that modernization will bring about its empowerment of women and a balance between men and women in both family and society. In the 21st century we try to understand how the roles of men and women have changed in this country that has deeply rooted beliefs of Confucius in their society. Confucianism in South Korea instills the concept of male superiority over women. Although the laws in South Korea establish women’s rights, the practice and norms of society still engender male domination. Korean family norms promote the unity of the family while placing women in a subservient position, the traditional culture requires obedience to a father and then to a husband and sons. Family norms also place the power of family decisions with husbands. Men keep contact politically and socially at village meetings and exchange use of resources and production. As women take on greater productive roles and earn income, their involvement in decision-making increases. Female power within the family has increased also due to increased women's education. Over that last three decades, these traditional views on gender roles influenced by Confucianism have changed drastically, although it is still looked down upon for women to work outside the house, it is slowly being accepted and almost 54% of the female population in South Korea is actively participating the workforce. On the other hand, the male domination over the woman of the house has eased out, and many men do help out with household chores and looking after children while the woman works. Although this is a very small percentage of the population, much lesser than would be desired, it is still a change from the Confucianist principles where the male remains dominant and authoritative. Although there are instances to prove that South Korea is coming out of its traditional views on gender roles, they are still far behind on gender equality when compared to globally desirable standards. The expectation is that modernization will bring about its empowerment of women and a balance between men and women in both family and society. In the 21st century, we try to understand how the roles of men and women have changed in this country that has deeply rooted beliefs of Confucius in their society.

Published by: Aanchal Midha, Savreen Kaur, Niveditha .S

Research Area: Social Sciences

Research Paper

61. Arduino based 6DoF Robot using LabVIEW

This paper presents a development of a 6-axis robotic arm controller( i.e) Six degrees or axis of freedom (6DoF) refers to the freedom of movement of a rigid body in three-dimensional space. The each axis of the robot are been controlled using servo motor. The position of each axis can be derived from the Pulse Width modulated wave which are applied to each servo motor,at each and every axis. The controller is divided into two major parts namely power block and control block. Power block is carried out by the Arduino controller and the control block is carried out by labVIEW similarly control are been sent serially thought Arduino board to control the position of the servo motor

Published by: G. A Rathy, Aravind Balaji

Research Area: LabVIEW

Research Paper

62. K-Pop and K-Dramas: A Billion Dollar Business

The paper demonstrates how the South Korean Pop music and TV-dramas have proven their mark around the globe. With the ever-growing popularity of these entertainment methods from Korea, they are not only topping music and tv charts but also evolving into a business worth billions of dollars and most importantly it looks sustainable with the innovation and disruption they are bringing into the world market.  

Published by: Muskan Jain, Kavira Mangu Mangu Nelly

Research Area: Business

Research Paper

63. Impulsive Buying Behavior

Impulsive buying behavior is psychological and depends on the customer traits and other factors affecting customer decisions. Firms take advantage of this by using various strategies. The main focus of the work is on the usage of impulsive buying by the firms to promote sales. Also, different personality traits are also studied that influence impulsive buying. Some of the strategies used by a firm which are studied in this work are the placement of the product, store environment, etc. Also how marketers are using this concept in E-impulsive buying, by showing similar products as suggestions or ‘frequently bought together’. Customer buys the goods even when it might or might not be required by him/her. Plastic money is also one the factor that influences impulsive buying as with this problem of carrying enough cash is removed. Impulse buying is most of the times linked with happiness and joy but also considered to be related to negative emotions and a decrease in self-confidence. From a marketers point of view keeping the environment of the store in such a way that promotes impulsive buying is increasing customer loyalty. The relationship between these strategies used by firms and customer reactions are also studied. It is also said that technology does not create impulsive consumers but rather provide impulsive consumers more goods to buy and more and more options to choose from. Merchandising strategies like the positioning of the products and keeping a check on the customer’s shopping from the shop like checking a number of items purchased each time, frequency of coming to the store, etc.      

Published by: Nishant Arora, Yashvardhan Baheti, Kanika Bhatia

Research Area: Marketing

Research Paper

64. National Service in Singapore and Development over the Last 50 Years

Abstract not visible on author's request.

Published by: Mohit Pandit, Thomas Nixon

Research Area: The Pace of Development of National Service in Singapore

Research Paper

65. The Influence of Japanese Values on its Business Culture

The objective of this paper is both to show the impact of Japanese social values on building and keeping up business connections and to underline the significance of understanding these social values to work together effectively in Japan. This paper emphasizes on the influences of the Japanese lifestyle, values, ideals and cultural assumptions and how all these influences the way the Japanese people do business. It expands upon how the corporate culture in Japan is largely influenced by the cultural values of its people. This paper will better help in understanding the do’s and don’ts when involved in business or employment with the Japanese and how to deal and do business with the Japanese in their own way which might be very different from how any other country or culture conduct business. This helps one understand how crucial the Japanese hold their varied values and ideals which they do not want to be disrespected or disregarded in any way.

Published by: Ritwik Rathore, Kanishka Agarwal, Siddharth Agrawal

Research Area: Social Sciences

Research Paper

66. Hong Kong: Obligatory Step into Renewable Energy Future

One of the aims of this article is to explore various proponents of the energy scene in Hong Kong. However, the primary focus is at why Hong Kong should potentially move to a more sustainable and renewable energy model where they will be successful in minimizing costs and maximizing efficiency and utility, and how they could do it. Through analyzing Hong Kong’s current sources of energy, we will be able to ascertain the efficiency of any given source and also determine the opportunity cost of the investment in these expensive energy sources. By critically thinking about the issue and the crux it’s based out of, we can deter the fundamental need for this solid change, which will be highlighted by the advantages entailed and their deeper implications. By envisioning this future for Hong Kong, it is easy to see it as a foundation to a vision considered greater than realism - Earth running at 100% using sustainable energy.

Published by: Aprambir Singh Johar, Sidharth Menon

Research Area: Sociology

Research Paper

67. The Four Asian Dragon's Significance in World Economic Development

This paper analyses the contribution of four Asian Dragons towards International Economic System from 1965-2017 and reveals insight into related trends and patterns. The paper shows how four Asian dragons (Singapore, Taiwan, South Korea, and Hong Kong) have grown since Independence to Industrialisation. Lastly, reasons for their slowing growth. This study is divided into four parts. Firstly, the growth pattern of GDP and Exports in these countries. Secondly, factors leading to this growth. Thirdly, how Industrialisation of four dragons helped world economy during currency fluctuations and recession. Fourthly, reasons for declining growth of these nations. The study discusses the challenges facing four Dragon’s sharply declining growth rate and proposes policy approaches that might help boost the country’s growth in the future.    

Published by: Nikhil Bhatia, Ishan Gupta

Research Area: Sociology

Review Paper

68. Exploring Taiwan’s Market for Business Opportunities

This paper aims at conducting an analysis of the Taiwan market which will help in analyzing the ease of doing business in Taiwan by Indian businessmen. It is seen that the GDP of Taiwan is increasing gradually. Thus, it portrays a good opportunity for the businessmen to enter the market. It also shows a good export rate taking place from India to Taiwan. Therefore, the first step towards setting up a business abroad is already being fulfilled i.e., exports. The next step is setting up a subsidiary abroad. This can be done by conducting a feasibility test of carrying out a business through a SWOC analysis. This helps in knowing the market condition of the economy which keeps fluctuating. Thus, the SWOC analysis helps to know the market stability of the country which in turn will help in analyzing the feasibility of carrying out business in Taiwan. Also, the role of government plays an important role in the market and it is necessary to take into consideration the important policies of the government i.e., FDI being the most important policy. The business environment should also be taken into consideration because there is severe business competition in the market.

Published by: Saptharaj Kalburgi, Gaurav Kochar

Research Area: Business

Review Paper

69. Innovation in Education : Singapore

The following paper covers the educational development of one of the four Asian dragons of the east i.e. Singapore. This paper focuses on the innovation implemented by the country in the field of education. This paper highlights the steps that Singapore, to keep up with its status of being the largest and fastest growing global economy in the world, is taking towards education and innovation in the same field.

Published by: Raghav Abrol, Divya Gupta

Research Area: Education in Singapore

Research Paper

70. Partial Replacement of Coarse Aggregate with Demolished Waste along with Adding of Admixture

Demolition of old structures to make way for new and modern ones is common features in metropolitan areas due to rapid urbanization. However, very little demolished concrete is recycled or reused. The strict environmental laws and lack of dumping sites in urban areas on one hand are making the disposal of demolition wastes problematic while on the other hand the quarrying of raw materials is becoming difficult. The present work presents the results of experimental investigations carried out to evaluate the effect of partial replacement of cement, fine aggregate and coarse aggregate by different parts of demolished wastes on strength and workability of concrete made. For the study, design mix concrete of grade M25 (Referral concrete) was prepared using IS: 10262-2009. Thereafter, the replacement of different constituents of concrete, one at a time was carried out by replacing these with the different sieved fractions of crushed demolition waste. The compressive strength at 7,14 and 28 days, and workability in terms of slump value were measured. The compressive strength of these mixes was measured on 100mm cubes. Test results show that the behaviour of recycled waste concrete and the adding of Ad-mixture. The compressive strength of recycled concrete (FAR concrete) with 10%, 15% and 20% fine aggregate replacement by demolition waste coarse aggregate at 7,14 and 28 days is comparable to that of referral concrete. The compressive strength of recycled concrete (CAR concrete) made using 10% of demolition waste coarse aggregate is almost similar to referral concrete. Further, the results indicate that still higher replacement of the constituent materials is possible without much compromising the 28 days strength and workability.  

Published by: K . Lochan Sai Teja, M. Surya Teja, V. Gokulnath

Research Area: Concrete

Survey Report

71. Routing in Multi-Hop Networks

In a wireless network there is a single source and a single destination or number of destinations associated by the number of relays. Nodes of wireless networks communicates by sending signals transmits message through single source to single destination. Signals are in the encoded form when receives at node it process decoded/encode with information received from previous nodes. In the wireless network there is a problem of routing path complex and combinatorial problem transmission from source to destination. In this system we investigate the optimal routing problem in signal transmission from source to destination for multi-hop network. We use the technique of rate less code which is used to accumulate the data with the each packet in the transmission. This can decrease the total energy; reduce delays in transmission for transmitting data from the source to the destination. Proposed system enables significant performance through the shortest path routing using Floyd-Warshall algorithm.

Published by: Pooja Eknath Sakunde, Latika Desai

Research Area: Computer Network

Technical Notes

72. Energy Consumption and Conservation Measures in Ferro Chrome – A Step towards Green Manufacturing

Ferroalloys production is an energy-intensive industrial sector. In this paper, the current situation in ferroalloys processes is discussed from the standpoint of energy consumption and energy conservation issues, trends and development. Progress and data of ferroalloys production are frequently compared with steel industry which is a closely related sector and the main user of ferroalloys. Operational factors of processes and electricity consumption are examined as well as possibilities and future scenarios to minimize energy consumption have been deliberated in this paper.    

Published by: Dr. Rajib Kumar Mohapatra

Research Area: Ferro Alloys Manufacturing, Energy Consumption, Green Manufacturing.

Research Paper

73. Automatic Start and Stop the Power Generator

Abstract not visible on author's request.

Published by: Harish Tukaram Wakudkar, Mandar V. Pathak

Research Area: Power System

Research Paper

74. Molecular Characterization of Candidate Gene in Glucosinolate and Erucic Acid using SSR Markers

Indian mustard is the second most important oil seed crops of India, next to groundnut sharing 27.8% in the India’s oilseed economy. The improved mustard seeds contain 39-44% oil. Oil quality is determined by fatty acid profile, whereas, level of erucic acid predicts the quality of seed oil.  Breeding of oil seed has evoked a strong bottleneck selection towards double-low (00) seed quality with zero euroic acid and low seed glucosinolate content. DNA based molecular markers are important tools in breeding programmes for crop improvement. The main role of these makers to detected the polymorphism. The experimental material comprised 71 genotypes including parents, half diallel crosses and simplified triple test crosses for study. In molecular characterization of erucic acid and glucosinolate using 4 SSR markers was clustered into three groups. Molecular analysis was done using four markers and a total of 56 amplified bands were obtained, out of which 17 were polymorphic. All the genotypes were clustered in three groups by using DARwin software. Cluster I had seven genotypes viz., RSPR-01, PM-21, PM-22, RB-50, Urvashi, Nov. Gold and Pusa-Bold followed by cluster II (five genotypes viz., RSPR-03, Varuna, Pusa-Karishma, RL-1359 and Kranti  and cluster III (two genotypes viz., PM-24 and NRCDR-2).

Published by: Richa Bharti, Neelam Chaudhary, Rubby Sandhu, S. K. Gupta, Manmohan Sharma

Research Area: Biotechnology

Survey Report

75. Awareness of e-wallet Among Small Scale Vendors: A Study in Selected Region in Nuh (Mewat)

India is a unique country in which there is “Unity in Diversity” not only language, dialect, music, food, clothes are changed after every 20km but there is a great disparity in development also. Nuh(Mewat) is an area in Haryana State where there is only 71.96% (census 2011) literacy rate as compared to 75.55% of  Haryana and it demands more development from the government of India. The Government objectives for demonetization are to curb black money and to promote cashless society. The main purpose of this research paper is to study the awareness of e-wallet among the people of Nuh after demonetization.

Published by: Nirmala

Research Area: Commerce

Research Paper

76. Design of Automatic Sorting Machine

The automatic sorting system has been reported to be complex and a global problem. This is because of the inability of sorting machines to incorporate flexibility into their design concept. Automation is a preferred for faster and precise operations as compared to manual operation. This paper provides a mean of simple yet effective fixed type of automation for sorting the products. Two products identical in shape and size are sorted out automatically on the basis of drilled or undrilled product. LED and phototransistor arrangement is used for hole detection. A vertical zigzag conveyor is employed instead of the usual flat belt conveyor in order to utilize gravitational force as a driving force for feeding the products. 8051 Microcontroller is used for controlling the sorting mechanism by using program or coding. The cost of the project is nearly negligible as it is made from the waste except electrical components used for the project. Sincere efforts are taken to set an example of an inexpensive, reliable and easy to manufacture automated machine. The Paper focuses on the aspect of sorting mechanism with microcontroller programming and the automation tasks and solutions are obtained. The proposed developed model of this research could be adopted at any institution or industries, whose practices are based on mechatronics engineering systems. This is to guide the industrial sector in the sorting of object and teaching aid to institutions and hence produce the list of classified materials according to the enabled sorting program commands.  

Published by: Mangesh Shashikant Bidkar, Chandraprakash M. Zode

Research Area: Automation in Mechanical

Research Paper

77. Design and Development of Board Cleaning System

This technique was selected by us by taking into consideration some comfort for Teachers while cleaning the blackboard. It is seen that while doing this they often have to cover their mouth with one hand while cleaning the blackboard by the other. By thinking over it we realized that we can really do something for them. So we decided to implement our course study and some extra knowledge and with the help of electrical and mechanical concept, our project came into the picture. The project Design and Development of Board Cleaning System can clean the blackboard and whiteboard automatically with rack and pinion mechanism and reduces the time consumed in hand erasing. This project basically works on combined principles of mechanical and electronics. The growth of technologies requested higher performance machine in order to fulfill human needs and market. This project is implemented to make human work easier and can reduce the use of human power because of its potential applications. This appertains to new and useful improvements and more particularly to an apparatus whereby blackboards and whiteboard can be cleaned in an easy and convenient manner.

Published by: Venkata Karthik Ceemakurthy, Venkata Sumanth Bogyam

Research Area: Electrical and Electronics

Research Paper

78. Vit B12 Deficiency Induced Hyper Homocysteinemia Causing Stroke in Young Adult

Stroke in young adults is less common than stroke elderly people. Stroke in young adults needs an extensive work up both for common as well as uncommon causes. Stroke due to vitamin B12 deficiency causing hyper homocysteinemia is a rare cause. It is important to identify vitamin b12 deficiency  as the cause since it is treatable and preventable cause of stroke. Hence, early recognition and treatment of vitamin b12 deficiency can improve the treatment results at a low cost and prevent wasting of health care dollars on expensive to treat diagnosis.

Published by: Dr. Prajit Mazumdar, Dr. Malyaban Das, Dr. Vaibhav Mathur

Research Area: Medicine

Research Paper

79. Feed Forward Neural Network Based Light Intensity Control of Networked LED Light Systems

The use of a neural network technique to establish the relationship among dimming levels of luminaires and illuminance at the user tables. The neural network then will be included in sensor feed forward illumination control for the smart networked LED-lighting system9. The accuracy of the model depending on the configuration of the neural network and characteristics of the LED-lighting system will be examined. The daylight effect is beyond the scope of this research and will be investigated in future work.  

Published by: K. Nishakar, P. B Natarajan

Research Area: Embedded Systems

Research Paper

80. Consumer Perception and Usage Experience of Toilet Soaps with Special Reference to ‘Indulekha’ Brand: A Study in Tirurangadi Municipality of Malappuram District of Kerala

Toilet soap industry has been facing severe cut-throat competition among the Multi-National Companies, national and local and international as well as global players. The level of penetration in toilet soaps spread in urban and semi-urban areas are very high. Consumer satisfaction happens when the perceived performance and the expectations match equally. If the perceived performance crosses the expectations results in customer delighting and better satisfaction. Customer satisfaction results in quality related issues. Many studies in this area show that the costs and efforts of acquiring a new customer are more than retaining the existing ones.

Published by: Mustafa .K, Dr. Yakoob .C

Research Area: Consumer Perception

Review Paper

81. Stock Prediction using Support Vector Regression and Neural Networks

The purpose of this project is to compare two very widely used methods for stock prediction and see which one is a more accurate method. With the advent of machine learning, soft computing techniques are being used more frequently for various purposes, especially where mathematical models can be used and juxtaposed onto real-life situations. Here in this report, we have compared the prediction of the stock market using Artificial Neural Networks versus a prediction of stock market using support vector regression. Testing has been done only in one language, python and hence it cannot exactly be determined if other languages or software such as R or Matlab may give better results. The system is built completely on numbers and does not depend on popular emotions or gut feeling.    

Published by: Lekhani Ray

Research Area: Data Mining

Research Paper

82. Growth and Instability in Area, Production and Productivity of Cassava (Manihot Esculenta) in Kerala

Cassava is a major tuber crop cultivated in Kerala, as a sole crop or as a mixed crop, mainly cultivating in homesteads and primarily used for household consumption. The share of cassava area in Kerala to all India area declined from 85.57 to 45.5 percent in 2001-02.  With the introduction of short duration varieties, there was an increase in productivity. Trend and Instability analysis in the area, production and productivity of cassava for a period of 25 years were carried out. The estimated trends in the area, production, and productivity of cassava, using semi-log function revealed that there was a significant decline in an area with a compound annual growth rate of 1.37 %, the non-significant decline in production by -0.02 % and a significant increase in productivity by 1.3 %. Cuddy-Della Valle index provides the best estimates and instability was found to be more in productivity (4.04 %).

Published by: Neethu S Kumar, Brigit Joseph, Muhammed Jaslam P K

Research Area: Agriculture

Research Paper

83. Neural Fuzzy Inference System Modelling with Different Input Vectors for Rainfall-Runoff Prediction

A convenient and acceptable technique to develop mathematical models is through conceptual formulation and statistical development while integrating the effects of various variables on these physical processes.  Overemphasizing on these techniques could result in an increase in complexity of model which in turn influence the performance of the model. In this study, one conjunction model combining wavelet-neuro-fuzzy for runoff forecast is proposed and compared with simple neuro-fuzzy inference system. The inflow series to the conjunction model has been decomposed by wavelet transform. The performance of the conjunction model under the changed inflow parameters has been compared with the simple model. The results show that both the model performed well, however, increase in complexity of a model does not necessarily increase the performance of the model.  

Published by: Ashish Sachan, Dr. Devendra Kumar

Research Area: Soil and Water Conservation Engineering

Research Paper

84. E-Aquaculture Monitoring Using Internet of Things

Technological significance has been a great support for settling on choice in various fields especially in aquaculture. The advancement of aquaculture has been on under advance for as long as a couple of years because of an absence of aquaculture learning and natural changes. Here, it generally concentrates on the upgrading of rural and aquaculture development through advanced information and communication processes. It extends the aquaculture organization's ability to meet the needs of its farmers. There is proof that ammonia, nitrogen and dissolved oxygen, pH is implicated in fish kills occurring on the ponds of Andhra Pradesh coastal areas due to the delay of problem identification. By utilizing IOT, it improves the simple access observing framework to diminish the human worry in aquaculture. The outcomes acquired, through GSM (Global System for Mobile correspondence) and GPRS for every day ready SMS can send to the rancher in case of crisis, he can ready to see the factual review report by regardless of area and motor has been ON consequently if the water level is diminished. On the off chance that DO is additionally diminished, the aerators will likewise be naturally exchanged on. This study gives the preferred data at any moment of time from any part of the world and screening their concern instantly at any part of the location.

Published by: S. P Kumar Gudapati

Research Area: Aqua Culture, IOT

Research Paper

85. Impact of Knowledge Management on Customer Satisfaction

The purpose of this research is determining the impact of knowledge management on customer satisfaction. Consequently, it is worth that the findings of this research study would be instrumental in informing the management of an organization on how best it can promote customer satisfaction through appropriate knowledge management. In this case, a questionnaire was used to collect data, and the research was carried out in Kufa Cement Factory. The results indicated that employing knowledge management leads to increased customer satisfaction.

Published by: Dr. Hamad Karem Al-Hadrawi

Research Area: Management Studies

Review Paper

86. Ion Exchange Resins- An approach for the Development of Advanced Materials with Industrial, Pharmaceutical and Clinical Applications

Ion exchange resins (IER) are cross-linked water insoluble polymers that contain ionizable acidic or basic functional groups and have the ability to exchange counter-ions from surrounding within aqueous solutions. On the basis of nature of the exchangeable ion of the resin as a cation or anion, classified into two main classes, cationic exchange resinand anionic exchange resins, respectively. Due to versatile properties of IER, it has received considerable attention from worldwide pharmaceutical scientists. Research has shown that for the past few years, IER is equally suitable for drug delivery techniques, including controlled release, topical, transdermal, nasal and taste masking. The efficacy IER mainly depends upon their physical properties such as porosity, acid-base strength, degree of cross linking, stability, purity and particle size. Ion-exchange resinates (Drug-Resin complex) of drugs can help in reducing the dose, fluctuations in blood and tissue concentrations, avoiding dose dumping,  and maintenance of drug concentration below toxic level can be achieved. The major drawback of sustained release or extended release is dose dumping, resulting in increased risk of high dose toxicity. The utilization of IER has occupied an important place in the development of controlled or sustained release systems because of their better drug-retaining properties and prevention of dose dumping. Resins are polymers that contain appropriately substituted acidic groups, such as carboxylic and sulfonic for cation exchangers; or basic groups, such as quaternary ammonium group for anion exchangers. Drug resin complexation converts drug to amorphous form leading to improved drug dissolution. Many studies have reported the use of IER for drug delivery on the desired site of action. Sulfonated and carboxylic resins with a polystyrene backbone are mostly used in clinical medicine. This review will cover various types of ion exchange resin, their property, chemistry; The role of IER in controlled drug delivery systems, its Industrial, Pharmaceutical and clinical applications, methods of preparation of IER along with their resonates.  

Published by: Pravin Sahu, Ruchita Jaiswani

Research Area: Pharmaceutics

Research Paper

87. IoT Based Home Thief Movement Detection and Alerting System

Smart Home can be also known as Automated Home or intelligent home which indicates the automation of daily tasks with electrical appliances used in homes. This could be the control of lights or be giving the alarm alteration. Home security has changed a lot over the last century and will be changing in coming years [1] Security is an important aspect or feature in the smart home applications. [2] The new and emerging concept of smart homes offers a comfortable, convenient, and safe environment for occupants. Conventional security systems keep homeowners, and their property, safe from intruders by giving the indication in terms of alarm. However, a smart home security system offers many more benefits. This paper mainly focuses on the security of a home when the user is away from the place. Two systems are proposed, one is based on GSM technology and other uses a web camera to detect the intruder. The first security system uses a web camera, installed in-house premises, which is operated by software installed on the PC and it uses the Internet for communication. The camera detects motion of an intruder in front of the camera dimensions or camera range. The software communicates to the intended user via Internet network and at the same time, it gives a sound alert. The second security system is SMS based and uses GSM technology to send the SMS to the owner. The proposed system is aimed at the security of Home against Intruders. In any of the above cases happens while the owners are out of their home then the device sends SMS to the emergency number which is provided to the system. The system is made up of three components: sensors, GSM-GPS Module, microcontroller, relays to control the device and buzzers to give security alert signal in terms of sound.

Published by: Supriya Kutti, Sanyukta Akhade, Shalini Tanksal

Research Area: Home Security

Thesis

88. Data Encryption without Using Prime Numbers

It is an encryption algorithm that uses randomly generated number sequences to encrypt data, instead of using prime numbers hence saving so much processing time, generating prime in itself a tedious task and required a heavy amount of computation, but generating random number sequences is far easier and require a significantly lesser amount of computation. This algorithm generates two random number sequences (discussed in introduction) (treated as private keys), digits in these number sequences are grouped in different configuration viz. 2 DG (grouping 2 digits),3 DG(grouping 3 digits) this form groups of digits in both number sequences, these groups are then multiplied to form a result and this result is multiplied with plain data to encrypt the data.  

Published by: Abhishek Kumar

Research Area: Cryptography

Research Paper

89. Twitter Sentiment Analysis using Vader

Twitter is a micro-blogging site used by people to express their opinions on various topics. Sentiment Analysis is the process of extracting meaningful customer insight from a text in terms of sentiment score. Twitter Sentiment analysis is an application of sentiment analysis, on the twitter data (tweets).But today it has become difficult to analyze tweets because of the changed and challenging formats of the tweets. The increase in the use of various slangs, emoticons, abbreviations, and puns in tweets, has made it difficult to analyze tweets in the same ways as before. In this paper, we aim to review some papers regarding research in sentiment analysis on Twitter, describing the methodologies adopted and models applied; along with describing Vader Sentiment Analysis which is a Python-based approach.

Published by: Vipul Kumar Chauhan, Ashish Bansal, Dr. Amita Goel

Research Area: Natural Language Processing

Research Paper

90. Comparative Analysis of Indian and American Federalism

This article embarks upon the concept of Federalism and also strives for comparative analysis of Indian & American Federalism, the article examines the federal structure of both the country in light of the traditional conception of federalism and it further examines the structure on touchstone of Ivo D. Duchacek’s ten yardsticks of federalism, Both countries have been examined in light of their constitutional scheme and judicial pronouncements.  

Published by: Raghav Dhoot

Research Area: Law, Civic Polity, Civics, Politics

Review Paper

91. A Study of Major Issues Related to Brain Drain from India to USA

The Government of India estimated that there are 30 million Indian human resources who are working in the developed countries are highly educated and skilled. This paper mainly focuses on the causes of brain drain in Indian scenario and given the suggestions to control the movement of skilled labor from India to the USA. Youth must contribute to its own economy and contribute to become a developed country from developing.  

Published by: Charu Goel

Research Area: Macro Economics

Review Paper

92. Performance Evaluation and Treatment Optimization of ETP and STP- Review

Textile industrial Effluent Treatment Plants (ETP) and Sewage Treatment Plants (STP)   are constructed to protect the environment from excessive overloading from different kinds of pollutants. The effluent must meet the appropriate discharge standards as per pollution control board before discharging it to the environment. Improper treatment process conditions at treatment plants result in the release of effluent that may contain toxins and unacceptable high levels of dangerous organic and inorganic materials into various water bodies and the land environment so it is necessary to adopt proper treatment technology for the treatment. The present paper is reviewed for performance evaluation of ETP, STP and Coagulation and Flocculation process. Coagulation and Flocculation is not an Eco-friendly approach so Electrocoagulation (EC) is also reviewed to know the removal efficiencies of pollutant loads.  

Published by: Yashodha M. C, Dr. B. Manoj Kumar, Parinitha T. Niranjan

Research Area: Wastewater Treatment

Research Paper

93. Six Strokes Engine

Six Stroke engine, the name itself indicates a cycle of six strokes out of which two are useful power strokes. According to its mechanical design, the six-stroke engine with external and internal combustion and double flow is similar to the actual internal reciprocating combustion engine. However, it differentiates itself entirely, due to its thermodynamic cycle and a modified cylinder head with two supplementary chambers: combustion and an air heating chamber, both independent from the cylinder. In this, the cylinder and the combustion chamber are separated which gives more freedom for design analysis. In addition to the two valves in the four-stroke engine, two more valves are incorporated which are operated by a piston arrangement. The Six Stroke is thermodynamically more efficient because the change in volume of the power stroke is greater than the intake stroke and the compression stroke. The main advantages of six stroke engine include a reduction in fuel consumption by 40%, two power strokes in the six-stroke cycle, a dramatic reduction in pollution, adaptability to multi-fuel operation. Six-stroke engine’s adoption by the automobile industry would have a tremendous impact on the environment and world economy. There are additional two strokes, namely another power, and exhaust strokes. The engine works by harnessing wasted heat energy created by the fuel combustion. After the combustion stage water is injected into the superheated cylinder. The water explodes into steam and forces the piston down. It, in turn, helps to cool the engine. That resulted in normal levels of power but using much less fuel. It also has the advantage of not requiring an external cooling system. In order to achieve these benefits, major modifications of conventional internal combustion engine must be done. In this paper, the modification of the conventional four-stroke internal combustion engine is illustrated to convert it into six stroke engine.

Published by: Viral M. Vadadoria

Research Area: Automobile

Research Paper

94. Humanity Code, Destiny Mantra or Spiritual Configuration: A Boon for Humanity

Abstract not visible on author's request.

Published by: Lakshmi Narayana

Research Area: To Decipher Humanity and Control Divorce

Thesis

95. Design Detail of Microhydro System and Findings based On Off- Grid Project

The purpose of this research paper is to conduct a literature review regarding the technical specifications and design parameters required to design a functioning Micro Hydro Power System MHS (Micro Hydropower System). After review of the theory and principles of Micro Hydro System design; these principles are applied to the real case of Bhoot Khola Micro Hydro Project in Deurali Village Development Committee (VDC) of Tanahun Nepal. The field data required to design the civil components of the micro-hydro project were derived from secondary data sources such as the study conducted by the village development committee as well as other independent project surveys. The micro-hydro designed in this thesis was of "run-of-the-river" type. Similarly, system components designed in this thesis are intake structure, headrace canal to divert the water from the source, forebay tank, sedimentation basin and the penstock assembly.

Published by: Tara Bhattarai

Research Area: Renewable Energy

Research Paper

96. Secured Transaction Online Processing System Using ZIGBEE Wireless Network

Data security in non-fiscal cash registers and non-fiscal printers is minimal.  However, data security in fiscal cash registers and fiscal printers is also not satisfactory. This  paper  describes  turnover  control  devices  based  on  GPRS  terminals  for sending  data  from  fiscal  electronic  cash  registers  and  fiscal printers  to  the  server  of  Tax  Administration[1]  in  order  to  prevent tax  evasion,  diversion  of  original  goods  from  the  distribution system  and  infiltration  of  counterfeited  or  original  goods  into  the distribution  system  without  payment  of  customs,  tax  and  excise duties.  The comparison with ordinary fiscal cash registers and non-fiscal cash registers is also provided.  

Published by: Rajeshwar Goud Jangampally, P. Ramesh

Research Area: Embedded System

Research Paper

97. An Efficient Security Key for Practical Requirement of PIN Entry Protection Section Authentication

Clients regularly reuse the same customized recognizable proof numeric system for various sessions. Coordinate numeric sections can be profoundly powerless for the bear to break assaults and assailants can successfully watch PIN section with covered cameras. Backhanded PIN passage techniques proposed as countermeasures are seldom conveyed on the grounds that they request a heavier subjective workload for clients. To accomplish security and ease of use and display a useful aberrant PIN section technique called Stegano PIN. It has two main numbered systems, first is the secured, the second one is unclosed. Intended objectively for looking someone’s shoulder’s over direct observation of the hidden cameras. In the wake of finding a long haul PIN in the more run of the mill design, secured numeric system, client produces an OTP to securely come on the display assailants. The test control utilized an inside subject factorial outline with two autonomous factors- PIN section framework, recognized proof numeric write. The slow passage of distinguishing numeric system time however approved. The disguised numeric system is flexible to the direct observation overlooking someone’s shoulder through unseen camera assaults by different confirmation class.  

Published by: Kiren Vijai, Neena Joseph

Research Area: Network Security

Research Paper

98. Geomagnetic Storms and its Various Effects

This paper throws a light on various effects of Geomagnetic Storms such as ionization, electromagnetic emission, ultraviolet radiation radio emission, etc. The accuracy of Global Positioning System (GPS) dimensions can be degraded by geomagnetic storms. It’s effect also observed on earthquakes. Besides these effects, studies have shown the direct connection of geomagnetic storms with living organisms.

Published by: Rashmi. C Gupta, S. Chaudhary, A. K Gwal

Research Area: Environment Science

Research Paper

99. CNN Based Landmark Detection and Alzheimer’s Diagnosis Using Landmark Feature

One of the fundamental challenges in anatomical landmark detection, based on deep neural networks, is the constrained availability of medical imaging data for network mastering. To address this trouble, we present a two-stage task-oriented deep learning method to detect big-scale anatomical landmarks simultaneously in actual time using restrained education statistics. Especially, our technique includes deep convolutional neural networks (CNN), with every specializing in one particular project. In particular, to alleviate the trouble of limited training statistics, within the first stage, we endorse a CNN primarily based regression model the use of millions of image patches as input, aiming to examine inherent associations between nearby photo patches and target anatomical landmarks. to similarly version the correlations amongst image patches, in the second stage, we expand some other CNN model, which includes a) a fully convolutional networks (FCN) that shares the same architecture and community weights as the CNN used within the first stage and additionally b) numerous more layers to at the same time predict coordinates of a couple of anatomical landmarks. Importantly, our technique can jointly locate big-scale (e.g. hundreds of) landmarks in actual time. Using these landmark points we extract HOG and longitudinal features and using SVM to diagnose the Alzheimer’s disease.

Published by: Ayisha Shamna .K K, Jamsheera .K, Shameena .P P

Research Area: Image Processing

Case Study

100. Class II Correction Using Twin Block Appliance: A Case Report

The aim of this study was to see the effect of twin block appliance in permanent dentition phase. Twin block from its inception and evolution of the appliance itself has been widely accepted as a more competent Class II corrector compared to earlier bulky monopoly appliances. The effect of the twin block functional appliances is mostly dent alveolar having a small skeletal effect. Functional appliances can be used successfully in growing patient with certain Class II malocclusion. It is dependent on patient’s compliance. It also simplifies the fixed appliance phase. A 13-year-old girl was treated with twin block appliance. The design of appliance and treatment results were demonstrated in following case report. In permanent dentition, twin block appliance produces a similar effect as in mixed dentition phase. With proper case selection and good patient cooperation, we can obtain a significant result with twin block appliance.  

Published by: Abdul Baais Akhoon, Prof. Mohammad Mushtaq

Research Area: Medical

Research Paper

101. Design of Attachment for Shock Absorbers Outertube

From the most high-grade raw material, they manufacture shock absorber and provides a smoother ride for the customer while driving. Shock absorber they manufactured is very efficient in performance. They improve the durability of the shock absorber by plating them chrome and nickel to prevent corrosion. The casting part of shock absorber body is imported. While machining on the casting body of shock absorber different defects occurs. Due to this many components were rejected. Causes due to which component was defected are milling width oversized and m6 tapping. In our research, we find some remedies to overcome these defects which occur during the machining processes. To overcome from defect of milling width oversized we are going to provide coolant arrangement in the current industry locator design. And to overcome from second defect M6 Tapping we are going to provide coolant arrangement in current drill tool. So, in this way, our project aim is to overcome these two defects and improve the production rate of the company by eliminating occurring defect due to machining.  

Published by: Nikhil A. Sangale

Research Area: Mechanical Engineering

Thesis

102. Design of Heat Recovery System in a Sheet Rock Plant

This report is about the design of heat recovery system in a sheet rock plant. A sheet rock is basically a gypsum board which is mainly used as a finish for walls, ceilings in households and commercial buildings. According to the given problem, during summer months the city water supplies to the manufacturing plant at a higher temperature of 900 F but during other months the temperature of water supply as 450 F. The de mand of water temperature is 85o F for the process so the city water is heated by natural gas burners when it’s in a storage tank. During the final stage of sheet rock production, heated air is used in a closed oven with sheet rock for the drying process. The air gets exhausted from aluminum stacks. This waste heat energy is being recovered it in the form of energy with the help of specially selected heat exchanger. The energy recovered will be minimising the need of natural gas burner which is to heat the city water receiving at a temperature of 450 F. This would reduce the need of natural gas to use as the main source of heating the city water for production of sheet rock. The heat recovery system would be compatible to work for 24 hr in a 6 days week frame till 8 months. The report will include the type of heat exchanger selected, pump for heat recovery and piping system with fittings and be routing for heat recovery. This would also include the cost involved in the whole additional process as installation, operational and maintenance cost with a calculated payback period of time for investment.

Published by: Abhishek Chaturvedi

Research Area: Thermodynamics Cycles

Case Study

103. IOT Based Smart Car Parking System for Smart Cities

In recent times the concept of smart cities has become very popular. Thanks to the Internet of things the idea of the smart city now seems to be completed. Consistent efforts are being made in the field of IoT in order to maximize the productivity and reliability of urban infrastructure. Problems such as traffic congestion, limited car parking facilities, and road safety are being addressed by IoT. In this paper, we present an IoT based cloud integrated smart parking system. The proposed Smart Parking system consists of an on-site deployment of an IoT module that is used to monitor and signalize the state of availability of each single parking space. A mobile application is also provided that allows an end user to check the availability of parking space and book a parking slot accordingly. The paper also describes a high-level view of the system architecture.

Published by: Nazish Fatima, Akshaya Natkar, Pratiksha Jagtap, Snehal Tukaram Choudhari

Research Area: IOT

Research Paper

104. Research on Machine Learning

In machine learning, a computer first learns to perform a task by studying a training set of examples. The computer then performs the same task with data it hasn't encountered before. This article presents a brief overview of machine-learning technologies. The article below contains an introduction to the machine learning, the difference between machine learning and artificial intelligence and also seven steps of machine learning to better understand on how the machine learning works.

Published by: Amulya Ramesh

Research Area: Neural Networks

Research Paper

105. Impact of Organizational Climate on Transport Undertakings: A Case Study of Himachal Pradesh

Organizational Climate within an organization refers to how work environments are perceived and interpreted by employees working in the organizations. Organizational climate plays a vital role in deciding the effectiveness of performance. Organizational climate has its major impact on the performance of the workforce which is determined by the level of its satisfaction and motivation. The study addresses the prevailing organizational climate of transport undertakings in all districts of Himachal Pradesh. The information required for the study has been collected from both the primary and the secondary sources. A multistage random sampling method has been followed. The result of the study revealed that organizational climate has a direct influence on the perception of employees of both transport undertakings.

Published by: Gaurav Sharma, Prof. O. P. Verma

Research Area: Commerce

Research Paper

106. To Study Impact of Demonetization on Finance with Reference to Gross Domestic Product (GDP)

The research encompasses all impacts of demonetization in Indian economy. Primary emphasis is drawn upon the economic instability of India during the demonetization. It also shows how the key factors were affected during this critical phase. Core highlights of research are to check the volatility of GDP rate as well as the impact on finance sector in Indian economy. It is imperative to evaluate the short run and medium-term impacts that such a shock is expected to have on the economy. Further, the impact of such a move would vary depending on the extent to which the government decides to remonetize.

Published by: Patil Sahil Sharad

Research Area: Finance

Research Paper

107. Health Expert System – Prediction of Disease using Data Mining

The main purpose of data mining application in health care system is to develop an automated tool for identifying and disseminating relevant healthcare information. The objective of our system to provide a prediction of disease depending on symptoms so as to take proactive treatment against the disease. The system would reduce the human effort, reduce cost and time constraint in terms of human resources and expertise, and increase the diagnostic accuracy. In most developing countries, insufficiency of medical specialist has increased the mortality of patients suffering from various diseases. Insufficiency of medical specialists will never be overcome in short period of time. The main idea of the project is to assist doctors, who fail to detect fatal diseases. The intelligent doctor will accept symptoms of the patient. The symptoms and the databases are matched to produce a list of diseases and sufferings with their probabilities. We have used Apriori and Frequent Pattern Growth algorithm for predicting the disease for given set symptoms. The whole process can be termed as KDD.

Published by: Vinayak Sharma, Gayatri Mulchandani, Shivani Subnani, Gaurav Gianani, Anjali Yeole

Research Area: Medical

Review Paper

108. Implementation of Advance PCA Algorithm for Security System using Raspberry Pi

As the human life goes on improving, there arise many security issues which sometimes are life risky also. Hence, there comes the need for the security system. As the earlier security system was based on the human inspections that create the faults in the securities.  Hence there come to the security systems based on the various controllers, latest techniques, etc. but, still the optimum security is not achieved.  Thus, the new eras of the face detection security system arise and all the way new technique of security comes.  Even though face detection is a difficult task to make but still the advancing image processing algorithms makes it look so simple. The various image processing algorithms are HAAR, PCA, Eigen Face, Viola-Jones, etc. which have their own limitations. Hence, there comes the advanced algorithms and hence for achieving the optimum security and higher efficiency, we come with the advance PCA based security system.  This algorithm can be compatible with the automation instrument. The automation instruments are of various types such as a microcontroller, Arduino, raspberry pi, etc. thus for the best result along with the cost-effectiveness, we are using the raspberry pi as a controlling instrument. This instrument provides the ability of the storage in the form of database. Thus, database helps to detect the face and allow the recognized person only. Thus this will helps to improve the security.  Thus, this paper consists of the report of working comparison of the various face detection projects based on the raspberry pi module with our project.

Published by: Saurabh K. Patil, Narendra G. Narole

Research Area: Computer Vision and Security

Research Paper

109. An Analysis of Significant Factors of Organizational Climate of Transport Undertakings in Himachal Pradesh

Organizational climate plays a vital role in influencing motivation and performance of employees. It is important that a positive work climate has been created in the organization.  Creation of a favorable work environment by the management is possible only if it understands the changing scenario of the global business world, growing awareness among employees on different issues concerning employment, intensify of competition among the producers and marketers. The present study aims at identifying those significant factors that contribute to motivation and performance of employees working in both public and private sector transport undertakings of Himachal Pradesh. The present study aims to evaluate the significant factors that have contributed to motivation and performance of employees of transport undertakings in Himachal Pradesh from the period 2012-2017. Both primary data has been used to study the objectives. It is collected from the sample of 600 employees of both transport undertakings through judgment and quota sampling. The questionnaire was prepared for the collection of data. To meet the objective of the study, a five-point Likert scale has been developed for certain identifying variables. These statements on five-point scale areas i.e., (1) strongly disagree (2) Disagree (3) undecided (4) agree (5) strongly agree. On the basis of responses from employees of transport undertakings factor analysis has been done to extract the factors from observed variables which affects the motivation and performance of employees.

Published by: Gaurav Sharma, Prof. O. P. Verma

Research Area: Commerce

Survey Report

110. A Survey on Retinal Red Lesion Detection Techniques for Diabetic Retinopathy Screening

Diabetic retinopathy (DR) is a sight-threatening condition occurring in persons with diabetes, which causes progressive damage to the retina. People with diabetes mellitus need annual screening to check for the development of diabetic retinopathy (DR).The early detection and diagnosis of DR are vital for saving the vision of diabetic persons. The early signs of DR which appear on the surface of the retina are the dark lesions such as microaneurysms (MAs) and hemorrhages (HEMs). The shape and count of these features are used to indicate the severity level of diabetic retinopathy. A computer aided diagnosis system can help to reduce the burden on the ophthalmologist and rapidly identify the most severe cases. So in this paper, a survey of different red lesion detection techniques and automated analysis are discussed.

Published by: Shameena P P, Ayisha Shamna. K K, Jamsheera. K

Research Area: Image Processing

Research Paper

111. A Study of Performance Appraisal System of Employees at Cement Industry

India is the second largest cement producer in the world that makes cement industry one of the most important industries in India. In any country, the production and consumption of cement define the country's progress to the certain extent. It comes from iron and steel industry, therefore, it plays the vital role in country's economy. Industry depends upon many factors such as capital, funds, technology and a very important factor is a human aspect, therefore, the need of Human Resource Management (HRM) came in focus where PMS is a very important factor. There are a number of factors, which make an impact on the employee, but PMS plays a vital role. If the workforce is poorly utilized then the growth of future in terms of employee satisfaction would be very tough. HRM is considered as the backbone of any industry including cement industry and PMS is considered as a key factor for building and developing the profitability of cement industry, besides land, technology, capital etc. HRM concept is considered as a sunrise whereas traditional personnel management is considered as sunset concept. HRM has aspired to be a business partner and see the PMS linkage with organization employee satisfaction. Hence, in cement industry, PMS is very important for whole production cycle. To analyze, understand and review the existing performance appraisal system and its implementation process in Shree Cement Ltd.

Published by: Juhi Yadav

Research Area: Cement Industry

Review Paper

112. A Review on Closed-Loop Digital Predistortion (DPD) Used To Linearize RF Power Amplifier

Digital pre-distortion (DPD) used to linearize an RF power amplifier (PA) can achieve wide bandwidth distortion cancellation. The predistortion technique is one of the most effective linearization technique. Model-based DPDs also called polynomial based DPDs, are mostly used for the linearization of PA. For the memoryless system, the polynomial model can be used to model the predistorter. For memory system, the models such as Volterra series model, generalized memory polynomial model, Hammerstein model and Wiener model all are used to model the predistorter. DPD architectures can be classified into two types Indirect Learning Architecture (ILA) and Direct Learning Architecture (DLA).In this paper, a survey on different model digital predistortion used to linearize RF power amplifier in different works.

Published by: Sherihan A C, Shameena P P, Ayisha Shamna K K

Research Area: Communication

Review Paper

113. Stock Price Prediction Using Neural Networks

Trading stocks on the stock market are one of the major investment activities. In the past, investors developed a number of a stock analysis method that could help them predict the direction of stock price movement. Modelling and predicting of equity future price, based on the current financial information and news, is of enormous use to the investors. Introduction of machine learning caused that new models can be developed based on the past data. Our main hypothesis was that by applying machine learning and training it on the past data, it is possible to predict the movement of the stock price. Particularly, we want to determine the percentage of growth or fall in a stock price for the next day which can be variable. Usually, investors want to select the stocks which will grow in price substantially.

Published by: Shallu Bashambu, Aman Sikka, Pallav Negi

Research Area: Machine Learning in Computer Science

Research Paper

114. Healthcare Blockchain leads To Transform Healthcare Industry

Blockchain can nail the Healthcare domain. Using the concepts and features of the Distributed ledger, Healthcare industry can be transformed. Blockchain can change the future of Healthcare Industry. Healthcare records, Lab assessment results, doctor’s perceptions and Minute details of the healthcare industry in the form of transactions can be stored in a decentralized way in the form of blocks and these blocks can further be linked as per series of event in the form of blockchain in distributed ledgers. Highly complex process and manually intervention can be eliminated. Highly transparent and secure systems can be built on top of blockchain technology by introducing identity manager.  

Published by: Sourabh Sethi

Research Area: Healthcare

Research Paper

115. Analysis of Twitter Reactions to Government Policies

With the increasing use of social media, especially Twitter, the way governments policies are perceived can be understood through the reactions they garner on twitter. In India, in recent times, there have been many significant policy changes like demonetization, Goods and Services Tax to name a few. Sentiment analysis of Twitter reaction to these policy changes across different regions can provide very useful insights. In this paper, we talk about sentiment analysis of twitter reactions, its use in the government policies context, the various methods which can be used for it and output visualization for better understanding.  

Published by: Vidya Zope, Anagha Karmarkar, Mansi Shivani, Vinit Pawar, Kanchan Tewani

Research Area: Artificial Intelligence

Research Paper

116. Comparative Analysis of Discretization Schemes

In the field of CFD, there are mainly two different types of discretization methods are used one is structured grid-based and the other one is unstructured grid-based, the structured grid is known for the accuracy and the unstructured grid is known for the ease with which it can be generated around complex configuration. An emerging third approach is the use of Meshless discretization which does not involve a mesh in the classical sense but works on a random distribution of points. Creating points around a configuration should be easier compared to generating grids hence, in this work we compare finite volume method with a Meshless method using a simple convection-diffusion equation whose exact solution is known.

Published by: Naveen T

Research Area: Mechanical Engineering

Research Paper

117. Effects of Educational Program on MERS- Corona-Virus Among Nurses Students at Jazan University 1439-2017

The Middle Eastern Respiratory Syndrome-Corona Virus (MERSCoV) firstly discovered among people living in Saudi Arabia.aim of study is to The aim of the study is to evaluate the effectiveness of Educational Program on MERS- Corona-Virus among nurses students at Jazan University 1439-2017 among nurses student at Sabia University College.

Published by: Manal Bilal Mohamed, Madeha Ali Mahmoud

Research Area: Infectious Disease

Review Article

118. Political, Historical, Social and Psychological aspects in Nadine Gordimer’s Novel The Lying Days.

Nadine Gordimer, the Nobel laureate is a white South African prolific writer. Gordimer believes in the humanistic aspect of people and is the spokesperson for her people. She won her Nobel Prize in the year 1991. Her life brings about the racism and of the downtrodden conditions of the people. Gordimer works to bring out the society needs and the societal problems in different dimensions. She feels that born as a white South African has left her in a fatal isolation and her only thing to bring out is the unspeakable cruelty to blacks through her words, as a writer, the words of her works give her the face and place with what she depicts. The intimate background understanding of South Africa makes the writer like Gordimer to convey easily what exactly is the condition of her country and know the real suffering of the black people. Most of the black and white writers of South Africa or of the African continent leave their own native place as exiles or by own willingness to other countries and only a handful of writers remain in their natives and bring out the suffering of their own country. Gordimer is one such writer who stays in her country South Africa and brings out vistas of images about the black people and their actual situation through her words. She does not go into an exile or leaves her country on free will. She faces the challenge of loneliness as a minority white woman in the black consciousness and as a political activist to blacks, which isolates her in the white community. Gordimer is one of the most powerful of the protest fiction writers of South Africa, by traveling through every part of her country; she presents the firsthand realistic experience of the oppression of the natives in all fields like political, social and cultural scenario

Published by: Brinda. P, Dr. Benazir

Research Area: Arts and Science

Technical Notes

119. Controlling Theft through Object Detection

An effective method is presented for the detection and tracking of objects from a video sequence captured by a Charge couple device web camera with Motion sensors using the fundamentals of Digital Image Processing in MATLAB platform for Delhi based Arts and Handicrafts company, YASIN SHAWALS. This firm was established in the year 3000 and since its inception, it has achieved the milestone in International Trade of Kashmiri goods and handicrafts. In this sponsored project we are making the system for detecting the theft issue of the expensive goods from the storehouse and to keep an eye on the motion of even the small object. Hence through this project, we are modifying the security of articulated goods. For increasing the security,  Blackt Electrotech we60 Degree PIR Motion sensor is being interfaced with the charged couple device webcam Quantum 495 Lm Camera with a picture resolution of 14 MP. The captured image is processed through Image acquisition tool and then an algorithm is used for image enhancement. Wavelets and different layers are observed minutely and morphological operations are performed for transforming the image into GRAY level. These transformed images are segmented and through filter, edges are detected. Hough Transformation is used for recognizing the object and finally, comparison of different images take place by using MATLAB.

Published by: Shubham Saurav, Syed Hanaz Tariq

Research Area: Image Processing

Research Paper

120. Fingerprint Authentication System using Log-Gabor Filter

Fingerprint authentication is one of the unique and reliable methods of identification and verification processes. This paper presents different techniques used in fingerprint authentication system. Here in this paper to extract the features Log - Gabor filter is used. After that, these extracted features are compared for identification and verification of a person. Two test cases are used. Three distance metrics Spearman, Euclidean, and Cosine are used to evaluate the performance.

Published by: Punit Soni, Sourabh Arora

Research Area: Computer Science

Survey Report

121. Heterogeneous Trash Segregation Machine Using Internet of Things (IoT) - A Smart Waste Management Survey

Intelligence solid waste bin is essential to develop an efficient and dynamic waste management system. The common litter bins placed by the municipal corporation are leading no. of health, environmental and social issues. This research presents the implementation and execution of an integrated sensing system and algorithm for solid waste trash bins to automate the waste management process. Various causes like improper dustbins placement in City Corporation and specifically, people are not aware enough to use dustbins in a proper way. Such major causes are leading serious problems like an unhygienic condition, air pollution, and unhealthy environment. Several sensing methods have been integrated and have combined their verdicts that offer the detection of bin condition and its parameter measurement. Research has been carried out by developing the software application for indicating dustbins status, shortest path method for collecting vehicles by integrating Radio-Frequency Identification (RFID), Global System for Mobile communications (GSM), Geographic Information Systems (GIS), trash collection and management in residential locality is the basic considerations referred to in smart cities. The concept of trash collection is quite tedious. For efficient trash collection, we use the concept of the Internet of Things (IoT) which acts as a backbone technology. With the increase in population, especially in the urban areas waste collection, categorization and disposal have become a major problem for government authorities. An IoT based waste collection framework is proposed to automate the solid waste identification, localization and collection process. The optimization algorithm is used as proposed evaluation criteria to achieve higher efficiency with the outcome of the efficient and intelligent sensing system to automate any solid waste bin management process and also the goal of making cities smarter, greener to provide the healthy and hygienic environment.

Published by: R. Sangeetha, S. Kayalvizhi, S. Kalpana Devi

Research Area: Internet of Things

Review Article

122. The Scope and Evolution of Talent Management in India

Many people confuse ‘Talent Management’ with ‘HR Management’. Both concepts are linked and do overlap with each other in certain cases, but are essentially different in their core concepts. HR Management primarily deals with recruiting new talent and their objective is to see if an individual is fit for a certain role. But the concepts in Talent Management are organization inclusive and it sees if an individual is fit for the current role as well as the future roles that may come up within the organization.

Published by: Dr. S. Srividhya, R. Subramani

Research Area: Talent Management

Survey Report

123. Literature Review on Diverse Techniques in Anti-Money Laundering System

Money laundering is a process of converting black money into white cash. Anti-money laundering is a procedure or method to find these laundering activities. Although efforts on anti-money activities started at an early stage, the solutions seem to be restricted to a strategic level. Mostly the perpetrators of criminal acts strive to make the transactions as innocent looking as possible. Extensive research has been conducted to investigate a proper solution for suspicious transaction detection. But there is no reliable system to confirm if the exchange is really suspicious or not and the process is also very tedious. This paper surveys several approaches and algorithms that have been proposed for anti-money laundering System.

Published by: A. Helen, S. Sobitha Ahila, A. Niranjana

Research Area: Web Mining

Review Paper

124. Conservation and Management of Medicinal Plants in India

India is floristically rich and is recognized as one of the twelve Mega biodiversity centers of the world. It is endowed with a rich heritage of medicinal plant wealth with a wide spectrum of healing properties. The traditional Indian system of medicine has been therefore well developed due to this richness of bio-resources. Interest and demand for herbal remedies are undoubtedly increasing very rapidly today. This has resulted into over exploitations of our natural bio-resources leading some important medicinal plant species to rarity, extinction and endangered state. It, therefore, appears that current concern must be addressed to this problem. Conservation is the process of management of biosphere in order to obtain the greatest benefit for the present generation and maintaining the potential for future. Conservation of plant resources is of global concern because we don’t know what we are losing and what will need in future. There is a necessity to strike a balance between conservation and utilization of these medicinal plants.

Published by: Dr. Neeraj Kumar, Dr. Ajay Kumar Singh, Dr. Prabhat Kumar Dwivedi

Research Area: Conservation of Medicinal Plants

Research Paper

125. Improving End-to-End Throughput in Wireless Network using Spatial Reusability

The optimal route from the source node to the destination node that guarantees a high end-to-end throughput is the main issue of routing in multi-hop wireless network. As the environment is heterogeneous the issue seems to be much complex, most of the solutions end with local optimum because those algorithms mostly fail to ensure an end to end throughput. By considering spatial reusability of wireless media, the end-to-end throughput in wireless multi-hop remote systems can be enhanced massively. To support the argument, Spatial-reusability Aware Single-path Routing (SASR) algorithm is proposed and compared with existing single path routing protocol. The assessment showed that proposed protocol show significant improvement in end-to-end throughput in comparison with existing protocols.

Published by: Athira Manikuttan, Vinodh P Vijayan, Neena Joseph

Research Area: Networking

Review Paper

126. Hand Detection and Gesture Recognition in Real-Time Using Haar-Classification and Convolutional Neural Networks

Over the past few years, with the development of hardware and software, Human-Computer Interaction(HCI) has evolved from the use of keyboard and mouse to a more gesture-based approach to make the computer function according to your own will. Gesture Recognition has been used successfully in various applications like gaming (Xbox Kinect), recognizing sign languages and many others. The use case for the gesture recognition problem is very vast and therefore is being worked on continuously.

Published by: Kartik Wadehra, Mukul Kathpalia, Vasudha Bahl

Research Area: Computer Vision, Deep Learning

Research Paper

127. Comparative Evaluation of Mast Cell Tryptase Activity in Oral Squamous Cell Carcinoma (OSCC), Oral Precancerous Pathologies (OPP) and Normal Oral Mucosa (NOM)

Oral squamous cell carcinoma (OSCC) is the most common malignancy of the oral cavity. Many times it is preceded by oral precancerous pathologies (OPP) namely leukoplakia, erythroplakia, and oral submucous fibrosis. The rate of malignant transformation is variable for these premalignant pathologies. Mast cells have a predominant role in tumor progression and metastasis. Mast cells contain proteolytic enzymes tryptase and chymase which is responsible for degradation of extracellular matrix. In the current research project, we have studied the comparative expression of mast cell tryptase activity in OSCC, OPP & NOM using immunohistochemistry method.

Published by: Dr. Anuradha Kote, Dr. Ajinkya Deshmukh, Dr. Atul Deshmukh

Research Area: Oral Oncology

Research Paper

128. Experimental Analysis on Concrete by Partial Replacement of Fine Aggregate with Powdered Ceramic Tile

Concrete is the most versatile material in building industry. River Sand is scarcely available now and other alternative materials are being tried. Ceramic tiles are widely used in the construction industry in which about 25% becomes waste. This investigation deals with replacing sand partially with 10%, 20%, 30% and 40% of waste powdered ceramic tile in concrete. The test results for M30 grade concrete with water cement ratio of 0.4 and partial replacement by 30% shows an increase of 13% and 15% respectively in compressive and flexural strength. For 40% replacement of sand with ceramic tile, the compression and flexural strength are at par with conventional concrete. The result leads to the effective utilization of ceramic tile waste thus by reducing the disposal and environmental problems.

Published by: Dr. P. Chandrasekaran, R. Ramesh Kumar, R. Praba Rajathi

Research Area: Concrete Material

Survey Report

129. Survey on an Intelligent AAA Device for Fire Detection

Fire is a huge serious disruption which can lead to economic or environmental losses. A system to detect fire and alarm the people before it breaks out is a need to our environment. In this paper, the focus is on the literature by providing an edifice and comprehensive overview of fire detection. It includes Alarming, Authentication and then Addressing the location of the place where the fire broke out to the admin and fire emergency services. Raspberry Pi 3 is used to control the system which is integrated with few sensors and camera. It supports image processing using OpenCV library which is used to process video more accurately with less time period. A 360ż relay motor is assembled with the camera so that it can snap the image in whatever angle the fire is detected after sensor detection. To avoid disk memory usage, this system saves the image only when a fire is detected. This paper also reviews the context and key features of fire detection systems. A method of combining sensor data and real-time processing help the device to avoid false alarm and image is sent to a group of users. Finally, we summarize the open problems and future exploration area in detecting the fire and authenticating it to the users.

Published by: Ramya. K, Subashini. I, Subhashri. H, Kalpana Devi. S

Research Area: Computer Science

Research Paper

130. Use of Surf and Genetic Algorithm for Content Based Image Retrieval System

Content-based image retrieval (CBIR) has most important research area in the last couple of years. Image retrieval is the system used for searching out the desired features of a query image. The main purpose of CBIR method is to obtain the accurate and fast results. In this paper, an Query image is retrieved from the database with high accuracy. This going through various steps namely, Pre-processing, feature extraction, Optimization and matching. In pre-processing noise is removed by using filtering and color conversion is performed on the query image. For extracting features SURF (Speedup Robust Feature) descriptor is used. It is the enhanced form of SIFT (Scale Invariant Feature transform) and more speedy than it. For optimization Genetic algorithm (GA) is used which improves the features of the extracted image. For matching Euclidian formula is used. It measures the similarity between the extracted feature and the database image. The simulation is carried out in MATLAB simulator tool with an accuracy of approximately 98 %.

Published by: Sumit Sharma, Kavita

Research Area: Image Processing

Project Report

131. Privacy and Security on Twitter: A Semantic Network Analysis

As the technologies advance rapidly, the privacy and the security have become one of top concern in the digital communication in this age. Thus, we are trying to understand and drawing a conceptual view depend on how is the people view privacy and security in this era which has been changed and still changing and expanding as the technology developed. In order to analyze and see what it the person's apprehension regarding the view of the privacy and security, we have used one of the widespread social media which is Twitter. Based on the Twitter’s users view we have constructed our project and draw our conclusions. We have collected more than 125000 tweets to analysis them based on different aspects. This project mainly focused on privacy and security then it takes into account the Health Information Portability and Accountability Act (HIPAA), Facebook, and online keywords. After collecting the tweets, we have analyzed them using AutoMap tool. In the initial analysis, AutoMap extracts all of the words which have been occurring in the tweets along with each word frequency. As a second step of the analysis, we have filtered out all about numbers, symbols, and non-relative wording. Then, we took the most frequent work and did discourse analysis to see how these words are emerging. Based on discourse analysis, we have wiped out some of the words that appear in different context. From that point, we have drawn our discussion and conclusions. Based on our analysis, the privacy is beyond the information control and access. The people have changed their view regarding the privacy with the advancement of the technology. The Twitter’s users get concerned about their Facebook and Google personal data privacy. Particularly, when the Facebook has posted the new term and privacy policy, the users become more worried about their privacy. In addition, Twitter users’ were discussing the privacy and security of the mobile device to further assist the people who plan to buy in the near further. Moreover, they have anxiety regarding different acts and lows that are developed, and whether these laws will protect them or the laws will work against them.

Published by: Mansour A. Alshaikhsaleh, Dr. Abdullah, Faisal, Prof. Mohamed Zohdy, Ahmad Alshammari

Research Area: Information Technology

Research Paper

132. Design and Validation of a Mass Tuned Dynamic Vibration Absorber

This paper presents the effectiveness of a new cantilever dynamic vibration absorber in reducing the vibrations of a primary system at resonance. The designed absorber is tested for cantilever and simply supported conditions of the beam with motor/rotor assembly to create harmonic excitations. The setup is tested numerically using modal and harmonic response analyses of ANSYS and further validated by building a prototype and conducting experiments using vibration analyzer. The proposed system was found to considerably reduce the vibrations in the primary system when the vibration absorber was tuned to the operating frequency.

Published by: Vaibhav Jairam Ghodge, A. P. Bhattu, S. B. Patil

Research Area: Mechanical Vibrations

Survey Report

133. Survey on Location Tracker for Fishermen using GPS

There are many risks that can occur for fishermen as sea border and location cannot be easily identifiable. To ensure the safety of the fishermen, the location should be tracked. It is also better when the border crossing intimation is also given to the fisherman and coastal guards for tracking even if any problem happens to fishermen the data sent to coastal guards can take the necessary actions can taken. The better indication is when the boat nearer to the restricted zone the location information should be sent to fishermen. The system should contain the better accuracy in determination of location, easily replaceable and the maintenance cost should be low.

Published by: Spoorthi T Shetty, Swetha M, Vishnupriya S, Niranjana A

Research Area: Internet of Things

Review Paper

134. Conversion of Demolished Construction Waste into Recycled Aggregates

Urbanization and industrialization go hand in hand affecting the change in lifestyle of an individual. Demolition of old and non-economical structures and construction of new is the basic cycle humans are following.  This is affecting the environment at an adverse rate due to wastage of recyclable materials and production of new raw materials. The construction industry is one of the key producers of non-recyclable waste so it is our duty to find ways and methods to use the demolished waste from the construction industry and convert it into a usable form. Demolished concrete is one of the key ingredients of this waste industry but with some mechanical procedures and alterations, this can be converted into a usable form sufficient to be used in the construction process. This paper provides an overview of the mechanical process used for converting the demolished concrete into usable concrete and admixtures used for making this concrete more efficient.

Published by: Akash M Shukla, Ankit Pedawal, Gaurav Pandey, Sooraj Regunta

Research Area: Demolished Construction Waste

Research Paper

135. Anomaly Detection Using Machine Learning

In this day and age of a plethora of information, the importance of information security cannot be emphasized enough. Any threat to confidentiality, integrity or availability of information must be taken seriously. Ignoring such threats can have serious consequences, like misappropriation, modification or encryption of data. Vulnerabilities in information security are a tempting target for malware. Malware are malicious scripts or software, including computer viruses, worms, Trojan-horses, ransomware, spyware, adware, etc. The traditional way of detecting an advanced malware or threat compromise uses a signature-based antivirus. This approach, however, is not foolproof and can be bypassed. The signature-based approach relies on a known list of signatures. The list of signatures is not perfect and also does not contain previously unseen malware signatures. The proposed system uses operational intelligence tools and machine learning to monitor usual user behavior. This is done by collecting system activities like event logs, sysinternal, etc. Once the system learns normal behavior patterns, it can detect anomalies that may be caused by malware. Thus, unlike signature-based approach, the proposed system can detect previously unseen malware as well.

Published by: Yash Shahani, Vedant Yadav, Aditya Subramanian, Karan Chhabria, Vidya Zope

Research Area: Machine Learning

Review Paper

136. A Review of Various Ethanol Supplementation Techniques in Compression Ignition Operations on the Aspects of Performance, Combustion and Emission Characteristics

With the aggravating trends of Globalisation across the global circuit, it has certainly lead to the development of a vital sector more significantly – Transportation. To cater forth the growing demands of the growing population. With the growing demands, Sector had to opt for efficient and durable characteristics instilled with longevity which led to a complete reliance on the transportation industry onto the DIESEL Engines for Public & Commercial Transportation.

Published by: Ishan Sharma, Karan Arora, Satyam Dixit

Research Area: Biofuels and Alternate Energy Research

Review Paper

137. Live Video Colour Recognition and Object Tracking using MATLAB

In this paper, we discuss the use of live video streaming to detect RGB colors and in the process, try to track the movements of different objects in a stationary background. This color dependent tracking is achieved through MATLAB’S image processing toolbox. A live video is segmented and each video frame is used to detect red, blue or green color and keep track of the object in subsequent frames using the average shift observed in the frames. The applications of this system include robotics, color related segregation or detection, analysis and surveillance tech. devices, and security systems.

Published by: Pranay Singla, Vibhor Sharma, Vaibhav Aggarwal

Research Area: Image Processing

Case Study

138. An Experiment on Circuit Breaker and Over Current Relay

Circuit breaker and relays are being utilized for secure, reliable and convenient operation of power system. The over current protection relay is widely used in the power system for protection of short circuit or wrong setting of system to the pre-specified value. Erroneous setting of over current relay in the power system it is difficult to send the trip signal. So it is connected carefully in the power system. Therefore it is important to accredit the setting of power protection equipment. The paper represents the modeling of over current relay in MATLAB/SIMULINK. The over current relay has the types of instantaneous, definite time, inverse time and inverse definite minimum time (IDMT) according to the time characteristics. This paper most important feature is the comparison of times between ideal & calculated results of over current relay. To make the protection system of transmission line by the circuit breaker and over current relay in MATLAB/SIMULINK. To proper transmit the electric power from sending end to receiving end without suffering from any difficulty and dangerous condition. Implementation of over current relay and testing of circuit breaker & over current relay are using in MATLAB software. And show the result of operating & fault current and also trip signal time of the over current .

Published by: Gaurang Pandit, Yash Kava

Research Area: Relay

Research Paper

139. Remote Control Effect of Li+, Na+, K+ Ions on the Photoluminescence Intensity of ZnTiO3:Eu3+ Nanomaterial

Alkali metal ions (Li+, Na+ & K+) co-doped ZnTiO3:Eu3+ red emitting nano-phosphors series were prepared by combustion synthesis method. The crystal structure & surface morphology of the phosphors was analyzed by using X-ray diffraction (XRD) and Scanning electron microscopy (SEM) technique. The XRD results show the hexagonal phase of ZnTiO3 with space group R-3:R. From the SEM results, it was observed that the phosphors had very small particle size ranging from 10-30nm and the average size of the ZnTiO3 crystal is 30±5nm. Photoluminescence study showed that under the excitation of UV (393 nm) or blue light (464 nm) , the obtained products emitted characteristic red emissions of Eu3+ at 615 nm for 5D0 → 7F2 transition which proved that activator Eu3+ ion had successfully entered the host lattice of ZnTiO3. The red emission intensity was significantly enhanced by introducing alkali metal ions as co-dopants. A remarkable increase in the photoluminescence intensity is found by co-doping with Li+ ions in ZnTiO3:Eu3+ lattices due to the reduction of environment symmetry around Eu3+ ions which strengthen the electric dipole transition.

Published by: Dr. Subhash Chand

Research Area: Nano

Research Paper

140. Strong Orange–Red Photoluminescence from CaTiO3:Sm3+ Nano-phosphor

The crystal structure and surface morphology of the CaTiO3:Sm3+ nanomaterials prepared by combustion synthesis were determined by XRD Rigaku Ultima IV diffractometer using Cu Kα radiation (1.54184 Å) depicting orthorhombic phase of CaTiO3:Sm3+ with space group Pbnm & scanning electron microscopy (SEM) respectively. The phosphor particles size was found about 10-15nm. Upon excitation using 407nm light, the PL emission spectra obtained due to 4f transition of Sm3+ from 4G5/2 → 6HJ(J=5/2, 7/2 ,9/2 ,11/2) consists of five peaks located at 564nm, 601-611nm, 647nm and 711 nm respectively. Among these Peaks, the peak located at 564 nm (4G5/2→6H5/2) was purely due to magnetic-dipole transition (MD), and at 648 nm (4G5/2→6H9/2) was purely due to electric dipole transition (ED). But the main peak located at 601 nm (4G5/2→6H7/2) was due to a partly magnetic and partly a force dielectric-dipole transition showing bright orange-red emission thus prove CaTiO3:Sm3+ phosphor a strong promising orange-red phosphor for display application.

Published by: Dr. Subhash Chand

Research Area: Nano

Research Paper

141. Knowledge Practice Gaps About Needle Stick Injuries among Health Care Workers at Omdurman Teaching Hospital –Sudan 2016

Needlestick injury remains the potential source for transmission of blood born infection and one of the main safety concerns which need to be addressed for the prevention of various blood-borne diseases among HCWs. The aim of our study was to assess the knowledge and practice gaps about Needle Stick Injuries (NSIs) and their associated factors among Health Care Workers’ (HCWs) at Omdurman teaching hospital. Methods: A cross-sectional study was conducted in may–June2016. (92) Respondents enrolled in the study (medical officer, lab technicians and nurses selected randomly. Results: Overall the knowledge about transmission of HBV HCV and HIV was good, mean knowledge 76.1%, in general, their practice regard news was poor means score practice 88.9%.there is significant relation between knowledge and socio-demographic data p .000 and insignificant between socio-demographic and their practice p.612 From the study concluded that NSSIs are common risk factors for infection among health care workers due to their poor practice, although their knowledge is good. Lastly recommended that Hospitals and healthcare facilities should be provided all preventive skills and instruments against infections. Record keeping and reporting of sharp injuries should be considered.

Published by: Manal Bilal Mohamed, Madeha Ali Mahmoud

Research Area: Knowledge of Health Care Workers

Online paper publication is ongoing for the current issue and authors can submit their paper for this issue until 26th February, 2018 (extended).