Volume-4, Issue-2

March- April, 2018

Research Paper

1. Study of Linear and Non-Linear Buckling Analysis of Reinforced Concrete Wall

RCC walls are used worldwide to resist loads due to gravity and earthquake. Many of the tall buildings had buckled during recent earthquakes due to poor design and construction practices. When the RCC structure is subjected to axial compressive loading it fails due to buckling. The objective of study is to predict the linear and non-linear buckling behaviour of RCC walls using the finite element model. This paper investigates the effect of various parameters that influence the behaviour of the wall. These parameters include; slenderness ratio, percentage of reinforcement. Different percentages of reinforcement with constant slenderness ratio for a wall is analysed through ANSYS 15.0.

Published by: Salil Gurudev, Dr. Rakesh Patel

Research Area: Civil Engineering

Research Paper

2. An Optimized Classification of Human Cancer Disease for Gene Expression Data

Classification of cancer is determined the appropriate treatment and helps to determine the prognosis. The Existing System was presented to classify the human cancer diseases predicted on the gene expression profiles. The existing approach is initially, the Information Gain (IG) is utilized for feature selection and Genetic Algorithm (GA) is used for feature reduction. Finally the Genetic program is utilized for classifying the types of human cancer. However the existing approach has high computation time and required large amount of computational resource. To overcome this issue in this paper presented the Cuckoo Search (CS) optimization algorithm to optimize the threshold value of the features determined by the Information Gain (IG) and then Genetic programming (GP) is used for enhancing the performance of classifying the human cancer. The proposed cuckoo search approach is nature inspired behavior and breeding process of cuckoo bird’s optimization algorithm for generation of the global code book with one tuning parameter and it’s applicable for both linear and non linear problems. The performance of the proposed approach is evaluated in terms of Classification Accuracy, Specificity and Sensitivity.

Published by: K. Yamunadevi, R. Nagaraj

Research Area: Datamining

Research Paper

3. Optimization of Surface Roughness, Material Removal Rate and Tool Wear Rate in EDM using Taguchi Method

In the present manufacturing scenario, EDM is the widely used non-traditional machining process which is used to machine hard materials such as alloys or composites. In the last few decades, there are lots of advancements in EDM which makes EDM more popular. There is a wide range of application of EDM in the aerospace, die-making and some other manufacturing sectors which require high precision. EDM is also called as high precision machining which can be used in the batch production where the traditional machining processes fail. In the last few years the developments in the new tool material, optimization techniques, and conductive ceramics have made some new research scopes in EDM. The aim of present study is to investigate the effect of input parameters like current, voltage and pulse-on-time on the Al-SiC (reinforced with 10% wt. of SiC). The output parameters for the process are MRR, TWR and surface roughness. It is found that the selection of input parameters plays an important role in the performance of the EDM.

Published by: Khushboo Kakkar, Neha Rawat, Anbesh Jamwal, Ankur Aggarwal

Research Area: Advanced Manufacturing Processes

Research Paper

4. A Novel Scheme for Separable and Reversible Data Hiding in Encrypted JPEG Image using Forward Correction Code

Among various digital image formats used in daily life, JPEG is the most popular .Therefore, reversible data hiding (RDH) in JPEG images is important and useful for many application such as archive management and image authentication. Reversible data hiding in encrypted images (RDH-EI) are developed most techniques for uncompressed images, this paper provides a separable reversible data hiding protocol for encrypted JPEG bitstreams. Here a JPEG encryption algorithm is first proposed, which enciphers an image to a smaller size and keeps the format compliant to JPEG decoder. After a content owner uploads the encrypted JPEG bitstream to a remote server, a data hider embeds an additional message into the encrypted JPEG bitstream without changing the bitstream size. On the recipient side, the original bitstream can be reconstructed losslessly using an iterative recovery algorithm based on the blockingartifact. Though message extraction and image recovery are separable, anyone who has the embedding key can extract the message from the marked encrypted copy. A random error is introduced to obtain the PSNR and error values of different JPEG images and make a comparative study. A forward error correction technique is used for controlling errors. Experimental results show that the proposed method outperforms a previous work in terms of separation capability, embedding capacity and security.

Published by: Bushra MP, Naseeda P

Research Area: Secure Communication

Research Paper

5. The Vellore Mutiny- 1806

Vellore Mutiny, outbreak against the British on July 10, 1806, by sepoys (Indian troops employed by the British) at Vellore (now in Tamil Nadu state, southern India). The incident began when the sepoys broke into the fort where the many sons and daughters of Tippu Sultan of Mysore and their families had been lodged since their surrender at Seringapatam (now Shrirangapattana) in 1799 during the fourth Mysore War. The July 10 outbreak, though encouraged by the Mysore princes, was basically caused by resentment at new British regulations that ordered changes in headgear and shaving style and the prohibition of ornaments and caste marks for the Indian troops. Little effort was made by the British to reassure the men or listen to their grievances, which included the belief that the regulations were determined to the religious practices of both Hindus and Muslims. There were also complaints about the sepoys’ pay. About 130 British troops were killed in the initial assault, but the fort was recovered within hours by a relief force of British soldiers and sepoys under Colonel Robert Gillespie from nearby Arcot. Hundreds of mutineers were killed, either in the fighting or in subsequent executions by the British. The affair alarmed the British because of its connection with the Mysore princes, who were thereupon removed to Calcutta (now Kolkata). Lord William Bentinck, the governor of Madras (now Chennai), and Sir John Cradock (later John Caradock, 1st Baron Howden), the commander in chief at Madras, were both recalled. It is believed, however, that the severity of punishments meted out by the British—which included tying some of those convicted of mutiny to the barrels of cannons and then firing them— deterred sepoys in southern India from joining the Indian Mutiny of 1857–58.  

Published by: Dr. S. Jayavelu

Research Area: Freedom Struggle in India

Research Paper

6. SeriNutrid- A Balanced Nutrient Diet for Silkworm (Bombyx mori L) Chawki Rearing

Silkworm Bombyx mori L is a highly sensitive lepidopteron insect and responds sharply to changes in the feed quality. In Silkworm rearing, Chawki is considered as one of the important stages from which a successful cocoon crop is ensured. Rearing of silkworm on SeriNutrid Semi-synthetic diet) containing balanced nutrition, during the chawki stage ensures a successful and economically viable cocoon crop. Chawki rearing with SeriNutrid also means hygienic rearing, avoiding loss of crop due to missing larvae & minimizing disease outbreak and reduction in feeding frequency. This hypothesis is tested by extensive trial in the field by promoting chawki (Cake- Mari) obtained by feeding larvae on SeriNutrid cake. Weight of cocoon per 100DFL recorded 3-5% more than leaf chawki rearing and showed better quality of the cocoon, bringing in 5-10% higher price compared to cocoon obtained from leaf fed chawki.

Published by: Dr. Mousumi Mondal, Bharat Tandon, Radhakrishna P. M

Research Area: Medical

Research Paper

7. APDA with Data Collective: Prevent Attacks in VANET

Vehicular ad hoc networks (VANETs) are usually a future engineering science that is certainly getting impetus in recent years. Which can be why the actual community attracts increasingly more interest from both equally manufacture and academe. Due to the minimal data transfer rate of cellular connection method, scalability is often a significant problem. Facts corporate is usually a solution to this kind of. The goal of data collection is to join the particular messages as well as disseminate this specific inwards much larger area. Although performing group integrity from the information is not easily approved along with assaults might be doable. Consequently collective has to be risk-free. However are several studies addressing VANETs, they just don’t focus on security troubles especially in the data group.

Published by: Shweta Gupta, Arpit Gupta

Research Area: VANET

Research Paper

8. Condition Monitoring of Ball Bearings

Condition monitoring is gaining importance because of its advantages over conventional maintenance methods. Even though it is little costly, It is feasible especially in continuous process industries, where process costs are very High. In this paper, an attempt is made to monitor bearing faults. In condition monitoring through vibration analysis, it is possible to predict different defects of different characteristics and would reveal the details of defects and inaccuracies so that it could be minimized, which leads to increase the plant efficiency. Condition monitoring through vibration analysis is an online technique, where we need not stop the machine for diagnosing the fault.

Published by: G. Venkata Kishore Rakshit Raju, M. Sree Veena, M. C. S. Reddy

Research Area: Condition Monitoring

Review Paper

9. IOT Based Smart River Monitoring System

The project involves the approach of Internet of Things (IoT) which will be done using a microcontroller. We are using customized sensor’s node for monitoring the parameters of water like pH, turbidity, temperature, oxidation reduction potential, Dissolved Oxygen, industrial wastes, hospital waste etc. The information is going to be level headed constantly and this information will be consigned to the database using TCP protocol and if the tolerable limit is exceeded, a warning will be notified to authorities by IFTTT protocol and twitter API push notification so that the necessary actions are taken

Published by: Dilshad Ahmad, Abhishek Kumar

Research Area: Water

Research Paper

10. E-Payment System for Municipality

Local bodies are classified in to municipal co-operation, municipalities of different grades depending upon the population and income of the urban local body. Local bodies like municipalities needs to collect different kinds of information from citizens for applications like marriage, death, birth, ration card etc. But it’s difficult to store all information and it will take long time for processing.To solve this problem we have to develop a web based system “E-Payment System for Municipality”. By using this system which we can collect tax information from different authorities based on their house num and house owner name. Data are stored in databases and the user has a unique user-id and password. The user can login and check the data.

Published by: Abhirami TK, Dr. A. V. Senthil Kumar

Research Area: Computer Application

Research Paper

11. Video Based Face Detection Process

The project entitled “Movie Character Discovery” is used to identify movie characters in videos. Automatic face identification of characters in movies has drawn significant research interests and led to many interesting applications. It is a challenging problem due to the huge variation in the appearance of each character. Although existing methods demonstrate promising results in clean environment, the performances are limited in complex movie scenes due to the noises generated during the face tracking and face clustering process. In this paper we present two schemes of global face-name matching based framework for robust character identification. The contributions of this work include: Complex character changes are handled by simultaneously graph partition and graph matching. Beyond existing character identification approaches, we further perform an in-depth sensitivity analysis by introducing two types of simulated noises. The proposed schemes demonstrate state-of-the-art performance on movie character identification in various genres of movies.

Published by: S. P. Deepika, M. Ananthi, P. Rajkumar

Research Area: Image processing

Research Paper

12. Causes of Stress among the Nurses Working in Intensive Care Units 2015

Stress is everyday life’s reality. Everyone is struck by it in one way or the other. No one is safe from it. This study aimed to assess factors that can cause stress among nurses working in critical care unit and to find the relation between these factors and demographic data, it is a descriptive study done in Khartoum, hospital and Omdurman hospital June -July 2015. 56 nurses enrolled in the study, selected randomly. data were collected after applied self-administer questionnaire .in the results most of the respondents strongly agreed that lack of practice and a shortage of staff and prolonged period of working without break, and lack of support and improper communications between their college and improper environments all these factors cause stress for nurses in the critical care unit. Conclude: majority of the nurses had severe stress with different stress factors and highly significant association between these factors and the demographic variable which support our hypothesis

Published by: Manal Bilal Mohamed

Research Area: Nurses in ICU

Research Paper

13. Intelligent Voice Controlled Robot using HMM Recognizer

The Robots are used more commonly in all the fields. In this paper we are implementing systematicway for the voice base robotic vehicle, whichconsistshardware as well as software interfacing with clarity of voice commands spoken by human being, this voice commands are recognized by electronic circuit containing HM2007 voice recognition IC When we come to the recognition of speech, many recognizers are available for improvement of voice recognition. The main task is to find sequence of commands given by human being. The purpose of this paper is to recognize voice commands given to the robotic vehicle with the combination of techniques to enhance control of robotic vehicle.

Published by: Shubham Thakare, Swapnil Pathak, Anmol M. Borkar, Shubham Meshram, Amar Gupta, M. M. Baig

Research Area: Robotics

Research Paper

14. Synthesis of Stannic Oxide and its Application as Adsorbent to Study Adsorption of Copper (II) and its Separation from other Elements

A method has been developed for the quantitative adsorption, of Cu (II)and its separation from other elements.Spectrophotometric determination of Cu(II) has been carried by employingtetraethylenepentamine (TEPA)as a spectrophotometric reagent. Stannic oxide has been prepared by co-precipitation method which is nanomaterial. Stannic oxide is found to be stable towards acids, bases and most of the common chemical reagents. The effects of different parameters such as pH, time of contact, amount of stannic oxide in the adsorption of 50.0µg of Cu (II) has been studied. It has been observed that 250 mg of stannic oxide is sufficient for maximum adsorption (94.34 ± 1.34%) of 50.0µg Cu (II) at pH 5.0 and contact time of 5.0 minutes. Under the optimum conditions of adsorption, effect of various anions and cations in the adsorption of Cu (II) also has been studied. Interfering cations has been masked by using suitable masking agents so as to make the process more selective. Distribution co-efficient values has been determined for various cations under experimental conditions which enable to predict affinity of various cations for the adsorption on stannic oxide.

Published by: Dr. S. D. Ajagekar

Research Area: Chemistry

Research Paper

15. Analysis of Different Classifier for the Detection of Double Compressed AMR Audio

An digital audio can be easily recorded by handheld devices such as digital voice recorders and Smartphone. A nd these audio are using as evidence in courts in many cases . One of the most important problem is that many audio often contains content forgery. Here we analyze the authenticity of AMR audio . A AMR is a audio codec for speech compression ,these format is widely used in today's handheld devices such as digital audio recorder or in Smartphone etc . Designing hand-crafted features is a challenging and time-consuming problem. In this paper, instead of manually extracting the features, we investigate how to use deep learning techniques in this audio forensics problem.. For an audio clip with many frames, the features of all the frames are aggregated and classified by classifier . Here we use three classifier and compare them .Instead of hand-crafted features, we used the SAE to learn the optimal features automatically from the audio waveforms. Audio frames is the input to feature extractor and the last hidden layer’s output constitutes the features of a single frame. At last the features of all the frames are aggregated and classified by either UBM-GMM or SVM or Bayesian classifier . when comparing and analyzing these three classifier the SVM and Bayesian classifier shows high degree of accuracy for detecting the authenticity of an audio .

Published by: Fathima Najiya P, Vipin Kishnan. C. V

Research Area: Signal Processing

Research Paper

16. Integrated Redevelopment of Foreshore Estate and Srinivasapuram

In Chennai there are constraints on the availability of unused land within the city limits, coupled with fast growing demand for built spaces and sky rocketing prices. On the other hand, that there are thousands of aging buildings which are dilapidated and under used blighted urban areas which have reached a stage where it is not possible to carry out structural repairs and rehabilitation as the same are not economically viable. Therefore, redevelopment has become a necessity as in time these areas become more dangerous and unfit for habitation. One such potential project is the Integrated Redevelopment of Foreshore Estate, where a large land parcel available for re-development, right on the shoreline. Foreshore Estate is an ideal location from where one could easily reach the most sought-after locations like Adyar(which is a large residential neighborhood in south Chennai with very high property values), Besant Nagar, R A Puram, Alwarpet and Mylapore(it is a cultural hub and neighborhood in the southern art of the city of Chennai .it is also known for its tree-lined avenue), MRC Nagar ( it is a commercial hub of the city which also include residential areas), as well as the best of the hotels in the city, besides critical facilities like the airport, sea port and railway station within 10 to 30 minutes. The idea is to develop a mix of high-end residential units, a fair amount of commercial space and also allot sufficient space for development of low-cost housing units, as the re-settlement of earlier tenements also has to be addressed. Tamilnadu Slum Clearance Board (TNSCB) and Tamilnadu Housing Board (TNHB) together hold 51.01 acres of land (23.5 and 27.51 acres respectively) in Srinivasapuram and Foreshore Estate area, facing the Marina Beach. Projected as the “Integrated Development in Foreshore Estate” the scheme envisions malls, luxury hotels and high-end residential complexes for private parties and senior Government officials and resettling the 3576 slums and 2000 housing board tenements.

Published by: Niranjan, Praveen, Sneha Feroz, Richard. A, Sathyaseelan. R. K, Asfiya Khatoon, Nirupama. K. V

Research Area: Urban Redevelopment and Architecture

Research Paper

17. FPGA – Based Electro Cardio Graphy Signal Analysis System using Least Square Linear Phase Finite Impulse Response Filter

Proposed design for analyzing electrocardiography (ECG) signals. This methodology employs high pass least-square linear phase finite impulse response (FIR) filtering technique to filter out the baseline wander noise embedded in the input ECG signal to the system. Discrete wavelet transform (DWT) was utilized as a feature extraction methodology to extract the reduced feature set from the input ECG signal. The design uses back propagation neural network classifier to classify the input ECG signal. The system is simulation on xilinx system generator.

Published by: P. Purani, M. Sasikala, J. Sharmila Devi, A. Yasodha, S. V Sathyah, S. Jeya Anusuya

Research Area: VLSI

Case Study

18. Land use Analysis on Urban Sustainability in a Transit Oriented Development

Urban sustainability involves environmental, economic, social and political issues. The challenges in urbanization such as population growth, urban sprawl, poverty, inequality, pollution, congestion, and mobility need to be addressed to achieve a sustainable, livable, economical and energy efficient urban form. This paper aims to highlight the urban sustainability issues that arise due to the rapid development of transit corridors by analyzing the changes in land use structure and urban form in relation to a transit-oriented development.

Published by: N Praveen, Emline Madonna R. Jose

Research Area: Transit Oriented Development

Case Study

19. Power and Energy Management of a Household Photovoltaic-Wind System with Battery Storage

With the expanding power request and the persistently creating of sustainable power source advancements, battery energy storage systems (BESS) appear to be a critical piece of a keen network, giving numerous advantages, for example, lessening the power charge, diminishment of pinnacle request and taking care of the age with the demand side. In this investigation, a battery execution display is proposed for a private home with conveyed age from inexhaustible assets. Genuine irradiance and wind speed information estimated in two unique times of the year (i.e. summer and winter) have been utilized and mimicked for 24 hours. Battery stockpiling is an appropriate arrangement because of the quick reaction and adaptability. Incorporated with a smoothing usefulness, it can charge and release to lessen the power vacillations created by PV boards and wind turbine. Reproductions demonstrate that the picked moving normal calculation does not require a major battery measure, conveying acceptable outcomes even with a littler battery. Further, considering the request energy of the house and the created control, a normal power bend is processed at regular intervals keeping in mind the end goal to be traded with the utility framework and limit the power charge.

Published by: Akshaya. K. G, Devika. B, Subashini. V

Research Area: Electronics and Communication

Research Paper

20. Knuckle Finger Imager for Identification using Accurate Person Matching Score

A biometric system using finger knuckle patterns has recently drawn the interest of researchers worldwide. Compared with its hand counterparts, palm and knuckle parts has several unique merits. Knuckle print based biometric system is highly acceptable because these patterns do not disturb with injury and wound on the finger surface. However, geometrical and textural features have been used widely in most of the existing knuckle print recognition methods where an individual is verified by extraction of size, length, position and shape features. This paper presents a matching score scheme for personal recognition using novel inner knuckle print-based features i.e., knuckle distance based geometrical features, and texture features. The proposed method is tested on our in-house Hand database (720 images) collected over a span of 3 months. Finally, the test and training images are compared in terms of using fusion and decision algorithm.

Published by: Anchana. G. V., Ajima. R., J. Gayathri

Research Area: Digital Image Processing

Research Paper

21. Labour Productivity Model for Structural Elements by Varying Build ability Factors using Multiple Regression Analysis

Construction productivity is one of the most frequently researched topics due to its importance to the viability of the industry. Buildability is defined as the extent to which the design of a building facilitates ease of construction, subject to the overall requirements for the completed building. In this project, the major buildability factors hypothesised to influence the labour productivity of the main trades, i.e. formwork, reinforcing steel fixing and concreting, included grid patterns of footings and columns, type of structural framing system, geometry and dimensions of elements, height of floors, the degree of design rationalisation, standardisation and repetition of elements, reinforcing steel quantity and diameters, location and congestion of reinforcement, volume and workability of concrete as well as surface finish. In addition, and due to its importance to the productivity of the construction industry, the effect of the learning curve theory has been also examined in this study. This research project has quantified the relationship between the principal design characteristics of in situ reinforced concrete construction and labour productivity of the various trades involved. It can provide practical guidance to architects and structural designers who seek to optimise their designs. In addition, it can give a feedback on how well the designed building considers the requirements of the basic buildability principles and provides for tangible consequences of their design decisions on the construction labour productivity.

Published by: Anjali Narayanan K. M., Aswathi M. P.

Research Area: Construction Engineering and Management

Research Paper

22. Re-Imagining Organic Food Industry: Product Rationalization through Micro Segmentation

The Research study is being conducted to find the ways of micro segmenting the heterogeneous organic food produce market into different micro segments to find the deeper penetration and fragmentation, which enable the marketer to reach every possible micro segment. We are trying to find the benefit of micro segmentation on the organic food industry. The retail FMCG industry has commendably contributed to the development of the economy in recent times, where the degree of personalization of organically grown products to enhance health benefits is relatively high. It is also easier to promote a micro destination in comparison to a macro environment. The study is aimed at analyzing the awareness level of consumers towards organic food products. A structured questionnaire survey was rolled out to 384 household respondents of Bengaluru urban city in the south of India. Of the total households surveyed, 69% respondents have reported that the awareness of organic foods is strong. A logistic regression model was used to identify the most likely factors affecting the consumers’ awareness of organic food. The pilot study results using logistics regression analysis indicates that the urban potential organic food Bengaluru consumers' awareness level of organic food is significantly affected by factors such as income, education, occupation, marital status, product quality, health issues, and product source. The awareness is not affected by factors such as gender, age and product Trademark. Results of the study have great managerial implication in terms of promotions related to organic food products under the category Health & Wellness.

Published by: Nandish Manangi

Research Area: Consumer Analytics

Case Study

23. Integrated Collective Node Behavior Analysis with Onion Protocol for Best & Secured Data Transmission

Now-a-days communication from one place to another and transfer of data over the network has become an important part of our day to day life. Hence in order to make safe and secured data transmission in this communication process and to provide security to the data sent ‘Onion Protocol’ is used. Over here integrated collective node behavior analysis is done with Onion Protocol for best and secured data transmission. In Onion routing technique the sender and receiver remain anonymous. The sender remains unknown and anonymous because each intermediate node or onion router knows only the address or location of its preceding and following nodes.

Published by: V. Ohm Sri Eswar, Albert, Ankayarkanni B, B Vinil

Research Area: Netwoks

Research Paper

24. Gridlock Surveillance and Efficient Reconciliation

Now-a-days road congestion is a major problem due to increasing number of vehicles especially in cities.At present, video monitoring and surveillance systems have been widely used in traffic management.This project is designed in order to achieve effective traffic management. Here we use camera which is placed on the traffic pole that capture the image regularly in the traffic junction and calculates the vehicle density (approximately) in lanes using digital image processing technique. After calculating the density of vehicles, the high density lane is detected. According to that, the signal timing is allotted by using raspberry pi. This also provides facility to handle emergency vehicles automatically and efficiently by using IoT.

Published by: C. H. Jeevitha, S. Jeevitha, S. Jenifer, B. Mahalakshmi, S. V. Sathyah, S. Jeya Anusuya

Research Area: Digital Image Processing

Research Paper

25. A Study of Cost of Capital of ITC Limited

ITC was the first company in India to voluntarily seek a corporate governance rating. ITC's production facilities and hotels have won numerous national and international awards for quality, productivity, safety and environment management systems. This Study is based on the secondary data extracted from the annual reports of the company. The financial statements of ITC have been collected over a period of 5 years from 2013 to 2017. Companies strive to attain optimal financing mix based on the cost of capital for various funding sources. Every company has to chart out its plan for financing the business at an early stage. The cost of capital becomes a critical factor in deciding which financing track to follow – debt, equity or a combination of the two. The breakeven point is the sales volume at which a business earns exactly no money. The company calculate break-even point to determine the amount of remaining capacity after the breakeven point is reached, which tells the maximum amount of profit that can be generated.

Published by: B. Navaneetha, D. Nikhilaa, Mrudula. V. Raj

Research Area: Cost of Capital

Research Paper

26. Detection of Fake Indian Currency

Fake currency detection is a serious issue worldwide, affecting the economy of almost every country including India. The use of counterfeit currency is one of the major issues faced throughout the world now-a-days. The counterfeiters are becoming harder to track down because of their use of highly advanced technology. One of the most effective methods to stop counterfeiting can be the use of counterfeit detection software that is easily available and is efficient. Our project will recognize Indian currency notes using a real time image obtained from a webcam. The background of our topic is image processing technology and applying it for the purpose of verifying valid currency notes. The software will detects fake currency by extracting features of notes. The success rate of this software can be measured in terms of accuracy and speed. So our aim is to work on those parameters which will be impossible to implement on counterfeit notes so we started working on minutiae parameters which will be enough to differentiate between fake and original notes.

Published by: Gouri Sanjay Tele, Akshay Prakash Kathalkar, Sneha Mahakalkar, Bharat Sahoo, Vaishnavi Dhamane

Research Area: Computer Science

Research Paper

27. Estimation of Land Surface Temperature using LANDSAT 8 Data

Land surface temperature (LST) is an important factor in many areas like climate change, urban land use/land cover, heat balance studies and also a key input for climate models. LANDSAT Data has given a lot of possibilities to study the land processes using remote sensing. This study has been made to estimate LST using Arc GIS over Hosur, Krishnagiri district, Tamil Nadu, India, using LANDSAT 8 satellite data. The LST has been estimated with respect to Normalized Difference Vegetation Index (NDVI) values determined from the Red and Near Infrared bands. The Land Surface Emissivity (LSE) is retrieved directly from the Thermal Infrared bands. The present study focuses on ArcGIS Raster functions and Raster calculation using the LANDSAT 8 April and November, thermal Bands (10 & 11). The results are feasible to Calculate NDVI, LSE and LST with appropriate accuracy.

Published by: Anandababu D, Purushothaman B M, Dr. S. Suresh Babu

Research Area: Remote Sensing

Research Paper

28. Secured Data Access in Cloud Computing

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. This paper proposed some services for data security and access control when users outsource sensitive data for sharing on cloud servers. This paper addresses this challenging open issue by, on one hand, defining and enforcing access policies based on data attributes, and, on the other hand, allowing the data owner to delegate most of the computation tasks involved in fine grained data access control to untrusted cloud servers without disclosing the underlying data contents. Our proposed scheme enables the data owner to delegate tasks of data file re-encryption and user secret key update to cloud servers without disclosing data contents or user access privilege information. We achieve this goal by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re-encryption. Our proposed scheme also has salient properties of user access privilege confidentiality and user secret key accountability and achieves fine - grainedness, scalability and data confidentiality for data access control in cloud computing. Extensive analysis shows that our proposed scheme is highly efficient and provably secures under existing security models.

Published by: Mayank Milind Murdio, Shrirang Rajiv Paretkar, Saurabh Sanjay Vaidya, Rushikesh Gajanan Duve

Research Area: Cloud Computing

Research Paper

29. Parliament’s Power to Amend the Fundamental Rights

Constitution of a country is the basic law of the land which provides the rights and duties of citizen along with organization of government, its powers. All the constitutions are equipped with provision for amendment to cope with future needs of the people. This study deals with what extent and range of amendment can be permitted in case of the constitutions of USA, India and Ethiopia. The three constitutions are amendable according their amending provisions and that of India is more flexible to amendments when compared with other two constitutions.

Published by: Pratiksha Sharma

Research Area: Legal

Research Paper

30. Legalization of Prostitution in India

India is a country with high cultural and religious values but in protection of these two things the change which is the need of present time is not able to take place the prostitution is present not from nowadays it is there in the roots of this country and in this research article we will focus on this issue and the problems which are created due to not presence of the legal hand in this profession.

Published by: Nitish Chandra Tiwari

Research Area: Social Issue

Review Paper

31. Arrhythmia Classification Based on ECG Signal using LMA Classifier

Electrocardiogram (ECG), a non-invasive technique is used as a primary diagnostic tool for cardiovascular diseases. A cleaned ECG signal provides necessary information about the electrophysiology of the heart diseases and ischemic changes that may occur. The detection of cardiac arrhythmias in the ECG signal consists of detection of QRS complex in ECG signal, feature extraction from detected QRS complexes and classification of beats using extracted feature set from QRS complexes. Transmission of signals across public receiver networks is another request in which large amount of data is implicated. For both detection and transmission in ECG signal, data compression is an important operation and represents another purpose of ECG signal processing. Hence, in this research work, the best training method i.e. Levenberg Marquardt algorithm will be utilized for classification on the basis of validation checks or epochs with an optimization technique. The purpose of this research work is to classify the disease dataset using Bacterial Foraging Optimization (BFO) Algorithm and trained by Levenberg Marquardt algorithm on the basis of the features extracted and also to test the image on the basis of the features at the database and the features extracted of the waveform, will be tested. The advantage of proposed method is to minimize the error rate of the classification which occurs due to insignificant count of R-peaks.

Published by: Shikha Sharma, Aman Kumar, Astha Gautam

Research Area: Artificial Intelligence

Research Paper

32. Business Innovation and Entrepreneurship Development: An Approach to Hammer Unemployment in India

Innovation usually refers to finding new ways and ideas to create more productive techniques and processes. Innovation in business also means providing new value to your business in order to achieve economic stability. Entrepreneurship has been the subject of continual interest of economics in India and other Nations as well. The capacity and willingness to develop, organize and manage a business venture alongside all the risks in order to make profit is known as entrepreneurship. In this paper, we begin by providing an overview of why entrepreneurship has begun attracting the young brigade of the nation. We then discuss the literature that examines some of the causes and effects of undertaking the entrepreneurial act. We examine the characteristics that should be kept in mind by an aspiring entrepreneur before undertaking the risk. Government policies, schemes and initiatives for supporting and motivating young entrepreneurs though start up India action Plan has also been discussed in the research. There are several factors involved in the making of an entrepreneur who can make utmost utilization of his knowledge and skills and thus leading him towards employment generation for others which eventually leads to economic development of the country.

Published by: Neha Singh, Dr. BMS Bhadoria

Research Area: Management

Research Paper

33. Rainfall Trend Analysis for Chaliyar River Basin in Kerala

Statistic and probability plays an important role in scientific and engineering community (Ayyub 2011) because statistical tools help to detect spatial and temporal trends for hydrological and environmental studies. Major schemes or projects are formulated based on the historical behavior of environment under uncertain climatic conditions. Therefore, a study of trend assists to investigate the overall pattern of change over time in hydro-meteorological variables especially for water resources project on temporal and spatial scales. Rainfall has been widely considered as one of the starting point towards the apprehension of climate change courses. Various studies have indicated due to climate change, rainfall pattern is most likely to change which would have adverse impacts on lives and livelihoods of millions of people. Analysis of the general rainfall trend is vital in understanding the underlying features, for the purpose of forecasting and in identifying the changes and impacts that are very crucial for an agro-based economy like the one of India. Trends in data can be identified by using either parametric or non-parametric methods, and both the methods are extensively used. Testing the significance of observed trends in hydro meteorological time series has received a great attention recently, especially in connection with climate change. The changing pattern of rainfall deserves urgent and systematic attention for planning, development, utilization and management of water resources. In the present study, to analyze the trends of the rainfall series of each individual station, the popular statistical methods; simple regression method (parametric), Mann-Kendall test and Sen’s estimator of slope method (non-parametric) have been applied. Among which Mann Kendall test has been used to detect significance of the trends in the time series of the precipitation & Sen’s slope estimator has been used to find out the magnitude of the detected trend.

Published by: Rohtash, Dipti Tiwari, Dr. L. N. Thakural, Dr. M. K. Choudhary

Research Area: Rainfall runoff modeling (water resource engineering)

Research Paper

34. IOT Based Fisherman Border Alert System using ZIGBEE

In our regular day to day existence, we have overcome many incidents on Indian fishermen caught arrested or even killed by Sri Lankan navy. However, it’s an “unsubstantiated allegation”. Asserting that its personnel is not authorized to open fire in such situations, the major cause set to be the negligence of the anglers who aren’t aware of the Maritime borders. Indian fishermen enter Sri Lankan boundary unknowingly. In major areas it’s impossible to know the exact border without the help of the GPS, the GPS gets the coordinates from the PIC microcontroller and wireless transmission of information is transferred from ZigBee tracking unit to the monitoring unit that store the coordinate of the exact location and if the anglers cross the border the microcontroller signals the ignition to set off, so that the anglers don’t have to cross the maritime border as well as the life of the fishermen’s is saved and the coordinates of the anglers is sent to the listed members or the naval officers as SMS(Short Message Service) who can rescue the fishermen’s on time

Published by: Michael Raj. S, Lakshmi Sri Devi, C. S. Maheshwari, Sathish Sridhar

Research Area: Internet of Things

Research Paper

35. Design and Fabrication of Automatic Trash Removal Machine

In this project the proposal concept is to replace the manual work in drainage cleaning by automated system. We know that water has a great importance in human being life, the water flow in drain full of wastes like polythene, bottles etc. The drains get blocked due to these wastes in water. Drainage are using for the disposal and unfortunately sometimes there may be loss of human life while cleaning the blockage in the drainages. To overcome this problem and to save the human life we implement design “Trash Removal System”. We designed our project to use this in efficient way to control the disposal of wastages and with regular filtration of wastages. This machine also uses battery for power supply and is locomotive system.

Published by: P. Ramesh, Jabez Shiyan Varghese, Akhil Jose Manavalan, Akhil P. R, Adarsh. V. V

Research Area: Public Sector

Research Paper

36. Strength and Deformation Behavior of Concrete Made with Recycled Concrete Aggregates

With the development and modernization of societies, lot of construction activities are seen everywhere. These construction activities are increasing at faster rate by large amount. Also, the destruction of existing structures, which have reached their service life, runs parallel to the construction activities. It is not essential that the structures need to be demolished only after when they have completed their service life, but also due to change in fashion and ongoing trend of reconstruction of even healthy structures just for creating more space in order to meet the present demand. All such activities are generating waste in bulk, and this waste is called the Construction and Demolition (C&D) waste. Disposal of such C&D waste in a sustainable manner is a hard nut to crack for the builders, developers and owners. While the disposal of C&D waste is a challenge, on the other hand there is a severe shortage of naturally available aggregates for construction of structures. Reduction of this demand in a small way is possible with the recycling or reusing of construction and demolition waste generated from the construction activities. Hence, the recycling of demolished waste is a sustainable solution of C& D waste. Recycled concrete aggregate have limited application as fill and sub grade material below foundation of structures, pavement etc. these applications are non-structural applications. However research has been ongoing all over the world especially in Japan, China, European countries and some part of India also, from last 50 year in order to find the potential implement of recycled aggregates as a structural grade concrete. The research work on “Strength and Deformation Characteristics of Fiber Reinforced Concrete made with RAC” is presented here and is one such attempt to establish the RAC as a structural grade concrete. This research work focus on mainly four structural properties of concrete i.e. Compressive Strength, Split Tensile Strength, Flexural performance and Flexural toughness. In this present study the experimental part is divided into two different series viz. Series-A (without fibers concrete mix) and Series-B (1% by volume Steel fibers in concrete mix). The natural coarse aggregates are replaced with Recycled coarse aggregates at different replacement ratios. Four replacement ratios are considered in this present study 0% (control specimens), 20%, 40% and 80% M-20 grade of concrete mix is considered in this study. In order to predict the flexural performance of RAC, 16 reinforced concrete beam specimens were prepared. The section was designed as under-reinforced section and tested on UTM for flexural behaviour under two point loading. Based on the results obtained it is found that on addition of steel fibers there is increase in almost all the structural properties of normal concrete and concrete made with recycled aggregates. The investigation indicated encouraging results for RAC beams, cube and cylindrical specimens in all respect, thus pointing to recycled aggregate concrete as potential alternative structural grade concrete of the 21st century

Published by: Ajay Singh Thakur, Gourav Soni, Ram Bharosh

Research Area: Construction Technology

Case Study

37. Automatic Smart Parking System using Mobile Application

Internet of Things (IOT) plays a vital role in connecting the surrounding environmental things to the network and made easy to access those uninternet things from any remote location. It’s inevitable for the people to update with the growing technology. And generally people are facing problems on parking vehicles in parking slots in a city. In this study we design a Smart Parking System (SPS) which enables the user to find the nearest parking area and gives availability of parking slots in that respective parking area with the help of android app and it mainly focuses on reducing the time in finding the parking lots and also it avoids the unnecessary travelling through filled parking lots in a parking area by making use of sensor which continuously detects the parking slots and with the help of android app user comes to know the status of the parking area. Thus it reduces the fuel consumption which is eco-friendly and in turn reduces carbon footprints in an atmosphere.

Published by: Rajeshwari Banni, Usha D, Pooja M, Vijayalaxmi G, Madhu

Research Area: Android

Review Paper

38. An Efficient Community Question Answer (CQA) using the Metadata Rating

Community Question Answering (CQA) is the question answering process. Question Answering (QA) is the field of information retrieval and Natural language Processing (NLP). In this paper we mainly focus on lexical gap and word embedding problem. Here, the CQA aims to find the existing question which is equivalent to queried question. The other existing system of this paper is two novel category powered models. That is basic category powered model called as MB-NET and enhanced category powered model called as ME-NET. They are used to learn about the lexical gap and word embedding problem. The proposed system of this paper is to extend the metadata information easily using user ratings, like signals and Poll and Survey signals, into the learning process to obtain more powerful word representations.

Published by: G. Divyatharshini, P. Gokila Devi, S. Srimathi, A. M. SenthilKumar, R. Sureshkumar, M. S. Vijaykumar

Research Area: Computer Science

Research Paper

39. Study of Recycled Aggregate Concrete Containing Silica Fume as Partial Replacement for Cement

Recycle Aggregate Concrete (RCA) is the concrete product produced with recycled aggregate to replace part or whole of natural aggregate. The purpose of this study is to find the properties of RCA and compare the same with the concrete produced with natural aggregates2 Recycle Concrete Aggregate has also been described as “the most revolutionary development in concrete construction for several decades”. It has proved to be beneficial from the point of economic, environmental benefits and Preservation of non renewable recourses This thesis presents a study conducted on mechanical and durability properties of recycled aggregates concrete. The investigation covered concrete mixes at water cementitious material with ratio of 0.4. Ordinary Portland Cement of 43-grade was used in this study. The percentage of recycled aggregates that partially replaced natural aggregates by weight were 0%, 10%, 20%, 30%, 40% and 50%. Concrete cubes and cylinders were casted and tested in laboratories. The optimum proportion of replacement was found by conducting tests on mechanical properties like Compressive strength test and Split tensile strength test. The results show that the optimum replacement of recycled aggregates with natural aggregates was 30%. Up to 30% replacement, it is possible to gain the same strength as conventional concrete. Beyond 30% replacement the strength results following decreasing trend

Published by: Animesh Awasthi, Gourav Soni, Ram Bharosh

Research Area: Construction Technology

Research Paper

40. Effect of Process Parameters on Tensile Strength and Hardness Testing of Friction Stir Welding Joint of Aluminium Alloys with Different Tool Pin Profile

In this project, CNC Milling Machine is used to weld the parts together. The parts being welded are made up of dissimilar materials aluminium alloy AA5086 H32-AA6061 T6. The rotational speed is varied from 900 rpm to 1500 rpm while the welding speed is varied from 20 to 40 mm/min. The other parameter involved is the tool profile. The dimensions of the parts are (300mmx30mmx5mm) which are welded to form a butt joint. The effect of different tool pin profiles on the quality of the welded joint is also studied for welding. Different tool pin profiles considered are round threaded, circular/round and square. The tools are designed using Pro/E and are manufactured on a Lathe machine. After the parts are welded, various practical tests are performed on the welded parts that include the tensile strength and the Vickers’s hardness test. The experimental results proved that the highest tensile strength of the welded joint i.e., 28.65 N/mm2 was achieved with the square tool profile at speed 1200 rpm with feed 40 mm/min and the highest hardness value of 58 HV was achieved with the round tool profile at 1500 rpm and feed of 40 mm/min.

Published by: Pawan Parashar, Arun Patel

Research Area: Mechanical Engineering

Review Paper

41. Performance Evaluation using Data Analytics

In today’s world large amount of data is generated in the organizations. Analyzing and proper utilization of this data is very essential. Financial data is the backbone of any educational institute or organization. It portrays a broader picture about the current status and the future prospectus of the organization. If an organization is financially stable only then it can withstand in the market for a longer period of time. In order to achieve the status of financially strong organization, predicting the financial trends for coming future is a necessity. In order to predict the financial trends it requires to carry out a process of examining financial data sets to draw the conclusions about the behavior of the information they contain increasingly with the aid of specialized systems and softwares. All of this can be achieved by Data Analytics. Data Analytics predominantly refers to assortment of applications from basic intelligence, reporting and online analytical processing to various forms of analytics. In this paper we propose Data Analytics as a method for performance evaluation over educational organization's financial data.

Published by: Sahil Kirtane, Sushant Kotwal, Dr. Sunita R. Patil

Research Area: Data Analytics

Research Paper

42. EBMT Sindhi to Hindi Sentence Translation System

Example Based Machine Translation (EBMT) is the system which translates sentences from Sindhi to Hindi. It uses the parallel corpus for translating sentences. To handle large volume of data the computational model is required. The requirement for a computational resource in EBMT is significantly less as compared to MT (Machine Translator). This makes development of EBMT systems for Sindhi to Hindi translation feasible, where availability of large-scale computational resources is still scarce. Example based machine translation relies on the database for its translation. The software helps to get a sentential translation according to semantics and syntactic of the language. The frequency of word occurrence is important for translation in EBMT.

Published by: Nisha S. Tathe, Jayasha S. Kriplani, Shiwani S. Deshmukh, Nikita K. Sadrani, Monika A. Panjwani

Research Area: Computer Science

Review Paper

43. A Review Paper on Resume Portal

In this era, everyone need automated things. The things which will be handled automatically. So proposed system is Resume Portal. This portal will provide an easy way for any company and HR to get the candidates of their requirements. In this portal, a unique subdomain for every user is provided. So in case if any HR want to see any one’s profile, they will just hit the URL (subdomain) and will get the user profile. User can build their resume on the portal, they can even customize their fields. Companies can reply on this portal, User can see the vacancies. This will definitely reduce the manual work, user don’t have to carry any kind of hardcopy with them. Work will be done automatically and efficiently. Resume will be created and updated according to person’s information. In this portal, we are also providing different kinds of themes for user so that resume of the user will be attractive than others. Anyone can share their resume in this portal from anywhere. This portal is also predicting the personality of the user by seeing the objectives which user will provide. This will be very efficient to judge the personality of the user by HR. So this portal made to reduce the manual work and to do the things fast and efficiently. It is also more secured and highly authenticated.

Published by: Khushbu Dipakrao Ingale, Prachi Padmakar Kamble, Samruddhi Anil Nirmal, Meghnakashyap Sunilkumar Pandey, Shruti Sanjay Nehulkar

Research Area: Computer Science and Engineering

Research Paper

44. Design and Development of Android Application ClgPay

An android application which stores a basic information about an college student, which he/she will be able to access it through the college Id card by scanning the barcode. Through this application the student will also be able to pay the college fees, and the library fees online.

Published by: Shrunkhal Wankar, Rushikesh Kamde, Akash Gaurkar, Akash Shahu

Research Area: Android

Review Paper

45. An Energy Efficient Intelligent Lighting System of LED Based on Motion and Wireless Technology

This project proposes a framework to implement an intelligent lighting system. The main reason for developing such project is that maximum energy is wasted due to inefficient use of the consumer appliances. To be specific, a light accounts for a huge part of the total energy consumption. Though there are number of light control systems are introduced but most of them are outdated. This is because the existing light control systems cannot be applied to home and working place successfully. The ARDUINO UNO R3 is used as the main component which interfaces IR sensor, LUX sensor, GAS sensor and GSM module. LUX sensor is used as light to digital converter which senses the brightness and with the help of ARDUINO. This will reduce the intensity of the LED according to the surrounding, by this the energy consumption is reduced. The main advantage of the usage of the IR sensor is, it can count the number of individuals entering into the room and according to that it will improve the intensity of the LED. Here we added an additional features which can able to detect the gas and notifies through GSM to a phone. These technologies have been concentrated more so that this system can be used in domestic applications.

Published by: Satheesh Kumar R, Nandhini M, Safana Annesh M, Swapna M S, Narmadha M

Research Area: Electrical Engineering

Review Paper

46. Energy Management Solutions for Pumping Stations and Industries

There is more energy losses in today’s world. Due to this our future generation will be suffered. Most of the energy losses take place in industry only. Due to this the energy tariff and investments are also increased in it. The energy losses can be minimized by energy auditing techniques. By this technique we can minimize the energy losses. Even tariff and investments can also be minimized. Our project is based on energy auditing techniques only. We have chosen two main places in which the energy losses takes place more in it. By energy management solutions the energy losses in industry and in pumping stations can be minimized. We have taken the water pumping station of Tamilnadu government water supply system in Manalmedu, Trichy district and manufacturing industries of GES solutions private limited, Gandhipuram, Coimbatore for energy management solution and we have given a solution for them to conserve energy for their future years.

Published by: M. Arumuga Babu, V. Pushpa , K. Saranya , M. Manjula

Research Area: Electrical

Research Paper

47. Design and Optimization of Existing Automotive Seat Recliner

The automotive industry is changing very rapidly. New components are introducing by automotive manufacturer in manner of improving passenger’s comfort and safety as well as aesthetic. Safety and comfort of occupant are very important. Recliner of automotive seat is a mechanism which is give rotation to seat back forward & rearward direction from a pivot point at the base of seat back according to the passenger’s seating comfort. Seat recliner is the most critical criteria in the design of seat structure in auto motive seat industry. The aim of this paper is to design and optimize the existing seat recliner subjected to loading. The scope of present work involves Finite Element Modeling of seat recliner assembly using HYPERMESH & ANSYS. The result in the form of stress, load and displacement are extracted using FEA result.

Published by: Akhilesh Pandey, Dr. P. K. Sharma

Research Area: Design and FEA analysis

Research Paper

48. A Comparative Study of the Methods of Solving Intuitionistic Fuzzy Linear Programming Problem

Ranking Intuitionistic Fuzzy Numbers plays an important role in decision making and information systems. Many researchers have proposed different ranking functions, score functions and signed functions for ranking Intuitionistic Fuzzy Numbers but unfortunately every method produces some anti-intuitive results in certain places. In this paper we compare different methods of ranking of Intuitionistic Fuzzy Number to solve Intuitionistic Fuzzy Linear Programming.

Published by: Dr. AL. Nachammai, Dr. M. Dhavamani, Dr. B. Usha

Research Area: Intuitionistic Fuzzy Linear Programming

Research Paper

49. An Efficient Framework Security Model of Sharing Data for Privacy Protection and Performance Based Outsource Data Sharing on Cloud

One of the most efficient cryptanalysis system of elegant data is stored and more data sharing file to be cached through cloud. Be the part of the unusual weakness is the pivotal administration block of notoriety over the appliances. One of the main disadvantages is the pivotal pledge complication. While transferring the confidential file from one system to another there is a chance to leak the data from the system and can lost the privacy. The front-end gadgets of customers like advanced mobile phones by and large have constrained security assurance, the personal pivotal exist completely maintained and customers hazard pivotal introduction especially not really seen however inalienably existed in past research. Besides, gigantic customer decoding overhead constrains the handy utilization of ABE. The proposed system is that a shared key administration convention in CP-ABE. The development acknowledges disseminated age, drawback along with capacity over personal pivotal left out including some additional framework. The efficient information prompt trait disavowal be accommodated vital pivotal refresh. An synergistic instrument successfully takes care of key escrow issue as well as key introduction. In the interim, it helps extraordinarily decrease customer unscrambling overhauls. The correlation thus alternative delegate the plans exhibits the plan made to some degree better execution as far as cloud-construct outsourced information partaking in light of cell phones and thus enhance the security and privacy protection. At last, we give evidence of security to the proposed convention.

Published by: Kiren Vijai, Syamamol T, Merlin Mary James

Research Area: Network Security

Research Paper

50. Real Time Heart Behavioral Informatics System using Internet of Things

Now a days, as many people suffer from heart disease and it becomes difficult and time comsuming process to detect heart disease. so with the help of new techniques like Internet Of Things(IOT) it becomes easier and faster to detect heart abnormalities and their stages.so with the help of sensors like level sensor, heart beat sensor and temperature sensor we are monitoring patients. for detecting abnormalities we set some threshold limits and we compare them with patients monitored values. Thus with the help of this system we can reduce the death rate and patient can be easily diagnosed.

Published by: Sayali Kadam, Shireen Jikare, Saniya Shaikh, Vrushali Vedpathak, Nitin Talhar

Research Area: Internet of Things

Research Paper

51. Advance Digilocker

This document offers a standardized mechanism to issue government documents to license holders in digital format and store them. This allows government-issued documents to be moved to electronic form and make it available for real-time access in a set of “digital repositories”. You may not need to carry physical document such as license, PUC, RC Book, Insurance. By using advance login (Using fingerprint) and Adhar card Scanning, it will get an image of the finger and then it determines the pattern in an image, matches the pattern in pre-scanned images. The document verification will be done by OCR (Optical Character Recognition). It will scan vehicle-related documents electronically and will convert images of a text to the characters. Reduce administrative overhead of Govt. departments and agencies and make it easy for the residents to receive services.

Published by: Akshay Umesh Zade, Shubham Madhukar Shiwarkar, Khushali Chandrakant Umate, Anushree Arvind Kawley, Payal Narayan Telrandhe, Bhagyashree Bhoyar

Research Area: Android and Web Devlopment

Review Paper

52. Intelligent of Automatic High Beam Light Controller

Headlights of vehicles great danger during night driving. The drivers of most vehicles use high, bright beam while driving at night. This causes a discomfort to the person travelling from the opposite direction and therefore experiences a sudden glare for a short period of time. This is caused due to the high intense headlight beam from the other vehicle coming towards the one from the opposite direction. In this project, an automatic headlight dimmer which uses a Light Dependent Resistor (LDR) sensor has been designed to dim the headlight of on-coming vehicles to avoid human eye effects. This automatically switched the high beam into low beam, therefore reducing the glare effect by sensing the light intensity value of approaching vehicle and also eliminated the requirement of manual switching by the driver which was not done at all times. Arduino Uno software was employed in designing the project. The system device was able to automatically switch the headlight to low beam when it sensed a vehicle approaching from the opposite side using LDR sensor.

Published by: K. Sheeba, J. Gowthami, V. Gunavathidevi, M. Malathi, S. Sangeetha

Research Area: Electrical Engineering

Research Paper

53. Hostel Girls’ Security System

Nowadays as the crime rate has increased, security is an essential factor for girls. So, this proposed system is “Hostel girls’ Security System” helps to provide security. This proposed work enlightens upon the technology advancement in the field of security. In this, the concept of fingerprint authentication will be used as a special identification. So, whenever the girl wants to leave the hostel, she will enter her in-time and will carry a security module with her which is a mobile application. When the girl is in danger, she will press the key on the security module and one message will be sent to the warden’s mobile, also the message will be sent to the parent’s mobile number along with the location of that girl. The technology used in the system is based on the fingerprint, GPS modem. This system will be helpful for girls in the different organizations.

Published by: Anushree Bobhate, Dnyaneshwari Chutke, Mayuri Udan, Kajal Pal, Pranjali Hulke

Research Area: Computer Science

Case Study

54. E-Swatch Bharat using Cloud Computing

This provides facility to post and upload complaints regarding of any ragging complaints, table chairs on the public road or in the footpath, Parking Complaints, Water Drainage etc. Citizens can send complaints with their complaint description and send to the authorized person. And once the complaints are posted, automatically the complaint will be emailed to the respective person depending on the complaint type. And after the complaint resolution, the concern person has to upload the solution provided picture of respective complains made by the citizen, so that the higher authorities can also will come to know that whether the issue is been solved or not and can look over the cleanliness of the city without any delay made.

Published by: Pavana Baligar, Anjuna P Honnikoppa, Sanjuna P Honnikoppa, Priya P Patil

Research Area: Cloud Computing

Research Paper

55. Designing of Prediction Based System for Training and Placement in Education Institution

This paper is about to develop a web based application which can examine student ability to crack aptitude test conducted by various companies during their campus recruitment drive at the beginning of their final year. This would help them to know their week points at early stage and improve their skills before they appear to aptitude test.

Published by: Sandip Mahato, Sarang Gadge, Rohan Meshram, Lokesh Tabhane

Research Area: PHP,Training and Placement

Review Paper

56. Automatic Cleaning of Solar Panel with Maximum Power Tracking by using Arduino

Sun energy has tremendous scope for solar energy. Solar energy is the best form of energy to fulfill the energy needs of India and bridge the energy demand-supply gap. Solar energy is the endless source in which PV is the third renewable source in terms of global capacity. Due to transition of the Sun from east to west, the fixed solar panel may be able to generate optimum energy. The solar panel coupled to the stepper motor to track that maximum sun light. This is better compared to fixed panel method. The solar PV modules are generally employed in dusty environments. It reduces the power generation capacity of the module. In order to regularly clean the dust, a automatic cleaning system has been designed, which senses the dust on the solar panel and also cleans the module automatically. This automated system is implemented by using Arduino UNO which This project is to overcome the disadvantage of existing system. The solar panel tracks the sun as well as cleaning the dusty part by itself. Reduces the labours, maintenance, cost, power consumption, does not release CO2 and increases the efficiency. Without cleaning of solar panel 50% power will be waste for per month. It is applicable for large scale application.

Published by: R. Divya, K. Sheeba, J. Gayadhiri Dhevi, S. Sandhiya, S. Vennila

Research Area: Electrical Engineering

Review Paper

57. Design and Implementation of a Rescue System for the Safety of Women by using Arduino Controller

The main contribution of the paper is to develop a wearable armband for safety and protection of women and girls. This objective is achieved by the analysis of the physiological signal in conjunction with body position. The physiological signals that are analyzed are pulse rate sensor, vibration sensor and if there is any fault it additionally uses a fault detection sensor. Acquisition of raw data makes the Arduino controller function by activating the GPS to send alert messages via GSM and the wireless camera captures images and videos and sends images to the pre-decided contacts and also shares video calling to the family contact. The alarm is employed to alert the surroundings by its sound and meanwhile, she can also use a TAZER as a self-defense mechanism.

Published by: R. Pavithra, P. S. Sangeetha, M. Shakthi Devi, S. Vanila

Research Area: Electronics and Instrumentation

Research Paper

58. Smart Health Monitoring and Controlling using Raspberry Pi

In the recent development of Technology Internet of Things(IoT) makes all Devices connected to each other it can be monitored via internet via internet Devices can be controlled. In latest technologies, IOT gives a platform where the user can access anything from anywhere. Some of the applications of the Internet of Things are Smart Home, Connected Car, Smart Grids and Health Monitoring System. Health monitoring is the process by which the Patent Data (Temp of body, Heartbeat, E.C.G, Respiration etc.) is continuously updated on the internet website/App via the sensors connected to Patent. By IOT the patent data is easily accessed by doctors and doctors can treat well. By Health monitoring System the major advantage is that it reduces human error. In this paper discuss, monitoring& controlling Heart Beat, Temperature of Body and Blood Pressure using Arduino, Raspberry Pi, and Medication Box display on Internet Page.

Published by: Khan Adil Parvez, Prof. J. D. Bhosale

Research Area: Health Monitoring

Review Paper

59. A Review Paper on I2C Communication Protocol

I2C communication protocol is a well known and famous serial communication protocol developed by Phillips Semiconductor (now NXP Semiconductor) in the 1980s (nearly 25 years ago) to exchange information, especially between slow and fast devices. It consists of only two wires SDA and SCL and its ability to transmit data without loss makes it simpler and cheaper than other protocols. This paper is focused and aimed to present the valuable research work about I2C protocol by different researchers over the years.

Published by: Vivek Kumar Pandey, Sparsh Kumar, Vimal Kumar, Pankaj Goel

Research Area: Electronics and Communication

Research Paper

60. Hydrological Modelling in Narmada Basin using Remote Sensing and GIS with SWAT model and Runoff Prediction in Patan Watershed

Future runoff prediction is linked to a prior knowledge of future probable precipitation amounts. Hydrological models are a way that can enable transforming observed precipitations into stream flow. In this work a GIS based hydrologic model, SWAT is used in an Upper Narmada River basin at Patan in Jabalpur (M.P). The importance of this thesis comes due to Upper Narmada River is a river in which every year the discharge amount varies according to the weather condition. Some of the months the river is flooded and in some of the years the river is in drought condition. Due to this reason it will be very useful if we can roughly predict the runoff amount. Depending upon the river discharge amount we can decide whether there will be flood or drought condition in the watershed.The catchment area for this watershed has an approximate drainage area of 3950 km2, which is divided into 97 sub basins and 907 HRUs.SWAT model is developed to evaluate different parameters of the water resources like rainfall runoff modelling, sedimentation, eco-hydrological behavior of the watershed. SWAT tool with QGIS software to simulate water runoff for PATAN Watershed in Narmada river basin. It is concluded that the value of R2 can be considered reasonably satisfactory for estimating a watershed runoff. The value of R2 is 0.715.The results from the SUFI-2 calibration process indicated a good performance with a PBIAS value of 12.6% and R2 value was 0.83 indicating a good correlation between observed and simulated values. For the validation these value of R2 and PBIAS are 0.79 and 10.6 % respectively. Results showed that the annual mean flow discharge for the period 1996 to 2005 was 612.52 m3/s which agreed with the model result which shows that the average annual basin simulation values was 524.92 m3/s for the same period. While result simulation for the period 2016 to 2050 gave 414.70 m3/s which mean there is a reduction in mean flow discharge between two periods about 20.99%.

Published by: Dipti Tiwari, Dr. H. L. Tiwari, Rohtash Saini

Research Area: Civil Engineering

Survey Report

61. Making Different Types of Map for Watershed Management using Q GIS Software for Rural Areas

Civil engineering is about developing and sustaining infrastructure. The profession covers many areas of interest and a broad range of expertise. As a result, civil engineers work with a voluminous Amount of data from a variety of sources. Geographic information system (GIS) technology provides the tools for creating, managing, analyzing, and visualizing the data associated with developing and managing infrastructure. GIS allows civil engineers to manage and share data and turn it into easily understood reports and visualizations that can be analyzed and communicated to others. This data can be related to both a project and its broader geographic context. It also helps organizations and governments work together to develop strategies for sustainable development. Thus, GIS is playing an increasingly important role in civil engineering companies supporting all phases of the infrastructure life cycle.

Published by: Amit Balaso Baravkar, Neelam S Mane, Madhuri R Saste, Pratiksha N Mulik, Rajat H Sabale, Bobade S S

Research Area: Civil Engineering

Survey Report

62. Computer Vision in Self Driving Cars

In this paper, the examination of the current state of the art in Computer vision with self driving cars has been discussed. The main points which discussed here are the units of self driving car, the core components of self driving cars, Safety problems of road vehicles are also presented. A Self Driving car is a vehicle that is capable of sensing it’s environment and able to do the necessary navigation without the human input. The main idea which has been discussed here is General in-vehicle driver support system architecture. To detect and track vehicles and other kinds of objects often with different sensors are used. Thus giving humans the capability of using self driving vehicle for daily usage will change the current scenario of transportation and helps to improve the user driving experience

Published by: Prateek Sawala, Shalini Puri

Research Area: Autonomous Vehicles

Survey Report

63. A Survey on IOT Based Smart Garbage Monitoring System

Waste management is a big issue in the world. Many countries provide different methods for garbage management and maintain cleanliness of surroundings. In India there is improper waste management and people also not maintain the cleanliness of environment. At many places the garbage containers are overflow but GCT(Garbage Collection Truck) not arrives. Also with increase in population of country current garbage collection system not capable to maintain the green environment. There are many kind of problems arises due to improper garbage collection like ugliness of environment, spread many diseases. There are various techniques comes out for monitoring garbage collection. In this paper we study and discuss this various techniques for garbage monitoring.

Published by: Sayali Suryakant Chalke, Mohini Bhalerao, Swapnali Bangar, Dhanashree Gaikwad, S. G. Dhengre

Research Area: Internet of Things

Research Paper

64. Mapping of Organization using Google Map

Most of today's enterprises conduct knowledge management initiatives for achieving competitive advantage. Information technology plays a key role in codifying knowledge and distributing it throughout the organization. Ever since AutoRoute Express was launched for Psion's 3a palmtop in the mid-1990s, route planning and city mapping software has been very popular for palmtop computers. It makes sense, really. Rather than carrying a bulky guidebook or laptop with you, just rely on your PDA to tell you where you are and what restaurants, clubs and other attractions are in the immediate vicinity.

Published by: Aradhya N Sasi, Dr. A. V. Senthil Kumar

Research Area: Computer Application

Review Paper

65. Cloud Assisted Trend Analysis of Twitter Data using Hadoop

In today‘s highly developed world, every minute, people around the globe express themselves via various platforms on the Web and in each minute, a huge amount of unstructured data is generated. This data is in the form of text which is gathered from forums and social media websites, such data is termed as big data. User opinions are related to a wide range of topics like politics, latest gadgets and products. These opinions can be mined using various technologies and are of utmost importance to make predictions or for one-to-one consumer marketing since they directly convey the viewpoint of the masses. Here we propose to analyze the sentiments of Twitter users through their tweets in order to extract what they think and find out the most trending events happening around the globe. Hence we are using hadoop and amazon web services for sentiment analysis which will process the huge amount of data on an amazon ec2 hadoop cluster faster.

Published by: Aman Gupta, Ishaan Bhasin, Narinder Kaur

Research Area: Big Data with Hadoop

Research Paper

66. Seaweeds as Biofertiliser

Seaweeds were collected from Bhatye beach, Ratnagiri. Seaweed Enteromorpha was taken and different doses of it were given to Fenugreek plants in different tubs. The doses given were 0.1%,0.2%,1%,2%,5% and control of Liquid seaweed fertilizer. The plants with 1% Liquid Seaweed Fertilizer showed proper growth as compared with others with 1%as constant growth of Liquid Seaweed Fertilizer Enteromorpha, Ulva and Mixture of both were given to the Fenugreek plants. Here the plants with Liquid Seaweed Fertilizer Ulva showed nice growth with plants of size 6.7-6.9cms.Soil parameter like pH, Electrical Conductivity, carbon, Sulphur, Potassium were analyzed before and after addition of Liquid Seaweed Fertilizer. Soil parameters after addition of Liquid Seaweed Fertilizer were found to be increased.

Published by: Archita Atul Khanvilkar

Research Area: Bhatye Beach, Ratnagiri

Review Paper

67. Power Quality Compensation by using UPFC

This paper deals with the performance of UPFC to the power quality in the electrical system. UPFC is used to improve the transient stability in power system. UPFC can control the power flow in the electrical power system. Unified Power Flow Controller can easily control the real and reactive power flow. For getting without significant losses in the function of electrical system to synchronization of voltage frequency and phase. The following factors are affecting the power quality in electrical system they are voltage sag, voltage variation ,interruption ,swells ,brownout ,distortion, harmonic noise ,voltage spikes ,voltage flicker etc.Comparing to normal standards these factors can produced the deviation in the power. UPFC can control the parameters like series impedance, shunt impedance, line voltage, current, active power, reactive power, oscillation damping etc. UPFC is able to controlling the parameters affecting from power flow simultaneously or selectively. Power factor is increased by using UPFC instead of STATCOM. By installing UPFC in the system we can improve the reliability and quality of power supply .Using inverter and rectifier the circuit model is developed. Simulation and Matlab results are given to validate the performance of UPFC.

Published by: P. Madhumathi, V. Lavanya, K. Thamaraiselvi

Research Area: Power Quality

Research Paper

68. Reading aid for visually impaired people

It is known that the technological advancements are increasing at a faster pace. But the utilization of technologies in various sectors is very low. Human communication today is mainly via speech and text. To access information in a text, a person needs to have vision. However, those who are deprived of vision can gather information using their hearing capability. It is known that most of the people find it difficult to detect the text from the paper and books. The proposed method is a camera-based assistive text reading to help a blind person in reading the text present on the text labels, printed notes from paper and books. The proposed project involves Text Extraction from the image and converting the Text to Speech converter, a process which makes blind persons to read the text. This is carried out by using Raspberry pi, where The Pi processes the text images and reads out the content using the speaker. Optical character recognition (OCR) is the identification of printed characters using photoelectric devices and Computer software. To use OCR for pattern recognition to perform Document image analysis (DIA). In this portability is the main aim which is achieved by providing a battery backup and can be implemented as a future technology. The portability allows the user to carry the device anywhere and can use anytime. This enables the use of text to speech conversion.

Published by: S. Muralidharan, D. Venkatesh, J. P. Pritmen, Purushothaman R, S. Jeya Anusuya, V. Saravanaperumal

Research Area: Embedded with Image Processing

Review Paper

69. A Review Paper on Software Cost Estimation using Fuzzy Logic

With the pace of time software cost estimation is one of the most tedious works in project management. The entire process of estimation is uncertain in nature because it relies upon some attributes which cannot be predicted during the early stages of development. After studying various research papers given by different researcher we try to explore soft computing techniques which can be able to overcome the uncertainty and imprecision in estimation. The crucial focus of this article is to investigate the importance of fuzzy logic technique in enhancing the effort estimation accuracy, using COCOMO II by characterizing input parameters using various functions for example Gaussian, trapezoidal and triangular membership functions and comparing their results. In our study NASA (93) dataset will also be used in the evaluation of the proposed Fuzzy Logic COCOMO II. After that deep analysis will be done by various membership functions and then will declare which function gives better results for maximum criteria when compared with the other technique.

Published by: Nishi, Vikas Malik

Research Area: Software Engineer

Research Paper

70. Automatic Subtitle Generation for Sound in Videos

The last ten years have been the witnesses of the emergence of any kind of video content. Moreover, the appearance of dedicated websites for this phenomenon has increased the importance the public gives to it. In the same time, certain individuals are deaf and occasionally cannot understand the meanings of such videos because there is not any text transcription available. Therefore, it is necessary to find solutions for the purpose of making these media artifacts accessible for most people. Several software proposes utilities to create subtitles for videos but all require an extensive participation of the user. Hence, a more automated concept is envisaged. This report indicates a way to generate subtitles following standards by using speech recognition. Three parts are distinguished. The first one consists in separating audio from video and converting the audio in suitable format if necessary. These second phase proceeds to the recognition of speech contained in the audio. The ultimate stage generates a subtitle file from the recognition results of the previous step. Directions of implementation have been proposed for the three distinct modules. The experiment results have not done enough satisfaction and adjustments have to be realized for further work. Decoding parallelization, use of well-trained models, and punctuation insertion are some of the improvements to be done.

Published by: Anshul Ganvir, Kunal Pal, Sanket Jagtap, Pranita Katole, Mayur Bhalavi

Research Area: Computer Science

Research Paper

71. Advanced Walking Stick for Visually Impaired

The generally available blind walking sticks are suitable of finding obstacle that touch the stick physically. It is helpful to a blind person but we here propose an advanced blind stick system that allows blind person to sense objects before stick touches them. This blind walking stick can sense what object it is. It uses Haar Cascade Classifier method to find out what he object is. Also it includes GPS tracking feature to find lost person along with other useful features. The system uses a microcontroller based circuit to handle the entire system functioning. The transducer is used to sense objects within certain range of the person and alarms the blind person. The type of object is announced through its speaker. Now this system also has a light sensing feature to give the blind person a sense of light. It signals the person if there is light or darkness so that he/she can know if it is night or has entered a very dark room/facility. If the person looses the stick the person can use an RF remote so the stick starts beeping and the person can find it. One more important feature of the proposed system is that the it allows the visually impaired one to send out an SMS message to his/her GPS location to the caretaker/relatives/loved ones of the person in case of trouble or being lost.

Published by: Tony Jose Eluvathingal, Misab P. V, Vishnu T. S, Anusree K

Research Area: Image Processing

Review Paper

72. Energy Audit in Small Scale Industries – A Review

The ongoing energy crisis and the lack of efficient energy conservation practices in most industries in India are of growing concern. To address this issue, this research investigates the possibilities of finding a solution towards reducing the energy wastage in small scale industries. An energy audit was conducted towards this purpose by identifying key areas which were compressed air, raw materials, exhaust gases and furnace. The audit started by studying the compressed air system. The faults present were identified and remedial measures were arrived upon. The audit then focused on the raw materials where raw material usage was studied. The thermal aspect of the audit was then conducted by observing the energy consumption in the industries. The energy wastage due to various factors was then quantified and improved designs were created, showing better energy usage. Such initiatives prove that scope for energy conservation in industries are immense and simple steps are sufficient. When the world is undergoing energy and environmental crisis, such precedence reviewed in this paper is essential to emulate by all sectors.

Published by: Ashwini B. Bobade, Prof. M. G. Walecha

Research Area: Industry Energy Audit

Research Paper

73. Development of Lost Articles and Reconciliation System for Post Office

A Post Office wants to improve its efficiency by delivering the lost letters and lost articles (which are sent in parcels) in a short period of time. Currently it takes about 3 months for a lost letter or a lost article to reach the correct destination. A machine reads addresses on letters. The ones, which could not be read by machine, are sorted by human intervention. Even after this, the address is not readable, it becomes a lost letter. Articles that fall out of the parcel become lost articles. When the sender/receiver calls up or contacts the post office for their letter/article, a manual note is made and then this note is sent to the warehouse where lost articles and lost letters are kept. The reconciliation process of finding the lost letter/article is manual and sometimes wrong letter/article(s) is sent. You have to develop a system, which captures the above functionality and reduce the turnaround time from 3 months to 10 working days. This is an Internet application. Users of the system: Employees of the Post Office. There are various groups for the system. For example, groups which have rights to enter master data, groups having rights update only articles or only letters, groups having rights to enter/update/delete data for complaints by customers, groups having the rights to reconcile etc.. User will start with the login page in which username and password are entered. This screen should also provide a functionality to change the password. To change the password, it should ask for the old password, new password and confirm the new password. [Please Note: You can additionally add the functionality of generating letters in the word format from the application. These letters will be sent to the customer and these will describe their complaint status and approximately when will they receive their lost item. There can be types of letters like Complaint Status Type, Additional Information Required Type, Lost Article Type, etc. The Complainants Address should be filled automatically in the letter from the database. A separate module for printing will be required

Published by: Deeksha K, A. V. Senthil Kumar

Research Area: Computer Application

Research Paper

74. Enhanced Protection Over Data Streams under Multiple Keys in Cloud

Upload the data streams to the cloud servers for the product evaluation; it is an important to many popular stream applications. And it is applying to many organizations. But at the same time, it is difficult to verify the result on the cloud computation, it leads to the issues of trust. Since the outsourced data streams are retrieved from various resources. In the existing system, each originator has a unique secret key. But when the multiple users tend to download the same file, it leads to some misconceptions. Hence, it extends to the multiple-key settings, whereas it doesn’t use any specific algorithm for encryption. In this paper, we mainly focus on the security. We propose an Advance Encryption Standard (AES) for the encryption. And also we implement an extra proxy server for the data reliability. Hence, in this project, we introduce the novel homomorphic verifying tag technique. For verify the inner product evaluation on the multiple dynamic data streams and then it extends to the matrix product verification. We use the random oracle access model.

Published by: K. Dhanabakiyam , V. Divya , R. Maheswari, E. Sathiya Jothi , M. S Vijay Kumar

Research Area: Cloud Security

Research Paper

75. An Efficient and Decisive Crowd Management System Based on RFID Technology

Management of crowded events are very challenging and complex task. Many people loss their life and dreams in every year because of the poor organization of crowded events. Radio frequency identication technology can be eectively used for managing crowded events. In this paper aimed to develop a crowd management system using RFID technology. RFID technology provides a wide verity of applications. The localization features of RFID technology is acclimate to classify and track a person in a crowded events. As compared with other positioning systems, the RFID technology providing more accurate result in indoor applications. We evaluates the achievements of our proposed crowd management method through a tested environment experiment. The result shows that our proposed method is very suitable for organizing crowded events.

Published by: Athira Soman, Smitha Jacob

Research Area: Networks and Communications

Review Paper

76. Study of Data Mining and Machine Learning for Intrusion Detection System

An interruption affirmation framework is programming that introduces a man or a system of PCs for dangerous exercises that are coordinated at taking or editing data or ruining system conventions. Most methodology inside the present interruption distinguishing proof framework can't offer with the intense and complex figure of digital assaults on PCs. Notwithstanding the way that solid versatile strategies like different methods of machine learning can cause higher prominence rates, bring down false thief caution rates and proper calculation and correspondence cost. Using information mining can bring about successive organization mining, order, bunching and minute information stream. This examination paper symbolizes an engaged writing outline of machine learning and information digging alternatives for digital investigation to get interruption acknowledgment. Predicated on the amount of references or the significance of rising strategy, printed material speaking to every technique were revealed, perused, and compressed. Since information are so essential in machine learning and information mining techniques, some notable digital information decisions inside machine learning and information digging are distinguished for digital security is appeared, in addition to a few hints about when to employ affirmed strategy get.

Published by: Mohak Chaturvedi, Atul Kumar Verma

Research Area: Cyber Security

Research Paper

77. Automatic Fan Speed Control using Temperature and Humidity Sensor and Arduino

The Study is aimed at controlling the speed of the fan automatically using Arduino, temperature and humidity sensors. Fan speed need to be manually controlled every time but by using this idea the speed of the fan will be automatically adjusted according to surrounding environment. The project is based on the concept of Internet of Things(IOT). A simple strategy to automatically control the speed of fan using DHT22 sensor. According to the temperature sensed by temperature and humidity sensor the resistance of the fan will be adjusted to change the fan speed. It’s fairly straightforward to use, however needs careful arrangement to grab information. DHT22, Arduino and LCD will get power from the same fan connection, so that less battery power is used. The temperature will automatically control. In the proposed system Fan can be set at rather high for lowered activity level that required limited body movement like sleeping and sitting. DHT22 sensor is used to sense the temperature and then speed of fan is adjusted accordingly using PWM. Here Arduino code is used. In this proposed system, it takes comparatively less time to process. It requires additional devices, external clock and for programming it requires development system.

Published by: Suraj Kaushik, Yuvraj Singh Chouhan, Nagendra Sharma, Shreyansh Singh, P Suganya

Research Area: Multidisciplinary Design

Research Paper

78. Under Pipe Traveling Robot to Detect Gas Line Leakage and Address Navigation to Cloud over IoT

The Internet of things (IOT) is the network of electronic devices, which are related to embedded systems and also other domains through the internet. The infrastructure of the kit is like a moving robot with two motors and it consists of a gas sensor to detect the gas leakages in the pipe. Gas pipes play very important roles for cities, industries and thus in growing economies. So, gas leakages lead to losses as well as are a threat because they can also lead to fire accidents. Placing sensors on each section of pipe is very costly. So here we propose an innovative robot that clings on to the outer surface of the gas pipe and moves with the pipe to check for leakages. The kit consists of an MQ2 gas sensor to detect the gas leakages. The robot will be moving continuously along the metal pipe, if there any presence of leakage the GPS sensor module will transmit the location to the cloud.

Published by: S. Jeya Anusuya, S. Venkat, R. Elangovan, P. Sunnyteja, M. S. Karthik, E. Jawahar Raj

Research Area: Internet of Things

Research Paper

79. Strength and Durability of Concrete Made with Marble Dust

As per preservation endeavors, this examination concentrates on the waste marble dust as partial replacement with cement. Concrete creation, the counter active action of ecological contamination with considering the components of reasonable and cost-sparing development ventures, particularly material utilization. Moreover, many of the construction industry in India produce construction waste that contributes largely to solid waste. Utilizing marble waste, this research will focus on marble wastes obtained from the construction industry in India. Presently, much of ceramic industries production goes to waste, which is not undergoing the recycle process yet. Replacement of marble dust of different percentage 5%, 10%, 15% and 20% of marble dust as partial replacement of cement with M-25 grade of concrete. The age of concrete at 7, 14, 28 and 56days.From the results of the study, samples of concrete with 0 to 15% marble dust replacement have reached optimum strength. Findings showed that concrete containing marble dust 0 to 15%showed the highest amount of compressive strength, and split tensile strength of concrete. Further studies can be carried out as this study only concludes that there is an increase in strength upto 15% replacement of cement by the marble powder. Further scope is to find out the optimal %age of marble powder to replace.

Published by: Shashank Dixit, Siddharth Nigam, Ram Bharosh

Research Area: Concrete Technology

Research Paper

80. Stellar Objects

Stellar object is more of an approach towards the universe we live in. It is a lookout for those school students who are intrested in the universe and the space. Written by 17 year old it talks about stellar objects,their birth, their death etc.

Published by: Simran Tuteja

Research Area: Astronomy

Review Paper

81. Privacy-Preserving Multi Keyword Search in Cloud Computing

The current study is intended to present an in-depth analysis of literature relative to privacy preserving multi-keyword search over encrypted cloud data. The multi-keyword ranked search that the study proposes has the capacity to post the exact matching documents only. This paper essentially seeks to fill the perceived research gaps from previous studies in multi-keyword search in cloud computing. To be precise, the current paper considers three peer-reviewed research articles concerning multi-keyword search in cloud computing. As such, it analyses the methods, approaches and techniques that have been proposed in each of the three studies while presenting viewing these aspects in a critical limelight. The central problem focused by each of the three selected articles is keyword privacy. This draws from the fact that despite the capacity of perceived approaches to generate cryptic trapdoors which conceals keywords, there is a possibility that cloud service providers through statistical analysis can estimate the keywords. The second concern that has been discussed in these research articles is trapdoor un-linkability. This arises mostly from deterministic trapdoor generation functions which gives the cloud service provider an easy avenue of accumulating keyword frequency. Lastly, surveyed studies also reveal concerns relating to access patterns whereby although a many of encryption techniques can be deployed to conceal the access pattern, there remains efficiency concerns with such encryption.

Published by: Mansour Alshaikhsaleh, Prof. Mohamed Zohdy

Research Area: Cloud Computing

Review Paper

82. 5G Technology: Future of Mobile Communication Outlook

In the future outlook of mobile communication technology, the various requirements are to be fulfilled as main objective which are high data rate, low latency, increased capacity and better Quality of Service (QoS). This paper presents a brief survey of 5th Generation (5G) network architecture and arising technologies to enhance the overall improvement in existing mobile technology. The backhaul concept is introduced to make the connection of dense small cells with core network.

Published by: Rashmi Verma, R. L. Sharma

Research Area: Digital Communication

Research Paper

83. Design and Analysis of IoT based LPG Cylinder Leakage and Weight Detection System

The main purpose of this paper is to portray a method of showing the level of gas in a gas cylinder so that it gives us an idea of the level of gas remaining in a cylinder. It can be used in homes as well as industries where gas cylinders are big and are almost impossible to detect the level of the gas. It enables the user to book a gas right on time so that user doesn’t have to worry about an empty cylinder. Furthermore, sometimes the leakage in the gas cylinder cannot be detected by human nose and requires more sophisticated equipment to detect these gases in order to avoid any mishap, in this project whenever Gas leakage is detected, there is a display on the LCD(3) along with a message sent through GSM(2) modules to our GSM(2) module alarming the user about this Leakage so that some action can be taken. It avoids accidents caused by GAS Leakage in cylinders. Furthermore, this project also includes Analysis of the gas used in every month, and will indicate which month has a high gas usage and similarly would also indicate months of lower gas consumption, it will help companies who manufacture gas cylinders for both domestic as well as Industrial purpose.

Published by: Manisha Varma, Shreyanka Manekar, Shraddha Paithankar, Amruta Amle, Yogesh Narekar

Research Area: Computer Science

Research Paper

84. Automated Reminder System for Cervical Cancer Patient

Cervical cancer is one of the leading cancer killers among women all over the world. Cervical cancer is the most common female cancer in developing countries, a woman dies of cervical cancer every two minutes. Its contribution to cancer burden is significant across all cultures and economies. However, in India, this disease is still killing up to 8,000 women annually. Fortunately, this cancer is preventable by screening for premalignant lesions but this is rarely provided and hardly utilized. So, to make them take screening test daily reminder must be sent and aware them about cervical cancer. The aim of this process is to assess the knowledge of cervical cancer screening among India women. An automated reminder is designed to send an automated message to the patient and remind them about the test and encourage them to take the regular test. These result in use of taking regular check-up and get knowledge about cervical cancer. These help to reduce the painful death of the women and get aware of the symptoms and causes of cervical cancer.  

Published by: Pooja Tetu, Tejashree Shendre, Vaishnavi Giri, Utkarsha Ghyar

Research Area: Medical

Research Paper

85. Impact of Next Generation Transportation Infrastructure Economy in Delhi-NCR

In the proposed study, Infrastructure of Delhi-NCR with transportation domain is considered. For intelligent transportation, infrastructure is required. Infrastructure is the foundation of the Indian economy and a vital contribution to each economic output. Enhancing mobility and decreasing traffic congestion are some of the biggest challenges facing smart cities today. Traffic congestion impacts the day to day lives of commuters, and additionally businesses and visitors to the city. To address this difficulty National Capital Region Planning Board organizers are hoping to smart transport solutions to decrease clog and additionally to advance the utilization of city open transport. Intelligent Transportation System usage for NCR will basically offer an exceptionally fit and mechanized travel administration stage to redesign benefit conveyance models and operational proficiency. This study will center around economics as a Tool for Transportation decision-making, Civil Infrastructure Development, advantages of Rapid Rails to associate Metro Rails, Economic Impact of Relief Routes, Costs and Benefits of Transportation, Pricing of Transportation Services, Engineering Economic Analysis, Bridges on Runnels, Impact of Tunnel streets in the foundation of Delhi-NCR to ease activity.

Published by: Samreen Nasir

Research Area: Research Paper

Review Paper

86. A Movie Recommendation System using Neural Networks

A recommender system or a recommendation system is a subclass of information filtering system that seeks to predict the "rating" or "preference" that a user would give to an item in use. There has been a lot of theorizing among the members of the artificial intelligence community concerning the way AI can help with the problem of successful information search in the reservoir of knowledge available on the Internet. Nowadays, deep learning’s advances have gained significant attention in the field of speech recognition, image processing, and natural language processing. Meanwhile, several recent studies have shown the utility of deep learning in the area of recommendation systems and information retrieval as well. Recommendation systems provide a solution to this problem by giving individualized recommendations. Content-based and Collaborative Filtering is usually applied to predict these recommendations. A combination of the results of these two techniques is used in this work in order to construct a system that provides more precise recommendations concerning movies. Also, deep learning methods are being increasingly used by popular media sites. The Movie Lens data set was used to test the recommendation system.  

Published by: Ajay Kaushik, Shubham Gupta, Manan Bhatia

Research Area: Machine Learning

Review Paper

87. Alumni Interaction System

The main aim of the project is to build an interaction between alumni, admin and the students .A system that will be able to manage alumni data of a college and provide easy access to the same. The alumni will also be interested to maintain relations with their institutions. Alumni can communicate to the students regarding job opportunities and the students can share the department technology activities to the alumni. The alumni and the student can communicate only through the admin permission. A system that will be able to manage alumni data of a college and provide easy access to the system. Final year students will be initially given a student login ID. Access to the system can help them in building connections to their projects or for placements. The system will automatically list all Alumni information their graduation and their status will be transferred from the student module to the alumni module.

Published by: Arpit Jain, Abhishek Gupta

Research Area: Alumni Interaction System

Research Paper

88. Safety of Construction Workers using IoT based MWSN Network

In this paper, a mobile wireless sensor network (MWSN) is introduced for the purpose of worker’s safety. Public authorities and Standard Committee sets the limit for the emission of dust, noise and other harmful agents based on the previous examination of endangerment for worker’s and resident’s health as well as environment. While emission crosses the threshold limit, the mobile sensor nodes send notifications to the operator, then the user can react to this information and takes quick action. For tracking the workers within the limited site, IOT based WSN network is widely used.  

Published by: D. Priya Dharshini, J. Saisudha, S. Sangeetha, H. Vishnupriya, S. Venkat, S. Jeya Anusuya

Research Area: Internet of Things

Research Paper

89. Data Transmission by Ceaser Cipher Wheel Encryption using Lifi

The paper describes a microcontroller based secured optical wireless communication system using laser and phototransistor. These days the usage of Wi-Fi has reached to every nook and corner of the world. There are some downsides belong to the usage of Wi-Fi such as those concerning to the speed, limited bandwidth, security and range of its usage. In order to overcome these hitches, we can use the advanced version of Li-Fi which is efficient, high speed, and fully networked wireless communication. If light contains encrypted message then both privacy and prevention from unwanted access along with high data rate can be achievable from Li-Fi. A new encryption technique based on substitution of ASCII value of characters implemented and reliable data transmission carried out. The proposed encryption algorithm primarily follows Caesar Cipher WHEEL substitution, acts similarly with Caesar wheel device by rotating circularly and changes the ASCII value of original message according to predefined values and length of repetition. Encryption of data, transmission, reception, and conversion to original message are implemented successfully using laser, phototransistor, and microcontroller and associated devices. The microcontroller performs as overall controlling and processing unit.  

Published by: S. Jeya Anusuya, S. Venket, V. Logesh Kumar, T. Manoj Gowtham, V. Goutham, R. Gowtham

Research Area: Embedded

Research Paper

90. A Survey on Smart Ration Card System

The Rationing dispersion framework likewise called open dissemination framework circulates nourishment things to poor people. Real wares incorporate rice, wheat, sugar and lamp oil. In this framework smart cards will be given rather than current apportion cards. Clients database is put away which is given by Government. The Smart Card must be examined by the client to demonstrate the points of interest of things assigned by government, and afterward it checks client subtle elements with put away information to convey material in proportion shop. Biometric i.e. Unique finger impression checking will be improved the situation security and verification reason.

Published by: Sadaf Pathan, Divya Borkar, Nikhil Chavan, Prasad Gaikwad, Ujwala Gaikwad

Research Area: Security using Biometrics

Research Paper

91. IoT based Smart Garbage and Waste Collection Bin

Squander administration is turning into a hotly debated issue in strategy urban communities. Municipal governments, which are to a great extent in charge of building and keeping up squander transfer systems, are quick to discover methods for limiting the cost of discarding waste and the sheer measure of waste society produces. Sadly, market and corporatist methodologies don't think about waste administration, rather leaving waste administration to nearby experts, and without government compulsion will as a rule not worry about condition benevolent item configuration, squander minimization or the reuse, re-assembling or reusing of the item toward the finish of its life cycle. We propose a framework which will have fundamental sensor like IR sensor to identify the measure of junk canister filled and discharge flag to the line following bot to gather the effectively isolated fluid and strong waste. The isolated waste will be simpler to dispose. Standard gathering of waste will make the encompassing a cleaner put.

Published by: Abinaya, Ritwiz Kaustoob, Mridula Vatsa, Nadeem Hassan, Shreyash Gharod Patil

Research Area: Multidisciplinary Design

Research Paper

92. Detailed Study of Mix Design of Self Compacted Concrete

The self-compacted concrete can be explained as an innovative product in Civil Engineering discipline in India. This product is necessary for civil engineers in order to win difficulty of workmanship. This product was first used in Japan and followed via Europe and United States. Sizeable research becomes achieved with regard to the residences of SCC due to the properly-controlled conditions. Examples of applications are proven, each for prefabricated concrete elements and in- situ structures. On this examine the location has been covered is making the layout mix of self-compacted concrete and it’s overall performance – financial comparisons with winning traditional grade of concrete of m-40 grade.

Published by: Ayush Agarwal

Research Area: Civil Engineering

Research Paper

93. Socio Economic Upliftment of Tribal Fishermen through Tribal Sub-Plan (TSP) at Arsha Development Block of Purulia District: An Economic Analysis

The Tribal Sub-Plan (TSP) strategy was evolved for the rapid socio-economic development of tribal people in the 5th Five Year Plan has the objectives of socio-economic development and Protection of STs against exploitation through legal and administrative support for narrowing the gap between their levels of development to that of the general communities. In West Bengal, Purulia District is one of the poorly backward drought prone, topographically severely undulating lands with inadequate irrigation and insufficient of all agricultural inputs. The present status of tribal people is very poor as a consequence they are migrating to neighboring district and state for their source of income. For the socio economic upliftment of tribal people, Tribal Sub Plan (TSP) was formulated and adopted in different districts. Fisheries sector embraces a large population of scheduled castes and scheduled tribes. Rehabilitation of scheduled castes and scheduled tribes families through fishery activities has become a major boon for upliftment of their economic status above poverty line.

Published by: Abhishek Majhi, Dr. Subhasis Bhattacharya, Sunanda Roy

Research Area: Agricultural Sciences

Research Paper

94. Influent of Overall Architectural Arrangement on Structural Elements Design

In designing a civil structure, difference professionals are involved from the conceptual stages through the constructions up to the final project stages. Because of this, there are different links which exist between different professionals which need to be addressed properly to obtain the best environmentally friend structure with adequate cost as well as strength and durability. In particular, when we look at the cooperation of architects and engineers, we may observe that they have some difficulty in working together harmony. This is due to the complexity of intangibility and tangibility as well as actual and abstract notion of the Architecture. Structural engineers focus more on tangible and actual notion of structures and detail aspects. On the other hand, Architects put great prominence on global and general aspects, such as spatial forms and atmosphere generated. This contradictory ways of thinking sometimes result in difficulty in communication [10]. Moreover, in the design processes, the general arrangement or structural form is chosen for a building at initial stage will normally determine the type of structure which will have to be adapted to support it and will perhaps also dictate the selection of structural material [4]. In fact the structural dimensioning of the previously defined morphological system results in it being a less trustworthy system, leading to a structure that is greatly susceptible to seismic damage This is because of the delinquency of relating the already defined architectural form and that of the structural design [11]. Furthermore, “reference [7]” quoting different architects ideas and stating: "All professionals need to learn the art of Architecture because it concerned altogether - John Ruskin. Le Corbusier said that “Architecture is the accurate, proficient, and the outstanding play of masses brought together in light”. For this reason, Architects and structural engineers need to have a better understanding of the joint works and carry out the activities in close proximity to produce a sound architecture.  

Published by: Gatbel Buony, Dr. A. K. Gupta

Research Area: Civil Engineering

Research Paper

95. IoT based Healthcare Kiosk

A lot of research has been carried out in the field of healthcare monitoring. In recent years, development of patient monitoring system has emerged as an area of research. In this article, a patient monitoring system is proposed. The proposed system framework integrated web services with multiple sensors controlled by Arduino Uno. We proposed a model which monitors various health parameters like heart rate (BPM), body Temperature, blood pressure (mmHg), height and weight of an individual. The collected data through the system is then transferred over the internet to a smartphone application as well as standalone computers. The doctor can then prescribed the medication based on the data results shown by the system. The designed prototype will reduce the burden on patients to visit the doctor every time for monitoring of these health parameters.  

Published by: Mayuri P. Bankar, Swati B. Khandave, Pallavi V. Kshirsagar, Priya P. Pathade

Research Area: Internet of Things

Review Paper

96. A Review on Plant Metabolites and Ayurvedic Medicine

From ancient times, Ayurveda has its own relevance and is known for its mystical effect. In Hindu mythology, during Satyug when Lord Hanuman went all the way to Himalayas to find a magical herb which had the power to cure any malady known as Sanjeevani booti (Selaginella bryopteris) to save the life of Lakshmana. Ayurveda marks its presence even today and has achieved different level of excellence. As it is said that Sanjeevani glowed in dark, so did the Ayurveda or science of life. It is an ancient system of natural and holistic medicine which broadly utilizes the secondary metabolites released from certain plants. Like in Ashwagandha various secondary metabolites are present like Withaferin A which has anti-cancer properties. It also has great effect on anxiety, diabetes, high cholesterol, arthritis, tumours, tuberculosis and a number of other diseases. Formation of memories can also be improved using Ashwagandha, so it is used to treat Alzheimer’s disease. In this presentation we will discuss the process for obtaining the secondary metabolites from various medicinally important plants. For obtaining these vital secondary metabolites a suitable extraction technique is also mandatory. Extraction is an important step for the isolation of phytochemicals from plant materials. A specific technique and optimization of various parameters can be utilized for the isolation of a peculiar type of secondary metabolites. In this paper we have discussed some of the main ingredients found in some of the most powerful medicinal plants which includes Withaferin A extracted from Withania somnifera, digoxin from Digitalis purpurea and Morphine from Papaver somniferum. We have also discussed some of the most suitable processes which are used for their extraction depending on their properties. Like in Withaferin A, we used solvent extraction and cell suspension culture for its isolation. We have also discussed their role in the treatment of present diseases. A newer approach is also introduced of derivatization of active ingredient which leads to its enhancing effect which can be highly useful to produce or synthesize more effective drugs.

Published by: Aastha Aeir, Anjali Setiya, Mansi Sharma, Shaili Bhatt

Research Area: Plant Biotechnology

Research Paper

97. Early Performance of Eucalyptus Clones in Vindhyan Region of Uttar Pradesh, India

The present study was carried out to assess the early growth performance of Eucalyptus clones in Vindhyan region of Uttar Pradesh for identification of promising clones for the region. A clonal trial was established in the year 2016 in Vindhyan region of Eastern Uttar Pradesh with 19 clones to assess their suitability. The results of early growth performance evaluation of these clones after one year of planting were carried out for annual measurements of survival, total height, girth at breast height (gbh), soil chemical and physical analysis. The data were analyzed statistically. The results of early growth performance evaluation of these clones after one year of planting were carried out for annual measurements of height, girth at breast height (gbh) and soil analysis. The data were analyzed statistically. The highest value of increment in gbh belonged to clones 526 (9.04 cm) followed by 2136 (8.84 cm), P-50 (8.53 cm), P-14 (8.33 cm), P-32 (8.04 cm), 2023 (7.88 cm) and P-13 (7.81 cm) respectively, whereas the lowest values belonged to clone 3021 with 4.70 cm and control with 2.97cm. The clones with good height were P-50 (4.04 m), 526 (3.82 m), 2136 (3.76 m) and P-13 (3.73 m) .The remaining clones had different ranks of gbh and height increments as compared to the control. The other clones had different levels and differed to each other significantly. Therefore, in future, promising clones may be recommended to be planted in agro forestry for this specific region.

Published by: Anubha Srivastav, Anita Tomar, Alok Yadav, S. D. Shukla, Yogesh Agrawal

Research Area: Agro Forestry

Research Paper

98. Urban SPRAWL Modelling for then using RS and GIS

Theni is the one of the Agricultural based city in Tamil Nadu due to the population increase its more urbanized. The urban Sprawl modelling for the Theni town was made and the comparative built up area was calculated. A comparative study of land use land cover of the Andipatty taluk under Theni district of Tamil Nadu was done using remote sensing and GIS techniques. The period under study was 2004-2017. Since in this 13 years there has been massive growth all over India the rate of growth was massive. Multi-temporal Landsat Imageries (LANDSAT 5 and LANDSAT 7) were obtained in this study. Arc GIS 10.4 had been used. Erdas Imagine 14 was used for land cover classification. It was classified into three categories: Built-up area, Vegetation and Water bodies. Land cover maps were generated and change detection analysis was performed. There was a steep rise in the built-up area and it continues to encroach on the forest and vegetation. There was also a second method where the area was digitized and land use was classified in ArcMap for two different years.

Published by: Pavithra Priyadharshini K, S. Suresh Babu

Research Area: Remote Sensing

Research Paper

99. Internet of Vehicle using Safety Case

In India, mortality rates are increasing mainly due to road accidents. Many lives could have been saved if emergency service could get accident information and reach in time. The main aim of this project is to implement a system for upgrading the present technologies used in the vehicle security by developing a safety case. The safety case is used for continuously monitoring and storing data regarding the vehicle, which will be easy to discover the cause of the accident by knowing the previous state of the vehicle. Our project is a combination of client, connection, and cloud system. In this, the status of horn, brake, and indicator will be stored in Raspberry Pi and data logger system. Our research has been targeted towards building a system for emergency rescue services in the event of a road accident. The project focuses on building a system which vehicle safety authorities can implement to enhance the reporting of vehicle crashes, provide post-crash analysis using motion sensors, a record of the event in images and reduce the time it takes for emergency rescue to arrive at the crash location. We have achieved this using existing cellular network infrastructure already in place and also using GPS to pinpoint the exact location of the accident and send that data immediately to an emergency rescue authority using telegram and Twilio service. Our main target was to build a low-cost infrastructure that everyone can afford and use in their vehicle.  

Published by: Amritha Pradeep, Asha T A, Athira K Ajith, Chinju Paul, Remya Bharathy K

Research Area: Electronics

Case Study

100. Recent Trends in Renewable Energy Sources in India

As India is in a league of the most rapid development taking place in the country, hence it has to produce more and more energy to meet the consumption of the people with increase in the population, as in India most of the power generation in India is carried out by conventional energy sources, coal and mineral oil-based power plants which contribute heavily to greenhouse gases emission. This focuses the solution of the energy crisis on judicious utilization of abundant renewable energy resources. This paper reviews the renewable energy scenario of India.

Published by: Ashutosh Mishra

Research Area: Renewable Energy

Research Paper

101. A Study on the Constructive based Teaching Strategies in Relation to Academic Achievement in English

Classroom teaching practice becomes more effective when it is well informed by an understanding of how students’ learn and learning will be more successful if students are given the opportunity to explain or clarify their ideas. So in terms of pedagogy, the development of education now requires teaching strategies that emphasize student involvement in their learning, where the focus is on knowledge construction rather knowledge transformation. The present paper is a conceptual paper focusing on the need and ways of adopting constructive based teaching strategies in the teaching and learning process of class VIII English.  

Published by: Dr. M. Harikrishnan, Firdose

Research Area: Education

Research Paper

102. Smart IoT based Passenger Monitoring System in Airports

In the civil aviation airport, how to ensure the security of passenger travel is the focus of the work. Therefore, we need to inspect the certificates of passenger for travel security, and the face recognition method is researched. An improved a face recognition method and inspection of Certificate methods are proposed for passenger travel security based on relevant rules algorithm. The facial features of people need to be inspected are extracted, and the relevant probability of facial features are calculated. The disadvantages of traditional algorithm are overcome. The experimental results show that can improve the airport security certificate inspection efficiency, the face recognition efficiency is improved, and the satisfying results are obtained.

Published by: P. S. Poojitha, R. Anitha, P. Naveen Kumar, S. Nikiil Gowtham, S. Niranjani

Research Area: Embedded Systems

Research Paper

103. Anti-Theft Vehicle Tracking with Automatic Police Notifying using Haversine Formula

Security, especially theft security of vehicle in common parking places has become a matter of concern. An efficient automotive security system is implemented for anti-theft using an embedded system integrated with Global Positioning System (GPS) and Global System for Mobile Communication (GSM). This proposed work is an attempt to design and develop a smart anti-theft system that uses GPS and GSM system to prevent theft and to determine the exact location of vehicle. In case of accident this system automatically sends the message for help to ones relatives. The preventive measures like engine ignition cutoff, fuel supply cutoff, electric shock system is also available. The owner can lock or unlock his/her vehicle with the help of SMS. This complete system is designed taking in consideration the low range vehicles to provide them extreme security. Tracking framework or system is getting to be progressively vital in expansive urban areas and it is more secured than different frameworks. The proposed work is cost-effective, reliable and has the function of preventing theft and providing accurate tracking system. A smart anti-theft system is one of the essential systems that homogenize both GPS and GSM systems. It is fundamental because of the huge numbers of uses of both GSM and GPS frameworks and the wide use of them by a great many individuals all through the world.

Published by: Abinaya, Shashank Aryasomayajula, Sarabjeet Singh, Rekhit Gupta, Pratap Sawant

Research Area: Securitty

Research Paper

104. Multi-lingual Voice based Email System

The process of Communication has become so easy due to the integration of various technologies with the Internet. Internet has now become one of the basic needs of day-to-day living. However, visually impaired people face a lot of problems in dealing with these services provided over the network. Even though many new advancement have been introduced, the visually impaired people find it very tough to take advantage of these technologies as a normal user may. Although, screen readers and audio feedback virtual systems have helped them immensely. Therefore, this paper aims at developing an E-mail system that will assist the visually impaired person to access these services efficiently. This architecture will also cut on the cognitive load taken by the user in typing the characters and also handicapped and illiterate people.

Published by: Divesh Jethani, Simmi Saluja, Saurabh Gautam

Research Area: Text to Speech

Research Paper

105. Fabrication of Compressed Air Engine using Double Acting Cylinder

The environmental pollution in the metropolitan cities is increasing rapidly mostly because of the increased number of fossil fuel powered vehicles. Many alternative options are now being studied throughout the world. One of the alternative solutions can be a compressed air powered engine. The main advantage of this engine is that no hydrocarbon fuel is required which means no combustion process is taking place. In this work, a pneumatic cylinder activation is used as a linear source and with the help of crankshaft, the rotational movement is obtained. The flow of air inside the pneumatic cylinder is controlled by means of the solenoid valve which is actuated periodically by an electronic control unit. As we completely changed the usage of existing conventional engine to a simplified air powered one, this new technology is easy to adapt. Another benefit is that it uses air as fuel which is available abundantly in the atmosphere. With the use of these technological advances this small concept of using compressed-air could really make a difference. The use of pneumatics could help save the fuel costs to a great extent. This concept mainly focuses on the non-usage of the conventional style fuels that have been used for centuries in automobiles and as a result, there has been a tremendous growth in the pollution sector especially in the busiest countries. Also, the anti-pollution measures taken by humans are very less so that means we are the verge of global warming which inflicts a great deal of disaster on a large scale human as well as other living population. Future modifications could render some major design revolutions that could let us use this in many sectors.

Published by: Lancy Cyril Benjamine F, Ravindran V, Prof. Suresh N

Research Area: Unconventional Fuels

Research Paper

106. Rating and Classification of Small Scale Shops using Machine Learning

Time and money are primary parameters which are considered while purchasing from any shop. When customers visit any shop, the visit should be convenient for that purpose many on-line rating applications are been made which helps the customer to know about that shop. Merchants can make a lot of promises to their customers but at the end of the day, consumers know merchant’s goal is to make a sale and understand that they will always showcase their products and services in their best light. For exactly this reason, we are going to implement one system which gives customers rating for the particular small-scale shop. Using this system any customer with a smartphone or mobile device can give a rating to a particular shop or can make the decision depending on that rating which is already given by other customers. Product ratings are generally understood as the evaluation by using stars or points.

Published by: Deepak Singh, Sinnarkar Jayesh, Divya Sharma, Aishwarya Satpute

Research Area: Machine Learning

Research Paper

107. One Touch Alarm System for Women’s Safety using GSM

This main project entitled “ONE TOUCH ALARM FOR WOMEN’S SAFETY USING GSM” describes about system for women’s safety using GSM. In the light of recent outrage in Delhi which shook the nation and woke us to the safety issues for women, people are finding up in different ways to defend. Here we introduce a device which ensures the protection of women. This helps to identify protect and call on resources to help the one out of dangerous situations. Anytime you sense danger, all you had to do, is hold on the button of the device. The device consists of a microcontroller, GSM module, GPS modules. When the system activates, it tracks the place of the women using GPS (Global Positioning System) and sends emergency messages using GSM (Global System for Mobile communication), to selected contacts and the police control room. The system resembles a normal button that can be embedded in any daily wearing obstacles like footwear or something. The project includes android application and a web part to implement the embedded system effectively. Admin, user, secondary number apps, local services and an embedded system are the importance user modules in this system. The device has to be connected wirelessly with the user’s android device to implement different processes that improve safety. Automatic system calls and location tracking can be done with one-time settings in the application. Intermediate alerts and calls can be passed to local services like state police, pink police, child care, women's rights commission etc with the help of implemented system. Admin is the one who controls and manages the whole system by providing important details. The main advantage of this system is that the user does not require a manual work unlike other applications that have been developed earlier. The system does not make delays in safety of women that may end up in big tragedies. The use of sophisticated components ensures accuracy and makes it reliable.

Published by: Remya E K, Dr. N. Revathy

Research Area: Computer Application

Research Paper

108. Importance of Plate Waste Assessment in a Hospital Kitchen

Plate waste assessment is a methodology used in the hospital inpatient’s kitchen to find out the amount of food that remains uneaten on the patients’ plate after a meal. This article describes the importance of performing plate waste audits in hospitals and how a plate waste audit can be done. This article also explains on the key personnel’s who can significantly contribute to plate waste reduction in a hospital kitchen set up.

Published by: S. Ramesh, B. Manimegalai

Research Area: Plate Waste Assessment in Hospital Kitchen

Research Paper

109. Device Control based on Wireless Virtual Reality Technique using Artificial Intelligence

Current technology and trend have made designing and implementation of embedded systems for home automation has increased the capabilities and features. There is a demand for smart home automation access via virtual reality. The proposed system allows the owner to access via virtual reality and control the home appliances. This is very easy to access. In this paper, we present the design and implementation of a low cost but yet flexible, feasible and secure virtual reality-based home automation system. In our proposed system we will try to control light, motor and 230v supply.This work also demonstrates the use of virtual reality in the context of the appliance control. In this project, we have used image processing techniques for image acquisition, pre-processing, image segmentation and feature extraction. The user commands are captured by the camera and transmitted through wireless communication to the receiver end. Thus our project has a huge scope for training and development business using a virtual image and setting up a virtual environment.

Published by: J. Dinijamma, V. Elakiya, K. Divya, S. Anandhi, S. Jeya Anusuya, G. Bhavani

Research Area: Embedded Systems

Review Paper

110. Time Series Forecasting using R

R provides many features to analyze and visualize time-series data. Time series modeling and forecasting are used for various business applications, such as exploring sales patterns and trends, predicting future sales and detecting unusual phenomena. This allows companies to reduce risk, increase profit and achieve cost-effectiveness. Several machine learning algorithms exist that can be used for forecasting, some of which already exist in the forecast package in R. In this paper, we aim to explore some of the commonly used techniques for predictions.  

Published by: Pankaj Garg, Harshit Arora, Rishabh Gambhir

Research Area: Forecasting in R

Review Paper

111. Catch Me If You Can – IoT based System

Catch me if you can is a project with the main idea to protect the lives of the fishermen by ensuring their safety when they are traveling into the sea for fishing. We propose to track and monitor them using a different approach. Most of the fishermen cross the borders knowingly. So this cannot be prevented. Instead, we can have a single point check to make sure the required devices are in their possession and some other things can be checked by scanning them using SCANDIT SDK which is integrated to a smartphone to ensure fishermen safety as well as national security. Also, we will provide an IOT device so that we can track the location of their boats and send alerts to them who may cross the border unknowingly through which may save them from getting caught by neighboring country's coast guards.  

Published by: Dr. S Padma Priya, Hemanth Krishna S P, A L A Vishnu Sai, B V Rama Pulla Rao

Research Area: IoT and Software

Review Paper

112. Home based Security System for Intruder detection using GSM module and PIR Sensors

The paper talks about the improvement of a home security and checking framework that works where the conventional security frameworks that are basically worried about controlling thievery and social occasion confirm against trespassing fall flat Home security is getting to be fundamental as the potential outcomes of interruption are expanding step by step. Parcel of Security organizations are accessible towards shielding house from getting vandalized or something like that. Yet at the same time there is no much assurance that the house be sheltered or regardless of whether the house vandalized, security staff protected and sound to answer to police close-by. This prompts property misfortune and harm. Parcel of research been completed utilizing sensors like PIR, Sensor Camera, GSM towards identifying the gate crasher at home.

Published by: Srieesh Padukone, Mohit ksh, D. Dhilip, Vineeth. V. Warrier, S. P. Maniraj

Research Area: Internet of Things

Research Paper

113. Audio-Visual Emotion Recognition using 3DCNN and DBN Techniques

Emotion recognition is difficult because of the emotional hole amongst emotions and varying audio-visual highlights. Propelled by the effective element learning capacity of profound neural networks, this system proposes to connect the emotional hole by utilizing a hybrid deep replication, which first creates varying audio-visual fragment highlights with Convolutional Neural Networks (CNN) and 3DCNN, at that point wires varying audio-visual section includes in a Deep Belief Networks (DBN). The point of this postulation work is to research the algorithm of discourse Emotion recognition utilizing MATLAB. Right off the bat, five most generally utilized highlights are chosen and separated from discourse flag. After this, measurable esteems, for example, mean, change will be gotten from the highlights. This information alongside their related Emotion target will be bolstered to MATLAB neural network apparatus to train and test to make up the classifier. The general framework gives a solid execution, arranging effectively over 82% discourse tests after appropriately preparing.

Published by: S. Kumari, U. Kowsalya, R. Preethi, R. Theepa, J. Edward Paulraj, S. JeyaAnusuya

Research Area: Signal Processing

Survey Report

114. A Survey on Detection of Glaucoma using Fundus Images

Glaucoma, an eye disease, is often referred to as the silent thief of sight. The damage done by glaucoma is irreversible. There are many types of glaucoma. Early detection and treatment of glaucoma is the only solution. Till date, many works have been done towards automatic glaucoma detection using Fundus Images (FI) by extracting structural features. Structural features can be extracted from optic nerve head (ONH) analysis, cup to disc ratio(CDR) and Inferior, Superior, Nasal, Temporal (ISNT) rule in Fundus Image for glaucoma assessment. But unfortunately, the works till date fall short of expected accuracy in this regard. A review of automated glaucoma detection techniques is presented in this paper.

Published by: B. Yamini, K. Srilatha

Research Area: Digital Image Processing

Research Paper

115. A Study of Professionalism of College Teachers

The present study is related to measurement of professionalism of college teachers and to find out whether is there any significant difference towards professionalism of college teachers as far as the gender of the teacher , teachers working in various faculties and teaching experience are concerned. In this study, a Likert type five point attitude scale of twenty statements was developed and used by the researcher. Fifty six teachers working in different stream of Rajkot (Gujarat) were selected as the sample, among them 28 were male teachers and 28 were female teachers. Analysis and scoring of the study were done by t-Test and f-Test. The findings revealed that Gender, faculties i.e. Arts, Science, Commerce & Education and teaching experience had significant effect upon teachers attitude towards professionalism

Published by: Mangal Laxmi Hulgul

Research Area: Comparative Education

Research Paper

116. An Experiment of Concrete Partially Replacement of Brick Kiln Dust

Sustainable resources management and development have been at the forefront of important issue concerning the construction industry for the past several years. Specifically, the use of sustainable building materials and reuse waste materials is gaining importance and becoming common place in many areas. As one of the most commonly used construction materials in the world, concrete composed of natural aggregate, natural sand, cement and water, out of these raw material for concrete, cement can be manufactured in industries but natural aggregates are non renewable resources and depleting at an alarming rate, results in scarcity of good quality natural occurring aggregates (coarse and finer one). In the present study the hardened properties like compressive strength, split tensile strength, and also durability properties like, CSAT and UPV test were carried out on Brick kiln dust concrete. The percentage of bricks kiln dust that partially and fully replaced by fine aggregates by weights were 0%, 10%, 20%, 30%, 40% and 50%. Experiments were conducted for both Ordinary Concrete and bricks kiln dust Concrete with different percentages of BKD. It is observed from the experimental results and its analysis, that the compressive strength of concrete, splitting tensile strength of concrete increases with addition of low Percentage of bricks kiln dust. The results show that the optimum replacement of recycled bricks kiln dust with fine aggregates was 30%. Up to 30% replacement, it is possible to gain the same strength as conventional concrete

Published by: Rahul Sharma, Ram Bharosh

Research Area: Concrete Technology

Research Paper

117. Study of Concrete as Partially Replacement of Cement with Coal Bottom Ash (CBA)

The coal-fired thermal power plants are the main source of coal bottom ash. Coal Bottom Ash is used as a replacement of both sand and cement depending on the size of bottom ash. The present study will provide the better understanding of mechanical and durability properties of concrete in which cement is partially replaced with bottom ash. The present thesis would contribute to the efforts being made in the field of concrete technology towards the development of concretes possessing good strength and durability properties along with economic and ecological advantage. Based on the study, valuable advice will be given to concrete structures. In the present experimental study, the various strength properties like the compressive strength of cement mortar and concrete and also durability properties like Acid attack and water absorption test on both ordinary concrete and coal bottom ash Concrete, best coal bottom ash concrete mix is carried out and compared with ordinary concrete mix for economic and ecological study. In this study different percentage of ordinary and ground coal bottom ash is used. It was found that with an increase in the amount of coal bottom ash, standard consistency, initial and final setting time increases at the same time workability of concrete decreases. It was also found that initial days strength is less for bottom ash concrete compare to control mix, but as the age increases, they show good improvement in strength due to the pozzolanic reaction. Optimum dosage is observed to be 5% GBA which shows more strength compared to control mix at 56 days. It was found that with an increase in the amount of bottom ash resistance to acid attack increases. GBA shows more resistance to acid attack compared to OBA. With the increase in the amount of bottom ash water absorption capacity of concrete increases, also as the age increases for all the mix water absorption capacity decreases. It was also found that at optimum dosage i.e at 5% replacement of cement with GBA it is also economical and also the amount of CO2 Emitted is also decreased that means it is also environmentally friendly compared to control mix.

Published by: Mohammad Sarfaraz Ansari, Ram Bharosh

Research Area: Concrete Technology

Review Paper

118. A Novel Approach of Sensorized Glove for Paralyzed Person

The master purpose of the paper is to build sensorized glove system, designed to provide a comfortable communication using synthesized speech for the convenience of the paralyzed person. Usually, a paralyzed people with half of their body paralyzed (speechless) communicate with society through their sign language which is difficult to be understood by the majority of people. The intended system is configured to solve this problem. The movement of user’s finger of this glove will be changed into synthesizing speech to carry an audible message to receivers. The glove is occupied with the no of flex sensors which are constructed using bend sensitive resistance element. For every particular movement, flex sensor generates a proportional change in resistance of various elements. This mechanism sends a unique set of signal to microcontroller and voice IC which is pre-programmed to give the desired command. Thus, the developed system is used to establish a communication bridge among paralyzed (or speechless) and normal person.

Published by: Shweta Dinkar Shendekar, Supriya Sanjay Hiwarkar, Shilpa Kailash Harne, Prof. Manish K. Shriwas

Research Area: Communication

Research Paper

119. Optimal High-Performance CMOS Self Cascode Current Mirror

In this paper, the current mirror presented, having low voltage and mixed mode structure has been proposed. The performance of self-cascade MOSFET current mirror is optimized with high output impedance and can operate at 1 V or below. This review paper presents a comparative performance study of self cascode current mirror with other current mirrors.To meet the need of the present era of low power portabale electronic equipment, many voltage design technique has been developed. This led to analog designers to look for innovative design technique such as self-cascade CMOS current mirror. In this paper investigate the merits and demerits of various current mirror circuit. For this first, develop basic current mirror and then cascode current mirror, Wilson current mirror and finally current mirror based selfcascode current mirror. The result is analyzed through spice simulation

Published by: Ancy Hassan, Nishi G Namboothiri

Research Area: VLSI

Research Paper

120. Data Leakage Detection and File Monitoring in Cloud Computing

In the virtual and cosmopolitan network, the method of redeeming sensitive information from the distributor to the trusty third parties continually happens frequently during this times. It is important to safeguard the security and durability of service based on the demand of users. In the present scenario, the transfer of data is an important thing for one user to another. Data is mainly sent by the distributors which are generally the owner of data to the user which wants the information. The information sent by the distributor must be confidential and must be shared by a secure way. Sometimes during sharing of data, multiple copies of information are generated by different parties which cause a huge amount of loss, this is known as data leakage. To prevent this escape of information one should place measures so as to discover the escape in associate early stage. When a user downloads a file, shares or views the file notification will be provided to the owner through email. When a user downloads or shares the file the date and time will also be recorded and log files will be maintained.

Published by: Niketa Kirdat, Nilima Mokal, Juhi Mokal, Aishwarya Parkar, R. V. Shahabade

Research Area: Cloud Computing

Research Paper

121. Journal on Speech to Text Conversion

Education is the basic asset of every individual in the society. Unlike others, the visually impaired student community is forced to be dependent on this aspect. As it is rightly said that '' Nine tenth of Education lies in Encouragement '', we propose SCRIBE BOT, a chatbot that helps this community ace their examinations. Scribe bot is an intelligent bot that is trained to read out questions and acquire the corresponding answers. The proposed system is a collaboration of artificial intelligence and machine learning coupled with voice recognition. We have used an algorithm which is a DNN-HMM hybrid. The necessary functionality like authentication which is implemented using rule-based approach is also included. The speech-to-text conversion and contextual pattern recognition are implemented as well. Thus our system overcomes the need for volunteers, bridging the gap between volunteer requirement and the visually impaired students. The proposed system can not only be beneficial for the visually impaired but also for the physically disabled community.

Published by: Dhanush Kumar S, Lavanya S, Madhumita G, Mercy Rajaselvi V

Research Area: Machine Learning

Research Paper

122. Bamboo as a Material for Various Structure

This report deals with fabrication, analysis, and testing of a Space truss roof using bamboo, also some properties of bamboo. The diminishing wood resources and restrictions imposed on felling in natural forests, particularly in the tropics, have focused world attention on the need to identify a substitute building material that should be renewable, environmentally friendly and widely available. In view of its rapid growth, a ready adaptability to most climatic conditions and properties, bamboo emerges as a very suitable alternative. In this work Analysis, Fabrication and Testing of 2 panel Space Truss roof has been performed on bamboo elements with various joints. Various techniques of joining bamboo were used in the making of the truss namely ‘Bevel Cut Bolted Joint’, ‘Fish Mouth Bolted Joint’. Compression, Tension, Flexural tests were performed on the truss. Bamboo, as a fast-growing renewable with a simple production process, is expected to be a suitable alternative for more traditional materials like concrete, steel, and timber.

Published by: Amit Balaso Baravkar, Priti Deokate, Pratiksha Patole, Sumedh Mulajkar, Sujata Ingale, Ganesh Sonawane

Research Area: Civil Engineering

Review Paper

123. Review Paper on Smart Irrigation and Farming Techniques

India is an agricultural country. The economy of India is dependent on the same. Agriculture in India is still carried out in conventional methods and lags behind in integrating modern technologies. To meet increasing population we need to increase our agricultural production and also we have to adopt automation techniques. Water scarcity in the agriculture sector is one of the savior crises in front of India. This paper gives an idea of existing irrigation techniques used in farming. The traditional water irrigation techniques such as channel system are causes over irrigation. The over-irrigation results in the decrease in quality of soil which affects the growth of the plant. The paper focuses on the modern irrigation techniques such as soil moisture sensor-based irrigation. Soil moisture controlled irrigation senses the moisture content in soil and according to that output in control pump or valve used for irrigation. This paper also focuses on measuring and maintaining soil temperature within permissible values. The paper gives a general picture of soil moisture controlled irrigation circuitry and its components. This paper consists of different methodologies used in farming techniques which help to overcome the water crisis in India.

Published by: Shobha S. Kumbar, Vishal Patil, Malaykumar Senapati, Ankush Patil, Shubham Sawant, Deepak Londhe

Research Area: Agriculture and Technology

Research Paper

124. IoT based Smart Self Tracking Automaton using Arduino

Internet of Things is an upcoming technology that transforms everyday physical objects into an ecosystem that would enrich our life and make it simpler. The problem is formulated using leader-follower pattern. Here, the leader is the person and the follower is the automaton. The automaton uses ultrasonic range detector along with Arduino to follow the expected leader. The ultrasonic range detector measures the distance by transmitting and receiving sound waves which is bounced back by the obstacle. The automaton recognises the person to be followed using ultrasonic sensors which detects the person through the ecolocation process.

Published by: Roopesh Kumar B. N, Sanath Ramesh, Vinuthashree R, Poojitha K. M, Mythri M. J

Research Area: Internet of Things

Research Paper

125. Smart Assistance for Blind People using Raspberry Pi

This paper addresses the integration of a complete Text Read-out system designed for the visually challenged. The system consists of a webcam interfaced with raspberry pi which accepts a page of printed text. The OCR (Optical Character Recognition) package installed in raspberry pi scans it into a digital document which is then subjected to skew correction, segmentation, before feature extraction to perform classification. Once classified, the text is readout by a text to speech conversion unit (TTS engine) installed in raspberry pi. The output is fed to an audio amplifier before it is read out. The simulation is just an initiation of image processing i.e. the image to text conversion and text to speech conversion done by the OCR software installed in raspberry pi. The system finds interesting applications in libraries, auditoriums, offices where instructions and notices are to be read and also in assisted filling of application forms.By using ultrasonic sensor we will measure the distance between the blind people and obstacle then the distance will be played through ear phones.

Published by: Dr. B. Muthusenthil, Joshuva J, Kishore S, Narendiran K

Research Area: Embedded Systems

Research Paper

126. Wireless Bomb Disposal Robot using Night Vision Camera

This paper presents the wireless bomb disposal robot which will help to improve defense of our nation from terrorist, suicide bombers and other such activities. In this project we are going to merge two applications that is spying and bomb detection. This Spy Robot is small robot with a night vision camera attached to it. The motors will be run by the relays which will be then controlled through Remote via RF module. This work is designed to develop a War field robot which is capable of detecting bombs land mines and which is wirelessly controlled through RF module. Input from the user is transmitted over sensor to the Receiver, where it is received, identified and given to the appropriate module (Robot) to act. The Robot consists of a Base, a robotic Arm and a wireless camera on it. We have used DC motors for movement of the robotic arm. As we are not risking the life of an bomb squad expert or any other solder or commando. Hence introducing the safest way for disposing the explosive to save life of common people.  

Published by: Aviraj Naik, Atiba Quresi, Amit Dubey, Nilam Hatwar, Pratiksha Pilley

Research Area: Electronics

Research Paper

127. Dual Axis Solar Tracking System

The aim of this paper is to present a solar energy collection technology by a photovoltaic cell. To present this efficient solar distributed generation system, a dual-axis solar tracker is designed. In this paper, we proposed the system of dual-axis sun tracking based on microcontroller AT mega 328. The tracker actively tracks the sun and changes its position accordingly to maximize the power output. Dual axis solar tracking system superiority over single axis solar tracking system is also presented.

Published by: Sayali Dubal, Kavita Bakale, Pranali Kumbhar, Komal Hake, Priyanka Pawar, Sharayu Bajare

Research Area: Power System

Research Paper

128. Travel Grouping

Many a time, while traveling between two places, people face many kinds of difficulties, some of them can be like traveling alone or, some induced problems because of it like having excessive traveling costs, having reservations about whom to travel with or without, security problems, etc. These problems, although may seem not so grave to some eyes, can have huge effects on some other people, who differ in opinion, a way of living, etc. Hence, to solve this problem, we have proposed this idea, of making a “Travel Grouping App” that will make use of the modern technologies and aim to reduce this problem. Our app will run on all kinds of Android-based devices. With the help of this app, people, who are initially unknown, but traveling between the same source and destination places, and on similar dates, and similar times can form a group of themselves, so that they can communicate with each other and hence resolve the above-mentioned difficulties that traveling alone can incur. There can also be further provisions and functionalities in the app, like common mailboxes, GPS tracking etc. Additionally, there will additionally be a website, for the same purpose, through which users would be able to register themselves with our service. All in all, through this paper, we try to explore the idea of making such an app, additionally associated with a website, where users can register themselves, form groups with people, who have similar kinds of travel specifications as themselves, contact each other, and travel together, thus reducing some of the problems.  

Published by: Prof. Prabu S, Vatsal Roop Rai, Rishabh Chanana

Research Area: Computer Science

Research Paper

129. The Serving Robo

This article describes the design and development of a Serving Robo which is considered as a possible solution to human automation. The robo technology will replace manual work throughout the world. In cafes, restaurants, hotels, and lodges, many individuals face a lot of problems due to abundant peak hours, the inconvenience of work and due to manual order processing these imperfections can be handled by using an electronic automation system called “Serving Robo” are used for ordering food, beverages, cleaning tables etc. The order from menu bar via kitchen is broadcasted on the wireless network. The menu bar includes LCD, Keypad, and Bluetooth module. When an individual places an order using the electronic menu bar. Using communication network the order is sent to kitchen and reception. Then food is handover to the individual.

Published by: Lubna Fathima, Salmiya Afsheen, Aishwarya .S. Acharya, Saniya Taskeen, Mohammed Elahi

Research Area: Robotics

Research Paper

130. Human Health Analysis

The main aim of the project is to give a profound examination on the exploration field of healthcare data analytics and also featuring some of rules and holes in past investigations. This investigation has concentrated on seeking significant papers about healthcare analytics. The paper has recorded a few data analytics instruments and procedures that have been utilized to enhance healthcare execution in numerous zones, such as medical operation, reports, decision making, prediction, and prevention system. The health data are obtained from the patients using web forms and the data collected are converted into an excel file which is encrypted and stored in the cloud. From the excel file, the input is given to R programming studio for data analysis. In R programming clustering and classification are processed to define the normal or abnormal conditions. For clustering, we used k-means algorithm and for classification, we used naive Bayes algorithm. Finally, the output is shown using Shinyapps.io web services  

Published by: Deepesh S

Research Area: Computer Science

Survey Report

131. Stock Price Prediction using Artificial Neural Network

Stock market prediction is the art of determining the future value of a company stocks. This paper proposes a machine learning (ANN) artificial neural network model to predict stock market price. The proposed algorithm integrates the backpropagation algorithm. The backpropagation algorithm is employed here to training our ANN network model. And in this paper, we have done a research on the TESLA dataset.

Published by: Omprakash Barapatre, Eric Tete, Chandan Lal Sahu, Domesh Kumar, Hira Kshatriya

Research Area: Neural Network

Research Paper

132. Public Integrity Auditing with Multi user Modifications

Cloud Computing has visualized as the next-generation architecture of IT Enterprise.A cloud storage system, consisting of a collection of storage servers, provides long time storage services over the internet.Storing data in third party’s cloud system causes serious concern over the data secrecy.In, this paper our main aim is, we allow the third party auditor on behalf of the cloud client, to verify the integrity of dynamic data that is stored in the cloud.The most general forms of data dynamic are modifications, insertion, and deletion.To, give them more efficient in handling the multi-users the ring signature is used by the privacy-preserving mechanism.When the data is stored in the cloud it has an only certain time limit to be present in cloud storage to overcome this time limit process we use hashing technique, this makes the data to be stored in a long period of time, by key generation process.And, also we use MD5algorithm for uploading the data and encrypted in hexadecimal form.

Published by: Kolachina. Amrutha, Dr. Prayala Shyry

Research Area: Cloud Computing

Research Paper

133. Automatic Sag and Swell Detection and Changeover for Clean Power

Phenomenon of voltage sag and swell happen directly from utility side or at customer side because of operation of certain types of equipment. Mitigation of such phenomenon is important as many of the equipments are sensitive to such conditions and may undergo irreversible damage. In recent years many novel systems for voltage sag and swell detection have been proposed albeit most of them targeted towards utility side voltage sag and swell detection and mitigation. Our present project is an attempt to develop customer side voltage sag and swell detection system based on embedded system. Again facility for automatic changeover of power source is considered to facilitate supply of clean power as long as the phenomenon exits. Hereby we present the concept, design and field results of our attempt.

Published by: Indrajeet Jadhav, Amol Thorat, Kamble A. A, Agane A. A

Research Area: Power System

Review Paper

134. Green Communications and Energy Efficiency

With the advancement of technology, there is a considerable increase in the usage of mobile phones and other telecommunication devices. Today we are in the development phase of building a Smart City. People want the technology to develop further because it has influenced their living. It is very difficult for a person to survive without using a mobile phone. In the earlier days, people used pigeons for communication. With the increase in technology many environmental problems arise because they consume power. CO2 emission has increased drastically during the last few years. CO2 emission leads to greenhouse effect which further leads to global warming. Energy efficient network technologies have to be developed which consume less power and produce a better Quality of Service (QoS). Renewable sources of energy can be used for power generation and the power generated can be effectively used by the base stations only during the active hours of the day. [1] Green communications should be implemented for the development of “An Eco-friendly Smart City”.

Published by: K Vishrutha, G Janvi Sruthi, G Vedavasu, T Yeswanth Reddy, K Manikandan

Research Area: Networks And Communication

Research Paper

135. Enhancement on Vehicle Speed Detection System for Avoidance of Accident

This paper presents an arrangement to detect reckless driving or over speeding on highways and by design send tickets to violators over email. In the past, many devices have been proposed but they require human effort. There are no means of control or monitor speed of the vehicles except the use of traffic policemen. Given the huge mileage of driveways, the number of traffic policemen is far from enough to observe and analyze most drivers. The proposed model is advantageous as there will not be any need of traffic policemen and will accurately detect speed rather than maintaining trust in the eye. This paper discusses the hardware as well as the software modules involved in the speed detection system. The system requires a microprocessor, a camera for input, and network capabilities to send data. It includes some reflections on the evolution of this methodology and different design decisions and their impact on the system.  

Published by: Abhrajit Chattopadhyay, Gunda Ravichandra, Vivek, Sudhanshu Solanki, P Suganya

Research Area: Image Processing

Research Paper

136. All Access V Card

In this paper, we demonstrate a RFID tag being used for multiple purposes in a college or office premises. Here, we focus on two applications, access control and monetary transactions. The basic details of the user of the card and a fixed amount deposited by him/her will be stored in a database. The user can be granted or denied access to any desired place with the help of this card. Also, the same card can be used instead of cash where monetary transactions are involved, where the amount spent gets deducted from the balance associated with the RFID card of the user. We achieve this by using a Wi-Fi module ESP8266 for communicating the required details to the server over the internet. The goal of this project is to provide easy access control and a cashless environment in any workplace.

Published by: Sayali Mhatre, Mohd. Sohel Siddiqui, Shivani Gautam, Mudit Sharma, Tejal Page

Research Area: RFID Technology

Review Paper

137. Spectroscopy in Screening of Oral Cancer and other Oral Lesions - A Review

Cancer of the oral cavity is a major public health problem with approximately 300,000 new cases reported annually worldwide. It is known to develop from pre-existing potentially malignant oral lesions (PMOL) or de nevo. Most of the cases go unnoticed till they are in their advanced stage. The majority present with locally advanced disease (stage III and IV) with dismal 5-year survival rates of 20-50%. Persistent failure to diagnose and treat oral cancer at an early stage is a key factor limiting advances in the outcome. Improving detection, diagnosis, and treatment of precancerous changes and early asymptomatic cancers is imperative to increase survival and improve functional outcomes for persons at risk to develop oral cancer.  

Published by: Dr. Rathi Rela

Research Area: Diagnostic

Review Paper

138. Encryption Algorithm for Enhanced Data Security in Cloud Computing

Cloud storage is a model of a networked storage system where data is stored in pools of storage which are generally hosted by third parties. In this paper, we present another fine-grained two-variable validation (2fa) access control framework for electronics distributed computing administration. In particular, in our proposed 2fa access control framework, a property based access control system is executed with the need of both a client secret key and it a lightweight security device

Published by: Anila Ashrafiwala, Amol Patil

Research Area: Cloud Computing

Case Study

139. An Extraordinarily Large Submandibular Salivary Gland Duct Calculus

Sialolithiasis means the formation of calcified structure in salivary gland and at the salivary duct ranging from tiny particle to several centimeters in size. Sialolithiasis often occur at any age, but it is most common in middle-aged adults in the submandibular gland with 80-90 % occurrence, followed by parotid, accounting for 5-15 % and about 2-5 % in sublingual gland. Majority of salivary stones are asymptomatic or cause minimal discomfort, large stones may interfere with the flow of saliva and cause pain and swelling. In this case report, a 40-year-old male with a large calculus in the submandibular gland duct is presented. The calculus was roughly oval and it was remarkable for its size.

Published by: Dr. Rathi Rela, Dr. Rahul R Bhowate

Research Area: Salivary Gland Obstruction

Research Paper

140. Time to Act Now: Alarming Low Awareness about Oral Cancer among Patients with Oral Pre-Malignant Lesions in Bihar

In India, oral cancer results in significant mortality and morbidity. Awareness about cancer, screening, early diagnosis, and treatment is the mainstay of management of oral cancer. There is very few evidence on the prevalence of oral cancer and oral pre-malignant lesion and awareness about them in Bihar. Therefore, this study was conducted with objectives to assess awareness about oral cancer, its risk factors and sign and symptoms among patients with oral pre-malignant lesions and to understand the determinants of awareness about oral cancer in Patna Bihar, India.

Published by: Dr. Rathi Rela, Dr. Vikash R Keshri

Research Area: Oral Cancer

Research Paper

141. Use of Acetylene as an Alternative Fuel in Modified SI Engine

The search for an alternative fuel is one of the needs for sustainable development, energy conservation, efficiency, management and environmental preservation. Therefore, any attempt to reduce the consumption of petrol and diesel possible alternative fuels is most preferable. Many research activities were developed in order to study the Internal Combustion Engines with alternative fuels. Acetylene is one of the tested fuels. So we tried to find out a more suitable way to make it safe and work. And also a way to filtration and new way to remove water or moisture.

Published by: Mitul Prajapati, Panchal Nandkishor H., Patel Meet J., Patel Krishn P.

Research Area: Alternative Fuel For SI Engine

Research Paper

142. Smart Vehicle System for Over-Speeding Detection

All over the world, road accident results in fatalities of 1.3 million a year and in India, it is 11 percent of the global road crashes. In the year 2013, we had about half a million road accidents resulting in 137,572 fatalities and 4,90,000 serious injuries. Most accidents occur due to distracted driving and over speeding. Mostly in highways, many drivers neglect the speed limit and drive with 10-20 KMPH over the speed limit. According to this statistics, 36.8% accidents are due to over speeding. Hence, we are proposing a system in which speed monitoring of every vehicle can be done and reported directly to higher authorities. The system uses the hall-effect sensor to read the current speed of the vehicle and record the speed and coordinates of the vehicle in the database situated in the cloud. The system can then analyze the data to see which vehicles over-speeded at which location at what time and generate the map of the ride where the user can see the over-speeding statistics of the vehicles. Further, the system can be used for two-wheeler vehicles where in cases where parents can track the over-speeding stats of their children.

Published by: Paras Sandip Waykole, Manish Vijay Thombare, Paresh Vilas Patil, Rajat Gopal Patil

Research Area: Internet of Things

Research Paper

143. Design of Sensors based Hyperthermia Car Alert Surveillance System using GSM

This paper presents the technology to save child's life when by mistake a child is forgotten in the by parents. There are many such cases which were reported and recently the survey by the organization called kids and cars reported that more than 30 children died America because of hypothermia when are forgotten in the car. Form this news it comes to know that severity of the problem and need to design a model for the same. In this system, we have designed a system that will be generating an attentive message through GSM and will be sending to the parents or the numbers that are stored. With this, a buzzer also generates when it detects the child. This condition will take place only when the car is in-off state. Here we using Arduino Uno and temperature sensor also to detect the car's temperature. We are using PIR and sound sensor as well. This design is designed by considering industrial requirement it is very companionable and low cost.

Published by: Shivani Shirkande, Shital Survase, Tejshri Vitekari

Research Area: Embedded Systems

Research Paper

144. Heart Disease Prediction System using Hybrid Technique of Data Mining Algorithms

The primary goal of this research paper is to devise out a model that gives a highly accurate prediction of Heart Disease. As we have done a combination of Genetic and Naïve Bayes Technique, the Investigation developed a Hybrid model of both these techniques and called it Hybrid Genetic Naïve Bayes Model for predicting high accuracy in results.

Published by: Navdeep Singh, Sonika Jindal

Research Area: Data Mining

Research Paper

145. Synthesis of Nanocrystalline Al₂O₃ for Study of Thermoluminescence Characteristics

Nanocrystalline Al2 O3 Phosphor has been synthesized by the chemical Method. Annealed at different Temperature (800, 1000, 1200, 1400 1600 o C) the synthesized sample is annealed at a high temperature of 1600 o C. Phase change from α- Al2 O3 : C To γ- Al2 O3 : C is Observed due to annealing. These nanocrystalline samples were irradiated with gamma radiation their Thermoluminescence, characteristics have been studied. The TL glow curve is the single peak at 185 C and Large increase in TL and OSC Sensitivity. TL responses have been studied with the gamma radiation. For dose varying from 100Gy.The XRD of Al2 O3 Phosphor Annealed At 800 o C and SEM Al2 O3 Phosphor annealed at 1200 o C, Thermoluminescence Glow Curves of Al2 O3 Phosphor Annealed at Different Temperature.

Published by: Kharat Rupali, Kolkar Madhurima

Research Area: Nano

Research Paper

146. A Study about Skill, Scale and Speed in India

With the combination of these three words skill, scale and speed a lot of development can be achieved. A developing country can attain developed position. As in present scenario India is also heading toward attaining this objective. For any country like India where we are looking for development the first thing we need is "skill" and education and human capital would be the only way for India to really benefit from the fact that “65% of the population is under the age of 35”. The demographic dividend depended on skill development. India today is struggling to educate its people even though it had historically been an exporter of teachers to the rest of the world. Then comes "scale" by scale, we mean the need for India to “think big” and end its tendency to “think very small”. We like to think express trains rather than bullet trains. When most people spoke of “infrastructure”, they tended to think of physical infrastructure, but it also had to be about handling data. Recently Mr. Modi said developing both “highways and I-ways”. To take India on the path of developed nation "make in India" is a great initiative by Mr. Modi but still there are challenges that needs to be resolved. To become a manufacturing nation, India has to quickly move beyond rhetoric to create a clear strategy and favorable policy environment for manufacturing to take off. A close dialogue and partnership between government and the private sector is critical. And to overcome these challenges India would need to work on “skill, scale and speed” if it hoped to compete with its northern neighbor.

Published by: Leena Bhatia

Research Area: Management

Research Paper

147. Anomaly Detection and Data Classification using KSQL

We are going to use KSQL for data analysis. KSQL is an open source streaming SQL engine for Apache Kafka. It allows for identifying patterns or anomalies in real-time data. We will attempt to do classification on a publicly available set of data. We will build models using the training data. We can then compare them by running test data through them. The dataset that is going to be used is the KDDCUP99 Network Intrusion dataset.

Published by: Radhika Gupta

Research Area: Information Technology

Research Paper

148. Multiple Fault Detection System in Transmission and Distribution

Transmission and distribution companies normally measure their achievements by using various types of qualitative and quantitative assignments. They measure achievement of their objectives through monitoring a number of performance indicators. These indicators are known as Key Performance Indicators (KPIs).The proposed IOT based KPI will have complete details about grid, master-feeder station and feeder stations. The proposed research will reduce losses which are not covered by present systems. The proposed system works at very higher speed on getting the real-time data to the control room.

Published by: Sri Ram Ganesh, Rakhi Jain, Khushboo Singh, Shruthy Raghavan, Sneha Kumari

Research Area: Embedded System

Research Paper

149. Key – Aggregate searchable encryption

The capability of sharing encrypted data with unlike users via public cloud storage may greatly ease security concerns over accidental data leaks in the cloud. Hence there is a need for efficient management of encryption keys. In this group of selected documents need to be shared with any group of different user’s desire by right different encryption keys to be used for different documents. However need of producing a complex number of keys for both processes i.e. encryption and search, and distributed to different users and those users will have to safely store the keys and put forward a complex number of keywords trapdoors to the clouds in order to search for data. However, because of large complexity, this way is unmanageable and almost practically not possible. In this paper, we are proposing the concept of Key- aggregate searchable encryption in which data owner needs to make distribution a single key to a user for having the same complex number of documents, and user needs to put forward a single trapdoor to the cloud for the query the Shared Documents. However, the complexity is reduced in relation to looking for of Documents in a separate part of the cloud.

Published by: Kiran Kawale, Ankita Angre, Pranita Shinde, Sumit Sakpal, Kishor Sakure

Research Area: Cloud Computing

Research Paper

150. Amelioration of Streptozotocin Induced Diabetes Mellitus and Lipid Profile in Rats by Mukia Maderaspatana Linn

Diabetes is a condition primarily defined by the level of hyperglycemia giving rise to a risk of microvascular damage (retinopathy, nephropathy, and neuropathy).Over 400 traditional plant treatments for diabetes have been reported, although only a small number of these have received the scientific and medical evaluation to assess their efficacy. The World Health Organization Expert Committee on diabetes has recommended that traditional medicinal herbs be further investigated. In the Indian system of medicine, Mukia maderaspatana Linn was used for different pharmacological activities. But the pharmacological and scientific evidence for its antidiabetic effect is yet to be proved. So, based on above fact it can be evaluated for antidiabetic and antioxidant property in streptozotocin (STZ) induced diabetic rats for 21 days. Diabetes was induced using streptozotocin (50 mg/kg i.p) and after the induction of diabetes the animals were given with MEE (100 mg/kg, 200 mg/kg), MCF (100 mg/kg) and MBF (100 mg/kg) orally for 21 days. Blood glucose levels were determined by using a GOD-POD method with diagnostic kits. After 21 days the parameters like HDL, LDL, VLDL, TC, TG, Albumin, Creatinine, total protein and glucose were estimated. The treatment with the extracts and fractions of Mukia maderaspatana Linn improved the lipid level and lipoprotein level to a normal condition which may be attributed to its potent antidiabetic activity.

Published by: A V S Ravi Sai Nadh, P Rajeswara Rao, A Prameela Rani

Research Area: Pharmacology

Research Paper

151. Distracted driver detection using convolutional neural network

In order to help in reducing possible accidents caused due to a distraction while driving. A model is proposed based on the convolution neural network. The Convolution Neural Network is commonly used the model in deep learning. Among various types of networks, convolution neural network resulted in high performance on image classification. Here we build and train the model with a dataset of dashboard camera images of a driver, which detects the pre-defined set of actions of the driver engaging in an unsound behavior. And provides the suitable notification indicating the driver of his/her hindrance.  

Published by: Syed Thoufich, Nikhil V Anand, Rajaganapathi S, Roopesh Kumar B N

Research Area: Deep Learning

Research Paper

152. Reconfigurable microstrip patch antenna in frequency and polarization

In this paper, RMPA in frequency and polarization is designed and diodes are proposed to be used as a switch to change the structure of the antenna. Thus by switching diodes ON and OFF the antenna is reconfigured to different frequencies with linear and Circular polarization. The use of circularly polarized antennas presents an attractive solution to achieve this Polarization match which allows for more flexibility in the angle between transmitting and receiving antennas. It reduces the effect of multipath reflections, enhances weather penetration and allows for any orientation to the communication system. The antenna is simulated at 2.4 GHz and 2.2 GHz using HFSS simulation software. The parameters of the antenna such as Reflection coefficient, VSWR, Bandwidth, Axial Ratio, the Radiation pattern is measured with and without diodes and results are analyzed using Network Analyzer. The main focus of this paper is to attain reconfigurability so that this microstrip patch antenna is used for Bluetooth, WLAN, WiMAX and Advanced Wireless Service(AWS) applications  

Published by: Raveena Ingale, Tanaya Sakat, Radha Joshi, Shahadev Hake

Research Area: Wireless Technology And Antenna

Review Paper

153. Survey on encryption approaches using information fusion with biometrics

This comprehensive survey, tried to mention two encryption approaches to make an access key which can be utilized inside the field of computer security, and which can ensure an abnormal state of mystery, as well as, with an abnormal state of sureness, give a personal identity through Information Fusion (IF) methods. In particular, two non-associated zones have been joined, Biometrics and Public-key Cryptography. This decision was taken with a specific end goal to traverse the limits these two methodologies have discovered uniquely. In this review analysis, two algorithms Face Information Fusion and Biometric and Numerical Information Fusion.

Published by: Kavya R

Research Area: Information Fusion

Case Study

154. Augmentation of batching plant productivity without affecting the quality of concrete

This paper proposes the problem of delays in the construction industry. The main purpose of this study is to identify the delay factors and the effect on the project completion by doing a case study in projects. By analyzing the reasons for the delay, possible recommendations are given. The most important causes of delays shortage of material like cement and aggregate in Production of concrete, weathering condition, methods of operation, shortage of manpower, frequent change in staff, poor site management. This project is highlighting the study of Batching plant productivity without affecting the quality of concrete by doing the study of various batching plants sites for the factors which could affect the output of batching plant and observed such factors in time. The major effects of delay are cost impact, reduced labor productivity, postponement in work, change in labor allocation etc. Not all delays can be rectified, but few of them can be overcome by improving management responsibilities This paper explains why productivity at a construction site is reduced due to management factor mechanical factor and others

Published by: Sumit Kakade, Siddhant Manoj Bhosale, Manish Dasharath Gode, Vinayak Shivaji Bhosale, Sudeshna Wawhal

Research Area: Civil Engineering

Research Paper

155. A study of environmental degradation and its problems

The United Nations International strategy for disaster reduction defines environmental as the reductions of the capacity of the environment to meet social and ecological objectives and need environment degradation is of many types. When natural habitats are destroyed or natural resources are depleted, the environment is degraded. Environmental change and human health, a special section of world resources 1998-99 in this report describe how preventable illnesses and premature deaths are still occurring in very large number. If vast improvement is made in human health, millions of people will be living longer, healthier lives than ever before. In these poorest regions of the world an estimated 11 million children, or about one in five, will not live to see their fifty birthday, primarily because of environment-related diseases. Child mortality is larger than the combined populations of Norway and Switzerland, and mostly due to malaria, acute respiratory infections or diarrhea illnesses that are largely preventable.  

Published by: Dr. Neera Singh

Research Area: Education

Review Paper

156. Automation of exam hall seating arrangement

This paper is an android application is used to save time and allow numbers of students view their individual seating arrangement. The project keeps tracking various details such the Students details, Examination date, Subject details, hall and Seat details. Students can view their seating arrangement anywhere with their help of mobile phones. Admin login with his own id and password. The admin can able to update the information and files. Admin can check updated details if necessary. This android project to create an own database, which contains a data like overall student register numbers, number of halls available, number of desks available in a particular hall and subject code. Examination hall seating arrangement will be allocated automatically by using PHP and JAVA languages. To create a condition for fetching data from the database. If the condition is then allocated automatically. Each hall contains two different departments with different subject codes.  

Published by: Sowmiya .S, Sivakumar. V, Kalaimathi .M, Kavitha .S. V

Research Area: Information Technology

Review Paper

157. A multiple object analysis for indoor scene recognition with scene adaptive classification

In proposed work, will be using an adaptive object analysis on the basis of its characteristics. These characteristics of the objects will help the computer vision based applications to differentiate between the objects of similar color and similar shape. This will empower the computer vision based applications to detect the objects with more accuracy, which will also help it to detect the type of the surroundings, whether it’s a home, office.  

Published by: Gagandeep Singh, Sonika Jindal

Research Area: Image Processing

Research Paper

158. Adaptive M-SVM classification model qualified indoor scene images with hybrid feature selection approach

The results of the proposed model have been obtained in the form of the various performance parameters of statistical errors, precision, recall, F1-measure and overall accuracy. The proposed model has clearly outperformed the existing models in the terms of the overall accuracy. The proposed model improvement has been recorded higher than ten percent for all of the evaluated parameters against the existing models based upon SURF, FREAK, etc.

Published by: Gagandeep Singh, Sonika Jindal

Research Area: Image Processing

Research Paper

159. A survey on the security of multimedia contents with dual level encryption

The cloud computing offers high quantifiability, confidentiality and therefore the simple accessibility of the knowledge over the net. tho' the traditional secret writing system provides security, the foremost involved issue is that the regular aspect channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) besides a targeted VM will extract all info. Thus, this paper implements a double stage secret writing rule for the multimedia system content security exploitation random key generation approach. the primary stage encrypted multimedia system content into ciphertext -l employing a trigonal public key. The ciphertext-l is once more encrypted within the cloud exploitation a willy-nilly generated uneven non-public key. If anyone gets the ciphertext, he couldn't extract the secret writing key to recover the multimedia system contents. Low complexness and simple implementation create the planned rule wide applicable safeguard within the cloud computing.  

Published by: Swapnali Anil Balshankar, Harshada Pacharane, Vicky Bobade, Gauri Gherde, Ujwala Gaikwad

Research Area: Security

Research Paper

160. Survey on network smartphone on disaster recovery

In the time of disaster, the information exchange between rescue helpers and survivors is difficult and the wired connection and cellular network are also collapsed during the disaster and it also not possible to reconstruct the network to communicate with the helpers and survivors. In this paper, we discussed various technologies to help trapped survivors to reach the rescue workers in the wireless network even in the absence of cellular network using the wireless ad-hoc network, opportunistic network and using smartphones which uses wifi interface to reach survivors and rescue workers. One is using directional antenna for ad-hoc networks using inter-vehicular communication for quick reconstruction of network, and the other is opportunistic network using ad-hoc communication presents HELPME a self levelling opnet application deployed in smartphones which uses ad-hoc network for communication over wifi in the time of disaster and it forms a dynamic matching of its neighboring nodes to transmit the information with the help of ad-hoc network. And the third one is using team phone a network application for disaster recovery. Team phone consists of two components The messaging system between rescue worker and trapped survivors integrate cellular networking, ad-hoc networking, and opportunistic networking, and enables proper communication.and the self-rescue system that groups the smartphones of trapped survivors together, energy-efficiently discovers nearby messaging nodes and sends out emergency messages including location and position information.  

Published by: Darshan Kumar S B, Dr. Sheela S V

Research Area: Computer Science

Survey Report

161. A survey on the smart environment in a multimedia

We can make multimedia environment smart by making devices used in multimedia to work smartly using IoT technology, in which internet-enabled devices to communicate with each other. In this paper, we firstly describe IoT and its verticals along with its component; secondly we have described its technology and finally, we have a present survey on beacons

Published by: Achal. S. Gundawar, Insiya. Z. Hussain, Pranali R Dandekar

Research Area: Internet of Things

Research Paper

162. Prediction of urban air pollution by a machine learning method

In addition to the impact of rapid population growth and urbanization, the level of pollution in the cities is largely modulated by meteorological factors. A compilation of meteorological data in many cities is available in Indian Government websites. They give the concentration levels of several parameters including PM2.5, NO2, CO, etc. With the help of this website data, we use Data Mining Prediction technique Collaborative Filtering and Machine learning to predict the next day data and compare with actual data. This elementary research intends to be an introductory step in the development of a web-based platform for the awareness of the residents of urban areas about the risk to human health, with potential future application in other urban areas. To make the real-time scenario Service Orientated Web Architecture is used in this system.

Published by: Saniya Afshan, Nithin S, Venkata Sai Nishanth, S Nithin, Aditya Pai H

Research Area: Machine Learning

Research Paper

163. Experimental study of concrete beams using prefabricated cage system

A new steel reinforcement that can be used instead of reinforced concrete members is introduced. The proposed reinforcement is called the Prefabricated Cage System (PCS) is an alternative to the rebar cage used in traditional reinforced concrete for faster, easier, and more reliable construction. Prefabricated Cage System is fabricated by perforating hollow steel tubes or steel plates. The resulting Prefabricated Cage System acts as transverse and longitudinal reinforcing steel, working compositely with the surrounding concrete to resist the applied loads. The economic benefits gained from using Prefabricated Cage System reinforcement are studied. The cost and time savings earned in structures with Prefabricated Cage System reinforced columns have been analyzed. The cost and time savings have been evaluated in a case study considering various interest rates and structural lifetimes. In this study, the various designs for the openings and the minimum percentage of steel used for the Prefabricated Cage Member for attaining the various Mechanical strength are to be found out.  

Published by: Nithin. T, B. Karthick, C. Savinth Kumar

Research Area: Prefabrication

Research Paper

164. Design of dual band microstrip antenna

In the given paper a microstrip rectangular patch antenna is designed for dual frequency band applications in the ISM band and WiMAX band. The antenna contains a rectangular patch with two rectangular slots positioned on the surface of the patch which is mounted upon a grounded substrate made of FR4 epoxy. The dimensions of the patch and positioning of the rectangular slots is determined through standard antenna formulae and simulation based optimization techniques in Ansoft HFSS

Published by: Ajinkya D. Dhumale, Pallavi B. Chandole, Chirag, Amol S. Ingole

Research Area: Wireless Technology

Research Paper

165. Antidiabetic activity of hiptage benghalensis in chemical-induced diabetic rats

The present study was an attempt to investigate the effect of extracts of Hiptage benghalensis on glycemia, lipid profile, lipoprotein level and antioxidant profile in STZ induced diabetic rats for 21 days. Diabetes was induced using streptozotocin (50 mg/kg i.p) and after the induction of diabetes, the animals were given with HBEE (100 mg/kg, 200 mg/kg) orally for 21 days. Blood glucose levels were determined by using a GOD-POD method with diagnostic kits. The lipid and lipoprotein level was estimated by using the respective kits. The administration of the extracts orally for 21 days showed that there was an amelioration of the lipid and lipoprotein levels significantly. After 21 days the parameters like HDL, LDL, VLDL, TC, TG, Albumin, Creatinine, total protein and glucose were estimated. The treatment with the extracts and fractions of Hiptage benghalensis improved the lipid level and lipoprotein level to a normal condition which may be attributed to its potent antidiabetic activity. The levels of urea and creatinine were significantly decreased after the treatment of STZ diabetic rats with HBEE. The treatment of diabetic rat with Hiptage benghalensis caused a noticeable elevation in serum total protein and albumin levels as compared with normal levels. The treatment with HBEE ameliorated the changes induced by STZ.

Published by: A V S Ravi Sai Nadh, P Rajeswara Rao, A Prameela Rani

Research Area: Pharmacology

Research Paper

166. Arrhythmia classification using ECG Signal based on BFO with LMA Classifier

Electrocardiogram (ECG), a non-invasive technique is used as a primary diagnostic tool for cardiovascular diseases. ECG provides valuable information about the functional aspects of the heart and cardiovascular system. The detection of cardiac arrhythmias in the ECG signal consists of detection of QRS complex in ECG signal; feature extraction from detected QRS complexes; classification of beats using extracted feature set from QRS complexes. Earlier methods have been developed by authors to predict heart disease on the basis of ECG but as each method has its own advantage as well disadvantage. Hence, in this thesis, the best training method i.e. Levenberg Marquardt algorithm has been utilized for classification on the basis of validation checks or epochs with an optimization technique. The purpose of this research work is to classify the disease dataset using Bacterial Foraging Optimization (BFO) Algorithm and trained by Levenberg Marquardt algorithm on the basis of the features extracted and also to test the image on the basis of the features at the database and the features extracted of the waveform, to be tested. The advantage of the proposed method is to minimize the error rate of the classification which occurs due to an insignificant count of R-peaks. The database from physionet.org has been used for performance analysis. Several experiments are performed on the test dataset and it is observed that Levenberg-Marquardt Algorithm classifies ECG beats better as compared to Back Propagation Neural Network (BPNN). FAR, FRR and accuracy parameters are used for detecting the ECG disease. The simulation process is undergone by using MATLAB simulation tool.

Published by: Shikha Sharma, Aman Kumar, Astha Gautam

Research Area: Data Mining

Research Paper

167. Mathematical treatment of enzyme kinetics using differential method

In this article, we studied the theoretical investigation of basic enzyme reactions of substrate and product concentrations. The enzyme kinetics helps in drug designing, Drug Metabolism and the determination of disassociation constants for antigen-antibody interactions in solutions. The arising physical governing system we solved by using the general ordinary differential method. The obtained results show the substrate, enzyme, substrate-enzyme, and product concentration profiles are presented with help of graphs and tables. From this study, we found that as increasing substrate value improves the rate of reaction. If the rate constant is greater than substrate concentration, the rate of reaction depends on free enzyme content and substrate amount. In a similar way, the substrate concentration is greater than rate constant the rate of reaction depends only on free enzyme content.

Published by: Kodathala Sai Varun, Kandagadla Ashok Kumar, Vunnam Rakesh Chowdary, C. S. K Raju

Research Area: Mathematics

Research Paper

168. Automatic car driving system for handicapped and polio-persons with the scooter handle

Nowadays in our country, the handicapped people are facing a lot of struggles in their life to survive. To overcome that, the person with handicapped is more interested in driving the bike.etc. If the case is based on the bike why can’t they ride the automatic car with the scooter handle has the steering system.

Published by: A J Reuben Thomas Raj, B Silpa

Research Area: Embedded Systems

Research Paper

169. Stabilization of rammed earth with sawdust ash

Rammed earth is a technique of forming in-situ structural wall elements using rigid formwork. Advantages of rammed earth walls include flexibility in plan form, a scope for adjusting the strength and wall thickness, variety of textural finishes, lower embodied carbon and energy, etc.. The thesis deals with an extensive experimentation on sawdust ash stabilized rammed earth specimens. Two varieties of specimens (cylindrical, cubes) are to be used in the experiments. A natural soil and its reconstituted variants were used in the experimental work. Details of the experimental programme, characteristics of raw materials used in the experimental investigations, methods of preparing different types of specimens and their testing procedures are discussed in detail. The aim is to establish properties of locally available natural soil and comparing it with properties of soil suitable for rammed earth construction and effect of Sawdust ash (SDA) on properties of natural soil used for rammed earth.  

Published by: Sri Vishnu Kailash. K, B. Karthick, C. Savinth Kumar

Research Area: Stabilization

Research Paper

170. Design and implementation of IoT based smart irrigation system

India is the agriculture-based country. Our ancient people completely depended on the agricultural harvesting. Agriculture is a source of livelihood of majority Indians and has the great impact on the economy of the country. In dry areas or in case of inadequate rainfall, irrigation becomes difficult. So, it needs to be automated for proper yield and handled remotely for farmer safety. Increasing energy costs and decreasing water supplies point out the need for better water management. Irrigation management is a complex decision-making process to determine when and how much water to apply to a growing crop to meet specific management objectives. If the farmer is far From the agricultural land he will not be noticed of current conditions. So, efficient water management plays an important role in the irrigated agricultural cropping systems. A low-cost alternative solution for efficient water management currently in use is drip irrigation systems that consist of an automated irrigation mechanism which turns the pumping motor ON and OFF on detecting the moisture content of the earth using the soil moisture sensor without the intervention of a human. The benefit of employing these techniques is to decrease human interference and it is quite feasible and affordable. This Smart irrigation system project is using an Arduino microcontroller, that is programmed to collect the input signal according to a moisture content of the soil and its output is given to the mobile application that will operate the pump.  

Published by: Rasika Arsade, Monali Daf, Oshin Nagpure, Ritika Charpe, Alok Chauhan

Research Area: Embedded Systems

Review Paper

171. Heart disease prediction using classification and feature selection techniques

The value of measurement age, blood pressure, weight, smoking habits, exercise, and blood serum cholesterol in predicting death and coronary cardiopathy was studied over an amount of ten years. Sixteen teams comprising 12 763 men aged 40-59 years (at the outset) from 7 countries (Yugoslavia, Finland, Italy, Kingdom of The Netherlands, Greece, USA, and Japan) were studied. the very best risk factors were found to be age, pulse blood pressure, and blood serum cholesterol concentration (related to saturated fatty acids within the diet). Variations in incidence rates couldn't be shown to be associated with characteristics of the cohorts in relative weight, smoking habits or physical activity. To design a perceptive model for heart illnesses acknowledgment using data mining strategies that are fit for enhancing the constancy of heart infections conclusion. Thereafter, we divide this data into Training and Testing Data Sets and employ Naïve Bayes technique to obtain relatively higher prediction accuracy. The primary goal of this research would be given a highly accurate prediction of Heart Disease. As we have done a combination of Genetic and Naïve Bayes Technique, the Investigation would be developed a Hybrid model of both these techniques and called it Hybrid Genetic Naïve Bayes Model for predicting high accuracy in results.  

Published by: Navdeep Singh, Sonika Jindal

Research Area: Data Minning

Research Paper

172. A study on corporate social responsibility (CSR) and sustainability in agribusiness in Ethiopia – challenges and developing strategies

The commercialization of agriculture is a top priority for Ethiopia. It is, therefore, encouraging to have seen a rapid development of the commercial agriculture sector in recent years. Entrepreneurs, government, and other stakeholders share the opinion that commercial agriculture can be successful only when it is done on a sustainable footing. It is widely acknowledged that although the entrepreneur has a wide responsibility in this respect, he or she cannot do it alone. Developing sustainable agriculture requires an exchange of knowledge and experience among business, government and civil societal organizations. The code of practice developed by and for the Ethiopian floriculture sector is a good example of such a process. Working on sustainability by entrepreneurs is generally referred to as corporate social responsibility (CSR). In practice, it entails constantly working on improving the three P’s (people, planet, and profit) in a balanced manner. Most entrepreneurs involved in commercial agriculture in Ethiopia are motivated to work on CSR. As a result, a wide variety of good practices have evolved in recent years. This article is an attempt to highlight CSR practices, important issues in agribusiness and Suggestions to promote work on improvement of the three P’s (people, planet, and profit) to the agribusiness community.  

Published by: Dr. Monica Tulsian

Research Area: Business Adminstration

Research Paper

173. The growth of mutual funds in India: A special reference to sectoral mutual funds

Mutual fund investment becomes an ideal investment during the last few years in India. It poses a medium risk and provides good returns to the investors on their savings. There are more than a thousand schemes are available in the market of mutual funds. Sectoral mutual funds are highly risky compared to the other diversified equity schemes. During the recession period, some sector performed better and provides the better return than their benchmarks. In the present study, we explain the top most popular sector funds which hold the topmost assets under management of equity as well as performed well during the recession time period. These sectoral mutual funds are banking sector fund, Software sector fund, a Pharmaceutical sector fund, etc. Banking sector holds the 13% to 22% of the equity and well-managed sector funds provide 52.43% returns while worst managed sector provide 13.75% during the recession time period in 2008-09. Second largest equity holding sector is software sector fund. This sector holds 8% to 14%. Pharmaceutical sector grasps 6% to 8% and Auto sector seize 3% to 6% of the equity.  

Published by: Dr. Askok Kumar, Suman Rani

Research Area: Finance

Thesis

174. Study on random order testing

Software testing is very highly used and very expensive. The main function of the software testing is to find the defects. Not all software defects are caused by coding errors. One common source of expensive defects is requirement gaps, e.g. unrecognized requirements that result in errors of omission by the program designer. Requirement gaps can often be non-functional requirements such as testability, scalability, maintainability, usability, performance, and security. A programmer makes an error (mistake), which results in a defect (fault, bug) in the software source code. If this defect is executed, in certain situations the system will produce wrong results, causing a failure. So there are different test cycles in which a project can be tested. In this project I have taken a shopping cart website, the testing has been done to each test case multiple times to check the number of errors got in the testing. The duration of the testing is also noted. In totally random order texting all possible ways are also been tested and the successful testing output without any errors is performed. Normal testing for the same site is done simultaneously and comparing the difference and time consuming and the maximum number of errors obtained.  

Published by: M. Arjhun, John Bruce

Research Area: Software Testing

Research Paper

175. Fog computing: Mitigating insider data theft attacks in the cloud

Cloud computing guarantees to considerably amendment the manner we tend to use computers and access and store our personal and business data. With this new computing and communications, paradigms arise new information security challenges. Existing information protection mechanisms like secret writing have unsuccessful in preventing information larceny attacks, particularly those perpetrated by an associate degree business executive to the cloud supplier. we tend to propose a special approach for securing information within the cloud victimization offensive decoy technology. We tend to monitor information access within the cloud and observe abnormal information access patterns. once unauthorized access is suspected and so verified victimization challenge queries, we tend to launch a misinformation attack by returning giant amounts of decoy data to the assailant. This protects against the misuse of the user’s real information. Experiments conducted in a very native file setting offer proof that this approach might offer unprecedented levels of user information security in a very Cloud atmosphere.  

Published by: Ankit Choudhary, Tushar Nikam, Rajkumar Singh, Yogita Kawle, Abhijit Tambe

Research Area: Computer Engineering

Research Paper

176. Theatre environment management

The basis of this project was to take the entire environment of a theatre, taking all the individual parts and making online counterparts for it and thus converting the entire experience into a virtual one. The aesthetically pleasing yet quick response online website aims to replace the ticketing counters of the theatres. The project aims to reduce the bustle and rush that we obtain in the ticketing counters and the various facilities. The communication between the managers and employees will be converted into a formal one, which is absent in the present theatre environment. The ease of booking will add to the bonus for the customers. With the newly introduced digital economy in India using web services for one of the biggest upcoming industry is a great option for start-ups. The convenience and ease of booking the ticket from home will attract more customers to book the tickets. Overall the online booking is a boost to overall entertainment and service industry.  

Published by: Kartik Sindhu, Prathyaksh S Kaushik, Shubham Goel, Prabu S

Research Area: Software Engineering

Research Paper

177. Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IOV paradigm

In this paper, we focus on the security and privacy-preserving by developing a dual authentication scheme for IoV according to its different scenarios. First, the OBU self-generates an anonymous identity and temporary encryption key to open an authentication session. Second, the legitimacy of the vehicle's real and anonymous identity can be verified by trust authority (TA). After that, the vehicle's reputation is evaluated according to its history interactive behavior and the session key for V2V can be finally established. There are three major advantages, including privacy-preserving and security enhancement without a burden of key management in the condition of acceptable time delay range, introducing trust evaluation into authentication protocol, as well as considering the vehicle behavior attributes in the new reputation evaluation method.

Published by: Aishwarya .R, Tanuja .A, Vineela .Y, Dhanlakshmi .R

Research Area: Networking

Research Paper

178. Blood bank venture framework

Blood Bank Venture Framework web application keeps up the Online library of blood donors in a city/state or region. There are times when Doctors and Blood bank venture need to confront the trouble in finding the blood among Donors at the appropriate time. Blood donation venture framework has endeavored to give the required response by taking upon itself the process of gathering Blood donors across the country for the cure of those who are in need. At any moment the patients who are in need can apply for a donation through the web application and connect with the right donor. Based on humanity, anybody can enlist as a blood donor. The donors are accepted only after their blood sample tests and also based on their medical history. The general population who are non-benefactors can likewise assume an essential part of the proposed framework. Simply by registering their blood type, they can help in identifying the proportion donor of blood types needed in an area. Blood Bank Venture Framework (BBVF) is a web application program that is intended to store, process, retrieve and analyze information concerned with the administrative and inventory management within a blood bank. This project aims at maintaining all the information pertaining to blood donors, different blood groups available in each blood bank and help them manage in a better way. The aim is to provide transparency in this field, make the process of obtaining blood from a blood bank hassle free and corruption free and make the system of blood bank management effective.

Published by: Vikrant Kumar Kaushik, Arjun Kumar Gupta, Ashish Kumar, Abhishek Prasad, Brindha

Research Area: Computer Science

Survey Report

179. Fake currency detection using image processing

Currency duplication also is known as counterfeit currency is a vulnerable threat to Economy.it is now a common phenomenon due to advanced printing and scanning technology. Bangladesh has been facing the serious problem by increasing rate of fake note in the market.to get rid of this problem various fake not detection methods are available around the world and most of these are hardware based and costly.in the present paper an automated image-based technique is described for the detection of fake banknotes in Bangladesh. Security features of banknote such as the watermark, micro-printing, and hologram etc., are extracted from the banknote images and then detection is performed using “Mathlab tools”  

Published by: D. Swetha, M. Artheeshwari, J. Ishwarya, Kavitha

Research Area: Educational Research

Research Paper

180. Electronic voting machine based on Blockchain technology and Aadhar verification

Increasingly digital technology in the present helped many people lives. This paper describes an electoral system for Indian election on blockchain technology and Aadhar verification. The aspect of security and transparency is a threat from still widespread election with the current system. Some of the problems that can occur in the current system are with an organization that has full control over the database and system, it is possible to tamper with the database of considerable opportunities. The proposed system is mainly designed for our country based on Aadhar verification where the details of the persons who are above 18 years are extracted from Aadhar card database since it had become mandatory in the present scenario. To ensure more security, the fingerprint of a voter is used as the main authentication resource. The system will allow the voter to vote through his fingerprint. As soon as they cast their vote, blockchain technology comes into existence which is integrated inside EVM. By adopting Blockchain in the distribution of databases can reduce one of the cheating sources of database manipulation. This research discusses the recording of the voting result in blockchain algorithm from every place of election.

Published by: Navya A, Roopini R, Sai Niranjan A S, Prabhu B

Research Area: Computer Science

Research Paper

181. Seismic analysis of Braced RCC structures using ETABS software

The steel braced frame is one of the structural systems used to resist earthquake loads in multistoried buildings. Many existing reinforced concrete buildings need a retrofit to overcome deficiencies to resist seismic loads. The use of steel bracing systems for strengthening or retrofitting seismically inadequate reinforced concrete frames is a viable solution for enhancing earthquake resistance. Steel bracing is economical, easy to erect, occupies less space and has the flexibility to design for meeting the required strength and stiffness. In the present study, the seismic study of conventional x brace, zipper brace, and SBS in RCC structures using ETABS software is investigated. The bracing is provided at each corner. a g+6, g+12 and g+18 story with 6 bay in an x-direction and 3 bay in the y-direction is analyzed using ETABS. The effectiveness of various types of steel bracing is examined. The effect of the distribution of the steel bracing along the height of the RCC structure on the seismic performance of the rehabilitated building is studied. Provision of conventional x braced, zipper braced and SBS is provided in each story. The percentage reduction in lateral displacement is found out. It is found that the SBS of steel bracing significantly contributes to the reduction in displacement and story shear compared to conventional x bracings.

Published by: Safvana P, Anila S

Research Area: Engineering

Research Paper

182. Single phase solar inverter

In this paper, a grid connection of single-phase PV inverter system is presented, which can deal with solar energy and performs power conditioning. To draw maximum power from the solar system we use maximum power point tracking technology for PV arrays. This MPPT technology based on the maximum power point varies with irradiation and temperature linearly. The control of a grid-connected inverter is investigated. There are two key control issues that need to be examined. The first is the control of the AC side of the converter to ensure that sinusoidal output waveforms are produced. And the output from the PV panel is controlled by the boost converter. The second key issue that needs to be examined is the current that is fed from the PV panels to the inverter. The ripple on this current must be minimized as much as possible so that the inverter can be implemented with maximum power point tracking techniques (MPPT) that will enable it to extract the maximum power that is available from the PV panels at any given time.

Published by: Shekhar Kumbhar, Niranjan Kamble, Sourabh Chougale, I. D. Pharne

Research Area: Solar Power

Research Paper

183. CSRMesh Bluetooth technology for speedy automation

The Project aims to employ “CSRMesh Bluetooth Low Energy technology” to design Wireless Switch Panels and Controller Units for speedy installation of home automation solution. Wireless Panels are powered by a battery which would last for years unlike daily charging needed by most of the Wireless devices. These switch panels communicate on low power CSRMesh Low Energy protocol. Similarly, a Controller unit which will be connected at the load side to control the lamps, TV, fans and various other appliances use CSRMesh to communicate with switch panel thereby simplifying cabling in order to achieve speedy installation. Using Bluetooth low energy MESH technology it is possible to establish the powerful wireless network which is prerequisite of wireless connectivity. On successful completion of the above project, wiring complexity in homes should come down by about 80%, turnaround time by 90%, cost of the conduit and wiring by 60%.

Published by: Aaryan Kumar, Shubham Andurkar, Rasika Kulkarni, S. D. Hake

Research Area: Science and Technology

Review Paper

184. Building an artificially intelligent, interactive and online chatbot

Nowadays people tend to seek knowledge or information from the internet that is discerned with the wide range of applications and followed through online services. The main aim of this Chat based system or the way is to bridge the gap between the knowledge sources by providing instant replies to the questions and queries that get posted. A chatbot’s main aim is to make a conversation between a human and a machine feasible. The machine gets embedded with this knowledge for the identification of the sentences and making a decision within itself, as a response to answer questions.

Published by: Sai Kiran Chintalapudi, Akhil Bharadwaj, Siddharth Kolagatla, Reddy Nikhil Sampara Harsha, Swarnalatha P

Research Area: Computer Science

Research Paper

185. RFID and its applications

RFID(Radio Frequency Identification) technology is used on a large scale these days, this technology can be used to identify various objects very easily. There are mainly three components in RFID. They are the transceiver, transponder, and antenna. The RFID transceiver plays an important role in the transmission of power in case of passive tags and it also does reception of information present in the RFID tag. The transponder does the work of receiving frequency signal and then transmitting another signal. The antenna does the work of establishing the connection between the reader and tag. The RFID system can be made with different frequencies, so depending on the range the antenna must be selected. One of the applications of RFID in real life is “Smart Bus Route Indicator”. Basically, in this application of RFID, TX-433 which is an ASK transmitter and RX-433 which is an ASK receiver is used as one of the main components. These transmitter and receiver are tuned to 433MegaHertz. The encoder IC does the work of converting parallel inputs into the serial output, this serial output is transmitted using transmitter antenna to the receiver antenna. Now the decoder will convert the serial input into the parallel output and give it to output pins of the microcontroller. The data then can be displayed on the LCD display. So RFID modules can be used to send the data so as to specify the location and arrival time of a bus.

Published by: Abhishek D Kulkarni, Adesh A Chavan, Sairaj S Kshirsagar

Research Area: Electronics and Telecommunications

Research Paper

186. K-means cluster analysis for gene expression of PBMCs with four different metrics

Microarray technologies have now made it possible to monitor the expression levels for tens of thousands of genes in parallel. Studying the gene expression data for the deeper understanding of functional genomics. K-means clustering technique is one such way towards addressing this challenge and finding the underlying patterns. In this paper, we first briefly introduce the concepts of microarray technology and implement k-means algorithm with four different metrics. Euclidean, Manhattan, Chebyshev, Minkowski distance metrics along with a comparative study of results with silhouette score as an internal validation measure are discussed.  

Published by: Vipul Grover, Dhananjay Sharma, Shubham Kumar Dutta

Research Area: Bioinformatics

Research Paper

187. Energy aware routing through optimum Load Balancing and Evolutionary Algorithm in WSN

Average lifetime improvement of a critical application sensor network is always a promising research area where a lot of scope for applying a technique like cross-layer approach, energy-aware routing, load balancing etc. Due to the heterogeneous nature of sensor network and dynamic situation static solutions always fail to give an optimal solution. The performance of network like an average lifetime, throughput, packet delivery ratio, overhead due to routing etc can be improved through an optimized load balanced network. Optimisation technique like simulated annealing, genetic optimization and particle swarm optimization yield a time-varying performance due to its operation of principle. The various network parameters can be used to represent chromosome in the genetic algorithm (GA) and similarly this parameter can be represented in particle swarm optimization (PSO) optimization. The performance of GA and PSO is measured in the dynamic environment but testing is done in a standard environment.  

Published by: Sneha Sebastian, Dr. Vinodh P Vijayan

Research Area: Wireless Sensor Network

Research Paper

188. The comparison between various object detection algorithms

Object detection is a concept that has been handed over to the machines for some time now. It all started with pattern recognition back in the 1960’s and the concept has been evolving ever since. Now it has come to such an extent that machines are successfully able to achieve real-time object detection. But all this isn’t done on its own and requires human help and instantiation in order to start working independently. Whenever there is a need for instantiation, there comes a need for an algorithm. Talking about algorithms, an algo is a finite series of steps which when performed lead to an outcome. Ever since the beginning of time, we have been using algorithms to do our daily chores. Ever since the beginning of machines, we have been using algorithms to program them and to define how they would react to various inputs. Similarly, when the concept of object detection came in, the series of development of algorithms began. There have been multiple developments over the past which have been able to do the job of object detection but the difference between these has always been of speed and accuracy as well as efficiency. Earlier algorithms were performed on still images that were captured out of cameras or taken out of video footages. Now, highly efficient algorithms have made it possible to provide real-time object detection that can be performed by continuously moving video footages.   Object detection is not a cakewalk and has a lot of challenges that it comes with. The goal to be achieved is overcome some challenges and reduce the effect of others to the bare minimum. It is true that there are trade-offs involved in this process but based on the objective of the program, these trade-offs can be easily managed. The main challenges that come up are mentioned below.  

Published by: Chandramani Kumar, Kartik Chawla, Shreya Arora

Research Area: Information Technology

Research Paper

189. Fabrication and testing of aluminum metal matrix composites with Graphene and Yttrium oxide

The paper describes the fabrication of Aluminium-Magnesium-Graphene-Yttrium oxide particulate composites produced using casting method. The size of the Graphene and Yttrium Oxide particulate is ranging between 20-40 µm and 40-60 nm. The Graphene contents are varied from 2% and 4% by weight and Yttrium of 4% and are dispersed in the alloy matrix. After the casting process, the mechanical properties are mainly been tested, particularly their tensile and hardness of composites is measured. The microstructure of the composite material is mainly determined using a Scanning Electron Microscope(SEM).  

Published by: R Divakar, J Gilbert Rozario, V. Savithri

Research Area: Materials

Research Paper

190. Monitor Java application through an agent

A typical application environment consists of the different components that interact in a variety of ways to fulfill requests from the application's users: Web applications served from an application server. Databases or other data stores. Remote services such as message queues and caches. Our app agents automatically discover the most common application frameworks and services. Using built-in application detection and configuration settings, agents collect application data and metrics to build flow maps. A flow map visually represents the components of our application to help we understand how data flows among the application components. For example, the business transaction flow map for a simple e-commerce application below shows data flowing between web services, message queues, and databases.    

Published by: Vipul Saini, Dr. Ajay Singh

Research Area: Computer Science

Research Paper

191. Cab booking application

This Cab Services App is a modern day tool to solve our day to day transportation-related problems. There are a number of issues when it comes to traveling from one place to another, some people don't have their own vehicles, and others don't want to use public transport like buses to travel, independent taxi owners asking for higher fares and many more. Cab service app aims to provide relief to people facing these issues by providing easy to book, cheap and pleasant taxi rides to anyone with access to a smartphone. The cab services app is a two - way tool that encourages both the customers in need of a ride as well as taxi owners and cab service providers to register with the app, thus diminishing the distance between customers and taxi owners. With the cab services app eliminates the need for bargaining that the customers and the drivers have to go through as it makes sure that price one pay for a ride is minimum. This is ensured by the fact that there are multiple cab service providers and the customer has the option to pick the one providing best services for the lowest price.  

Published by: Amit Vashistha, Rohit Goyal, Aman Chaudhary, Prabu S

Research Area: Software Engineering

Research Paper

192. User alerting system for vehicle accident detection system

This project is entitled as “User Altering System for Vehicle Accident Detection System”. In Human Life vehicles are playing an important role in day to day life while using vehicle there may unavoidable accident occur so, this system may help the people to secure. This project aims at finding the occurrence of any accident and reporting the location of the accident to the previously coded numbers. The form of latitude and longitude coordinates through SMS using GSM technology is used to intimate the vehicle position is to identify. The location spot is retrieved using Global Positioning System which is a navigational system using a network of satellites orbiting the earth. Such as vibration and fire detectors detect signal in case of an accident occurrence and send a signal to the connected microcontroller. The controller, in turn, operates the relay to blow the airbag and automatically lock the brakes. Meanwhile, a message reaches to the necessary help and thus ambulance service and required aid can reach in the shortest time possible. This system can also aid companies in the rental vehicle business to keep a track of the vehicular activity by sending the message at regular intervals to the authorized numbers.

Published by: R. Thrivikraman, N. Akash, C. Kaarthikeyan, Dr. J. Rajeshkumar, C. Mageshkumar

Research Area: IoT

Review Paper

193. Innovative technologies to implement at the library of the future

This article focuses on the usefulness of technology. This article explains how to deliver, disclose, use, inform and store information, selected, received, assessed, organizes, maintained and managed in educational and commercial studies of the library and information science (LIS). The use of the libraries used here is the technology available for use in libraries. Students in the new age are related to handling physical things; such as paper, cardboard, microfilm and magnetic optical or other recording media, how to use them as per new technology. In this library to implement this article fitting and useful Shaw is a collection of new technologies.  

Published by: Rekha Madhukar Patil, Rupesh K. Nalawade

Research Area: Innovative Technologies

Research Paper

194. A data mining perspective of the dual effect of rainfall and temperature on cotton crop yield prediction

This paper presents the final investigation within the north Gujarat region of qualitative and quantitative investigations carried out for the processing and analysis of geographic land-usage data in an agricultural context. The geographic data was made up of crop and cotton cropland use profile. These were linked to previously recorded climatic data from fixed weather stations in north Gujarat. In this study, the profiles for the stochastic average monthly temperature and rainfall for north Gujarat selected area were used to determine their simultaneous effects on crop production. The temperature and rainfall were sampled for a selected decade of crop production for the years from 2006 to 2015. The evaluation was carried out using graphical, correlational and data-mining-regression techniques to detect the patterns of crop production in response to the climatic effect across the agricultural region. Data mining classification algorithms within the WEKA software package were used with the location as the classifier to make comparisons between predicted and actual cotton yields. The predicted patterns suggested that crop production is affected by the climate variability especially at certain stages of plant growth.  

Published by: Amiksha Patel, Dr. Dhaval R. Kathiriya

Research Area: Data Mining, Agricultural Data

Research Paper

195. Deploy redundancy of internet using first hop redundancy protocol and monitoring it using IP Service Level Agreements (IPSLA)

Availability and Security of the services are very important factors for the cross-platform network, in order to succeed the desired outcome, we are exploring First Hop Redundancy Protocol (FHRP) such us, Gateway Load Balancing Protocol (GLBP) Hot Standby Router Protocol (HSRP) and Virtual router redundancy protocol(VRRP). These protocols are providing redundancy and Reliability into the data link layer of Open System Interconnection (OSI) model by allowing multiple hosts to make a group among of them for load distribution and they are appearing in the form of a single virtual link. one or more than one router will be acting as an active hop for load balancing and forwarding the clients request to outside of the network, few more routers will be kept in a standby mode for a situation where if one of the active Hops fails down then Redundancy protocol will maintain connectivity by forwarding the clients requests to another Hop in the equivalent Group. For monitoring and measuring the performance of redundancy protocols, we deploy internet protocol Service Level Agreements (IPSLA) which is Feature of internetwork operating system (IOS) that allows us to analyze the active traffic of IP service.  

Published by: Mohammad Hamid Ibrahimi, Komil B. Vora, Kunal Khimani

Research Area: Networking

Research Paper

196. Identification, isolation and characterization of unknown impurity in Ondansetron Drug product

A new degradant of ondansetron was detected at a level of 0.5 % w/w during the reversed phase HPLC analysis in ondansetron 4mg and 8mg stability storage samples. This impurity was identified by LC-MS and was characterized by NMR (1H NMR, 13C NMR, and 2D NMR), LC/MS/MS and FTIR spectral studies. This impurity was prepared by isolation from the impurity enriched samples of ondansetron monohydrochloride dihydrate by using reversed phase preparative HPLC. Based on the spectral data, this impurity was named as carboxy (2-methyl-1-((9-methyl-4-oxo-2,3,4,9-tetrahydro-1H-carbazol- 3-yl)methyl)-1H-imidazol-3-ium-3-yl)methanide chloride. The identification, formation and structure elucidation of this impurity has been discussed in details.  

Published by: Hemant Madhusudan Gandhi , Nageswara Rao Gollapalli, Dr. Jaydeep Kumar D. Lilakar

Research Area: Pharmacutical Chemistry

Review Paper

197. Estimating the channel uplink capacity of a CR based central access MIMO Network

The major objective of this paper is to study the performance analysis of CR-MIMO (Cognitive Radio-Multiple Input Multiple Output) networks with various fading channels. Specifically, the research objectives are modeling and evaluation of outage probability in CR-MIMO network in both faded and non-faded environment & modeling and evaluation of uplink ergodic MIMO channel capacity in CR based central access network in different fading channel techniques.

Published by: G Ramya Krishna, Bonthu Sridevi, Tirumani Nalini Prasad, Bonthu Kanaka Durga

Research Area: Multiple Input Multiple Output Systems

Research Paper

198. Detection technique to identify Asthma level in children

To obediently and modestly observes the asthma patient's atmosphere to classify the presence of two asthma-exacerbating activities, smoking and cooking using the Foobot sensor. Asthma management is challenging as it involves understanding causes and avoiding triggers that are both multi-factorial and distinctive to every individual. Moreover, it is tricky for doctors to constantly monitor the health of lots of patients and the environmental triggers simultaneously; or to get sufficient data on the environment in which the patient lives. A data-driven approach to develop a continuous monitoring-activity detection system aimed at understanding and improving indoor air quality in asthma management. In this learning, we were productively talented to notice a high absorption of Particulate Matter (PM), Volatile Organic Compounds (VOC), and Carbon Dioxide (CO2) during cooking and smoking activities. We detected (a) smoking with an error rate of 1%, (b) cooking with an error rate of 11%, and (c) obtain an overall 95.7% percent accuracy classification across all events (control, cooking and smoking). A scheme will permit doctors and clinicians to associate potential asthma symptoms and exacerbation information from patients with environmental factors without having to personally be present.

Published by: V. S Vishnuharini, S. Priyadharsini, M. C. Raveena, P. Poornima

Research Area: Embedded

Research Paper

199. Use of e-waste and fly ash as a filler replacement in the bituminous concrete pavement

The goal of this research is to explore the impact of e-waste as a coarse aggregate and fly ash as a filler in the bituminous concrete pavement.Due to increase in the demand for raw materials, there is depletion of raw materials nowadays which make depletion of resources for the future generation.There is a lot of alternative to e-waste and flash which recklessly increasing day by day and effect badly to the environment.From the previous researchers, it is observed that there is an unequivocal increment in marshal stability and flow rate with the increase in the percentage of waste with and fly ash in the bituminous design mix.The fly ash is not helping in increasing the strength but it helps to attain the stability nearly equal to nominal mix.It is an attempt to use the waste products like e-waste and flash which harm the environment and difficult to decompose and reuse.In this research, I am going to use e-waste as coarse aggregates in replacement with different percentage and fly ash as a complete filler.

Published by: Rajat Kajal, Rajesh Chauhan

Research Area: Civil Engineering

Review Paper

200. Performance evaluation of grey water treatment using Rotating Biological Contactor (RBC) along with Phytotreatment and future scope for use as drinking water

Greywater forms a major part of our domestic wastewater system. Proper Treatment and reuse of grey water can solve a major problem of water scarcity. Grey water is that part of our wastewater which is free from fecal matter and contains very low organic content and only a few pathogens. It becomes easier to treat greywater discharged from bathrooms, kitchens, and laundries. Properly treated grey water can be used for toilet flushing, irrigation, gardening of homes to reduce our water bills. Several treatment technologies have been developed in the past years to evaluate the performance of greywater treatment. Use of Rotating Biological Contactor (RBC) along with a mathematical model was done to analyze the different concentrations of grey water i.e. High, Medium, and low concentrations. The RBC system proved to be efficient in BOD removal and it was between 93% - 96% and TSS removal were between 84% - 95% of all concentrations of Influent grey water. Phytotreatment of grey water was also done by the use of oleaginous plants like rapeseed, soybean, and sunflower. The Phytotreatment tests were carried out in 20 L pots in a greenhouse and it presents high removal efficiency of Nitrogen ( N > 80%), Phosphorus (P >90%), COD about 90 %. Biomass production along with grey water treatment was the main finding of this study. The treated grey water can be used for disinfection and Sand Filtration. Efficient Treatment of greywater can comply with water shortage in future  

Published by: Abhay Srivastava

Research Area: Environmental Engineering

Research Paper

201. Solar based security and smart irrigation system for agriculture

Modern agriculture is the need which is required to enhance productivity and security of agriculture system. The security to the agriculture field has to be provided in order to protect the field from animals. The productivity of the agriculture system can be enhanced through the proper irrigation system, crop production/selection based on amount of water available and limited sprinkling of the pesticides’ therefore decided to develop an application model which suits humankind with: 1) The security can be provided through laser fencing. Laser-based fencers can be used to protect the farm, farm-lands, forest bungalows etc. from animals. In a way, laser fencing help in performing the job of a farmer/forest guard present in the field. Laser fencer controls the animals/human by giving the siren indication that alerts them to stay away from the fence which will protect our field. Continuous monitoring of the field through the wireless camera which will be mounted in the field.2) Create a robot that supplies pesticide in an agricultural environment with low wastage and reliability. The robot can be controlled by any wireless media of communication 3) Create a setup to provide water level indication in the water tank so that the proper crop can be selected which can easily grow in the available water. Thus this avoids the problem of scarcity of water 4) water irrigation system based on the moisture content in the field. Water will be supplied to the field if the moisture content in the field is low (minimum threshold) and supply will be stopped if moisture content is more (maximum threshold) in the field. Apart from these, we can even control the water supply through GSM.

Published by: MD Azhar, Nalini Kuntoji, Pramod Kumar, Balaraj TC, G. Divya Muralidhara

Research Area: Electronics

Research Paper

202. The Smart Mirror

In this paper, we describe the design and development of a futuristic mirror that offers simplified and customizable services to the home environment. The mirror interface provides users with the versatility needed for better management and integration of daily tasks. On a par with the recent advances in the Internet of Things standards and applications, the mirror is designed to enable residents to control the household smart appliances and access personalized services. The proposed system is set apart from others for its provision of various customized information services for user profile generation.  

Published by: Ramya .S, Yuvamalini. M, Saranya. S

Research Area: Internet of Things

Research Paper

203. Automatic attendance system using Webcam

Attendance marking in a classroom during a lecture is not only burdensome but also a time-consuming task. Due to a usually large number of students present in the lecture hall, there is always a possibility of proxy attendance. It is extremely difficult for lecturers to manually identify the students who skip their lectures on a regular basis. Attendance management of students through the conventional methods had been a challenge in the recent years. In this method, the camera is fixed in the classroom and it will capture the image, the faces are deleted and then it is recognized with the database and finally, the attendance is marked. In this paper, we propose a conceptual model for automated attendance system through facial recognition.

Published by: Simran Raju Inamdar, Aishwarya Vijaykumar Patil, Ankita Digambar Patil, Dr. S. M. Mukane

Research Area: Computer Science

Research Paper

204. Precast Polymer Paver (road)

Polymer and rubber tier which is increasing day by day becomes an eyesore and it pollutes the environment. A large amount of polymer and tier are discarded or burned which effect to environment and air. Hence, these waste polymer (HDPE) and rubber (tier) are to be effectively utilized. In this project High-density polyethylene (HDPE) bags, bottle and rubber crumb are cleaned and melted and then the aggregate is added, this homogenous mixture is poured in a cube and placed in an oven for crystallization process. After crystallization of 2 to 3 hours cube is ready for use, it does not require curing. Like a small cube of 15cm x 15cm x 15cm large size of paver can also be formed such as 1m x 1m or as per design requirement in the industry and placed on land for the use of road and footpath. This alternatively saves the quanta of cement and reinforcement which is a costlier product in road construction project. With the help of more research on this precast polymer road, it’s properties can be enhanced easily.

Published by: Patel Mohd Faisal Mohd Hasan, Muzammil Arif Shaikh, Shinde Ashutosh Kashinath, Sangle Rahul

Research Area: Civil Engineering

Research Paper

205. Identification of quality index of fruit/vegetable using Image Processing

The recent application and development of image analysis in the quality evaluation of products in the field of agricultural and food. Images are the important source of data and information in the agricultural sciences. The basic concepts and technologies associated with computer vision system and automatic vision-based technology, tool used in image analysis and automated sorting and grading are highlighted.The proposed system starts the process by capturing the fruit or vegetable image.Then, the image is transmitted to the processing level where the fruit features like color, shape and size of fruit samples are extracted. After that by using artificial neural network fruit images are going through the training and testing. In this proposed paper, the neural network is used to detect shape, size and color of fruit and with the combination of these three features, the results obtained are very promising.

Published by: R. Prince, H. Sathish, R. Sai Kumar, V. Karthik, S. Jeya Anusuya, S. P. Vijay Vardhan Reddy

Research Area: Image Processing

Research Paper

206. Data preprocessing and balancing to enhance end to end learning in self-driving vehicle

Driving a vehicle has always been a demanding task be it any vehicle since robotics and artificial intelligence has progressed multi-folds in the last decade which gave us the technological grounds to automate many processes which include driving. Developing autonomous vehicle is the current research area for many corporate like are Google, Tesla, Nvidia, and Uber. Several proposed methodology for them is Nvidia’s Behavioural Cloning, CommaAI’s OPENPILOT, Tesla’s AUTOPILOT all of which uses the camera to process surrounding of the vehicle. In this paper, we discuss Nvidia’s recent work (behavioral cloning) and incorporate their work with few techniques of our own like filtering the repeating data and augment the input data to reduce the amount of data collection required.

Published by: Syed Zishan Ali, Rishabh Sharda, Abhishek Dewangan, Sourabh Chawda, Rahul Sharma

Research Area: Machine Learning and Automation

Research Paper

207. Artificial farming – An electronic approach to grow plants

This project is for growing plants or vegetables inside the packed electronic environment by using the artificial plant grow Led to growing the plants. The photosynthesis process carried out by the plants independent on the LEDs which will provide the total electronic surrounding to the crops so we can call it as an “Artificial farming- an electronic approach to grow plants”. In this project, we have made a prototype of actual concept. The amount of water required to grow the plants is very much less as compared to the traditional farming, here we have provided the automation technique for providing water to the plants. In this prototype, we have made a rack structure so that we can take the more crop production by making racks on one above in a small area. In this artificial environment, we are using sensors to monitor the condition of the soil, air, temperature. According to collected data by the sensors, this data is provided to aurdino for the controlling the water supply, lights, fans. The LEDs are used to provide the special light wavelength. By using that wavelength the plants are going to carry out the photosynthesis process. In this process, the food making process of plants is light dependent. As the environment is indoor it will not have any insects, and pests affecting the crops, hence no insecticides and pesticides will be required. The indoor environment will neither evaporate water nor will percolate it into the earth hence water requirements be very small. The indoor environment is equipped with artificial lighting, so crops can be grown independent of season. By using the electronic farming method we can reduce the greenhouse gases, the overall quality of the food is increased due to the organic fertilizers being used to grow the plant and also the pesticides and the chemical fertilizers are not used in this type of farming. The water required for the electronic farming is much lesser than the ordinary traditional farming. As it is completely indoor so that the atmospheric effect is not observed on the plant so we can take year-round food production.

Published by: Ajinkya Bhupal Mahajan, Bhau Bhimrao Kharat, Swapnil Chandrakant Kundale

Research Area: Electronics and Telecommunication.

Review Paper

208. Emotion recognition using face and voice analysis

The goal of this project is to design a system that reads the face and voice of a person in conjunction to detect the sentimental and emotional state of a person based on that data. Humans are said to express almost 50% of what they want to convey in non-verbal cues. This concept can be used to analyze on the tone and facial expressions both of the non-verbal cues that can be used to detect the sentimental and emotional state of a person based on his facial expressions and speech features. Here make use preexisting databases, classify them according to their emotions and create classifiers for the purpose of emotion recognition of new input data. There are many data sets available from previous surveys. The database we use in here is Extended Cohn Kanade database for the facial expressions and SAVEE database for speech data. We then make use of the SVM classifier to classify the respective emotional labels appropriate for each of the image and then create an SVM classifier which is able to classify the input given to it. The emotional state of the face and the voice of the user is found out and then we read them both in conjunction to get a more accurate representation of the user’s emotional state. We then play an appropriate music depending on the emotion of the user.  

Published by: Rohan Raphy Thattil, Joseph Gigo Ignatiaus, Shafeer P. N, Shyam Krishna M

Research Area: Machine Learning

Research Paper

209. Parking slot booking system

The proposed project is a parking booking system the provide customers a way of reserving a parking space online. It helps to overcome the problem finding a place for parking in commercial areas that unnecessarily consumes time. Hence this project offers a web-based reservation system where users can view various parking areas and select the space to view whether space is available or not. If the booking space is available then he can book it for the specific time slot. The booked space will be marked red and will not be available for anyone else for the specified time. This system provides an additional feature for canceling the bookings. The user can cancel their books space anytime. Users can even make payment online via credit card. After making payment users are notified of the booking via email along with unique parking number. This is a website which allows the user to book a parking slot for the vehicle prior to arrival at the venue. Firstly the user needs to sign up and create their account. Once they have registered they can anytime login to their account and manage their booking schedule. The website provides the user with the options like BOOK PARKING, CANCEL BOOKING, VIEW BOOKING etc. Once the user selects the BOOK PARKING option, he/she is directed to other pages where he is asked to select the desired venue he wishes to book the parking. Then the user needs to select the day on which he/she needs the parking. If the parking is available at that particular day, he can choose the desired venue for that day. Else a message displays saying “All the slots are booked for this particular day.” Once he chooses the slot an online receipt is generated for the confirmation of the booking. This receipt is the confirmation of the user.

Published by: Shivam Singla, Manish Yadav, Prabu S

Research Area: Software Engineering

Research Paper

210. IoT based efficient water distribution system for human and agricultural uses

An Integrated System Based On Internet Of Things Technology Is Proposed For Managing, Monitoring and Efficient Distribution Of Water. With an increase in Population, urban residential areas have increased because of this reasons water has become a crucial problem which affects the problem of water distribution, interrupted water supply, water conservation, water consumption. Current Water distribution and management system involves Water wastage and faces new challenges like System Lags behind related to technical aspects, Degradation of Soil Quality with respect to Irrigation. In order to curb the problems involved in the existing system, Solutions are implemented in the proposed system. IoT Based Efficient Water Distribution SystemFor Human And Agricultural Use Like The Name Says Is all About Managing Water Supply Throughout The Scale, including Small Societies, Townships, Urban Infrastructure And Also For Irrigational use.The Water supply with continuous monitoring makes a proper distribution so that, we can have a record of the available amount of water in tanks, flow rate, abnormality in the distribution line. IoT is a network of physical objects which are embedded with electronic devices, sensors, software, and network connectivity. Monitoring can be done from anywhere as the central office. As per the scarcity of the water, it will be indicated by sending short message service notification as well notification of water supply timing to societies. This proposed system also helps the farmers to irrigate the farmland in an efficient manner with automated irrigation system based on soil moisture and DHT11 sensor. The DHT11 is low-cost humidity and temperature sensor. It senses the humidity and temperature in the environment of the farmland and sends the result to the system.The moisture sensor is used to check the soil moisture and based on this microcontroller drives the solenoid valve. This will improve the cultivation method and leads to better productivity. It Can Control The Water Usage In A Precise Way.

Published by: Mayur Bhalchandra Tangadi, Chirag Sadanand Patil, Prayag Narayan Mhatre, Kanchan Dabre

Research Area: Computer Science

Research Paper

211. GPS and GSM based geo location guide using RF with emergency alert via SMS

The people entering a theme park are provided with a small unit called as RF receiver which contains an emergency button. Whenever the person enters a ride or a game in the theme park, they will be intimated with their location in an LCD receiver, this is done by an RF transmitter kept in various location with fixed IR sensors, which senses the person and the signal is transmitted to the receiver. In the receiver, a programmed Arduino decides the location based on the received information and it is displayed in the LCD display. When there is an emergency they can push a button present on the receiver unit and the information goes to security as well as controller of the game in the form of an alert message along with the location of the person using GSM module. Here the location of the person is found using GPS tracker.

Published by: Veena V, Vidhiyalukshmi G, Rajalakshmi R, Dr. S. Leones Sherwin

Research Area: Embedded System

Research Paper

212. Video/Image Super-Resolution using convolution neural networks

Convolutional Neural Networks (CNN) is a unique kind of Deep Neural Networks (DNN) which has a place in the Machine Learning Domain. This calculation has so far been effectively connected to Image Super-Resolution (SR) and also other picture reclamation and characterization errands. Picture/Video Super Resolution implies upgrading the picture/video quality.In this proposed framework, we consider the testing issue of video super-resolution.Often there is a tradeoff between the spatial and worldly determination estimation and, consequently regardless of whether the quantity of pixels in the picture is progressively the picture, we get is a low-quality picture and a similar idea applies to recordings. Henceforth, we propose a CNN that is prepared on both the spatial and the fleeting measurements of recordings to improve their spatial determination. Back to back edges are movement remunerated and utilized as a contribution to a CNN that gives super-settled video outlines as a yield. While extensive picture databases are accessible to prepare profound neural systems, it is additionally testing to make a vast video database of adequate quality to prepare neural systems for video rebuilding. We demonstrate that by utilizing pictures to pre-train our model, a generally little video database is adequate for the preparation of our model to accomplish better outcomes. Encourage we analyze our CNN based Very Deep Image/Video Super Resolution approach with presently utilized Iterative Video Super-Resolution (SR) calculations.

Published by: Amey A. Tarfe, Kunal P. Nayak, Rohan K. Netalkar, Shreyas D. Palve, Dr. Neeraj Sharma

Research Area: Machine Learning

Research Paper

213. Agricultural robot for seed sowing

Most of the states in India are dependent on agriculture. About 70% people are dependent upon agriculture. People spend more money on agriculture but they not get that much output, so it is not that much beneficial to them. To reduce the spend money; efforts of people and to increase accuracy the agricultural system in India should be advanced. In agriculture field Numbers of operations are performed like seed sowing, weeding, cutting, pesticide spraying etc. Seed sowing is very basic and significant operation. The existing equipment’s used for seed sowing are very difficult and inconvenient to handle. So we have suggested to develop an equipment which will reduce the efforts of farmers. A robot is a mechanical, artificial agent and is usually an electromechanical system, because of software programming it makes complicated tasks easy to perform. Applying automation to agriculture its advancements to the industry while helping farmers to save money and time. In this system automatic seed sowing is done which aims to drop seeds at particular position with specified distance between two seeds and lines while sowing by using ARM controller.

Published by: Vidya Vishnu Koli, Rani Ramchandra Chavan, Rahul Maruti Kumbhar, Madhuri Hari Adat, Ajinkya Sharad Mane

Research Area: Agricultural Robotics

Review Paper

214. Biogas fuel station for Dilkap College

Biogas is one of the most useful gases which is widely used for various purpose. Biogas is used as a heat energy, electricity generation and if the gas is treated further can be into Compressed Natural Gas (CNG). The production of biogas is under the anaerobic condition where oxygen is absent and anaerobic bacteria are present. The temperature plays an important role in the whole process. In this project waste of food produced from the kitchen is the important source of an ingredient which is useful for the production of biogas. The kitchen food waste can be easily decomposable and produce gases which contain methane, carbon dioxide, moisture, etc. The biogas produced can be used as a supplement fuel for kitchen and also used to generate electricity. The main unit of the process is digester in which the biomass waste in feeded after some interval of days the degradation takes place, during process oxygen is used completely and carbon dioxide is produced, know this carbon dioxide is used for the production of methane in presence of methanogen bacteria.The scrubber is installed to remove the useless gases rather than methane. The first scrubber is soda lime which is used to remove carbon dioxide. Second scrubber in which there is silica gel which is useful for the removal of hydrogen sulfate. Third scrubber in which there is ethylene glycol which is used for removal of moisture present in the gas. After removal of all such gases only methane is left which is combustible and that is also known as natural gas which is used to generate electricity, heat, etc. Final product which is left in digester can also be used as fertilizer.

Published by: Mukri Farhan Rizwan, Shaikh Abrar Sattar, Yadav Sunil Fathebahadur, Sharan Reetika

Research Area: Environment Engineering (Civil)

Review Paper

215. Comparative analysis of different techniques for breast cancer detection in Mammograms

Segmentation of images is one amongst the primitive and most vital stages of processing in images and plays a very crucial role in analyzing medical mammogram images but images of mammogram have the moderate level of distinction and are disrupted with sturdy speckle noise. Owing to the effects, mammogram images segmentation is extremely difficult and conventional segmentation techniques may not lead to result satisfaction. Due to high noise, low distinction, and alternative imaging artifacts, region boundaries in mammogram images often do not adjust to the assumptions of many image processing algorithms. This paper addresses the potencies and weaknesses of the existing techniques of carcinoma detection in mammograms. The paper provides new aspects of research for researchers.

Published by: Neha Tuteja, Parvinder Singh, Mohit Bansal

Research Area: Digital Image Processing

Research Paper

216. The incidence of upper quadrant dysfunction in nursing brothers

The cranium, cervical spine, mandible, shoulder girdle complex are the biomechanical functional unit for maintaining natural head posture1. It is expected to conform to the physiological requirements associated with sight (visual axis), the vestibular balance system and hearing. In literature, this functional unit has been termed as "UPPER QUADRANT"2. Different components of this unit are linked to each other through musculoskeletal system forming a kinetic chain. Impairment in this musculoskeletal unit may produce at the various level such as; cervical, shoulder, elbow etc. however regardless or origin of site or unit affected eventually likely to the certain extent in long term. This may be one of the reasons for functional disability that person has to wean off from his occupation. This leads to workers absenteeism from his work, while on another side a person working environment itself can be the perpetuating risk factors for such impairment3. Impact of various factors in his occupation may predispose him to impairment and disability. Occupational safety and health administration exposure concern that there are disorders affecting wrist, tissue, arm and other anatomic areas as a result of ergonomic stress occurring from repetitive motions, forceful exertions, vibrations, sustained or outward positioning4.

Published by: Subrat Samal, Snehal Samal

Research Area: Medical

Research Paper

217. Structural audit of RCC building

Civil engineering is the foundations of all structure which made human life easy. The structure can be of any kind like residential building or non-commercial buildings or historical or ancient monuments had the huge impact on human life because of their long lifespan which made them efficient structure, but this effect of nowadays structures can’t be seen anywhere. The structure is getting older or weak before their design period. In this project where trying to root out faulty mechanism in structure to overcome the failure of the structure  

Published by: Sanket Sanjay Suryawanshi, Vaibhav Vishnu Vishe, Deepak Premchand Sah, Reetika Sharan

Research Area: Civil Engineering

Research Paper

218. Managing overbooking in hotels: A probabilistic model using Poisson distribution

Yield Management is commonly practiced in all hotels and other industries where advance booking is required. Various revenue and non-revenue tools of yield management have been practiced and applied. One important tool for yield management is using overbooking in hotels and airlines industries. For management at an operational level, a sound understanding of overbooking will allow maximizing revenue. The real challenge arises when faced with the question regarding how many overbooking is optimum. If we are overly cautious and overbook very less, it would mean a loss of revenue for the hotel. On the other hand, if we overbook to a large extent it could result in confirmed reservations being walked (turned away). This may lead to unsatisfied guests and a poor brand image for the hotel. Hence a balanced approach is required which will help us optimize the overbooking level. In most hotels, this is achieved by adjusting overbooking level based on the experience of Front Office manager. This paper utilizes Poisson distribution as a tool to model the probability of no-shows in a hotel using historical data and hence optimize the number of overbooking to be accepted in a given time period.  

Published by: Gopi Nath Vajpai

Research Area: Hospitality and Tourism

Research Paper

219. Formulation of solutions of a special type of standard congruence of prime modulus of higher degree

In this paper, a special type of congruence of the prime modulus of higher degree is considered. A direct formula is established. The formula is well-tested by solving suitable examples. A comparison is made with the method established by Eugen Vedral and the method presented in this paper and the method is proved to be a generalization of Eugen Vedral's method. It is proved more useful than the method suggested by Eugen Vedral.

Published by: B. M. Roy

Research Area: Mathematics

Research Paper

220. Characterization of bioactive components from petiole of two varieties of colocasia seen in Kerala

Colocasia is a genus of flowering plant belongs to the family Araceae native to South Eastern Asia and Indian subcontinent. Some species are widely cultivated and naturalized in other tropical and subtropical regions. Different varieties of Colocasia are seen in Kerala of which Colocasia aquatilis is labeled as an aggressive weed that grows in dense clusters along lake shores and riverbanks, displacing native shoreline vegetation. . Qualitative analyses of two samples are done using crude extract from both the varieties. Antimicrobial activity of wild variety is evaluated in both gram positive and gram negative bacteria using pure extract. Even though both comprise the same genus Colocasia, significant differences were seen in the result of these varieties. In our work , we have used two common varieties of Colocasia one is edible variety Colocasia gigantea and other one a a weed Colocasia aquatilis

Published by: Rincy Susan Raju

Research Area: Plant Biology

Research Paper

221. Deadlock recovery and mutual exclusion with atomic operations of cloud storage

While using consumer electronic devices consumers continue to produce and spend a large amount of data. To store consumer’s data, a huge volume of storage is needed. A cloud-of-cloud which is a virtual cloud storage service using heterogeneous public cloud storage services can be a solution. To support concurrent accesses for multiple consumers and devices, a mutual exclusion in a cloud-of-cloud is necessary. From the base paper, they proposed a mutual exclusion method for concurrent access in a cloud-of-clouds. The proposed method includes an atomic operation for cloud-of-cloud a deadlock recovery and a race condition control. To evaluate the proposed method, we modified two modules of saving me which is a cloud-of-clouds storage service system with experiments on the implemented system, we found out to the optimal number of files in a file table and the deadline time for deadlock avoidance. The proposed method does need not only any server system but also any communication between clients. We confirm that the proposed method provides mutual exclusion features to deadlock avoidance.

Published by: N. Munesswari, S. Ishwarya, M. Karthikpriya, A. M. Senthilkumar, M. Saravanakumar

Research Area: Cloud Computing

Review Paper

222. Design of fixture for floor grid of Asphalt Paver

A fixture is the most effective tool used to maintain the tolerance and precision in manufacturing industries. This project revolves around the development of fixture to manufacture the chassis of asphalt paver vehicle from L&T construction equipment ltd. The design of the fixture is optimized to provide the company to build the chassis more effective and precise with the knowledge acquired during the literature survey. The fixture is set up on the dowel-pin platform. The project will give an overall development of a fixture from the design process till the scaled prototype going under multiple iterations of analysis through Finite Element Analysis Method. The parameter or the constraints in the design are studied thoroughly such that no failure of the fixture occurs during high volume manufacturing in the company. The end product will be designed considering parameter which could be affected by various shop floor activities. Also carried out tolerance stack-up analysis to find out whether the introduced precision tolerance at the component level is meeting the assembly level functional requirement. The material selected for fabricating the fixture is specified for frequent periodic usage and open environment. The final product will meet all the requirements for large volume manufacturing in L&T construction equipment ltd.

Published by: Anup GM, Nikhilesh J, Nandan Gowda AR, CM Aiyappa, Chethan K S

Research Area: Mechanical Engineering

Research Paper

223. Bio-CNG production potential from locally available biomass

Today Mumbai is facing the problem of waste accumulation in different areas and limitation of waste disposal sites. These wastes are dumped in the form of big heaps. The degradation of these waste starts after few days. The process of degradation is aerobic at outer layer and anaerobic at inner layers. Due to these reactions, putrescible gases are come out and causes the health hazard. The Bio-CNG plant gives the best solution for this problem. It uses the vegetable waste as raw material and converts it into a high calorific value fuel. Hence it minimizes the waste accumulation and also solves the problem of energy crisis at the same time. In this study 6kg waste is digested under controlled environment condition n a mesophilic temperature range(30°C-45°C) for 26 days to obtain Biogas. The Biogas so obtained contains CH₄, CO₂, H₂S, and Moisture content. The presence of CO₂, H₂S, and Moisture content in Biogas is considered as impurities as it reduces the calorific value of fuel and hence removed using three scrubber units to obtain the composition of natural gas.These three scrubber units contained Sodalime, Silica gel, and Tri-ethylene glycol to remove CO₂, H₂S and moisture content respectively. The Bio-CNG obtained above contains more than 85% of CH₄ which has high calorific fuel value. These Bio-CNG can be used as automobile fuel, for cooking as well as for power generation. It can also be considered an alternative fuel option against the limited stock of conventional fuels like coal, petroleum etc in future.

Published by: Reetika Sharan, Sasane V. V

Research Area: Engineering

Thesis

224. A study on cost and schedule analysis on high-rise building by using earned value management

High rise residential projects suffer from cost overrun and time overrun due to multiple reasons. The earned value management tool can act as a control to check project cost and schedule of any building construction. EVM is not implemented in many residential projects due to lack of understanding of importance. The main objective of my project is to apply EVM to a high rise residential project and to identify time overruns, cost overruns and probable schedule slippages in the projects through the parameters such as schedule variance, cost variance, schedule performance index and cost performance index. This EVM tool is very beneficial to track ongoing project and gives the performance of the project. The result of the project will show the difference between scheduled performance and actual performance of a project for a particular phase of the construction project. In this report, a study of an ongoing project of (G+3) APARTMENT is done. Calculation of construction data cost wise as well as month wise and activity wise plan value, actual cost and earned value for the project. From the study, I came to a conclusion that majority of the construction projects delayed due to time overrun and cost overrun.From the project parameters, it is found that the project is behind schedule as well as over budget. Original completion time for the project is 9 months but the project will take more two months for the final completion of the project, as well as estimated cost is also increased from planned cost. using this EVM tool to track an ongoing project is extremely beneficial and gives better results about the performance of the project.

Published by: Puli Pooja, Dr. R. S. N. Sastry, S. Swapna

Research Area: Civil Engineering

Research Paper

225. Home automation by smart wheelchair for physically handicapped person using Arduino

In this paper, we have implemented a wheelchair which is helpful to handicapped persons for performing their activities in day to day life. The overall operation of the wheelchair is to facilitate handicapped person with safe movement. Also the addition, the feature is to control basic home appliances with the help of remote sensor from the wheelchair. This project uses AVR microcontroller Atmega328 circuit and Direct Current Motor to create the movement of the wheelchair with help of the mobile application. An additional feature is to control basic home appliances with the help of remote device which is very useful for the handicapped person to operate home devices.

Published by: Shardul S. Kulkarni, Atul B. Dhembare, Pratik D. Deshmukh, Vishranti M. Marathe, Mayur U. Yelpale, Pragtee B. Tathe

Research Area: Medical Electronics

Research Paper

226. A study of search engine optimization: Role and importance

In the present information age, the management of the website is a hot topic and the effects of a search engine over a website. This has forced a large number website owner to make effective efforts for search engine optimization. The positioning of a website in the first place of a search result of a search engine is a tedious job, and to make this possible one needs to understand the basics of search engine optimization. There are various techniques to help us to increase the ranking of our website such as the use of proper keywords, generating backlinks, use of proper tags, metadata etc. SEO is divided into two parts: On-Page and Off-Page SEO. In order to be successful, both the areas require equal attention. This paper aims to explain the functioning of the search engines along with the role and importance of search engine optimization.

Published by: Vishnu Raat, Sachidanand Maurya, Uma Thakur

Research Area: Computer Science

Research Paper

227. Google maps based trending decision

In the last decade, the social network has gained remarkable attention. People access social network sites such as Twitter, Facebook LinkedIn, and Google+. People are becoming more interested in and depend on the social network for information, news, and opinion of other users on different subject matters. The heavy dependency on social network sites causes them to generate massive data. The main contribution of this project is the integration of sentimental analysis on location-based Twitter data. Another contribution of this project is the development of a novel user interface, which allows the user to search on a map interactively on Google map. This integrated sentiment analysis works efficiently and performs location-based popularity on persons, products, event or any given topic.

Published by: Anuj Upadhyay, Ashu Dikshit, Anurag Mishra

Research Area: Computer Science

Research Paper

228. Drone (Unmanned Aerial Vehicle) using KK 2.1.5 board for surveillance

Drone (Unmanned aerial vehicle) is an electronic device which is remote controlled based aircraft used to achieve vertical flight with stability using KK2.1.5 board and it can be used for live streaming and also for capturing images using camera and as technology advances increase the performance and reduces the cost of microcontroller so that general public can design their own drone .The main aim of this project is for live streaming and collecting images.

Published by: O.V.P.R. Siva Kumar, Anamali Reethika, D. Manikanta

Research Area: Unmanned Aircraft

Review Paper

229. Enhanced test case prioritization technique using bat algorithm

Software testing is the method of recognizing the accuracy and excellence of software package. The main idea is to identify whether the software fulfills the exact desires, requirements, and hopes of the customer or we can also say that testing is the execution of a system or application in order to discover software defect, errors or bugs. Regression testing is a type of software testing that guarantees that earlier established and tested software still executes the same way after it is altered or interfaced with other software. Variations may contain software improvements, configuration changes, etc. Throughout regression testing, new software regressions or bugs may be discovered. Sometimes a software change-impact analysis is achieved to decide which areas could be affected by the projected changes. The main idea of regression testing is to guarantee that alterations made to the software, such as the addition of new features or modifying present features, have not unfavorably affected features of the software that should not change. Most exclusive activities that take place as software is established and preserved is the retesting of the software when it is modified. Since regression testing is essential but costly, considerable research has been achieved to develop techniques to make regression testing more operative and efficient. There may be inadequate resources to permit for the re-execution of all test cases in regression testing. In this condition, test case prioritization techniques object to increase the efficiency of regression testing by assembling the test cases so that the most valuable are performed first.Various nature-inspired algorithms were introduced which are Ant colony optimization, Particle swarm optimization, Greedy algorithms, Local beam search and Bat algorithm. Results show that the performance of Bat algorithm is best out of all algorithms.

Published by: Anku Sharma, Nancy Sehgal

Research Area: Software Engineering

Review Paper

230. Food finder- Mobile food ordering application

The purpose of this project is to develop an online “Food Finder” application. It is an online food ordering system that enables the customer to place their order at any time and any place. The reason to develop the system is due to the issues facing the food industry. Some issues are such as peak hour-long queue issues, sometimes due to wrong order was written by waiter, increase of taking away foods than visitors, speed major requisite of food preparation, limited promotion and advertising on current strategy, and quality control of food management issues. This application will contain different types of food varieties available for the user to buy through online. The system also allows to quickly and easily managing online menu which customers can browse and also predict how much is spend on food, and use to place orders with just a few clicks. Restaurant owner/employees accept these orders through online an easy to track/dispatch orders for efficient delivery of food. Therefore, besides that, it provides a user-friendly food searching menus and also calculates the exact price of that selecting food item from menus before they place the final order.

Published by: Ashish Rathod, Abhijeet Khadke, Chetan Wakode, Pushpak Ubnare, Chandrakant Shinde

Research Area: Home Science

Research Paper

231. Application of IoT for energy conservation

Nowadays IoT plays a vital role in controlling and monitoring applications. This proposal deals with conservation of electrical energy by means of avoiding wastage of current flow in the commercial buildings such as classrooms, hotels, auberges etc. We make use of contactless voltage detector for detecting current flow. For communication flow, we use the IoT device(ESP8266), microcontroller, sensors and relays

Published by: Arun Kumar .R, Indirazith .M, Balamurugan. V, Bharani Sekar .M, Rajkumar .P

Research Area: Networking

Research Paper

232. Industrial wastewater treatment and intimate the river water pH level using GSM

The pollution like water pollution due to the release of some chemicals in the industry affects the entire human environment. And finally, the entire ecosystem will be affected by allowing the wastewater into the river that makes the water polluted. Water pollution can affect many body organs and systems in addition to the environment. In our project, we are designed to produce steam power through industrial wastewater. The high pressure of steam flow decides the rotating speed of the turbine, rotating speed is proportional to steam flow. PH sensor is placed on the water board where the river water is taken for domestic purpose, if the PH level of river water is above 8 the intimation will send to the pollution control board.The 12W battery can be charged from the steam of 100-liter waste water.

Published by: Praveena G, Sumithra M., Kavipriyadharshini. N, Priyadarshini .A

Research Area: Engineering

Research Paper

233. College examination system

This paper presents а model of an Examination management System. It helps to access the examination information of а specific student in а specific class. The purpose of developing this system is to computerized the traditional way of conducting exams.  The examination management system project aims to provide the students the facility to view their examination timetable along with the syllabus for the examination and also the examination location, part of this project can also focus on generating student information as well as the providing the students with the facility to search for some basic information of any faculty. In this project, student can view their performance report after giving the examination. The student can also send his/her paper for re-evaluation аlong with providing the reason why he wants the paper to be re-evaluated. Аpаrt from this the details of the students booked under malpractice in а particular examination is also displayed by the system. This project is а Web-based аpplicаtion. The developed system is assessed using real data by the potential users of the system.  

Published by: Shubham Shelke, Ishita Yadav, Jahnvee Srivastava

Research Area: Software Engineering

Research Paper

234. Abhiyan

The main objective of this project is to improve the infrastructure of the schools, our idea is to provide children with the basic infrastructure facilities in the schools. In our project users should register his complaint to the system, when user submit the complaint, automatically its geolocation is captured (using geotagging) and send to the server along with the user complaint. After registration, a unique complaint ID will be allotted to the user, using this ID he/she can see the complaint status. When a complaint is registered, the admin will respond to the complaint within a particular amount of time. The user can track his/her complaint online.

Published by: Ansh Arora, Deepanshu Aggarwal, Anupriya Jha, Anchal Saxena, Upendra Mishra

Research Area: Information Technology

Research Paper

235. Optimization of the diffusion bonding parameters on aa5083 aluminium alloy using Taguchi’s technique

Effect of bonding parameters on the bonding strength of AA5083 aluminum alloys was investigated in the present study. Rolled plates of 5 mm thick AA5083 aluminum alloys were fabricated by diffusion bonding. Bonding temperature, bonding pressure and holding time were considered as the varying process parameters. Experiments are designed as per the Taguchi technique for the experimentation sequence according to the L9 orthogonal array. The desirability approach is used as an optimization technique to obtain the maximum bonding strength and bonding strength of the joint. After running through 10 cycles of optimization, the most optimal parameters are the bonding temperature of 510 °C, bonding pressure 13 MPa and holding time of 45 min with the desirability of 0.82.

Published by: Venugopal S, Mahendran G

Research Area: Materials Joining and Statistical Analysis

Research Paper

236. Defending zero day attacks: Resource-based approach

There is no doubt that security issues are on the rise and defense mechanisms are becoming one of the leading subjects for academic and industry experts. In this paper, we focus on the security domain and envision a new way of looking at the security life cycle. We utilize our vision to propose an asset-based approach to countermeasure zero day attacks. To evaluate our proposal, we built a prototype. The initial results are promising and indicate that our prototype will achieve its goal of detecting zero-day attacks.

Published by: Rajkumar PN, Dr. V. Dhanakoti, Rajesh S, Priyanka H

Research Area: Information Security

Research Paper

237. Salubrity - A medicine reminder application using android

Nowadays, smartphones have reached every hand and every home. As a result, people are making use of the beneficial mobile applications to make their everyday life easier. This paper focuses on the development of a mobile application to help to provide an effective health care system. This is an android based application in which alarm is used which may be closed by tapping the close alarm button, under the image of the medicine which is to be taken at that particular time. It may even have the contact numbers of the doctors for the emergency. This application will be helping hand for the people who are busy in their day to day life or old age people who forget which medicine is to be taken and when. Many such medicine reminder systems have been developed where a new hardware is required but in our work, we have made an attempt to develop a system which is free of cost, time-saving and supports medication adherence without any extra hardware.

Published by: Shivani Sharma, Katyayni Tyagi, Pooja Shishodia

Research Area: Information Technology

Research Paper

238. Social champion identification

NGO are non-profit making agencies that are constituted with a vision by a group of like-minded people, committed for the uplift of the poor, marginalized, unprivileged, underprivileged, impoverished, downtrodden and the needy and they are closer and accessible to the target groups. However, in spite of its achievements in various fields, NGOs are facing different problems which differ from organization to organization, region to region. In this context, an attempt is made in this report to solve some of the common problems faced by the NGOs and to give some remedies to overcome these problems. NGOs are always looking for individuals who will promote and spread awareness for their work and cause. We are looking to create a solution that will help the NGOs use basic information about existing and prospective donors like their name, email id, Facebook and LinkedIn profiles, and mobile numbers to look for any information available in the public domain to identify the ones most likely to champion their cause as social contributors.

Published by: Abhi Savaliya, Prince Kumar Maurya, Aditi Sakhare, Rohit Jadhav, Aditi Chhabria

Research Area: Social Media Data Analysis

Research Paper

239. Diet system using modified RETE algorithm

People across the globe are becoming more conscious regarding their weight, eating more healthy food and avoiding junk food. A system that can measure calories and nutrition in everyday meals can be very useful for maintaining our health. Calories and nutrition measurement system are very beneficial for the people to measure and manage their daily food intake. Dieticians are educated with nutrient value of foods; hence they can provide a diet based on a person’s eating timing, height, and weight. The system is an expert system so it asks all this data from the user and processes it. The system stores and processes this data and then calculates the Body Mass Index and Body Fat and provides the user with a personalized diet to fulfill their goals

Published by: Aniket Pathak, Ratan Boddu, Harsh Bhanushali, Amol Kadam, Nilakshi Jain

Research Area: Artificial Intelligence

Research Paper

240. E-citizens: A web application for senior citizens

The project titled “Web Application for senior citizens” is a web application which is created using PHP language, HTML, CSS and web frames. This web application is based on the senior citizens who usually live alone due to nuclear families and face day to day problems like getting medicines, needing drivers for going to places etc. This application actually helps the senior citizens by providing the details of the nearest facilities available. It stores the information of the people like contact numbers, name, fees and their work details as the database. The database is created with the help of MySQL. This application will also contain the details of the online pharmacies, vegetable sellers, grocers, and restaurant’s details to help them get delivered things to their doorsteps. This application will be interactive, dynamic, and capable of fulfilling the needs of the senior citizens. Basically, it will be very user-friendly. It will be developed using the three-tier system of the PHP that is the client which will be the browser and the server will act as the second tier whereas the third tier will be the database for the users.

Published by: Sarmistha Padhi, Aashita Tiwari, S. Jayakumar

Research Area: Web Application

Research Paper

241. In vitro callus induction studies on Abrus Precatorius L., A medicinal plant

The present investigation deals with the high-frequency callus induction studies on Abrus precatorius L., It belonging to family Fabaceae, an economically important multipurpose plant. The plant is scared of novel antidiabetic properties. The plant shows poor seed germination capacity (30%) due to hard seed coat and conventional vegetative regeneration methods are a complete failure. Therefore, the propagation of this plant by tissue culture techniques is an urgent need and well justified. Nodal intermodal and tendril explant were used for the callus induction studies. Axillary shoot proliferation on Murashige and Skoog’s (MS) basal medium fortified with 2, 4 di chlorophenoxyacetic acid (2, 4-D) and Kinetin (Kin). In combination with auxins at different concentrations. The best callus induction was obtained with MS basal medium contain (2, 4-D 1.5 mg/l + Kin 0.5 mg/l) for node explants. Like in MS medium where (75%) of the internode responded with (BAP 3 mg/l +kin 0.5 mg/l+ NAA 0.5 mg/l), at same time responsible with tendril leaf (84%) (2, 4-D 2.0 mg/l + Kin 1.0 mg/l). The results will facilitate the conservation and propagation of this important medicinal plant.

Published by: Prabhu. V, Dr. K. Ramar, Dr. V. Dhinesh, A. Kanimozhi

Research Area: Plant Tissue Culture

Research Paper

242. Development and characterization of lead-free solders

The paper describes the replacement of Lead with a composite mixture – Al, Zn, Sn, In in the process of soldering to eliminate the null effects on the environment like soil pollution and air pollution. The Breaching of lead during the conventional soldering process causes the above effects. This has prompted the development of “Pb - free” soldiers with desired attributes of an optimum melting point, wettability, Pasty range, Reduced Intermetallic layer and Ductile Nature. A number of tests have been conducted over the newly developed composite mixture, revealing reduced environmental effects when replaced with Lead without affecting the nature of the Process.

Published by: Darren D'cruz, Avinash. T, Dr. K. Arun Vasantha Geethan

Research Area: Materials

Research Paper

243. Blockchain banking system

The banking system in today’s world is open to threats of fraud and cyber-attacks. Since todays banking system is built on centralized databases, it is easy for an attacker to penetrate in any such database which will easily compromise all the information and data of the customers of the bank. This vulnerability of today’s banking system can be reduced by re-building the banking systems on top of block chain technology, which will remove the centralized database architecture and decentralize the data over the block chain, thus reducing the threat of database being hacked. Since the transactions over the block chain technology is verified by each and every nodes of the chain, it will make the transactions more and more secure thus making the overall banking system faster and secure.

Published by: Nadeem Hassan, Ritwiz Kaustoob, Mridula Vatsa, Shreyash Gharod, Asha

Research Area: Cybersecurity

Research Paper

244. Internet of Things (IoT) based Smart meter

The smart meter of this paper is basically used in monitoring and control of power consumption in a house by providing the user full awareness and control of the total load consumption. Here we have used a current transformer as the part of measurement by keeping the voltage as a constant. We have used Raspberry Pi module for making our system an IoT. We used relays for controlling the connected loads. The relays were controlled by using a Pic microcontroller which also performs the action of ADC. We have interfaced the Pi and Pic to form a closed loop. The Pi will send the power readouts to the custom built web page and the user can view each load and shut down or switch ON the loads accordingly.

Published by: Sivapriya Mohan C R, Al Naufal Shah B A, Sukhila S Nair, Al Irfan A R

Research Area: Electrical and Electronics

Research Paper

245. Clean India web app

The project aims to create a web-app with the name ‘CIW: CLEAN INDIA WEB APP’. In a country like India, citizens face a lot of issues such as cleanliness problem. As being an Indian we thought of bringing a change that would make India a better place. The people who want to help in clean India mission by making it clean can take an initiative to upload the particular area’s picture and to post on the CLEAN INDIA web-app. Waste is generated in such a manner that people are finding ways of disposal advancement is going in India day by day, but still, there are many places that are polluted by the waste and are not appropriate for living on which then they can make complaints to the municipal corporation or committee of that area. Through this web-app further municipal- corporation will take steps to instruct their employed workmen to clean the particular area.

Published by: Aditya Narang, Shashwat Mishra, Maulik Kohli, Prabu Sevugan

Research Area: Software Engineering

Research Paper

246. A comprehensive view of encryption and automatic file updating system

Lately, the information that can be stored and analyzed in the petabyte scale datasets also known as Big Data has proved to be immensely utilitarian due to its innumerable applications such as analysis of user’s choices which can be used in the manipulation of options provided to a user by various firms and organizations. This is intended for the benefit of the user can be highly beneficial and fructuous. This Big Data is stored in storage places called as Cloud that have other kinds of data directly provided by users stored as well. Applications of these data directly provided by users usually entail storing large data chunks in certain designated locations by the users so that the user does not have to worry about managing data storages for the same. These applications have led to opening up of a whole new plethora of possibilities, trends, and engagements. Unfortunately, not all of these are legit and we can see malpractices cropping up every day due to manipulation of user’s personal data for odious uses and ill-intentions. That being said, one must not undermine the cumulative storage size required for storing these magnanimous data. [Problems]: This means the major concerns for data storage in Cloud today are two. The first one is managing large data storage locations. The second one is the safety of stored data from Machiavellian sources that unceasingly try to get hold of intricate data for malicious purposes. [Solution]: Therefore this research aims at finding a way out of these prevalent problems. This is achieved by aiming at the two major problems. The first one is dealt with using distributed file storage system which can be employed by an organization to store intricate personal data in their own computing systems. This would enable them the assurance of no data leakage by a foreign data storage firm that would have been managing their data on its own cloud. Using this distributed file system would also hold the organization accountable for any data breaches and hence the security of data could be managed in a better way. The second problem of security against malicious data intrusions is dealt with using encryption and decryption techniques while storing and retrieving data. The encryption-decryption technique utilized in this research is RSA. [Result]: By performing the aforementioned steps, the two major concerns that come with storing personal data on the cloud can be handled efficiently.

Published by: Nirjhar Shukla

Research Area: Cloud Safety

Research Paper

247. Interactive physiotherapy

Technological progress made in the field of computer science with the passage of time has become ever-present in the lives of the majority of people. This form of progress can also be used in medical rehabilitation as an interactive game based physiotherapy. Physical therapy is always a big part of rehabilitation, but as time goes by, patients tend to get tired and demotivated due to repetitive and tedious exercises. It’s hard and time-consuming to book an appointment with a good physiotherapist. So, an interactive motion detection system with the help of Kinect can be a boon to this problem. It works as a mirror because it helps patients in the perception of moments offering a visual feedback. The use of interactive physiotherapy makes the treatment more encouraging, stimulating the human senses (mainly body movements)

Published by: Ankit Mhatre, Abhishek Saha, Juilee Bhoir, Aishwarya Tandel, Namita Pulgam, Kamlesh Nenwani

Research Area: Motion Tracking

Research Paper

248. Analysis of machining parameters of aluminum power mixed EDM process

Scientifically emerging industries like automotive, defense, aerospace, electronics, nuclear power, metallic molds and dies require materials of high strength, high-temperature resistant alloys like carbides, super alloys, haste-alloys etc. Manufacturers strive hard to produce these components at lower cost and of esteem quality as they have a direct impact on the profit earned by the firm. Hence, the productivity can be improved by increasing the material removal rate (or) by reducing the machining time of the product. Addition of a fine conductive powder to the dielectric fluid decreases its insulating strength and consequently increases the inter-electrode space causing an easy removal of the debris.The process variables of PMEDM play a considerable role in material removal mechanism. Performance of the PMEDM process depends upon characteristics like powder type, concentration, particle size, electrode area and workpiece constituents. As a result, the process becomes more stable, thereby, improving the material removal rate (MRR) and surface finish. Moreover, the surface develops high resistance to corrosion and abrasion. In this study, we have chosen the OHNS (Oil Hardened Non-Shrinking) die steel as workpiece material. A copper electrode and brass electrode with a diameter of 10 mm were used to cut the workpiece in EDM. Commercial kerosene has been chosen as the dielectric fluid. The consequence of the Machining parameters such as Pulse ON time, Pulse OFF time and current over the Machining time and Surface Roughness has been analyzed. The interaction study is made by Response Surface Methodology.

Published by: Radha Krishnan, S. Dinesh, Venkatraman Swaminthan, Naveen

Research Area: Mechanical Engineering

Research Paper

249. Bioleaching of industrial waste foundry sand by Aspergillus sp. treated as biofertilizer for the growth of herbal plants – Coriandrum sativum.

The present work aims to investigate the potential of Aspergillus sp. in the bioleaching of waste foundry sand and to support the growth of Coriandrum sativum. The WFSs were from aluminum, iron and steel foundries. This study also assesses the availability of Al, Cd, Co, Cu, Fe, Mg, Ni, Pb, and Zn in WFS. Although there were differences in the amounts of metals accumulated by the various plant species, excessive amounts of heavy metals were not taken up, regardless of WFS treatment. Hence, our study is designed to bioleached the metals present in waste foundry sand using Aspergillus sp. and to use it as a biofertilizer for the growth of Coriandrum sativum. The waste foundry sand was collected from different regions around Chennai and Coimbatore districts. The physical properties such as coloration like (black, and light black). Texture (Round and spherical), Moisture (0.75, 0.97), temperature (Room Temperature), solubility (dissolved and settled) and pH were measured (5-9) using standard protocols. The chemical properties of treated and untreated waste foundry sand were observed. The analyzed shows increase the level of aluminum and iron and decreased levels of Copper and Zinc in waste foundry sand. The waste foundry sand was bioleached using Aspergillus sp. The treated and untreated sand was later used for growing Coriander sapling under controlled conditions and observed for the metal absorption after growth. Our observations provide a supportive document on bioleaching of WFS by Aspergillus sp. was adequate in the growth of herbal plant Coriandrum sativum.

Published by: Padmasini Elango, Vijayakumari S

Research Area: Soil Microbiology

Research Paper

250. Offline handwriting recognition using neural networks

Handwriting recognition system can be defined as the ability of a computer to intelligently recognize the handwritten text by the user. The handwriting recognition is considered to be an open research topic due to the fact that every human being has a unique handwriting as well as there are numerous languages which are being used worldwide in written form. A neural network can be designed for recognizing handwritten texts in any language required. As different people have different handwriting styles, the task of recognizing the handwriting is a difficult task. As of today, the OCR (Optical Character Recognition) Engines are primarily focused on machine printed texts or handwritten texts which are written in block letters. By recognizing the texts in the handwritten text images by the user into letter codes is becomes usable digitally in computers and text processing applications.

Published by: Nitin Sharma, Pranshu Agarwal, Dr. Upasana Pandey

Research Area: Artificial Intelligence

Review Paper

251. Footstep power generation using piezoelectric transducers

The man has needed and used energy at an increasing rate for the sustenance and well-being since time immemorial. Due to this a lot of energy resources have been exhausted and wasted. Proposal for the utilization of waste energy of foot power with human locomotion is very much relevant and important for highly populated countries like India where the railway station, temples etc., are overcrowded all round the clock.When the flooring is engineered with piezoelectric technology, the electrical energy produced by the pressure is captured by floor sensors and converted to an electrical charge by piezo transducers, then stored and used as a power source. And this power source has many applications as in agriculture, home application and street lighting and an energy source for sensors in remote locations.

Published by: Purna Sai Chinnam, Vijay Shekar B, Chlamaiah Naidu .A, Anupama Muvva, Naveen Kadiyala

Research Area: Electronics and Communication Engineering

Research Paper

252. Design and analysis of aircraft landing gear axle

The Aircraft Landing Gear supports the entire weight of the Aircraft during Landing and ground operations. They are attached to primary structural members of the aircraft. The type of gear depends on the aircraft design and its intended use. Most landing Gear have wheels to facilitate operation to and from hard surfaces, such as airport runways. Our project mainly aims in designing and analysis of Landing gear Axle for 1.25 tonne, SWIFT type, UAV (Unmanned Aerial Vehicle), this project was conducted under the guidance of DRDO (Defense Research and Development organization). Other Gear feature skids for this purpose, such as those found on Helicopters, Balloon gondolas and in the tail area of some tail dragger aircraft. In the design and analysis of landing gear axle, the wheels of the aircraft are attached to the bearings which are in turn attached to the axle, when in turn supports the entire wheel system and absorbs the impact while touching the ground. These are being designed according to FAR23 regulations. Aircrafts that operate to and from frozen lakes and snowy areas may be equipped with landing gear that have skid, aircrafts that operate to and from the surface of water have pontoon type landing gear. This landing gear axle can be used in all types of aircrafts regardless of the landing gear, shock absorbing equipment, brakes, retraction mechanism, control, warning devices, cowling, fairings Structural members used.

Published by: Jothi Prakash A, Joshua P, D Santhosh

Research Area: Aerospace

Review Paper

253. The inquisitive path for segmentation of mobile customers using data mining approach

In today’s world, data mining has increasingly become very interesting and popular in terms of all application. Telecommunication companies generate a tremendous amount of data. These data include call detail data, which describes the calls that traverse the telecommunication networks. Data is a very important ingredient and extracting knowledge from the data serves great purposes to the users.This work helps in identifying the activities Segmentation of mobile customers of different groups will be done based on some rules. The basic principles of data mining are to analyze the data from the different angle, categorize it and finally to summarize it. The need for data mining is that we have too much data, too much technology but don’t have useful information. Data mining software allows the user to analyze data. This paper introduces the key principle of data pre-processing, Segmentation, classification, clustering and introduction of WEKA tool.Weka is a data mining tool. It provides the facility to classify the data through various algorithms. Data mining is the process of analyzing data from different viewpoints and summarizing it into useful information. Data mining is one of the top research areas in recent days. WEKA is a data mining tool, it provides the facility to classify and cluster the data through machine learning algorithm.

Published by: Rahul Dubey, Reema Sachdeva, Mridul Dubey

Research Area: Data Mining

Research Paper

254. Mechanical behaviour of hybrid composite filled with flax fiber

Fiber reinforced polymer composites has been used in a variety of application because of their many advantages such as the relatively low cost of production, easy to fabricate and superior strength compares to neat polymer resins. Reinforcement in the polymer is either synthetic or natural. Synthetic fiber such as glass, carbon etc. has high specific strength but their fields of application are limited due to the higher cost of production. Recently there is an increasing interest in natural fiber based composites due to their many advantages. In this connection, an investigation has been carried out to make better utilization of sisal fiber for making value-added products. The objective of the present research work is to study the physical, mechanical and water absorption behavior of flax fiber reinforced epoxy based hybrid composites. The effect of fiber loading and length on mechanical properties like tensile strength, flexural strength, the hardness of composites is studied. Also, the surface morphology of fractured surfaces after tensile testing is examined using scanning electron microscopy (SEM).

Published by: Pragadish .S, Rajesh .C, S. A. Muhammed Abraar

Research Area: Engineering

Thesis

255. Modeling, analysis, and prototype of an involute spur gear

This project deals with the modeling and analysis of spur gear with an involute profile. The involute gear profile is the most commonly used system for gearing today. In an involute gear, the profiles of the teeth are involutes of a circle. In involute gear design contact between a pair of gear teeth occurs at a single instantaneous line. Rotation of the gears causes the location of this contact line to move across the respective tooth surfaces. The project mainly deals with modeling of spur gear with the help of CATIA, the analysis was done in the ANSYS software and prototype was done on the 3D Printer.The spur gear with involute profile was modeled with the help of CATIA. This model was imported into ANSYS with IGES file format for analysis. In this two types of analysis was done. One is model and the other is static analysis. All the results were tabulated. By using the features of CATIA, the model was saved in the form of .stl (stereolithography) for 3D Printing; the file was imported in QURA software. QURA will generate the g-code which was used to print the component in 3D.

Published by: A Harshavardhan Reddy, A Swarnendra Goud, K Srinivas

Research Area: Modeling, Analysis

Research Paper

256. Evaluation of digital age transportation in Delhi-NCR

Change is coming to transportation, whether we’re ready for it or not. The Digital Age has begun, and technology has brought us open traffic data, the picture of alternative routes, GPRS, current network status and social customer service. As Digital age transportation will see a revolution over the next five years as transport operators adapt and new entrants arrive, new business models will transform the use of user information, payments, integration, and automation. This study will center around Intelligent Transportation System usage for to redesign benefit conveyance models and operational proficiency. Some measures should be taken by high power committee to decongest the roads of Delhi. The ultimate aim of the paper is that ITS could be put into implementation immediately. The plan was in four stages: background information, identification of problems, intervention, and monitoring. The possible solutions for problems encountered are suggested. This plan which was efficient and cost-effective can be used in transportation infrastructure in Delhi-NCR.

Published by: Samreen Nasir

Research Area: Transportation

Research Paper

257. Design of thermostatic expansion valve to increase COP of VCR system

The thermal expansion valve is used many vapor compression refrigeration systems such as refrigerator, air- conditioner etc. Hence many techniques have been investigated on thermal expansion valve to increase COP of VCR system. COP of thermal expansion valve can be increased either by controlling the bulb pressure or by decreasing compression work. This is an attempt to design expansion valve for increased COP with respect to mass flow control of refrigerant and the particular thermal parameter which are affecting to COP. The validation of design of thermal expansion valve is planned to validate by CFD analysis.

Published by: Rathava Vinodkumar Bhilsingbhai, Snehal Trivedi, Arjun Vyas

Research Area: Design of Valve

Research Paper

258. Wind speed prediction using tree ensemble

The wind energy has emerged as one of the safest growing renewable energy to address the crisis witnessed in power generation. Wind speed is an important factor in wind power production and integration. However, the complex nature of wind speed limits the dependability and induces high fluctuation in power generation. The accurate prediction of wind speed energy with minimum accepted errors will increase to harness the energy content in a wind efficiently. In recent years, machine learning algorithms are used to analyze and predict data to make better decisions. Ensemble model is one of the supervised machine learning approaches to predict numerical data. In this project, the speed of wind is predicted through XGBoost 4j package in a distributed programming environment of Apache Spark. XGBOOST is a short form of Extreme Gradient Boosting tool of supervised machine learning, where the training data set xi is used to predict a target variable Yi. The results are compared with different iterations in order to minimize the uncertainties and to evaluate the efficiency and accuracy. The main findings were that Ensemble model was the most accurate method.

Published by: Pooja Varshini R, Farzana Begum S, Saranya M, Dr. B. Vanathi

Research Area: Machine Learning

Thesis

259. Experimental investigation of the strength of concrete by partial replacement of cement with industrial wastes

Cement the main binding ingredient in concrete is becoming expensive and its production contributing to environmental pollution by emitting CO2 gases that are the main cause of global warming so efforts are being taken to utilize local natural or solid waste resources as a supplementary cementing material.RHA is a by-product of paddy industry, highly reactive pozzolana which is produced by burning rice husk at controlled temperatures. FA is collected from the combustion air-stream exiting the power plant. Fly ash is pozzolanic, which means it’s a siliceous or siliceous-and-aluminous material that reacts with calcium hydroxide to form a cement. WGP Glass is amorphous and contains a large amount of silicon and calcium. Thus it can be claimed that it is pozzolanic or even cementitious in nature even when it is finely ground, waste glass powder is formed from grinding industry by grinding waste glass obtained from lights bulbs, bottles and so on. The details of experimental investigations are done to study the effect of replacing a portion of cement with rice husk ash, fly ash and waste glass powder is reported in this paper. The main aim of this work is to determine the optimum percentage of RHA, FA, and WGP as a partial replacement of cement for the conventional grade of concrete and to study the strength variation in its percentage replacement with RHA, WGP, and FA. The studies conducted on cement concrete reveal that 10% RHA,5 and 5% WGP give optimum results for cement replacement in concrete.

Published by: Sarmilee Patnaik, P. K Parhi

Research Area: Concrete Technology

Research Paper

260. Experimental investigation on self-compacting concrete by using fly ash

Self-compacting concrete is a fluid mixture suitable for placing in structures with congested reinforcement without vibration. Self-compacting concrete development must ensure a good balance between deformability and stability. Also, compactibility is affected by the characteristics of materials and the mix proportions; it becomes necessary to evolve a procedure for mix design of SCC. The paper presents an experimental procedure for the design of self-compacting concrete mixes. The test results for acceptance characteristics of self-compacting concrete such as slump flow; J-ring, V-funnel, and L-Box are presented. Further, the compressive strength at the ages of 7, 14, and 28 days was also determined and results are included here.For SSC, it is generally necessary to use superplasticizers in order to obtain high mobility. Adding a large volume of powdered material or viscosity modifying admixture can eliminate segregation. The powdered materials that can be added are flyash, silica fume, lime stone powder, glass filler and quartzite filler. Since self-compactability is largely affected by the characteristics of materials and the mix proportions, it becomes necessary to evolve a procedure for mix design of SCC.

Published by: CH. Siddarda, G. Rajinikanth, P. Ravi, M. Narender, G. Kiran Reddy, J. Amjad

Research Area: Civil Engineering

Research Paper

261. Internal migration of construction workers in India: Reference to Chennai city of Tamil Nadu

The migration of labor in the world is not a new phenomenon; it had started in an ancient period and is continuing. The migration labour started moving from one place to another place for the purpose of seeking the job. These labour were placed in unorganized sectors like construction, brick kilns, road, railways, plantation, agriculture, canal work, etc. The human rights of migrant labor are violated in many ways in their workplace. The main causes of migration of these people from one place to another place, poverty are one of the major causes and there is lack of job opportunity and low wage in their own village. These are the major causes of migration people of underdeveloped states like Orissa, Bihar, and Jharkhand. For the eradication of poverty, the government of India has been implemented many programme MGNREGA, SGRY, NSFW, and PDS, but these programmes are not effectively implemented in these states. So the people are migrating one place another place for seeking of the job. For the protection of migrant labour, the government formed legislation. The results were tabulated by using the logistic regression model. The present study had map out the determinants and consequences of migration in Chennai city. The study also introspected the differences between the Tamil Migrants and north Indian migrants in order to map out how far the social capital or economic sociology operates in economic activity which has not been dealt by the previous studies adequately.  

Published by: Yasmeen Sultana H

Research Area: Economics

Research Paper

262. Stroke prediction using decision trees in artificial intelligence

Artificial Intelligence has become a hot topic in the present tech-driven world. Artificial Intelligence is one of the promising technology that has been greatly evolved from the past years. Artificial intelligence (AI) aims to serve as human cognitive functions. It will be of great importance to healthcare, p by increasing availability of healthcare data and rapid progress of analytics techniques. We survey the current status of AI applications in healthcare and discuss its applications in future. AI can be applied to various types of structured and unstructured healthcare data. There are various popular AI techniques that include machine learning methods for both structured data and unstructured data, such as support vector machine, neural networks, natural language processing respectively. The disease like cancer, neurology, and stokes can be easily detected by AI. We conducted a survey about AI applications in stroke, in major areas that include detection and diagnosis, treatment, and lastly outcome prediction and prognosis evaluation. Our project is based on how we can make accurate predictions of stroke occurrence that can be of great help for the doctors. This can be time-saving. It can also serve as a helping hand for the new practitioners. The predictive algorithm that will be used will increase the efficiency of stroke prevention that will surely improve the patients’ health through early detection and treatment. The objective of this project is to have a system that can make accurate predictions on stroke so that it can be cured as early as possible. For this, we need some predictive algorithms and parameters that includes patient’s characteristics like age, gender, weight, BMW, height etc. We will have a data model that will analyze all these parameters. After having this survey, whenever a new patient will come this trained data model will compare the new parameters with it surveyed parameter with the help of learning algorithm.

Published by: Aishwarya Roy, Anwesh Kumar, Navin Kumar Singh, Shashank D

Research Area: Artificial Intelligence

Case Study

263. Manipulated undiagnosed Dermal Sinus leading to Meningitis/Sepsis with Multifocal Brain Abscess (Lesion)

A dermal sinus tract is a very rare entity, which usually comes to clinical attention by cutaneous abnormalities, neurologic deficit, and/or infection [1]. The present study was undertaken to know the clinical profile, differential diagnosis and management of the manipulated undiagnosed dermal sinus leading to meningitis or sepsis with multifocal brain abscesses and discussed associated anomalies and to assess the results of surgical intervention.

Published by: Dr. Prasada Swamy, Dr. Vangala Bramha Prasad, Dr. Srividya Lonkala

Research Area: Medical

Research Paper

264. Dynamic analysis of block type machine foundation as per IS: 2974 (Part-I) – D.D.Barkan method by application software

Today most of the analysis and design processes are done on the computers day-by-day. The ongoing process of the invention makes it more and easier. In this work, the analytical solutions are programmed for dynamic study of block foundation. The results can be obtained in the detailed text file so that the user can easily understand. This application package is developed by me, using latest standards of Visual C++. The reliability of this package can be checked with manual work. In this package, Visual C++ is used because; it is the most powerful tool among all other programming tools.

Published by: Kalpak M Vora

Research Area: Engineering

Research Paper

265. An FPGA based cyclic navigation Algorithm for mobile robots in the indoor environment

Guiding a mobile robot for within the time in an indoor environment has shown the way for the study and sophistication of navigation methods. In this paper, we developed robotic structure in the indoor and developed navigational algorithm that would be helpful to move from one point to another point. This paper concentrates on the design of mobile robot control mechanism that uses the ultrasonic array for sensing random maze environment like hospitals and actuate the motor modules accordingly to complete the service. As a part of the development, we simulated in Xilinx ISE 10.4 environment using Verilog HDL programming and also synthesized on FPGA part Spartan 3AN evaluation board by considering a random environment.

Published by: Kishore Vennela, M. K. Ravali, G. Manisha, T. Hema Rani, B. Sai Charan Rathod

Research Area: Robotics and Automation

Research Paper

266. Securing coding-based cloud storage against pollution attacks

At present Cloud Computing has become a popular computing paradigm. Though Cloud Computing architectures lack support for computer forensic investigations. Inspecting various logs such as process logs, network logs etc plays an important role in computer forensics. Pollution Attack, whereby is an arrangement of noxious substances endeavor to degenerate put away information, are one of the many dangers that influence cloud information security. Pollution attack occurs when along with the data packets, malicious packets are injected into the network. In this paper we manage pollution attack in coding-based square level distributed storage frameworks, i.e. frameworks that utilize straight codes to part, encode, and scatter virtual circle areas over an arrangement of capacity hubs to accomplish wanted levels of repetition and to enhance unwavering quality and accessibility without giving up on execution. Shockingly, the impacts of a pollution attack on straight coding can be unfortunate, since a solitary dirtied piece can proliferate unavoidably in the interpreting stage, along these lines hampering the entire division. The alarm triggers a procedure that locates the polluting nodes using the proposed detection mechanism along with statistical inference. The packets which fail the verification are detected and discarded by considering they are malicious packets or polluted packets in the network. Therefore the pollution in the network is removed before the packets reach the destination. Hence the pollution attack is reduced and this, in turn, will increase the throughput and performance of the data transmitted across the coding based network in cloud storage.

Published by: Parihar Vimladevi Mishrilal, Rohini Dattatrey Patil, Supriya Shrikant Shete, Bhargavi Rai, Babita Bhagat

Research Area: Computer Science

Review Paper

267. Design and estimation RCC overhead water tank

Storage reservoirs and overhead tank are used to store water, liquid petroleum, petroleum products and similar liquids. The structure analysis of the reservoirs or tanks is about the same irrespective of the chemical nature of the product. All tanks are designed as crack free structures to eliminate any leakage This project gives in brief, the theory behind the design of liquid retaining structure (Elevated circular water tank with a domed roof and conical base) using working stress method. Elements are designed in limit state method. Liquid tanks and especially the elevated tanks are structures of high importance which are considered as the main lifeline elements that should be capable of keeping the expected performance. An earlier design of water tanks being done using the working stress method given in IS 3370: 1965. This method leads to thicker and heavily reinforced section. The use of limit state method of design has been adopted in received code IS 3370:2009 and provision for checking the crack width is also included in this code.

Published by: Ravi, A. Parameshwar, D. Vijay kumar, R. Narender Reddy, M. Rajesh

Research Area: Engineering

Research Paper

268. Traffic sign detection and recognition for autonomous vehicles

Traffic sign recognition and detection is an important part of any autonomous vehicle. However the real challenge lies in the detection and recognition of these traffic sign from the natural image in real time and with accuracy. This paper gives an overview of the traffic road sign detection and recognition system, we developed and implemented using artificial neural network which are trained using real life datasets. This paper presents the usage of convolution neural network along with GTSRB dataset as an implementation of our project to attain real time result with accuracy. The system developed based on this methodology can be implemented in public transports, personal cars and other vehicles in order to keep drivers alert and reduce human errors that lead to accidents. The project has a wide implementation in self-driving vehicles.

Published by: Mohit Singh, Manish Kumar Pandey, Lakshya Malik

Research Area: Computer Science

Review Paper

269. Enhancement of E-commerce security using ETSFS algorithm: A Review

Security issues are an important topic in e-commerce. How to protect the security of an e-commerce system and data is its core research area. There are many sensitive financial data and asset data in e-commerce databases, such as transaction records, commercial transactions, user account and market scheme and so on. The data are very important to the parties involved in e-commerce, so we must assure their security completely. To beat these issues, various security strategies have developed to ensure the information in databases. For Example Enhanced Transposition, Substitution, Folding & Shifting (ETSFS). Each of them has its particular benefits and faults. ETSFS provides a high degree of privacy for customers by encrypting payment information. This paper provides a secure and efficient encryption method that encrypts only sensitive data without using special hardware and a mirroring technique to recover the lost data. The purpose of recovery technique is to help the user to retrieve information from any mirror server when server lost his data and unable to provide data to the user. This paper proposes an implementation of the ETSFS algorithm in E-commerce site to make the transaction secure and by using the mirroring technique to recover the data to provide high security to the E-commerce site.

Published by: Diksha Sudhir Nitnaware, Swapnil V. Khedkar

Research Area: Ecommerce

Research Paper

270. An alternate method for generation and usage of P300 EEG signal using image processing

This paper presents a model for Developing a sustainable system for prolonged usage of Brain-computer interface for navigation and communication for the disabled, and the paralyzed with use of Electroencephalography (EEG) This model uses image recognition and classification of the video input from the camera for use in the P300 wave recognition.This model uses images instead of alphabets in oddball paradigm reducing the cognitive load on the brain and uses a different solution for the mental fatigue generated from the usage of the same visual stimulus over a long period of time

Published by: A. Vishnu Sai, N. Sathvik, A. Lakshmi Srinivas Jaidev, P. Ramani, N. Rupesh

Research Area: Biomedical

Research Paper

271. Reducing headlight intensity to improve street visibility

Driving at night is dangerous. High headlight glares can make a driver temporarily blind thereby escalating the chances of fatal accidents. Many factors are considered when analyzing automobile transportation in order to increase safety. One of the most prominent factors for night-time travel is temporary blindness due to elevated headlight intensity. This is particularly prominent on single lane roads. Also, higher speed due to decreased traffic levels at night increases the severity of accidents. Proposed software module masks the high-intensity headlights, preventing temporary blindness that a driver may face and hence improves the view.

Published by: Amey Sathe, Prajakta Roshankhede, Priti Golar, Chetan Chitatwar

Research Area: Open Source Computer Vision

Research Paper

272. Determination and effective parameters for drying of Millets

One of the oldest methods used for preservation of fruits, vegetables, millets and other food products to increase their shelf life is drying. Cereals have a significant share in millet production both in the world and china. It acts a source of raw material for many food products. The important parameters of drying includes temperature, velocity and relative humidity. Drying and drying rate curves should be plotted to determine the drying kinetics of the products. Experiments are conducted in a tray dryer using different kinds of millets ( foxtail millet ,little millet, kodo millet )  for various drying temperatures ( 30- 60˚C)  and with different time intervals .The temperature and time are measured and recorded for every 15 minutes. The measured data is used to obtain drying and drying rate curves. The curves indicate that drying process takes place in the falling rate period   If drying is continued, the slope of the curve, the drying rate, becomes less steep (falling rate period) and gradually tends to nearly horizontal at very long times. The product moisture content will become constant at the "equilibrium moisture content", from the data collected during falling rate period and is calculated. Time and temperature are used as a parameters for the dried millet quality.  It is essential to follow up drying course and to decide whether it is obtained or not by drying processing method. Too long drying course may have bad effects for quality and food safety because of high fermentations and mould growth.  Also, drying to a too low moisture content can result in income losses.  

Published by: Venkata Naga Kaumudi Prabha Annavarapu

Research Area: Engineering

Research Paper

273. Predictive analysis of product search

The rapid increase in internet users along with growing power of online review sites and social media has given birth to Sentiment analysis or Opinion mining, which aims at determining what other people think and comment. Nowadays, several websites are available on which a variety of products are advertised and sold. Prior to making a purchase an online shopper typically browses through several similar products of different brands before reaching a final decision. This seemingly simple information retrieval task actually involves a lot of feature-wise comparisons and decision making, especially since all manufacturers advertise similar features and competitive prices for most products. The proposed system presents a semi-supervised approach for mining online user reviews to generate comparative feature-based statistical summaries that can guide a user in making an online purchase. In this system sentiment analysis of product reviews gives us not only positive and negative reviews but also gives neutral and constructive opinion where the system can suggest some improvement about the product also the result is represented in the graphical and tabular method. Our task is performed in three steps: (1) mining product features that have been commented on by customers; (2) identifying opinion sentences in each review and deciding whether each opinion sentence is positive or negative; (3) summarizing the results. This paper proposes several novel techniques to perform these tasks. Our experimental results using reviews of a number of products sold online to demonstrate the effectiveness of the techniques.

Published by: Rajendra Lasde, Gopika Tambare, Mayuri Tanpure, Pragati Naktode, Nilima Pardhake

Research Area: Business Intelligence

Research Paper

274. Alcohol sensing based engine locking system

In today’s era where we are blessed with fast-moving automobiles which makes our movement easy as well as fast, it also poses a grave danger of accidents and one of the main causes of such fatal accidents is the case of drunken driving where the person loses his control over the automobile and can become a danger to himself and the surroundings. Controlling such cases manually is practically very difficult. And thus we came up with an idea of controlling such accidents, we in this project have used the idea of gaseous material sensing for sensing the fumes of alcohol in the breath of the person who is driving. As we know that stopping a person from drinking in today’s world is near to impossible so why not stop them from driving after drinking !!!. Our project here will be installed on the steering wheel of the car where the breath of the person driving comes, it will sense the amount of alcohol consumed by him in mg/liter and if the level exceeds then the engine will be stopped and thus decreasing the chance of an accident. This prototype of our can be further modified into a smaller size and with more efficient sensing.

Published by: I Rahul Rao, Saurabh Sinha

Research Area: Electronics

Thesis

275. Deep learning technique to reduce the volume of missing data

The challenges are learning from data with missing values and finding shared representations for multimodal data to improve inference and prediction. The proposed method uses deep learning technique to reduce the volume of missing data which occur due to low battery and transmission loss. In order to find missing data imputation and new modality prediction, the original incomplete raw data is trained and tested using the stacked autoencoder to predict the corresponding missing value. Deep Multimodal Encoding methods use intra and intermodal learning to compute a new modality prediction. Deep Multimodal Encoding (DME) can achieve a Root Mean Square Error (RMSE) of the missing data imputation which is only 20% of the traditional methods. The performance of Deep Multimodal Encoding is robust to the existence of missing data.

Published by: V. Arivu Pandeeswaran, Dr. P. Kumar, R. Sivakumar

Research Area: Data Mining

Research Paper

276. Robotic arm control using human interface through color detection

In present times, industries face common obstacles like shortage of time and workers which leads to inefficient production. A feasible solution for this problem can be achieved using robotics. Robots save a lot of time and robots are designed for specific tasks according to one's needs. Furthermore, we can make use of image processing methods for better results. This paper presents a way to control a robotic arm through detection of a specific color. In this paper, we have proposed a method by which a webcam detects a particular colored-patch attached to a human arm using the color coding techniques in MATLAB. The coordinates of that colored-patch with respect to the video output screen are sent to the microcontroller, which in turn results in the movement of the robotic arm. The process is quick and inexpensive, for individual and industrial applications, thereby increasing the growth of the industry. The robot can be interfaced using various micro-controller, here we have used the Arduino Uno which is a microcontroller board based on the ATmega328. Arduino controlled robot is interfaced with the computer which mimics hand gestures according to the movement of the colored-patches present on the human arm. The movement of the arm is detected on the basis of the movement of the colored object present on it, using a webcam and MATLAB functions. According to the movement of the arm, the robot, which is being interfaced with the computer, is also moved in desired directions. This results in an inexpensive and effective way for controlling the robot via an interface between the human and the machine.

Published by: Neeru Tyagi, Mayank Sandhu

Research Area: Computer Science and Engineering

Research Paper

277. Segmentation of cartilage from knee MRI images using the watershed algorithm

We present here watershed segmentation method for the segmentation of knee cartilage. Watershed segmentation is a state of the art method and involves great simplicity of application. MRI images of the knee cartilages are used for segmenting and early detection of the osteoarthritis. MRI images offer better visualization of the soft tissues like cartilage still visualization of the tissues prone to damage is needed to be detected earlier. However, the method incorporates noise while segmentation stills its great simplicity attracts researchers for its use.

Published by: Fanendra Kumar Patel, Manoj Singh

Research Area: Image Processing

Research Paper

278. Experimental investigation of heat transfer by natural convection through staggered fin array at different positions

The special surface arrangement of fins or special fin geometry may enhance heat transfer rate. The staggered arrangement of fins is the special fin arrangement which gives enhanced heat transfer coefficient essential due to effective flow distribution. The arrangement selected for the topic is an experimental investigation of staggered fin arrays. They are compared with different fin array. The fin arrangement under study has constant length, width, fin thickness with different fin spacing. The design of fin arrays includes four types of arrangements i.e. continuous, 33.33%, 40% and 50% percentage lengthwise staggering of vertical fin arrays and with 38 and 48mm in height on the horizontal plate. The fin arrays with continues type compared with three lengthwise staggering are investigated experimentally under natural convection for different heater inputs and observations. The average heat transfer coefficients and average Nusselt number are calculated for each array also respective graphs are plotted. The results are presented by the calculation of Nusselt number versus the product of Grashoff number and Prandtl number graphs. Also, the results classified with flow visualization techniques. The work classified with calculating that heat transfer increases with increasing percentage staggering in the staggered arrangement of fins.

Published by: Akhilesh Patil, S. H. Gupta

Research Area: Heat Power

Research Paper

279. Key escrow with certificateless elliptic curve division for the gathering of shared information in versatile systems

In the current years, Internet of Things (IoT) is a most rising idea in Internet and Communication Technology (ICT) area. Getting to of information over the Internet through the unique portable system is the prime concern. Different business groups outsource their information in the cloud framework to lessen the information secure administration overhead. The information verification and uprightness are a portion of the fundamental security and trust prerequisites in the cloud disseminated condition. Key Escrow with Certificateless Elliptic Curve Segmentation (KE-CECS) method is a novel information security instrument that gives information verification to information transmission over IoT based Mobile Network condition. Certificateless ECC has advanced as a prime research zone because of capacity to understand the key escrow personality based issue in information administration plans. The improvement of Certificateless Signature ECC for light-weighted keen gadgets mounted in IoT based Mobile Networks has turned out to be a standout amongst the most focused research works. This paper displays another mystery division matching based Certificateless Signature plot without Map to Point hash capacity and blending. The new KE-CECS is most secured against both Type-I and Type-II foes under the solid division sharing ECC presumption individually. Execution assessment and correlation utilizing reproduction investigation demonstrate that the proposed KE-CECS beats different certificateless plans in the versatile system's condition.

Published by: B Sugumar , M Ramakrishnan

Research Area: Mobile Security

Review Paper

280. Touchdown aviation system

The aim of the project is to check whether full runway is being used by an aircraft and also to check how much power/ voltage it generates. The principle of the project can be achieved by giving pressure on the piezoelectric crystal which results in power generation. It is placed in the runways as layers to sense vibration and give electric power/voltage without any input. Also, during the touchdown, a pressure of air blows the wind turbine installed on both the sides of the runway to provide Wind Energy.

Published by: Sampriti Barman, S. Aparna, Dhatri G. Rao, J. V. K. Manasa, Vamsi Krishna

Research Area: Electronics Engineering

Dissertations

281. Experimental study of fuel consumption and emission characteristics of the medium-duty vehicle

Currently, fuel consumption of the vehicle rising day by day as a result of increased trip lengths, self-mode transportation and the number of an intersection. Transport is a crucial infrastructure for the development and hence vehicular growth closely follows the trend of urbanization. Several international study and multinational institutions worldwide progress in decarbonizing transport emission from economic growth. When the vehicle waiting for the turn to cross the intersection at the signal, most of the drivers keep the engine off of their vehicle and result in large emission and fuel consumption. This small quantity of fuel worn out aggregated over a number of cycles per day number of the cycle per year and number of intersection result in the massive quantity of fuel. Measuring delay is important in computing the level of service provides to road user at a signal intersection. In India mainly two methods were used to estimate control delay those are field measurement and the artificial measurement. Field measurement of control delay includes the use of test car observation, path tracing of individual vehicles and the recording of arrival and departure volume of the intersection but this expensive for long period. An analytical model of traffic system structure deals with the macroscopic method to study delay measurement. In this paper, the comparison of the actual idling fuel use and emissions with those for restarting by following the ECE-15 cycle and EUDC cycle has been done. This work gives the answer of the question that is how long can you idle in a queue before impacts from idling are greater than they are restarting by considering both the fuel use and emission. This work represents the emission and fuel use are greater for idling over 13 seconds. And also found that the best fuel economy speed is 60 km/hr because the fuel consumption and instantaneous emissions are minimum at 60 km/hr speed.

Published by: Gurmeet Chahal, Dr. Parinam Anuradha

Research Area: Mechanical Engineering

Research Paper

282. Survey on techno level obstacle sensing using ultrasonic based services

Along with a fast-growing economy of a developing country as far as India is concerned, there has been reported an emerging number of harassment and criminal offenses against disabled women. In many of the cases, the suspects are quite freely escaped due to lack of communication links in time. Our goal is to design an intelligent device which can alert the authorities when any harassment is happening. Our system requires minimum power consumption and least human efforts. Initially, it sends a signal to the nearest traffic control or police station intimating the state of crime along with its location. The processor chosen to be is the Arduino UNO, and the communication to the police control is done using GPS and GSM technology.

Published by: S. Aravind, V. Balaji, Rakesh. SP, K. Arunkumar, K. Vignesh

Research Area: IoT

Research Paper

283. Comparative study of near dry and dry EDM process

The electric discharge machining (EDM) is an unconventional machining process. It is extensively used to generate complex profiles on electrically conductive materials having high-temperature resistance and high strength. Due to its wide applicability in manufacturing industries, EDM has become the most popular machining process after conventional machining processes such as turning, milling and drilling, etc. Despite several advantages, EDM process suffers from some limitations such as low material removal rate (MRR), high tool wear rate (TWR) and poor surface integrity in some cases. In past, several attempts have been made to overcome these limitations by augmenting EDM with techniques such as electrode rotation, ultrasonic vibrations and suspensions of powders into the dielectric fluid. Although these techniques are excellent from a research perspective, in practice, are applicable only for fewer applications. Another limitation in EDM process is its possible environmental pollution causing characteristic. During EDM process, material removal is a consequent of thermal energy produced by series of discrete electrical sparks occurring between a tool and work electrodes which are immersed in a dielectric medium mostly hydrocarbon oils. These oils produce serious toxic fumes causing the health hazard to the machine operator and environmental pollution. To overcome these limitations of EDM process, dry and near-dry variants of EDM were introduced. Dry EDM process utilizes a pressurized gaseous medium as a dielectric whereas, near-dry EDM process uses a combination of liquid and gas as a dielectric medium and are environmentally friendly. Near-dry electric discharge machining (EDM) and dry EDM are the process variants of the EDM process. This project reveals comparative study and optimum method between near-dry and dry EDM process to achieve the high material removal rate (MRR) and low tool wear rate (TWR).Two-phase dielectric (liquid and air) was utilized in near-dry EDM while only air was used in dry EDM. L27 orthogonal array was used to determine the effect of the pulse current, voltage, pulse on time, pulse off time and pressure on MRR and TWR in near-dry and dry EDM.

Published by: Kulkarni Amey Suresh, Kulkarni Kaustubh Dhananjay, Vharate Sagar Prakash, Patil Amardeep Gajananrao

Research Area: Mechanical Engineering

Research Paper

284. Bus recognition for the visually impaired person

This paper depicts a transport acknowledgment framework which points to the simplicity of voyaging and development of visually impaired individuals with the guide of sensor organize. For them to travel from one place to another place is a difficult task, so they need the special requirement to travel. The blind person gives the input about his destination using android app. The latitude and longitude of the present location of the blind person will be noted in the microcontroller of a blind unit with the help of GPS antenna. The stored information in the microcontroller of the blind unit is transmitted to bus unit through Zigbee system. Sign made in the transport that visually impaired individuals display in the station. Voice model and APR 9600 audio playback systems are used to update and inform the blind person about the bus arriving and reaching destinations. Audio output is generated by the voice synthesizer. The expected outcome of the project is to obtain an easy navigation system for blind people

Published by: Vandana K, Varsha V, Shambhavi, Namitha R, Madhu Patil

Research Area: Embedded System

Research Paper

285. An experimental study to assess the effectiveness of planned teaching programme on knowledge regarding weaning diet among mothers of under five in the selected village of district Gurdaspur

Weaning is a systematic process of introduction of suitable food at the right time, in addition to mothers’ milk, in order to provide needed nutrients to the baby. If the baby is to maintain the expected rate of growth and remain healthy and well nourished, supplementary feeding has to be resorted to round about the 6th month of life. The present study aimed to assess the knowledge of mothers of under-five regarding weaning diet, the effectiveness of planned teaching programme regarding weaning and to find out the association between knowledge with selected demographic variables. The findings of the study revealed that the planned teaching programme was effective in increasing the knowledge level of mothers of under five. There was the significant association between education and monthly income of the family. There was no significant association among age, religion, occupation, living status, type of family, the frequency of meals, and source of information

Published by: Rachna Kumari

Research Area: Medical

Research Paper

286. Criteria to consider for a successful performance testing tool selection

To inform our audience about the criteria for a successful performance testing tool selection for testing performance on any software stack. The right test tool enables the productivity, optimization, and scale required. It provides the opportunity to find best test tool and evaluate its services faster, and establish successful implementation using it.

Published by: Rama R Anem

Research Area: Software Testing

Research Paper

287. Heat recovery analysis of boiler furnace using refractory materials

Now a day failure of refractory material in boiler furnace which is applied for different sites and different applications is the major problem has been faced by boiler manufacturing industries and they are trying to solve this. Different reasons for failure can be inappropriate transportation problem and loose application of refractory, excessive temperature developed in the shell, sigma phase embrittlement, failure of anchors, improper storage of material etc. The materials and its properties used for refractory are studied here with its different types. This report is related to the thermal analysis of refractory which is 305 mm thick and temperature distribution at the certain distance by using ANSYS software.3D Model is drawn in solid works and then imported to ANSYS for next analysis. By applying thermal conditions we get the results. This project is sponsored by Thermax where they want to get temperature distribution and the surface temperature of ceramic paper which is on an outer side of refractory facing to the environment.

Published by: Anagha Jasdhav, Dr. R. R. Arakerimath

Research Area: Heat Power

Technical Notes

288. Techniques to test web application system based on scenarios

Software Testing is the most significant stage in Software Development Life Cycle. The overall aim of any software industry is to provide quality to the end user. To ensure high-quality software it is required to test. Testing ensures all the requirements are met and the software/application is bug-free. As we are aware websites are rapidly increasing day by day and testing needs to be done to ensure if the site is user-friendly to the end user and there are no bugs in the production environment. This paper mainly focuses on Web application testing, types of web application testing and black box testing techniques. There are many testing techniques used to optimize the test cases, this paper mainly explains the most commonly used techniques used for the web application testing.

Published by: Reddy Sangeetha DM

Research Area: Software Testing

Research Paper

289. PIC controller based power factor improvement and harmonic reduction by using single-phase active power filter: a case study and prototype

Abstract In This paper presents a technique for single-phase power factor correction of non-linear loads employing an active power filter. The current control strategy is the same used in the boost pre-regulator, which is the average current mode technique. The project will focus on the design methodology and the analysis of the control strategy which allows the compensation of harmonics and phase displacement of the input current, for single and multiple non-linear and linear loads. Experimental results of an active filter controlling a 200W to the 1KW rectifier with a capacitive filter, a 58OW multiple loads, which consists of a rectifier with a capacitive filter are presented.”In the last years, the use of electronic equipment has been increasing rapidly. This equipment draws The current from the AC mains has harmonic components, which leads to low power factor, low efficiency, interference in some instruments and communication equipment by the EMI, overtaxed electrical-distribution systems, overheated transformers and electromagnetic fields. A classical solution is the use of passive filters to suppress harmonics in power systems. However, passive filters have many disadvantages, such as large size, resonance, and fixed compensation characteristics. Therefore, it does not provide a complete solution. The most usual single-phase non-linear load is the frontend rectifier followed by a bulk capacitor, which draws current from the input during its charging. The boost pre-regulator is used to reduce the harmonic contents and improves the power factor. The boost pre-regulator has some disadvantage because it cannot be used in equipment already in service, and it is applied only to one kind of non-linear load which is the front end rectifier followed by a bulk capacitor. A very interesting solution is the use of a single-phase active power filter, which is connected in parallel with then on-linear loads. The active power filters concept uses in power electronics to produce harmonic components which cancel the harmonic components from the non-linear loads. It can limit harmonics to acceptable levels and can adapt itself in case of harmonic component alteration or even changes in then on-linear loads types. Usually, the technique used to control the single-phase active filter senses the non-linear load current and calculates its harmonics. This project will focus on the design and the control strategy for a shunt single-phase active power.

Published by: Ajit Manohar Bansode

Research Area: Electrical Engineering

Research Paper

290. Experimental investigation on geopolymer brick by using fly ash and quarry dust

Bricks are widely used in the construction of buildings around the world. Conventional bricks are produced from clay with high-temperature kiln firing or from ordinary Portland cement (OPC) concrete, and thus contain high embodied energy and large carbon footprints. In many areas of the world, there is already a shortage of natural resources material for the production of the conventional brick for environmental production research has been conducted. A wide variety of waste materials have been studied to produce bricks in different methods. The research can be divided into three categories based on the method for the producing bricks from the waste material: firing, cementing & geo polymerization. A mixture of sodium silicate and sodium hydroxide were cured at ambient temperature. The study of geopolymer bricks fly ash, quarry dust, an alkaline solution. For eco-friendly reaction its vital that the material used for such construction should be environment-friendly. In geopolymer bricks, main ingredients of clay burnt or cement based brick is totally replaced by the waste of burnt coal known as fly ash or pulverized fuel ash. Materials rich in silica and alumina is the necessity for the geopolymer synthesis .the activated solutions for polymerization is sodium hydroxide (NaOH) mix with sodium silicate (Na2SiO3) solution in appropriate proportion Percentage of binder and ratio of alkaline liquid to alumina silicates solids ratio had a significant impact on strength of bricks. Bricks were cast in the industrial site from the best mix compressive strength and water absorption was noted. Geopolymer Eco brick and its durability the size of the were adopted was 100mm*100mm*10m m the brick were cast with fly ash to river sand and eco sand (silica sand) with the different ratios of 1:2 1.5, by weight. The optimum water/binder ratio of 0.416 was selected as per available literature. The binder/water ratio solution (NaOH and water) to fly ash. The exposed surface turned slightly softer through an optical microscope, the corroded surface could be seen which increased with time of exposure. After the exposure to the acid solution for 18weeks. The geopolymer samples almost lost it's alkalinity and showed very low weightless in the range from 0.54%to 0.28%of initial weight. Loss of weight was found higher for a specimen with a higher percent of Na2 SiO3.

Published by: T. Bhasker, Syed Mohammed Ibrahim, R. Thriveni, D. Sreelatha, S. Bhasker, Dr. Ashwin Raut

Research Area: Civil Engineering

Technical Notes

291. GSM based electrical line man safety

A GSM-based circuit breaker is an automatically operated electrical switch designed to provide security to the lineman while repairing the electrical lines. When operated manually we see fatal electrical accidents to the lineman are increasing during the electric line repairing due to lack of communication and coordination between the maintenance staff and electric substation staff. In order to avoid such accidents, the circuit breaker can be designed such that only authorized person can operate it with the help of password. Here, there is also a provision for changing the password. The system is fully controlled by the ATMEGA. The password is stored in an EEPROM, interfaced to the microcontroller and the password can be changed any time unlike a fixed one burnt permanently on the microcontroller. By using GSM module operator also can enter the password while he is away from the workstation and keypad is used to enter the password when an operator is on the workstation. A relay is used to open or close circuit breaker, which is indicated by the lamp. Any wrong attempt to open the breaker an alert will be displayed on the mobile screen through the GSM and also display the status on the LCD display.

Published by: Vijaya Vikas Ranpise, Komal Promod Dounde, Pooja Namdeo Kolekar, Pathan Hameed A.

Research Area: Technology

Research Paper

292. M-LABS an educational take on augmented reality: Application implementation

Augmented Reality (AR) is a view of the physical, real-world environment that is augmented by synthetic, computer-generated elements. Augmented reality is a technology that has come into the limelight very recently. From Motion pictures to magazines to Android or web-based applications to gaming and so on it is used. The usage of AR in movies has been prominent. The driving force behind us choosing this domain and this particular topic are simple, Augmented reality is the future.A reality that is better than reality. The foundation of the society are children, and to augment children’s interest it is important to provide them with tech-aided tools. To show them how technology can be made available at their disposal and in return make them think and foster their ideas using this innovative app.

Published by: Rashi Hajari, Snehal Andhare, Tejan Gavandi, Shantanu Shingote

Research Area: Engineering

Research Paper

293. Spy camera attacks on mobile security

Nowadays, Smartphone security has become a major issue to resolve. All the smart phones have features like camera, touch screen and many more. These may cause attacks on users smart phones. Modern smart phone platforms provide users to customize their device using applications found on app stores. Users are constantly in trouble that they are unaware of installing malicious apps that steal personal data or gain access to other private information. For example, while using such malicious application, the application provider may carry the hidden request to have access to different devices connected to our phone such as camera, smart phone is been attacked, identifying our location through camera as it will show our surrounding area and trying to identify PIN using camera. However, few Works have studied mobile phone multimedia Security. In this survey, we focus on security problems related to mobile phone cameras. Specifically, we discuss several attacks that are based on the smart phone features.

Published by: Bhagyashree Sonone, Samrudhi Khond, Pranali R. Dandekar

Research Area: Multimedia

Research Paper

294. Analysing Twitter Bot

A Twitterbot is a type of bot software that controls a Twitter account via the Twitter API. The bot software may autonomously perform actions such as tweeting, retweeting, liking, following, unfollowing, or direct messaging other accounts. The automation of Twitter accounts is governed by a set of automation rules that outline proper and improper uses of automation. Proper usage includes broadcasting helpful information, automatically generating interesting or creative content, and automatically replying to users via direct message. In this paper, we are examining the automatic replies generated by a text generating machine which generates the quote to the hashtag word (prime word) sent by a sender to the bot. For training, the bot deep neural networks, more specifically RNN(Recurrent neural network) is used for which python is used as the programming environment, and Tensorflow as the machine learning library. On the sender’s side, we applied the text summarisation algorithm using PyTeaser library to detect whether the quote generated and tweeted to the sender is by the bot or any human.

Published by: Shipra, Rahul Yadav

Research Area: Machine Learning

Research Paper

295. Movie recommendation system

Recommendation systems have become increasingly popular in recent times. They are utilized in a variety of areas like music, videos, and social sites. There are two ways to produce recommendation-through collaborative filtering-which presents recommendation based on past history of the user. Content-based filtering uses similarity between items to recommend a product. In this paper, we have proposed a movie recommendation system based on collaborative filtering method and simple method of ranking movies according to their popularity rating. The system has been developed using PHP, python.

Published by: Deepak Kumar Singh, Abhishek Gangwar, Abhishek Sharma

Research Area: Machine Learning

Case Study

296. FEM analysis of helical gear

In this paper the problem of the failure of gear in speed reduction gearbox developed by Laxmi Hydraulic Pump ( LHP) Pvt Ltd, Solapur is resolved by modifying or redesigning the gear and pinion using AGMA and FEM analysis Method. In the gear design, the bending stress and surface strength of the gear tooth are considered to be one of the main contributors to the failure of the gear.In this paper bending and contact, stresses are calculated by using the analytical method as well as Finite Element Method. the software is used to generate the 3-D solid model of the helical gear. Ansys software package is used to analyze the bending stress and contact stress. The main objective of this study has to investigate the stresses induced by gear tooth profile. Finally, the results obtained by theoretical analysis and Finite Element Analysis are compared to check the correctness. Estimated stress is used to calculate module of gear which can withstand easily at given loading conditions.

Published by: Sonali A. Mote, A. V. Gaur, Ajit. B. Gujale

Research Area: Mechanical Engineering

Research Paper

297. Conceptual design and analysis of electron beam welding fixture for truss rod assembly in the construction of ITSC-15 in GSLV MK-II

The scope of our project deals with the design of a welding fixture for Electron Beam Welding to weld the Truss rod Assembly of Inter Tank Structure and Lower Thermal Shroud for GSLV MK-II. According to this, the result of the welding is pure and dense, porosity and inclusions are not present in welds due to the absence of oxidization in the chamber.The role of our project is to design the fixture to support the components that have to be functioning in order to increase the geometrical accuracies and mainly concentrated to reduce the fabrication errors that comes under the manufacturing process.

Published by: Moniha P, Ajithkumar M, Mahalakshmi S, Thiyagu M

Research Area: Welding Fixture

Research Paper

298. IoT based garbage monitoring system

These days we can see that a large portion of the refuse's over the roadside, also in many spots, dustbins are not cleaned at appropriate time are over-burden in light of the fact that the squanders are not collected regularly, this prompts various types of ailments, the expansive number of creepy crawlies and mosquitos. It results in the creation of an unhygienic condition for the general population and makes terrible smell around the environment. The conventional method for physically observing the losses in squander canisters is a mind-boggling, bulky process and uses more human exertion, time and cost which isn't perfect with the present day innovations in any capacity. To defeat this issue we will execute an undertaking called IOT based Garbage Monitoring System. In this paper, we will portray savvy dustbin in view of Arduino Nano, Ultrasonic sensor, LoLin NodeMCU and Flame sensor which is interfaced with Mobile Application through Web Server to put on brilliant dustbin which will quantify the status of the dustbin. This system screens the trash canisters and educates about the level of waste gathered in the junk containers. This will likewise send the status of bins to waste accumulation vehicles.

Published by: Naman Sharma, Nikhil Mishra, Paurvi Gupta

Research Area: IoT

Dissertations

299. IoT security with MQ telemetry transport

With the ever-increasing number of connected devices and the overabundance of data generated by these devices, data privacy has become a critical concern in the Internet of Things (IoT). One promising privacy-preservation approach is Attribute-Based Encryption (ABE), a public key encryption scheme that enables fine-grained access control, scalable key management, and flexible data distribution.We evaluate two major types of ABE, B Key-Policy Attribute-Based Encryption (KP-ABE) and Ciphertext-Policy Attribute-Based Encryption (CP-ABE ABE is best suited for use in the IoT.

Published by: Punam Lokhande

Research Area: IoT

Research Paper

300. Data sharing using middle-key authentication

The basic idea of the project is to share the data in the cloud. The dataset in the cloud storage is secured and more flexible to share the data with others. For that, we propose Key- Aggregate Cryptosystem which produces cipher text of a constant size such that decipherment rights are often assigned to them. By combining a collection of secret key, we will create a compact single key. By exploiting this compact key, we will send others very restricted secure storage. First, owner of the information sets up the general public system. Next Key information formula generates a public or master key. By exploiting this key, the user will convert plain text into cipher text. After that user can provide input as master secret key by an Extract function. It will manufacture output as mixture decipherment key. And this obtained secret key is safely sent to the receiver. Then the employment with the mixture key will decode the text of a cipher through the use of decode perform.

Published by: Vishnu Vardhan, Anish Ceppathi, Charu Nandhan, Kamilwadsariya, S. Jayakumar

Research Area: Cloud Storage

Review Paper

301. Determination of feasible central location for meeting from multiple geopoints

In recent years smartphone has become most important gadget for maintaining the daily activities and it also used by maximum population worldwide. Use of smart mapping technology is also increasing in the large area like transportations, defense, sports, etc. Mapping applications always depend upon current detection or preferred location of a user or the group. Sharing location among the group is the better solution to know the individual's location. Considering the condition any group wants to arrange a meeting at the location which suits all the members hence it will always better to find the centroid of the polygon generated by user geo-locations. The proposed system aimed at finding the preferred and central location for user group using geo-point calculation and mapping technologies. The proposed system will provide a location-based service. This system will provide the central location or the location which is nearer to all users by using great circle algorithm and users location will be determined by using Google map API and GSM. Location privacy is the ability to prevent other parties from learning one’s current or past location.

Published by: Apeksha Godghate, Snehal Paunikar, Ashutosh Hiwarkar, Prajakta Bodakhe

Research Area: Information Technology

Case Study

302. Energy management system for smart home using IoT

One of the major attributes of the Smart home automation and energy management systems integrate IOT and renewable energy resources at the consumption premises. With the advancement of Automation technology, today‟s world prefers Automatic systems over manual systems. This paper presents the design, implementation, and testing of an embedded system using Arduino that integrates solar energy resources and energy management into a smart home incorporated with IOT. The proposed system provides and manages a smart home energy requirement by installing renewable energy and scheduling the power flow during peak and off-peak period. IOT (Internet of things) is the latest and emerging internet technology. Internet of things is a growing network of the everyday object-from industrial machine to consumer goods that can share the sensors information to the Automation system using WIFI communication. IoT is a system that uses computers or mobile devices to control all home functions and features automatically through the internet. In addition to that, a two-ways is developed to enable the homeowner and the utility provider to better optimization of the energy flow and the consumption efficiency. A prototype for the proposed system was designed, implemented and tested using a controlled load bank to simulate a scaled random real house consumption behavior.

Published by: G Hemalatha, M. J. Johnet, N. Arunkumar, M. P. Nitheesh

Research Area: Energy Management

Research Paper

303. Experiment study on the use of varying percentage of silica fume with cement and natural aggregate with recycled coarse aggregate in concrete

Natural aggregate is used in larger quantities from natural resources it makes the big problem in future. For less use of natural aggregate, the availability of demolished concrete for use as the recycled concrete aggregate (RCA) is increasing. Using this waste concrete as RCA conserves natural aggregate, reduces the quantities of landfills, decreases energy consumption and can provide in less cost. However, there are still many questions on the beneficial use of RCA in concrete pavements.The aim of this research is to find the possibility of the structural usage of recycled aggregate concrete is mixed with natural aggregates, based on better understanding of the behavior of recycled aggregate in concrete structures experimenting fresh and hardened concrete, mixtures containing recycled aggregates. The literature review provides an overview of sustainability, the material properties of RCA both as an aggregate and in concrete, concrete mixture and designs with RCA, the performance of used RCA pavements, and the implementation of RCA highlighting some examples where RCA has been used successfully. Use of recycled aggregate (RA) in concrete is very useful for environmental protection and economic terms. Recycled aggregates are the construction materials for the future. Recycle concrete aggregate is giving little lower strength than natural aggregate concrete. Though, if it is used up to 20% of replacement by weight than it can give almost same strength to that of natural aggregate concrete. Hence it was very important to improve the strength of recycled aggregate concrete for higher recycled aggregate content.Hence silica fume used for strength improvement material.

Published by: Karunesh, Vijender Thakur

Research Area: Silica Fumes

Review Paper

304. Smart cane for visually impaired people

Visually impaired people find difficulties detecting obstacles in front of them, during walking in the street, which makes it dangerous. Smart cane for visually impaired comes as a proposed solution to enable them to identify the world around. It is used for the smart navigation for visually impaired people in indoor and outdoor environment respectively. In this, we propose a solution, represented in a smart cane with the ultrasonic sensor to detect any other obstacles in front of the user, which is close enough. Moreover, another sensor i.e. water sensor is placed at the bottom of the stick for the sake of avoiding puddles. This proposed system uses the ATMEGA16 328 micro-controller embedded system and buzzer.

Published by: Sushrut Ashtikar, Hitesh Kalamkar, Ishita Jain, Vikas G. Bhowate

Research Area: Electronics

Research Paper

305. Vicinity Monitor using Internet of Things

Internet of things is the technology that has been getting very popular lately so much so that it is powering a big translation in the business models and allowing them to drive their way towards Automation. Putting it straight, Internet of things basically is a network of devices like our vehicles and electrical appliances and software and network connectivity that enables these devices to share data about their status. What it enables the developers to do is to control them remotely. By the year 2020, 260 million devices will be IOT enabled according to Gartner. One of the key areas where internet of things is found to be more helpful is Monitoring. Being able to remotely get information about something or the status of something opens the gate for a large number of applications. Motivated by the goal of achieving clean air in our surroundings, this paper discusses the IoT technologies available that enables us to remotely monitor the air quality of a distant place. Furthermore, this paper contributes by introducing Vicinity Monitor, a sensors based air quality, flames and temperature monitoring project that enables its users to get this information on their Android device remotely. And finally putting forward the advantages, challenges and future scope of this project. We aim to make our contribution to the sustainable world with this research.

Published by: Piyush Sharma, Kanik Juneja

Research Area: Internet of Things

Research Paper

306. Performance analysis of wind turbine using wind lens technology

Wind power generation is proportional to the third power of the wind speed as per available thesis and mathematics. Wind energy is converted into electricity using wind turbine. According to the present design available of wind turbine, only 50% of kinetic energy of wind is converted into useful power output. If we are able to concentrate more wind energy over the turbine blade then the power output of wind turbine can be increased effectively. To embody this, scenario, a simple brimmed ring structure which intentionally creates turbulence behind the turbine blade to draw more air flow into the turbine is added externally at the periphery of the blade. This structure effectively increases the speed of the wind turbine leading to higher energy output from the wind turbine.

Published by: Tushar Kunjir, C. Limbadri, R. R. Arakerimath

Research Area: Engineering

Technical Notes

307. Energy generation by the suspension system

The suspension is the system of tires, tire air, springsshock absorbers and linkages that connects a vehicle to its wheels and allows relative motion between the two. Suspension systems must support both road holding/handling and ride quality, which is at odds with each other. The tuning of suspensions involves finding the right compromise. It is important for the suspension to keep the road wheel in contact with the road surface as much as possible because all the road or ground forces acting on the vehicle do so through the contact patches of the tires. The 20th century saw a large diversification of fossil energy consumption, with coal declining from 96 percent of total production in 1900 to less than 30 percent in 2000. Today, crude oil is the largest energy source, accounting for around 39 percent of fossil energy, followed by coal and natural gas at 33 and 28 percent, respectively. It’s necessary to find an alternate method of energy generation. Since in our car air conditioning to wiper motor runs on fuel. Instead of using fuel for small requirements, we can use the energy generated by the suspension. Our project is to develop energy from the suspension and charge the battery or use the electric energy for various purposes.  

Published by: Jawahar, Chaithra

Research Area: Energy Resource

Research Paper

308. Ducasa automatics using internet of things

Automation is the process of controlling system or appliances by automatic means as the name suggests to simply reduce human intervention to a minimum amount and to make life easier for the humans. Automation term was coined from the automobile industry which means increased use of automatic devices and control mechanized devices. Automation is a technology which was developed to do different processed by using programmed commands and provide proper feedback to the human when used. The automated system resulting performs the instruction given with very less human intervention. Automated systems are based on usage of computer and computer programs and the related technologies. With time, the development of the automated system has become complex and sophisticated. The main advantage of automated systems is to provide ease of use of appliances or systems near-human with less human intervention. Automation helps to control the electric appliances in the home office via the Internet which can be done by using various computer-related technologies like Raspberry Pi, Arduino Uno etc. In this project, we are using Raspberry Pi. Raspberry Pi is a credit card sized computer. It is a series of small single board computers developed by Raspberry Pi Foundation which is based in the United Kingdom. It is used in small-scale projects by students. It is equipped with GPIO pins (General Input/output Pins).It uses an operating system Raspbian which is developed for Raspberry Pi itself. Raspbian is a Linux based OS.  

Published by: Puru Mittal, Ashutosh Anand

Research Area: Internet of things

Review Paper

309. An experimental investigation of mechanical properties of concrete due to the effect of fiber and fly ash

The high cost of conventional construction materials is an existing factor affecting housing system around the world. This has necessitated research work into alternative materials in the construction field. The aim of this paper is to study the properties of fibers reinforced concrete produced from steel fibers and fly ash. As different dosages of cement were replaced by fly ash and steel fiber, the additive material was added. Fibers have been used in concrete as reinforcement and strengthening component under tension. The various strength such as compressive strength, flexural strength and split tensile strength was experimentally noted for each sample, the fly ash was replaced 5, 10, 15 and 20% cement content respectively. The sample was cured for 7, 14 and 28 days respectively. The aspect of soaking was also considered. The results obtained indicate noticeable improvement in strength with the inclusion of fibers and cement.

Published by: Prateeksha Singh, Amit Shukla, Akanksha Trivedi, Jai Vardhan Srivastava, Imran Hashim

Research Area: Composite Material

Survey Report

310. Study on groundwater structure

Groundwater resources are the principal source of drinking water for about all the states in India. Groundwater resources in every district of Chhattisgarh are under increasing stress as there is a rapid growth in their usage. Water managers need more timely and accurate data to access ground-water conditions to manage adverse situations such as drought and loss of pumpage in agriculture and domestic water supply. Currently, groundwater researchers use stand-alone data logging equipment which is labor intensive and the method is not easily scalable if the number of logging locations increases. The aim of this paper is to provide a better understanding of water condition as safe, critical, semi-critical, overexploited in districts of Chhattisgarh.

Published by: Dev Ashish Sahu, Amit Thakur, Jayant Navrange, Kanhaiya Cherkhiya, P. Sai Shekhar

Research Area: Geological Survey

Technical Notes

311. Analysis of Ethernet connectivity by using ARP and UDP protocol

Ethernet connectivity focuses on the priorities and necessities of requirements such as flexibility, cost, and area etc that varies for each system, but no extra functionality is desired than required. This paper mainly focuses on the Ethernet frame analysis in Xilinx by using UDP protocol and ARP Protocol. Ethernet frame consists of source and destination MAC addresses. To find out the next hop IP address that has a particular MAC address ARP Protocol is used. And also Ethernet frames payload will be either IPv6 or IPv4. Hence, the IPv4 packet header of UDP protocol is used. The analysis of Ethernet frame is performed by implementing the work on Xilinx FPGA - Spartan 6 as it offers driving network highlights of industry and Wireshark is used to get the traces of Ethernet frames.

Published by: Chaithra K

Research Area: VLSI

Survey Report

312. Survey on medical data gathering using big data and cloud computing

Cloud Computing as a technology has helped to integrate large sets of data that can be accessed from anywhere. Big data is a collection of the large data set or data modules. Integrating Cloud Computing with Big Data has served many purposes and can also be used for future advances. The major advantage of integrating these two technologies helps in accessing large sets of data on a global platform. Integrating Hospital data sets present in form of Big Data with the Cloud Computing platform helps in instant access to patient information by the doctor. This helps the doctor to serve the patient sitting back even in a different hospital. The medicine dose details are given by the doctor to the patient which can be checked by the pharmaceutical person. Medicine availability is monitored by the pharmaceutical person who also dispatches the prescribed medicine to the patient.

Published by: Aditya Shankar, Mrigank Sinha, R. Subhashini

Research Area: Big Data and Cloud Computing

Research Paper

313. Smart grid and smart transformer powered by IoT

The electricity sector in the country is facing many problems, one such a major problem is that power theft in power lines and power grids. Still, there are some villages in the country do not have 24 hours electric power, that is there is a shortage of electricity and this lack of power supply is directly impacting on the country’s economic growth. The electricity sector plays a major role in Indian economy. The project is mainly focused on both hardware and software. The project implements power theft detection and other management services such as voice announcement facility to the concerned department, finding the location of power theft, plotting GPS points in google maps, auto police complaint to the nearest police station, power theft location sharing to police and finally capturing photos remotely for proof of theft. Our project consists of SMS enabled application and voice-based application. This project will also consist of the following features such as object detection on the power line and power grid, measuring temperature in the transformer such as high and low and measuring oil level in the transformer. Measuring temperature and oil level in the transformer and taking necessary actions will lead to improving power transmission and it also boosts transformer efficiency.

Published by: Suresha B L, Bhavani Shankar K

Research Area: IoT

Research Paper

314. Multi-factor authentication for secure electronic balloting credentials

In recent times there has been a decline in the confidence of common people over the Electronic Voting Machines (EVMs). Today’s automated vote casting methods have faced immense controversy to being vulnerable to hacking and questions have been raised about their transparency and security. This paper is lodged in style and develop a tamper-resistant electronic legal system that aims to alleviate the problems with existing machines. Here, multiple bedded verification method is administrated on an associate eligible citizen by means of fingerprint recognition primarily to demonstrate his identity. Subsequently, the person would cast the vote by pressing a button corresponding to a particular candidate which would be recorded in the system providing the vote caster a visual confirmation. Then steganography technique is used to hide secret messages into ordinary digital media without drawing suspicion. This system not only prevents multiple vote casts but also eliminates the discrepancies that commonly arise with a person claiming not to have voted, whereas his or her name is present in the list of vote casters. The experimental results show that the proposed method outperforms previous EVMs by electronically transmitting their results back to the Election Commission from the control unit, through a simple and unconditionally secure protocol.

Published by: Anita Titus, Nithiya Princy Rajam. B, Swetha. M, Ramya. S

Research Area: Embedded and Image Processing

Research Paper

315. Highly sensitive pin-accessibility for ATM using human body communication

In this 21st century, we are searching for the technology which gives us better security and highest protection. We expect technology that should be genuine this need is satisfied by growing most genuine and new technology invented in 2005 called’ HAN based RED-TACTON’ by NTT’s, which is Japanese corporation. This technology is similar to LAN, MAN, WAN, HAN is nothing but human area network and these are advanced to WLAN, infrared and Bluetooth. This technology mainly used in security matters like accessing the things, lock or unlock the things which are we use daily. Here we use the redtacton technology with biometrics (user’s fingerprint for identification) for personal identification and to provide the high level of security and accuracy in ATM machines. Additionally, DC motor is used for rolling the shutter.

Published by: G. Swaminathan, Tharun. G, Sakthivel. T, Venkatesh. V

Research Area: Electronics

Research Paper

316. Automation of tank level by using PLC and SCADA / HMI

The proposed system provides an analysis of the simulation and components required for the implementation of an automated level control system with the help of Programmable Logic Controller (PLC).Supervisory Control and Data Acquisition (SCADA) was established and the HMI was created. The proposed model can effectively supervise level control in multiple tanks. Three level sensors were used to provide the level data to the PLC. PLC used this data to take the required decisions and thereby turning ON and OFF a pump. A manual switch was also provided to override the automatic system. The SIMATIC S7-300 universal controller was used as the main decision-making module. The system was implemented in SCADA to create the required Human Machine Interface (HMI). Modifications can be made by using float sensors model which would effectively provide the correct level but the cost would increase and vibration of the sensor might disrupt the result, our model effectively counters those shortcomings. This paper presents a case study of SCADA system for monitoring and control of the parameters in water supply system. The system main functional parameters and performs continuous supervision of water distribution stations in order to allow any problem to be solved. The control system is organized in a hierarchical structure with three layers. The first layer consists of field instruments, remote terminal units, and field control devices. The signals from instruments via transmitters are sent to dedicated PLC panels at the second layer. The SCADA central level contains high-speed pc computer for supervision or operative drive of remote processes. Water level sensing can be implemented in industrial plants, commercial use and even at home.    

Published by: Gayatri Pradhan, Linkan Priyadarsini

Research Area: Power System and Non Linear Control System

Review Paper

317. Analysis and design of pipeline system instead of the canal system

Canals enhanced irrigation water losses and the annual cost of maintenance became uneconomical for the long term. Easy maintenance, durability, modification capability and flexibility of pipelines give them the potential to be the economical alternative to replace the Canals. Pipes were selected to construct a network of the pipeline due to the availability of Plastic Irrigation Pipes and Reinforced Concrete Pipes. This study has been undertaken to analyze canal system and to design a pipeline system to replace it. The study area is Khadka Irrigation Project, located on Mule river basin in Ahmednagar district, Maharashtra. The overall efficiency of pipeline system was found out to be much better than Open Canal System also the distribution efficiency by use of lift irrigation was found out to be boundless.

Published by: Ritesh Suryaji Bhoir, Neel Bharat Mhatre, Rahul Bharat Mhatre, Amit Shashikant Shinde, S. T Shetty

Research Area: Engineering

Research Paper

318. Use of glass fiber in pavement quality concrete slab

The construction pavements have high strength, better durability and have the moderate economy for a long period of time. The pressure nowadays is to make light and green pavements of better serviceability, which can resist loads of high intensity. The main objective of this study is to design the slab thickness of pavement quality concrete (PQC) using achieved the flexural strength of the concrete mixture. In this study, glass fiber is added to concrete at different percentages like 0.05%, 0.1%, 0.2%, and 0.4% and then these results are compared to the normal concrete mix. The flexural and split tensile strength are increasing as the fiber content is increasing. The study shows that having the high values of flexural strength and split tensile strength helps in higher load carrying capacity and higher life expectancy. The addition of glass fiber to concrete help in reducing the slab thickness and the least thickness of pavement slab is found for the addition of 0.4% glass fiber to concrete. As for pavement slab thickness is also reduced for M4-GF (0.05%) mix by 110 mm as compared with control mix result as per IRC 58:2002. The study helps in decreasing the cost of the project, thus by saving the cost of the material without even decreasing the strength of concrete.

Published by: Vishal Jamwal, Paramveer Singh

Research Area: Civil Engineering

Research Paper

319. Development and evaluation of Bilayer Tablet of Metoclopramide HCl and Aceclofenac

Bilayer tablets can be used to control the delivery rate of one or two different active pharmaceutical ingredients. Presently the use of bilayer tablets has been increased. Bilayer tablets can be a primary option to avoid chemical incompatibilities. The main goal of the present analysis work was to prepare bilayer tablet of Metoclopramide hydrochloride and Aceclofenac for separate layers to avoid the loss of dignity of the drug. Bilayer tablet manufacturing is addressed including material properties, lubrication, layer ordering, layer thickness, layer weight control, as well as first and final compression forces. These days, several pharmaceutical organizations are developing bilayer tablet for co-administration of drugs to improve the therapeutic efficacy as well as to reduce the chances of drug-drug interaction.

Published by: Puja Kumari, Sunil Kumar Shah

Research Area: Pharmaceutics

Research Paper

320. RFID based toll and over speed detection

The Proposed System consists of developing a toll and speed detection system. The method used for speed detection and toll collection at most places is traditional. These traditional methods include manually collecting toll at the toll plazas and using laser guns to detect the speed of the vehicle. But manually collecting tolls can be very tedious and the speed detected by the laser guns is not always correct. Analyzing these traditional methods we have come up with a method – ‘RFID based Toll and Speed Detection’. In this method, RFID tags will be given to all the cars according to their classes and will also contain basic information about the car owner and information about the prepaid balance. RFID Reader will be placed at the toll plaza. Speed detection system will be used on highways. Here the RFID Reader will be placed on the highway and calculate the speed of the vehicle. If the vehicle is overspeeding, fine will be deducted directly from the balance. A real-time database will be created using Python which will keep informed of the car owner, their prepaid balance and also their updated balance. This RFID system at the toll plaza will avoid long queues and also save fuel which in turn is beneficial for the environment. On the highways, RFID system will help in avoiding accidents due to overspeeding vehicles.

Published by: Avani Gandhi, Kiran Yadav, Mandar Chogle

Research Area: Electronics Engineerinng

Research Paper

321. Effect of piperine supplementation on monensin induced stress by using in-vitro culture method

Piperine is pungent alkaloid obtained from a spice black pepper which is commonly called as king of spices in India. It has a variety of biological functions for treatment including heart attack, arthritis, atherosclerosis, cancer etc.Due to the presence of alkaloids, it has a popular effect on oxidative stress which is happening inside the cells during imbalance of oxygen consumptions which further developed free radicals and cells ultimately develops oxidative stress.In this research article, we add different concentrations of piperine in yeast to overcome oxidative stress which induced by an ionophore monensin when it is supplied to yeast a unicellular organism by in-vitro culture method.

Published by: Fayaz Ahmad Lone, Diksha Parihar, Dr. Himanshu Aggarwal

Research Area: Molecular Biology

Research Paper

322. Wireless surveillance robot

We propose a cost-effective four-wheel surveillance robot using raspberry pi, micro-controller which employ servomotor, DC motor controlling. Surveillance robot typically consists of a video camera, servomotor, DC motor, raspberry pi, blue tooth module, ultrasonic distance sensor & Laser gun. Designing of the robot in such a way which can be controlled using blue tooth app from the android mobile. We had developed the suitable switches on the app through which we can control the motion of it. Here, Bluetooth act as an interface between the controller and android app. According to the command received from the user, the robot motion can be controlled. Although camera used for the video capturing is wireless too. So, both the video as well as navigation of the camera can happen simultaneously from the same mobile.

Published by: Saurabh Kumar, Nisha Kumari, Pankaj Shukla, Saurabh Verma, Swapnil Srivastava, Mayank Aggarwal

Research Area: Electrical and Electronics Engineering

Research Paper

323. Grassberger procaccia algorithm for EEG channel selection

The multi-channel nature of EEG a data poses a big challenge to the development of automatic EEG analysis and classification systems. Due to the “curse of dimensionality” problem, the analysis and classification of several channels may not lead to the desired performance. Accordingly, a number of algorithms have been proposed to identify small ”static” subsets of channels that are capable of differentiating between samples of different classes. However, the identification of small subsets of relevant channels may not always be possible, where for certain applications the smaller the number of channels the less chance that sufficient information is provided. The propose in this project is a dynamic channel selection using GrassbergerProcaccia algorithm that identifies a channel (or a subset of channels) for each time segment of the signal that is relevant to the class of that particular time segment. To achieve this, we embraced the Grassberger–Procaccia algorithm methodology, and particularly the multiple classifier behaviour approaches. Each EEG channel can be chosen to represent a certain unseen time segment of the signal based on the performance, or local accuracy, of its nearest neighbors in the set of training time segments. Results obtained using EEG data from a four-class alertness state classification problem reveal that the proposed approach is capable of achieving competitive performance compared to a traditional static channel selection based method. The algorithm also produced very encouraging results when a method developed by Grassbe