1. Personality Chaos in Select Novels of Anita Desai
Personality is the combination of behavior, emotion, motivation, and thought patterns that define an individual. Personality psychology attempts to study similarities and differences in these patterns among different people and groups. Anita Desai is one of the best-known famous women writers of Indian fiction in English. In her novels like “cry the peacock “and “where shall we go this summer “she presents the personality disorders of women characters. Personality also refers to the pattern of thoughts, feelings, social adjustments, and behaviors consistently exhibited over time that strongly influences one's expectations, self-perceptions, values, and attitudes. It also predicts human reactions to other people's, problems, and stress. Gordon Allport (1937) described two major ways to study personality: the nomothetic and the idiographic. Nomothetic psychology seeks general laws that can be applied to many different people, such as the principle of self-actualization or the trait of extraversion. Idiographic psychology is an attempt to understand the unique aspects of a particular individual.
Published by: Md. Nasreen Begum, Dr. K. B. Glory
Research Area: Indian Women Writings in English
2. Productivity of Batching Plant and Quality of Concrete Production
Ready mixed concrete (RMC) placing is a major on-going operation on construction projects in many countries. Evaluating the productivity of a ready mix concrete batch plant is one of the most challenging tasks of a plant manager and engineer, since it involves a lot of uncertainties, thus risks. Delivering ready-mixed concrete (RMC) efficiently to construction sites is a practical concern and one of the most challenging tasks for RMC batch managers. Batch plant managers must consider both time and order factors in order to set an RMC truck dispatch schedule that successfully balances batch plant (supplier) and construction site (customer) priorities. This project develops a transportation model to determine the solutions for RMC truck dispatch scheduling. The model takes into consideration uncertainties as well as unexpected situations such as truck breakdowns during delivery. This project is highlighting the study of Batching plant productivity without affecting the quality of concrete by prolonged recapitulation of various batching plants sites for the factors which could affect the output of subject batching plant and decry and predicament shooting of such factors in time. In this paper Past studies based on Productivity of batching plant is studied in detail.
Published by: Sudeshna Wawhal, Abhijit Warudkar
Research Area: Construction Management
3. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
The major aim of this paper is to solve the problem of multi-keyword ranked search over encrypted cloud data (MRSE) at the time of protecting exact method wise privacy in the cloud computing concept. Data holders are encouraged to outsource their difficult data management systems from local sites to the business public cloud for large flexibility and financial savings. However, for protecting data privacy, sensitive data have to be encrypted before outsourcing, which performs traditional data utilization based on plain text keyword search. As a result, allowing an encrypted cloud data search service is of supreme significance. In view of a large number of data users and documents in the cloud, it is essential to permit several keywords in the search demand and return documents in the order of their appropriate to these keywords. The similar mechanism on searchable encryption makes center on single keyword search or Boolean keyword search and rarely sort the search results. In the middle of various multi-keyword semantics, deciding the well-organized similarity measure of “coordinate matching,” it means that as many matches as possible, to capture the appropriate data documents to the search query. Particularly, we consider “inner product similarity” i.e., a number of query keywords show in a document, to quantitatively estimate such match measure that document to the search query. Through the index construction, every document is connected with a binary vector as a sub-index where each bit characterize whether matching keyword is contained in the document. The search query is also illustrated as a binary vector where each bit means whether the corresponding keyword appears in this search request, so the matched one could be exactly measured by the inner product of the query vector with the data vector. On the other hand, directly outsourcing the data vector or the query vector will break the index privacy or the search privacy. The vector space model facilitates to offer enough search accuracy, and the DES encryption allows users to occupy in the ranking while the popularity of computing work is done on the server side by the process only on cipher text. As a consequence, data leakage can be eradicated and data security is guaranteed.
Published by: Arati Deshmukh, Dr. S. T. Singh, Prof. P. B. Sahane
Research Area: Parallel and Distributed Systems
4. A Cost-Effective Prototype Software Solution with Sample Administration for Fund Utilization in Waste Management Administration Using MATLAB-GUI
In the context of “SwachhSarvekshan”, the concept of waste management plays a very significant role in achieving the vision and mission of “Swachh Bharat Abhiyan”, the clean mission of India. Waste, on one hand, can become a factor undesirable, on the other and the most important angle can contribute significantly to the national income as it has the potential to become a great source of income if put to use through recycling and reusing. The present research paper focusing on domestic waste highlights the software solution that was designed using MATLAB-GUI for using in accounting for revenues or losses generated during the administration of waste management, particularly at the municipality level. Considering nine modules with nine parameters as one for each module, the software formulated assists in the calculation of revenues generated out of recycled and reused waste, in a flash of a moment. The software will also provide a solution for re-planning the process of re-usage of waste if any discrepancy is found between the budget amount and the actual costs incurred. The cumbersome managerial issues hitherto involved in various administrative processes for waste management find an easy electronic solution in the software designed in the current research paper.
Published by: Ms. Renuka, Dr. Radhakumari Challa
Research Area: Software Solution
5. An Improved Energy Aware Trust Derivation Scheme using Game Theoretic Approach
In wireless sensor networks (WSN) trust plays a very important role, which is one of the most popular network technologies for the Internet of Things (IoT). The efficiency of the trust evaluation process is largely comprised by the trust derivation, as it influences the overhead in the process, and performance of WSNs is particularly sensitive to overhead due to the limited bandwidth and power. This paper extends the previous work of energy aware trust derivation scheme using game theoretic approach, by increasing the overall trust derivation process and improving the energy consumption which manages overhead while maintaining adequate security of WSNs. A risk strategy model is first demonstrated to stimulate WSN nodes’ cooperation. Then, a game theoretic approach to secure report reading and trust derivation algorithm is applied to improve the overhead of the process. We show with the help of simulations that our improvement in the overall trust derivation scheme can achieve both intended security and high efficiency suitable for WSN-based IOT networks.
Published by: Abhijit M. Mandape, Mrs. Sayali S. Mane
Research Area: Wireless Sensor Networks
6. Simulation of Diagnosing and Protecting the Boost Converter Circuit from Open Circuit and Short Circuit Switch Fault
Diagnosing Fault in a DC-DC converter is important to prevent the damage of converter. The objective of the paper is diagnosing the fault occurred and preventing the damaging of the converter. This Paper deals with the simulation of open and short circuit switch fault analysis in the DC-DC Converter using MatLab Simulink. The converter used here is Boost Converter which is also known as Step Up Converter. The faults are created here by the external circuit and it is cleared using a closed loop control ant the corresponding waveforms are studied. The results of simulations are compared with theoretical results. A Simulink model is developed and it is successfully used for fault diagnosis.
Published by: N. KamalaKannan, A. ArulVizhi, B. Balaji
Research Area: Power Electronics
7. A Novel Approach for Building Low Cost Automatic Gear Shifter
In this study, a gear shifting mechanism was designed and applied to make the shifting process faster and less difficult for the driver. This device provides a solution towards the difficulty in operating gears in manual transmission cars. This system incorporates an electromechanical system which can be attached to the existing gear shifter without altering the existing system and also provides an option to use the existing manual shifting as such according to the desire of the driver. The system consists of an efficient control system using Arduino Mega microcontroller which controls the motion of the existing gear sticks and clutch position. It uses a Grove electromagnet to adjust the gear lever position with the change in speed along with a DC motor arrangement to control the motion of the clutch pedal. The system also includes a PID control mechanism to determine the gear stick motion and also to optimize the performance of the car at varying driving conditions.
Published by: Manu R
Research Area: Control Engineering
8. Implementation of Six Sigma in Indian Manufacturing Industries
Six Sigma is the concept of improving the quality by reducing process variations, making continuous improvements, reducing defect rates and improving the processes. The Definitions & Concepts of Six Sigma have been changing since its evolution as per the requirements of time & market conditions. Initially, the concept of Six Sigma focused on defect reduction, then on cost reduction along with value addition and now on value creation, improving the process capability making the process more reliable along with reducing eight wastes of industry & improving the competitiveness of a product with least possible costs incurred on it. This study presents the literature review of the works already done in the field of Six Sigma Implementation by the various authors till now. The findings of this paper will be the basis of my further research in this field by developing appropriate research methodology needed to achieve the objectives set by me for my research work.
Published by: Mr. Mohit Chhikara, Dr. M. S. Narwal, Mr. Pradeep Dahiya
Research Area: Industrial Engineering
9. Building a Micro-ATM for Financial Inclusion and Rural Banking
In current scenario especially in rural areas banks and MFI’s are gathering client’s information manually in the record book and it’s not cost effective to install ATM’s everywhere, so we develop a micro-ATM which can be used to perform all financial transactions. The main advantage of this is we can overcome the delay factor and moreover in earlier practices there were no authentication procedures with the help of biometric we can gain the higher level of authorization. With this approach we can reduce the usage of paper and automation of work can be gained. The application built on this micro-ATM is commercially available but we are developing and contributing to open source platform.
Published by: Shreyank M. Byadagi
Research Area: Computer Science and Mobile Application
10. A Cross Sectional Study for Evaluation of Association between Hypertensive Retinopathy with Serum Lipid Profile in Patients of Essential Hypertension in Rural Hospital.
To evaluate the role of serum lipid profile on fundus changes in hypertensive patients and to correlate the grades of hypertensive retinopathy with components of lipid profile. Material and method: A cross-sectional prospective study was carried out in 100 patients attending the Ophthalmology department who were diagnosed to have systemic hypertension. The stage of hypertension was classified according to JNC 7 criteria. Patients suffering from diabetes, myopia, having hazy media and other posterior segment disorders and giving consent were excluded from the study. Their detailed ophthalmological examination was carried out and also their evaluation by the physician was done. All the patients were investigated for fasting serum lipid profile done by endpoint method using a spectrophotometer. Fasting was for 8 hours. Hypertensive fundus changes were evaluated using the Keith – Wagener, and Barker (KWB) Classification. Discussion: Out of 100 patients with essential hypertension, 70 (70%) had retinopathy and the remaining 30 (30%) patients had no retinopathy. Mean age having retinopathy was 63 years. All patients having hypertension for more than 10 years had retinopathy. The severity of hypertension correlated well with severity of retinopathy in our study (p< 0.0009). No sex preponderance toward developing retinopathy was found (p< 0.58). A positive correlation of hypertensive retinopathy was found with total cholesterol(p<0.0001), low-density lipoprotein (LDL)-cholesterol (p<0.0001), serum triglycerides(p<0.0001), and a low density lipoprotein: high-density lipoprotein(LDL:HDL) ratio(p<0.0008). Conclusion: This study helps to assess the association between hypertensive retinopathy in patients with essential hypertension with an altered serum lipid profile, with the aim of preserving vision.
Published by: Dr. Madhumita Prasad, Dr. Sachin Daigavane
Research Area: Hypertensive Retinopathy
11. An Epidemiological Investigation of Dengue Outbreak in Shri Muktsar Sahib District, Punjab, India 2012.
Dengue is a serious and worldwide spreading illness caused by the mosquito Aedes aegypti bite. Seasonal variation in dengue outbreak has been noticed by many years and it is a systematically increase. The study was designed to apply district epidemiological field that is time, place and person. With the other epidemiological determinant including finding the etiology behind dengue outbreak. Data was collected at Shri Muktsar sahib with the reported cases of dengue at Guru Gobind Singh Medical College including the convenient sampling technique with total enumeration. Case confirmation was done by serological examination for dengue fever. Out of 812 reported cases, 399 were positive for dengue. Dengue outbreak caused higher morbidity which might have resulted in morbidity and fatality of dengue fever in district At that point the situation was turned into the outbreak. It has been seen at Shri Muktsar Sahib District, from being a sporadic illness, outbreaks of dengue have now become a regular occurrence. The reason behind this outbreak is water storage and improper sanitation.
Published by: Suman Lata, Gurmeet Singh, Sarita Dubey
Research Area: Epidemiology, Public Health
12. Studies on Optical Properties of ZnS Thin Film by Thermal Evaporation Technique
The most significant process for optical coating is the variant of vacuum deposition. Zinc sulfide having direct and large band gap which is use in optoelectronics. By using ZnS material in thermal evaporation technique and characterizing the minimum reflectance and maximum transmittance in visible wavelength and energy gap increases with increasing thickness having direct and large band gap. When ZnS thin films doped with the similar material then the transmission band can be widened in IR region. On this method, we make many applications over IR windows and scintillation detectors and other electronic devices.
Published by: Harish Kumar D C, Dr. H M Mahesh
Research Area: Thin Film Technology
13. ICT in Teaching English Language in Rural Government Schools
The paper aims to bring an awareness of using technology in teaching the English language to the primary and secondary school students - especially to the rural Government school students- use, utilization, and result of using Digital Language Laboratory in Rural Government Schools are discussed.
Published by: K. Vijayalakshmi
Research Area: English Language Teaching
14. England In Tamil Nadu- An Innovation for Quality Teaching and Learning English Language
This paper aims to introduce the innovative methodology of imparting quality in teaching the English Language- model village which reflects an air of English and creates an interest in the language learners- especially at the school level. The author has done a research and has achieved the aim, introducing this methodology in the Rural government Schools of Tamilnadu.
Published by: K. Vijayalakshmi
Research Area: English Language Teaching
15. Enhanced False Coloring in Medical Image Processing
Our study on false coloring encompasses its technological value in the medical application. The extensive features of MATLAB have been utilized via its false coloring. The X-Ray medical images carry a number of overlapping attributes which in one sight is not clearly like bones, ligaments, muscles, tissues and etc. Greyscale has a number of similar variations and our eye can able to map things with corresponding colors. With the use of false coloring images, we can track such attributes and can able to plot the histogram and stats. Entropy and PSNR are taken as mandatory parameters which are in fact preliminary to evaluate the image’s processing level by level.
Published by: Aditya Sharma, Maninder Kaur
Research Area: Image Processing
16. Another Way to Deal with Research Privacy in the Iot: Threats and Assaults on Iot and its Solutions
The IoT (Internet of Things) is an example to envision the interconnection and collaboration of shrewd gadgets over the present and future Internet foundation. The IoT is the development of the Internet to cover this present reality, empowering numerous new administrations that will enhance individuals' regular day to day existences organizations and make structures and transport more quick witted. The IoT in a gathering of a common world, so as to group different associated objects in light of an order was beforehand proposed. The IoT is a perplexing framework that we partition in four sections (objects, transport, stockpiling, and interfaces). It needs security. The question and its interconnected framework are encompassed with different gadgets that can get to be section focuses or focuses of assaults. The proposed paper examines the security issues in the IoT.
Published by: Mr. Zishan Ali I. Dakhani, Mr. Mujamil M. Dakhani
Research Area: Assults and Threats using IoT Concept
17. Low Cost Solar Powered Smart Management System for Indian Farming
This paper shows the investigation and use of solar energy based farming system for farmers. Solar energy is the most abundant source of non-conventional energy in the universe. Solar power is not only the solution to today’s energy crisis but also an eco-friendly form of energy. Solar cells are an excellent approach for utilizing the solar energy. Solar panels (an array of photovoltaic cells) are now a day extremely utilized for street solar lights, for empowering water heaters and to run different household loads. The costs of solar panels are decreasing day by day which encourages its usage in various sectors. One of the applications of this technology is used in an irrigation systems solar powered irrigation system can be a suitable alternative for farmers in the present state of the energy crisis in India. Farmers are also facing the change in temperature during the whole day. So it is very much essential to maintain the temperature for proper farming. In the same way humidity and moisture control is also necessary for proper farming. To control these challenges, the investigator has designed a new farming system using Arduino microcontroller.
Published by: Nirdosh Kumar, Mrs. Shimi S.L
Research Area: Electrical Engineering
18. Smart Farming System for Indian Farmers using Arduino based Technology
This work aims at developing an entirely automated plant/crop watering system. The main motivation behind this system is to conserve the wastage of water and to effectively manage the amount of watering of the plants. It also aims at reducing human labor, effort, and errors due to human negligence. It uses solar panels to provide power to the system at daytime. Solar energy is used to run the system during daytime and charge the batteries to operate at night. It uses moisture sensors to sense the level of moisture in the soil. When the moisture content of the soil goes below a certain limit for a plant/crop, the pump system is triggered and the plant/crop is watered. The plants are watered efficiently till the desired value is reached and the pump is switched off automatically.
Published by: Nirdosh Kumar, Mrs. Shimi S. L
Research Area: Electrical Engineering
19. Accessing Social Networking Sites using Semantic Web
The popularity of Social Networking Sites (SNSs) has revolutionized human interaction. Social Networking Sites are meant for people to have a social connection with other people with similar interests. A social networking site creates network communication among the user community. It stores user information which can be used for reaching people of similar interest. Though social networking site serves for communication purposes among special interest groups, they do not have a searching option where we can search people or group with certain features. A person can be searched only if we know the name of the person. Here we present a method using Semantic Web to represent and process social network information so that user queries can be better answered. This paper addresses some of the current limitations of accessing social network data and the semantic approach to overcome those limitations.
Published by: Aamir Junaid Ahmad, Sabina Priyadarshini
Research Area: Semantic Web
20. DWT based Invisible Watermarking on Images
The imaging technology is being enhanced day by day, there are a lot of possibilities of reproduction and manipulation of digital data such as digital image, digital audio, and digital video, hence a strong digital copyright mechanism must be produced in place. So the protection of digital data content from unauthorized users and the problem of copyright management plays a very vital role. The Digital watermarking is being used to protect and save the data of researchers and to keep secret information inside a signal which cannot be easily detected by unauthorized person or users. The digital watermarking is a field of data hiding which hide the crucial information or data in the original data for protecting illegal duplication and to restrict disturbance of multimedia data. This research paper presents a survey on the digital image watermarking techniques. The outputs of various digital image watermarking methods have been compared on the basis of the results. A digital watermarking can be described as a stream of bits embedded in a digital file that offers features such as IPM (Intellectual Property Management) and proof of authority of ownership. The digital watermarking has two basic ideas - first is content protection and second is the copyright management. There are various methods to hide information inside an image, audio/video, document etc. But the Image Steganography has its own importance and is most popular among the others. This paper gives a review of various techniques such as image domain and transformation domain algorithms available for implementing Image Steganography. In this paper, an overview of some Digital Watermarking methods is discussed such as Discrete Cosine transform (DCT) and Digital Wavelet Transform (DWT) and its purpose, techniques, limitations and applications.
Published by: Rashmi Srivastava
Research Area: Computer Science
21. Mitigation of Inrush Current of Transformer using Voltage Sag Compensator
In the power system voltage sag become the important issue for industries. According to the survey, 92% of the interruptions at industrial installations are voltage sag related. In various companies voltage, sag may affect many manufacturers and introduce sufficient losses in the power system. The voltage sag compensator, based on a transformer coupled series connected voltage source inverter, is the most cost-effective solution against voltage sags. A transformer inrush may occur at the start of sag compensator. This over current may damage the inrush protection of the series connected inverter and the transformer output voltage is greatly reduced due to the magnetic saturation. When the compensator restores the load voltage, the flux linkage will be driven to the level of magnetic saturation and severe inrush current occurs. This paper proposes a new technique for mitigating the inrush of the coupling transformer and preserving the output voltage for effective sag compensation.
Published by: Raj Kumari, Prof. Sanjay Jain, Prof. Sanjay Gothwal
Research Area: Transformer Current
22. Triangular Fractal Patch Antenna with Triple Band for Wireless Applications
Recent technology demands multiple band antennas with miniaturized size. Application of Fractals or Fractional geometries to antenna design is a successful approach. The reason behind is the capability of adjusting into compact areas. In this paper, Triangular Fractal (TF), operating between 2-11 GHz. The proposed antenna with the rectangular ground plane is modeled and simulated with Finite Element Method (FEM) based High-Frequency Structure Simulator (HFSS) and an improvement in performance parameters (Return loss, Bandwidth (BW) and VSWR) is observed with change in design parameters. The proposed antenna is suitable for application in Wi-Fi, terrestrial data links and WLAN etc.
Published by: Shmile, Pankaj Sharma, Puneet Jain
Research Area: Antenna
23. Humidity Sensing Device for Soil, Atmosphere and Other Material with Temperature Intuit
In today’s smart world where the man is rapidly proceeding towards development or advancement of various aspects, considering each and every point of possibility for the resulting outcome, we are forced as well as curious to measure quantities surrounding us. Therefore, we came up with an idea of significant relevance to measure and determine important quantities of physics namely temperature, humidity, and physical moisture. The necessity of measurement of the above parameters in various fields like construction, industries, space and research compelled us to design this instrument with huge dedication. Its simultaneous measurement of all three quantities namely temperature, humidity and moisture make it an outstanding instrument in the industry as well as households.
Published by: Mr. Jawwad Khizar Patel, Mr. Mohammed Abdul Moyeed, Mr. Syed Ahmed Zayaanuddin, Mr. Mohammed, Mr. S. V Altaf
Research Area: Electronics
24. Strategic Memory Alzheimer’s Rehabilitation Training (Smart) Memory Program: Temporary Improvement For Mci/Vci Via Systematic Novel Cognitive Exercise
Dementia is a growing worldwide phenomenon, impacting more than six million people in the United States. Despite its high projected prevalence, it is a significantly under-represented phenomenon, with estimates ranging from 15-25% of the general population. The effect of the aging of the population and significant increase in life expectancy has combined to catapult dementia into the range of one of most alarming healthcare problems. The SMART Memory Program is a cognitive intervention designed to help promote the reduction of mild cognitive impairment (MCI) and early-stage dementia. Although it has been found useful in all forms of dementia, it is particularly useful in amnestic-type MCI. A longitudinal study examined 356 clients (220 females, all amnestic-type MCI) across an approximate two-year span. Results revealed an improvement of approximately 3 MoCA points at the conclusion of a program session. Particular improvements were noted in delayed recall. These results were found to be particularly beneficial secondary to the advent of the Kirtan Kriya methodology.
Published by: Dr. John W. DenBoer, Dharma Singh Khalsa
Research Area: Clinical Neuropsychology
25. Case study: Climatic Changes in Three Major Cities
Climate change refers to changes in modern climate, including the rise in average surface temperature. Using the obtained meteorological data such as temperature, wind & precipitation and comparing satellite images of these 3 cities, shows an increase in average temperature and decrease in precipitation over the years, it also shows a rapid decrease in green cover in all three cities. Human activities such as deforestation and exploitation of other natural resources are one of the leading causes of the rapid changes in climate and its effects over the past century. To get a general idea of the people’s perception of all this, a survey was conducted by us and the statistics of the survey is analyzed.
Published by: Anirudh Itagi
Research Area: Climate Change
26. Bioprospecting of Neem for Antimicrobial Activity against Soil Microbes
The Present studies were carried to evaluate the antimicrobial activity against soil microbes which causes corrosion on buried metal in acidic mediated soil by agar well diffusion using aqueous and ethanol extract of Neem leaves. These plants were subjected to solvent extraction with water and ethanol on increasing the polarity to identify and isolate the antimicrobial active materials. Crude aqueous extract of Neem has significantly inhibited the important microbes which causing corrosion such as S. Aureus, Streptococcus, B. Subtitles, Lactobacillus, Proteus, Corynebacterium, Pseudomonas, A.niger, Mucor and Desulphovibro sp. Results of the present studies investigation suggest that Neem is important effective plant for further work on isolating and characterizing of antimicrobial active materials.
Published by: R. Prasanna
Research Area: Biotechnology
27. An Intelligent Scientific Workflows Failure Prediction Model using Ensemble Learning Technique
Cloud computing is a distributed computing paradigm which is considered as the computing platform that is going to be the pioneering field for the next ten years. Apart from several industrial, business applications being deployed, this paradigm is additionally attracting several scientific communities to utilize the services of the cloud for running massive scale knowledge and computation intensive applications like a montage, that is employed in astronomy. workflow is defined as a group of task and dependencies between the tasks that are used for expressing numerous scientific applications. The main issue in running these workflow applications is mapping the tasks of the workflow to an appropriate resource in the cloud environment. Scheduling these workflows in a computing environment. To overcome these failures, the workflow scheduling system should be fault tolerant. The fault tolerance by using replication and resubmission of tasks supported the priority of the tasks. The replication of tasks depends on a heuristic metric that is calculated by finding the trade-off between the replication issue and resubmission issue. As scientific workflows scale to many thousands of distinct tasks, failures because of the software package and hardware faults become progressively common. We study job failure models for data collected from different scientific applications, by our proposed framework. In particular, we show that the Ensemble Learning classifier can accurately predict the failure probability of jobs. Failure prediction models have been implemented through machine learning approaches and evaluated performance metrics. The models allow us to predict job failures for a given execution resource and then use these failure predictions for two higher-level goals: (1) to suggest a better job assignment, and (2) to provide quantitative feedback to the workflow component developer about the robustness of their application codes.
Published by: Parminderjeet Kaur
Research Area: Cloud Computing
28. Establish the Value Stream Mapping for Lead Time Evaluation by Lean Concept
Toyota started practicing TPS (Toyota Production System) since 1950 successfully. Due to the success of TPS, Many companies across the world started using the same. Later in the 1990s. M. Womack and Jones gave the name it as a lean manufacturing. Lean manufacturing is now one of the most powerful manufacturing systems in the Competitive world. Numerous organizations around the world have implemented and adopted it to enhance their productivity through reduction and elimination of Waste. This project report is on understanding and implementation of one of the Lean tools which are; Value Stream Mapping, for Directional Control Valve in Bosch Rexroth (India) Pvt. Ltd. – Sanand Plant, Ahmedabad. Value Stream Mapping is a lean tool to identify the value added and non-value added activity during the production. Using this, identify the Waste and removing it along the processes which are based on the principle of Bosch Production System. (TPS – Toyota Production System) This intends the checking of the Inventory level during the process of Manufacturing and Assembling of the products.
Published by: Nirali Pandya, Ketan Dhruv, Pratik Kikani, Dr. G. D Acharya
Research Area: Mechanical Engineering
29. Short Comings of Present Education System and How to Make It Employment Oriented
The aim of any education system is to provide inclusive quality education and learning opportunities for all which ensures that a learner is eventually transformed into a good human being imbibed with moral and ethical values and is equipped with adequate employment skills (self-employment or job). In addition, the individual attains good communication skills imbibed with logical reasoning power and analytical powers so that his intellectual ability is not confined to his own field but can be used in any situation and in any field. Thus as a useful member of society, this pass out student, is ready to contribute to Gross National Income through any sector- agriculture, manufacturing, service or the education sector itself. However, the present system of education is not fulfilling the aim of education as enumerated in the first paragraph above. The pass out students of the present education system is not employment ready. The present examination system, which basically tests the cramming capabilities of students, is not appropriate to evaluate the skills/ knowledge acquired by the students. This paper discusses shortcomings of present education system and the changes that should be brought which will ensure that a learner eventually turns out as good human being imbibed with moral and ethical values and is equipped with adequate employment skills (self-employment or job) - thus ready to contribute to Gross National Income through any sector- agriculture, manufacturing, service or the education sector itself.
Published by: Col H. R. Ruhil
Research Area: Education
30. Adaptive Packet Filtering Techniques for Linux Firewall
Packet filtering techniques play an important role in many of network devices such as firewalls, IPSec Gateways. Firewall plays an important role in safeguarding any system from any external attacks to the system. It can be used to safeguard hosts as well as networks. This research focuses on studying the performance impact and the sensitivity of the Linux firewall (IP tables) also improve by using this research. And these are improving to become fast. A firewall designed in Linux, the user can edit the source code and change it depending on the security requirements for the LAN. At any time one can configure the firewall to encrypt, to decrypt, accept, deny, or proxy all packets that are being sent between any two systems depending on the rules. On the basis of this, the user can be blocked or given access to a network using a good tree algorithm. There are two approaches for the filtering, first by using the early rejection of unwanted flows without impacting other flows significantly. Second, we present a new packet filtering optimization technique that uses adaptive statistical search trees to utilize important traffic characteristics and minimize the average packet matching time. The proposed techniques timely adapt to changes in the traffic conditions by performing simple calculations for optimizing the search data structure. The proposed techniques can significantly minimize the packet filtering time with reasonable memory space requirements.
Published by: Atul J. Jayant, Prajakta S. Tambade, Sanjay Kadam
Research Area: Security
31. Measurment of Density and Specific Heat Capacity of Different Nanofluids
In the study, the paper shows measurement of density and specific heat capacity of different nanofluids. A temperature range of 30°C to 50 °C for a few molecule volume concentrations is displayed. The particular heat estimations of three nanofluids containing aluminum oxide, zinc oxide, and silicon dioxide nanoparticles. The work has been done at various temperature range 313K to 353K (30 to 80°C) with differing distinctive volume concentration (1%,2%3%,4%). which is the typical scope of operation of car coolants and building heating fluids. The measured qualities are contrasted and existing conditions for the particular heat of Nanofluids. In this manner, again broad connection was produced for the particular heat as elements of particle volumetric, temperature, and the particular heat of both the molecule and the base liquid from the present arrangement of estimations. The effect of nanoparticle connection was tried for both CUO also, Al2O3, ZNO in a eutectic blend of sodium and potassium nitrate. Results demonstrated an improvement in particular heat limit (CP) for both kinds of nanoparticles.
Published by: P. Madhu, P. G. Rajasekhar
Research Area: Mechanical Engineering
32. Software Defect Prediction Using Support Vector Machine
Developing a defect free software system is very difficult and most of the time there are some unknown bugs or unforeseen deficiencies even in software projects where the principles of the software development methodologies were applied carefully. Due to some defective software modules, the maintenance phase of software projects could become really painful for the users and costly for the enterprises. In previous work, original data was taken with 21 features and 21 features are having high dimension features which increase the complexity of processing. Ignored the boundary decision for software default predictor because boundary condition is not detected by the previously used classifier. Features of compaction were not considered because of that information is overlapped and the prediction error is increased. They are not able to train the component based classifier which results in more prediction error.
Published by: Ramandeep Kaur, Harpreet Kaur
Research Area: Software Engineering
33. Convex Optimization Based Adaptive PID Controller in CSTR Plant
PID control is an important ingredient of a distributed control system. The controllers are also embedded in many special purpose control systems. PID control is often combined with logic, sequential functions, selectors, and simple function blocks to build the complicated automation systems used for energy production, transportation, and manufacturing. Many sophisticated control strategies, such as model predictive control, are also organized hierarchically. PID control is used at the lowest level; the multivariable controller gives the set points to the controllers at the lower level. The PID controller can thus be said to be the “bread and butter’ of control engineering. It is an important component in every control engineer’s tool box. PID controllers have survived many changes in technology, from mechanics and pneumatics to microprocessors via electronic tubes, transistors, integrated circuits. The microprocessor has had a dramatic influence on the PID controller
Published by: Chanda Thakur, Navdeep Batish
Research Area: Control System
34. Anti M-Fuzzy Subring and its Lower Level M-Subrings
In this paper, we introduce the concept of an anti M-fuzzy subring of an M-ring and lower level subset of an anti M-fuzzy subring and discussed some of its properties.
Published by: Nanthini. S. P., Munirathinam .C.
Research Area: Algebric Topology
35. A Laboratory Study on Use of Waste Glass Powder as Partial Replacement of Cement in Concrete Production
The Role of Cement Industry in India is significant in the economic development of the country. The cement industry in India is one of the oldest sectors in India. The industry is driven by the immense growth in the housing sector, the infrastructure development, and construction of transportation systems. Indian Cement Industry is the second largest cement producer in the world after China with a total capacity of 151.2 Million Tonnes (MT). The government of India has been giving an immense boost to various infrastructure projects, housing facilities and road networks, the cement industry in India is currently growing at an enviable pace. In the coming years, more growth in the Indian cement industry is expected to come. Efforts are being done to develop some alternative material for cement production using the waste material. The waste glass powder is one such alternative. As glass is nonbiodegradable so it will also help in solving glass related environmental problems. This study was conducted to investigate the effect of using waste glass powder in cement. Laboratory work was conducted to determine the performance of control sample and cement with used waste glass powder. The performance of these types of cement was determined by the Consistency test, Soundness test, Setting time test and Compressive strength test. The Consistency test of cement is determined using Vicat apparatus. Meanwhile, compressive strength test is done to determine the strength of cement. For each type of cement sample, a total of six 70.6mm x 70.6mm x 70.6mm cubes were cast. The cubes were tested at the ages of 7 and 28 days to study the development of compressive strength. The results indicate that the cement with using waste glass powder was able to increase the compressive strength.
Published by: Sombir, Parveen Berwal
Research Area: Transportation Engineering
36. Bioprospecting of Hibiscus Rosasinensis for Antimicrobial Activity against Soil Microbes
The present investigation was carried out about the evaluation of antimicrobial activity against corrosion causing soil microbes on buried elements in acidified mediated soil by Agar disc diffusion method using Aqueous and Ethanol extract of Hibiscus rosa Sinensis leaves. This plant was subjected to solvent extraction with water and ethanol on increasing the polarity to identify and isolate the antimicrobial active materials. Crude aqueous and ethanol extract of Hibiscus has significantly inhibited the important microbes which causing corrosion such as S.aureus, Streptococcus, B. subtitles, Lactobacillus, Proteus, Corynebacterium, Pseudomonas, A.niger, Mucor and Desulphovibro sp. Results of the present studies investigation suggest that Hibiscus are the important effective plant for further work on isolating and characterizing of antimicrobial active materials.
Published by: R. Prasanna
Research Area: Biotechnology
37. 3D Printed Device and Method for Converting Air into the Water through Condensation
Exemplary embodiments of the present disclosure are directed towards a system for converting the air into the water through condensation comprising a condensation unit comprising, one of the fans and a condenser coil wherein, the water vapor is condensed for providing drinkable water; an auto cooling fan configured to cool down the condenser’s heated portion configured to maintain a predetermined heating point; a water collector configured to collect the condensed water vapor from the condensation unit through a connected funnel; a sensors module configured to sense at least one of temperature, cooling, and heating point details, water filtration details, humidity, dew point and voltage details; a display unit configured to display at least one of humidity, cooling temperature, heating temperature, flux, dew point, sensors details and its status of working; a power filter and converter module configured to reduce the noise and the distortion in the current, wherein the voltage may be converted according to the compatibility; and a relays module configured to switch at least on of a UV lamp, a cooling unit, and a fan.
Published by: Jawwad Khizar Patel
Research Area: Electronics and Computer Science
38. Online Blood Bank Using Cloud Computing
As we all know the Working of Blood Bank Management System. A blood bank is a cache or bank of blood or blood components, gathered as a result of blood donation or collection, stored and preserved for later use in blood transfusion. The main aim of this project is to save lives of people by providing blood online using technology. Our project Online Blood Bank system using Cloud Computing is developed so that users can view the information of nearby donors, hospitals, blood banks. This project is developed by three perspectives i.e. hospital, blood bank, and patient/donor. We have provided security for authenticated user as a new user have to register according to their type of perspective and existing user have to log in. While registering, to check whether the donor is giving correct information about his blood group we will ask the donor to upload his/ her license or any government id proof on which blood group is mentioned. This project requires an internet connection. We are using the android application to find a nearby donor and to select the nearby hospital online instantly by tracing its location using GPS. We are also proving an alert system for severe accidents as using that function an ambulance will be sent to your destination without any wastage of time. Notification regarding blood donation camps, health check-up drives etc. in the area will also be sent to the registered users. This application reduces the time to a greater extent that is searching for the required blood through blood banks and hospitals. Thus this application provides the required information in less time and also helps in quicker decision making. It basically bridges the gap between donor and the receiver. It provides better blood management and storage.
Published by: Sagar Shrinivas Vasaikar, Vijay Suresh Yennam, Krupa Manoj Patel, Prof. Trupti Shah
Research Area: Cloud Computing
39. An Application of Multi Objective Programming Techniques: A Case Study Of South India (Andhra Pradesh, Karnataka)
In India and abroad, the commonly used decision modeling in real life rests on the assumption that the decision maker seeks to optimize a well-defined single objective using traditional mathematics programming approach. A farmer may be interested in maximizing his cash income, with a certain emphasis on risk minimization. On the other, at county level especially in a developing country, a planner may aspire for a plan while maximizes food grains production and also to some extent considers employment maximization etc as the goals. Keeping in view the objectives of the study, state-wise secondary data on different variables for the period 1980-81 to 2014-15 were collected from Statistical Abstracts of Punjab, Fertilizer Statistics, Agricultural Statistics at a glance and the reports of the Commission for Agricultural Costs and Prices, published by Ministry of Agriculture By taking its deviations of observed Yt from its estimated value we got the error or the risk coefficients for each year for each crop. These risk coefficients were taken in the matrix formulation in the MOTAD format suggested by Hazell (1971 a and b). To give a meaningful explanation to the level of risk, total mean absolute deviations in gross returns were derived as under: Min A = 1/S Σ│ (chj-gj) xj│ Where A is the minimum average absolute deviation defined as the mean over (h=1………s) years, of the sum of the deviations of gross returns (chj) from the trend in gross returns (gj) multiplied by activity levels x j (j = 1………n). Where A is an unbiased estimator of the population mean absolute income deviation Where A = estimated mean absolute deviation S = no. of years chj = gross returns of the jth activity in hth year gj = sample mean of gross returns of jth activity x j = activity level This was minimized subject to the following constraints: Σaij xj ≤ bi (for all i = 1………….m, j =1……..n) Total activity requirements for the i th constraint, the sum of the unit activity requirements aij for the constraint i times the activity levels ‘xj‘do not exceed the level of the i th constraint bi for all ‘i’ and x j 0 all activity levels are non-negative. Where a ij = per unit technical requirement for the jth activity of the ith resource = the ith resource constraint level m = no. of constraints n = no. of activities
Published by: Prince Singh, Seema Manchanda
Research Area: Mathematics
40. An Application Of Multi Objective Programming Techniques: A Case Study of Central India (Uttar Pradesh, Madhya Pradesh, Rajasthan)
In India and abroad, the commonly used decision modeling in real life rests on the assumption that the decision maker seeks to optimize a well-defined single objective using traditional mathematics programming approach. A farmer may be interested in maximizing his cash income, with certain emphasis on risk minimization. On the other at county level especially in a developing country a planner may aspire for a plan while maximizes food grains production and also to some extent considers employment maximization etc as the goals. Keeping in view the objectives of the study, state-wise secondary data on different variables for the period 1980-81 to 2014-15 were collected from Statistical Abstracts of Punjab, Fertilizer Statistics, Agricultural Statistics at a glance and the reports of the Commission for Agricultural Costs and Prices, published by Ministry of Agriculture By taking its deviations of observed Yt from its estimated value we got the error or the risk coefficients for each year for each crop. These risk coefficients were taken in the matrix formulation in the MOTAD format suggested by Hazell (1971 a and b). To give a meaningful explanation to the level of risk, total mean absolute deviations in gross returns were derived as under: Min A = 1/S Σ│ (chj-gj) xj│ Where A is the minimum average absolute deviation defined as the mean over (h=1………s) years, of the sum of the deviations of gross returns (chj) from the trend in gross returns (gj) multiplied by activity levels x j (j = 1………n). Where A is an unbiased estimator of the population mean absolute income deviation Where A = estimated mean absolute deviation S = no. of years chj = gross returns of the jth activity in hth year gj = sample mean of gross returns of jth activity x j = activity level This was minimized subject to the following constraints: Σaij xj ≤ bi (for all i = 1………….m, j =1……..n) Total activity requirements for the i th constraint, the sum of the unit activity requirements aij for the constraint i times the activity levels ‘xj‘do not exceed the level of the i th constraint bi for all ‘i’ and x j 0 all activity levels are non negative. Where a ij = per unit technical requirement for the jth activity of the ith resource. bi = the ith resource constraint level m = no. of constraints n = no. of activities.
Published by: Prince Singh, Dr. Seema Manchanda
Research Area: Mathematics
41. Human Face Detection using Fusion Technique
Nowadays face detection and recognition has become an important tool for identification in industry, Educational institutes, verifying websites, hosting images and social networking site. Face Recognition is nothing but Features such as eyes, nose, lips etc. are extracted from a face, these features are processed and compared with similarly processed faces present in the database. If a face is recognized it is known or the system may show a similar face existing in a database else it is an unknown face. In proposed system, an input image can be taken as a static image or by capturing an image. The system is trying to improve efficiency. The system is using ANN (Artificial Neural Network) and Euclidean Distance Measure is working collaboratively for detection of the face. Over here, features are been marked using ELBP (Elliptical local binary pattern) using specific values. Facial features such as forehead, eyes, nose, lips and cheeks. The system basically converts RGB values of features to HSV (Hue saturation value) and stores this HSV values. These HSV values are compared with the feature values of HSV which are stored in databases and if these values are matched with the database face image values then the face is detected otherwise it is not detected. These features distances are calculated using Euclidean distance algorithm. For improving the efficiency OCA (Optimized comparison algorithm) plays an important role as in OCA two features are taken for comparison with the database image. Two features lips and cheeks are taken into consideration and it is compared with the all the database image. Whatever images have got is further compared with the optimized database and finally, face is recognized otherwise user not found message will be printed. Also for real time application live streaming is facilitated in the system for recognition and continuous processing is done. This way system facilitates to efficiently recognize the faces and also helps to improve the accuracy of the system.
Published by: Rupali Balasaheb Pawar, Deepak Dharrao, Priya Pise
Research Area: Image Processing
42. Anatomical Variations of Nose and Para-Nasal Sinuses: CT Scan review in South Gujarat
To identify frequency and characters of anatomic variations in paranasal sinuses in computed tomography scan of paranasal sinuses. Methods: The retrospective study was conducted at the SSG Hospital, Baroda, and comprised computed tomography scans of 75 patients who had presented between December 2016 and January 2017. The scans were reviewed for the presence of deviated nasal septum, paradoxical middle turbinate, Haller cell, Onodi cell, and pneumatization of the middle turbinate and uncinate process. Results: The mean age of the patients was 32±13.15 years. The most frequent variant being the deviated nasal septum 32 (63%) and the middle nasal Concha 16 (22%). Conclusion: Computed tomography is excellent means of providing anatomical information of paranasal sinuses considering the wide range of variations in the anatomy, each and every para-nasal sinus case should be planned individually and carefully to avoid dreadful complications and maximize patients’ benefit. Keywords: Anatomic variations, Para-nasal sinuses, deviated nasal septum, Concha bullosa.
Published by: Dr. Abhishek S, Dr. Bhavtik Kapadia, Dr. Nandakishore G. Patil, Dr. Girbide Shubhangi
Research Area: Medical
43. Analyse the Mechanical Properties of Metakaolin Using As a Partial Replacement of Cement in Concrete
Cement concrete is the most extensively used construction material. Maintenance and repair of concrete structures is a growing problem involving significant expenditure. As a result carried out worldwide, it has been made possible to process the material to satisfy more stringent performance requirements, especially long–term durability. HPC is the latest development in concrete. It has become very popular and is being used in many prestigious projects such as Nuclear power projects, flyovers multi-storeyed buildings. When using HPC, the addition of supplementary materials in cement has dramatically increased along with the development of concrete industry, due to the consideration of cost saving, energy saving, environmental concerns both in terms of damage caused by the extraction of raw materials and carbon dioxide emission during cement manufacture have brought pressures to reduce cement consumption. Metakaolin looks to be a promising supplementary cementitious material for high-performance concrete. Properties of concrete with metakaolin are mostly preferred additives in high-performance concrete. A possible lower cost, due to large availability in our country itself may be advantages to metakaolin usage in HPC. The substitution proportion of metakaolin is to be used was 5%, 10%, 15%, and 20% by the weight of cement. To make this cubes and cylinders to determine the strength and durability of concrete of it. The results indicate that the replacing mix up to till the last percent has to note and effect on strength in comparing with mixer without metakaolin.
Published by: M. Narmatha, Dr. T Felixkala
Research Area: Concrete Materials
44. Automated UI & UX Framework
A consistent UI leaves an overall impression on user’s psychology, aesthetics and taste. Human–computer interaction (HCI) is the study of how humans interact with computer systems. Many disciplines contribute to HCI, including computer science, psychology, ergonomics, engineering, and graphic design. HCI is a broad term that covers all aspects of the way in which people interact with computers. In their daily lives, people are coming into contact with an increasing number of computer-based technologies. Some of these computer systems, such as personal computers, we use directly. We come into contact with other systems less directly — for example, we have all seen cashiers use laser scanners and digital cash registers when we shop. We have taken the same but inextensible line and made more solid justified by linking with other scientific pillars and concluded some of the best holistic base work for future innovations. It is done by inspecting various theories of Colour, Shape, Wave, Fonts, Design language and other miscellaneous theories in detail.
Published by: Karamvir Singh Rajpal, Maninder Kaur
Research Area: Computer Science & Engineering
45. Urban Voids - Reclaiming Urban Space
Existences of public spaces in cities are essentials for social interactions to take place, fostering the creation of sustainable, safe and livable cities. Although public spaces are often designed for certain activities, the existence of unplanned spaces and urban voids throughout the city offers an abundance of opportunities. This paper attempts to focus on the concept of urban voids (leftover spaces), identifying and analyzing the type of void that has a great potential for turning into public spaces through placemaking process. Space beneath the flyovers or bridges, the dead parking lots or nonreciprocal street edges are the spaces which are neglected and invisible to the citizens and therefore take away city experimental qualities, thus the attempt is to unearth the potentials of these spaces in context to built environment and surroundings at urban scale and prepare placemaking toolkit for using these spaces as a strategy to increase the public realm.
Published by: Keshav Rathi, Neelam Kushwah
Research Area: Architecture
46. Vendor TPM Implementation at Indian Automobile Electrical and Electronics Components Manufacturing Organization
In this era of intense competition, supplier management holds key importance as it is not only important from cost management i.e. inventory management, reliability, India .fa faster delivery to customers Flash Electronics India Pvt.Ltd.is leading Tier 1 supplier of Automobile electrical and electrical components for Bajaj Auto Ltd, Volkswagen India Ltd, General Motors India Ltd, DeIndia.It adopted TPM as strategic Initiative for achieving manufacturing excellence.It has was awarded “BAL TPM EXCELLENCE’ Award. As a part of Journey towards excellence, FEIPL adopted a new initiative of Implementing TPM at vendors end.In this Paper, we will discuss Framework of vendor TPM and results obtained for a pilot lot.
Published by: Rohit Parab, Ajaykumar A. Ambike
Research Area: Mechanical Engineering
47. An Experimental study on Strength Behavior of Steel Fiber, Glass Fiber with Fly Ash and Rice Husk Ash
Hybrid fiber-reinforced concrete is a composite material consisting of mixtures of cement, fine aggregate, coarse aggregate, steel fiber and glass fiber. The hybrid fiber reinforced concrete exhibits better fatigue strength and increased static and dynamic tensile strength. In this project, the strength of fiber reinforced concrete was investigated with partial replacement of cement with rice husk ash and fly ash. Steel fiber and glass fiber was added in the order of 0.25%, 0.5% and 0.75% by volume of concrete and 0.25%, 0.5% and 0.75% by weight of cement. Rice Husk Ash was used to replace ordinary Portland cement by 20% and fly ash 20% by weight of cement proportion.
Published by: Athira Omanakuttan
Research Area: Replacement
48. Clinical Profile of Patients of Ocular Injuries
To study clinical profile of ocular trauma in a tertiary care center. Material and method: A Cross -sectional descriptive study was carried out in 50 patients of ocular injuries presenting to the OPD of Ophthalmology and emergency to evaluate the predisposing factors, etiology, and clinical presentation. A detailed history was taken which include the complete history of the mishap, the nature, and circumstances of the injury occupation. Complete details of ophthalmic examination include visual profile, an anterior segment with the help of slit lamp biomicroscopy, fundus examination with +90D examination and indirect ophthalmoscopy and x-ray and Ultrasonography was done. RESULTS: Males (86.8%) outnumbered females (13.2%) and children (<16 years) constituted 46.8% of the total affected population which mostly occurred at home. The majority of the cases comprised of monocular trauma (89%). The cause of injury were road traffic accidents, sports playing & recreational activities and occupational in 32.7%, 25.5%, and 20% respectively. Closed globe injuries were found to be more common accounting for 66.6% than open globe injuries, which accounted for 26.6%. CONCLUSION: Simple measures such as education regarding the use of protective eyewear could possibly significantly decrease this preventable cause of visual disability.
Published by: Dr. Sabita Kumari, Dr. S. Daigavane
Research Area: Medical
49. Novel approach for IDS Classification Support vector machine and adaptive boost
we perform three sets of experiments. From the first experiment, the systems are trained using all the 41 features. The second experiment where we perform feature selection by using Gain Ratio as to select the best features instead of using all the 41 features and perform the experiment with Linear SVM, SGD and Adaptive Boost and compare the results. The third experiment where we perform feature extraction by using Gain Ratio as to select the best features instead of using all the 41 features and perform the experiment with Linear SVM, SGD and Adaptive Boost and compare the results.
Published by: Aanchal Kumar, Jaspreet Kaur, Inderpreet Kaur
Research Area: Security
50. Multi Bank System
The project title is “Multi Banking System” the system interface is targeted to the future banking solution for the users who is having multiple bank accounts in multiple banks. This interface integrates all existing banks and provides business solutions for both retail and corporate. Multi-bank system is an innovative .Net web application. The main focus of the application is maintaining multiple bank accounts a user has. A person can have bank account in any number of banks. But it’s hard to remember every bank logins. So we have developed a web application where a person can handle all his bank accounts in a secure manner.
Published by: A. Anitha, R. Abirami, V. Vaneeswari
Research Area: Computer Science
51. Study of Adsorption Impact of Wood Ash and Fly Ash on Spent Wash Quality for Irrigation Purpose
Adsorption treatment of distillery spent wash has great potential as a sustainable method as it is a low-cost method. The aim of this investigation is to study the treatment method for purification of distillery spent wash by using Fly ash and Wood ash. For this, the study comprising evaluation of reduction of various physical-chemical parameters (Color, Odor, pH, COD, TS, TDS, Ca, Mg, Na, and K) of distillery spent wash was checked by passing through the columns of Fly ash and Wood ash. The distillery effluent was acidic (pH 4.7) and dark brown in color which often cause psychological fear in farmers for utilization. Fly ash treatment of spent wash exhibited a good reduction in COD, TS, TDS, Mg, Na, Ca, after 72-hour treatment and increase in pH toward pH 7 followed by Fly ash + Wood ash (1:1).
Published by: Bharat Kumar, Arun Upreti, Prashant Singh Rawat, Sakshi Rana
Research Area: Environmental Earth Science
52. Medical Tumour Image Segmentation by BAT Optimization
In the field of medical images, automatic segmentation of ROI region accuracy plays the most important role. For tumor segmentation, a network should be optimized with precise weights for the respective features. Till yet researchers used many features like intensity and area with various optimization techniques. Accuracy mostly depends upon the features. It is directly proportional to the number of features. Our proposed algorithm going to use energy feature like LESH with BAT colony optimization to enhances the optimization problem for weights. The proposed work will include all the features of time and spatial domain so is more sensitive to optimize the weights in spite of using only time domain features.
Published by: Nagampreet kaur, Natasha sharma
Research Area: Image Processing
53. Novel Approach Of Diabetes Disease Classification By Support Vector Machine With RBF Kernel
Early diagnosis of any disease with less cost is always preferable. Diabetes is one such disease. It has become the fourth leading cause of death in developed countries and is also reaching epidemic proportions in many developing and newly industrialized nations. Diabetes leads to increase in the risks of developing kidney disease, blindness, nerve damage, blood vessel damage and heart disease also. In this research work, Support Vector Machine with RBF Kernel is used for finding out the classification accuracy of diabetes dataset. In the given method, the advance algorithm of SVM-RBF kernel is used; it contains some of the extended parameters for feature selection as well as the proposed correlation with SVM method obtains on UCI dataset. In this work, investigation is done on automatic approach to diagnose diabetes disease based on Support vector machine with RBF kernel and MLP (Multilayer perceptrons). The concept of data mining is used, in which the proposed SVM-RBF method obtains 88% accuracy on UCI diabetes dataset, which is better than other models.
Published by: Preeti Verma, Inderpreet Kaur, Jaspreet Kaur
Research Area: Machine Learning
54. Evaluation of Antioxidant Activity of Phenol, Hibiscus Rosasinensis, Neem and Leaves Extract at Different Infusion Times
The present study reveals that the selected plants would exert several benefits by virtue of their antioxidant activity and could be harnessed as antimicrobial, anti-inflammatory and anti-corrosive agents. The aqueous and Ethanol crude extract of Neem, Hibiscus leaves and the mixture of both leaves' extract were screened for their free radical scavenging properties. Free radical scavenging activity was evaluated using DPPH, NO, FRAP and H2O2 free radicals. The aim of this study was to evaluate the antioxidant activity of Phenol, Flavonoids and Tannins content in Neem extract (Azadirachta Indica), Hibiscus leaves and the mixture of both leaves' extract at different infusion times and determination of the protective effect of metallic corrosion caused by soil microbes.
Published by: R. Prasanna
Research Area: Bio-technology
55. Design and Implementation of Re-configurable Antenna
This paper introduces a concept of the re-configurable antenna, which operates on two or more frequencies. The design is done using PIN diode switching technique.
Published by: Tejal G. Pagire
Research Area: Communication Engineering
56. Comparative Study of Electrical and Optical Characterization of Pure and Doped Poly Vinyl Alcohol Polymer Electrolytes
Novel proton conducting solid polymer electrolytes based on Poly Vinyl Alcohol (PVA) with Malonic acid and PVA with Succinic Acid as a dopant are prepared by solution cast technique with varying doping concentrations up to 40 at.%. The electrical conductivity and optical absorption of pure PVA and doped PVA electrolytes are investigated. DC conductivity behavior is studied in the range 303K to 373K. It is found that PVA: Malonic acid (70:30) & PVA: Succinic acid (70:30) electrolytes exhibited the maximum conductivity. The electrical conductivity initially increased with increasing dopant concentration and then showed a decrease beyond 30 at.% concentration. The increase in conductivity is attributed to the formation of charge transfer complexes while the decrease in concentrations above 30 at.% is due to segregation. Optical absorption studies are made in the wavelength range 200-600nm and the values of optical band gap (direct and indirect) are estimated. The results obtained are presented and discussed.
Published by: Dr. K. Alakanandana
Research Area: Material Science
57. Graph-Based Image Search Using Clustering Approach
From the many approaches for image classification, the graph-based approach is gaining popularity due to its ability in reﬂecting global image properties. In this report, VEAM (Vertex and Edge Approximate graphMiner) algorithm is used for mining frequently connected sub-graphs over undirected and labeled graph collections. Slight variations of the data, keeping the topology of the graphs, are allowed. In this report, we have proposed graph-based image representation by using Dynamic Region Merging (DRM) technique. DRM is used with watershed segmentation. It can tolerate some variations for grouping meaningful regions.
Published by: Anuradha Karlekar
Research Area: Multimedia Computing
58. Management of Lagophthalmos by Custom Made Gold Implants
To assess the efficacy of custom made gold implants in the management of Iatrogenic lagophthalmos during CNS surgery. Material and methods: Interventional Study, among patients with LMN VII nerve palsy attending Ophthalmology OPD & IPD of Neurosurgery department. Twenty patients with unilateral lagophthalmos due to facial nerve paralysis were included in the present study. Patients of both sexes and at different ages were included. The etiology included was cerebellopontine angle tumor excision that is after iatrogenic facial nerve injury during surgery. Preoperative thorough history taking and informed consent were taken. Pre and post-operative photographs were taken and patients were followed up for at least minimum of 6 months. Gold Implant: The gold weights were custom made. Each lid load was a 24-carat gold plate, 16 mm long, and 5 mm in height, fashioned as a rectangle with round borders. The body of the lid load had three holes to facilitate suspension to the tarsal plate. It is smooth in surface and weighted 1.0 to 1.6 g. Preoperatively; the proper weight is selected by tapping different weights to the upper eyelid. Discussion: In our study encouraging results were achieved in all cases. The corneal inflammation was resolved and corneas became bright in appearance. Conjunctival congestion was subsided and the eyes became quiet and asymptomatic resulting in final good visual outcome in the patients. The eye inflammation episodes were reduced from 2-3 to 0-1 per month and complete resolution of symptoms was observed in 19 cases (95%). From the aesthetic point of view, 5 patients had a noticeable bulge in the upper eyelid which was accepted by all patients. Infection and inflammation were not detected in any of our cases in the follow-up period. Only one patient complained of implant migration which necessitated correction under local anesthesia. We believe that upper lid loading is a very good alternative. Conclusion: Gold implant insertion in the upper eyelid is a valuable procedure to treat lagophthalmos. The procedure is safe, effective and with low complication rate.
Published by: Dr. Sachin Daigavane, Dr. Sandeep Iratwar, Dr. Siddarth Gautam
Research Area: Medical
59. Propagation of Spherical Shock Wave in A Non-Uniform Medium Under the Monochromatic Radiation and Gravitation
A self-similar, theoretical model of propagation of spherical shock wave in a magneto-gas dynamics rotating non-uniform atmosphere in the presence of monochromatic radiation and gravitation, is considered. The result discussed depends upon the variation of flow variables behind the shock, which is represented by graphically. A special case is considered in present and absence of gravitation along with rotation to observe the influence of gravitation.
Published by: Dr. Rohitashw Kumar, Arvind Kumar
Research Area: Shock Wave
60. Comparison of Antioxidant Activity in Gracilaria Edulis and Hypnea Valentiae
The present study investigates about the antioxidant activity of red algae Gracilaria adults and Hypnea valentine by radical scavenging method, DPPH assay. The ethyl acetate and ethanolic extracts of the two red algae were prepared to keep BHT as a standard Hypnea valentine showed the highest antioxidant activity compared to Gracilaria adults. The absorbance was recorded at 517 nm.
Published by: A. Chandramohan, Dr. S. R Divya
Research Area: Phytochemistry
61. Care When You Dare-A Selective Study
Abstract: An Entrepreneur is always searched for a change and exploits it an opportunity. An entrepreneur is a person who produces innovative products to satisfy the needs, wants & desires of the target market. Industrial development in any country depends on the type of human resources the country possesses and more particularly on entrepreneurs. The main aim of an entrepreneur is to promote setting of small scale industries and through them contribute production and employment in the country. So that the country’s economy will get a boost. This paper recognizes a significant business model that shows the required factors to start a business. A survey is conducted in Prakasam Dt, Andhra Pradesh. After testing normality by Shapiro Test, One Sample T-Test, and ANOVA are used for analyzing the effect of gender, age, and education qualification respectively and Factor Analysis is applied to derive the factors in order to start business and Discriminate Analysis to design the business model on the opinion of the decision will be taken after analyzing all alternatives.
Published by: Ch. Jyothisreedhar
Research Area: Entrepreneurship
62. A Survey on Pattern Discovery of Web Usage Mining
In the recent years with the development of Internet technology the growth of World Wide Web exceeded all expectations. A lot of information is available in different formats and retrieving content has become a very difficult task. One possible approach to solving problem is Web Usage Mining (WUM). Web mining is the application of data mining on web data and web usage mining is an important component of web mining. The goal of web usage mining is to understand the behavior of website users through the process of data mining of web data and Web usage mining is to understand the behavior of website users through the process of data mining of web Access data. knowledge obtained from web usage mining can be used to enhance web design, introduce personalization service and facilitate more effective browsing the important an application of web mining extracting the hidden knowledge in the log files of a web server recognizing various interests of web users, discovering customer behaviour while at the site are normally referred as the application of web usage mining. In this paper, we provide an updated focused survey on different pattern discovery techniques of web usage mining.
Published by: Manoj Kumar, Mrs. Meenu
Research Area: Data Mining
63. A Detailed Classification of Routing Attacks Against RPL in Internet of Things
With the advancement in mobile computing and wireless communications, a new paradigm called Internet of Things is generating a lot of research interest and the industrial revolution. The increasing interest for this paradigm has resulted in the large-scale deployment of Low power and Lossy Networks (LLN), such as wireless sensor networks and home automation systems. These networks are typically composed of many embedded devices with limited power, memory, and processing resources interconnected by a variety of links, such as IEEE 802.15.4 or low-power Wi-Fi. These networks have a wide scope of applications such as industrial monitoring, connected home, healthcare, environmental monitoring, urban sensor networks, energy management, and assets tracking etc.RFC 7228. In order to address the specific properties and constraints of these networks, RPL (Routing Protocol for low power Lossy network) has been developed by the IETF working group [ROLL WG]. RPL is a lightweight, rank based routing protocol. However, this routing protocol is exposed to various attacks which can significantly impact the network resources and its performance. This paper presents an elaborate classification of the possible attacks against RPL in IoT network. Further, we have analyzed and compared the severity of these attacks.
Published by: Ishani Mishra, Divya Sharma, Dr. Sanjay Jain
Research Area: Computer Science
64. An Experimental study on Effect of Rice Husk Ash and Glass Fibre on properties of Cement with Partial Replacement of Fine Aggregate by Quarry Dust
Fiber reinforced concrete is a composite material consisting of mixtures of cement, fine aggregate, coarse aggregate, and fibers. The fiber reinforced concrete exhibits better fatigue strength and increased static and dynamic tensile strength and compressive strength. In this project, the strength of fiber reinforced concrete was investigated partial replacement of cement with rice husk ash and fine aggregate with quarry dust. Glass fiber was added in the order of 0.25% and 0.5% by weight of cement. Rice husk ash was used to replace Ordinary Portland Cement by 10%, 20% and 30% by weight of cement proportions. Quarry dust was used as partial replacement of fine aggregate by 20%.
Published by: S. Nambirajan
Research Area: Civil Engineering
65. Cipher Text Policy Attribute-Based Encryption Supporting Flexible Attributes
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been a very active research area in recent years. Because of two properties traceability and the large universe, CP-ABE is enriching the commercial applications. But to achieve this it requires more computation overhead. In this paper, a novel approach for construction of efficient ciphertext-policy ABE supporting flexible attributes is proposed, which helps to reduce the computation overhead and improves security by providing privacy-preserving data access policies.
Published by: Mr. Mayur D. Ghodeswar, Dr. S. S Sherekar, Dr. V. M Thakare
Research Area: Network Security
66. Software Piracy Production System
In this paper entitled as “software piracy protection system” is mainly used to protect the piracy of the system. Now a day’s and a number of users download the software without having the permission of the owner of the software, however, the software have the product key the unknown person also find the key and it’s used that software. A one user pays and download the software and it has them the specific product key of that software. The authorized user share the key to another user (like as friends, relatives and organizations etc), other users are using that software without buying and download. Overcome this problem to implement this project, it is used for the online process. First the user registers to the website when the user downloads the software, first, the user pays the amount for online and then starts the download the software. Mutually it read the MAC (Medium Access Control) address of the corresponding user. Then the owner of the software generates the product key of the corresponding downloaded software and it's sent to the user. After receiving the key, when the user installs the software on the system it asks the product key, the user type that product key. It checks the product key corresponds MAC address. If it is correct the software is installing, else the software is not installed on the system. In this system only allows the authorized person, because it checks the MAC address. The MAC address is the unique address of the system, so the MAC address is not used for another user.
Published by: B. Karpakavalli, Miss. R. Arunadevi
Research Area: Software Piracy
67. Hybrid Adaptive Antenna Design for Comparison Analysis of Different Technology Using BPSK, QPSK and QAM
As we know with time there is the huge development in wireless communication and with the pace of time traffic congestion problem arise and also ISP is unable to provide good quality of service. In our research paper, we implemented simulation result CDMA, OFDM, and UWB for different band pass technique, for example, BPSK, QPSK, QAM, 16 QAM, 64QAM etc. We calculated Transmitter and receiver message of CDMA, OFDM, and UWB for BPSK QPSK, QAM 16, QAM, 64 and QAM 256 modulation technique. Bit Error Rate (BER) and Signal-to-Noise ratio (SNR) for BPSK QPSK, QAM 16, QAM, 64 and QAM 256 modulation technique. MSE Equalizer for BPSK QPSK, QAM 16, QAM, 64 and QAM 256 modulation technique. It is impossible without smart antenna 4 by 8 means 4 transmitter and 8 receivers. Earlier we use only single or dual antenna now we use the array of an antenna to provide much efficient and good quality of service or we can say MIMO (Multi-input Multi Output).
Published by: Joshika Singh Sindhu
Research Area: Electronics and Communication
68. Hybrid Algorithm for Color Video Object Detection Using Particle Filters
Colour can provide effective graphic features for tracking nonrigid objects in real-time. However, the color of an object can vary over time dependent on the illumination, the visual angle to handle these appearance change a color based target model must be adapted during temporally stable image observation. The proposed method of this dissertation gives new observation likelihood model with dynamic parameter setting. Experiments show our proposed method is more accurate and more efficient than the traditional color histogram based particle filter. Integration of color distribution into particle filters and shows how these distributions can be adopted over time. A particle filter tracks several hypotheses simultaneously and weights them according to their similarity to the target model. As similarity measures between two color distributions, the popular Bhattacharyya coefficient is applied. In order to update the target model to slowly varying image conditions, Frames, where the object is occluded or too noisy, must be discarded.
Published by: Arun Kumar
Research Area: Electronics and Communication
69. Electro- Fenton Process for Wastewater Treatment – A Review
In the recent year, a large amount of water and wastewater generated from various industries and produce organic matters and contaminated the water, this organic this organic compound in water poses serious problems to the public health as well as environment. the advanced oxidation process (AOPs) is one of the advanced treatment methods for wastewater remediation. In AOPs, Electro- Fenton process (EFP) is one of the best methods for the wastewater treatment. In this present research article review the treatment of different wastewater by using EFP and this review paper also focus on the development of EFP, application and advantages of EFP for the remediation of wastewater from various industries and some affecting factors like pH, temperature, Electrode distance, current density, Fe2+ Concentration, H2O2 Concentration etc., and this review concluded that compare to other methods EFP is a promising method for organic treatment and it is also environmental friendly. Therefore the electro-Fenton process is one of the best methods in AOPs.
Published by: Pushpalatha M, Krishna B M
Research Area: Environmental Engineering
70. A Topsis-Based Taguchi Optimization to Determine the Reverse Osmosis Process Parameter for Distillery Effluent in ZLD Process
In general, the optimization problems contain more than one response, which often conflicts with each other. This paper proposes the TOPSIS-based Taguchi optimization approach to determine the optimization of reverse osmosis process parameters for improving recovery and quality of permeate. The performance criteria are identified for Permeate are COD, Total Solids, Conductivity and Hardness in reverse osmosis process. They are dependent on process parameters Operating Pressure (OP), Potential Hydrogen, Oxidation Reduction Potential and Anti-Scaling Agent. Four factors having three control levels and one factor having three control levels are identified for performance criteria. The temperature is taken as noise factor. The data for permeate, recovery, and quality of permeate obtained by running scenario that combines factor levels in Taguchi design while the signal to noise (S/N) ratios are calculated for the data. After a decision matrix is generated by the S/N ratios, the TOPSIS (Technique for Order Preference by Similarity to an Ideal Solution) method is then used to transform the multi-response problem into a single- response problem. The anticipated improvement rate is also determined by finding the levels of the factors in order to optimize the system which uses Taguchi I’s single response optimization methodology.
Published by: P. A Gadge, Dr. A. C Waghmare, Dr. R. D Askhedkar
Research Area: ZLD by RO In Sugar Industry
71. Exponential H∞ Filtering Design for Discrete-Time Neural Networks Switched Systems with Time-Varying Delay
This paper deals with the exponential H∞ filtering problem for discrete-time neural networks switched singular systems with time-varying delays. The main purpose of this paper is to design a linear mode-dependent filter such that the resulting filtering error system is regular, causal, and exponentially stable with a prescribed H-infinity performance bound. In addition, the decay rate of the filtering error dynamics can also be tuned. By constructing an appropriate Lyapunov functional together with some zero inequalities and using the average dwell time scheme, a novel delay-dependent sufficient condition for the solvability of the H-infinity filtering problem is derived. Based on this condition, the desired filter gains can be obtained by solving a set of linear matrix inequalities (LMIs). A numerical example is presented to show the effectiveness of the proposed design method.
Published by: G. Mahendrakumar, R. Manivannan, R. Samidurai
Research Area: Applied Mathematics
72. Change in Physico Chemical Characteristics of Distillery Spent Wash after Treatment with Soil and Wood Ash
Adsorption treatment of distillery spent wash has great potential as a sustainable method as it is a low-cost method. The aim of this investigation is to study the treatment method for purification of distillery spent wash by using Soil and Wood ash. For this, the study comprising evaluation of reduction of various physical-chemical parameters (Color, Odor, pH, COD, TS, TDS, Ca, Mg, Na, and K) of distillery spent wash was checked by passing through the columns of Soil and Wood ash. The distillery effluent was acidic (pH 4.7) and dark brown in color which often cause psychological fear in farmers for utilization. Soil treatment of spent wash exhibited the good reduction in COD, TS, TDS, Mg, Na, Ca, after 72-hour treatment and increase in pH toward pH 7 followed by Soil + Wood ash (1:1).
Published by: Bharat Kumar, Arun Upreti, Mehtab Singh Dhaliwal, Rajat Singh Bisht
Research Area: Soil Science
73. Andro Attendance – Marking Attendance with Android Application
Andro Attendance is the android application developed to manage daily student attendance in colleges. The Mobile Phone Based Attendance System will help the lecturers to take attendance easily, securely and without errors. This system will be used to reduce the fake attendance and also reduce the waste of the time. The lecturer will be able to view the attendance by this App. After taking the attendance in the Android mobile, attendance will be sent to the server.
Published by: A Karthikeyan
Research Area: Mobile Computing
74. Thermal Analysis of Journal Bearing Using CFD Software for Performance Enhancement
Abstract- Hydrodynamic journal bearings are used in machinery which is rotating at high speeds and heavy loads for work done. This results in increase temperature rise in the lubricant film which significantly affects off the bearing. The thermo-hydrodynamic analysis should be carried out in order to obtain the realistic performance parameters of the journal bearing. Journal bearing models are developed for different speeds and eccentricity ratios to study the interaction between the fluid and elastic behavior of the bearing. Thermo-hydrodynamic analysis of circular journal bearing has been simulated by using Computational Fluid Dynamics approach. This approach solves the three-dimensional Navier-stokes equation to predict the bearing performance parameters such as the pressure and temperature of the lubricant along the profile of the bearing. The CFD technique has been applied through ANSYS Fluent software. The oil flow is assumed to be laminar and the steady state condition has been assumed in the current work. The effect of variation of pressure and temperature are considered during the study. Journal bearing models are developed for different speeds and eccentricity ratios to study the interaction between the fluid and elastic behavior of the bearing. By applied the fins on journal bearing we improved the efficiency of journal bearing
Published by: Kapil Hiraman Bagul, Pundlik N. Patil, Raghunath Y. Patil
Research Area: Mechanical Engineering
75. Detail Survey and Analysis of Resource for Village Functioning Using Advance Techniques Q-Gis and Total Station
A geographic information system is a special case of information systems where the database consists of observations on spatially distributed features, activities or events, which are definable in space as points, lines, or areas. A geographic information system manipulates data about these points, lines, and areas to retrieve data for queries and analyses.
Published by: Amit Baravkar, Gadhave Punam, Kale Akshay, Prof. Kate G. K
Research Area: Village Functioning
76. Retinoblastoma in Adult –A Case Report and Review
Retinoblastoma usually presents in children younger than 5 years. To our knowledge, 22 cases of retinoblastoma in adults (older than 20 years) have been reported in the literature. Out of 28 patients with histopathologically proven retinoblastoma seen in our institute, one was the adult. Patients had the endophytic tumor with vitreous seeds. Ultrasonography did not reveal calcification. Immunohistochemistry with neuron-specific enolase was used to confirm the diagnosis in this case. The patient ultimately required enucleation. The diagnosis of retinoblastoma should be considered in cases of the whitish mass lesion in the fundus of an adult.
Published by: Dr. Mehul A. Shah, Dr Shreya M. Shah, Dr Anjli H. Israni, Dr Jyotirmoy Biswas
Research Area: Oncology
77. Modelling and Simulation of PID and Fuzzy Based Controller of a Nonlinear Liquid Level Process Using Labview
The system under investigation is a coupled tank system of a common process in industrial control. The basic control principle of the coupled tank system is to maintain a constant level of the liquid in the tank when there are an inflow and outflow of liquid in the tank and outflow of liquid out of the tank respectively. The control of liquid level in tanks and flow between tanks is a problem in the process technologies. The process technologies require liquids to be pumped, stored in tanks, and then pumped to another tank systematically. In this work, an efficient elementary idea about the controller system and liquid level control for the tank system has been presented. The liquid level control system controls the level of the liquid whatever the disturbances, such as level change, increase/decrease of outflow and interaction between the tanks. The result shown in the project work is encouraging & promising. The main objective of this project is to determine the mathematical model of a coupled tank system using mass balance technique. It follows by designing the controllers consisting of PID and Fuzzy logic controllers for the system. At the final stage of this project, the usage of the controller in industrial applications is compared and analyzed. The reasons behind the selection of LabVIEW software among other is because of its strong graphical interface, user-friendly tools, and highly understandable approach.
Published by: Nayanmani Deka
Research Area: Computer Science & Engineering
78. Liquid Level Control Using Fuzzy Logic in LabVIEW with Arduino
Liquid level control plays a crucial role in the industrial process control for the accurate results of the output (product). The fuzzy logic controller is the most commonly used method because of their accuracy and ease of design rules for nonlinear process control in the industrial application. The main objective of this paper is to show how liquid level of a couple tank system can be controlled by the fuzzy logic controller by using the LabVIEW software. Liquid level controller via is interfaced with Arduino Uno board using LIFA to see the controller performance. The output of the controller is observed by one LED and buzzer.
Published by: Nayanmani Deka, Pranjal Jyoti Hazarika
Research Area: Instrumentation
79. Use of Educational Technology in Sidho Kanho Birsha University
Use of educational technology in Sidho Kanho Birsha University Assistant Professor Mudo Tamo Memorial College Ziro, Arunachal Pradesh Educational Technology is the very important issue of higher education in the present age. The investigator tried to understand the extent use of educational technology in master’s level in Sidho Kanho Birsha University in West Bengal. He collected 150 samples (students) with the direct and indirect method from different departments and used an open-ended questionnaire to collect the data and then analyzed the data with item analysis. The findings of the study are not satisfactory. Many departments don't use general educational technologies like power point projector, smart board, computers, films etc. Software’s of educational technology in the classroom are rare in higher education of that university. But out of classroom seminars are used in most of the departments. Education department and science departments are forward on this issue. The ongoing process of the university is positive on this issue.
Published by: Sourav Mahato
Research Area: Educational Technology
80. Automated Evaluation Framework for Student Learning using Concept Maps
The paper develops the concept map-based framework for Student learning evaluation. The main attention is devoted to automatically calculate the student understanding about the particular topic using concept maps where concept maps are a visual representation of understanding of any topic. We use Markov chains technique to calculate the score of student understanding and also use XML parsing technique to compare and evaluate the concept maps. The feedback generated by this framework gives the score of student understanding about the topic and is given to the teacher and student so that it will be useful to validate the knowledge and grasping the power of students. The final result will be in terms of interactive UI rather than simple graphs.
Published by: Miss. Amruta Suresh Awati, Dr. Arti Dixit
Research Area: Artificial Intelligenace
81. Identify the Bioactivity Of Flavonoids In Erythrina Varigata Leavea Extracts Using The Pass Method
Erythrina Variegata plant as revealed from various literature resources, our work will be planned to predict the bioactivity of Erythrina Variegata leaves extracts using the ‘PASS’ software. The PASS predictions for the bioactivity of the sixteen flavonoids were found to be in the ranges from 65 to 97.7% as various inhibitors. Among the sixteen flavonoids from Erythrina Variegata leave, Vogel – A and Isowigteone were found to exhibit more bioactivity like Monophenol monooxygenase inhibitor (96.3, 97.7%), Membrane integrity agonist (91.4, 92.6%), CYP1A inhibitor (95.2, 95.3%), CYP1A1 inhibitor (95.7%), MMP9 expression inhibitor (89.8, 90.6%), Histidine kinase inhibitor (93.7, 94.4%), UGT1A10 substrate (92.4, 95.3%), Chalcone isomerase inhibitor (93.1, 93.0%), Aldehyde oxidase inhibitor (91.3, 89.4%), CYP1A substrate (89.1%).
Published by: A. Chandramohan, Geetha .S, Dr. S. R Divya
Research Area: Phytochemistry
82. An Investigation and Analysis on Failure for Bearings of Casting Shakeout Used In Foundry Industries
This project deals with investigation and rectification on the failure of the bearing of casting shakeout, required in foundry industries to separate solidified casting and sand from mold box. The failure of bearings is mainly due to Brinelling tends to create cavities on the bearing raceway. This result in roller and inner races surface of spherical bearing get damage. The rectification of existing system uses four bearings as modified setup of the existing system to distribute the load acting on shakeout aims at reducing this frequent breakdown increases the life of bearings and increases the productivity of the plant. The software Pro-E wildfire 4 is used for modeling.
Published by: S. N Satone, Prof A. A Gangshettiwar
Research Area: Mechanical Engineering
83. A Survey on Different Approaches for Analysing Urban Mobility
The following paper reviews on a framework of current trends, data analysis, evaluation of urban mobility including the factors affecting it using social media concept. By the end of the paper we will be summarizing the advanced methods that are used for analyzing urban mobility. The main motive of this review is to suggest a suitable mechanism for urban mobility through Facebook events.
Published by: Pushpa Shavi, Prof. Jayanthi M G
Research Area: Fuzzy Logic
84. A Survey on Urban Tourism Development and its Characteristics
This paper reviews on the current trends, problems, and advantages of urban tourism and impact of it on our social economy, including the factors affecting it. By the end of the paper, we will be summarizing the popular advanced approaches and methods that are used to improve urban tourism. The main motive of this review is to suggest a suitable optimization for urban tourism.
Published by: Dulam Bhavya Sree, Prof. Chandrakanth. N
Research Area: Data Mining
85. A Survey on Big Data Energy Based On Smart Grid
Energy is the most important part of human life. As a significant approach energy in smart grid is interconnected with a power grid that involves sensors, deployment strategies, smart meters , variety .and real-time data processing. It generates the data with high velocity, large volume, and variety.In this paper we gave brief introduction of big data, big data architecture, s mart grid, big data architecture for smart grid and its advantages and big data applications in smart grid environment and future challenges in energy domain and s mart grid communication.
Published by: Diksha M, Prof. Raghavendra T. S
Research Area: Big Data
86. Standardization Of Bael /Blended Extruded Products
The present investigation was undertaken to develop powder from bael fruit, to study the sensory, functional and nutritional qualities of bael fruit powder & to utilize fruit powder for value added products. The process for the preparation of powder was standardized. The sensory evaluation of fruit powder indicated that the bael powder was liked moderately by the panelist. Bael powder was incorporated (10% & 20%) in extruded products extruded products (vermicelli, pasta, macaroni).Sensory characteristics indicated that all the products were organoleptically acceptable in terms of color, appearance, flavor, texture, taste and overall acceptability. An attempt was also made to check the field acceptability of this bael powder based products, which proved successful and received a positive response from the respondents.
Published by: Bhawana Thukral
Research Area: Applied Sciences(Foods & Nutrition)
87. Growth Level of Big Data
Big data’ is similar to ‘Small-data’, but big data analysis. Big data is, without the doubt, the hot topic nowadays, moreover because the development of new technology makes it possible to analyze all available ever-growing data which easily amasses terabytes of Information. The big data used in 5 billion mobile phones on 2010. There are 30 billion pieces of content shared on Facebook each month is a 40% projected growth in global data generated per year vs. 5% growth in global IT spending. There are 235 terabytes of data collected by the US Library of Congress in April 2011.It is 15 out of 17 major business sectors in the United States have more data stored per company that the US Library of Congress. Then 50 billion devices will be connected by 2020.Every day it seems that a new technique or application is introduced that pushes the edges of the speed-size envelope even further. It boasts scan speeds of 33 million rows/second/core and ingest speeds of 10 thousand records/second/node. The events leading to the discovery and resolution of the scandal point to the promises and challenges of data management for multiparty, multidimensional, international systems. Billions of individual pieces of data are amassed each day, from sources including supplier data, delivery slips, restaurant locations, employment records, DNA 22 records, data from Interpol’s database of international criminals, and also customer complaints and user-generated content such as location check-ins, messages, photos and videos on social media sites. It has used for three different characterize (volume, variety, velocity). Most are keenly aware that Big Data is at the heart of nearly every digital transformation taking place today.
Published by: A. Anitha, V. Vaneeswari, R. Abirami
Research Area: Big Data
88. Big Data: Tools and Applications
The amount of data in our industry and the world is exploding. Data is being collected and stored at unprecedented rates. The challenge is not only to store and manage the vast volume of data, but also to analyze and extract meaningful value from it. There are several approaches to collecting, storing, processing, and analyzing big data. Our analysis illustrates that the Big Data analytic is a fast-growing, influential practice and a key enabler for the social business. This paper covers the leading tools and technologies for big data storage and processing. Hadoop, Map Reduce, and No SQL are the major big data technologies. These technologies are very helpful in big data management.
Published by: Kanchana R, Shashikumar D R
Research Area: Big Data
89. Impotence and Sterility with Special Reference to its Medicolegal Importance
Impotency and sterility are generated physically and mentally impairment. In our medical practice may be required to examine an individual for impotence and sterility for the medicolegal purposes.
Published by: Dr. Babita Singh, Dr. Sarla, Dr. Umesh Chandra
Research Area: Medical and Law
90. Automation of a Hydraulic Press Machine Using Bosch Rexroth PLC for remote operation through mobile communication
This research paper focuses on automation of a press tool for the production of sheet metal components. The operation of press tool consisted of sequences of operations. This sequence of operations had to automate for the increase in productivity. For that purpose, PLC is used from Bosch Rexroth, Germany made. With the help of DTMF module, it was made possible to operate the press by using mobile calling from remote locations. In this article, the press thus designed served for the purpose of 73% reduction in production time, with enhanced quality and helped in enabling mass production by eliminating several processes such as marking, cutting done with the help of a cutter, shaping, and so on.
Published by: Mr. G. C. Mekalke, Mr. A. V. Sutar
Research Area: Automation
91. A Survey on Clustering Algorithms used to Perform Image Segmentation
: The goal of this survey is to use different Clustering techniques to perform image segmentation. Clustering means a grouping of images which share some common attributes. The purpose of clustering is to get a meaningful result, effective storage, and fast retrieval in various areas. The clustering methods are mainly divided into hierarchical, partitioning, density-based, model-based, grid-based, and soft-computing methods. The goal of this survey is to provide a comprehensive review of different clustering techniques. There are a number of clustering algorithms proposed to perform image segmentation. One needs to choose the best algorithm among them by analyzing the nature of the input image in order to get optimal results.
Published by: Sandhya Prabhakar H, Mr. Sandeep Kumar
Research Area: Image Mining
92. Study of Dry Eyes in Post Menopausal Women-A Rural Hospital Based Study
Purpose: To establish the occurrence and prevalence of dry eye in postmenopausal women in a rural hospital and also to establish the effect of age on dry eye. Material and methods: Female patients of postmenopausal age groups, i.e. 45 years and above age group, attending Ophthalmology Out Patient Department at Acharya Vinoba Bhave Rural Hospital, Sawangi, Wardha underwent complete eye check-up. Patients suffering from Lid disorders, trauma, diabetes, contact lens wearers, on medications which can cause dry eye and those not giving consent were excluded from the study. Their detailed ophthalmological examination was carried out and also their evaluation by the physician was done. Schirmer's test 1 was done for diagnosis of dry eye. Discussion: In this study, total 500 female patients were examined, out of which 185 fit the criteria for our study, i.e., they presented with dry eye. So the prevalence came out to be 37%.The 185 female patients included were between the age group of 45 and above years of age.So they were divided into five age groups. First 45 to 49 years of age which included 20 females, second was 50 to 54 years of age which included 31 females, third was 55 to 59 years of age which included 52 females, fourth was 60 to 64 years of age which included 60 females and fifth was above 64 years of age which included 22 females. According to our study, as age progressed, the percentage of patients with dry eye increased with the Pearson's Correlation Factor (r=0.9714).The minimum percentage of dry eye was in patients within the age group of 45-49 years i.e. 30% while a maximum number of patients with the dry eye was in patients > 64 years of age i.e. 44%.This proves that dry eye incidence increases in post-menopausal women, as age progresses. Conclusion: The prevalence of dry eye occurring in Central India among postmenopausal women came out to be 37% in our study. Also, it was established that as age progresses in postmenopausal women, the prevalence of dry eye increases.
Published by: Dr. Aditi Gadegone, Surabhi Sharma
Research Area: Medical
93. Sybil Attack in Wireless Sensor Networks: A Survey
The wireless sensor networks are prone to various attacks; this is primarily due to the fact that these networks once deployed are left unattended. So any attacker with the intention of stealing the information from the network can compromise any node and gain access to the data being propagated in the network. Various attacks possible are black hole attack, wormhole attack, Sybil attack, clone attack etc. This paper represents the various techniques that have been presented in the past for the detection and prevention of the Sybil attack.
Published by: Mandeep Kaur, Mr. Avinash Jethi
Research Area: Computer Science & Engineering
94. Secure Convergent Key and Deduplication using Distributed Convergent Key Management
Data deduplication is a specific form of compression where redundant data is eliminated and has been used in cloud computing to improve storage utilization. In the deduplication process, duplicate data is deleted, leaving only one copy of the data to be stored. In the traditional encryption, different users required to encrypt their data with own keys. So different ciphertexts are produced, it makes difficult to deduplication. The new scheme has been proposed, convergent encryption, to protect the confidentiality of sensitive data while making deduplication is possible. In this paper, this convergent key managers efficiently and reliability. Firstly in this paper baseline approach is used in which a master key means the encrypted convergent key is kept individually and outsourcing them to cloud. Each user has a master key, increase the enormous number of keys. And users also want to protect the master key. A new approach is proposed in which Dickey is used in which user share key on multiple servers, he do not require manage the key. Ramp Secret Sharing scheme is used to implement Dickey in which each key distributed on multiple servers.
Published by: Nilam Vijaykumar Patil, Dr. B. K Sarkar
Research Area: Cloud Computing
95. Effect of Stripping Of the Umbilical Cord Blood Towards The Baby At Birth On Haematological And Developmental Outcome In Infants
Abstract: Background- The base for the common practice of cutting the umbilical cord after birth is in view of either that it is very little or no benefit by additional placental transfusion to the newborn. Active milking of the umbilical cord towards the baby prior to clamping (rather than passive) should take less than 10 seconds to perform and should resuscitation. Objectives. Assess the selected neonatal and infant and developmental outcomes of the newborn after stripping of the umbilical cord blood at birth in interventional group.2. Assess the selected neonatal and infant and developmental outcomes of the newborn in control group3.To compare the effectiveness of selected neonatal and infant and developmental outcomes in interventional group and control group. Method- the sampling technique used was randomization. Results: Majority (56%) of the newborns were male and (44%) female in the experimental group and 60% male and 40% female in the control group. The post-test Mean PCV at 6months, 9months and 12months study group was 36.84, 35.56, 35.88 and control group was 32.22, 28.90, and 26.80. - DDST-II the revised Denver developmental screening tool as per the percentile presentation ages of p25, p50, p75 and p90 reading of infants from study group for gross motor milestones showed that there are lift head up 45 degrees at 2months milestones, sit head steady at 4months, chest up arm supported at 5months, roll-over 5 months, pull to sit no head lag 6months, is in advanced stage when compared to that of control group milestones. language milestones showed that Vocalizes, jabbers at and make sound OOO/AAH at one month at p50, p75 and p90 and laughs, Dada/mama specific by one year at p75 and p90 is in advanced stage Squeals at 4months, Dada/mama Non-specific at 7months is delayed at of p25, p50, p75 and p90 readings, Imitate speech sounds is delayed at p50. Conclusion- Stripping of the umbilical cord towards the baby at birth is a safe, simple and low-cost delivery procedure. Early screening using DDST-II is a valuable test for immediate and late infant developmental outcome to detect early developmental delays.
Published by: Mrs. Manisha N. Pawar, Dr. Nimain Mohanty, Dr. Mary Mathews
Research Area: Pediatrics
96. Analysis of Genetic Diversity and Relationships of Silkworm Varieties Using Molecular Marker
The genomic DNA of seventeen silkworms were amplified with OPA-02 primer revealed 45 RAPD bands out of which 90% is polymorphism and 10% is monomorphic silkworm is polygenic. Silkworm variety 9 was not shown any amplification of bands however the varieties 1 and 2 showed one band each Some of the DNA fragments were strain specific and some could differentiate the multivoltine from the bivoltine strains or vice versa.Silkworm genetic resources that are being maintained in Hosur, Tamil Nadu, India, are yet to be adequately tapped to develop elite varieties that are subjected to a different agro-eco-climatic condition of the country like India. Molecular markers are known to provide an unambiguous estimate of the genetic variability of silkworm populations. Since they are independent confounding effects of environment, the genetic similarity among the seventeen silkworm varieties/strains and their genetic diversity and relationships were discussed. The amplification bands were very poor.
Published by: C. N. Venkatesh, B. K. Chikkaswamy
Research Area: DNA Manipulation
97. Mathematical Modeling of Soft Switched Single Stage Multistring Inverter with Multi-rated ETT Photovoltaic Modules
This paper presents the preliminary study of modeling of single stage multi-string inverter with multi-rated easy to tune model of photo voltaic modules. As the name represents, the Multi-string topology is capable of handling more number of PV strings with different orientations and varied irradiation levels. This multi-string inverter is able to harvest the maximum possible power from each string independently, while they may be at different operating temperatures. In this paper, a multi-string inverter with two different easy-to-tune (ETT) PV modules using MATLAB/SIMULINK has been implemented and detailed analysis is carried out with and without filters. Total harmonic distortion of output is also evaluated.
Published by: Nallamilli Ayyappa Reddy, Koviri Dhana Raju
Research Area: Power Electronics
98. A Review on Performance Analysis of Energy Detection Technique for Cognitive Radio over Different Wavelet Family
Spectrum scarcity is one of the major problem focuses within the wireless communication technology. It's inefficient utilization of the electromagnetic spectrum tends to provide the development of the cognitive radio (CR). Cognitive radio is one of the emerging technology in wireless communications in which a network or a user flexibly changes its transceiver parameters to achieve more efficient communication performance without interfering with licensed or unlicensed users by the process so-called dynamic spectrum sensing. This allows better utilization of the unoccupied spectrum and high spectrum efficiency usage. In this paper, we are detecting the presence and absence of the primary user signal by using one of the detection techniques so-called energy detection techniques using WPT.Energy detection based spectrum sensing technique is used using the different type of the wavelet family i.e. Mexican, Morlet, Meyer, Biorthogonal wavelet.
Published by: Yamini Likhar, Mrs. Shiva Bhatnagar
Research Area: Cognitive Radio
99. A Comprehensive Review on Smart Meter Communication Systems in Smart Grid for Indian Scenario
In existing power grid, the currently used power meters, are either electronic energy meters or electro-mechanical meters and are limited to record power/energy up to KWh unit only. One of the drawbacks of these power grids is that out of the total power production, 26% of energy gets lost because of various reasons such as power theft, blackouts, etc. To fulfill the continuous drastic demand of energy production and consumption, a new generation power grid is required, which should include communication and information technology (ICT) along with distributed power generation (like solar power and wind power). The concept of a new generation smart power grid, so-called Smart Grid, has been gaining continuous rapid attention worldwide. Smart Grid is considered as a system that can supply bi-directional flow of electricity and information, with better power grid reliability, security, and efficiency of the electrical system from generation to transmission to distribution. To meet the requirement of Smart Grid we require the most fundamental components like Smart Meter, in the intelligent energy networks (IENs). Smart Energy meters are used to control and monitor home appliances and other devices by providing two-way communications among them. This paper reviews the basics of Smart grid and development and deployment of communication technologies used among various Smart Grid components/networks and provides an insight into the current research on Smart meters with some guidelines and future directions for IENs.
Published by: Mukta Jukaria, Prof. B. K Singh, Prof. Anil Kumar
Research Area: Smart Grid /Smart Meter Communication Technology
100. Bioprospecting of Neem and Hibiscus Rosasinensis
The present investigation was carried out about the corrosion inhibition and adsorption behavior of Neem and Hibiscus, as a green inhibitor of Zinc corrosion in acidic mediated of corrosion causing soil microbes by using weight loss and thermodynamic studies. Even analyze the quantitatively and qualitatively biochemical substances present in Neem and Hibiscus leaves of aqueous and ethanol extract which act as an anticorrosive agent of metallic and non-metallic substances in acidified soil. Ethanol and aqueous extract of Neem and Hibiscus leave extract showed the strong antimicrobial activity against soil microbes such as S.aureus, Streptococcus, B. subtitles, Lactobacillus, Proteus, Corynebacterium, Pseudomonas, A.niger, Mucor and Desulphovibro sp. Langmuir and Freundlich, Temkin and Florry-Huggins models are employed to analysis adsorption occurred in the experimental data of adsorption isotherms. The Freundlich, Langmuir and Temkin models are employed to analysis adsorption occurred in the experiment
Published by: R. Prasanna
Research Area: Biotechnology
101. An Empirical Study of Indian Classical Ragas Desh and Todi Structure and its Influence on Brain Waves
Ancient Indian classical musical maestros affirmed that ragas influence emotions of a human being by changing the resonance of human body. Some ragas like darbari Canada, khaman and poorly are found to help in defusing mental tension, particularly in the case of hysterics. Raga malware Pacifies anger, excessive mental, excitement & mental instability, Raga Jai Jai anti have also been pound effective in curing mental disorders and calming the mind. Although it is required to verify this raga correlation systematically. By survey, it has been seen that no schemes have demonstrated yet. The proposed research presented in this paper is aimed to discover the science behind phonetics of raga and its effects on nerve system. This research is one step to explore scientifically the ancient way of alternative medicine i.e. raga therapy, which is a need of the day since current advances in technology and rising workload on a human being is accompanied by stress. This research focuses on to study the influence of Indian classical ragas structure on the human body while the person is listening and experiencing an emotion in it by capturing EEG signals. The brainwave signals database will be collected and analyze. This research work addresses these objectives and aims to present a strong case which will help medical practitioners like a psychiatrist, to treat the patient by injecting music stimulus.
Published by: A. A Bardekar, Ajay A. Gurjar
Research Area: Signal Processing
102. Relationship of Image Management and Corporate Performance
In this era of globalization and ever-improving technologies, the corporate environment has become highly competitive. With many options available, it has become difficult to secure customer loyalty. After having made a good product one needs to tackle the competition also. An effort is made here to find out if corporate reputation and corporate image today are the real keys that have the potential to impact customer loyalty in favor of the firm? The present study aims to discover that corporate that focused on image management as a continuous effort are more successful in comparison to those corporate that have not used this tool effectively or not used it at all.
Published by: Neha Singh
Research Area: Management
103. CFD Analysis of Concentric Tube Heat Exchanger Using Twisted Tapes
In this paper, the three-dimensional CFD modeling studies on heat transfer, friction factor and thermal performance of concentric tube heat exchanger using twisted tapes (Plain, V-cut, Jagged V-cut) with different twist ratios (y=2.0, 4.0) are used. Twisted tapes are used to augment the heat transfer by creating turbulence in the fluid flow. Various methods are applied to increase the thermal performance of heat transfer devices such as treated surfaces, rough surfaces, swirling flow devices, coiled tubes, and surface tension devices. Out of these twisted tape method is used to increase the thermal performance. Twisted tape inserts on the effectiveness of heat exchanger have analyzed for different Reynolds Number. The maximum thermal performance factor was obtained by the Jagged V-cut twisted tape (H=50) insert compare to other twisted tapes. Simultaneously the friction factor has been analyzed.
Published by: S. Naveen, S. Bhuvaneshwaran
Research Area: Heat Transfer
104. Soil Pollution and Soil Remediation Techniques
In a general sense, soil pollution definition is the presence of toxic chemicals (pollutants or contaminants) in soil in high enough concentrations to be of risk to human health and/or ecosystem. Additionally, even when the levels of contaminants in soil are not of risk, soil pollution may occur simply due to the fact that the levels of the contaminants in soil exceed the levels that are naturally present in soil (in the case of contaminants which occur naturally in soil). Soil pollutants include a large variety of contaminants or chemicals (organic and inorganic), which could be both naturally occurring in soil and man-made. In both cases, the main soil pollution causes are the human activities (i.e., the accumulation of those chemicals in soil at levels of health risk is due to human activities such as accidental leaks and spills, dumping, manufacturing processes, etc.) 125 major contaminated sites across the country 175 million hectare (out of 329 million ha) are considered degraded 40 % of chemical fertilizers leached into soil 14 States are affected by Fluoride contamination • > 65 percent of India’s villages are exposed to residual pesticides risk Heavy metals beyond permissible limits affecting GW of 40 districts from 13 states. This is possible due to the complex soil environment involving the presence of other chemicals and natural conditions which may interact with the released pollutants Various causes for soil pollution are detailed below. Of these cases, sites are important causes of soil pollution in the urban area due to their almost ubiquitous nature. In general, any chemical handled at construction sites may pollute the soil. However, the higher risk comes from those chemicals that may travel easier through the air (as fine particulate matter) and which are resistant to degradation and bioaccumulate in living organisms. Enhancing functional capacities of various tiers Strategic interventions in critical areas Innovating funding mechanisms and PPP Building synergies for expediting decision making Community mobilization: awareness and education. While in situ remediation is more cost effective, the thoroughness of this method is less effective than the ex situ remediation. Ex situ remediation is less cost effective but is a more thorough remediation method. This paper will evaluate the benefits and costs of each technique
Published by: Md. Jalal Uddin, G. Aditya sagar, J. Jagdeeshwar
Research Area: Civil Engineering
105. Essence of Pre-Service Teacher Education for the Teachers of Higher Education of General Stream
In India, there is provision for pre - service teacher education for the teachers of pre-primary, primary, secondary and higher secondary level. Now it is compulsory in many states. But there is no program for pre - service teacher education for the teachers of higher education, i.e. for the teachers of colleges and universities. From our experience, we can guess that pre - service teacher education is very important for the teachers of colleges and universities because without training and practice of teaching and education about the teaching profession teacher can't teach and work properly in higher education institutions. Therefore the investigator tried to study on the issue. He communicated with teachers of higher education of different states, especially of West Bengal and then got the findings.
Published by: Sourav Mahato
Research Area: Higher Education
106. A Study Paper on Video Based Steganography
Steganography is the practice of hiding secret message or private information within other multimedia data i.e. text, image, audio or video. Recently video steganography has become privilege for providing large amount of data to be transferred secretly. Video is simply a collection of images, hence more space is available for hiding of information based on factors such as carrying files, type of message to be embedded and method of compression used etc., the technique used in video steganography can differ. The strength of Steganographic technique lies in its capacity to keep the message as secret as possible and also the amount of data that can be hidden, as large as possible. In spite of the fact that numerous approaches already exist in video steganography researches are going on in this field. This paper gives a survey on the methods used in this area.
Published by: Himani Trivedi, Prof. Arpit Rana
Research Area: Information Security
107. Role of Web 2.0 Technology in Social Media Marketing
Social media or Web 2.0 new generation of internet application explores the aptitude and potential of this application as influences of consumer behavior and marketing instruments. Social media application can be used in two ways: as “passive marketing tools” i.e. as sources of market intelligence, as “active marketing tool” as the platform of communication/promotion customer interaction and customer feedback. Social media and Web 2.0 application of an effective and low-cost tool for strategies marketing instruments substantially support marketing operations in the virtual and physical marketplace. Web 2.0 redefined a way people use information and communication services. Web 2.0 enabled the global proliferation of a social networking which again is a foundation for social media marketing. This paper main purpose is to define Web 2.0 technology as strategic marketing instruments in social media marketing and also define the strategy of social media marketing.
Published by: Jyoti Rohilla
Research Area: Marketing
108. PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Networks
Social network users expect the social networks that they use to preserve their privacy. However, in online social networks, privacy breaches are not necessarily.In this proposed, first, categorizes to protect the consumer that take place in online social networks. Our proposed approach is based on the agent-based representation of a social network, where the agents manage users’ privacy requirements by creating commitments with the system. The proposed detection algorithm performs reasoning using the description logic and commitments on a varying depths of social networks.
Published by: R. Saranya, N. Sagunthala, A. Kiruthika
Research Area: Social Networks
109. Electric Vehicle Wireless Charging
The electric vehicle is gaining importance day by day because of the benefits it has over conventional vehicles. One of the major problems with EV is its battery charging process which can be simplified by using Wireless Power Transfer (WPT) System It removes the need for annoying cables and provides safety to the user. This paper discusses the technique and consideration to be made while designing a system to charge vehicle wirelessly.
Published by: Sejal Mahangade, Sayali Mahangade
Research Area: Electrical Engineering
110. Hybrid Wind-PV System Connected to Grid used for Automatic Irrigation
As we know the pumping is the main issue in irrigation due to lack of electricity. There are many water pumping systems such as diesel powered, solar photovoltaic, mechanical windmill exists. But conventional sources are being limited and one renewable source is not sufficient, so we will use hybrid energy sources along with a battery to provide better performance and reliability to the existing system. Also, we know there is a limited amount of water a better utilization of water is required. In this, a wireless sensor network is being used for automatic irrigation system where only required water is provided. Where moisture sensors are being used for monitoring moisture content of the soil in various parts of the cultivation land to maintain the moisture. As when the motor is off there is no need of water than power is given to grid.
Published by: Sayali Mahangade, Sejal Mahangade
Research Area: Electrical engineering
111. Survey on Physical Resource Management in Clouds
The very important advantage of cloud computing is the ability to provision resources on demand. This avoids the problems of over-provisioning and under-provisioning which are commonly seen with organizations that have widely variable requirements due to increase/decrease, seasonal high and low workload etc. Resource allocation policies decide the amount of resource to be allocated to a particular or set of virtual machines (VMs). This resource allotment policy can also update the dynamically. For implementing prioritization, it requires to provide more resource to a specific virtual machine, compared to another virtual machine The resources offered may include memory consumption, storage, CPU processing power, IT services, and so on. Many of the touted gain in cloud computing that comes from resource multiplexing through virtualization technology.
Published by: Smitha .M. S, Prof. Janardhan Singh
Research Area: Resource Management in Clouds
112. Performance Analysis of Image Clustering Algorithm Applied to Brain MRI
Exact measurements in brain diagnosis are difficult because of various shapes, area, and appearances of tumors. The tumor is an abnormal growth of body tissue; it can be cancerous or non-cancerous. There is a strong demand for automating the tumor detection and segmentation process. Thus, we required the computer aided diagnosis of brain tumor from MRI images to control the difficult problems in the manual segmentation. There are several methods available in the literature for medical image segmentation. In this paper, we introduced new segmentation method for detection of bias field image and classification of white matter and gray matter.From experimental results, BCFCM required less time than FCM algorithm.
Published by: Kalyani R. Mandlik, Dr. Suresh S. Salankar
Research Area: Image Processing
113. Factors Impacting the Adoption of E-Commerce in Cooperatives
In the present study of factors impacting the adoption of e-commerce in cooperatives has been of great importance in social and economic changes causing a lot of investment for development. Adoption of e-commerce technology can have major benefits for organizations. Regarding this fact that using e-commerce technology improves the contestability of small and medium agricultural companies with large companies even in international level, adoption of it could have an important role in country development. The purpose of this study was to discuss the factors impacting on adoption including quality of systems, satisfaction of systems, self-belief, and self-efficacy, attitude toward using technology, perceived risk, socio-economic status and trust using review of library documents
Published by: Robert Mosomi Ombati, Dick Omulo
Research Area: E-Commerce
114. Mutual Funds in India (An Emerging Trends and Prospects)
Abstract Mutual Fund is an American Concept and the terms ‘Investment Trust’, ‘Investment Company’, ‘Mutual Fund’, ‘Money Fund’ etc are being used interchangeably in American Literature. Investment Company as defined in us Investment Company Act of 1940 is any issuer that is or holds out as being engaged primarily or proposes to engaged primarily in the business of investing, reinvesting or trading is securities is known as Mutual Fund Company. In British literature, Mutual Fund has not been explained, however, it is considered as a synonym of Investment Trust of the USA, similarly in India also Mutual Fund & Investment Trust is used as interchangeable terms. Key Words- Investment Trust, Investment Company, Similarly, Interchangeably, Primarily, Reinvesting.
Published by: Priyanka Sengar, Dr. B. K Upadhyay
Research Area: All India
115. An Intelligent System for Detection of User Behavior In Internet Banking
Security and making trust is the first step toward the development of both real and virtual societies. Internet-based development is inevitable. Increasing penetration of technology in the internet banking and its effectiveness in contributing to banking profitability and prosperity requires that satisfied customers turn into loyal customers. Currently, a large number of cyber attacks have been focused on online banking systems, and these attacks are considered as a significant security threat. Banks or customers might become the victim of the most complicated financial crime, namely internet fraud. This study has developed an intelligent system that enables detecting the user's abnormal behavior in online banking. Since the user's behavior is associated with uncertainty, the system has been developed based on the fuzzy theory, this enables it to identify user behaviors and categorize suspicious behaviors with various levels of intensity. The performance of the fuzzy expert system has been evaluated using a receiver operating characteristic curve, which provides the accuracy of 94%. This expert system is optimistic to be used for improving e-banking services security and quality.
Published by: Saurabh Dorle, Manish Bendale, Dr. Nitin N. Pise
Research Area: Intelligent Systems
116. Interest Free Banking in India
The role of banking is very important not now but very ancient time. In recent years a new alternative in banking has emerged at the global platform- interest free/ Islamic banking. In India various high committees have observed a voluntary faith based financial exclusion and recommendation interest free banking is a possible solution. The study seeks to inquire into the working of interest free and examine their prospectus in the light of India’s legal and regulatory frame work. The study will seek to find out major steps taken by India for introducing interest free banking.
Published by: Neeru Gupta
Research Area: Banking Law
117. Simulation Study of Low Power Comparator for A-D Converter
Abstract- Analog-to-Digital Converters (ADCs) translate the analog quantities into digital language, used in information processing, computing, data transmission and control systems. ADCs are key components for the design of power limited systems, in order to keep the power consumption as low as possible. Implantable Medical electronics, such as Pacemakers and cardiac defibrillators are typical examples of devices where ultra-low-power consumption is paramount. This paper presents the design of CMOS comparator based on a preamplifier circuit. The design is intended to be implemented in for Analog-to-Digital Converter (ADC). The design is simulated in 1 μm CMOS Technology with HSPICE. Proposed design exhibits low power consumption. Simulation results are presented and the design has DC Gain of 68dB, the power dissipation of 1.25 mW at 5 V.
Published by: Dr. M. Nizamuddin
Research Area: Electronics and Communication Engineering
118. Design & Performance Analysis of Instrumentation Amplifier at Nanoscale
In this research work, simulation and comparative analysis of Instrumentation Amplifier at different voltages. DC voltage gain is 133.4 dB, the average power is 589 mW, and bandwidth is 3.87 MHz have been computed using HSPICE Software at 0.5V. DC voltage gain is 77.84 dB, the average power is 290mW, and bandwidth is 164MHz have been computed using HSPICE Software at 1.5V. The proposed Instrumentation is efficient in medical applications due to high gain and high bandwidth. Instrumentation Amplifier based on CMOS has been designed and simulated using 32nm CMOS technology. In this design, care has been taken in the selection of the values to maintaining the gain and bandwidth of the Instrumentation Amplifier.
Published by: Dr. M. Nizamddin
Research Area: Electronics and Communication Engineering
119. Ayurvedic Medicine for Herpes / Sarpada Hunnu / Sarpa Suttu / Sarpadunnu / HSV / Genital Herpes
Diagnosis of Visarpa in clinical practice is very controversial. Visarpa is an extreme form viral and spread in similar to that of cobra venom. If not attended properly readily inflict as death. Hence Visarpa is known as the extreme form of ataxia yoga. Visarpa is an infectious disease caused by Nita group (Harpes group) of viruses this classification made according to afflicting chemical, physical, and serological criteria. Herpes simplex 1, Herpes simplex 2, Herpes zoster, Vericella zoster, Vericella, Cytomogalo virus and secondary infection to streptococcus pyogenes (Hemolytic streptococci of group A) 80 types of streptococcus pyogenes are have been recognized so far. Parisarpana is due to these infections having a lot of similarities in the clinical condition of Visarpa. Visarpa is caused by chardi vega dharana janya udavartha and also caused due to wounds fractures, crush injuries, cutting of immature part affliction by banda and fall the deranged and vitiated vatadi doshas get aggravated and thereby afflicted the twak mamsa and rakta speedily gives rise to a sort of shifting elevated shotha marked by the characteristic symptoms any of them involved in the samprapthi this swelling tends to extend all over the body. This disease is called Visarpa from the fact of extending or shifting character.
Published by: Dr. Sangamesh
Research Area: Medical
120. Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with Multiple Swarms
MANET (Mobile Ad Hoc Network) is a type of ad hoc network that can change locations and configure itself, because of moving to nodes. As MANETs are mobile in nature, they use wireless connections to connect various networks without infrastructure or any centralized administration. Open medium, dynamic topology, distributed cooperation are the characteristics of MANET and hence ad hoc networks are open to different types of security attacks. A Grey hole is a node that selectively drops and forwards data packets after advertises itself as having the shortest path to the destination node in response to a route request message. Our mechanism helps to protect the network by detecting and reacting to malicious activities of any node. The results enable us to minimize the attacks on integrated MANET-Internet communication efficiently. The simulation will be carried out by using network simulator tool so as to address the problem of detection & prevention of gray hole attack in mobile ad-hoc network. In this thesis uses Particle swarm optimization(PSO).Which monitors by changing its values because of ad-hoc nature, converges then it change its value infinite and prevent the node to send packet.
Published by: Suman Brar, Mohit Angurala
Research Area: Network Security
121. Bluetooth Low Energy: Need of the Hour
It appears fantabulous to be a part of fast apprehending complete big tech internet world, which is capable of connecting millions and billions of devices to the internet. But it seems a little bizarre that to interact with each smart device, the user would have to download a separate mobile or tablet application. We are here to deal with the same problem using beacons in this paper.
Published by: Ankita Singh
Research Area: Wireless Sensor Network
122. Efficacy of Extra-Oral Maxillary Nerve Block Technique Using Frontozygomatic Approach
BACKGROUND Pain control is an integral part of minor oral surgery and maxillary/mandibular nerve blocks have proved promising in achieving the same. Although intra-oral techniques of maxillary nerve block are common and are widely used, there are certain inherent disadvantages and potential complications. Less commonly described in the literature, the extraoral techniques have a wide spectrum of indications as well as can be more advantageous than the intraoral approach . Hence the aim of present study is to evaluate the feasibility and the efficacy of the extra-oral maxillary nerve block using Frontozygomatic approach. MATERIALS AD METHOD The study was conducted on 30 patients reporting to the Department of Oral and Maxillofacial Surgery, V. S. Dental College and Hospital, Bangalore, Karnataka from September 2015 to July 2016 taking into consideration the exclusion and inclusion criteria extraoral maxillary nerve block using frontozygomatic approach was administered. Intraoperative and postoperative complications which may include hematoma, ecchymosis, visual disturbance, limitation of mouth opening or deviation of the lower jaw and Brain Stem Anesthesia immediately following the injections. The data collected was analyzed statistically by using descriptive statistics and percentage; correlations were computed using the student Chi-Square test for proportions. RESULTS Successful anesthesia was secured in a ﬁrst attempt in 27 patients while in 1 patient, the procedure had to be repeated using local infiltration due to positive aspiration using the Frontozygomatic approach owing to the difﬁculty in reaching the target site. In 2 patients the stopper over the spinal needle reached the sphenoid bone at 30mm which is 20mm short of the actual penetration of the needle and the reason suspected to be the anatomical variations. A majority of the patients i.e., 53.3 % scored 0–2 (no pain) on visual analog scale (VAS) while 11 patients experienced mild pain and only 3 patients experienced a moderate degree of pain. Subjective symptoms were reported in 22.73 s (mean value) and 18.3 s (mean value) in the palate and the infraorbital fossa respectively. Peak effect of anesthesia was noted in 62.8, 39 and 31.71 sec (all values expressed as mean) in the palate, infraorbital fossa, and posterior superior alveolar areas respectively. CONCLUSION Although with only dental extraction as the procedure of choice, the present study has favored the frontozygomatic angle approach for the maxillary nerve block as simple, safe, efﬁcacious and associated with the minimum and clinically mild complications.
Published by: Dr. Smriti Ticku, Dr. Prashanth .R
Research Area: Oral Surgery
123. Acoustic Analysis of Nasal Consonants during Fast and Normal Speaking Rate in Malayalam Speaking Adults
The nasal consonant is produced when the velum is lowered and the air stream is allowed to flow out through the nose to produce [m] and [n].the present study investigated the acoustic characteristic of nasal consonants across two different rates of speech i.e. normal and fast rate in 19-25-year-old young adults. A total of 30 young adults participated in the study. These were native speakers of Malayalam with no history of speech, language and hearing problems. The subjects were asked to repeat back the words presented in normal and fast speaking rates. The responses were recorded using PRAAT software. The acoustic parameters including mean pitch, jitter, shimmer, SNR, and HNR were acoustically analyzed for the normal and fast rate of speech.
Published by: Salimsha Nazer, Sangeetha Suresh
Research Area: Audiology and Speech Language Pathology
124. Stabilization of Power System using Artificial Intelligence based System
This paper reviews limitations of traditional control system and modern control system controllers, which are overcome to some extent using artificial intelligent techniques, such as ANN, Fuzzy Logic, Expert System, Particle Swarm Optimization, Genetic Algorithm, etc. The review shows that efforts are made towards Power System Stabilizer based on Artificial Intelligent Techniques, which will give a positive impact on the system stabilities and improve system performances.
Published by: Mr. Piyush Agnihotri, Mr. Jitendra Kumar Dwivedi, Dr. Vishnu Mohan Mishra
Research Area: Power System and Control
125. A Sociological Study of Secular Principles of Murughamat of Chitradurga
Sri Jagadguru Murugharajendra Brihanmath is an outstanding institution in Religious History of Karnataka. The Math is situated on the western side of Chitradurga in a beautiful and calm location. With a celebrated tradition of more than three centuries. The Math, engaged itself in social, religious, educational and cultural activities, is rendering a yeoman service in the development of the state. Thus it is a great asset of the country and hence has acquired a high place. Though it is called in several ways live Murige Math, Muriga Math, Murugha Math, Vishala Math, Maha Math, etc., it is popularly known as Murugi Math. We affirm humanism as a realistic alternative to theologies of despair and ideologies of violence and as a source of rich personal significance and genuine satisfaction in the service to others
Published by: Ananda .S
Research Area: Sociological
126. Investor’s Perception on Foreign Direct Investment (FDI) in Stock Market a Study with Special Reference to Chennai City
The paper puts light on our foreign direct investment schedule in stock exchanges, an overall approach to understand what investors think about it and how they react to it with regard to their investment criteria, whether they feel it is safe and profitable to invest in an MNC over a domestic concern or allowing more foreign concerns to establish themselves here would prove beneficial to the concerns of our country and would grow leaps and bounds.
Published by: F. Asiya Khilji
Research Area: Commerce
127. Preliminary Studies on Antidiabetic, Antimicrobial and Antioxidant Activities of Rare Medicinal Plant Epaltes Divaricata (Linn.)
Pharmaceutical industries are still in the hunt of effective scavengers for free radicals from the unexplored medicinal plants. About 80,000 species of plants are utilized for treating various diseases in different systems of Indian medicine. Many pharmaceutical companies giving importance in plant-derived drugs mainly due to the current widespread belief that 'Green Medicine' is safe and more dependable than the costly synthetic drugs, which have adverse side effects. The objective of the study is isolation of phytochemical active constituents, antidiabetic, antimicrobial and antioxidant activities of the rare antidiabetic medicinal plant Epaltes divaricate (Linn.) since the selected plant has varied medicinal properties used in Ayurveda. This valuable plant is used in traditional ayurvedic medicine to alleviate jaundice, diabetes mellitus, urethral discharges and acute dyspepsia. It is also regarded as a diaphoretic, diuretic and a stimulating expectorant. The methanol extract of Epaltes divaricate L. showed excellent antimicrobial activity against bacteria and fungi. Phytochemical analysis was carried out for the same extract by two different standard methods and which confirmed the presence of steroids, triterpenoids, and phenolic compounds. Decreasing of postprandial hyperglycemia is a therapeutic approach for treating diabetes mellitus. This can be achieved in current trends through the inhibition of carbohydrate hydrolyzing enzymes such as alpha-glucosidase and alpha amylase. Agents with α-amylase and α-glucosidase inhibitory activity are very useful as oral anti-hypoglycemic agents for the control of hyperglycemia in patients who have diabetes mellitus. In this study, the methanol extract exhibited above 50% of inhibition in all standard concentration.
Published by: R. Vijayaraj
Research Area: Biotechnology
128. Smart Group-Based Work in Cognitive Radio Network
In this paper, consider the multiple channels and group-based cognitive radio network, the secondary users having heterogeneous sensing ability in terms of high accuracy for sensing. We use cooperative spectrum sensing (CSS) scheme for cooperating secondary users in multiple workgroups such that different work group is responsible for sensing different channel. The group-base CSS scheme use in workgroup we share the channel in same cooperating users are in multiple rounds.In this work, we propose adaptively assigning that the heterogeneous Co-operating secondary users to different groups to maximize the throughput efficiency while maintaining a predefined sensing accuracy. In Cognitive Radio Network is detected by channel are use or not, if not the avoid are there but sometimes the lot of constraints & challenges, also issues are there it get the amount of busy server. The PU users get not possible to provide network then use smartly SU.It provides a network to group-based with the help of different sensing round. The Heterogeneous group based channel shares CSS scheme. It is Adaptive Secondary User’s solve problem about Heterogeneous Group user and achieves that the maximize throughput efficiency & low computational complexity significantly that can be as compared with existing non-adaptive assignment and sequential CSS scheme.
Published by: Aniket Nale, Dhaigude N. B
Research Area: Communication
129. Physical and Cyber Crime Detection using Digital Forensic Approach: A Complete Digital Forensic Tool
Criminalization may be a general development that has significantly extended in previous few years. In order, to create the activity of the work businesses easy, use of technology is important. Crime investigation analysis is a section record in data mining plays a crucial role in terms of predicting and learning the criminals. In our paper, we've got planned an incorporated version for physical crime as well as cyber crime analysis. Our approach uses data mining techniques for crime detection and criminal identity for physical crimes and digitized forensic tools (DFT) for evaluating cybercrimes. The presented tool named as Comparative Digital Forensic Process tool (CDFPT) is entirely based on digital forensic model and its stages named as Comparative Digital Forensic Process Model (CDFPM). The primary step includes accepting the case details, categorizing the crime case as a physical crime or cybercrime and sooner or later storing the data in particular databases. For physical crime analysis, we've used k-means approach cluster set of rules to make crime clusters. The k-means method effects are a lot advantageous by the utilization of GMAPI generation. This provides advanced and consumer-friendly visual aid to k-means approach for tracing the region of the crime. we have applied KNN for criminal identification with the help of observing beyond crimes and finding similar ones that suit this crime, if no past document is discovered then the new crime sample are introduced to the crime dataset. With the advancements of the web, the network form has become much more complicated and attacking methods are furthermore than that as well. For crime analysis, we're detecting the attacks executed on a host system through an outside the usage of assorted digitized forensic tools to produce information security with the help of generating reports for an event which could need any investigation. Our digitized technique aids the development of the society by helping the investigation businesses to follow a custom-built investigative technique in crime analysis and criminal identification as opposed to manually looking the database to analyze criminal activities, and as a result, facilitate them in combating crimes.
Published by: Dr. Nilakshi Jain, Neha Bhanushali, Sayali Gawade, Gauri Jawale
Research Area: Computer Science
130. Human Depth Perception
We introduce the perceptual issues relevant to seeing three dimensions in digital imagery. Technological constraints like limited field-of-view and spatial resolution prevent the display of images that match the real world in all respects. Therefore, only some elements of real world depth perception are utilized when viewing 3D CGI. Depth Cue Theory is the main theory of depth perception. It states that different sources of information, or depth cues, combine to give a viewer the 3D layout of a scene. Alternatively, the Ecological Theory takes a generalized approach to depth perception. It states that the HVS relies on more than the image on the retina; it requires an examination of the entire state of the viewer and their surroundings (i.e., the context of viewing). In this paper, we rely on Depth Cue Theory, although we acknowledge the importance of visual context where appropriate. As seen later, the type of visual environment and the viewer’s task play a significant part in the effectiveness of a 3D VDS. Both theories assert that there are some basic sources of information about 3D layout. These are generally divided into three types: pictorial, coulometer and stereo depth cues. The perceptual process by which these cues combine to form a sense of depth is a complicated and outdebated issue. Different approaches to measuring the ability to perceive depth have also been posited. We discuss these issues with respect to CGI.
Published by: Ajit Kumar Sharma, Kiran Kumari
Research Area: Computer
131. Smart Grid Technology for Intelligent Power Use
The existing Power Grids is antiquated, congested and inefficient in many ways and it does not take full advantage of new automation technologies that for example can prevent an outage or restore power much faster after an outage. It does not take advantage of new materials which can make the equipment throughout the grid more efficient. It was not designed for integrating large amounts of renewable energy generation into the grid which is necessary in order to reduce greenhouse gas emissions and prevent climatic changes. This paper proposes a method for better implementation of smart grids that integrates technologies of advanced sensing, control methodologies and communication capabilities into the current power grids at both the transmission level and distribution levels.
Published by: Aniket Jambukar, Mr. Rohith Prakash
Research Area: Embedded Systems
132. Advanced Fuzzy Logic based Image Watermarking Technique for Medical Images
The segmentation algorithms vary for the types of medical images such as MRI, CT, US, etc. The current study work can further be extended to develop a GUI tool based approach for separating the ROI. Additionally, a new technique of separating ROI from the original image that will be applicable for all type of medical images can be evolved. Separated ROI can be stored with min, xmax, ymin and ymax value so that at the end of embedding process before transmitting watermarked image, the segmented ROI can be attached with watermarked image. Any medical image watermarking approach will be suitable, if we segment the ROI from the medical image with the four values, then embedding of the watermark can be done on whole medical image, in this paperwork on a different scan like ctscan ,brain scan etc. our results significant high than other.
Published by: Kamalpreet Kaur, Er. Suppandeep Kaur
Research Area: Image Processing
133. In Vitro Antioxidant Potential of Pure Fractions of Eclipta Alba
Abstract–Oxidative stress and Ultraviolet (UV) irradiation-induced skin damage, is involved in numerous diseases. Eclipta alba which belongs to Asteraceae family is used traditionally in ayurvedic system of medicine in India for the treatment of liver diseases. Our study shows that water extract of E. alba has a potent effect in scavenging 1, 1-diphenyl-2-picrylhydrazyl (DPPH), chelating ferrous ion, and superoxide radicals, exhibiting IC50 values of 0.21 mg/mL, 1.20 mg/mL, and .49 mg/mL, respectively. Identification and quantification of the wedelolactone, one of the active constituents of the Eclipta alba plant extract, was carried out by HPLC analysis. The result of the present study indicates that the Eclipta alba extract shows a high amount of ascorbic acid, tannins, flavonoids, phenolics, contents. The hydroalcoholic extract of Eclipta alba effectively scavenged free radicals at all different concentrations and showed potent antioxidant potency. Eclipta alba extract shows antioxidative properties.
Published by: Anjali Singh, Ayodhya Singh, Vandana Dwivedi
Research Area: Chemistry
134. Robust H∞ Control of Discrete-Time Uncertain Recurrent Neural Networks with Discrete and Distributed Interval Time-Varying Delays
This paper is concerned with the problem of delay-dependent H∞ control of discrete-time uncertain recurrent neural networks with time-varying delays. The neural network is subject to parameter uncertainty, and time-varying delay. For the robust H∞ stabilization problem, a state feedback controller is designed to ensure the global robust stability of the closed-loop system about its equilibrium point for all admissible uncertainties. By using the Laypunov-Krasovskii functional, a linear matrix inequality (LMI) approach is developed to establish sufficient conditions. A simulation example is exploited to show the usefulness of the derived LMI-based stability conditions.
Published by: K. Meenakshi, M. Syed Ali
Research Area: Neural Networks
135. Postponed Optimized Report Recovery under Lt Based Cloud Memory
Fountain code based conveyed stockpiling system give a solid online limit course of action through putting unlabeled subset pieces into various stockpiling hubs. Luby Transformation (LT) code is one of the predominant wellspring codes for limit systems in view of its viable recuperation. In any case, to ensure high accomplishment deciphering of wellspring code based limit recuperation of additional segments in required and this need could avoid additional put off. We give the idea that distinctive stage recuperation of piece is powerful to lessen the document recovery delay. We first develop a postpone display for various stage recuperation arranges pertinent to our considered system with the made model. We focus on perfect recuperation arranges given essentials on accomplishment decipher limit. Our numerical outcomes propose a focal trade-off between the record recuperation delay and the target of fruitful document unraveling and that the report recuperation deferral can be on a very basic level decrease by in a perfect world bundle requests in a multi arrange style.
Published by: C. Lavanya, M. Babitha
Research Area: Cloud Computing
136. An Investigative Study On The Leaf Spots Of Achyranthes aspera .Linn.
Plant leaves often offer a good harbor to both epiphytic and endophytic organisms. The present work investigated the association of leaves of Achyranthes Aspera, Linn. plants, and a crape myrtle aphid. Leaves with circular rose-red patches (on the underside) were collected and examined thoroughly. The spots and subsequent curling of the leaves were resulted due to the harboring of an endophytic aphid. The mites were isolated and sent for identification. The isolated aphid was identified as Tinocallis kahaluokawalani (Kirkaldy). The leaves are highly medicinal, but the aphids changed its anatomy and morphology.
Published by: Sunitha Subramanian, Liji T. J.
Research Area: Plant Pathology
137. Management of Organisational Transformations
Transformation is a term related to reengineering, redesigning and redefining business systems or any other domain. Organization transformation can occur in response to or in anticipation of major changes in the organization’s environment or technology. Some of the triggers might be organization’s culture, self-designing and organization learning and knowledge. Transformational changes are triggered by environmental and internal disruptions like industry discontinuities, product lifecycle shifts and internal company dynamics. Change can be systematic and revolutionary reshaping the organization’s culture and design element and altering the nature of the organization. Change demands a new organizing paradigm.
Published by: Jyoti M
Research Area: Management
138. IT Portfolio Management and its Relevance
Project and project portfolios are part of the strategic management of the firm as they lead to successful strategy implementation. Multifaceted benefits and goals of a portfolio must be set before the selection of projects in order to meet the firm’s objectives. Corporate strategy is made on a business level and filtered down to the portfolio and project level. The firm’s resources have to be allocated to the portfolio in line with the strategy. Portfolios are analyzed by the consistency of the project portfolio with the corporate and the business strategy. The project evaluation and portfolio selection are addressed by the degree of formalization which analyses the consistent application to all projects. Project portfolio structuring should consist of consistency, integration, formalization and diligence.
Published by: Jyoti M
Research Area: Portfolio Management
139. Smart Refrigerator using Internet of Things (IoT)
The refrigerator is the most frequently used domiciliary/kitchen electrical appliance all over the world for food storage. Principally this appliance is used for various tenacities like storing vegetables, fruits etc. Smart refrigeration module is designed to convert any existing normal refrigerator into a smart and low-cost machine using sensors. Smart refrigerator compares the status of the food for e.g. weight, quantity etc. The significance of this work will be removable of food spoilage, reduce illness and make a healthier lifestyle of modern age human being. The smart refrigerator is capable of sensing and monitoring its contents and also provides advantageous features. The smart refrigerator is also able to remotely on-off control and notifies the user about scarce products via wifi module (internet) on user’s mobile android application. It also facilitates the purchase of scarce items by providing a one-touch button on mobile application from predefined nearer grocery vendor of that particular item by sending SMS. The core functionality of the smart fridge is to maintain, with minimum effort, food items which might want to be purchased as soon as they run out. As a result, the user is notified every time if eggs are finished. The load cell triggers a notification of available fewer vegetables to the user as soon as the applied pressure is below threshold kg. IR proximity sensors monitor the containers in which milk or juice are sensed. Additional functionality includes the ice ready indication, power saving, smell detection, overweighting etc.
Published by: Prof. M. K. Sangole, Bhushan Sunil Nasikkar, Dhananjay V. Kulkarni, Gitesh K. Kakuste
Research Area: Refrigerator, Internet of things (IoT), Arduino board, Arduino IDE software, Android studio, Sensors.
140. Crime File System
The project is aimed to develop a crime file for maintaining computerized records of all the F.I.R against crime. The system is a desktop application that can be accessed throughout the police department. This system can be used as an application for the crime file of the police department to manage the records of different activity of related to first information report. In such desktop crime file system, we will manage all such activities (like registration of the complaint updating information, searching a particular viewing of the respective reports of crimes) that will save time and manpower. This software is for police station which provides facilities for reporting crimes, complaints, FIR, charge sheet, prisoner records, and show most wanted criminal’s details. This system will provide a better perspective for the enhancement of organization related to quality and transparency.
Published by: Dr. Nilakshi Jain, Siddharth Agarwal, Gaurav Joshi, Rahul Gupta, Aditya Kataria
Research Area: Computer Science
141. Social and Environmental Study on Wind Power Development in Ayeyarwaddy, Myanmar
To integrate the power grid and more efficient power serving to the local residents of Ayeyarwaddy Region, wind power is a better resource for this study of social and environmental findings. The main objective is to provide a better understanding of the socio-economic requirements that contribute to the integration of wind energy in sustainable power supply systems. The demonstration wind farm area was performed by excluding the social land use. The wind farm siting was observed with sufficient distance from the residences to effect environmental impact appropriately in noise emission and in shadow flickering by employing Noise calculation model: Danish 2007 and shadow flickering model in WindPro software. These acquired results are not high impact to the local residents at Kyonkadun village, Ayeyarwaddy Region. Hence, this paper will initiate new discussions about the future of wind power project and safeguard the long-term societal acceptance in Ayeyarwaddy Region, Myanmar.
Published by: Thi Thi Soe, B. Krishnan, K. Boopathi, S. Gomathinayagam
Research Area: Energy Engineering
142. Accessing Information of Emergency Medical Services Through Internet of Things
IoT is the advanced technology which is use in daily life. IoT makes easy to connect different smart devices with each other by using the internet. IoT is given the ability to the computer system to run application program from different vendors. So in this paper, we are accessing the data based on IoT technology for emergency medical services. The fast development of Internet of Thing.
Published by: Miss. Pooja Ambalkar, Prof. Amruta Gadekar, Miss. Mayuri Manjare, Miss. Reema Malvi
Research Area: Data Mining, Android
143. Dual Layer Video Encryption and Decryption Using RSA Algorithm
Video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption.
Published by: Swaleha Najakat Sayyad, C. V. Nalawade, Pramila S. Sutar, Rani S. Pise, Vidhya H. Raut
Research Area: Security purposes
144. Preparation, Structure and Characterization of Nd2Mo2O9 Fast Oxide Ion Conductor
The structure and ion conductivity of Nd2Mo2O9 powders were synthesized by using Nd(NO2)3, MoO3, and aspartic acid (fuel) in assisted combustion method with heating at 550˚C for 6 hours. The thermal decomposition, phase identification, morphology, ionic conductivity of the samples were studied by TGA/DTA,XRD and SEM four probe D.C. method respectively. The formation of Nd2Mo2O9 was confirmed by FTIR studies. The synthesis and crystallization were followed by thermochemical techniques (TGA/DTA) studies. The synthesized materials showed reasonable ionic conductivity. These results indicates that assisted combustion method is a promising method to prepare nano crystalline Nd2Mo2O9 for solid oxide fuel cell.
Published by: M. Rajasekhar, N. Kalaivani
Research Area: Advanced Energy for Solid Oxide Fuel Cells
145. Innovative Techniques in Store Atmospherics by Retailers for Favourable Customer Perception
The most unconventional techniques in marketing is “Guerrilla marketing” it is a most impacted concept which is growing in the marketing techniques which is used in the industry.An extraordinary and trending modern technique in marketing the product and promoting that makes use of unconventional or unusual means of promoting the product to the market. Making use of various marketing techniques to entice more customers and to attract and convince them to buy among the various range of products offered by the retail stores. As the guerrilla concept is defined from a very old and unconventional technique which were used by the militants in the wars to maximum utilization of their workforce. In retail stores, there are many techniques used to create an atmosphere for purchases as in when the customers walk into the store. As the story is based on designing, the point of sale, convenience, visual appearance, an appeal that impacts the customers towards the purchase and decision making. There are various design used in store like Three store layout design, lighting, visual communication boards, display fixtures, idea-oriented techniques, presentation based on styles, colors, pricing presentation and pricing segmentation's, spacing techniques, techniques used for locating the merchandise, prioritizing the categories based on the needs and availability and use of these techniques to handle a diversified range of products in the store. And making use of these techniques the retailers have an impact on customers buying and decisions making as well as on their perceiving behavior. Exploratory research is undertaken in this study to undertaken and to bring to a conclusion about the relationship between innovative ideas and consumer perception.
Published by: Murali Krishna, Dr. Guru Basava Aradhya, Dr. Subhashree Kar
Research Area: Retail Management
146. Understanding Consumer Perception of Price-Quality-Value Relationship
Abstract-In India as the level of competition keep on increasing day by day for automobile market, it is essential for every automobile company to understand customer insight in order to provide best value judgement. Thus, they need to understand how consumer compares price-quality-value of an automobile. Therefore, the objectives of this research is to study the relationships of perceived quality, perceived value and perceived price that will affect consumers purchase decision towards cars. Survey using convenience sampling was done at Ludhiana city. Questionnaires were distributed to 320 respondents at the sampling location. Finally a sample of 280 used for final analyses. The study revealed a positive impact of perceived price over perceived quality; perceived quality over perceived value and a negative impact of perceived price over perceived value. The results from this research provide a platform for Ludhiana automobile makers to appreciate consumer value judgement and how it affects their purchase decision. In order to ensure that the findings are illustrative and convincing, future research should include more constructs like brand image of an automobile, customer experience, culture etc.
Published by: Tahira Khanam Quareshi
Research Area: Marketing
147. Inclined Lander for Shock Alleviation
Paper gives a theoretical solution of shock absorption and represents behavior of inclined Lander during the process of impact landing. It shows a clever mechanical design for shock alleviation and also decreases the chances of accidents during the landing impact. For a long period of time, landing gear or Lander is an important area of research. This paper use theoretical force deflection method for shock alleviation and an analysis of equilibrium of Lander (with help of mass spring damper system at a constant damping) when landed on finite degree inclined. The Inclination of landing gear and effect of wheel spin-up loads is characteristics of dynamic force deflection.
Published by: Vishal Tiwari, Harikant, Pandey A. K.
Research Area: Aerospace
148. Automated Negotiation in a B2B Environment
Automated negotiation is one of the predominant features of present day e-commerce applications. Most of the e-commerce platforms are nowadays using automated negotiation strategies to deal with enormous amount of decision-making to come to the most viable solutions to complex negotiation queries. The research in automated negotiation is focused mainly on the theory about negotiation protocol and strategy. E-commerce is constantly evolving with new aspects every day. B2B based e-commerce applications are also gaining speed and as such the requirement for automated agents based negotiation in a B2B environment is envisaged, by large sized e-commerce platforms. This paper discusses an implementation of automated negotiation for a B2B environment. This paper points out that making the automated negotiation system as a software service is a feasible way for the practical application of the automated negotiation system. It then discusses a roadmap for the development of automated negotiation system using the software agent technology.
Published by: Hari Shanker Tripathi, Dr. Santosh Kumar
Research Area: Computer Science & Engineering
149. Internet Addiction & Social Values
Internet addiction is described as an impulse control disorder, which does not involve the use of an intoxicating drug and is very similar to pathological gambling. Some internet users may develop an emotional attachment to online friends and activities they create on their computer and mobile screens. Internet users may enjoy aspects of the internet at hat allow them to meet, socialize and exchange ideas through the use of chat rooms. Social networking website or virtual communities are similar to other addiction. Those suffering from internet addiction use the virtual fantasy world to connect real people to the internet, as substitutions for real life human connection which they are unable to achieve normally. Internet addiction results in personal family academic financial and occupational problems that are characteristics of to their addictions, Impairments of real life relationship are disrupted as a result of the excessive use of the internet. Spend less time without real people in their lives and are often viewed as socially awkward. They are regulating the social values. Social Values from an important part of the culture of the society.Values provide the general guidelines for social conduct, values such as fundamental duties, Patriotism, respect for human dignity, rationally, sacrifice, individuality, equality, democracy etc. These are guides our behavior in many ways. The adolescent is the important stage of life, it makes the aims and direction of the life. During adolescent period Internet addiction causes the social values deprived and it results as a failure and stress full person for society. Social values are required for the development of a good society but the adolescent is neglecting and giving less priority to these values which are a major problem for our society.
Published by: Suchitra Behera
Research Area: Computer Science
150. A study on Marketing Challenges and Opportunities of Women Entrepreneurs through Self Help Groups in Chennai City
Women entrepreneurs are the prospect key of Economic amplification or a revelation for both developing and under developing countries. Presently entrepreneurship has a major contribution to global economic growth. The male flock are trying a lot for the entrepreneurship and providing nearer to passable financial contribution for the country. However, still the women entrepreneur’s skill and talent is glass ceiled, as well as dominated by the cultural and Geographical behavior by the society. Thus, the study aims to examine the marketing challenges and opportunities of women entrepreneurs through SHG’s in Chennai. The reason is to selecting Chennai city as a Sample because, the convenience of the researcher for data collection process. The study is based on both primary and secondary data. Liker’s four point scale and Convenient Sampling method were used in this study for selecting the samples and the sample size for the study was fifty. With a view of analyzing the data, percentage analysis and Pearson’s chi-square test were used. A master table was prepared for entering the responses of each respondent and small cross tables were made from the master table for analysis. Hence the study concludes that women entrepreneurs in Chennai city are not facing many challenges, but having fine opportunities all are not utilize for their dynamic marketplace. Research findings from the paper will be valuable to aware the challenges faced as well as encountered by women entrepreneurs. Opportunity is provided to play in the open ground to prove their hidden talents, but unaware about the support show cased before they are highlighted to awake them.
Published by: D. Leelavathi, Dr. J. Sulaiman
Research Area: Women Entrepreneurs In Self Help Groups
151. Impact of Autonomous Learning on the Achievement Level of Students of IXth Grade
The word autonomy was derived from ancient Greek words autonomia and nomos which means "self" and "law" respectively, hence when combined understood to mean "one who gives oneself one's own law is a concept found in moral, political, and bioethical philosophy”. Within these contexts, it is the capacity of a rational individual to make an informed, un-coerced decision. In moral and political philosophy, autonomy is often used as the basis for determining moral responsibility and accountability for one's actions. One of the best known philosophical theories of autonomy was developed by Kant. In medicine, respect for the autonomy of patients is an important goal, though it can conflict with a competing ethical principle, namely beneficence. Autonomy is also used to refer to the self-government of the people. This paper is an attempt to understand how this concept of autonomy actually works with students, how the students’ performance is influenced by the concept of autonomy.
Published by: Dr. Meenakshi
Research Area: Education
152. Implementing Directive Principles to Promote Better Livelihood Conditions, Public Health and Assistance
Our Country has progressed and developed in the world as an important Nation, but till today we are far away from achieving better livelihood conditions public health and assistance. Therefore the article mainly focuses on implementing Directive Principles to promote and distribute natural resources as the State legally owns these natural resources on behalf of the actual owner the people. The article explains that these principles impose certain obligations on the State to take affirmative action in certain directions to promote the welfare of the people and achieve socio-economic rights and to set of instructions to Lawmakers and Executive. The article also explains that these Directive Principles of State policy in our Constitution are made not - justiciable directly but indirectly these principles are fundamental in the governance of the country in making laws. Thus Article concludes to achieve the goals enshrined in the Constitution directly or indirectly that is the spiritual essence of our Constitution.
Published by: Asha Rani
Research Area: LAW
153. Mud Architecture
The purpose of writing this paper is to understand the viability of a material like mud in contemporary time, as I had a question that is it viable to think that mud is contemporary material or not, it was the only available building material in the history, Even today it is available in many areas of world and people do build their dwelling using it, but when the modern materials were introduced such as reinforced concrete, steel, and bricks. These materials triumphed over it. Keeping the question in mind, I decided to investigate mud wall construction techniques. To explore the idea, I have gone through different books and articles. So keeping it in mind, I decided to a comparative analysis of mud wall construction techniques and some perception.
Published by: Priyanka Danal, Suman Sharma
Research Area: Architecture
154. Understanding the Concept of Asthikshaya at the level of Kati Kasheruka
As for how the trunk of the tree is stable because of the inside pith, same way, the share is dependent on the Asthi for the Sthiratha or stability. This is so much strong that, even after the complete disintegration of the skin, muscles and other avayavas, asthi doesn’t get deteriorated easily. And also, the muscles, vessels, ligaments and tendons are seen taking support on to the asthi itself for the proper mobility and facilitation of the vessels. Prustha vamsha, the Vertebral column forms the Central axis for the whole of the skeletal frame work of the body. It is a long bony structure lying in the midline, starting from the base of the Kapaala (skull), till the base of the shroniphalaka. This is formed by the stacks of Kasheruka arranged vertically. The whole prusthavamsha is dynamically coordinated with the kandaras and helps in maintaining the posture, stability, and flexibility. Most of us take this juxta position of strength, structure, and flexibility for granted until something goes wrong. Prustha vamsha is a complex, intricate construct that includes a variety of nerves, bones, joints, tendons, ligaments and muscles woven together. It is designed to be incredibly strong, protecting the highly sensitive nerve routes, yet highly flexible, providing the mobility on different planes. This Whole column of vertebrae has four curvatures anteroposteriorly alternating each other, in order to maintain the stability and posture of the body.
Published by: Dr. Damodar Mone
Research Area: Shareera Rachana
155. A Comparative Clinical Study of Grithayavakshara Lepa and Katutaila in Management of Padadari W.S.R Rhagades
Padadari is one of the commonest and most neglected diseases. Most of the people work in farms in wet soil or water without protecting the feet. Some people don’t use foot wears and walk bare foot. Such reason leads to incidence of cracking the skin of the feet, which is very common. The present study objectives are to evaluate the efficacy of Madanadi Lepa with and without Siravyadha in Padadari. In this trial, total 40 cases were studied into two groups as ‘A’ and ‘B’ each group consisting of 20 patients, Group A patients was advised Madanadi Lepa and Group B Siravyadha with Madanadi Lepa. The present study reveals that in Group A, none had complete relief, 2 patients (10%) had marked improvement and 11 patients (55%) had Moderate improvement, 7 patients (35%) had mild improvement.In Group B, none had complete relief, 3 patients (15%) had marked improvement, 13 patients (65%) had Moderate improvement and 4 patients (20%) had mild improvement After the total course of intervention, the data obtained towards the results indicate that Group B showed good response on symptoms than Group A after treatment and at the end of follow up. It was an attempt made to clinically compare the effect of Sagritha Yavakshara Lepa and Katutaila abhyanga in Padadari.
Published by: Dr. Sunil .A. Arali
Research Area: Ayurveda
156. A Review on Srotus with Its Anatomical Structures with Special References to Raktavaha Srotus
The channels which are widely spread in all the spaces of the body, where circulation of the fluids and it is not only arteries and veins.Srotus are the system that carry or circulate the doshas and dhatus or their elements to the various organs.Raktvaha srotus refers to channels involved in the blood circulation. Description of the different elements or organ involved in the raktvaha srotus. In this article an attempt has been made to understand rakta vaha srotus as described in Ayurveda with its anatomical structures.
Published by: Abhishek Shah
Research Area: Ayurveda
157. A Review On Garbhotpadaka Samagri With Special Reference to Ambu
Since always the life has existed on earth the main and formost aim of human beings was to lead a healthy and disease free life. Ayurveda being a ‘science of life’ provides not only curative but also preventive principles for healthy and long life. It has paid much attention on preventive principles not only after birth but since very beginning i.e. before the formation of gametes. Since the decision of a child is taken to procure a disease free and healthy (mentally nad physically) baby, garbhotpadaka samagri gets into role to provide optimal health to mother and baby. Ayurveda explains regime and rituals before pregnancy to take care of fetus from the very beginning of formation of gametes to promote well being and efficacy of body (dosha,dhatu,mala) , metabolism(agni), perception elements(indriyas) , psyche(manas) , intelligence(buddhi) and inner spirit(atma). For a healthy pregnancy the pre-requisites explained by ayurveda are- Ritu (fertile period) kshetra (uterus) ambu (nutritive ahar rasa) beeja (shukra and artava-sperm and ovam) are as the primitives.Along with some others like marga(genital passage) hridi(pure controlled consciousness). Thus , the care for above pre conception factors is must in interest of future of society and to improve health in developing countries.
Published by: Dr. Anshika Ray
Research Area: Ayurveda
158. Synthetic Drugs/Hormones – Boon or Bane-Concept of Dooshivisha and Gara visha
21st century is the world full of synthetics and everyone are living in the influence of synthetic substances. Altered life styles, food habits and irregular sleep pattern had resulted not only Non communicable disease but also resulting in reduced immunity and is risking the person more for infections. Pharma Industry has grown as big as hierarchy in recent centauries and introduces new chemical molecules quoting as capable for treating diabetes, hypertension etc. But bitter truth is prolonged usage these medications itself has adverse effect on liver and kidneys causes hepatotoxicity and nephrotoxicity or organs specific toxicity. Development of Anti hypertensive medicine and anti diabetic drugs is considered to be a boon in the management of the respective diseases and safety evaluation of the same medicines are shown as lifesaving. But one has forgotten that these medicines are not given for a specific day but they are taken for longer duration and eve more than 20-30 years and threat a serious complications to the body organs and was not highlighted in previous decade.
Published by: Dr Vishnu Sivan
Research Area: Ayurveda
159. A Statistical study on Network Service Providers in Kashmir
Survey methodology studies the sampling of the individual from a population and data collection with a view towards making statistical inferences about the population represented by the sample and the constructs represented by the measures. In this paper, data has been collected from different colleges related to network service providers and statistical analysis has been made in MINITAB with many conclusions like the students belonging to rural are more using cell phones rather than urban students. Not only this but also, majority of the students are of the opinion that mobile has a large bad effect on children. The graphical representation has been given with respective contents included in the paper.
Published by: Faizan Danish, S. E. H. Rizvi, M. Iqbal Jeelani, Sunali Mahajan
Research Area: Applied Statistics
160. Comparative clinical study on the effect of Nasyakarma and Shiroabhyanga with Gunjaadi Tailain the management of Ardhavabhedaka
Ardhavabhedaka is one among 11 types of shiroroga said by our acharyas .Totally variants are vataja, pittaja,kaphaja,sannipataja,raktaja,krimija,kshyaja,suryavartha,ardhavabhedaka,shankaka,ananthavata.Above all ardhavabhedaka is found to be the most common complaint now a days. In this main complaint is ardhashirashoola is the substinanat in one half of the shiras, manya, akshi’bhru, lalata, karnapradesha. Atacks are atonce in 3days,once in 15 days,and once ina month.ACHARYAS had explained regarding prognosis of disease ,that if left untreated ,dieseae get aggravated and ieads to impairment of eyes and ears. Our acharyas had taken many panchakarma procedures for the treatment of various shiroroga. Hence in this research study we have opted NASYAKARMA4,,SHIROABHYANGA4 with gunjaadi tail.
Published by: Dr. Geeta Hiremath
Research Area: Ayurveda
161. Juvenile Crimes in India and the Law
In our society juvenile offenders are increasing day by day and juvenile delinquency crime is one of the burning issue in all over the world. So the purpose of the article is to reduce juvenile delinquency from the society. The article explains who is juvenile. The study focus on reasons behind juvenile offender. The paper argues that family problem, social environment, mantle torture, educational dissatisfaction and lack of legal provisions are also factors that constitute such offender. The paper reveals the historical development about the definition, legal provisions and Acts on juvenile offender. The article describes what step should be taken to improve their situation in the society.
Published by: Asha Rani
Research Area: Law
162. The Changing Role and Legal status of Women in India
As women is the pillar of our society who plays a vital role to built the nation . This paper shows the importance of woman. The article is an attempt to describe the changing role and her legal rights in India. The study also analyze the status of women in various area like freedom movements, political participation etc. The study also reveals that Indian women have somewhat lower status then that of men inspite of many efforts undertaken by the government and constitution of India. She also has to suffer various crimes that are describes here. The article provides various legal and constitutional remedies to improve her position. Thus article concludes by an observation that access to education and employment are only the tool that enable them to achieve their goals , however it depends largely on the attitude of the people towards gender equality.
Published by: Asha Rani
Research Area: Law
163. Review of Ayaskriti
A review of ayaskrititime immomarial of rasashastra, it is usrd in Sukshma churna of dhatu was existing.
Published by: Roopa Sonya
Research Area: Ayurveda
164. Impact of Iron and Steel Industry on Ground Water Quality of Tungabhadra River Water in Bellary District (India)
Bellary district has 25 % of India's Iron ore reserves and is well known for its rich iron and manganese ore reserves. Iron ore deposits in Bellary district are widespread and have been a backbone of industrial development in the region. The environmental impact of large-scale mining activities includes soil erosion, a formation of sinkholes, loss of biodiversity, and contamination of soil, groundwater and surface water by chemicals from mining processes.In this paper, efforts have been made to assess the quality of Tunga - Bhadra river water extensive survey and laboratory analysis which would give the information about ‘Impacts on reservoir water quality’ due to the Iron and steel industry. Also, an attempt has made for controlling the groundwater pollution, which would serve as a basis to evolve suitable management strategy for the District. Therefore there is significant changes in values of different parameters of ground water sources indicate the influence of industrial wastes on groundwater.
Published by: T. H. Patel, V. Venkateshwara Reddy, S.R. Mise, P. Shiva Keshava Kumar
Research Area: Environmental Enggineering