Volume-2, Issue-6

Nov-Dec, 2016

1. A Review on Judicial Activism

Judicial Activism is not a result of general development of judicial procedure. It is an essential aspect of the dynamics, derivatives and independent findings of the courts. It is a specific judicial interest about the issues. Judicial Activism does not mean governance by the judiciary. Judicial Activism must also function within the limits of judicial process. Within those limits it performs the function of stigmatizing, as well as legitimizing, the actions of the other bodies of the Government- more often legitimizing. The judiciary is having certain limitation according to statutes which are framed by the legislature. It becomes strong only when people repose faith in it. Such faith constitutes the legitimacy of the Court and of judicial activism. Courts do not have to bow to public pressure, but rather they should stand firm against public pressure. Such inarticulate and diffused consensus about the impartiality and integrity of the Judiciary is the source of the Court’s legitimacy. It is an essential aspect of the dynamics of a constitutional court, in modern India, the judicial activism may develop through many aspects and it will play an important role to future challenges of the democratic India.

Published by: Asha Rani

Research Area: Judicial Activism

2. Protocol Enhancement of Vehicle Collision Avoidance System in Network

In most of the automobile system avoiding collision is a critical issue. A “Vehicle Collision Avoidance System” in an automobile system is a safety system that is designed to reduce the chances of collision .Collision avoidance is one of the most important issues in controlling vehicles automatically. The job of driving vehicles can be made easier by the use of these system, as well as these system ensures to manage the traffic efficiently with road safety. In this paper we consider a VANET scenario for road side safety and to solve the emergency situation. To improve the performance for large scale network having large traffic and communication between vehicles is done by using routing protocol. Here we introduce a PUMA protocol and compare its results. Also we apply Genetic Algorithm on this protocol for the path optimization to achieve maximum results. By varying number of vehicles (nodes) mean throughput, mean delay, jitter, PDR has been calculated. In this paper application and future scope of VANETs is also introduced.

Published by: Mr. Insha Mushtaq, Aashish Gagneja, Navjot Kaur

Research Area: Networking

3. Detection and Mitigation of Botnet through Machine Learning in MANET

Botnets are the networks of remotely controlled computer systems infected with a malicious program that allow cyber crimes to control the infected computers or machines without the user’s knowledge. Botnets are the most ever-growing much interested evolved in the design of mobile adhoc networks (MANET). A botnet in mobile network is defined as a collection of nodes containing a malware called mobile malware which are able to bring the different elements into harmonious activities. Unlike Internet botnets, mobile botnets do not need to propagate using centralized structure. With the advent of internet and e-commerce application data security is the most critical issue in transferring the information throughout the internet. Botnets are emerging as the most significant threat facing computing assets and online ecosystems. The sharing of information through internet has been the main driver behind the Elite hacker into criminal activities. Their main target is to steal the vulnerable information from the individuals or from the organizations. In other words we can say their purpose include the distribution of spam emails, coordination of distributed denial of service (DDoS) and automatic identity theft. The proposed method is a classified model in which a Hill Cipher Algorithm and a Support Vector Machine are combined. A MANET environment with real time datasets is simulated for testing this model; the packet data of network flow was also collected. The proposed method was used to identify the critical features that determine the pattern of botnet. The experimental results indicated that the method can be used for identifying the essential botnet features and that the performance of the proposed method was superior to that of Artificial Fish Swarm Algorithm.

Published by: Mariya Ameer, Aashish Gagneja, Navjot Kaur

Research Area: Networking

4. Survey on Dynamic Resource Allocation Schemes in Cloud Environment: A Review

Cloud computing environment provisions the supply of computing resources on the basis of demand, as and when needed. It builds upon advances of virtualisation and distributed computing to support cost efficient usage of computing resources, emphasizing on resource scalability and on-demand services. It allows business outcomes to scale up and down their resources based on needs. Managing the customer demand creates the challenges of on demand resource allocation. Further they can make use of company-wide access to applications, based on pay-as-you-go model. Hence there is no need for getting licenses for individual products. Virtual Machine (VM) technology has been employed for resource provisioning. It is expected that using virtualized environment will reduce the average job response time as well as executes the task according to the availability of resources. Effective and dynamic utilization of the resources in cloud can help to balance the load and avoid situations like slow run of systems. In this paper, various resource allocation strategies and their challenges are discussed in detail. It is believed that this paper would benefit both cloud users and researchers in overcoming the challenges faced.

Published by: Roshni Singh, Dr. Shiva Prakash

Research Area: Cloud Computing

5. A Review in Cloud Computing Security using Steganography

Cloud Computing is a flexible, cost-efficient, and authentic platform for providing business or consumer IT enabled services on the Internet. However, Cloud computing represents an added level of risk factors because important and essential services are often outsourced to a third party connected to cloud network, which makes it even harder to maintain the level of data security. Steganography is the technique of hiding or encapsulating information in digital media in order to prevent the existence of information. The digital media with hidden information within are called stego media and the data without hidden information are called cover media. Steganography can be used for hiding both the legal as well as illegal information. For example, civilians can use it for maintaining privacy while the government may use it for the security reasons of the country. In this paper we have discussed about the various techniques by which we can enhance the cloud service in relation to security and data privacy.

Published by: Ataussamad, Dr. Shiva Prakash

Research Area: Cloud Computing

6. Automated Vehicle Detection and Classification with Probabilistic Neural Network

The number of vehicles in the urban areas is rising at high pace. The critical issues are arising with the rise in the number of vehicles for the traffic analysis. The analysis of the vehicle running across the roads is usually done for the density analysis, traffic shaping and many other similar applications. The vehicle detection in the rushed areas produces the real challenge of independent component selection and classification, which requires the precise object detector with deep analytical ability based classification algorithm. In this paper, the unique method with probabilistic neural network (PNN) classification model along with the non-negative matrix factorization for the purpose of vehicular object localization and classification in the urban imagery. The proposed model is expected to solve the problems associated with the accuracy, precision and recall.

Published by: Ramanpreet Kaur, Meenu Talwar

Research Area: Digital Image Processing

7. Comparison of State Observer Design Algorithms for DC Servo Motor Systems

a state observer is a system that models a real system in order to provide an estimate of the internal state of the system. The design techniques and comparison of four different types of state observers are presented in this paper. The considered observers include Luenberge observer, unknown input observer and sliding mode observer. The application of these observers to a Multiple Input Multiple Output (MIMO) DC servo motor model and the performance of observers is assessed. In order to evaluate the effectiveness of these schemes, the simulated results on the position of DC servo motor in terms of residuals including white noise disturbance and additive faults are compared.

Published by: Kaustav Jyoti Borah, Jutika Borah

Research Area: Control Systems

8. Proposed Approach on CSTR with PID

In this paper conventional PID controller provides satisfactory results, still inefficiency persists due to extreme non-linear nature and uncertainty in the dynamics of the plant. So optimize the pidnon linear behavior by Gravitational search algorithm and partical swarm optimization. The PID controller is the most common form of feedback. PID control isused at the lowest level; the multivariable controller gives the set points to the controllers at the lower level. The PID controller can thus be saidto be the “bread and butter’ of control engineering. It is an importantcomponent in every control engineer’s tool box.PIDcontrollers have survived many changes in technology, from mechanicsand pneumatics to microprocessors via electronic tubes, transistors,integrated circuits.

Published by: Ramandeep Kaur, Jaspreet Kaur

Research Area: PID Controller

9. Behavior Analysis of OSPF and ISIS Routing Protocols with Service Provider Network

OSPF is mainly designed for IP networks from scratch and runs in almost all sorts of environments like enterprise, data centers, or service providers, while ISIS, which was mainly designed by ISO was not intended to run for IP based networks from scratch and IETF in the early 1990’s adopted ISIS for its advantages. As a scalability purpose ISIS is better than OSPF, but when we have a large database or a large service provider, with only a single level design inside the service provider Both the routing protocols have different authentication mechanisms with ISIS providing key chain based mechanism and provides both plain-text and MD5 based integration with it, while OSPF also provide MD5 and SHA1 hashing based authentication when used with IPv6. Multiprotocol label switching technology (MPLS) is used to transfer the data in service provider network. Apart from Interconnecting Data Centers, L2VPNs are also used for Inter-AS service provider’s connectivity and connecting various Enterprise Branch offices with each other. Selection of right L2VPN technology is very important as wrong technology can harm the network. The main focus of this technique to give the solutions for slow speed, quality of service, lack of traffic engineer, less security and problem in trouble shouting. The motive is to improve the speed, high security, easily trouble shoot, high quality in terms of packet transformation and better results for traffic engineering.

Published by: Vikasdeep Kaur, Harpreet Kaur, Jaspreet Kaur

Research Area: Networking

10. Optimizing Channel Estimation for SCFDMA

The third generation partnership project has employed SCFDMA for its uplink transmission because of its low PAPR. SCFDMA signal while travelling through channel is affected by noise contained in the channel. Various channel estimation techniques has been given in the literature. This paper presents a channel estimation based on LMS with its parameters being optimised using PSO. The paper also compares result with existing LMS algorithm based systems. It has been observed that the proposed technique provides improvement in Bit Error Rate as compared to other technique.

Published by: Priyanka Malhotra, Garima Saini

Research Area: Channel Estimation

11. A Sec‎ure D‎ata Ag‎gregation Mecha‎nism in Wire‎less Senso‎r Netw‎ork

The addition of mobility in WSN ha‎s att‎racted signific‎ant i‎nterest in recent years. Mo‎bile nodes incre‎ase the ca‎pabilities of the WSN in m‎any way‎s. W‎e c‎lassify mobile wireless sensor networks (MWSNs) as a spec‎ial and ada‎ptable c‎lass of WSN, in which one or more th‎an one e‎lement of the network is mobile. The mobile componen‎t can b‎e any of the sensor nodes, rela‎ys (i‎f any), data c‎ollectors or sink or any combina‎tion of them. Fr‎om d‎eployment to data disseminat‎ion, mobility p‎lays a‎n i‎mportant rol‎e in ever‎y f‎unction of sensor networks. F‎or examp‎le, a mobile node can visi‎t oth‎er nodes in the network and ga‎ther data direct‎ly t‎hrough sin‎gle-ho‎p tra‎nsmissions. Simila‎rly a mobile node can trave‎l ar‎ound the sensor network and collect data from sens‎ors, bu‎ffer them, and t‎hen t‎ransfer them to base station. This considerabl‎y red‎uces onl‎y colli‎sions and data loss‎es, and als‎o minimiz‎es the pres‎sure of data forward‎ing ta‎sk by nodes and as a r‎esult spre‎ads the energy cons‎umption more consi‎stently througho‎ut the network. The proposed data aggregati‎on mechani‎sm us‎es bacteria‎l foraging optimization algorithm. This techn‎ique is i‎nspired by the so‎cial foraging behav‎iour lik‎e a‎nt col‎ony and pa‎rticle swar‎m optimization. The proposed algorithm improves WSN th‎roughput, coll‎ects data more efficientl‎y, and save‎s energy.

Published by: Sandhya Sehraw‎at, Dr. D‎INESH SIN‎GH

Research Area: Comp‎uter Sci‎ence and E‎ngineering

12. Efficient Reception of Packets using Zigbee Protocol Wireless Sensor Network

The great potential of Wireless Sensor Network is being seen in industrial, consumer and commercial application. The wireless technology is becoming one of the most prominent areas of research. With the development of network and communication technology, the WSN has solved the inconvenience into people’s lives. WSN has good functions of data collection, transmission, and processing. In the older technology there was a shortcoming of average packet time delay, large power dissipation, less efficient reception of packets, large propagation delay, low speed communication. Besides there were other limitations like limited battery life time nodes incapability of data aggregation, processing, storing and then passing it to the base station accordingly.. As in the earlier Technologies WSN node based leach protocol could not provide the above necessary requirements for the system to operate under well adverse environmental situations. In this dissertation, we have used a ZigBee protocol in WSN system for ensuring that the nodes may operate for a longer period of time, reducing packet time delay, establishment of a re-linking algorithm and provides an efficient reception packet and sufficient throughput The advantage of ZigBee Technology is that it covers a range of 1-100m For comparison purposes, we have taken the oldest technology i.e SEP .To allow different systems to work together, standards are needed. ZigBee/IEEE 802.15.4 protocols are developed for this purpose. Moreover, ZigBee protocol in WSN has resulted in the low power consumption, enhancement of life time of battery reduced average packet time delay less power dissipation improved an efficient reception of packets, reduced propagation delay, high speed communication among wireless communication devices. On comparing the results of both that is the previous work over which work has been done earlier and present work it has been observed that modified system performs better.

Published by: Khursheed Ahmad Rather, Aashish Gagneja, Navjot Kaur

Research Area: Zigbee

13. Implementation of Plagiarism Detection Tool in JAVA

With the advent of internet everything that has been researched is available on the internet. This information can be copied and used as original by someone in their own work which poses a major challenge for academia and industries like publications. A lot of work has been done in the field to detect plagiarism in the documents and algorithms have been made. In this paper, we have implemented porter algorithm for stemming, TF-IDF and cosine similarity to detect plagiarism

Published by: Attinderpal Singh

Research Area: NLP

14. Optimization in Communication Routing: An Introduction to Optimal Control

Communication is nothing but transfer of information from source point to destination point over a medium and coming to Communication Routing it is a process in which to find how shortest and fastest communication is achieved between the two ends for the Optimization of the Network. In this paper I would like to discuss about how optimization is achieved in communication network through the application of information like accuracy, throughput, latency and mobility support and different protocols followed by networks for the optimized route. And I will also explain about advantages of network coding in improving the throughput over routing. Explained how different network algorithms are used for solving optimization problems in communication routing for example like genetic algorithm used in routing optimization of optical fiber communication networks. And discussed about Optimizing the layered communication Protocols.

Published by: Kaustav Jyoti Borah, Jutika Borah

Research Area: Optimal Control

15. Golden Ratio Associated with Rogers-Ramanujan Identities

Golden ratio Associated with Rogers -Ramanujan Identities Dr. Vandana N. Purav P.D.Karkhanis College of Arts and Commerce, Ambarnath Email : vnpurav63@gmail.com Abstract Ramanujan was an eminent Indian Mathematician of 20th century. During the years 1903-1914 he discovered most of the mathematical results . In this note, we focus on the results associated with Rogers- Ramanujan identities of first and second kind and Golden Ratio.

Published by: Dr. Vandana N. Purav

Research Area: Number Theory

Research Paper

16. Novel Clustering based Routing Approach in MANET by Flower Pollination Algorithm

— In this thesis, the extra burden of the nodes that are within the neighbourhood of the base station in a cluster-based network has been modelled as extra virtual member nodes. We virtually divide the network into regions according to the proximity to the BS denoting the closest region as the front region and the farthest region as the rear region. The nodes have been classified according to the region that they fall in. Based on our model, transmission tuning algorithm for cluster-based WSNs has been proposed to balance the load among cluster heads that fall in different regions. This algorithm is applied prior to a cluster algorithm to improve the performance of the clustering algorithm without affection the performance of individual sensor nodes. As a result, the network lifetime has been prolonged.

Published by: Karamjeet Kaur, Harpreet Kaur

Research Area: Network

17. A Study on Work Value Perceptions of Women Employees in Indian Postal Department with Special Reference to Tamil Nadu State.

Women established an identity of their own and created a space for them in education and work sphere. Educational institutions started training women to enter new arenas enabling them to move away from traditional roles. Families began expecting women not only to continue with higher education, but also to pursue any interest they may have in the profession. And, naturally, after spending so many years in education and obtaining professional degrees, they became interested in using the knowledge acquired productively. As a result, modern Indian women have made inroads into different professions that were unthinkable to women in the past. The number of women in the profession is increasing and they are making substantial progress toward parity with men. Today, in India, one can find more and more women in familiar as well as unfamiliar places - as heads of giant organizations, at the controls of aircrafts, in parliament, in judiciary, as police officers, doctors, engineers, teachers- the list is never ending. By tradition and throughout history, Indian women were expected to fulfill roles that defined them in relation to others only, – the kinship identities. But increasingly contemporary women establish independent identities and move beyond the identities of daughter, wife and mother. The present study has made an attempt to study the work value perceptions of women employees in Indian Postal Department.

Published by: DR. K. Gomathi

Research Area: Arts and Science

18. Employee Satisfaction of Safety and Security Measures in Knitted Garment Apparels Pvt(Ltd), Tirupur, (Tamil Nadu, India).

Safety and security measures are inevitable in any organization where workers are involved. An organization’s responsibility to its employees extends beyond the payment of wages for their services. The employee’s safety and security on and off the job within the organization is a vital concern for the employer. Providing a safe and healthy environment is a pre-requisite for any productive effort. Knitted Garment Apparels is a private limited unit, was one of the leading exporters from Tirupur, since They are now giving the expansion of business and looking up for new sources . This research deals with the study is on the safety and security measures provided to the employees at Tirupur Knitted Garment Apparals,Tirupur .

Published by: Dr. B. Anitha Rani

Research Area: Human Resource Management

19. Offloading in Mobile Cloud Computing by Exception Maximization Algorithm

Offloading in mobile cloud computing by exception maximization algorithm is the idea to augment execution through migrating heavy computation from mobile devices to resourceful cloud servers and then receive the results from them via wireless networks. Offloading is an effective way to overcome the resources and functionalities constraints of the mobile devices since it can release them from intensive processing and increase performance of the mobile applications, in terms of response time. Offloading brings many potential benefits, such as energy saving, performance improvement, reliability improvement, ease for the software developers and better exploitation of contextual information. Parameters about method transitions, response times, cost and energy consumptions are dynamically re-estimated at runtime during application executions.

Published by: Samriti Goyal, Bhartii Grover

Research Area: Cloud Computing

20. Bioremediation of Petroleum Products through Bacterial Isolates.

Bioremediation is the use of biological treatment to destroy or reduce the concentration of hazardous wastes from a contaiminated sites. such system involves the uses of biological organisms such as bacteria fungi and plants, to reduce or eliminate toxic pollutants from contaminated sites by degradation assimilation or transpiration in the atmosphere is called bioremediation degradation is the mode of elimination mostly in case of organic compounds while heavy metals are assimilated. These microbes and higher plants can also be variously modified by genetic engineering to become efficient and suitable for bioremediation.

Published by: Ritu Sharma

Research Area: Bioremediation

21. Response of Bacterial Isolates to Various Antibiotics Isolated from Petroleum Spilled Soil.

All the bacterial isolates were studied for their responses to various antibiotics. Out of 28 bacterial forms, 12 forms were resistant to ampicillin, 10 forms to penicillin, 3 forms to erythromycin, 5 forms to streptomycin and only one isolate was resistant to tetracycline. Indicating that tetracycline was the most effective antibiotic for these bacteria.

Published by: Ritu Sharma

Research Area: Antibiotics

22. A Study about the Microfinance Models and Role of Financial Institution in Empowering Rural Finance: - An overview.

Abstract The purpose of this paper is to examine the role of financial institution and to study the different microfinance models which are empowering rural finance development in India. In this paper an attempt is made to find out how financial institutions are empowering the rural people and study the different microfinance models as well as different clients of the microfinance. India which is the one of the largest microfinance center in the world nowadays. In India more than 25% of its population lives below poverty line. For this poverty alleviation the Govt. of India started various programmes from time and again but failed in achieving this goal. The reasons behind the failure are such as the Govt. of India fail to reach the target population, the loophole in the system, corruption etc. The different countries of the world come with different ideas and schemes and these schemes increased the NPAs .Then the microfinance institution come forward to fulfill these gaps but the outreach is small as compared to the requirement and potential but some progress had been seen in this regard when NABARD and SHGs played an active role in this. After than numbers of different microfinance institution and different NGOs also dived in this business. Govt. must power the microfinance institution for mobilizing savings, with increase demand for the rural finance .How ever keeping in mind the recent experiences, and for the better growth we need to managed these microfinance institution in a better way and provide them adequate finance which full fill the needs of poor and also provide them a social responsibility which is most important for the growth of these microfinance institution and for alleviating poverty from the country. There is no doubt that NGOs played an important role in promoting SHGs so there should be need to start some incentive packages for these NGOs which motivates them to diversify themselves and their business to backward areas also.

Published by: Ahsan Ul Haq, Dr. Javed Iqbal

Research Area: Microfinance

23. On Parahyponormal and Quasi Parahyponormal Operators

In this paper we discuss about a new class of operators on Hilbert space. We call these operators as parahyponormal operators. Moreover, here we discussed some results on quasi parahyponormal and M-Quasi parahyponormal operators.

Published by: Sivakumar N, Dhivya G

Research Area: Operator Theory

24. On the Class of (K-N) Quasi-n-Normal Operators on Hilbert Space

In this work we introduce another class of normal operator which is (K-N) quasi n normal operator and given some basic properties. The relation between this operator with another types of normal operators are discussed. Here the results are given by using the conditions of (K-N) quasi normal operators.

Published by: Sivakumar N, Bavithra V

Research Area: Operator Theory

25. Implementation of Just-in-time in an Enterprise

Rapid industrialization has increased competition in the market and it has become troublesome for the industries (especially for small scale industries) to persist with this kind of modern industrialization. In order to survive in the market an enterprise should produce a good quality product which can be affordable to common man within a specific span of time. Management of time is of an immense importance for any enterprise or industry as it can accomplish more with minimum efforts. To overcome numerous problems Just-in-Time can be introduced to an enterprise. Just-In-Time deals with the production of any item after the order from consumer and not to produce items before the need or in advance.

Published by: Kiran Mahendrabhai Patel, Karan M. Patel, Rohan S. Sanap

Research Area: Mechanical Engineering

26. A Review of the Research on Aviation Risk Identification

Flying involves risk. To stay safe, you need to know how to judge the level of risk, how to minimize it, and when to accept it. Before the risk to happen we need to identify the hazard. Hazard is anything with the potential to cause harm it’s a present condition, event, and object, circumstance that could lead or contribute to a death to people, loss of property or equipment. It is a source of danger. Flying is one of the most secure methods for travel yet things turn out badly because of different reasons, for example, Human-errors, mechanical, climate, criminal activities. Records from the past mischance’s has brought about the development of flight frameworks and innovation has lessened danger of past mischance’s yet has made flight taking care of more entangled through years.

Published by: Kaustav Jyoti Borah, Mohan Kantipudi

Research Area: Systems Risk Analysis

27. Development of Multi Objective Techniques-A Case Study of Punjab and Haryana

In India and abroad, the commonly used decision modelling in real life rests on the assumption that the decision maker seeks to optimize a well-defined single objective using traditional mathematics programming approach. A farmer may be interested in maximizing his cash income, with certain emphasis on risk minimization. On the other at county level especially in a developing country a planner may aspire for a plan while maximizes food grains production and also to some extent considers employment maximization etc as the goals. Keeping in view the objectives of the study, state-wise secondary data on different variables for the period 1980-81 to 2014-15 were collected from Statistical Abstracts of Punjab, Fertilizer Statistics, Agricultural Statistics at a glance and the reports of the Commission for Agricultural Costs and Prices, published by Ministry of Agriculture By taking its deviations of observed Yt from its estimated value we got the error or the risk coefficients for each year for each crop. These risk coefficients were taken in the matrix formulation in the MOTAD format suggested by Hazell (1971 a and b). To give a meaningful explanation to the level of risk, total mean absolute deviations in gross returns were derived as under: Min A = 1/S Σ│ (chj-gj) xj│ Where A is the minimum average absolute deviation defined as the mean over (h=1………s) years, of the sum of the deviations of gross returns (chj) from the trend in gross returns (gj) multiplied by activity levels x j (j = 1………n). Where A is an unbiased estimator of the population mean absolute income deviation Where A = estimated mean absolute deviation S = no. of years chj = gross returns of the jth activity in hth year gj = sample mean of gross returns of jth activity x j = activity level This was minimized subject to the following constraints: Σaij xj ≤ bi (for all i = 1………….m, j =1……..n) Total activity requirements for the i th constraint, the sum of the unit activity requirements aij for the constraint i times the activity levels ‘xj‘do not exceed the level of the i th constraint bi for all ‘i’ and x j 0 all activity levels are non negative. Where a ij = per unit technical requirement for the jth activity of the ith resource. bi = the ith resource constraint level m = no. of constraints n = no. of activities

Published by: Prince Singh, Dr Manjeet Jakha

Research Area: Mathematics

28. On the Principle of Exchange of Stabilities in the Magnetohydro Dynamic Benard Problem with Variable Gravity by Positive Operator Method.

In the present paper, the problem of Benard for the magneto hydrodynamic field heated from below with variable gravity is analyzed and it is established by the method of positive operator of Weinberger and by using the properties of Green’s function that principle of exchange of stabilities is valid for this general problem, when g(z) is non-negative throughout the fluid layer.

Published by: Pushap Lata Sharma

Research Area: Mathematics

29. Microwave Welding using Stainless Steel Grades – A Short Survey

This paper deals with Microwave welding using stainless steel grades.The field of microwave joining had taken a great leap in the past decade, Due to its special and exceptional characteristics like selective heating, volumetric heating and inverted heating profile its has been introduce in the field of the microwave joining of materials ,previously which was limited only to the processing of food. It also has an edge over conventional methods due to these characteristics. Microwave energy is generally new area of topic in material welding or material joining even though it has been introduced already in many industries like medical, food processing, drying. This process with the help of microwave radiations deals with joining of similar and dissimilar materials. These joints were characterized using various techniques.

Published by: Valsaraj T.S, Mr. Sathish Kumar

Research Area: Mechanical Engineering

Research Paper

30. Multivariate Indoor Scene Recognition using the Object Level Analysis with SVM Classification

The research area of the indoor scene recognition has attracted the various scientists and engineers across the globe, which includes the neuroscientists, electronics engineers, robotic engineers, digital image experts, camera developers and manufacturers for the purpose of application designing in the fields of the computer vision, vision based communications and the access control systems. The indoor scene recognition methods require the inclusion of the various methods in the computer vision, image processing and feature recognition for the scene recognition by identifying the category of the input image by comparing it against the given training databases by the means of the feature descriptor (popularly based upon the color or low level features) and the classification algorithm. The indoor scene classification algorithms require the number of the computations and feature transformations along with the normalization and automatic categorization. In this thesis, the multi-category dataset has been incorporated with the robust feature descriptor using the scale invariant feature transform (SIFT) along with the multi-category enabled support vector machine (mSVM).

Published by: Neetu Dhingra

Research Area: Digital Image Processing

31. Data Mining : Text Classification System for Classifying Abstracts of Research Papers

Text classification is the process of classifying documents into predefined categories based on their content.Text classification is the primary requirement of text retrieval systems,which retrieve texts in response to a user query, and text understanding systems, which transform text in some way such as producing summaries, answering questions or extracting data.We have proposed a Text Classification system for classifying abstract of different research papers. In this System we have extracted keywords using Porter Stemmer and Tokenizer. The word set is formed from the derived keywords using Association Rule and Apriori algorithm. The Probability of the word set is calculated using naive bayes classifier and then the new abstract inserted by the user is classified as belonging to one of the various classes. The accuracy of the system is found satisfactory. It requires less training data as compared to other classification system.

Published by: Shirdi Wazeed Baba, Reddi Sanjeev Kumar

Research Area: Data Science

32. Growth in Agricultural Resource USE: An Application of Exponential Growth Curve.

Agriculture is the means of livelihood for around two thirds of the work force of India. Agriculture is the production, processing, marketing and use of foods, fibers and bye prducts from plant crops and animals. It was the key development that led to the rise of human civilization with the husbandry of domesticated animals plants creating food surpluses that enabled the development of more densely populated and stratified societies. At the time of independence, the revenue from the agriculture sector was quite low compared to what it is today. The main reason for the increase in the revenue is the in crease in agricultural production that was brought about by the Green revolution, over the years, agriculture has emerged as one of the top priorities of the Central & state governments. In 2000, the government announced the first over “National Agriculture Policy”. The resources taken were consumption of fertilizers, consumption of electricity in agricultural sector, short term and long term credit, number of tractors, area under high yielding varieties, net irrigated and gross irrigated area and total cropped area. It was computed using the exponential trend equation i.e.: Y = abt Log Y = log a + t log b taking ^ b = (1+r) r = (b-1) x 100 Where Y = study variable; area, production, yield or Resource variables a = constant ^ b = regression coefficient t = time, t = 1 ……………n r = compound growth rate in percent To test the significance of the compound growth rates, t-test applied was t* = r/S.E( r) Where t* = calculated t-ratio, distributed with (n-2) degrees of freedom r = compound growth rate S.E. (r) = standard error of the compound growth rate, S.E. was calculated by fitting the following formula. 100 x b S.E. (r) = Σ (log y)2 (Σ log y)2 (log b )2 Σ ( t – t )2 Log 10e n (n-2) Σ (t – t )2 where the limit for Σ is, i = 1,2……n

Published by: Prince Singh, Dr Manjeet Jakha

Research Area: Mathematics

33. Hall Current Effects on Unsteady MHD Convective Flow of Heat Generating/Absorbing Fluid through Porous Medium in a Rotating Parallel Plate Channel

In this paper, we discussed the heat and mass transfer on the unsteady hydromagnetic convective flow of an incompressible viscous electrically conducting heat generating/absorbing fluid through porous medium in a rotating parallel plate channel under the influence of uniform transfer magnetic field normal to the channel taking Hall current effects into account. The momentum equation for the flow is governed by the Brinkman’s model. The analytical solutions for the velocity, temperature and concentration distributions are obtained by making use of regular perturbation technique. The variations of said quantities with different flow parameters are computed by using Mathematica Software and discussed with the help of plots. The skin friction, Nusselt number, and Sherwood number are also evaluated analytically and computationally discussed with reference to pertinent parameters in detail.

Published by: Dr. P. Sulochana

Research Area: Mathematics

34. k-Means Clustering based Lexicon Analytical Model for Multi-Source News Classification

The supervised models have been found more efficient for the purpose of news classification. The major goal of the news classification research is to improve the accuracy while decreasing the elapsed time. It is always difficult for the people to read all of the news on their favourites portal which have listed over the given portal. In this research, an approach is KNN lexicon technique which is used to obtain the popular news list from thousands or hundreds of online news available through APIs. This approach uses extraction summarization for summarizing the keywords thereby selecting the original sentences and putting it together into a new shorter text explaining the overall overview of the news data. Then the lexicon analysis would be performed over the given text data and then final classification of the news is done using k-nearest neighbor. The results would be obtained in the form of the parameters of accuracy, elapsed time, etc.

Published by: Kamaldeep kaur, Maninder Kaur

Research Area: Data Mining (News Classification)

35. A Study on Customer Attitude Towards Online Shopping in India and its Impact: With Special Reference to Solapur City

The growing no. of internet user in India provides a bright prospect for online shopping. If E-marketers know the key factors affecting the behavior of customers and its relationship, then they can formulate their marketing strategies to convert potential customers into loyal ones and retaining existing online customers. This researcher paper highlights on factors which online Indian customers keep in mind while shopping. After completion of study Researchers found that cognition, sensed usefulness, the comfort of use; sensed enjoyment and security are the five components which affect consumer perceptions about online purchasing. The Internet has changed the way consumers purchase goods and services at the same time many companies have started using the Internet with the objective of cutting marketing costs, thereby reducing the price of their product and service in order to stay ahead in highly competitive markets. Companies also use the Internet to convey, communicate and disseminate information to sell the product, to take feedback and also to conduct satisfaction surveys with customers. Customers use the Internet not only to purchase the product online but also to compare prices, product features and after sale service facilities they will receive if the purchase the product from a particular store. Many experts are optimistic about the prospect of online business.

Published by: Prof. Pritam P Kothari, Prof. Shivganga S. Maindargi

Research Area: Marketing

36. An Enhanced Image Descriptor Algorithm for Image Retrieval using SIFT - PCA

Due to the growth of internet and social media sites there has been a proliferation of images which makes image retrieval a challenging job. The proposed an Enhanced Image Descriptor Algorithm for Image Retrieval using SIFT-PCA involves three steps: feature detection (Harris Detector), feature description (SIFT), dimension reduction (PCA). The features of all images in database are retrieved and stored in feature database in the form of histogram. When a query image is given, the generated histogram of query image is matched with feature database of all image histograms and those images with minimum distance are retrieved. Euclidean distance is used as the distance measure. For analyzing the performance of the algorithm, average precision and recall are used. Precision is the measure of ability of a system to present all the relevant items and Recall is defined as the ability to present only relevant items.

Published by: Dr. R. Malini

Research Area: Pattern Recognition

Research Paper

37. Self- Confidence among Dyscalculic Elementary School Students of Shimla District

ABSTRACT The main objective of the present study is to compare the dyscalculic elementary school students on self- confidence in relation to their gender and locality. Null hypothesis were framed in regard to the objective. Investigator administered Self-Confidence Inventory, developed by Dr. Rekha Gupta (2013), to the sample of 60 dyscalculic school students of 8th class drawn from randomly selected schools of Shimla district. For the comparison of students on self-confidence 2x2 ANOVA was used. No significant differences existed among rural and urban dyscalculic elementary school boys and girls on self-confidence. .

Published by: Jeewan Jyoti

Research Area: Educational Research

38. Hybrid Image Compression using DCT and Fuzzy Logic

Abstract— Today there has been big advancement in digital technology that has led to the development of various easily usable devices and methods specially in the fields of communications and data transfer to a longer distances. The transmission of data in the form of documents, images, voice etc.is now reachable to all parts of the society and the services are affordable to a larger number of people. An important aspect is data compression and for that matter Image compression, as images form a larger part of data being exchanged over the internet through social networking and messaging sites and apps all over the world. Among all the various kinds of data images and videos constitute the bulkiest data. Thus, need for compressing the image and video files is an important aspect in data communication. In this research work we present a technique for image compression, using Discrete Cosine Transform and Fuzzy Logic Techniques. The algorithm used in this paper is tested along with several images and the results are compared with other techniques. Our method shows an improved performance both in compression ratio as well as image perceptibility.

Published by: Upendra Kumar Srivastav, Harikesh Pandey

Research Area: Image Processing

39. Intelligent Real Time Data Scan Module for Improved System Performance of Distributed Flight Test Instrumentation System Architecture

ABSTRACT—Configuring and designing on-board flight test instrumentation for a modern fighter aircraft is a real challenge. Flight Test Instrumentation (FTI) System has to acquire data from large number of sensors on aircraft. It demands distributed acquisition and centralized processing based flight test instrumentation as the sensors and data acquisition units are spread across large area of the aircraft. Acquisition of data in real time from large numbers of sensors, formatting minor frames as per telemetry standards, and real time data telemetry is a critical task as load on process is very high. This paper brings out a technique for relieving great extent processor load from processor participating to exchange the minor frame data and on-board storage data between remote acquisition unit (RAU) and data center (DACENT) with the help of Intelligent Real Time Data Scan Module(IRDSM). This paper also brings out the detail design approach adopted for IRDSM and significant performance improvement gained. Common design methodology adopted for DACENT and RAU are also brought out here. Self test capabilities of the module, component count reduction for better reliability, design of registry structure, process of screening at the module level for better reliability, extensive testing of modules with different configurations, etc, are also discussed. Issues encountered during the development phase are brought in this paper.

Published by: Madhusudana Rao Vanamala, Vijay V Patel, Prasad NNSSRK

Research Area: Distributed Computer Systems/Computational Intelligence

40. A Study on Adoption of M-Banking Services by Private Bank Customers in New Delhi

Internet is said to be the third most impactful revolution in the world after the agricultural and industrial revolution. The evolvement of internet had led to the dot-com burst which eventually transformed the traditional banking systems to systems like Automatic teller Machine(ATM), tele-banking, electronic fund transfer and m-banking. Technology plays a very essential role in delivering quality banking services and like any other technological innovation e-banking has also been adopted rapidly by various banks and customers. The boom of e-banking and smart phones has caused a huge shift from traditional banking habits to mobile app banking. This study explains how people living in New Delhi have adopted the mobile banking services provided by the private banks and it examines the factors which persuade the customers to use mobile app for banking. This study is helpful for both private as well as public banks as it gives an insight to what are the latest trends in m-banking and how people respond to it. How do people take mobile apps as a mode of banking service? Are customers more concerned about the ease-of-use or the risk attached with m-banking? Does difference in age group influence the customer’s m-banking behavior? The study is conducted with 200 private bank customers in New Delhi further categorized as customers already using mobile banking, customers using mobile apps for banking and customers currently not using mobile banking with age groups, using random sampling technique. The customers were surveyed with help of a structured questionnaire. Percentage method, averages, standard deviation, regression and correlation techniques have been used for data analysis.

Published by: Ms. Jasleen Rana

Research Area: Banking

41. Coping Strategies of Young Married Women in Banking Sector with Reference to Health and Family

Many researchers have been done on family work and health but only some of them suggested the strategies to be used by women to tackle these issues. Our paper provides an insight into the problems faced by the Indian married women working in private sector banks and the ways which can help them in solving these issues. This study examines the kinds of work, family and health conflict experienced by female married professionals working in private banks and the suggested strategies & solutions to cope up with the dichotomy. Balancing work and family tasks can put excessive stress on women, who in many families still take primary responsibility for childcare and elder care and end up suffering several health issues. How do such women bring a work-life balance? How do they cope up with the health issues they confront due to work pressure? Will the workplace of the future evolve for the better so that women won't have to worry anymore? Our paper aims at recommending the practices to deal with such complications. Work-life and health balance is a complete myth. But by making calculated choice about which prospect to pursue and which to turn down, rather than simply reacting to crisis, women can engage with work, family, and health. The study is conducted with 100 women professionals working in private sector banks of Delhi region categorized as newly married women and those with young kids across different levels in the hierarchical chain using random sampling method. Percentage, averages and Likert scale will be used for data analysis.

Published by: Ms Mugdha Sehgal, Pallavi Ahuja, Dr. J. K. Batra

Research Area: Management

42. Design of Gating System for Connecting Hinge by Traditional and Software Method

There is various metal casting parameters which are now know through various experiment which are quantified. These parameters should be controlled to improve quality of casted products. Metal casting involves design, gating and risering system design, mold design, pouring of molten metal each process has its own effects on quality of the casting. The flow of molten metal in mold accounts for almost 60% of the casting defects and due to this fact it is quite obvious that it is important to pay more and adequate attention on preparation of molds in such a way that molten metal will flow easily and fill the mould cavity properly. The molten metal is elastically deformable during short interval of time when deformation causes stresses remain in the molten metal and hence in the cast parts. After solidification these internal stresses remain in the metal. The change in temperature is the common cause of volumetric changes in the molten metal. The paper will focus more on study of gating system design since flow of the molten metal has significant effect due to this system. Design of this gating system reduces number of defects produced in casting. This system results compare in between traditional and software. On the commercial front if we look at prices trend charts of important foundry raw material we observe that there is consistent rise in prices and it is quite obvious that these will go on increasing since we have no control over market circumstances and forces. In this situation only alternative to remain competent and all foundries people to keep max control over all manufacturing processes and hence related parameters so as to ensure the quality in the process itself.

Published by: Ranjeet Mithari, Mahesh Shinge, Pravin Rajigare

Research Area: Engineering

43. Analysing of the Media and Public Tendencies in Twitter

Social networking services such as Twitter creates content reflecting a series of talks that appear in the real worldEvents. Twitter is a social networking site that provides service to a large number of users to communicate with each other at same time. That is asymmetrical relationship between friends and followers that provide dramatic structure of interest between Twitter users. A series of Twitter messages called tweets, which are limited to 140 characters, and thus are usually much focused. The basic process is the capture of Twitter tweets that extract most discussed topic in between users. Tweet this Dataset can be processed using standard natural language processing to search for trending stories. Common stories and erosion areso brick is extracting and summarizing information gathered from social networking services. There is the fact of Ways to find common stories that improve the quality of the result. This article proposes an application to detect themes of tendencies of the data that the BNgram Twitter disclosure rules use.

Published by: Mr. Ashish Laxman Gaikwad, Mr. Sumit Suresh Shendkar, Mr. Mahesh Tukaram Atpadkar

Research Area: Social Awareness

44. Medical Image Watermarking with Patient Details as Watermark

The Digital watermarking has been introduced for increasing the medical image security, confidentiality and integrity. The Medical image watermarking is a special sub-division of the image watermarking in the aspects that the images have some special requirements. The Medical image watermarking is an appropriate technique applied for increasing security and authentication of the medical data or information, which is very crucial and used for further diagnosis and future reference. This paper discusses the available medical image watermarking techniques for protecting and authenticating the medical data. The paper focuses on about the perceptual designing of the watermark for the digital images. The watermark designed perceptually is then embedded to the digital images in wavelet domain. A perceptual model is applied on to perceptually shape the watermark. This paper represents a primary study on the degradation of medical images when embedded with various watermarks, using a variety of the popular systems. The Image quality is measured with a number of widely used matrices, which have been used elsewhere in the image processing. The watermark before embedding can be compressed. This will lead to more secured and safely system. Also, it will take more effort to break the system. Consequently, the medical image watermarking remains an open field for the research and it appears that a selection of various watermarks for different medical image types is the most suitable solution to the generic problem.

Published by: Sumit Kumar Srivastava, Harikesh Pandey

Research Area: Image Processing

45. A Study on Investors’ Expectations on Mutual Funds Offered by Share Khan with Reference to Amravati City, Maharashtra

Mutual Funds is an investment funded by shareholders that trades I diversified holdings and is professionally managed by companies. In this paper researcher is focused to understand the investors’ expectations on mutual funds

Published by: Prajakta Yawalkar

Research Area: Finance

46. Gas Sensor Array for Quantitative Detection of Gas Mixture

Two semiconductor gas sensors which are sensitive to methanol and acetone were chosen to form a gas sensor array. Response of sensor array combined with pattern recognition technique of artificial neural network was used to carry out the quantitative analysis of gas concentration in a mixture. Separate gas is injected on gas sensor to understand the sensitivity of sensor upon change in gas concentration. Gas mixture of different acetone and methanol gas composition is prepared and response on sensor array is acquired. The acquired data is a function of concentration profile of gas mixture. Data is pre-processed and given to neural network for quantitative analysis of gas concentration of the mixture. The results show that the system can analyze the gas mixture and produce quantitative data with good accuracy.

Published by: Pauroosh Kaushal, Nirlipta R. Mohanty

Research Area: Gas sensor, pattern recognition.

Research Paper

47. Synthesis and Characterization of O-Alkyl ,O-Aryl and O-Cycloalkyl Trithiophosphato Derivatives of Lanthanum (III) Chloride and their Adduct with Nitrogen Donar Bases

Chloro lanthanu (III) trithiophosphates (RO)(S)(P)(S)2LaCl where R = Me,Et, nPr, iPr, nBu, sBu, iBu , iAm, cyclohexyl, Phenyl,were prepared in the methanolic solution of LaCl3 and dipotassium salt of trithiophosphates.Addition complexes of the type (RO)(S)(P)(S)2LaCl .nL(where n=1,L=(C6H4N)2 1-10-phenanthroline and (C5H4N)2 2,2 -bipyridyl were prepared by reaction of chloro Lanthanum (III) trithiophosphate and nitrogen donar bases in dry methanol . These newly synthesized derivatives have been characterized by elemental analysis, moleculer weight measurement, I R ,13C ,31P spectral studies. Coordination no of three and five are suggested for La (III) in these derivatives. Key Words : La(III) ; 1-10-phenanthroline ; 2,2 -bipyridyl Corrosponding Author;gkpahmad@gmail.com

Published by: Rafia Ahmad, U. N.Tripath

Research Area: Chemistry

48. Response of Jhelum Rice Variety to Different Crop Management Practices towards Morphological and Yield Parameters in Temperate Kashmir Valley

Field experiment were conducted to compare the System of Rice Intensification (SRI) Practices with the Conventional management Practices (CMPs) or farmers’ practices of rice (Oryza sativa L.) in context of Morphological and yield production parameters at district Kulgam of J& K(2016). The investigational variables included combinations of seedling number and age (10 day-old single vs. 21 day-old), spacing (25 x 25 cm vs. 20 x 10 cm), irrigation (intermittent irrigation vs. continuous flooding), and weed control (cono-weeding vs. manual weeding) however for both sets of methods, the organic manure (mixture with cow dung and straw) was applied along with chemical fertilizers at the same rate. The test was laid out in randomized factorial design. Highest grain yield (637.9 gm–2) were obtained from SRI practices (planting 10 days-old seedlings hill–1 at 25 x 25 cm spacing + intermittent irrigation and cono-weeding). Yield under CMP (planting 21 day-old single seedlings at 20 x 10 cm + continuous flooding and manual-weeding: 448.9gm-2) was lower than that of SRI practices. Thus the overall results indicated that all the cultivars under study performed better under SRI as compared to other traditional practices with respect to different morphological and yield traits including grain yield. All the cultivars exhibited increased leaf area, leaf area index and Crop Growth Rate (CGR) under SRI practice as compared to CMP cultivation practice.

Published by: Javaid Ahmad Wani, Dr. Amit Sharma

Research Area: Botany

49. Innovation of Mobile, Mobile Commerce and Mobile Apps as Disrupted the Businesses of Small Units

Mobile, Internet and Mobile Application has created a new market and new world of network which has eventually disrupts an existing traditional business market and given importance to internet through Mobile Apps to online Business. The electronic gadget, computer which was nothing better than a big calculator has taken over the entire business market and captured as electronic market through e-Commerce, eventually established itself to M-Commerce, Business on the Mobile gadget where consumer carry any time, any place and do business at any point of time. This created a huge platform to new market and ultimately eliminated the existing business. Purpose of the study says that Flipchart, Amazon, e-bay, BigBasket, these business houses are attracting the customer through online. Customer can shop from home at much cheaper rates could save even up to 80% discount rates with all kind of guarantee and warrantee with best quality and replacement assurance. An objective of research work is to “To assess the impact of mobile, Mobile Commerce and Mobile apps on business practices.”. The article expected to through the light on the disruptive innovation of Mobile, Mobile Commerce and Mobile Apps.

Published by: R. Parvathi, Dr. Veena Angadi, Gattamraju Sreelatha, Dr Gopala Krishana

Research Area: Commerce

50. Comparative Study of Manure Produced from Wastes

The blind use of fertilisers have made the soil dilapidated to such an extent that it would take 3 years of no cultivation and continuous fixing of minerals by organic methods, to convert the soil for the purpose of organic farming. Chemical fertilisers are like a drug to the soil, the more we use the more will be required. In order to bring a change and to make organic method more demanding and handy, a set of trials were done. The experiments were conducted inside the college campus using different type of manures, farm yard manure (made by cow dung straw and cow urine), garden manure (made by dry shredded leaves, kitchen waste and thrown flowers) and vermicompost (using Eisenia fetida earthworms) made by easy composting in normal pressure and temperature and were tested on mangifera indica (mango) plants. Significant effects were observed on the plant yield. The use of lactobacillus serum alone has increased the yield significantly. Field studies evaluated the use of leachate along with the green manure. The study was done on the optimum use of manure for the nutrition requirement of plant.

Published by: Gaurav Singh, Akhil Kumar Gupta, Divyank Tiwari, Matulya Mani

Research Area: Agriculture and Chemical Engineering

51. Digital Photo Sensor Able to Differentiate up to Three Light Intensity Bands and its Applications

This paper deals with the design of a module which can differentiate among three different light intensity ranges. This module uses two LDRs in such a configuration, so that they can collectively give the output which helps in differentiating among various light intensity ranges. The unique feature of the module is to differentiate among three different light intensity ranges which finds applications in the area like automatic plant irrigation system, automatic street light system, maintaining light at a particular intensity and further more.

Published by: Akash Verma, Hikmat Beig, Vijay Kumar Yadav, Vivek Singh

Research Area: Analog Electronics, Embedded System, Sensor

52. Review on: Heterogeneous Leach in 3-Dimensional Wireless Sensor Network using Gateway

Wireless Sensor Networks are those networks in which communication is carried out through a wireless channel. A sensor network is a group of specialized transducers intended to monitor and record conditions at diverse locations. These parameters are temperature, humidity, pressure, speed, intensity, vibration-sound intensity, PIV etc. Numbers of towers in area act as sensors are called as nodes in wireless sensor networks. Thus from one node to other, communication is carried out without any physical link. A network consists of numbers of nodes with one as a source and one as a destination. This paper proposed A-LEACH protocol and cluster member elect cluster head to avoid excessive energy consumption. Cluster Head is responsible for creating and manipulating a TDMA schedule & sending aggregated data from nodes to the BS where this data is needed using CDMA. Gateway is a network point that reduces the distance between CH and BS in WSNs. In this paper proposed a multiple hops data transmission and make energy efficient and energy conservative protocol design to increase data rate.

Published by: Vandana Jain, Amanpreet Singh Dhanoa

Research Area: Networking

53. Optimization, Analysis and Comparison of 4 and 16 bit Carry look Ahead Adders using 0.3μm Process Technology for SCMOS

- A method illustrated in this is to design carry look ahead adders using SCMOS technology, also analyzed the effect of various parameters on the characteristics of adders, using 50 nm, spice model for CMOS technology. The design was implemented for 16 bit and then extended for 32 bit also. Here parameters are computed and response curves are computed between all characteristics, DC and transient characteristics. The design and simulations are carried out to achieve these values approximately. Design will be carried out in Electric CAD and Xilinx. Simulation results are verified using Modelsim and LTSpice. The DRC, LVS/NCC, transient checks are performed in the proposed design. Noise analysis is also done. In comparison with the existing full adder designs, the present implementation will offer significant improvement in terms of frequency.

Published by: Ruchi Rai, Prof. L N Gahalod, Dr. Rita Jain

Research Area: VLSI

54. Impact of HR Practices on Employees Job Satisfaction

The aim of this paper is to bring out the impact of HR practices on employees job satisfaction. There are certain activities which are imperative for job satisfaction of employees policies like working environment, co-operation between departments, team work, retention, promotion policies, grievance handling etc. These all together gives the job satisfaction to the employees. If the employees are happy the productivity rate will definitely be high in other terms productivity will touch the sky and if the job satisfaction is not there then the organisation will definitely suffer. It is both management and employee’s responsibilities, and in their interest, to ensure that employees work in a positive atmosphere because relationship with the management can either maximize or minimize productivity and cause or prevent stress and fatigue.

Published by: Deepesh Kumar Yadav, Dr. Jaya Yadav

Research Area: Management

55. Brain Controlled Prosthetic Leg

The brain-controlled prosthetic leg involves the technique of using the brain waves to control the motion of a prosthetic leg. The brain waves are obtained using a device called Mindwave. This device captures the complex brainwaves through the analysis of electroencephalogram power spectrum. The brain signals are then further processed using an Arduino microcontroller which then drives the motors to control the motion of the prosthetic leg. Through this approach, the natural motion of human leg can be regained using prosthetics at a very low cost.

Published by: Manu R, Mithu Markose, Tonio P Thomas

Research Area: Biomedical Instrumentation

56. Detailed Modelling of Permanent Magnet Synchronous Motor (PMSM) for Electrical Forklifts part-IV Designing of Subsystem Model of PMSM Block

The research work deals with Detailed modelling of permanent magnet synchronous motor for electrical drives. In this paper we have discussed about mathematical modelling of PMSM for Electrical Forklifts designing aspects of subsystem model of PMSM Block of the Main model. Permanent magnets to replace the electromagnetic pole with windings requiring a less electric energy supply source resulted in compact dc machines. Likewise in synchronous machines, the conventional electromagnetic field poles in the rotor are replaced by the PM poles and by doing so the slip rings and brush assembly are dispensed. With the advent power semiconductor devices the replacement of the mechanical commutator with an electronic commutator in the form of an inverter was achieved. These two developments contributed to the development of PMSMs and Brushless dc machines. Due to many applications of PMSM like sensor less speed control, appropriate position control, Servo motor, etc. Mathematical modelling of permanent Magnet synchronous motor is carried out and simulated using MATLAB. The most important features of PMSM is its high efficiency given with the ratio of input

Published by: Aaditya Khare, Dr. Smita Shrivastava

Research Area: Electrical Machines

57. Comparative Study of Successive Factors of Residential and Commercial Project In Nashik

The findings of this study suggest the importance of the attractiveness of project location, level of contribution to business value, accuracy of cost estimation, level of innovativeness, and effectiveness of cost control for a successful real estate project. The applicability of the proposed model is tested on Nashik real estate projects and the results are found to be satisfactory. Real estate companies may benefit from the findings of the proposed model in assessing the performance of their projects and may take the necessary actions to achieve better success in their projects.

Published by: Pushkar S Kothawade, Mrs. Madhura Aher

Research Area: Management

58. Celebrities and Social Cause- Detailed Analysis of Importance of Choosing a Celebrity Followed by Pulse Polio Advertisement

The term Celebrity refers to an individual who is known to the public (actor, sports figure, entertainer, etc.) for his or her achievements in areas other than that of the product class endorsed (Friedman and Friedman, 1979).The objective of this research paper was to examine the celebrity endorsements impact on society as a whole, its positive and negative effects on the society. For achieving the objective of the study an empirical study was designed and for the collection of data questionnaire was used. To analyse data descriptive statistic and ANOVA test was used.

Published by: Radhika Wadhera

Research Area: Management

59. Applying the Fuzzy Critical Path Method to Manufacturing Tugboat

The critical path method is used to date in production operations whose outputs are relatively large complex end items such as highways, buildings, and ships. This paper considers Fuzzy Mathematical Model to find fuzzy critical path, fuzzy project duration in the network. All the activities in the network are represented by trapezoidal fuzzy numbers. Linear programming model is applied to find fuzzy critical path and fuzzy project duration in manufacturing Tugboat (Tugboat is a small ship that exercises vessels by pushing or towing). Finally practical applications shown with comparison.

Published by: K. Usha Madhuri, K. Chandan

Research Area: Operations Research

60. Project Success, It’s Performance Evaluation and Prediction for Transmission Construction Project

Existing studies tend to agree that there are links among certain key aspects of any project, their systematic enlisting and measurement and directional efforts to improve the performance of project. These aspects are selective and specific and if tracked in a systematic fashion along with necessary corrective action can not only measure any particular project’s performance but also indicate to the higher management in the organization about the approach to be changed in selective area so as to enhance the business success, in general and project’s success in specific. This seminar tends to study various aspects, present a checklist and track sheets along with comments to improve the transmission project’s performance. Transmission being critical activity and among the important services so as to serve the society’s electricity needs, are taken into consideration. A systematically addressed relationship among these criteria and that how these criteria affect the project success is the gist of this seminar. A sincere attempt is made for establishment of relationships of various factors affecting the project’s success and utilizing that relationship for making alert and guiding during project monitoring of Transmission Project. It is concluded that these aspects are not only important to improve project performances on quality, time, cost, and safety, but also critical to appropriately deal with transmission power projects’ externalities for achieving the objectives on project migration, ecological, social and environmental impacts. These results can help Project managers to better understand the relationship between the said aspects and project performance, and encourage them to optimize and take corrective actions for better project outcomes. With support of a case study of 400 KV substation (transmission) project‘s data collected and it has revealed strong correlations between various aspects and project performances.

Published by: Pankaj Purushottam Chandwadkar, Prof. R. V. Devalkar

Research Area: Construction Management

Research Paper

61. Novel Technique of Clustering based Reac-In Routing with Probabilistic Approach

The study shows that, to save energy and improve bandwidth efficient cluster-based topology, and scalability of the network, but difficult to balance the network after the running of the period of time, the remaining energy of all nodes. In addition, with increasing WSN sensor nodes, the path of the search space to increase exponentially therefore seek effective heuristic algorithm to solve the clustering and routing in WSN is very important. Probabilistic approach in Reac-In algorithm is a new kind of optimization algorithm, which draws on the principles of Iterative change the cluster size and cluster head by optimization method.(1) broad access to information at home and abroad, an overview of the wireless sensor networks and its characteristics, summed up the WSN routing features and design requirements, analysis of current major the strengths and weaknesses of the routing protocols, and pointed out that the current research hotspots and unresolved problems. (2) We were studied on how to dynamically determine the optimal number of clusters, to analyze the factors affecting the optimal number of clusters. Simulations results show that Reac-In improve the optimal number of clusters compared to the life cycle of the network to be extended. (3) considering the degree of energy balance remaining node residual energy and network energy consumption is proposed based on the right to non-linear decreasing Presented with energy inspired based the priority encoding PSO routing algorithm to reduce the probability of an invalid path and improve the reliability of the network routing to provide new ideas for WSN routing optimization.

Published by: Amandeep Kaur, Harpreet Kaur

Research Area: Wireless Network

62. Standardisation (Phytotoxicity) of Germination Media (Paper) for Mustard Seedling Evaluation

The standardization (Phytotoxicity) of germination media (Paper) is an important and essential aspect in seed industry (seed testing laboratory).The present work done on germination paper, which tested in our laboratory and showed good as well as bad results of germination papers. The germination papers accepted from consignee showed fluctuation in paper testing. We tested all the parameters regarding paper testing and also for germination testing. The paper sampled into 25 lots and tests were followed. Out of 25 lots seven lots failed to meet the standard parameter. The eighteen sampled lots meet to standard; hence the present study Revealed that to check the (Phytotoxicity) germination papers accepted from consignee before it use for germination.

Published by: Amol C. Vikhe

Research Area: Agriculture

63. Implementation of Anonymous and Secure Communication System with Group Signatures: A Review

For Privacy Preserving Communications Both Anonymity and end to end encryption mechanism is essential. Identity Based Encryption technique is best suitable for secure and anonymous communications. For solving anonymous and secure communication problems both cryptographic and IBE based protocols needed which governs the proper communication between two parties. For the purpose of authentication of the user proxy server is maintained between user and service providers. The GM and KGC are essential in anonymous communication for issuing both signing and decryption keys for getting plaintext from ciphertext in original form. Public key encryption and digital signature mechanism needed for guarantees of secure communication between both ends. Finally protocol realizes secure and anonymous communication between sender and receiver.

Published by: Vaibhav P. Thakare, Chetan J. Shelke

Research Area: Network Security

64. Structural and Vibrational Analysis of Wheel Rim

The purpose of the car wheel rim is to provide a firm base on which to fit the tyre. Its dimensions, shape should be suitable to satisfactorily accommodate the particular tyre required for the vehicle. In this a tyre of a car wheel rim belonging to the disc wheel category is considered. Design is an important industrial activity which influences the quality of the product. The wheel rim is designed by using modeling software CATIAv5R18.In modeling the time spent in producing the complex 3-D models and the risk involved in design and manufacturing process can be easily minimized. So the modeling of the wheel rim is made by using CATIA. Later this CATIA model is imported to ANSYS for analysis work. ANSYS software is the latest software used for simulating the different forces, pressure acting on the component and also for calculating and viewing the results. A solver mode in ANSYS software calculates the stresses, deflection, bending moments and their relations without manual interventions, reduces the time compared with the method of mathematical calculations by a human. ANSYS static analysis work is carried out by considering two different materials namely Aluminum Alloy and Structural steel and their relative performances have been observed respectively. In addition to this, rim is subjected to vibration analysis, a part of Dynamic Analysis is carried out and its performance is observed.

Published by: P. Dileepkumar, G. Ramesh, G. Suresh

Research Area: Mechanical Engineering

65. A Comparative Study of Gender and Youth between Rural and Urban

Objective: The purpose of the study is comparison of Rural and Urban Gender discrimination among the youths. Subjects and Method: For the purpose of study the subjects were one hundred, twenty (120), sixty (30+30=60) rural boys and girls from Belagatta, Madakaripura Sasalahatty villages of Chitradurga Taluk, sixty (30+30=60) urban boys and girls from Chitradurga town of Karnataka State. Between the age of 18 to 28 years were selected. The researcher had been selected the following groups at the village level literate, illiterate, hereditary job holders, traditionalists, caste, family, At the urban educated, migrants, unorganized workers, unemployed youths. The data was analyzed by applying independent t-test. The level of significance was set at 0.05.

Result: The results of this study show that the majority of the components are significantly higher in rural joint family group. The results of the study also indicate that the significant difference in exclusive on rural caste restricted to youths and migrants in urban. The urban youths are better than the rural youths.

Conclusion: In significant difference found in endurance and flexibility between rural and urban gender discrimination among the youths. And there were significant difference found in inequality treatment to boys and girls in rural society, But in urban some better treatment to both.

Published by: S. Ananda

Research Area: Gender Discrimination

66. Design of Steam Piping System for Dryers in Paper Machine and Checking its Sustainability through Finite Element Analysis using Caesar II

Process piping is a form of pipe work used to transport materials used in industrial processes and manufacturing. It is specially designed for particular applications to ensure that it will meet health and safety standards, in addition to suiting the needs of a given manufacturing process. The designer of the piping also has to consider issues like the amount of pressure the piping will be subjected to and the width of the piping, when selecting an appropriate construction material for longer life of system. In this project study, by using data like P & ID, 2-D and 3-D piping system is designed by following codes and standards. Finite element analysis is performed with the application of various loading cases to check sustainability of piping system in design service condition. The results of the study show that the primary and secondary stresses are within code allowable limits. Hence system is safe for stresses. Also nodal movements are shown in displacement summary report.

Published by: Mohammad Taseem Rafique Kadagaonkar, Milind S Yadav

Research Area: Process Piping

67. Characteristic Study and Enhancement of Mechanical Properties of Al2024 Gray Cast Iron Powder Reinforced MMC by Heat Treatment

It is proposed to study the mechanical properties of Al2024-gray cast iron composite with age hardening process and compared with as cast specimen. All heat treatment processes are carried out in atmospheric conditions. Al2024 is a reasonable choice as a matrix material to prepare MMCs owing to high strength (especially at elevated temperatures), toughness, and, in specific cases weld ability. Among different types of the recently formed composite materials, particle reinforced MMC and in particular aluminum as matrix material has found to have industrial applications. Gray cast iron powder reinforced aluminum 2024 composites possess a unique combination of high specific strength, high elastic modulus than the corresponding unreinforced matrix alloy system. By double stir casting method, Al2024 will be reinforced with gray cast iron powder. Heat treatment is given so as to tailor and improve the required mechanical properties as per the requirement. Gray cast iron is selected since it is believed to improve the hardness as well as the mach inability due to the presence of both iron carbide and free graphite in gray cast iron powder. Here three different proportion of gray cast iron composite are prepared by stir casting process. Age Hardening treatment is given to the samples with different percentage of gray C.I, and different properties such as microstructure, hardness and corrosion are compared with as cast Al2024- gray cast iron composite of respective composition. The possible outcomes maybe increase in mechanical properties by addition of gray cast iron.

Published by: Manikanta M, S. S. Sharma, Sathish Rao U

Research Area: Metal Matrix Composites

Review Paper

68. Review of VANET Security on Trust Base

In Trust based Networks, nodes are typically being controlled by realistic entities such as people. Trust based Network is aiming at enabling communication through highly heterogeneous networks by relying on dynamic nature of message transmission whenever there is arise in communication opportunities, such communication thus does not rely on a routing infrastructure and is peer-to-peer in nature. The delay-tolerant paradigm is akin to trust based networks, thus a suitable approach to address the lack of connectivity and the mobility. In this thesis we simulate attack and are monitoring the nodes by Particle swarm optimization, thus preventing the attack and which will lead to through put increase and overhead reduce.

Published by: Diljot Kaur, Simarjit Singh Malhi

Research Area: VANET

Review Paper

69. Review of VANET Routing in Opportunistic Environment

Vehicular Ad hoc Network (VANET) is based on principles of Mobile Ad hoc networks (MANET). It is a spontaneous process of data exchange from one node to another node. Vehicular networks comes with new promising field in wireless technology which is used to deploy a vehicle to vehicle communication (V2V) and vehicle to infrastructure (V2I) communication between nodes. In VANET routing main drawback is packet dropping, but it will be reduced by intelligent routing which can be optimized by met heuristics. In this thesis we proposed VANET based routing which depend on shortest path and social information, optimize by met heuristics.

Published by: Dhanveer Kaur, Harwant Singh Arri

Research Area: VANET

70. Risk Analysis in Construction Scheduling

Large and complex construction projects always face an uncertainty that leads to risks of delaying the project. Construction projects are of different sizes and of different nature and risk associated with them also vary. Schedules are very essential to the successful execution of projects. Without a schedule, it is difficult to coordinate the various activities found in a construction project. Most schedules are developed in a deterministic manner using Critical Path Method. Unfortunately, construction schedules are affected by various uncertainties. As a result, schedule delays are common in various construction projects. Therefore, it is important to find out probabilities of schedule delays. To evaluate the probability of construction time-overruns and Forecasting of appx. Accurate project completion date is a challenge to construction schedulers. Management of risks and uncertainties in construction projects is possible if risks have been identified and the potential impacts have been analyzed. The Critical Path Method (CPM), which is used to schedule construction activities, is deterministic with regard to the duration assigned to the execution of the activities and the results produced in certain values. Unfortunately, construction activities are performed under uncertain conditions. Project risks cause variations in activity duration, and in turn the entire network is affected by uncertainty. To evaluate construction networks by considering risk factors, nondeterministic scheduling methods such as the program evaluation and review technique (PERT), the probabilistic network evaluation technique (PNET), Critical Chain Scheduling (CCS), and Monte Carlo simulation (MCS) have been developed. In the present work, an attempt is made to study the effect of uncertainties in the project on the total duration of the project in an Indian context. For this, Monte Carlo simulation (MCS) technique is used. Effect of different distributions for different activities and the number of simulations on the total project duration are determined and compared with the CPM and PERT. Finally, sensitivity analysis is carried out to show the influence of each uncertain activity on the total project duration.

Published by: Musale Kunal Rajendra, Aher M. C.

Research Area: Construction Management (Civil Engineering)

71. Optimization of Cycle Time through Mastercam Virtual Simulation and Four Axis CNC Milling Machining Of Camshaft

In olden days, the complexity of fabricating the mechanical components is higher and time consuming. Manufacturing industries normally use conventional methods like casting and forging process to shape components and use CNC machines to achieve final dimensions within the required tolerance. The difficulty in making components can be minimized by introducing the techniques for reduced setup time reduced machining time for increase in productivity and increase in accuracy and surface finish as a result of using 5- axis CNC VMC milling machining setup. But prior to start machining, a virtual simulation of the entire operations is to be carried out to check, verify and rectify the occurrence of collision, and the application of suitable parameters to achieve reduced cycle time. And this virtual simulation can be carried out through Mastercam software. This paper is focused on 4-axis finishing process of camshaft using 5-axis CNC VMC milling machine. This work involves geometric modeling of camshaft using Solid Works software. The model is then imported to Mastercam software for applying different methods and parameters to simulate the tool. Then the suitable parameters having collision free and reduced cycle time is taken into account. Then, the NC program is generated using the required post processor and program is entered to the 5- axis CNC milling machine to perform both roughing process and finishing process. Material used is Aluminum Alloy 6061. As per the experimental results, it has been observed that constant overlap spiral tool path for top part machining is selected and high speed tool path is selected for bottom part 3- axis rough machining and rotary 4 axis tool path for final finishing ensuring collision free and reduced cycle time. The cycle time resulted by Mastercam software is less than the cycle time resulted by the 5 axis CNC VMC milling machine. Then, the total machining time of camshaft as per the profile were found to be 5.83 hours and 52 seconds.

Published by: Prasanth Navaneetham, V. G. Umasekar, Bibin Baby

Research Area: Mechanical Engineering

72. An Approach for Reduction in Power Consumption in Low Voltage Dropout Regulator

A low-dropout or LDO regulator is a DC linear voltage regulator which can control the output voltage even when the supply voltage is very close to the output voltage. The advantages of a low dropout voltage regulator include the absence of switching noise ( as no switching takes place), smaller device size ( as neither large inductors nor transformers are needed), and greater design simplicity (usually consists of a reference, an amplifier and a pass element). A significant adiabatic logic with 180 nm CMOS technology is proposed to reduce impact of power supply reductions well as a simple symmetric operational transconductance amplifier is used as the error amplifier (EA), with a current splitting method adopted to increase the gain and also improves the bandwidth of the LDO regulator.

Published by: Shivani. S. Tantarpale, Ms. Archana O. Vyas

Research Area: Electronics and Communication Engineering

73. Antibacterial and Antifungal Activity from Seed Extracts Of Peganum Harmala

The aim of the study was to determine the strong antimicrobial and antifungal activity from the extracts of Peganum Harmala plant species by solvent extraction procedure. P. harmala seeds extract contains several important alkaloids such an important Oxamide compound was used for this study. Extracted product was isolated, purified and identified by Thin Layer Chromatography, UV-VIS Spectroscopy, FT-IR Spectroscopy and 1H-NMR, 13C-NMR Spectroscopy. Finally, the isolated compound Oxamide activity was checked and proved through the Candida albicans, Klebsiella pneumonia and Pseudomonas aeruginosa with MIC studies.

Published by: Jayaprakash Chinnappan, Veeran Mohanraj

Research Area: Bioinformatics

74. A Review on Wireless Transport Layer Security

Wireless Application Protocol (WAP) is one of the technical standards for information over a mobile wireless network. Mobile devices such as mobile phones that use the protocol have a WAP browser as a web browser. WTLS (wireless transport layer security) inherited from TLS (Transport Layer Security). WTLS uses similar semantics adapted for a low bandwidth mobile device. As compared to TLS main changes are compressed data structures where possible packet sizes are reduced by using bit-fields, discarding redundancy and truncating some cryptographic elements. WTLS defines a compressed certificate format. This broadly follows the X.509 v3 certificate structure, but uses smaller data structures. Packet based design TLS is designed for use over a data stream. WTLS adapts that design to be more appropriate on a packet based network. WTLS design is based on a requirement that it be possible to use a packet network such as SMS as a data transport. There are number of WTLS security issues. WTLS processing more is fast as compared to using SSL. So it is suitable for wireless system. WTLS uses modern cryptography tools to enhance security. WTLS can provide different level of security for privacy, data integrity and authentications.

Published by: Chandan Sharma

Research Area: Wireless Transport Layer Security

75. Class Imbalance Problem in Data Mining using Probabilistic Approach

Class imbalance problem are raised when one class having maximum number of examples than other classes. The classical classifiers of balance datasets cannot deal with the class imbalance problem because they pay more attention to the majority class. The main drawback associated with it majority class is loss of important information. The Class imbalance problem is a difficult due to the amount and nature of data. This paper focuses different methods of class imbalance problem. It is been considered the majority class to achieve the class imbalanced problem. This paper mainly focuses the minority class sample to achieve the problem and proposed method for class imbalance problem using minority sample data. The oversampling and undersampling both concept were used to identify the correct class label of the sample using probabilistic approach, the main objective of this paper, to proposed method to minimize the misclassification rate of minority class sample, balance and classify the data more accurately thereby improving the performance of classifier.

Published by: Disha Gupta, Reetu Gupta, Prashant Khobragade

Research Area: Data Mining

76. Physicochemical Studies on Schiff Bases Derived from Substituted Coumarins with Substituted Diamines in Aqueous-Alcohol Medium

Schiff bases derived from substituted coumarins with substituted diamines were synthesized by cyclo-condensation. Proton-ligand ionization constants and metal-ligand stability constants at constant ionic strength in aqueous-alcohol medium (50/50% V/V) were evaluated using Irving-Rossotti method. The ligands exhibit pKa values around 11.5 due to the phenolic –OH group. The metal ligand stability constants with Cu (II), Co(II), Ni(II), Zn(II), Cd(II) and Hg(II) were also determined. The effects of substitutions on the stability constants were studied.

Published by: Uma Desai, Suresh

Research Area: Inorganic Chemistry

77. Improved Color Image Steganographic Technique in Transform Domain

Steganography is the process of embedding original message bits on some carrier file. The carrier file may be text file, image file, audio file or video file etc. If that carrier file is an image file, then that technique is called Image steganography [1]. If color image is used as a carrier file to embed data bits, then that type of steganography technique is called as color image steganography [7]. In this proposed work, embedding the original message bits in the transform domain of the carrier color image without considering the green plane, hence it is resulting in high quality stego image. Hence this technique is called as improved color image steganography technique in transform domain. Here in this paper, DCT (Discrete Cosine Transform) technique has been used.

Published by: K. S. Sadasiva Rao, Dr A. Damodaram

Research Area: Steganography

78. Effect of Varying Source Node, Relay Node and Mobility in MANET

In this paper the effect of entering different routing protocol in a network is analyzed. To analyze this effect number of nodes are vary from 25 to 65 nodes. In this paper the 25 nodes are move at low speed and 65 nodes are moving at high speed. To analyze this effect opnet modeler 14.5 is used. The performance is compared in terms of throughput, load and media access delay. Results show that when only aodv is used performance is good when other protocols enter into the network then performance decrease.

Published by: Lovepreet Singh, Pankaj Sharma, Puneet Jain

Research Area: Wireless

79. Effect of Interference of UMTS and WLAN during Handoff

In this paper the performance of WLAN is analyzed in the presences of UMTS nodes. To analyze this interference UMTS are nodes are moving using different trajectories. While moving UMTS nodes handoff (soft and hard) techniques are used in this paper. To analyze this effect OPNET modeler is used. The performance is compared In terms of load, media access delay and packet delay variation. The result shows that the performance of soft handoff is better than hard handoff.

Published by: Ramandeep Sethi, Pankaj Sharma, Puneet Jain

Research Area: Wireless

80. Machine Learning and SOA Based Building Management System

In order to attain energy saving with efficiency and supply good services automatically for users, the design of a sensible energy observance and management system using the Microsoft neural network and computationally non tolling formula is projected in this paper. By monitoring the ability consumption data, surroundings data and users’ scenario data, the system supported the design will calculate the proportion of wasted energy consumption supported the energy consumption data point, give sensible services based on the person-device interaction, and forecast the energy consumption supported the user energy consumption behaviors. The system is combined with cloud computing for data storage and processing. This document illustrates the propose and execution of the system structural design.

Published by: Sandhiya. B.

Research Area: Building Management System

81. Educational Data Mining: Recognizing and Forming Groups of Competent Students For Contests

Educational Data Mining is an area where in a combination of techniques such as data mining, machine Learning and statistics, is applied on educational data to get valuable information. The main objective is to recognize competent students based on marks are using clustering (X-means algorithm); then the subjects studied by them are classified into different categories and finally better combination of students as groups or teams are chosen to represent college for contests using association rules. To assess the performance of the proposed model, a student dataset of MCA from a college in Bangalore were collected for the study as a synthetic data. The accuracy of the results obtained from the proposed model was found to be promising. It was found from the study that 3 groups of 2 teams per group emerged as better combinations.

Published by: Ashok M V, Apoorva A, Dr. G Suganthi

Research Area: Data Mining

82. Phyto-Toxic Effect of Chromium of Cow Pea (Vigna Unguiculata (l.) Walp.)

A laboratory experiment was conducted to determine the phototoxic effect of [Chromium (Cr) Potassium dichromate (K2 Cr2 O7)] on seed germination and seedling growth of cow pea [Vigna unguiculata (L.) Walp.]. The seeds were treated under 5, 25, 50, 75, 100, 125 and 150 ppm of Cr concentration solutions individually. Each treatment was replicated thrice in a randomized block design. Observations were complete on Germination Percentage, Root and Shoot Length, Number of Leaves, Total Leaf Area, Fresh and Dry Weights of seedling. And Phytotoxicity, Tolerance Index, Vigour Index and pigments content such as Chlorophyll ‘a’, Chlorophyll ‘b’, Total Chlorophyll and carotenoid content of cow pea seedlings at 14th days of seedlings. Among the results gradual increase in Cr concentration under different treatments significantly leads to inhibition of seed germination and other growth parameters. Percentage of phytotoxicity showed an increasing trend with gradual increase in Cr concentration for the cow pea seedlings. Maximum inhibition in all growth parameters and pigments content were recorded.

Published by: K. Prakash, T. Ravimycin, P. Thamizhiniyan

Research Area: Biotechnology

83. A Term Paper on Uniform Civil Code

After 68 years of independence and claiming that India is a secular country, can help combat the misuse of personal laws for selfish purposes. From time to time Courts as well as politicians have laid the importance of the Uniform Civil Code but none of them has able to influence the law makers or the Legislative Assembly who is empowered to make laws regarding the same. Uniform Civil Code will not only ensure that there will be no person hiding behind the veil of religion and misusing personal laws for exploitation of women.It is interesting to note that in Goa there is Goa Civil Code, which is a uniform civil code in itself. It is followed since Portuguese time. Although there were chances to revoke the old law after the departure of Portugal but locals raised the voice against that decision. This is an indication that people are willing to accept uniform code regardless of religion

Published by: Asha Rani

Research Area: Law

84. Role of Twitter as a Digital News Engagement Resource for Political Awareness of Journalists in India

News on social media has outgrown television & radio news with instant update & feedback options; turning ‘passive audience’ into ‘active participants’ in the news making & news sharing process. Emergence of Twitter as a citizen engagement platform has been beneficial for journalists who use it for reading news & analyzing the latest Twitter trends as well as to acquire news worthy material for profitable news reporting. The paper foregrounds this dynamic function as well as critiques the role of Twitter as a participatory news resource for journalists’ engagement with respect to political news in the nation and across the world. Twitter has become the informative site with over 320 million Twitterati (PEW Report, 2015). The primary focus of this paper is to understand how Twitter has developed as the most used social networking site by the Journalists for accessing and sharing Political News and to explore the motivations of Journalists for using Twitter for the purpose of political news sharing and participation in news related discussions.

Published by: Subi Chaturvedi, Jaijit Bhattacharya

Research Area: New Media Technology, Political Communication and Social Media

85. Stress Management

Simply knowing the range of possible preventive stress management methods does not necessarily lead to effective prevention of distress. This chapter reviews preventive stress management programs (organizational/individual) and presents a framework for the implementation of such programs. At the organizational level, management training programs for all levels of management, organizational development activities, internal or external consultants, and ad hoc task forces can be useful in introducing preventive stress management activities. At the individual level, medical or health departments, stress management programs, fitness programs, and comprehensive health promotion programs can each be vehicles for bringing individual stress management techniques into the organization. Implementing preventive stress management in an organization requires (a) organizational stress diagnosis, (b) planning for prevention, (c) organizational and individual action, and (d) outcome evaluation. These functions form an iterative model for implementing preventive stress management that is intended to foster continuing growth and development of the organization and the individuals within it. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

Published by: Bh. L. Mohanraju, K. Neelima

Research Area: Management

86. Legal Education Need of Society

The study of article is to create legal awareness among individuals about their rights, duties, values, legal system. Legal awareness also help to promote consciousness of legal culture and rule of law and it empower the people to demand justice accountability and effective remedies at all levels. The article describes that law is the key to know our rights as we all are living in a democratic country where we all govern with rule of law so we should know the law of his country because ignorance of law is no excuse. The article shows that legal education is not only an instrument of social control but also as an instrument of social change.

Published by: Asha Rani

Research Area: Law

87. Re-Think on Critical Successful Factors of E-learning Implementation in India based Corporates

This paper provides an insight about the key factors that can be re-considered for implementing E-Learning in any of the India based Corporate towards its success by overcoming the failures, which can be accomplished by means of setting light to Employee’s Learning strategy (in other words, E-Learning:- Employees Learning in Corporate).

Published by: Shangeerthana G V, Chandrasekar K

Research Area: Management

88. Recharging of WSN Nodes based on Polling Mac Protocol for Lifetime Maximization and Reliability

Wireless sensor networks on energy received from radio frequency devices. Since the sensor nodes are always in the process of sensing, energy outage is the common phenomenon among them. In order to reduce this outage of energy, we have proposed Medium Access Control (MAC) protocol. This protocol follows round robin scheduling algorithm. The nodes which are on the verge of outage of energy send recharging request to the master node. During this process, the nodes which are in the way of master node and the requesting node they also hear and repeat the recharging request until the master node replies with a recharging pulse. The performance of the system is evaluated using a probabilistic energy expenditure model. Our results show that the protocol designed gives uninterrupted working networks despite of varying conditions.

Published by: Sunita .H. Bajaj, Samiksha .M. Bharne

Research Area: Wireless Networks

89. The Gateway Based Adaptive Gateway Discovery Scheme in Mobile Ad-hoc Network

From last two decades wireless networks are gaining popularity and have been widely used. Mobile adhoc network is a great solution to the current need of low-cost, on-demand, autonomous and infrastructure-less network which is highly portable, mobile and temporary in nature. To connect MANET to fixed network, any node in MANET should be configured as a gateway. Node that wants connectivity needs to discover present gateways in MANET. To reduce overhead, previous schemes tune Time to Live and/or Advertisement Interval of gateway advertisement packets based on total source nodes and/or mobility of nodes in MANET. As discussed in [4], it is also possible to consider number of gateways in MANET to adapt the discovery procedure. Proposed scheme does the same. It is found that the new scheme shows better results in terms of less routing overhead with same Delivery Ratio and End-to-End Delay, compared to proactive and hybrid gateway discovery schemes.

Published by: Ruchik N. Jani

Research Area: Mobile Adhoc Network

90. An Improved Hierarchical Clustering for Information Retrieval System

Now in these days the information need is increasing rapidly in our day to day life therefore a large number of users are accessing data from search engine. The search engines are composed with three major components user query interface, search algorithm and the ranking process. During search process the system evaluate the user input query and the database documents according to best fit documents are retrieved. The retrieved document is then ranked according to the user query relevance thus most near document of the user query is listed first. The available technique are provides the ranked listing of documents. In this presented work first the recently developed text document retrieval models are evaluated and then after a traditional model of document retrieval is enhanced with help of supervised classification technique. The proposed data model of the document search first finds the document’s word probability using the Bayesian classification approach then after the data is normalized to find the similar length of text document features. These document features are used to make training of neural network .The neural network processes the input training features and makes training for the documents pattern. This data model is used to predict the user input data patterns from the existing set of data. The implementation of the proposed technique is performed using the JAVA development technology after implementation of the desired document retrieval technique the performance of the system is estimated in terms of accuracy, error rate, memory consumption and the time consumption. According to the evaluated results the performance of the algorithm is found more optimum. Thus the given model is more adoptive as compared to the traditional approaches available.

Published by: Ila Shrivastava, Rahul Moriwal

Research Area: Computer Science & Engineering

91. An Insight into the Energy Efficiency based Image Compression on Handheld Devices

Transmission of facts like voice, textual content, photograph and video has many drawbacks like confined statistics degree of networks, noise in the channel, battery constraints of the gadgets and many others. This paper addresses the power and information degree drawbacks of pictures in digital conversation. The intention is to supply a comparison of the modern techniques supported the number of information within the snap shots, minimizing the strength needed for communication and also the obtainable transmission bandwidths. The fashions in comparison are the compression algorithms for mobile gadgets to cut back the transmission power of snap shots through wireless networks and adaptive facts codec for still photos so one can appreciably decrease the energy needed for Wi-Fi photograph communication. The rule is applied earlier than transmission images and is obvious to users. We will be predisposed to consequently use publically obtainable databases for our evaluation of power low-budget compression method.

Published by: M. Jyothirmai

Research Area: Image Processing