Volume-3, Issue-2

March-April, 2017

1. Journey to Cloud – From Hesitant Beginning to a Feasible Reality

Cloud has gone past the hype and is now a reality. The enterprise size, business type, and industry determine the type of cloud. Large and small enterprises must have a robust plan for embarking on a journey to the creation of a cloud. A key aspect is to take care of integration challenges and leverage the existing investments in the design stage itself. Fortunately, cloud offers are more mature now and companies are able to leverage its benefits combined with a high level of security and reliability. Not everything can go to the cloud yet there are many services available with genuine cloud approaches such as commercial flexibility, on-demand models, and fast setup.

Published by: Jyoti M

Research Area: Information Technology

2. Growth of Technology – How Evolution of Mankind is closely related to the Evolution of Technology

Unless technology helps us to work better, faster and with more accuracy, it is useless. Context, intelligence, and user experience must come together in focus and practical applications are important. Constant technological revolution makes planning difficult and society that stops planning for the future is likely to become a brittle society. It could experience violent economic swings. Change that is too rapid can be deeply divisive, if only an elite can keep up, the rest of us will grow increasingly mystified about how the world works.

Published by: Jyoti M

Research Area: Information Technology

3. Modern Public Transport System

Take friend solution mainly proposed to overcome problems in traditional ticketing method like transferring tickets from one person to another, sharing of tickets, to avoid confirmation i.e. mesh between the supervisors and passengers and safer handling of data. This system introduces smart card technology which entirely eliminates the need of paper tickets. Ticket friendly machine holds the details the details about the events provided by promoters so that consumer can purchase tickets in their personal account using smart cards, time and money are precious every time we strive to find the best way to avoid issues.When incomes to travel by bus without carrying change, this proposed technique need only one identification card. In transportation, smart cards would become the next fare payment media replacing or supplementing cash, tokens, and passes. Smart cards or touch and go cards is a chip card that contains an embedded computerized chip which is either a memory or microprocessor that stores and transfer data which improve the convenience and security of any transaction and provides proof storage of user and account identity. Once if the passenger inserts the smart card into tickets friend machine the smart card reader is smart card contains pay model terms, which check from the amount in the account. Bus announcement system will be as per railway transport system. In the bus, we are going to install RF transmitter which will transmit the signal to the RF Receiver. The RF receiver receives the signal & announce the bus distance from bus stop.

Published by: Prof. M. K Sangole, Kiran V. Nagare, Sujata V. Nehete, Pallavi Y. Gangurde

Research Area: Electronics and Telecommunication

4. Remote Health Monitoring System Using Internet of Things

The existing healthcare system in India seems to have some loopholes in between it is possible to organize our healthcare system differently so that every person in the country can use it for their benefits. Our idea is to create a portable device that can measure the patient heartbeat, body temperature, blood pressure. This will assure everyone a decent healthcare. This paper proposes a method for better implementation of health monitoring using Internet of Things (IoT).

Published by: Vegnesh Nadar, Mr. Prashob Bharathan, Mr. Sandesh Wayal

Research Area: Embedded System

5. A Review on Optimization of Machining Parameters for Different Materials

For the new products, it is necessary to acquire new technologies to produce and process them. Mostly the product quality depends upon on the surface roughness, fatigue life improvement, corrosion resistance, aesthetics, a precision fit of mating surfaces etc., because of this effects on product quality. This paper provides the literature review on machining parameters, such as cutting speed (Vc), feed (f) and depth of cut (t), of different material.

Published by: Mr. H R Ghan, Mr. A A Hashmi, Dr. M M Dhobe

Research Area: Mechanical Engineering

6. Increasing Productivity & Quality of Products by Implementations of Automation in Manufacturing Sectors

There are many productivity and Quality improvement techniques like method study and work measurement, cost reduction, modernization, investment in machine and equipment; re-engineering etc. automation is about speed, accuracy, the precision of the process. There are many systems where we can apply automation for better and accurate result. Automation is one of the most effective methodologies for cost cutting by elimination waste as scrap, reducing manpower, reducing time, controlling quality, and improving the overall performance of any machine, system or process in any industry with the complete assurance of large annual profit margins. This paper talks about concept of automation, tools and& technique to be used for improving productivity and Quality of manufacturing products by process of implementation of automation and its advantages

Published by: Niraj Chandrakant Chaudhari, Pavitra D Patil, Mayur R. Chaudhari, Pankaj K. Lanje, Mayur S. More

Research Area: Impact of Industrial Automation

7. Pre-programmed Multiroom Operation and Power Curtailment Using Bluetooth

With the rise in demand for advanced technology and items, human mind craves for more comforts. The following idea portrays the thought of smart house into reality. This paper gives the idea to control over an entire house. The circuit is implemented in a way such that it does not renders the AC supply wiring useless. The control board is provided with a manual override to switch between the normal and automated house. Arduino mega with Atmega 328 as the microcontroller is programmed to communicate with Bluetooth Module (HC 05) and respond as per user requirement. A simple yet effective android application is designed that communicates with the controller. The application designed also has a special feature of power saver that adjusts the lighting and temperature in the room by judging the surrounding conditions unless specified by the user. The application has an inbuilt security feature that does not allow stray users to interfere with the module functioning. Thus a single application on an android device connected via Bluetooth can simply allow the user to talk to the appliances not only in a particular room but in the other rooms as well and the ultra power saver can be used for curtailment of energy.

Published by: Manish Sachan, Neelanshu Varshney, Shubham Jain

Research Area: Home Automation

8. Analysis: Design Optimization of Vortex Tube

The vortex tube is a device which uses air as refrigerating fluid since air is abundantly available in nature hence vortex tubes proves to be inexpensive and unhazardous to nature. The vortex tube is a structurally simple device with no moving parts that is capable of separating a high-pressure flow into two lower pressure flows with different energies, usually manifested as a difference in temperatures. Different design approaches are used to manufacture the vortex tube. Literature review reveals investigations to understand the heat transfer characteristics in a vortex tube with respect to various parameters like cross section area of a cold and hot end, nozzle area of inlet compressed air, cold orifice area, hot end area of the tube, and L/D ratio. As such, there is no theory so perfect, which gives the satisfactory explanation of the vortex tube phenomenon as explained by various researchers. Therefore, it was thought to perform experimentation. This paper review about the different design approaches and analysis of them.

Published by: Mr. H. R Ghan, Mr. A. A Hashmi, Dr. M. M Dhobe

Research Area: Mechanical Engineering

9. A Review on the Concept of Druti

All sciences are based on some of their basic principles, & each one of them has its own definitions & terminologies. Which have meaning winder than what they seem to be Druti is one such process in the science of RAJA SHASTRA which forms both the basic principles & definition of science. Druti (Liquification) is one such important pharmaceutical process of Rasashastra where in the metals / minerals gems are transformed in to a permanent & stable liquid form. Generally it is seen that when metals & minerals are heated up to certain temperature they melt heating is stopped, temperature drops down, and the material solidifies. The liquid state of the material is temporary. Hence, Druti does not mean melting, but maintaining the molten state permanently, with the desired characteristic features. Details of the process and other things have been mentioned in Rasaratna Sammucchaya (R.R.S.), Rasendra Chudamani (Ra.Chu.), Rasa Prakash Sudhakara (Ra.Pr.Su.), Ayurveda Prakash (Ayu.Pr.), Rasa Hridaya Tantra (Ra.Hr.T.), Rasarnava and other classical texts of Rasashatra.

Published by: Dr. Arunkumar Jesingbhai Chavda

Research Area: Ayurveda

10. MEMS Sensor Based Approach for Gesture Recognition to Control Media in Computer

Gesture Recognition is the method of identifying and understanding meaningful movements of the arms, hands, face, or sometimes head. It is one of the most important aspects in the field of Human-Computer interface. There has been a continuous research in this field because of its ability for application in user interfaces. Gesture Recognition is one of the important areas of research for engineers and scientists. Nowadays the industry is working on the different implementation for the trouble free, natural and easy product which can be easy to handle. This paper proposed a method to work with motion sensors and interpret the motion of hand into various applications in a virtual interface. The Micro-Electro-Mechanical Systems (MEMS) accelerometers are used to capture the dynamic hand gesture. these sensors information is transferred to the microcontroller from where these data are transferred wirelessly to the computer system for actual processing of the data with the use of various algorithms.

Published by: Kunal R. Jambhulkar

Research Area: Embedded Systems

11. Design and Experimental Study on Automatic Cloth Retrieval and Drying System

For a working couple, it is hard to find time to have laundry day where the cloth is dried through the whole day because the weather can change from sunny to rainy days. These projects use Microcontroller PIC 16F877 to install all program that will give instructions to conduct this system properly. This project will automatically retrieve out the clothes when it is the sunny day and oppositely retrieve in the clothes when it is a rainy day. This part needs DC motor to convert electrical power into mechanical power for retrieve-out and retrieve in all the clothes. Temperature sensors that will be used in this project can measure temperature and day condition whether it is the sunny or rainy day more accurately. LDR (Light Dependent Resistor) sensors will be used to detect light. Rain detector also will be used to sense when it begins to rain outside by detecting rain water from moisture impedance sensor locate at the road. The dry-time of the clothes will be setup using rotary knob switch and it will automatically retrieve in the clothes using DC motor when the dried-time is finished. This project will display the day condition, temperature, and dry-timer using LCD (Liquid Crystal Display) or indicator light such as LED (Light Emitting Diode).

Published by: Siva Siddharth I. S, Sathish Kumar B. S, Selvaganapathy .M, Kumaresan .G

Research Area: Design

12. Live Video Segmentation and Tracking Video Object

This process is mainly focused on segmenting the foreground and the background for extracting the region of interest. This process is used not only the segmentation of the region of interest and also track the activity of the person. This process is done using the datasets, like UCLA and VIRAT Datasets. Hence the dataset video is processed to segment as well as to track the activity. This model provides a generic representation of an activity sequence that can extend to any number of objects and interactions in a video. We show that the recognition of activities in a video can be posted as an inference problem on the graph. In this paper, rather than modeling activities in videos individually, we jointly model and recognize related activities in a scene using both motion and context features. This is motivated by the observations that activities related in space and time rarely occur independently and can serve as the context for each other. We propose a two-layer conditional random field model that represents the action segments and activities in a hierarchical manner. The model allows the integration of both motion and various context features at different levels and automatically learns the statistics that capture the patterns of the features.

Published by: Harun Adam Shaikh, Dhanashree Arote, Trupti Phatak, Prof. Nilima Nikam

Research Area: Computer Science And Engineering

Review Paper

13. Survey on Different Approaches of Detection of Gray Hole Attack in MANET

The fundamental problems of ad hoc network by giving its related research background including the concept, features, status, and vulnerabilities of MANET. They also present an overview and the study of the routing protocols. Also include the several challenging issues, emerging application and the future trends of MANET. As the popularity of mobile device and wireless networks significantly increased over the past years, wireless ad-hoc networks have now become one of the most vibrant and active fields of communication and networks. In this paper review the different technology of MANET.

Published by: Geetanjali, Jyoti Gupta

Research Area: MANET

14. Meta Modeling Using Prediction Correlation for Solar Powered Battery Charge- Discharge System for a Wireless Sensor Node

Wireless sensor nodes to be powered continuously for long life, good performance and high accuracy in the unattended location of the world. Battery powered sensor nodes are not able to provide continuous power. solar power is the scavenge source, but due to the sun cycle variation, it is important to predict the solar current energy produced according to time. In this paper we use automatic battery charger -discharge system that uses the meta-modeling correlation for prediction of solar energy and processor is designed for powering wireless sensor node. The new method uses simple kriging model and swarms optimization that improves precharge time by 61.54% while speeding up the process by390*. The simulation results are shown by MATLAB, labview, and design of the processor with EDA tools.

Published by: Dr. Ashok .J, Ms. Pradnya P. Mirajkar

Research Area: Wireless Sensor Networks

15. Designing and Performance Evaluation of S and C Slot Rectangular Microstrip Patch Array Antenna

This paper presents the design of microstrip patch antenna using high frequency structure simulator (HFSS 12). The two different configurations S-slot & C-slot rectangular patches are designed. The performance of two antennas is analyzed in terms of bandwidth, return loss and gain. The material used for substrate is FR4 having the dielectric constant 4.4. This material is easily available & has low cost. The return loss of S slot rectangular patch is -36.53db & gain is 5.3009 db whereas the return loss for C slot is -34.99 db and gain is 4.8762 db.

Published by: Bindia, Ayushi Aggarwal

Research Area: Wireless Communication

16. Electrical Current Signature Analysis

Induction motors have become the “horse-power” of industry and are the most widely used electrical machines. They can typically consume between 50 to 60% of all the generated capacity of any industrialized nation. This article focuses on the industrial application of Electrical Current Signature Analysis (ECSA) to diagnose faults in an induction motor drives. ECSA is a non-invasive, on-line monitoring technique for the diagnosis of problems in induction motors. Reliability based maintenance (RBM) and condition- based maintenance (CBM) strategies are now widely used by industry, and health monitoring of electrical drives is a major feature in such programs

Published by: Abhishek Singh, Deepak Singh, Narendra Singh, Pulkit Gupta, Mr. Piyush Agnihotri

Research Area: Electrical Engineering

17. Performance Evaluation of Advanced STBC MIMO Wireless Communication System with Channel Estimation Based Block Coding

This paper presents the design of microstrip patch antenna using high-frequency structure simulator (HFSS 12). The two different configurations S-slot & C-slot rectangular patches are designed. The performance of two antennas is analyzed in terms of bandwidth, return loss and gain. The material used for the substrate is FR4 having the dielectric constant 4.4. This material is easily available & has low cost. The return loss of S slot rectangular patch is -36.53db & the gain is 5.3009 db whereas the return loss for C slot is -34.99 db and gain is 4.8762 db.

Published by: Ayushi Aggarwal, Bindia

Research Area: Wireless Communication

18. Power Quality Improvement of Three Phase System Using Shunt Active Power Filter

Abstract— A power quality issue basically deals with any occurrence manifested in current, voltage or frequency deviation that results in damage, upset or failure of end use equipment. The non-linearity in the properties of power electronics devices and the higher switching frequency are the main causes of power quality issue. Thus this paper deals with power quality improvement by shunt active power filter to eliminate voltage and load current harmonics and for reactive power compensation. A shunt active power filter based on the instantaneous active and reactive current component (Id – Iq) method is proposed to compensate first harmonic unbalance. A theoretical study based on synchronous detection method is done in this paper and the simulation results are analyzed regarding the harmonics compensation. Simulations are carried out with PI controller for the (Id – Iq) control strategies for different voltage condition using MATLAB/ SIMULINK.

Published by: Niklesh Das, Sandeep Mude

Research Area: Power Quality Improvement

19. Flood Monitoring System Using Microcontroller (Pic18f45k22) With Effective Implementation of Embedded C

The main objective of this paper is to provide a cost effective flood monitoring system for cautioning the people during flood crisis by using simple sensor and a microcontroller.Floods have become one of the major issues taking place in various parts of the globe. Due to improper management during the flood crisis, there is a huge number of causalities taking place. The aim of this paper is to provide simple and cost effective solution in which the level of water is constantly monitored using pressure sensors and microcontrollers and the information in transmitted with the help of GSM (Global system for mobile communication) module. This paper provides design approach on both software and hardware.

Published by: Dineshkar.S, C. Akshay, N. Aakash, DR. R. Murugan

Research Area: Embedded System

20. Does Location Difference Determines Political Awareness

The present study aims at investigating how far the college students are politically aware as a future citizens and whether there exist any difference among them with regard to location. The sample consists of 1611 college students studying at various colleges of arts and science in Tamilnadu. Descriptive method using survey as technique was employed to solve the present problem. Political Awareness Test (PAT) developed and validated by V.Sasikala and S.Francisca (2016) had been used for collecting the data. The data was analyzed using mean, S.D, ANOVA and scheffe. The result showed that majority of the college students are politically aware and location difference plays a dominant role determining political awareness.

Published by: V. Sasikala, Dr. S. Francisca

Research Area: Education

21. Present Position of Agriculture in India

Agriculture is facing problem due to monsoon and government has taken certain initiatives to encourage and protect agriculture. The stark observation made in the Economic Survey of 2015-16 that “Indian agriculture, is in a way, a victim of its own past success – especially the green revolution”, shows the dark reality of the agriculture sector at present and the havoc that has been wreaked by the green revolution. The green revolution, which is often characterized by the introduction of a high-yielding variety of seeds and fertilizers, undoubtedly increased the productivity of land considerably. But the growth in the productivity has been stagnant in recent years, resulting in a significant decline in the income of farmers. There have also been negative environmental effects in the form of depleting water table, emission of greenhouse gasses, and the contamination of surface and ground water. Needless to say, the agriculture sector is in a state of distress, which is severely affecting peasants and marginal farmers, and urgent policy interventions are required to protect their interests. The government has responded to the problem by constituting a panel, which will recommend ways to double the income of farmers by 2022. While this may be an overly ambitious target, if we want to boost stagnated agricultural growth a shift has to be made, as finance minister Arun Jaitley said in parliament, from food security of the nation to income security of the farmers. However, there are many hurdles that have to be crossed if we want to achieve this objective.

Published by: Dr. Sangappa V. Mamanshetty

Research Area: Agriculture

22. Image Fusion based on Integration of Wavelet and Curvelet Fusion Methods

In today’s period, there is a great impact of image registration and image fusion on many fields such civilian and defense areas to retrieve exact information about the particular image. the process in which different images of the same scene are captured as input images and those are combined in order to improvise the fused image content which gives more information and is complete than any of the input images. Different methods of image fusion technique are principal component analysis (PCA), Discrete Wavelet transforms (DWT), curvelet transform. Principal component analysis (PCA) is a spatial domain fusion technique, which deals with image pixels to reduce multidimensional data sets to lower dimensions for analysis. Discrete Wavelet transforms (DWT) and curvelet transform is the transform domain methods to integrate the input images and extract the exact required information. Discrete wavelet transform(DWT) has an impressive reputation as a tool for image processing in image denoising and image fusion application.The Curve lets transform is suited for objects which are smooth away from discontinuities cross curves. The application of the curvelet transform in image fusion would result in better fusion results than that obtained using Principal Component Analysis (PCA) and Discrete wavelet transforms (DWT) The idea behind the current research is to exhibit the enhancement in image processing parameters by implementing fusion of curvelet and wavelet using simple average and weighted average fusion method .

Published by: Barkha Panda, Prabhakar Sharma

Research Area: Image Processing

23. Numerical Analysis of Aerofoil Section of Blade Of axial Flow Fan at Different Angle Of Attack

Fans are used all over the world in a wide verity of industries and other purposes. Some of the important applications are in steam power station, ventilation system, cooling of electric motor and generator, and many industrial processes. Many researchers and engineers are making their efforts to design fans to fulfill the particular requirement of application in the most efficient way. The criterion of cost of fan, ease in manufacture and conservation of energy are other also to be considered in design. Several studies are available of various researchers in analysis and simulation of axial and centrifugal fans. Axial flow fans have also been designed and simulated by the researchers. Simulation of performance of axial flow fans and design of various blade sections of the axial flow fans have been studied experimentally or numerically. The present work comprises the numerical study of the axial flow fan section aerofoil. The objective of the study is to simulate the flow features around the aerofoil of particular design for three different values of the striking angle. The results are obtained using FLUENT in the form of velocity vectors at the leading edge, across the aerofoil and at the trailing edge. The contours of pressure and turbulence are also shown for the three cases.

Published by: Anil Yadav, Meghna Pathak, Dr. P. K Sharma

Research Area: Mechanical Engineering

24. Partial Replacement of Fine Aggregate with GGBS

Leaving the waste material directly into the environment can lead to various problems. So it becomes necessary to reuse waste material in an emphasized manner. Waste used to produce new products or used as admixtures so that natural resources used in an effective manner and environment protected from waste deposits and depletion of natural resources. Iron & Steel plants generate waste in form of Slag from Blast Furnace while reducing Iron Ore to Iron. This waste in form of Blast Furnace Slag usually collected in dumping grounds of the industries and they cause harmful effects to the environment. Annual production of Steel in India is about 89.58 Million MT/annum according to 2015 figures, and world production 1622.8 Million MT/annum. In addition, generation of Waste Slag according to figures of 2013-14 in India is larger than 13.5 Tg/annum (106 MT/annum).

Published by: Yogesh Biyani, Jyoti R. Mali, Piyush Bagul, Pradip Pandhare, Hemant Bafna, Mandar Joshi

Research Area: Civil Engineering

25. Trend Analysis of Precipitation Data and its Spatio-temporal assessment in West Flowing River Basin of Kutch, Saurashtra and Marwar (WFR-KSM) Basin, India

The society and economy of India are crucially dependent on monsoon rains for its agriculture needs. The assessment of spatial and temporal aspects of trends in precipitation is critical for this region of India as the basin has areas which frequently experience droughts and water scarcity. The purpose of this research was to investigate the Spatio-temporal variations in precipitation in terms of month wise, monsoon and annual trends in West Flowing River Basin of Kutch, Saurashtra, and Marwar (WFR-KSM basin). The trend was calculated and assessed in ProUCL5.0.00 and ArcMap 10 software's using Indian Meteorological Department (IMD) Precipitation grid data (0.25° x 0.25°) with a temporal resolution of 1964-2013 representing 50 years daily data. The direction and magnitude of annual, monsoon and month wise trends in long-term precipitation data were calculated for every grid using Mann-Kendall (MK) test and Theil- Sen’s (TS) slope. Annually and in monsoon season, the increasing trend in precipitation was exhibited by a major part of the basin. The decreasing trend was confined to northern and north-eastern regions. The month wise trend analysis indicated either no grid or few grids exhibited a trend in non-monsoon months. The June, July, August, September (monsoon) months exhibited spatial variation in trends. The majority of the grids in June, July and August months exhibited increasing trends and a few grids with declining trend were clustered mainly in western and north-eastern part of the basin.

Published by: Ila Agnihotri, Dr. M. P. Punia, Dr. J. R. Sharma

Research Area: GIS, Climate Change

26. Skew Minimization with Low Power for Wide Voltage Range Using Coarse Grain Technique

Skew is one of the most important parameters that decides the performance of the system.Though skew is reduced using two-stage serially connected power mode aware buffers using two power gating techniques, power consumption and area is considerably larger in fine grain power gating. So, in the proposed system, coarse grain minimization is used at both stages which will effectively reduce power consumption and area.The coarse grain approach implements the grid style sleep transistors which drive cells locally through shared virtual power networks.This approach is less sensitive to PVT variation, introduces less IR drop and imposes a smaller area overhead than the cell or cluster based implementations.In coarse grain power gating, transistor is a part of the power distribution network rather than the standard cell

Published by: Moonisha S. N, Anitha .R, Nikila .G, Murali Parthasarathy .K, Nandhini .M

Research Area: Skew and Power Minimization

27. A Survey on Authentication in Cloud Computing For Data Storage Security

Cloud computing is an internet-based computing, where a set of resources and services such as applications, storage, and servers are delivered to computers and devices through the Internet. Cloud Computing is continuously growing and showing consistent growth in the field of computing. The major challenging task in cloud computing is the security and privacy issues caused by the outsourcing of infrastructure, sensitive data and critical applications and its multi-tenancy nature. The security for Cloud Computing is emerging area for research work and this paper discusses various types of authentication methods.

Published by: Mohammed Ubada

Research Area: Computer Science

28. An Assessment on Clustering and its Protocols in VANET

Vehicular ad-hoc Network (VANET) is fundamentally a collection of vehicles and keen access points for communication, transmission and gathering information of nodes and environment for managing traffic loads. Thus the steering of destination, supervise speed and track of vehicles becomes a critical issue in VANETs. Previous researchers only focus on individually. VANETs will enhance driver safety and reduce traffic deaths and injuries by implementing collision avoidance and warning systems. In this paper, I am going to describe the importance of clustering in VANET and also subcategories of clustering and its protocols.

Published by: A. Mythili

Research Area: Computer Networks

29. Wormhole Attack Prevention and Detection in MANETs Using HRL Method

In order to prevent MANET from wormhole attack, a new method is proposed. In this, wormhole attack in MANET is detected and prevented by using Hop Count, Reverse Trip Time and Link Length method. According to the scheme, hop count specifies the actual reverse trip time from source to destination. To find the presence of tunnel, the source will compare calculated reverse trip time with actual reverse trip time and to verify the presence of tunnel, the source will compare calculated link length with actual link length of the links in paths. This scheme provides a security to mobile ad hoc networks from both short as well as long wormhole tunnels. Network simulator is used to evaluate the performance of mobile ad hoc network. The simulation results show that the proposed scheme outperformed in terms of throughput and packet delivery ratio.

Published by: Neelima Singla, Ramanjeet Singh

Research Area: Electronics & Communication

30. Black hole Attack in Mobile ad Hoc Networks: A Review

Mobile ad hoc networks are widely used networks in the present times. The nodes in such network consist of laptops, mobile phones etc. These devices often have very important information in them. Security of these networks is very vital. These networks are prone to various kinds of attacks such as black hole attack, wormhole attack, DDoS attack etc. Out of many other attacks possible, black hole attack is pretty dangerous as it drops all the packets received by it. This paper presents various studies that have been done by many authors in the past regarding detection and prevention of such attacks.

Published by: Harsimran Kaur, KamalJeet Mangat

Research Area: Computer Science

31. A Review on Performance Analysis of Energy Detection Technique for Cognitive Radio over Different Windowing Techniques

The Spectrum is based on the tremendous growth in the wireless communication network which raises the demand of the frequency user.The most efficient way of allocating spectrum and reliable spectrum sensing is Dynamic spectrum allocation. Cognitive radio is one of the emerging technology in wireless communications in which a network can flexible changes its transceiver parameter. The Primary user can take the priority decision to detect the presence of the primary user, this can be done by a technology so-called cognitive radio. This can happen if we prefer the appropriate window technique to evaluate system parameter for sensing the availability of vacant band. We show that by comparing the different windows techniques, cognitive radios not only provide better spectrum opportunity but also provide the chance to a huge number of wireless users. In this paper Energy detection based Spectrum Sensing with different windowing methods i.e. rectangular and hamming are developed, that uses to detect the energy of the received signal. We detect the spectral correlation between the two peaks of the signal to sense the presence of the primary user.Therefore windowing strategies are used for improves system performance by reducing spectrum leak. The comparative analysis using different windowing methods shows in Energy detection method.

Published by: Preeti Garud, Shivangini Morya

Research Area: Cognitive Radio

32. Analysing Two-Term Dot Product of Multiplier Using Floating Point and Booth Multiplier

ABSTRACT: The Floating Point in two-term Dot-Product of multiplier referred as discrete design. Floating Point is a wide variety for increasing accuracy, high speed, high performance and reducing delay, area and power consumption. This application of floating point is used for algorithms of Digital Signal Processing and Graphics. Many floating point application is to reduce area, from the survey the fused floating point gives better performance using both the single precision and the double precision in multiplication, addition, and subtraction. The scientific notations sign bit, mantissa and exponent are used. The real numbers are divided into two, fixed component of significant range (lack of dynamic range) and exponential component in floating point (largest dynamic range). Converting decimal to fused floating point and normalize the exponent part and rounding operation for reducing latency. The other operation is compared by booth multiplication. It is also used for reduction of area and power. That multiplies two signed binary numbers in two’s complement notation, it used desk calculators that were faster at shifting than adding and created the algorithm to increase their speed, then both the results are verified in Verilog hardware description Language.

Published by: Mukesh Krishna .R, Mohana Priya .S, Manicka Vasagam .P, Dr. B. Vinoth Kumar

Research Area: Floating Point Multiplier

33. Cosmic Radiation Raining Down on Earth and Malignancy Nexus

This document gives information about a special type of radiation which is highly detrimental to human health and terrestrial ecosystem.Cosmic rays are charged subatomic particles. They are electrically charged particles. Cosmic rays are mostly protons and ions, which have positive charges. A small percentage are electrons, which have negative charges. Cosmic rays pour down on Earth like a constant rain. We don't much notice these high-energy particles, but they may have played a role in the evolution of life on our planet. Cosmic rays are mostly high-energy protons originating from supernova shock waves. It is difficult to precise trace where a cosmic ray came from because its trajectory is bent by magnetic fields. In fact, a typical cosmic ray will bounce inside the galaxy's magnetic field for millions of years before eventually colliding with something… like Earth. Every square centimeter on the top of the Earth's atmosphere is hit by several cosmic rays per second. This is forever going on. None of these "primary" cosmic rays ever reach us on the ground. Instead, they collide with atoms in the upper atmosphere, creating a shower of lower energy "secondary" particles. At sea level, the majority of cosmic ray secondaries are highly penetrating muons. About 10,000 muons pass through our bodies every minute. Some of these muons will ionize molecules as they go through our flesh, occasionally leading to genetic mutations that may be harmful.The passage of a cosmic ray through your body can leave various fluids within your body momentarily ionized.

Published by: Moubani Bandyopadhyay

Research Area: Cosmic Radiation and Its Effects, Astrophysics.

34. Self Operated Petrol Pump

In current days fuel stations are operated manually. These fuel pumps are time-consuming and require more manpower. To place fuel stations in distant area it very costly to provide excellent facility to the consumers all these problem are sorted out by the use of unmanned petrol pump which requires less time to operate and it is effective and can be installed anywhere the customer self-going to avail the services the payment is done by electronic clearing system. The simple and proper use of microcontroller and GSM technology provides a total security and atomization in the distribution of fuel. It has easy operated mobile phone system and graphics user interface (GUI). It interfaces with high-speed fuel dispenser which is convenient for the consumer to operate. In our system the password will be provided to the user and customer has to enter this password on the LCD provided by the fuel station which will help the petrol company to create authentication for the user also the distribution of the fuel is not possible until it gets verified by the database. In short, we provide a secure system for fuel distribution. The advancement of this project can help industry financially.

Published by: Pooja Ashok Dalavi, C. R. Dongarsane, Sunaina Golandag, Snehal Powar

Research Area: Embbeded System

35. Privacy Preserving and Secure Data Integrity Protection Security in Regenerating Coding Based Public Cloud Storage

Now a day’s use of cloud computing is rapidly increasing. Cloud infrastructure is being a common solution adopted by large organizations for storing and accessing data. It provides the current need for data storage with a flexible and dynamic storage that can grow. In this paper, we describe the design and development of a cloud computing based secure cloud data storage using encryption. Cloud data storage is a major solution to overcome this problem. These mechanisms to provide data integrity and security for client’s data in cloud storages. In users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. This understands the trend in terms of complexity and strength of a secured solution and provides some insights of what is still left in such area of research. Cloud data storage provide better privacy as well as ensure data availability and reliability can be achieved by dividing the user’s data block into data pieces. Cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free.

Published by: Monika B. Thakare, N. M Dhande

Research Area: Computer Science & Engineering

36. Automated Diagnosis of Heart Disease using Random Forest Algorithm

The accurate diagnosis of heart diseases, is one of the most important biomedical problems whose administration is imperative. In the proposed work, decision support system is made by three data mining techniques namely Classical Random Forest, Modified Random Forest and Weighted Random Forest. The classical random forests construct a collection of trees. In Modified Random Forest, the tree is constructed dynamically with an online fitting procedure. A random forest is a substantial modification of bagging. Forest construction is based on three step process . 1. Forest construction 2. The polynomial fitting procedure 3.The termination criterion In Weighted Random Forest, The Attribute Weighting Method is used for improving Accuracy of Modified Random Forest. There are Two Techniques are Used in Attribute Weighting: 1. Averaged One-Dependence Estimators (AODE) 2. Decision Tree-based Attribute Weighted Averaged One-dependence Estimator( DTWAODE).

Published by: Priya Rajendra Patil, S. A Kinariwala

Research Area: Data Mining

37. Design & Optimization of Finfet Based Schmitt Trigger Using Leakage Reduction Techniques

In this proposed work we are applying valuable power gating schemes to FinFET based Schmitt trigger to enhance its performance by reducing the leakage current in standby mode (off-state mode). The power gating schemes like Sleep Transistor approach and Multi-Threshold CMOS (MTCMOS) and Double-Threshold CMOS(DTCMOS) have been analysed and simulated which shows the tremendous reduction in the leakage current thus increasing the stability of the design. In this paper, different consecutive designs of PULL-UP and PULL-DOWN networks of NMOS and PMOS are applied to FinFET based Schmitt trigger one after another. Due to this treatment of PULL-UP and PULL-DOWN network, controlled voltage supply is obtained and the current driving capability of the design is increased, the hence less Gate leakage current is formed. This provides the motivation to explore the design of low leakage FinFET based Schmitt trigger. Simulation is performed on the cadence virtuoso tool in 45nm technology and simulation results revealed that there is a significant reduction in leakage current for this proposed design.

Published by: Priyadharshini .M, Anitha .R, Saranya .P, Sindhu .M, Sindhu .K

Research Area: VLSI

38. Analysis and Improved Performance of ANN Based Chaotic Generator

The main objective of this research paper is to analysis on the improved performance of ANN based chaotic generator. We are analyzing the performance of chaotic generator model during encryption and description and produced outcomes compare with earlier published work scenario. In this work Encryption and decryption of binary value has been completed by the same value. Chaotic neural network algorithm used for producing the random chaotic sequence.[1][2] Produced random chaotic sequence value is the encrypted binary ASCII values of A to Z sequence of original ASCII Code binary value, with a same initial parameter. This paper provides a review on the use of improved the performance of ANN based chaotic generator and provides high range of security in the field of cryptography.

Published by: Sona Mishra, Amit Mishra

Research Area: Ann Based Chaotic Generator

39. Design of Aging Aware Reliable Multiplier Using Mixed Bypassing Technique

Digital multipliers have many numbers of DSP applications. The overall performance leans on the output of the multiplier. When we apply a negative bias to the PMOS transistor, there occurs temperature instability. The minimum voltage at which the PMOS transistor is ON will be increased whereas it decreases the multiplier speed. Similarly, if we apply a positive bias to the NMOS transistor, temperature instability occurs.This degrades the transistors speed and the system fails because there is a violation in time. There exists an aging-aware multiplier with adaptive hold logic (AHL) circuit. This circuit provides higher throughput through the variable latency. In the existing method, Row or Column bypassing is done to reduce the aging effect. Our desired structure is that we are bypassing column and row together so that the throughput can be increased. We are implementing our advanced design in real time applications like FIR filters.

Published by: Gowthami .G, S. Suganya, Karthika .G, Deepika .D, Indhumathi .N

Research Area: VLSI

40. Control of Vehicle Pollution Through IOT

The large majority of today's cars and trucks travel by using internal combustion engines that burn gasoline or other fossil fuels. The process of burning gasoline to power cars and trucks contributes to air pollution by releasing a variety of emissions into the atmosphere. Emissions that are released directly into the atmosphere from the tailpipes of vehicles are the primary source of vehicular pollution. With the increase in urbanization and industrialization and due to poor control on emissions, a great amount of particulate and toxic gasses are produced. So, in our proposed system we use of a spectrophotometer (spectrophotometry method) as a sensor to identify the toxic gas. Missions are measured during regular basis and informed to the user if above the permitted level and the failure of the sensor. If the user doesn’t take any action within a week the alert is passed to the server of the pollution monitoring center through Internet of Things (IoT). The center decides the fine amount and intimates the user.

Published by: Rose Sweetlin .T, Priyadharshini .D, Preethi .S, Sikkandar Sulaiman .A

Research Area: Embedded System

41. Advanced Control Web Based Home Automation with Raspberry PI

Today we are living in the 21st century. It is necessary to control the home from desire location. Home automation is the control of any electrically and electronics device in our home and office, whether we are there or away. There are hundreds of products available that allow us to control the devices automatically with using the raspberry pi model by the webpage. This Home automation system provides the user with the webpage of various lights and appliances within their home. Home automation and benefits will be a focus on and how this can be achieved through the use of the raspberry pi. The mobile device will communicate with a home automation network through an internet gateway, but cannot directly communicate with the devices in the network. In this project, the android devices would control the home appliances using the internet and raspberry pi as the server system. The relay circuit board will be interfaced by the raspberry pi. This relay circuit board will control the home appliances.

Published by: Dr. Ashok .J, Chavan J. J, Patil P. V, Naik P. S

Research Area: Electronics and Telecommunication

42. Design and Verification of MPSoC on FPGA with Built-in Self Test

Multiple Processor System on Chip (MPSoC) which uses multiple processors mainly used in Embedded applications due to their high processing speed and low power consumption. This paper focuses on the design and implementation of MPSoC on FPGA. Multiple single processors are interconnected by shared bus. This paper also provides a technique to solve a major challenge of handling faults in its main components i.e. processors and interconnect with built in test structure on every processor. By using this testing structure the faults occurred in processing elements (PEs) during the communication between the master and slave can be identified automatically. The functionality is analyzed and verified using Questasim and Quartus tool. The output of the proposed model is compared with MPSoC architecture without a testing structure to estimate the functionality improvement.

Published by: Dhatchayani. K, Abinaya .R, Brunthvini .P, Deepa .S, Yamuna .S

Research Area: VlSI

Research Paper

43. Sense of Touch in Robots Using Optoelectronic Prosthesis

The sense of touch is of utmost importance in the field of robotics since a well-performing robot must be able to interact with objects in its environments. It is also important as it supports, and sometimes substitutes, the visual modality during recognition of objects. This paper presents the activation of a sense of touch in robots using an optoelectronic prosthesis and all sensors that are integrated within the body of the robots, so they can actually detect forces being transmitted through the thickness of the robot.

Published by: R. Janani

Research Area: Robotics

44. Clockwork Universe

Abstract For centuries mankind believed that the universe is never changing and worked with the precision of a clock. The sun rises in the east and sets in the west. The moon waxes and wanes in 28-day cycles. The four seasons come and go with clockwork precision. However, Edwin Hubble's observations showed an expanding universe which meant universe had a beginning. We now know that conversion of matter to energy will one day lead to death of our sun and other stars and from the debris of dead stars new stars will arise. However, this cycle will eventually lead to a situation where stars become smaller and smaller and will not generate enough heat in its core to sustain a nuclear fusion reaction and the universe will wither into cold darkness. Ours is not a static clockwork universe. It is a dynamic ever-changing universe which is in its prime of life but destined to age and dies. This is the story we want to say in the article.

Published by: Rageena Joseph

Research Area: Physics

45. Opuntia Stricta: As Medicinal Plant

Opuntia stricta with high water use efficiency produces forage for animals, vegetables, and fruits with glucose. Traditionally cactus used as a valuable health supporting nutrient and it also has applications in pharmaceutical industries. Opuntia stricta is belonging to the Cactaceae family and comprises from 200 to 300 species. Its fruit is composed of around 69% peels, 21% pulp, and 10% seeds. Opuntia stricta fruit juice is a potential source of betacyanin pigments which can be used as a natural red-purple food colorant and The fruits of O. stricta contain water (92%), carbohydrates (4-6%), protein (1-2%), minerals (1%) and a moderate amount of vitamins, mainly A and C (Cantwell, 1991, and Neri, 1991, cited by Pimienta, 1993). According to these figures, its fruits are high in carbohydrates (50-75% of DM) and moderate in protein content (12.5-25% of DM), minerals and vitamins.

Published by: Aarti V. Pawar, Suresh G. Killedar, Vivek G. Dhuri

Research Area: Pharmacognosy

46. Towards A Dynamic Revelation of Shrewd Administrations in the Social Internet of Things

The worldview of the Social Internet of Things (SIoT) helps another pattern wherein the availability and ease of use advantages of Social Network Services (SNS) are displayed inside the system of associated articles, i.e. the Internet of Things (IoT). The SIoT surpasses the more conventional worldview of IoT with an improved insight and setting mindfulness. In this paper, a novel administration structure in light of a subjective thinking approach for dynamic SIoT administration's revelation in savvy spaces is proposed. That is, thinking about clients' situational needs, inclinations, and other social viewpoints alongside clients' encompassing environment is proposed for producing a rundown of circumstance mindful administrations which match clients' needs. This thinking methodology is then executed as a proof-of-idea proto-sort, to be specific Airport Dynamic Social, inside a shrewd airplane terminal. At last, an exact review to assess the thinking methodology's efficiency demonstrates enhanced administration's flexibility to situ-atonal needs contrasted with normal methodologies proposed in writing

Published by: Aslam Karjagi, Md Azharuddin Adhoni, Md Imtiyaz Gulbarga, Sayed Md Mubashir Qureshi, Jabeen Patel

Research Area: Internet of Things

47. A Survey on How Main Method Working in C Programming

Abstract: By the completion of this paper study we have the better idea about the main method. Generally, many people have the doubt about the main method is the predefined or user defined method? If it is user defined where is the prototype of that method? or If it is predefined in which header file its prototype is present? By the end of this paper study, we have the clarity of Is main method is a user-defined or predefined method. And also this paper give the clarity about user-defined and predefined methods in C Programming.

Published by: G. Anupama, M. Phani Anusha, Y. Vasanthi

Research Area: C Programming

Research Paper

48. Optimize workflow scheduling Using Hybrid Ant Colony Optimization (ACO) & Particle Swarm Optimization (PSO) Algorithm in Cloud Environment

AbstractThose days are gone when storing and accessing of data were done on computer’s hard drive. Now with innovation in technology and with the great success of Internet Computing resources have become more economical, more powerful and more ubiquitously available than ever before. This technological trend of the 21st century has given birth to the realization of a new computing model called Cloud Computing. This Computing is not only about the hard drives were storing and accessing can be done but it is latest computing paradigm and it offers tremendous opportunities to solve the large-scale scientific problem. To fully exploit the applications of cloud, various challenges need to be addressed where scheduling is one among them. Although catholic research has been done on Workflow Scheduling, there are very few edges tailored for Cloud environments. For some basic principles of Cloud such as elasticity and heterogeneity existing work fails to meet optimal solution. Therefore our work focuses on the scheduling strategies for scientific workflow on IaaS cloud. We present an algorithm based on the meta- heuristic optimization technique where the best of two algorithms Ant colony Optimization (ACO) and Particle Swarm Optimization (PSO) are merged to optimize locally and globally which minimizes the overall workflow time (makespan) and reduces the cost. Our heuristic is evaluated using CloudSim and several well-known scientific workflows of different sizes. The results show that our approach performs better when compared to PSO algorithm.

Published by: Misha Goyal, Mehak Aggarwal

Research Area: Cloud Computing

49. A Review on Distribution Feeder Reconfiguration Methods

Distribution Feeder Reconfiguration (DFR) is a critical analysis to optimize and control the distribution system and an important function of distribution automation system. Distribution feeders are configured radially. Their configurations may be varied with manual or automatic switching operations so that all of the loads are supplied with acceptable voltage levels, reduce power loss and enhance power quality. DFR also relieves the overloading of the network components. The change in network configuration is performed by opening sectionalizing (normally closed) and closing tie (normally open) switches of the network. These switchings are performed in such a way that the radiality of the network is maintained and all of the loads are energized. This paper presents a review of Distribution Feeder Reconfiguration (DFR) methods which includes heuristic and genetic algorithm approach.

Published by: K. K. S. V. V Prakasa Rao, V. C Veera Reddy

Research Area: Power Systems-Electrical Engineering

50. Insilico studies on Taste Receptor Gene (Tas2r38) and Tas2r38 Protein interaction with Ligands PTC and PROP using Docking Approach

The G protein-coupled receptor(gpcr)Tas2r38 is a bitter taste receptor that can respond to bitter compounds such as phenylthiocarbamide(PTC) and 6-n-PROPylthiouracil(PROP).This receptor was chosen because of its haplotypes (based on three residue site polymorphism) htas2r38pav, htas2r38avi are known to have a dramatically different response to ligands PTC and PROP. A docking study is performed to propose the best affinity between ligands PTC & PROP against the various active site of tas2r38 protein. The 3D structure of tas2r38 bitter taste receptor was predicted using GPCR-I-TASSER. The interaction of tas2r38 protein with ligands PTC & PROP were studied, their chemical structures were drawn using Marvin sketch and the potential ligands were optimized using pyrx. Meta pocket tool was used to predict the binding sites for htas2r38pav, htas2r38avi bound to Ptc & PROP respectively. Further, the docking studies of tas2r38 protein with Ptc & PROP was performed using pyrx tools and their interaction with the tas2r38 protein was visualized using discovery studio. The ligand PTC & PROP was docked on the protein PAV at the active sites 108,112,199 & 266 which showed a docking efficiencies of -4.6,-4.5,-4.7 &-5.3 respectively. Also, these ligands were docked on another haplotype AVI at the active sites 198,262,266 which showed a docking efficiencies of -4.7,-5.1, respectively. On the basis of their binding scores, it was predicted that the ligand PTC has a higher binding affinity to the haplotypes PAV and AVI as compared to the ligand PROP.

Published by: Manisha Mathur, Parakh Sharma, Faiza S. Khan, Mrunmai Pednekar

Research Area: Zoology and Bioinformatics

51. ANXA5 Gene: An Insilco approach for SNP analysis associated with RPL

Miscarriage is the most familiar pregnancy obstacle affecting up to 15% of all clinically recognized pregnancies. Annexin A5 gene is a well-recognized predisposition factor for recurrent spontaneous abortion. Annexin A5 is both Ca2+ and phospholipids binding protein that is localized at the surface of the placental syncytiotrophoblast layer and performs a vital role in anticoagulant function in the maternal blood at the inter villous space. It has been recently shown that polymorphisms in the promoter region of the annexin A5 gene (ANXA5) are significantly associated with RPL. The present study focuses on the comprehensive analysis of the functional and structural impact of all known SNPs of ANXA5 gene by using computational approaches. Comprehensive analysis was performed to filter the most probable mutation that might be associated with RSA. It resulted in identification of SNPs which are most deleterious and disease associated. The study reveals that these two rs111418524, rs41278081 SNPs have more significant effect on structure and function of the protein.

Published by: Nasreen Sultana, Jeevan Amos. S, Kasturi. K

Research Area: Genomics

52. A comparative Docking Analysis of Non-carcinogenic DNA staining Dyes to propose the best Alternative to Ethidium Bromide

Fluorescent dyes that stain a cell’s DNA are used in live cell imaging as they allow for tracking of cell division, for the visualization and sizing of dsDNA restriction fragments, and for the examination of properties of the isolated DNA molecules. Conventionally, Ethidium bromide (EtBr) is the cationic dye used to visualize DNA after separating the fragments on Agarose Gel Electrophoresis. It is widely used due to the striking fluorescence enhancement it displays upon intercalation into the dsDNA at the minor groove. Although a highly sensitive stain, it is notoriously unsafe, not only is it a very strong mutagen, it may also be a carcinogen or teratogenic. Histopathological changes of Ethidium Bromide treated rats showed little degenerative changes characterized by glomerular and tubulointerstitial injury, nephrosis, synechia, necrotic changes, cirrhosis, and ischemia. Ethidium bromide revealed pronounced degenerative changes in ovarian histoarchitecture. The sequence of atretic changes involved nuclear degeneration, characterized by Chromatolysis, rupture, and dissolution of the nuclear membrane. Granulosa cells associated with degenerating follicle types (bilaminar, Multilaminar and graffian follicle) showed desquamation, cytolysis, and nuclear dissolution.Extensive vacuolation also occurred in these follicles. Only a few follicles reached the maturity. In most of the females, Graffian follicle failed to rupture, which led to failure in ovulation. This resulted in Sterility of the females.Hence need has arisen for now –carcinogenic and not- hazardous nucleic acid staining dyes.Our Present study has thus been aimed at finding out the non-carcinogenic DNA staining dyes and to compare their binding efficiency with DNA and find out which is the best DNA staining Dye which has least binding energy score and is non-carcinogenic as well. Hence now-a- days safer alternatives to EtBr are being sought after. A comparative docking study of six of such The interaction of EtBr and the six other alternative dyes (Crystal violet, GelRed, Hoechst 33258, Methylene blue, SYBR Green and GelGreen) with the ds-B-DNA were studied, their chemical structures were drawn using ChemSketch and the potential ligands were optimized using ArgusLab. Further, the docking studies of these DNA stains on a dsDNA molecule (1D49) was performed using AutoDock tools and their interaction with the DNA was visualized using Discovery Studio. The binding energies of Hoechst 33258 with the DNA was found to be better (-11.96 Kcal/mol) as compared to the other strains, thus suggesting its use as both a non-carcinogenic and highly sensitive alternative to EtBr.

Published by: Manisha Mathur, Parakh Sharma, Priyanka Yadav, Christy Joseph

Research Area: Zoology & Bioinformatics

53. Android Based Digital Attendance Recording System

In this paper, we are focusing on developing this project, which will help the lecturers to take attendance easily, securely and will have less error. For this, we are implementing android based software for digital attendance recording system at teacher’s Android mobile phone and student’s Android mobile phone. This system will help lecturers to take attendance of the students using the android mobile phone, by using Bluetooth device with fingerprint authentication of a mobile phone, those who are present in the class, whose attendance will be marked. after that captured data will be sent to server database from where attendance list will be updated automatically on the server’s database, lectures will able to edit the attendance and easily get requested information. Thus, the project will reduce the workload of lecturer by providing them the android technology based platform where they will be able to take, manage, update and see the attendance of students with efficiency.

Published by: Mr. Satish H. Jadhav, Ashutosh B. Makone

Research Area: Android Technology

54. A Review: Design and Implementation of IOT Gateway

Today’s user needs a more fast and mobile way of devices to respond. The necessity of smart devices providing connectivity to the world at each second becomes as mandatory part of our life. Therefore the connectivity of a number of smart and intelligent devices rapidly grows each year. So that according to necessity an autonomous device connection should be required. One of the impressive and powerful solutions is known as the Internet of Things (IoT).The IoT is the network of Man smart physical devices which would be connected to each other that they could interact directly with each other and collect as well as exchange data. In this project, an IoT Gateway system based on ZigBee and Wi-Fi protocols according to the typical IoT application scenarios is presented. Wireless sensor networks (WSN) is the collection of different sensors with different protocols sends data to IoT Gateway which is responsible for the conversion of different protocols in standard format and also do the conversion of internet protocols and finally gave an implementation of prototyping system and system validation.

Published by: Pushpa N Methekar, Girish R. Talmale

Research Area: Embedded systems

55. A Review: Design and Implementation of Wireless Sensor Node For IoT Gateway

The internet of things is an illustrative technologies modernization for future computing and communication. Sensors have cumulated vast consideration in both academia and industry. After all, the expected fast assumption and dispersal of IoT technologies have not still taken place till an insufficiency of understanding about IoT and how industries can apply IoT well. To understand IoT usage, conclude the dispersal orientations as IoT, and hand over decent instructions for potential IoT adopters. Zigbee, a one and only communication standard designed for wireless personal area networks, has an acutely low complication, worth, and power devastation for wireless connectivity in reasonable, convenient, devices .andevices.In this paper, we present a compact circuit of the wireless sensor node and low power consumption circuit. Wireless sensor node senses the data and this collecting data sends towards gateway by the ZigBee transmitter. In this paper, we use solar for alternate power supply.

Published by: Sushama L. Satpute, Sachin Gawate

Research Area: Embedded System

Review Paper

56. Review of MANET on different Clustering approaches

A new era is dawning for wireless mobile ad hoc networks where communication will be done using a group of mobile devices called cluster, hence clustered network. In a clustered network, protocols used by these mobile devices are different from those used in a wired network; which helps to save computation time and resources efficiently. A mobile ad hoc network (MANET) is a network in which data is transmitted from the sender to the receiver without the need for any infrastructure. In this network, the connected nodes may be in the form of laptops, mobile phones, personal digital assistant (PDA), and so on, and any node can work as a router that receives and sends packets [1]. In an ad hoc network, the delay of route traffic can be minimized by the clustering technique, and network performance, as well as data transfer control, can be improved by the selection of the routing protocol type [2]. This survey investigates the effect of using the clustering technique in ad hoc networks and how this technique can increase resource savings and decrease time delay. It also describes clustering, cluster structure, cluster linking type, and the different types of clustering algorithms used in cluster head selection and their effects on MANETs.

Published by: Arun Kumar Sharma, Pradeep Kumar Gaur

Research Area: Wireless Network

57. Assessment of Carbon Monoxide at Traffic Signals,Toll Plazas and in Main Roadside Built Houses and Impact of its Chronic Exposure on Public Health

A survey based citizen Science research of Carbon monoxide levels was conducted in Navi Mumbai, particularly at various Toll Plazas and Traffic signals.CarbonMonooxide levels were assessed in roadside built houses. Carbon monoxide is a product of incomplete combustion of organic matter due to insufficient oxygen supply to enable complete oxidation to carbon dioxide (CO2). It was found out that none of the workers included in this study had any idea about the possibility of CO poisoning due to their working conditions.By conducting interviews, it was concluded that people like the policeman, Sweeper, and Shopkeepers having shops on the roadside, are not aware of exposure and hazardous effect of carbon monoxide poisoning on health and even what precautions should be taken to prevent themselves from the diseases and health hazards. According to WHO, Monoxide the permissible level oMonoxide in the human body is 1-4ppm.Hence the current study was aimed at the assessment of outdoor Environmental air quality in the ambient air with respect to the quantity of carbon monoxide in ppm and its impact on people residing on highways and on main roads as compared to people residing in Interior locations of the roadside. It's a survey based research where a survey of CO was done and it was found out that people residing on the main road or on highways are suffering from many health problems .Most of the people on highways and main road are suffering from heart problems, fatigues breathly fatigues with depression.The level of CO was found to be more than 25 ppm on traffic signals and highways in which the traffic police stays for more than eight hours a day.Maximum policeman and people residing on main roads, near traffic signals and near toll plazas suffer with depression, fatigues, tiredness, forgetfulness, respiratory problems and with high pulse rate and low oxygen levels. Awareness program was conducted in various societies and handbills were distributed to many policemen for creating awareness about the health implications due to CarbonMonooxidepoisioning.

Published by: Dr. Manisha Mathur, Gaurang Mathur, Meeta Mathur

Research Area: Zoology

58. Evaluation of Process to Bay Level Networking Delay in IEC 61850 Substation Communication System

The modern and high-speed Peer-to-Peer IEC 61850 has opened the chance for planning and developing the sampled values that are supported information exchange among IEDs. Over the method bus network, it’s important to comprehend the transmission responsibility and real-time performance of SVs and GOOSE messages for all-digital IEC 61850 station automation systems (SASs) protection applications to deal with the responsibility, availableness, and settled delay performance we want to propose a process-to-bay level network model for varied network topologies within the OPNET creator platform. In this paper, we check varied topologies in IEC 61850 and packet delay using mesh and star topologies for LAN and WLAN and conjointly compare the performance of projected theme with an existing methodology for numerous parameters for wireless local area network and LAN by varying packet size.

Published by: Priyanka sharma

Research Area: Networking

Research Paper

59. IOT Based Waste Management for Smart Cities

Many times we see in the societies the garbage bins or dustbins are placed at public places in the cities. sometimes they overflow due to increasing in the waste or garbage. There is no automatic system to inform that dustbin is full to garbage office. In IOT based waste management proposed system, we are using smart dustbins to overcome this garbage problem. In this, the garbage vehicle has a GPS module and all information about the location of the dustbins if one of the dustbins is get filled then this dustbin informs the status of garbage to the garbage vehicle as well as garbage office through the internet. As soon as the garbage vehicle get information then it goes to the appropriate location and collects the waste or garbage.

Published by: Swapnil Kuwar, Nikam Mangesh, Patil Avinash, Godse Avinash

Research Area: IOT

60. Doctor Patient Interaction System for Android

The establishment and improvement of doctor-patient interaction system is a very important requirement, especially when the communication technology is developing rapidly. The advantages of the web can be l useful to make up the time and distance between doctors and patients and to provide fast and adequate medical services. Through the connection between user terminals and specific service, both doctors and patients are able to obtain required data to achieve a better interaction. The platform, Web services, and database technology are all gradually maturing so that we can develop a doctor- patient interaction system for Android to meet the needs of the patient and to provide Communication with patients by the doctor's more efficient and convenient means of communication with patients.

Published by: N. Bhuvaneswari, M. Latha, E. Ranjith

Research Area: Android

61. Energy Efficient Vehicle with Antitheft and Accident Control System

Security, especially the security of vehicle has become a matter of concern. An efficient automotive security system is proposed for anti-theft using an embedded system integrated containing face recognition system with Global Positioning System (GPS) and Global System for Mobile Communication (GSM).This proposed work is an attempt to design and develop a smart anti-theft system that uses face recognition system to prevent theft and to determine the exact location of the vehicle using GPS. GSM system is also installed in the vehicle for sending the information to the owner because GPS system can only receive the vehicle location information from satellites. The owner can lock or unlock his vehicle with the help of SMS. There is also accident control system which will control speed and not allow the car to dash on the car or obstacle in front. The minimum distance is maintained between the cars by matching their speeds. By maintaining the distance vehicle collision can be avoided. Also, the gasses from the exhaust are wasted so the motion of waste gasses from the exhaust pipe is used to generate power to give battery backup for system inside the vehicle.

Published by: Tushar Gajanan Tayade, Manoj Sonune

Research Area: Electronics & Telecommunication

62. Congestion Control in Wireless Communication with Multiple Radio Interfaces

Congestion control is a basic requirement for wireless communication. A number of devices need to communicate using loss-less and lower drop rate paths. Ubiquitous and wireless access to the internet was the major step taken by the introduction of the Third generation of Mobile cellular network. Still, there are some challenges due to different characteristics and prerequisites of the wired and wireless network. An important element of Network is Congestion control. Congestion control has to ensure network stability and achieves fair distribution of resources among users of the network. TCP is a well-known protocol used in networks for reliable transport and for congestion control. During almost any interaction network is used by users. Network designs using TCP-like congestion control protocols should ensure time bound and successful transaction/communication of data between users. Nowadays, people are concerned about flow completion within minimum time. People are not concerned about network efficiency, network throughput, and packet drop rate or packet delivery ratio. In this paper, we represent various possible approaches used for congestion control in the wired and wireless network.

Published by: Ms. Pranali Ghadge, Suraj Kurde, Ms. Vrushali Uttarwar, Ms. Supriya Padwal

Research Area: Wireless Comunication

Research Paper

63. Stochastic Economic Load Dispatch using Pareto Distribution with Multiple Fuels Local Convex by Bacterial Foraging Optimization

In this paper, Stochastic Economic Load Dispatch problem with Multiple Fuels is solved using Pareto distribution with local convex optimization by bacterial foraging approach. Bacterial foraging optimization is swarmed intelligence technique used to solve the problem of the power system. The algorithm is based on the group foraging behavior of Escherichia coli (E-coli) bacteria present in the human intestine. This social behavior of E-coli bacteria has been used to solve optimization problems. This paper presents a BFO to solve Economic load dispatch (ELD) problems. The result is obtaining from test system with ten generating units. In this paper performance of the BFO is compared with Particle swarm optimization (PSO). The result clearly shows that the proposed method gives a better optimal solution as compared to the other methods.

Published by: Akshay Rana, Shavet Sharma, Amandeep

Research Area: Electrical

Research Paper

64. Power System Loss Minimization Using Flower Pollination Algorithm(FPA)-A Comparative Study

There are various methods has been attained by integrating Distributed Generation (DG) in distribution systems. These methods help to reduce power losses and improve voltage profile of the system. Desirable results can also be achieved and enhanced if optimally sized DGs will be located in the systems. This paper presents a distribution generation (DG) allocation strategy to improve node voltage and power loss of radial distribution systems using flower pollination algorithm (FPA). The main objective is to minimize active power losses while keeping the voltage profiles in the network within specified limit.

Published by: Amandeep, Shavet Sharma, Akshay Rana

Research Area: Electrical

65. Simulation of MPPT Based Multilevel CUK Converter

Renewable energy sources are now a day’s becoming increasingly prevalent in distribution and generation systems. Most of the nations are installing significant solar power capacity in their grids as a supplement or alternative to other power sources. Photovoltaic (PV) energy is one of the most important energy resources since it is clean, pollution free, and endless. Maximum Power Point Tracking (MPPT) is used in photovoltaic (PV) systems to maximize the photovoltaic output power, irrespective the variations of temperature and radiation conditions. This project presents P V module with Multilevel CUK converter for electrical applications, especially for dc load application. In this project, the Multilevel CUK converter and PV system is simulated AND hardware and results are presented.

Published by: Nikunj B. Patel

Research Area: Power Electronics Converter

66. A Review on Improve Energy Efficiency in Cognitive Radio Ad Hoc Networks by Selecting Secondary User

Wireless networks combining the advantages of both mobile ad-hoc networks and infrastructure wireless networks have been receiving increased attention due to their ultra-high performance. Users have the capability to sense available spectrum in Cognitive Radio Networks (CRNs).Users can opportunistically access to the spectrum. Paper proposed for energy consumption for CRNs, Which is higher in traditional Cognitive Radio Ad Hoc Network (CRAHNs). Users mainly depend on spectrum access so the requirement of network architecture is user spectral. In the proposed network architecture, only parts of user’s are equipped with Cognitive Radio (CR) module. Additionally, user management done, a minimum number of users are selected to sense available spectrum, which aims at reducing the energy consumption further. The minimum number of users selection problem is formulated as an optimal routing algorithm problem under the constraints of energy efficiency and the real-time available spectrum information. Hence, a distributed optimal routing algorithm is proposed to calculate the optimal solution. The optimal routing algorithm in the proposed network architecture outperforms and traditional Cognitive Radio Ad Hoc Networks in energy efficiency.

Published by: Raghunath K. Borkar, Prof. Sheshnarayan Ghungrad

Research Area: Computer Science and Engineering

67. Effect of Microwave (Mw) Treatments of Resistant and Native Starches

Instead of consumption of traditional natural foods the refined foods containing high calories are consumed everyday leading several diseases. The consumption of high amount of resistant starches may improve glucose and lipid metabolism can reduce the risk of several diseases. The main aim of the study was to examine the effect of microwave (MW) treatment of resistant and native starches as in present day there is an increasing trend to use microwave in food preparation. The objective of the study was to examine the effect of microwave (MV) treatment on resistant and native starches. Two samples of untreated native starches and resistant starches were microwave treated according to 2^2 experimental design. Result shows that the cooking step affect significantly higher degradability in wheat, maize and Rs4 stanches compared to RS2 starch. Different types of RS behave similarly in case of dry heat treatment more over, the more intense moisture heat treatment cause different changes in the properties of RS.

Published by: Asha Kumari

Research Area: Microwave Heat and Starches

68. Automated Performance Evaluation System

Accurately predicting student performance is useful in different contexts in universities. Educational data mining (EDM) is an emerging discipline, concerned with various approaches such as predicting student performance, Analysis and data visualization, providing feedback for supporting instructors, recommendations for students and so on that automatically extracts meaning from large data generated by or related to people's learning activities in an educational setting. For example, identifying exceptional students for scholarships is an essential part of the admissions process in undergraduate and postgraduate institutions, and identifying weak students who are likely to fail is also important for allocating limited tutoring resources. One of the biggest challenges is to improve the quality of the educational processes so as to enhance student’s performance. The results of these studies give insight into techniques for accurately predicting student performance.

Published by: Sana Akhai, Ruchi Karia, Aniket Mahadik, Akshat Shah, Manya Gidwani

Research Area: Data Mining

69. IOT Based Water Management System for Smart City

During the past decade, water needs have increased unpredictably in India. Increasing demand of water supply has become a major challenge for the world. Wasteful usage of water, climatic changes and Urbanization has further depleted the resource. Conservation and management of the resource must be given utmost importance. In this paper, we present an IoT design for water monitoring and control approach which supports internet based data collection on real time basis. The system addresses new challenges in the water sector -flow rate measuring and the need for a study of the supply of water in order to curb water wastage and encourage its conservation. We also measure the quality of water distributed to every household by deploying pH and conductivity sensors. The traditional water metering systems require periodic human intervention for maintenance making it inconvenient and often least effective.For shortcoming of the existing models for a ubiquitous usage of wireless systems for smart quality monitoring and communicate data wirelessly.

Published by: Patawala Amatulla Hakimuddin, Bansode Navanath Pandurang, Bhong Yogesh .P, Zadbuke Ashwini .S

Research Area: Embedded Systems

70. Assessment of Mortality (Lc50) Of Cythion and Dieldrine by Filter Paper Contact Test on Earthworm Esenia Feotida

We used filter paper contact test method for obtaining LC50 for python and dieldrin. This Organophosphate is very poisonous, which affects the body and Growth of Earthworm. We had seen in the test solution of 0.8mg/cm2, 0.9m g/cm2 and 1mg/cm2of 1% dieldrin, all earthworms died and melt. Similarly, cythion 0.3 and 0.27 showed the same result. This concentration was shown super toxic to earthworms. In the test solutions of 0.1mg/cm2 and 0.2mg, the earthworms were very active and not stationary. In test solutions of 0.3mg/cm2 and 0.4mg/cm2 the earthworm was slightly less active, and in 0.5mg/cm2, the concentration of test solution earthworm was live and less active in this experiment. Similarly the 0.03m g/cm2, 0.06 mg/cm2 and 0.09 mg/cm2 concentration showed same effect for cythion. We used three replica test set for the better resulting and calculated mortality. At the end of the experiment, we observed that 0.5 mg/cm2concentration of dieldrin and 0.15m g/cm2 for cythion was shown LC50 value of mortality. In some set like 1 mg/cm2, 0.9 mg/cm2 was very highly affected on earthworm they had been broken, melt and the body had destroyed. It was shown directly effect on the earthworm’s body and growth.

Published by: Ahmad Shahzad, S. S Pawar

Research Area: Zoology

71. Healthcare Prediction Analysis in Big Data using Random Forest Classifier

An infrastructure build in the big data platform is reliable to challenge the commercial and not- commercial IT development communities of data streams in high dimensional data cluster modeling. The knowledge discovery in database (KDD) is alarmed by the development of methods and techniques for making use of data. The data size is generally growing from day to day. One of the most important steps of the KDD is the data mining which is the ability to extract useful knowledge hidden in this large amount of data. Both the data mining and healthcare industry have emerged some of reliable early detection systems and other various healthcare related systems from the clinical and diagnosis data. In this paper propose the enhanced data mining algorithm for healthcare application. It consists of three steps they are anomaly detection, clustering, and classification. In this classification algorithm use the random forest algorithm for accurately predict the patient result from a large amount of data. Finally, our experimental result shows our proposed method can achieve more accuracy result.

Published by: Subhapriya. P, R. Sujatha, K. Meghana

Research Area: Big Data

72. Implementation of 3 Phase 4 Wire Energy Meter of Class 0.5 Accuracy

Electricity is one of the vital requirements for sustainment of comfort of life. It should be used very judiciously for its proper utilization. The main purpose of this project is to measure the energy with high accuracy for industrial applications. In industry, There are lots of control panels in which the energy meters are used to measure the amount of energy consumed. Today with several manufacturers in the market , There are lots of parameters has to be considered like accuracy, cost, the size of meter etc. while designing the product. In the market, many types of energy meters are available for industrial applications but the high accuracy meters are not available that’s why it is the necessity of the market to propose an energy meter with high accuracy.

Published by: Sanjay Dhumal, Vinodpuri R. Gosavi

Research Area: Electronics Engineering

73. Biosynthesis of Silver Nanoparticles Using Lactobacillus Acidophilus and White Rot Fungus- A Comparative Study

Future perspective of nanotechnology is to enhance the biological approach. In the present investigation biosynthesis of silver nanoparticles was evolved by bioreduction of silver by mixture (AgNO3+ filtrate). The confirmation of silver nanoparticle synthesis was characterized using SPR band shown in UV-Visible spectroscopy and FTIR analysis. SEM micrographs depict puff shaped structure ranging from 20-50nm in size. Antimicrobial activity of biosynthesized Ag nanoparticle showed inhibitory activity against strains. While comparing strains, effective anticancerous activity was found in white rot fungus. This, in turn, gives the insight to develop new formulations for the conventional method in pharmaceutical companies.

Published by: Kalaivani .K, Dr. Puniethaa Prabhu

Research Area: Nanotechnology

74. Personalized Document Retrieval Using Text Mining

The data produces in the last two years has outweighed all the data existing up until then. Therefore, there is a need to organize and classify this information so that its retrieval is ideally relevant and smooth. The project in hand employs text mining and machine learning techniques to offer a solution to the problem. The project enables a user to upload a document and search for the document. A graphical user Interface is developed to enable a user to upload and type his search query. The documents are stored in a database. Naïve Bayesian classification algorithm is used to classify the uploaded documents into respective categories. A novel algorithm is developed based on tf - idf and cosine similarity and used for searching the database and retrieving documents relevant to the user’s query by considering user’s personal interests.

Published by: Meda Sai Kheerthana, Sushmitha K. S, Geethika .R

Research Area: Text Mining

75. Classification of Copy Move Forgery and Normal Images By ORB Features And SVM Classifier

the fact that the need for detection of digital forgeries has been recognized by the research community, very few publications are currently available. Digital watermarks have been proposed as a means for fragile authentication, content authentication, detection of tampering, localization of changes, and recovery of original content. While digital watermarks can provide useful information about the image integrity and its processing history, the watermark must be present in the image before the tampering occurs. This limits their application to controlled environments that include military systems or surveillance cameras. Unless all digital acquisition devices are equipped with a watermarking chip, it will be unlikely that a forgery-in the-wild will be detectable using a watermark. In this paper use COMFOD dataset by SVM with ORB features

Published by: Er. Nisha, Er. Rajnish Kansal

Research Area: Computer Science

76. A Survey of Fog Computing and its Applications

We live in a world where consumer products, goods, vehicles, industrial and utility components, sensors, and other everyday objects are being combined with Internet connectivity and powerful data analytic capabilities that promise to transform the way the world works, plays and lives. Through the Internet of Things (IoT), we are generating a humongous volume and variety of data. There is a need for a computing paradigm that allows us to perform computations on the data before it is sent to the cloud, where the opportunity to act on data might be lost. In this paper, we present one such technique called Edge computing, or Fog computing and describe some of its applications.

Published by: S. Sanjeev, Satyam Thusu

Research Area: Cloud Computing, IoT

77. Enhancement of Instrumentation Safety System for Upstream Oil & Gas Sector

This is paper discusses the implement of the close loop control PID block in Safety Instrumented System. PID Block can be implemented by user-defined block. Once the user defined block is created it can be used like normal function blocks like AND, OR, NOT. Here the block is created in Yokogawa safety systems Prosafe-RS. Normally the close loop control block is not used in the safety system so it can be used in non-safety function close loop. The PID blocked is designed by the structured text and the function block diagram language is used.

Published by: Mitesh Patel, Dr. Vipul Shah, Mr. Bhagatsinh Dodia

Research Area: Safety System Oil & GAS

78. Attitude Towards Androgynization of Roles Among Males Working in Socially Accepted Jobs for Men and Women

The paper was aimed to study attitude towards androgynization of roles among males working in socially accepted jobs for men and women. A sample of 115 male employees was selected by purposive sampling method. One group consisted of 65 males in socially accepted jobs for men such as manufacturing units, state transport service, private cabs, petrol pumps, with minimum education 10thStd and another of 50 males from socially accepted jobs for women such as nursing, unisex saloons, etc in Pune City with minimum education 10thStd, with age range 20 to 40 years. They responded to Attitude Towards Androgynization of Roles Scale by Bisht. The statistical tool ‘t’ test was used to find differences in attitude towards androgynization of roles. The results showed that there is the difference (t=5.25) in attitude towards androgynization of roles, there is the difference (t=8.63) in Model, there is the difference (t=2.70) in Prescription of Behaviour, there is the difference (t=5.13) in Exposure to varied occupations. All differences are accepted at 0.05 level. There is no difference (t=1.16) in Reinforcement of Behaviour among males working in socially accepted jobs for men and women.

Published by: Dr. Gauri Kadam, Yogita Ubhe

Research Area: Psychology

79. Image Processing Technique for Plant Disease Identification Using FCM Clustering Technique

Our paper focuses on providing information about plant diseases and prevention methods. Plants have become an important source of energy, and are a fundamental piece of the puzzle to solve the problem of global warming. There are many types of diseases which are present in plants. Diseases weaken trees and shrubs by interrupting chemical change, the method by that plants produce energy that sustains growth and defense systems and influences survival. This paper presents an improved method for plant disease detection using an adaptive approach. This approach helps to increase the accuracy of the disease level, it provides various prevention method (type and amount of pesticides to be used), the level of destruction and helps to check whether the disease spreads or not.

Published by: Niveditha C. R, Megha .S, SowmyaShree .N, Vidhya .K

Research Area: Digital Image Processing

80. Improving the Academic Performance of Weak Students in Technical Education Quality Improvement Program through An Equity Action Plan: Guidance Brief

The purpose of this brief is to identify and describe some interventions that institutions could make to improve the performance of weak students in undergraduate B.ARCH. programs. This program will include competitively select who are weak at entry and/or perform poorly during their college years. Some students may take several extra years to complete their course; some may fail to secure employment at the end of their degree program because of overall low performance or inadequate skills at the completion of the course. This brief is aimed at reducing these forms of wastage of educational resources and, equally important, of human resources. As equity in the outcomes achieved by students is an important goal of Department, that all students perform well academically and achieve their ‘post-college’ goals, securing good jobs or enter post-graduate

Published by: Prof. Ismita Singh

Research Area: Architecture Education

81. GSM Based ATM Money Transaction System

In an era of the digital world, carrying of ATM cards should no more be a restriction to withdraw the money. A simple SIM card would do the needful replacing the necessity of a physical ATM card to access an ATM. When the ATM card holder is out of station or unable to locate his ATM card and if any cash payments are to be done urgently, then he can withdraw the cash himself or by sending any executive on his behalf to the nearest ATM, can insert their SIM card in the machine, type the password and the requisite amount and then the money can be withdrawn without using the ATM card. In short, this project will deliver faster and easier cash withdrawal from the ATM without the use of ATM card.

Published by: K. Renuka Devi

Research Area: Embedded Systems

82. Campus Commune Navigation System

The project is aimed at developing a campus commune navigation system that will help in guiding the people new to our college campus or any college for that matter. An android application is prepared with tabs for several departments present inside our college premises and the person new to the college just has to click on his/her desired destination that will then open the camera of that particular mobile phone and through the use of augmented reality an arrow (3D object) will be displayed in front of his screen that will help the person to navigate to his/her desired destination more efficiently.

Published by: Vedant Soni, Arnab Tarwani, Vipul Sawlani

Research Area: Computer Science

83. Leap Motion Control Using Virtual Automation

The robot is the important part in the industrial electronics and various automation systems. That means the robot is the important part in day to day life of our human beings. In this paper shown that there is one sensor that is Leap motion sensor with help of this sensor, we can control a robotic arm or any automation system. In this system we also use raspberry pi 3 module with the help of this we can control a robotic arm or any automation system from anywhere. With the help of free hands movement, we control any output device. This system is user-friendly it reduces the efforts. It removes the use of the joysticks, remote control. The leap motion sensor is highly accurate and it highly flexible device the bending movement is more in this system. This system is a most useful system in the space technology in research parts. It uses in any emergency system like bomb diffusion.This system is used in the medical surgery detection of internal human organs.

Published by: Bhavana Gojare, S. Y Kanawade, Kalpana Bodhak, Shubham Surve

Research Area: Automation

84. Optimization of Area and Power Consumption In Carry Select Adder By Using BEC

In this paper, a high performance adder is designed for low power application. Carry Select Adder (CSLA) is known to be the fastest adder among the conventional adder structures. It is used in many data processing units for realizing faster arithmetic operations. From the structure of the CSLA, it is clear that there is scope for reducing power consumption and delay in the CSLA. This work uses a simple and efficient gate-level modification to significantly reduce the power and delay of the CSLA. Based on this modification, 16-bit CSLA architecture have been developed and compared with the regular CSLA architecture. The results analysis shows that the proposed CSLA structure is better than the regular CSLA.

Published by: N. Mageshwari, N. Sasipriya, R. Ramya

Research Area: Low Power

85. Blood Donor Communication

The theme of this project is to reduce the communication gap between donor and blood bank management. Four types of login are available on this website namely donor, user, hospital and blood bank. In this website, new donor wants to register the personal details with aadhar card number and blood group details. Aadhar card number is used to avoid the data redundancy. The donor knows the information like camp details and his/her blood status via SMS. This status will be updated to the user after few days from blood donation whether his/her blood group rejects or accepts and used or non-used in the blood bank. After three months from blood donation, a notification will send to the user via SMS/email that they are capable of denoting blood again. By using user, hospital, and blood bank login one can easily found the donor details by place and blood group by using this website and application. Also one can easily post the wanted blood group on this website. The application is a platform independent one. Below we give the brief introduction of proposed system and the system features and scope

Published by: Natesh Pandi .P, Samaya Karuppan .V, Ramya .P

Research Area: Computer Science

86. Analysis of Transient Stability Using Power World Simulator

System stability study is the important parameter of economic, transient reliable and secure power system planning and operation. The fault is created on different transient stability is analyzed for different load and generation condition.The load flow study will perform to determine prefault condition in the system using Newton-Raphson method with the help of three phase balanced fault, the variations in power angle and frequency of the system will be studied. In this paper trasient stability analysis of nine bus system will perform using power world simulator.

Published by: Mona A. Dokrimare, Kavita Dhote, Madhumita Nandane, Mohini Fandi, Mohini Umale, Sayali Gudadhe

Research Area: Power World Simulator

87. Design and Implementation of Single Level And Multi-Level CUK Converter In Dc Load Applications

The conventional power conditioning units require a DC-DC converter to deliver the required power to the dc load. This paper presents a CUK converter topology that provides DC-DC conversion along with voltage buck and boosts depending upon the Duty cycle. When the output voltage required more than the output voltage of single level at that time multilevel CUK converter can be used. In a Multi-level CUK converter topology requires less power conversion stages and reduces the size of power conditioning units and components. In this paper, the design stages of components of the Single level and Multi-Level CUK converter is presented and hardware is implemented and results are obtained for different duty cycle.

Published by: Nikunj B. Patel

Research Area: Power Electronics Converter

Research Paper

88. A Comparative Analysis Wireless Sensor Routing On Heterogeneity Cluster Using Pollination Optimization Technique

The cluster based routing protocols are most accepted to improve the network lifetime and to reduce the energy consumption of wireless sensor network. This paper presents the pollination based optimization algorithm also called OLEACH-C to improve the performance of LEACH-C protocol. The PBO algorithm is used for clustering in WSN. The node that has maximum remaining energy will be selected as a cluster head. If the two nodes having the same energy then cluster head will be selected on the basis of distance. The node that has minimum distance from the base station will be selected as CH. We optimized cluster head optimization by flower pollination algorithm.

Published by: Amandeep Kaur, Ms. Nafiza Man

Research Area: Wireless Network

89. Nearest ATM in My Location

In this application we have to initialize the available ATMs of all banks and its locations. We also have to initialize the end user mobile number to access it. In order to find the nearby ATMs the user has to give the current location of that particular user. We will give the ATMs that are available in the nearest area and also provide the distance and Rating for them. It makes full use of the mobile user’s location sensitive characteristics to carry out rating predication. Refer to these social networks involving geographical information as location-based social networks. Such information brings opportunities and challenges for recommender systems. It makes full use of the mobile user’s location sensitive characteristics to carry out rating predication. The relevance between user’s ratings and user-item geographical location distances called as user-item geographical connection. It is discovered that human’s rating behaviors are affected by geographical location significantly. The personalized Location Based Rating Prediction model is proposed by combining three factors: user-item geographical connection user-user geographical connection and interpersonal interest similarity. In particular the geographical location denotes user’s real-time mobility especially when users travel to new cities and these factors are multiple together to improve the accuracy and applicability of recommender systems.

Published by: Lakshmi Varsha .D, Nandhini S. M, Ramya .P

Research Area: Dot Net

90. One Round Privacy Preserving Meeting Location for Smartphone Applications

In this emerging world user’s are totally dependent upon the mobile phones(smart phones) through which they are scheduling their day to day activity & plans. In order to that to arrange meeting user’s can utilize their mobiles. So that they can know about their whereabouts. In this project ENMP technique used to send notification to the member’s who are needed to attend meeting after knowing about the location of the members with which the admin can plan the meeting location and timing so that, the meeting can be organized without any delay.

Published by: Vishnu Priya .G, Vinitha .P, Vanaja .B

Research Area: Android

91. Proactive Measures to Avoid Illegal Construction

Focus is to improve transparency between Government and Citizens and to deliver the government rules, regulations and plans to citizens by using the growth of technology effectively as E-Governance. Especially a proactive measure to avoid illegal construction of buildings on the dried water bodies, river bank areas and agricultural lands as plots and apartments due to urbanization. To avoid registration of agricultural land for commercial purpose. To block the approval of layout of buildings, new electricity (Electricity Board) connection, new water supply connection and loans for those lands. Brokers can be avoided by this method. We can also avoid corruption. This system will be very helpful on the time of rainfall season, to avoid flood and also save water by using these dried water bodies which will indirectly reduce the water scarcity problem for drinking and also helpful to farmers for agriculture. As all of us know that, “Agriculture is the Backbone of India”. So, we can reduce the price of all the food materials.

Published by: A. Karthikeyan, N. Mohan Prabhu

Research Area: Data Mining

92. Modification of Screw Pump by Using Intelligent Pump for Lifting Viscous Molasses in Sugar House Distillation Section

In the present work, it is proposed that the tremendous growth has continuously rise in demand for power. So energy conservation and its utilization play an important role in nowadays Currently in sugarcane industry screw pump is used, which has some limitation is as follow 1. The electrical motor is required to run the screw pump. 2. High maintenance cost 3. More consumption of electricity. 4. Low capacity of lifting high viscous molasses. 5. High initial cost. So it is necessary to adopt energy conserving industrial pump overcome the limitation of screw pump by different alternatives, some of them are; centrifugal pump, rotary pump, pneumatic pump. Amongst, pneumatic pump (Intelligent pump) is more convenient and efficient than the other pump. Its performance is very closer to the required application.

Published by: Vasekar Balaji Pandurang, Nevase Varad Mohan, Khalate Onkar Subhash, Bhagwat Amol Ganpat, Sangram D. Jadhav

Research Area: Agriculture (Sugar Industry)

93. To Evaluate the Efficacy Of Jambira Pinda Sweda In Females Suffering From Sandhigatavata (Osteoarthritis)

Sandhigata Vata is described under Vatavyadhi in Samhitas and Sangraha texts. Sushrutha has included Vata vyadi as one among the Ashta Mahagada, which is a Yapya vyadhi. In Vriddhvastha all the dhatus undergo Kshaya. Thus it leads to Vataprakopa and makes individuals prone to many diseases especially affecting the joints. Based on the symptoms, it can be compared with Osteoarthritis of Knee according to modern science. Osteoarthritis is also known as degenerative arthritis that results from the breakdown of joint cartilage. Its prevalence is more in female and among old age people. It mainly affected weight-bearing joints of the body especially the knee, hip, lumbar spine associated with ageing, physical occupation, activity, and obesity. In Ayurveda Shoola, Sotha and difficult in flexion and extension of the Sandhi (Prasarana Aankuchan Pravriti Vedana)are the symptoms. These groups of symptoms have been described as Sandhigata Vata by various acharyas. In the present study, the diagnosed cases of Sandhigata vata were treated with traditional Ayurvedic oral medicines along with local application of medicated oil and Jambira pinda i swedana as a special therapy. The result showed that Ayurvedic treatment procedures are significant in the Sandhigata vata without any ADR. The result of the present study revealed the therapeutic use of the natural product according to Ayurvedic principle and practice of Sandhigata vata. The improvement of the present Ayurvedic treatment procedure on pain 60.70%, stiffness 68.44%, restricted movement 62.30%, crepitations m 54.60% and tenderness77.66%. The overall relief was observed 64.74%.

Published by: Dr. Manoj .R

Research Area: Panchakarma-Ayurveda

94. Design an Elliptical Shaped UWB Antenna Enhanced Bandwidth by using NOTCH

Abstract — This paper presents the design of rejection band centered at 5.5 GHz is obtained by etching out incomplete inverted C type slots coplanar waveguide (CPW) with band notch. The FR4 material is used as substrate here having a dielectric constant of 4.3. The impedance bandwidth of the proposed antenna covers the frequency range from 2.6GHz to13.89 GHz. The group delay shows a flat response lying within 1ns except at the notch frequencies.

Published by: Rashmi, Pushpendra Singh

Research Area: Microstrit Patch Antenna

95. A Review on Currently Available Different Self-Inflating Tyre Systems in Commercial Vehicles

Earlier performed studies that show that a drop in tyre pressure by a few PSI may result in the reduction of mileage, tyre life, safety, and vehicle performance. Self-inflating tyre system ensures that tyres are properly inflated at all times. With the increasing prices of oil and growing concern of environmental issues, this system addresses a potential improvement in gas mileage. Thus in this paper, we reviewed the all available self-inflating tyre systems that are used nowadays in commercial vehicles.

Published by: Swapnil N. Kadam, Amol N. Patil

Research Area: Mechanical Engineering

96. Ultrasound Applications in Medical Sciences

Ultrasound is becoming increasingly important in medicine both as a diagnostic tool, as a therapeutic modality and surgery. Most medical applications of ultrasound are based on the properties of longitudinal waves in the frequency range 1-15 MHz. Ultrasonic waves travel at similar velocities (about 1500 m s−1) in most biological tissues and are absorbed in a rate of about 1 dB cm−1 MHz−1. Absorption occurs chiefly due to relaxation processes. It leads to thermal effects in biological systems. Mechanical effects, such as streaming and cavitations, are also important in certain situations, particularly at low frequencies. Highly focused ultrasound is used in neurosurgery; it is the only method for producing trackless damage deep in the brain. Diagnostic imaging using ultrasound finds applications in all tissues. Although ultrasound has been used in medicine since the 1930's, it is only recently that these techniques have been widely used and their potential fully recognized. Medical ultrasonics is now in a period of rapid growth and is on the verge of making a significant impact on clinical medicine. This field offers an open proving ground to many technologies developed for other applications, gives inspiration to the development of new technological advances, and provides a host of challenging and important problems that are unique to medicine and biology. The future of ultrasound in medicine depends upon talented people from medicine and the physical sciences working in close collaboration and upon the emergence of a new breed of research scientist trained in both medicine and engineering and dedicated not to the technology of destruction but rather to the preservation of life and humanity. The object of this paper is to present a review of the principles of medical ultrasonics and an introduction to a variety of its applications.

Published by: Dr. S. V Ranganayakulu, Sanathana Ravi, K. Sudhakar

Research Area: Ultrasonics

97. Performance of Hydroxy Gas on Diesel Engine

Limited reserves of petroleum products are turning to be a major problem in developing countries. Hydroxy gas can be a solution for this problem when enriched with Air & Diesel. Hydrogen's physical and chemical properties make it a good candidate for a supplement fuel. At normal atmospheric conditions, hydrogen is a colorless and odorless gas. It is stable and coexists harmlessly with free oxygen until an input of energy drives the exothermic (heat releasing) reaction that forms water. The cell plates have an anode and a cathode. The electric current enters the anode and then passes to the cathode through the electrolyte. The anode and cathode are made of the same materials. The quantity of HHO should be 50% of total air intake .it must be continuous in nature with higher safety precaution by carrying out all respective tests. Current supply should be adequate to generate a required quantity of HHO. When the hydroxy gas is enriched with air in a diesel engine, the thermal efficiency for compression ratio 18 increases by 13.28% comparing to diesel combustion and the specific fuel consumption is reduced by 8.7% at full load condition.

Published by: Rahul R. Shitole, Sourabh S. Magdum, Nikhil S. Raut, Sanket Mane, P. B Borade

Research Area: Mechanical Engineering

98. Extraction, Characterization and Utilization of Different Plant Pigments as PH Indicators in Titrimetric Analysis

Plant pigments are an alternative source for synthetic dyes which are generally toxic and costlier. Various plant parts contain different color pigments chemically either anthocyanins, xanthophylls, carotenoids etc. This chemical diversity exhibits different color reactions depends upon pH of the solution. In the present research work, an attempt has been made to understand the sensitivity of color solutions to acidic and alkaline environment and make use of such color reactions for titrimetric analysis. In present research work, we have selected carrot, Beetroots, watermelon, sweet almond fruits, red sandal bark, hibiscus, lantana and calendula flowers, pomegranate seeds. The fresh parts of all the selected plants were collected in their flowering seasons from the nearby area of Kolhapur and 5g each was macerated with ethanol: water (70:30) for 24h shaking frequently. The filtrate was evaporated to dryness at low temp (450C) and the residue obtained was subjected to pH sensitivity test of 1% w/v solutions at normal temp using digital pH meter. The different strength solutions of each plant extracts were tested for acid-base titrations as indicators along with commercial synthetic indicators. From the results, it was confirmed that watermelon, red sandal bark, pomegranate seeds show sharp end points in comparison with synthetic dyes. From the data obtained it is confirmed that natural plant pigments can serve as alternative indicators for various acid-base titrations at laboratory scale and is possible to develop pH indicator papers which are non-toxic, economical and biodegradable compare to synthetic dyes.

Published by: Trupti S. Ghatage, Suresh G. Killedar, Mayuri A. Hajare, Mrunalini M. Joshi

Research Area: Pharmaceutical Analysis

99. Epidemic Disease Detection and Forecasting: A Survey

The objective of this paper is to present a precise methodology to project and forecast the spread behaviors of epidemic diseases well before they occur. With numerous cases of widespread outbreaks of epidemics being reported in densely populated areas, these methodologies can help restrict the outbreak only to a small confined area. This would ensure that a better coping mechanism is provided to study the spread of infectious diseases and adequate control mechanisms are provided to reduce casualties in the form of human death. Through the course of this paper, we hope to develop a well-defined prediction methodology that can predict the likeliness of an individual being affected by a particular epidemic through assessing of early symptoms.

Published by: Siddharth Satish, Smitha G. R

Research Area: Big Data

100. A Survey on Partition Based Parallel Data Mining Algorithms for Clustering

Volumes of data are exploding in both scientific and commercial domains. Data mining techniques that extract information from the huge amount of data have become popular in many applications. Algorithms are designed to analyze those volumes of data automatically inefficient ways so that users can grasp the intrinsic knowledge latent in the data. Clustering is important in data analysis and data mining applications. Clustering is a division of data into a group of similar objects. Each group called a cluster consists of objects that are similar between themselves and dissimilar between comparing to objects of other groups. This paper is aimed to study of all the parallel data mining algorithms based on partition.

Published by: Monika Aal

Research Area: Data Mining

101. Clinical Profile And Management Of Multiple Urolithiasis

ABSTRACT Background: Stone in the urinary tract has been challenge to human being since the dawn of the history. Research over years has shown that the incdence of bladder calculi has reduced and incidence of upper urinary tract calculi has gone up slowly. With developments in different radilogical modalities, the diagnosis of calculus disease has become more accurate and the better understanding of physiochemical principles underlying the stone disease , chemical composition of urinary calculi with advent of medical therapy have shown rays of hopes to the scientists for prevention of stone diseases. Method: The present series is a study of 48 patients admitted with urinary calculi in Acharya Vinoba Bhave Rural Hospital, Sawangi Meghe during the period of two years (August 2008- July 2010). Results:In this it was observed that urinary calculi were most commonly seen in age groups from 21-30 years (19 cases) 39.50% and 31-40 years (13 cases) 27.33%, respectively followed by age groups from 41-50 years (5 cases) having incidence of 10.34%, with incidence of ureteric calculi was more i.e. 54 calculi as against renal calculi i.e. 38 calculi; bladder calculi i.e. 07 calculi and urethral calculi i.e. 03 calculi. It was observed that urinary calculi were more common in patients having mixed diet (66.7%) as compared to vegetarian diet (33.33%) and were more common in patients having milk (95.8%) in their diet as compared to patients not having milk (4.2%) in their diet. Blood urea levels were raised in 04 cases (8.33%) suggestive of altered renal functions. Serum creatinine was done in selected cases whenever indicated. 3 cases show the deranged creatinine. Urinary pH was acidic in 44 out of 48 cases i.e. 91.66% as against neutral and alkaline pH in 2 and 2 cases i.e. 4.16% and 4.16%, respectively. Urinary infection was present in 22 out of 48 cases i.e. 45.83% cases. Bacteria were present in 20 cases i.e. 41.66% cases. Microscopic Hematuria was present in 26 cases i.e. 47.91% cases. Albumin was present in 28 cases i.e. 58.33% cases. Crystals were detected in urine in 21 cases, out of which 18 were made up of calcium oxalate (37.5%), 1 were made up of triple phosphate (2.08%) and 2 were made up of uric acid (4.16%). Plain X Ray KUB could detect 96 urinary calculus out of 102 (i.e. 94.11% calculus identified). Hydrotherapy was done in 2 cases of ureteric calculi. Both Patients passed calculus in the ward 48-72 hours after starting hydrotherapy. Nephrectomy was done in 1 case of non- functioning kidney. Nephrolithotomy was done for 5 calculi. Extended pyelolithotomy was done for 5 calculi. Pyelolithotomy was done for 27 calculi.All cases were treated with antibiotics, daily-dressings and secondary suturing. Urinary leak occurred in 1 case. That case was treated conservatively. The urinary leak stopped with conservative management. One patient had secondary hemorrhage. The patient was treated conservatively. Follow-up Out of 48 cases, 35 cases came for follow-up in Out Patient Department. Thus, follow-up rate was 72.91%. Conclusion: Despite of limited resources and lack of recent techniques of ESWL, PCNL and Endourology multiple Urolithiais can be managed at rural setups

Published by: Dr. Pratik Hire, Dr. Suryapratap Singh Tomar, Dr. Kiran Kher

Research Area: Urosurgery

102. Working Of Air Compressor with Aid of Speed Braker

In our project, we are producing the compressed air using with the aid of speed breaker setup in roadways. This is the simple and easy method of producing the compressed air without using the electricity. Nowadays the electric power demand is increased. So we are generating the compressed air without using the electric power. Here instead of electric drive, we are using the mechanical drive to generate the compressed air.

Published by: P. Naveen kumar, V. Dinesh kumar, A. Gokulnath, S. Vinoth kumar

Research Area: Energy Engineering

103. Laser Wall: Possibilities and Scope in Indian Defense System

For the LASER wall installation in Indian defense system, we have to think about its geographical area and variations in climate across the country. As we know that Some places are too hot in the summer (above 490C) and some places are too cold in winter (below -500C)[1].So it is difficult for surveillance and patrolling. At those places, we can use an electronic wall which gives protection and surveillance from unauthorized entry. Laser wall technology consists of three major part e.g. LASER, Infrared Camera, and GPS system. An optoelectronic sensor is used to detect Laser beam through which a microcontroller regularly maintain a proper voltage level. If anyone cross that laser beam light then there is a disruption in voltage level and microcontroller generate a signal which is transmitted through GPS system and that warning signal being sent to the base camp station, thermal images of the particular area are also sent through GPS system simultaneously. Since each microcontroller may hold a unique ID of that particular location through which it can be easily identified by that location.

Published by: Ashutosh Dhar Dwivedi, Raj Lakshmi Shukla

Research Area: LASER Technology

104. Role of Information Technology in Human Resources Management

The Internet has changing our lives and the way we interconnect with the others, how we work, how we learn and spend free time, in short, it has changed human society. Information technology (IT) as a set of offered scheme is available for people and organization through hardware mechanism and plays a main role in the growth of human resources. In today’s world, Information technology is the important factor for the growth of human organization and group. This paper encloses a brief overview of the role of information technology in human resources management. Today top CEO knows the power of internet and information technology (IT) mode for reaching organization goal. The utilization of internet and information technology equipment helps not only to complete organization aim but to optimize work evaluation as well.

Published by: Jyoti Rohilla

Research Area: HRM

105. Big Data Analytics for the Social Security Smart (SSS) Card (National Identity Card) Usage for All Citizens

Discovering the data for the smart card is the collection of data and the development of an application for the social security smart card for the Indian citizen also the design of this application. A smart card is designed is look like typically a type of chip card, is a plastic card that contains an embedded computer chip–either a memory or microprocessor type–that stores and transacts data. The social security card contains only one social security number and the usage of this card is to provide a single card for all the purposes. It can be distributed to all the citizens of India with a Security number. This number is the identity in future for various purposes. With this tracking of a particular person in a particular place is easy.It is used to transact the money only in digital (numbers), not in rupees. It eliminates the money and paperwork.Using this card the wages will be credited to this card.

Published by: Ambiga

Research Area: Big Data Analytics

106. Design and Fabrication of Low Cost Additive Manufacturing Machine

This paper describes the design of a 3D printer by reducing its cost to the optimum level. 3D printing technology has become an emerging topic in today’s technological discussion. All over the world companies and individuals are doing experiments by extruding plastics, metal objects for prototyping or their own needs. To satisfy these demands we have developed a machine named as “Additive Manufacturing Machine” based on 3D printing technology. Using this machine user can turn any digital file into a three-dimensional (3D objects) physical products. In this paper, we will look for the additive manufacturing. First, we will define what we mean by this term. Then the methods used in this technology and how we have reduced its cost. Then we will delve a bit into the advantages over conventional methods of manufacturing. We shall observe a lot of applications in today’s world. Finally, the future potential of this technology is outlined.

Published by: Pradeep R. Shedge, Ajay D. More, Sarang N. Chachar, Aniket K. Kamble, Dipak D. Kirve, Prof. S. M Huddedar, R. R. Narkar

Research Area: Mechanical Engineering

107. Space Vector Control Method for PM-BLDC Motor

Several methods have been proposed to eliminate the low-frequency torque pulsations for BLDC motor drives such as Fourier series analysis of current waveforms and either iterative or least-mean-square minimization techniques. Most methods do not consider the flux linkage control, therefore possible high-speed operations are not feasible. In this work, a novel and simple approach to achieve a low-frequency torque ripple-free speed and flux control with maximum efficiency based on dq reference frame similar to the permanent magnet synchronous motor (PMSM) drives is presented. The electrical rotor position is estimated using winding inductance, and the stationary reference frame flux linkages and currents. Moreover, this method also permits to regulate the varying signals. Simple voltage vector selection look-up table is designed to obtain fast torque and flux control. Furthermore, to eliminate the low-frequency torque oscillations, two actual and easily available line-to-line back- EMF constants (kba and kca) according to electrical rotor position are obtained offline and converted to the dq frame equivalents using the new Line-to-Line Park Transformation. Then, they are set up in the look-up table for torque estimation.

Published by: Ramesh Amale, Anil Kuchekar, Ravi Kumar, Venkatgiri Badarayani

Research Area: Electrical

108. Automated Diagnosis of Heart Disease using Data Mining Techniques

The accurate diagnosis of heart diseases, is one of the most important biomedical problems whose administration is imperative. In the biomedical field, The classification of disease using data mining is the critical task. The prediction accuracy plays a vital role in disease data set. More data mining classification algorithms like decision trees, neural networks, Bayesian classifiers, Support vector machines, Association Rule, Ensemble techniques are used to diagnosis the heart diseases.

Published by: Prof. Priya R. Patil, Prof. S. A Kinariwala

Research Area: Data Mining

109. Automation of Lubrication System

In engines, frictional losses are mainly due to slide as Well as rotating parts Engine friction is expressed in terms of frictional power Friction all losses is mainly attributed to the following mechanical losses

  • Direct frictional losses
  • Pumping losses
  • Power loss to drive the components to change and scavenge Power loss to drive other auxiliary components
A good engine design should not the total frictional losses to be more than 30%of energy input in Reciprocating engine. It should be the aim of a good designer to reduce friction and wear of the parts subjected to relative motion. This is achieved by proper lubrication system
  1. Direct Frictional Losses:
It is the power absorbed due to the relative motion of different bearing surfaces such as
  • Piston rings,
  • main bearings,
  • Cam shaft bearings etc…
  1. The frictional losses are comparatively higher in the reciprocating engine.
  1. Pumping Loss For4-stroke engines Considerable amount of energy is spent during the exhaust
Processes. The pumping loss is the net power spent by the engine (piston) on the working medium (gasses) during intake and exhaust strokes. For2-stroke engines this is negligible since the incoming fresh mixture is used to scavenge the exhaust gasses Power Loss to drive the components to change and scavenge 4-strokeengine. In turbo/supercharged engines the intake charge is supplied at A higher pressure than the aspirated engines For this purpose mechanically driven compressor or turbine driven compressor used accordingly the engine is called Supercharged or turbocharged engine.

Published by: Sagar Ghodake, Kade Vikas, Agarawal Gajmukh, Doekate Ashish, Balaji Pandurang Vasekar

Research Area: Mechanical Engineering.

110. Detection and Analysis of Network & Application Layer Attacks Using Honey pot With System Security Features

Information security in the sense of private and social interactions has become a top priority in digitalized modern world in parallel to the new technological developments. Many approaches, tools, and expertise are used to provide the information security to the information systems. A honeypot is an active defense system for network security. It is able to trap attacks, record intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with the other security solutions, the honeypot is able to solve many traditional dilemmas. We expatiate key components of data capture and data control in a honeypot and give a classification for honeypot according to security goals and application goals. A honeypot is Java based deception tool having influential services (FTP etc.), it is a “Rule & Anomaly” based intrusion detection engine and a network-based administration and monitoring tool. This paper analysis the attack detector with existing system drawback which presents proposed approach more efficiently. Additional system security features are also added based on accessing the system securely. Features like detection of an intruder based on the timestamp and log-in details are considered. Tracking of the user is based on the system log and other databases pre-defined for secure accessing.

Published by: Akshay Harale, Sanket Tambe, Ganesh Kothawale

Research Area: Network Security

111. Buck-Boost Operation Using a Z-Source Inverter

An impedance-source (or impedance-fed) power converter (abbreviated as Z-source) and its control method for implementing dc-to-act, ac-to-dc, ac-to-ac, and dc-to-dc power conversion are presented in this paper. This impedance converter employs a unique impedance network (or circuit) to couple the converter main circuit to the power source, hence provides a unique feature that cannot be obtained in the traditional converters where a capacitor and inductor are used, respectively. The Z-source converter overcomes the conceptual and theoretical barriers and limitations of the usual source converter (known as a V-source converter and I-source converter) and provides a novel power conversion concept. The Z-source concept can be applied to all ac-to-ac, dc-to-ac, dc-to-dc, and ac-to-dc power conversion. To describe the control and operating principal, this paper explains an example: a Z-source inverter for dc-ac power conversion needed in fuel cell applications.Experimental results and simulation are presented to demonstrate the new features.

Published by: Aman Sharma, Shanti Dev Singh, Rahul Yadav, Shaista Fatima

Research Area: Electrical & Electronics Engineering.

112. Raspberry Pi Home Automation Using Android Application

The project presents a low cost and flexible home control and monitoring system using a Raspberry PI module and a Static Relay, with internet connectivity for accessing and controlling devices and appliances remotely using Smartphone android application. The proposed system does not require a dedicated server PC with respect to similar systems and offers a novel communication protocol to monitor and control the home environment with more than just the switching functionality. To demonstrate the feasibility and effectiveness of this system, devices such as Static relays and a wifi router can be integrated with the home control system.

Published by: Himani Singh Dhami, Nidhi Chandra, Nishank Srivastava, Avanish Pandey

Research Area: Electrical & Electronics Engineering

113. Automatic Irrigation System Using Internet of Things

An automated irrigation system was developed to optimize water usage for agricultural crops. The system has a distributed wireless network of soil moisture, humidity and temperature sensors placed in the root zone of plants. A central control unit handles sensor information, triggers actuators and transmit data on the internet so the user can monitor the field in real time from any remote location. An algorithm was developed depending on the threshold values of the soil moisture, humidity and temperature and is programmed into the central control unit to control the quantity of water fed to the field for irrigation. The whole system is powered by solar energy. Sensing unit and central control unit are connected with each other via a wireless link. Because of low energy consumption, low cost, and energy autonomy, the system have potential to be useful in water-limited geographically isolated areas.

Published by: Azim Khan, Shubham Singh, Shiva Shukla, Atul Pandey

Research Area: Electrical and Electronics Engineering

114. A Literature Review on Lean Manufacturing Techniques

Lean manufacturing is a proper technique to identifying and eliminating waste through continuous improvement. In lean manufacturing do more with less: time (production time, waiting time etc..), inventory, men, and money. At present time, Lean Manufacturing has become a worldwide technique. It is very successful in drawing the attention of companies of all sizes. Many organizations are following Lean technologies and experiencing drastically improvements in quality, production, customer service, and profitability. Process improvement is an iterative method of seeking the elimination or reduction of non-value adding work embedded in a process. Non-value-adding work is described as elements of work that a customer is unwilling to pay for. The Lean manufacturing technique is meant to convert non-value added activity into value added activity. Lean manufacturing has its effect on the manufacturer and the customers alike. A lean organization understands customer value and focuses its key processes to continuously increase it. The ultimate goal is to provide perfect value to the customer through a perfect value creation process that has zero waste.[2] This paper gives the literature survey on various type of industry to apply the lean manufacturing. And introducing about lean .what is lean manufacturing, why it is needed, and method of lean manufacturing that reduces waste. And also to introduces about different lean tools.

Published by: Arpit Jayswal, N. D Chauhan, Rahul Sen

Research Area: Lean Manufacturing

115. Dynamic Job Ordering and Slot Configurations for Mapreduce Workloads

In the dynamic MR process apart from the three concepts present in the paper, we are going to introduce clustering approach. In addition to the multi data center processing, we are going to add clustering concept. Because we are going to split the data and process the data in multiple data centers. If we combine the similar data’s into clusters using the k-means algorithm. By clustering the data we can able to process the data in short execution time. After preprocessing, we split our process into multiple files and apply clustering process. Here we are going to use k-means clustering algorithm which is a standard algorithm, which helps to process the data in a short execution time. We improve the performance of a MapReduce cluster via optimizing the slot utilization primarily from two perspectives. First, we can classify the slots into two types, namely, busy slots (i.e., with running tasks) and idle slots (i.e., no running tasks). Given the total number of map and reduce slots configured by users, one optimization approach (i.e., macro-level optimization) is to improve the slot utilization by maximizing the number of busy slots and reducing the number of idle slots. Second, it is worth not in that, not every busy slot can be efficiently utilized. Thus, our optimization approach (i.e., micro-level optimization) is to improve the utilization efficiency of busy slots after the macro-level optimization. Particularly, we identify two main affecting factors: Speculative tasks based on these, we propose DynamicMR, a dynamic utilization optimization framework for MapReduce, to improve the performance of a shared Hadoop cluster under a fair scheduling between users.

Published by: Prathamesh Chaudhari, Gaurav S. Salve, Nilesh Ghadge, Harish Barapatre

Research Area: Hadoop

116. Underground Cable Fault Distance Locator

In this paper, a method to detect the fault and the distance at which the fault has occurred is calculated. The fault location in the underground cable is a bit cumbersome process so to deal with such problem a method is given in this project. To determine the location of fault a series resistor is used and the voltage across this resistor is measured and then is sent to the microprocessor to calculate the distance at which the fault has occurred. This is a safe and cheap method for obtaining the fault location in an underground cable. This method also does not have a high power requirement and is portable too.

Published by: Gaurav Ojha, Abhilash Guha Roy, Rahul Verma, Vishal Kumar

Research Area: Electrical and Electronics Engineering

117. Smart RTO System

This document describes the project of SMART RTO SYSTEM(SRS).It describes the development of technology. Saving time and making more efforts for Traffic Police. Our Objective is to provide the advanced technology to Police officer. This document is all about the system used for traffic challan. It consists of interfacing of the printer and Smart card reader to an Android phone. The data will be stored on the Main server. All the functions will be made according to the Indian Penal Code Sections. The machine will be connected to the server.The penal code will be entered by traffic police officer and it will print the challan with IPC section code and amount of penalty.

Published by: Avanish Mishra, Ashish Singh, Rajeshwar Singh, Prof. Nilima Nikam

Research Area: Android and Embedded

118. Automated Parking and Security System

This paper focuses on implementing Raspberry Pi based “ Automated Parking and Security System”, using different technologies based on the developments in Smart Sensors, Image processing and Raspberry Pi- RPI model with their comparative analysis. The research survey includes the current scenario of the Parking Systems incorporating technologies such as Automatic Number Plate Recognition- ANPR, RPI, Wireless sensor network and Wi-Fi based automatic space booking system. The combination of above solutions is considered for designing and implementing an “Automated Parking and Security System”, going to be considered as “One Time Investment”. The prototype is established on grounds of RPI 3B model, Image Processing - blurring, dilating, eroding, contouring and segmenting of Number Plate and Face Recognition which would resolve the problems faced by existing systems and would satisfy the requirements of an accurate and secured parking system. As a whole, it is a confined user-friendly and easily modifiable for future requirements and applications.

Published by: Ridhi Sharma, Kanishka P. Jasani, Ankita R.Jaiswal, Poonam R. Bais

Research Area: Electronics and Communication

119. Bioprospecting of Neem and Hibiscus against Corrosion Caused By Soil Microbes on Zinc and Its Alloys Buried In Soil

This study concerns with the role of corrosion product deposition in microbial corrosion between zinc and its alloys buried in the soil and soil microbes such as S.aureus, Streptococcus, B. subtitles, Lactobacillus, Proteus, Corynebacterium, Pseudomonas, A.niger, Mucor and Desulphovibro sp and also about inhibition by using plant extracts of Neem and Hibiscus which have phytochemicals like flavonoids and alkaloids that detecting by using techniques such as weight loss and thermodynamic studies. Langmuir and Freundlich, Temkin and Florry-Huggins models are employed to analysis adsorption occurred in the experimental data of adsorption isotherms. The Freundlich, Langmuir and Temkin models are employed to analysis adsorption occurred in the experiment.

Published by: R. Prasanna

Research Area: Biotechnology

120. Design and Development Waste Heat Recovery from Domestic Refrigerator

In today’s world the tremendous requirement of energy in needed in every sector like automobile, civil, power plant etc. in the view of this point, we need to recover the waste heat for various applications. This type of heat recovery will ultimately increase the productivity and efficiency of factories. This waste heat can reuse as input by various methods, out of this we take the case study of the domestic refrigerator. There is an economic reason to extend the useful life of the landfill because once the old landfill is filled, the new one can be found only at the greater distance, and this increases remarkably the transportation cost. Therefore, waste has to be recovered as much as possible. To do this, in developing countries context, small-scale composting promotion is widely accepted and the contribution of informal recycling is also widely recognized. The question remains to what extent composting and informal recycling contributes to the waste diversion. To create a platform for discussion and learning, a model is established. The model in this paper is based on the system dynamics (SD) approach. The simulation results with the data collected in Phnom Penh city, Cambodia, show that waste recovery through small-scale composting and informal recycling cannot contribute significantly to the waste diversion without other supporting policies.

Published by: Pratik Kumbhar, Banti Deokate, Jivraj Deokate, Akash Bidve, Prof. N. D. Gadhave

Research Area: Mechanical Engineering.

121. Design and Fabrication of Pipe Bending and Pipe Rolling Machine

This paper presents the design and fabrication of combined pipe bending and pipe rolling machine. There is no single machine made to perform both rolling and bending operations. Hence we have selected this project to design and fabricate combined bending and rolling of pipe using single power source. The defects occur during bending are too much tedious to eliminate. While designing the machine we tried to minimize defects and minimize the initial cost of the machine. Using this machine both bending and rolling of pipe of outer diameter 19 mm and thickness 1-2 mm is possible with single power source only.

Published by: Rohit Vilas Thorave, Pendse Ashutosh .S, Shriraj Vishwanath Kumthekar, Akash Prashant Patil, Shivam Gurudatta Pawar, Prof. Sharad S Dhende

Research Area: Mechanical Engineering (Design).

122. Multi Spindle Drilling SPM for G91 Engine Hood

The use of SPM increases productivity and maintain the accuracy of drilling operation for a number of times. This paper gives literature survey about multi-spindle drilling machine and focuses on previous development in Multi-spindle drilling machines. Multi-spindle head machines are used in mechanical industry to increase the productivity of machining systems. The multi-spindle drilling machines are production type of machine. It is used to drill two holes in a workpiece simultaneously in one setting. The holes are drilled on a number of workpieces with the same accuracy to make them interchangeable. The overall use of drilling SPM increases productivity rate largely as compared to a use of conventional drilling machines.

Published by: Shreya Dinesh Gurav, Shreyas Katti, Shubham Sanas, Y.G Nadargi, Vitthal Wakchaure

Research Area: Mechanical

123. Image Processing For Haze Removal

This paper focuses on implementing image processing for human understanding in low visibility using different image processing technologies, high-speed processors, employing the BBB board in designing embedded systems and protocols with their comparative study. We have proposed a system called as “image processing for human understanding in low visibility”. The purpose of this application is to overcome the problem of Low-visibility conditions for Navigation of vehicles. Driving at night, in blizzards, in sand storms, or in fog form an obvious set of challenging conditions. The main aim is to solve the problem of low visibility by advanced image processing technique purpose to improve the perceptual quality of images that lack the contrast or color depth perceived by the human visual system. This paper provides the use of high-speed infrared cameras and advanced image processing techniques to deal with the problem of low visibility.

Published by: Surabhi Deshpande, Shivali Pande, Saloni Dajjuka, Harshal Baheti

Research Area: Image Processing

124. Geopolymer Concrete: An Experimental Investigation of Workability and Compressive Strength of Geopolymer Concrete with PPC

The Romans constructed the Colosseum from a primitive form of concrete. It was made by using concrete using lime, which was burned to create quicklime, water and volcanic ash. The volcanic ash served as the aggregate and is likely the reason Roman concrete, which was 10 times weaker than the concrete used presently, but it lived even after almost 2,000 years. Moreover Pyramids were possibly made of this long lasting material the Pyramids are still in good shape, which demonstrates the excellent durability of geopolymer. This era have witnessed a lot more varieties of construction and concrete. This paper is an exploration of “Geopolymer Concrete” which offers the “greenery” construction as well as to reduce the air pollution and consumption of Cement. The Ordinary Portland Cement (OPC) is most widely used construction material, approximately for every tone of cement production 1 tone of CO2 emitted by cement factory. The Cement production is responsible for approximately 5% emission of Co2 of world. Geopolymer Concrete results from high silica rich material. A research undertaken included study of Geopolymer Concrete mix design, Workability, Compressive and Tensile strength of concrete. A low calcium fly Ash was used with both Sodium silicate solution and Sodium hydroxide solution in mix. Sodium hydroxide solution with 5M, 8 M, 10 M and 12 M concentration, Sodium silicate to sodium hydroxide ratio is 2.0 was used .The ratio of Alkaline liquid to fly ash 0.49, heat curing was adopted at 60 + 5°C for 24 h and room temperature curing at 23 + 2°C.

Published by: Er. Pankaj Kumar Singh, Inderjit Singh

Research Area: Civil Engineering

Research Paper

125. Purification of Biogas

The following paper describes production of biogas and purification of biogas. We have performed experimentation on biogas production. The raw material used for biogas production are kitchen wastes. The paper describes the Anaerobic digestion process used for biogas production. This paper describes the properties the properties of biogas like colorless odorless, etc. and advantages and disadvantages. Biogas has numerous purposes and also can be as the energy source. Biogas involves different components of gasses like Methane, Carbon Dioxide, Hydrogen Sulphide, and moisture content. Purification biogas means removal of Carbon Dioxide, Hydrogen Sulphide, and moisture content.

Published by: Mohasin A. Shikilkar, Raviraj K. Mane, Shubham U. Mali, Birudev B. Sule, Dipak P. Ombale, Prof. S. M. Huddedar, Prof. R. R. Narkar

Research Area: Mechanical Engineering

126. Blurry Image Restoration by Joint Statistical Modeling in a Space-Transform Domain

Analyzing images, to estimate the underlying parameters that lead to their formation is fundamentally an inverse problem. Since the observed image alone is usually not enough to uniquely determine these parameters, statistical models are frequently used to choose a likely solution from amongst those that are consistent with this observation. In this dissertation, we use such a statistical approach to develop image models and corresponding inference algorithms for two vision applications and then explore image statistics in a new domain.

Published by: Akshay Pramod Khopkar, Viraj Varadaraj Prabhu, Monika Vinayak Kedar, Harish Barapatre

Research Area: Noise Reduction

127. Automatic Braking System

In the present work, it is investigated that the tremendous growth has continuously risen in demand for automobile and automotive sector. In the view of this, we need to advance our technology regarding light and heavy duty vehicles. The necessity of automatic breaking system is designed and implemented by pneumatic principle. Automatic brake with the pneumatic bumper system is an additional safety to heavy vehicles with the passenger car. It is easy to make such a system in heavy air brake vehicles. An emergency switch is provided for emergency uses.This switch avoids the driver to stand from his seat. The project carried out by us made an impressing task in the field of automobile manufacturing industries. It is very useful for the workers work in the lath and small scale industries. This project will reduce the cost involved in the concern. The project has been designed to perform the entire requirement task at the shortest time available.

Published by: Ashwini A. Kamble, Vishal Nalawade, S. S. PATIL

Research Area: Mechanical Engineering

128. Patient Management system

Patient Management System is an android application, which is proposed for the management of the patients. It includes registration of patient, storing their details into the system, computerized billing and scheduling appointments. Our software has the facility to give a unique id for every patient and stores the details of every patient automatically. The user can search availability of a doctor’s appointment and the could book the appointment using the id. It is accessible either by an administrator or receptionist. It is efficient and error free. The data are well protected for personal use and makes the data processing is well reliable. It also gives the facility of importing and exporting of medical reports.   A significant part of the PMS involves the acquisition, management and timely retrieval of the information. It aims at standardizing data, consolidating data ensuring data integrity and reducing inconsistencies

Published by: Kundan Vijaykumar Patil, Harsh Patel, Jignesh Parmar, Prof. Nilima Nikam

Research Area: Android

129. A Comparative Study of RSD Based ECC Processor Using Karatsuba Algorithm and Vedic Multiplier

Elliptic curve cryptography is the most secure public key encryption technique.  Public key encryption means different keys for encoding and decoding. The processor based on RSD(redundant signed digit). The processor employs karatsuba of man method and Vedic multiplier for multiplication purpose. The processor can do all the arithmetic operation using an ALU(arithmetic logic unit). A comparative study between these algorithms to achieve high throughput multiplication. The implementation result based on Xilinx Spartan 3E XC3S1600E shows that the proposed algorithm can do scalar point multiplication p256.

Published by: Mitha Raj, Amarjith Singh

Research Area: Cryptography

130. An Effective Performance of Smart Sensor Network Using IOT

Wireless sensor networks (WSN) are used to monitor physical or environmental conditions like temperature, sound, pressure, etc. Due to the monitoring process, it requires more energy and power. But the major drawback is energy consumption and it is difficult to maintain the energy level of each sensor node. To overcome these issues, proposed a new algorithm called SSNC (smart sensor network Using Clustering approach). This approach helps to avoid the energy consumption by replacing the dead cluster head for efficient communication between the cluster members. And also scheduling process will be done through this algorithm. Experiment results analyze the performance of SSNC using network simulator version 2.35. Simulation parameters such as packet delivery ratio, control overhead, normalized routing overhead, and delay have been analyzed. This SSNC (smart sensor network Using Clustering approach) has increased the packet delivery ratio of 80% and reduces the routing overhead, control overhead, and delay.

Published by: Vijitha Ananthi J, V. Chinnalagi, R. Murugeshwari, T. Priyadharshni, K. Rajalakshmi

Research Area: Networks

131. Implementation of Hydraulic Quick Die Clamping System

Hydraulic Quick die clamping system (HQDCS) mainly focuses on rapid clamping and unclamping die. It is concerned particularly with the productivity improvement by reducing the timing of die clamp-unclamping. HQDCS is a system, which is a safe, quick and simple way to clamp dies, workpieces. The organizations are facing the problem of reduction in productivity and it is due to maximum loading and unloading time of die. To achieve these objectives there is need to study the various clamping system, hydraulic system and improvement in productivity by HQDCS system. With HQDC system, only button operation is required to lock the die. Die change time would only take a few minutes. A further object of this invention is to provide a hydraulic clamp for quick die clamping of the press machine and makes the use of the already existing hydraulic system. Implementation of HQDCS improves machine efficiency, clamping time and this ultimately improves production rate.

Published by: Akshay Bule, S. D Kalpande, Amol Deore, Premraj Joshi, Sumeet Gosavi

Research Area: Die Clamping

132. Road Assistance System Using GPS

The Road Assistance application was developed with the aim of providing emergency roadside assistance services round the clock to ensure a pleasurable and uninterrupted journey virtually anywhere. The application is designed to enhance the user experience and ensure that users get immediate and hassle free service in the event of any vehicle breakdown. Our application shall make all possible efforts to locate and direct the nearest service provider to user’s location. The application doesn’t just assure a prompt service in the rare event of a car breakdown, but it also helps with the mechanical breakdown towing, fuel delivery, flat tyre change and car collision etc. The application helps you to find your nearby service centers as well as the fuel stations in case of emergency situations like insufficient fuel on vehicles and Unavoided incidents like puncture, break failure, doping etc. The exact locations with the distance from your place with the directions using Google Maps let you know with ease to access with the help of this application on your smart mobiles.

Published by: K. Iswarya, D. Devaki, E. Ranjith

Research Area: Android

133. Value Stream Mapping For Gear Manufacturing Mapping

Lean manufacturing is being followed by various organizations over these few decades. Lean manufacturing is started in many companies in order to enhance manufacturing practice change which mainly focuses on improving the efficiency of operations by eliminating and reducing wastes. Value Stream Mapping (VSM) is one of the key lean tools used to identify the opportunities for various lean techniques. The contrast of the before and after the LP initiatives in determine managers potential benefits such as reduced production lead-time and lower work-in-process inventory. As VSM involves in all of the process steps, both value added and non-value added, are analyzed and using VSM as a visual tool to help see the hidden waste and sources of waste. A Current State Map is drawn to document how things actually operated on the production floor. Then, a Future State Map is developed to design a lean process flow through the elimination of the root causes of waste and through process improvements. An Implementation Plan then outline details of the steps needed to support the LP objectives. This paper demonstrates the VSM techniques and discusses the application in an LP initiative on a product case study.

Published by: Shubham Arjun Kadam, Saish P. Torgal, Pramod S. Kharade, Shubham K. Chavan, Ganesh A. Shinde, S. M Huddedar

Research Area: Mechanical

134. Web Hosting And Live Streaming Using Raspberry-Pi For Home Automation

In this busy and comfortable lifestyle of peoples, communication technology has evolved in such a way that any information will be accessed from anywhere, at any time, by anyone. In today’s communication technology, communication is not only constrained between two computers, but it is a complete network called the internet. With advanced internet technology today not only we can access the information from anyplace, at any time, by any person, but we can also control and monitor various devices from anyplace, at any time, by any authenticated person, this technology is called Internet of Things (IoT). This report represents the application of IoT for Smart Home Automation system which includes a Raspberry Pi as a processing unit for data which is extracted from various sub-systems like, Temperature sensing system, Automatic light system, Cooling system, Gas detection system, Water level sensing system, Motion detection system and Lights on and off system. All these systems are monitored and controlled remotely by a web page.

Published by: Anuja Borkar, Krutika D. Sargar, Siddhi U. Jadhav, Shraddha J. Satpute, Ruchika R. Karande

Research Area: Computer Engineering

135. Design of Domestic Airport in Hilly Terrain

In this project, we have designed a domestic Airport for hilly terrain. In this, we had designed the terminal building, runway, and taxiway. Also, we had used the natural light for daytime and solar panels for electrical needs of the Airport. We have provided service road and ambient parking for passengers. By testing the site conditions such as soil testing, wind speed test, and collection of rainfall data we have decided the direction of the runway then after we have designed the pavement for the runway .For the convenience of passengers, we have also planned the terminal building. Taxiway and other communication facilities also have provided for the airport. We have provided concentric panels for the electricity generation and supplied to the terminal building.

Published by: Monish R. Howale, Prathamesh R. Chikane, Chaitanya M. Jadhav, Sanjana A. Jadhav, Priyanka P. Kale, Prof. S. S Lembhe

Research Area: Civil Engineering

136. Cuckoo Hashing & Finding Loop

We will present a simple cuckoo hashing with an example of how it works. Along with it, we will present an algorithm to find loop in cuckoo hashing

Published by: Nitesh Gupta, Dr. Om Prakash

Research Area: Computer Science

137. Design and Manufacturing of Seed Sowing Machine

The basic objective of showing operation is to put the seed and fertilizer in rows at desired depth and seed to seed spacing, cover the seeds with soil and provide proper compaction over the seed. The recommended row to row spacing, seed rate, seed to seed spacing and depth of seed placement vary from crop to crop and for different agro-climatic conditions to achieve optimum yields. The comparison between the traditional sowing method and the new proposed machine which can perform a number of simultaneous operations and has a number of advantages. As day by day the labor availability becomes the great concern for the farmers and labor cost is more, this machine reduces the efforts and total cost of sowing the seeds and fertilizer placement.

Published by: Nagesh B. Adalinge, Ganesh P. Ghune, Ganesh B. Lavate, Rahul R. Mane

Research Area: Agriculture

138. Image Content Analysis and Classification Using Fuzzy Set

Content-based image retrieval (CBIR) is the application of computer vision techniques to the image retrieval problem, that is, the problem of searching for digital images in large databases. "Content-based" means that the search analyses the contents of the image rather than the metadata such as keywords, tags, or descriptions associated with the image. The term "content" in this context might refer to colors, shapes, textures, or any other information that can be derived from the image itself. CBIR is desirable because searches that rely purely on metadata are dependent on annotation quality and completeness. Having humans manually annotate images by entering keywords or metadata in a large database can be time-consuming and not capture the keywords desired to describe the image. The evaluation of the effectiveness of keyword image search is subjective and has not been well-defined. In the same regard, CBIR systems have similar challenges in defining success. In this project, retrieval images are carried out by certain feature extraction methods such as Color Feature extraction, Texture feature Extraction and Shape Feature Extraction has been performed. In Color Feature extraction, Color Histogram, Color Moments and Color Auto Correlogram have been proposed. For Texture Feature Extraction Gabor wavelet and Haar, Wavelet process has been implemented. Finally, for Shape Feature Extraction, Fourier Descriptor, Circularity features have been proposed. The extracted features are then optimized by Co-occurrence matrix, where features are optimized and approximated to relevant features. These features are finally classified with similarity computation Euclidean distance to retrieve the relevant images from the databases.

Published by: Rohan Rajesh Dabhilkar, Aniket Ashok Mandape, Tushar Subhash Salvi, Harish Barapatre

Research Area: Image Processing

139. An Emergency Message Dissemination Protocol Using Greedy Forwarding Technique and Clustering For Vanets

Vehicu1ar Ad Hoc Networks is oriented to vehicular communication and regarded as one specific application of Mobi1e Ad Hoc Networks. The prospect of its applications in the inte11igent transportation and entertainment services is cheerfu1. The paper makes a research on GPSR (Greedy Perimeter State1ess Routing for Wire1ess Networks) protoco1. Ana1yze how it works in detai1 and points out its defects in different environments. Then put forward an improved GPSR protoco1 based on position vector aiming at some defects First of a11, it introduces the VANET’s history of development and protocols on some important 1ayers in brief. Based on the comprehensive understanding of the routing mechanism, study the suggested solution for each of defects. Based on the position vector ca1cu1ation and simp1e redundancy elimination, GPSR protoco1 is modified. Moreover, a preliminary assumption is presented specia1 for retrograde motion. Through the comparison with the origina1 one, it proves that the improved protoco1 performs better. We need to carry out the simulation of VANET in the computer environment i.e. we shou1d do a computer simulation. Computer simulation is risk and danger free, we can generate different scenario (rura1, urban, co11ision of vehicles) of the VANET using this. So computer simulation is very important for VANET research. Simu1ation of VANET is divided into two part a. Traffic simulation: Generation of traffic movement, defining the mobility mode1 for vehic1e and creating traffic movement. b. Network simulation: Generating Intercommunicating vehic1e, Defining communication protocols. And both the simulation is connected in the bi-directiona1 coupling.

Published by: Harpreet Singh, Dr. Anju Sharma

Research Area: Computer Science & Engineering

140. Complexity of Cuckoo Hashing

We will present a simple cuckoo hashing with an example of how it works. Along with it, we will present an algorithm to find loop in cuckoo hashing

Published by: Nitesh Gupta, Dr. Om Prakash

Research Area: Computer Science

141. Analysis of the Structure of Henry IV, Part I

The structure of art depends largely on its functions. Various functions have been proposed: entertainment, instruction, the catharsis of unpleasant and unconstructive emotions, imitation and fantasy. Certain artistic structures obviously carry out these purposes. The "theme" or "point" of a work of art clearly expresses the function of instruction; the convention of the "hero", by encouraging audience identification, fulfils the "fantasy" function of art; and the "fourth wall" convention of modern theatre was developed to intensify the effective "imitation" in drama. The main plot and the secondary plot of Henry IV, Part I is discussed along with the musical and symbolic structure.

Published by: Jemima Daniel

Research Area: English Literature.

142. CAD Diagnosis Using PSO, BAT, MLR And SVM

Coronary artery disease (CAD) is a most common type of heart disease. CAD happen when a blood clot cuts off the heart’s blood supply, causing permanent heart damage. Diagnosis of CAD can be done using angiography, echocardiogram, electrocardiogram, which are complex methods. Therefore, studies are done to predict CAD using machine learning algorithms. This study proposes, feature selection by particle swarm optimization(PSO) and Bat algorithms, clustering using K-means and classification using Multinomial logistic regression (MLR) and support vector machine (SVM) algorithms. This technique is cross checked upon 14 attributes with 303 instances. A benchmark dataset from Cleveland heart disease data is used. The Bat-SVM model achieves the highest prediction accuracy of 97 %. The proposed model has an increased accuracy from the existing systems.

Published by: Hinduja .R, Mettildha Mary .I, Ilakkiya .M, Kavya .S

Research Area: Data Mining

143. Intelligent Street Light

This project efficiently defines the control of the street lighting system and thereby saving electricity as well as helping in monitoring other aspects of the environment which are a major concern worldwide. It also describes the use of A reader module for vehicle monitoring and control. The proposed system also has vehicle theft control is also integrated into the system. The proposed system also helps to monitor pollution levels, carbon emission also the sound levels of the vehicles in traffic. The efficiency of the system is designed such that it can be readily installed in present on road conditions with the extra cost of controlling computer and the sensors.

Published by: Mrs. Anuja A. Borkar, Mr. Mandar Patil, Mr. Vedant Jangam, Mr. Akshay Adkurkar, Mr. Rishabh Narkar

Research Area: Computer Engineering

144. Automatic Mammogram Tumor Detection Using Supervised Learning Method

Breast cancer is the most occupied type of cancer in women that caused the most deaths among women. The early detection of breast cancer is more important for the chances of survival of the patient. This work has mainly four modules: Pre-processing, Segmentation is carried out by Active Contour algorithm and Advanced K-means algorithm, Feature extraction is done by Gray Level Co-occurrence Matrix (GLCM), Expectation Maximization (EM) and Principle Component Analysis (PCA), finally classification is done by Random Forest Classification. To achieve the objective of this work, MIAS (Mammographic Image Analysis Society) and IN breast databases are used as input images. The Accuracy achieved in this system is 95.83%.

Published by: Chandana Saipriya. V, Dhanalakshmi. B, Gnanasoundari. S, Mercy Therasa. M, Hemadevi. J

Research Area: Breast Cancer

145. Feature and Processing Of Recognition of Characters, Words & Connecting Motions

Recognition & Modeling of characters, words & connecting motions is accomplished based on six-degree-of-freedom hand motion data. We address air-writing on two levels: motion characters and motion words. Isolated air-writing characters can be recognized similar to motion gestures although with increased sophistication and variability. For motion word recognition in which letters are connected and superimposed in the same virtual box in space, we build statistical models for words by concatenating clustered ligature models and individual letter models. A hidden Markov model is used for air-writing modeling and recognition. We show that motion data along dimensions beyond a 2-D trajectory can be beneficially discriminating for air-writing recognition

Published by: Deepa .D, R. Dharmalingam

Research Area: Applied Electronics

146. Review On Social Media Analytics

This paper highlights the wealth of social media analytics available. It provides a comprehensive review of the social networking media, wikis, blogs, newspaper group chat etc. Social media Analytics is an emerging interdisciplinary research field that aims on combining, extending and adapting methods for analytics of social media data. For completeness, it includes introduction to analytics on data based on social media scraping storage, data cleaning and sentiment analytics. Major research area and business activities are based on analysing social media, in particular Twitter feeds for sentiment analysis.

Published by: Divya Kataria

Research Area: Social Media Analytics

147. To Study Aetiology of Prostatomegaly and Corelations between Symptoms and Degree of Prostatomegaly

Dr. Noopur Priya (senior resident,general surgery), Dr.Gaurav Sali(neurosurgery resident),Dr.Kiran Kher (professor, surgery department); department of surgery,avbrh Prostatomegaly is one of the most common conditions affecting the ageing male. The effects of prostatomegaly on voiding function, however, vary greatly from patient to patient and thus make measuring its impact a challenging task.Three most common causes of prostate enlargement are benign prostatic hyperplasia (BPH), prostate cancer and prostatitis. Prostatomegaly affects the function of the urethra, urinary bladder, kidney leading to symptoms like Frequency of micturition, Nocturia, Dysuria, Hesitancy, Urgency, Lack of force and dribbling at the end, Haematuria, Retention, and symptoms of chronic renal insufficiency. Out of 166 patients enrolled in our study maximum patients were having grade III prostatomegaly.Benign Prostatic Hyperplasia was the commonest amongst all patients. The commonest symptom was increased frequency of micturition in our patients.AUA score was moderate to severe in grade I prostatomegaly patients while mild to moderate in grade III prostatomegaly patients, indicating that the symptom severity does not vary with respect to grades of the prostatomegaly.DRE showed all signs of malignancy in cases of carcinoma of the prostate.The age-adjusted Sr.PSA level was normal for benign disease of prostate and higher in carcinoma of the prostate.Carcinoma of the prostate was present mainly in grade III prostatomegaly patients.

Published by: Dr. Noopur Priya

Research Area: Surgical

148. Wireless Rash Driving Detection System with SMS sending Facility and obstacle detection system

The rate of accidents occurring due to rash driving is increasing abruptly. The present system is able to detect the over speeding but it fails for further execution as it is time consuming. So, this system will be effective to replace the existing system. As the vehicle, will cross the permitted speed, SMS will be send to RTO as well as the system will help to avoid the unusual vehicle mishaps.

Published by: Kamlesh B. Mishra, Akshay M. Munshi, Nikhil S. Dhuldhar, Rohit R. Dahake

Research Area: Microcontroller

149. Seebeck Effect to Generate an Electricity from Exhaust Gases of Automobile

In recent years the scientific and public awareness on environmental and energy issues has brought in major interests to the research of advanced technologies particularly in highly efficient internal combustion engines. Substantial thermal energy is available from the exhaust gas in modern automotive engines. The latest developments and technologies on waste heat recovery of exhaust gas from internal combustion engines includes thermoelectric generators, Organic Rankine cycle, six-stroke cycle IC engine and new developments on turbocharger technology. Thermo Electric Power Generator directly converts this Thermal energy into Electrical energy. So number of moving and rotating part has been eliminated. Thermoelectric power generation offer a potential application in the direct exchange of waste-heat energy into electrical power. By this it eliminated emission so we can believe this green technology. In this paper, a background on the basic concepts of thermoelectric power generation and its use in automobile engine is reviewed and discussed.

Published by: Hrishikesh Kiran Sawant, Vishawajeet R. Sawant, Prakash R. Jadhav, Pratik R. Pawar, Prof. Vishal B. Dixit

Research Area: Mechanical Engineering

150. Improved Health Monitoring Using Location Aware Sensor Routing Protocol

This project Improved Medical Health Monitoring Using LASeR protocol (Location-Aware Sensor Routing Protocol) is an innovative method to increase the efficiency of real-time health monitoring systems which make use of Wireless Sensor Networks. The high reliability and low latency requirements of this application are addressed by using Location Aware Sensing Routing Protocol (LASeR). The protocol uses location information to maintain a gradient field even in highly mobile environments while reducing the routing overhead. This allows the protocol to utilize a blind forwarding technique to propagate packets towards the sink. Analytical expressions are derived and evaluated against the simulations. Extensive modeling and simulation of the proposed routing protocol have shown it to be highly adaptable and robust. The results highlight both the high performance of LASeR in various challenging environments and its superiority over the state-of-the-art.

Published by: Shriya .S, Suriyakrishnaan .K, Thenmozhi .S, Bhairavi .M

Research Area: Wireless Networks.

151. Fall Detection and Reporting Using Smartphone

Every family on this planet is working hard for a comfortable living and wants to safeguard his investment that he has made in his day to day work. Ultimately, at the end of the day we all seek for security of life and our belongings. The major question to ask yourself is we really secure? The world is not perfect and we are susceptible to the dangers that exist in the society hence the urge to feel protected and safe is fulfilled by the use of hidden cameras. A hidden spy video camera can be available anywhere. We should be conscious about this aspect because we might be in a particular place, where our actions will be recorded without us being aware of it.

Published by: G. Aswini, R. Ambikapathy, R. Jayanthi, N. Dhivya

Research Area: Computer Science and Engineering

152. Lung Lesion Extraction Using Improved Toboggan Based Algorithm

The segmentation of lung lesions with an acceptable accuracy from computed tomography (CT) scans is more valuable for lung cancer research and can offer important information for clinical diagnosis and treatment by the doctors. It is a challengeable process to achieve a fully automatic lesion detection and segmentation with acceptable accuracy due to the various characteristics of lung lesions. Here, we propose an improved toboggan based growing automatic segmentation approach (ITBGA) .which are automatic initial seed point selection, The new approach does not require any human interaction or training dataset for lesion detection, yet it can provide a high lesion detection sensitivity (98.35%) .The results show a significant improvement of segmentation accuracy. The average time consumption for one lesion segmentation was under 9 seconds using proposed method. The improved toboggan based algorithm can achieve robust, efficient and accurate lung lesion segmentation in CT images automatically.

Published by: Vigneshwar .R, Karthick .A, Karthick .K, SenthamizhSelvi .R

Research Area: Image Processing

153. The Energy Efficient Techniques of Wireless Sensor Networks

The wireless sensor networks is the type of sensor networks which is used to sense the environmental conditions like temperature, pressure etc. The energy consumption is the major issue of the wireless sensor networks which is raised due to far deployment and small size of the sensor nodes. The clustering is the technique which reduces energy consumption of the wireless sensor networks. In this paper, various techniques which are proposed for the energy consumption reduction is reviewed and discussed in terms of various parameters.

Published by: Er. Pallavi Mittal, Er. Rajnish Kansal

Research Area: Networking.

154. Design & Fabrication of Non- Conventional Air Conditioner

Working with AC there is a lot of fuel is burn in a car. These fuels are saved and run the AC another system rather than fuel. Run the AC without fuel using suspension system of the car and exhaust gas of car. Increase the efficiency of the car.

Published by: Gore Sunil Laxman, Amol J. Zore, Rohit S. Patil, Dhanashri V. Bhosale, Bhagyashri U. Phadatare, Prof. S. M. Huddedar, V. B. Dixit

Research Area: Mechanical Engineering

155. Vehicle Number Plate Detection and Recognition

The study of this paper presents a new technique to use automatic number plate detection and recognition. This system plays a significant role throughout this busy world, owing to rise in use of vehicles day-by-day. Some of the applications of this software are automatic toll tax collection, unmanned parking slots, safety and security. The current scenario happening in India is, people break the rules of the toll and move away which can cause many serious issues like accidents. This system uses efficient algorithms to detect the vehicle number from real time images. The system detects the license plate on the vehicle first and then captures the image of it. Vehicle number plate is localized and characters are segmented and further recognized with help of neural network. The system is designed for grey scale images so it detects the number plate regardless of its colour. The resulting vehicle number plate is then compared with the available database of all vehicles which have been already registered by the users so as to come up with information about vehicle type and charge accordingly. The vehicle information such as date, toll amount is stored in the database to maintain the record.

Published by: Rupali Gala, Shrey Doshi, Yash Jain, Vibha Patidar, Swati Nadkarni

Research Area: Image Processing and Neural Networks.

156. Parameters Optimization of Laser Beam Machine

“LASER is Light Amplified Stimulated Emission of Radiation.”A Laser is a device that emits light through a process of optical amplification based on stimulated emission of electromagnetic radiation. Research parameters optimization of “LASER BEAM MACHINE “as laser beam machine, cutting speed power, gas pressure, laser power. For output parameters, surface roughness and kerfs taper are studied. The analysis is done by “TAGUCHI METHODOLOGY” In this research work input parameters are taken as Cutting Speed, Gas pressure, laser powers are studied. Simultaneously their optimum set is analyzed by using TAGUCHI METHOD from Minitab software for Surface Roughness and Kerfs taper as output Parameter.

Published by: Tushar V. Jadhav, Shashank S. Babar, Sachin R. Mane, Amrut K. Chavan, Sagar A. Bile, Prof. R. V Salukhe

Research Area: Laser Beam Machine

157. Retrofitting For Gear Lapping On Lathe Machine

Retrofitting is addition of components, features or accessories on older system that did not have when it manufactured. It is used to carry out various operations on same machine. Retrofitting is considerable change in current machine to make it flexible for doing various operations. Here is retrofitting for gear lapping on lathe machine. Its reduces high investment cost to buying separate gear lapping machine. It is economical for all small scale industries and medium scale industries. Gears are key to power transmission in our day to day life. Mechanical power transmissions uses belt, chain and gears for power transmission. This paper includes how to use the gear lapping process & innovative way of gear lapping machine. We can use conventional lathe machine which is present in most of the machine shop. The attachment is designed on simple design and is easy to use. It may include different types of gears. Whichever cutting process is used, tooth surface errors appear, in part because of tooling wear and machine distortion, in part because the gears are heat treated after cutting which releases internal strain and causes tooth flank distortion. Therefore, a finishing operation is necessary. As a result, excellent smoothness and quietness of operation can be obtained

Published by: Amol D. Awaghade, Sagar S. Ghorpade, Swapnil B. Barge, Suraj P. Barge, Sanket S. Gaikwad, Rahul S. Gaikwad, Prof. S. S Bhosale

Research Area: Mechanical Engineering

158. Simulation and Fabrication of Microfluidic Channel

This paper presents simulation and fabrication of microfluidic channels. Mixing is an important process in a microfluidic system. The aim of microfluidic mixing is to achieve a thorough and rapid mixing of multiple fluids in microscale devices. In different microfluidic-based biochemical analysis systems, mixing of liquid samples is considered as one of the most challenging processes to realize a suitable chemical reaction in a short time period. The basic design for a micro mixer is represented by Y-shaped channel. We used LASER cutting method for fabrication of microfluidic channels. Simulation of different channels is done in CFD (Computational fluid dynamics) software.

Published by: Jamdar Anuradha .S, Kare Akansha .V, Kate Shraddha .G, Jadhav Sonali .M, Trimbake Aishwarya .A, Prof. Narkar R. R

Research Area: Mechanical Engineering

Research Paper

159. Parameter Optimisation Using CNC Lathe Machining

In today’s manufacturing systems most of the time manufacturers, for retaining their position in the market competition, depends on manufacturing engineers and various production personnel in the industry. To get benefits of quick and effective setups while developments of a manufacturing processes for new products. For the manufacturing challenges, the Taguchi parameter optimization method is a powerful and efficient tool for quality and performance output. This thesis discusses on the parameter optimization of CNC lathe machining for surface roughness using the Taguchi method, where surface roughness generated during machining. In the parameter optimization, the parameters are cutting speed, feed, and depth of cut. After selecting parameters turning on CNC lathe is to be done and selected orthogonal array and parameters used for the optimum set of combined controlled parameters for surface roughness. Into this combination of parameters selected for minimum surface roughness value and for the optimum combination of parameters by Taguchi design. Taguchi orthogonal array L9 for three parameters cutting speed, feed rate, and depth of cut with its combination surface roughness measured, analyzed and recorded by signal to noise ratios.

Published by: Dhananjay Uttam Kadam, Suraj P. Ghorpade, Mangesh D. Indalkar, Sourabh R. Ingawale, Suyash D. Kudchadkar, Prof. K. K Bhosale, Prof. R. V Salunkhe

Research Area: Mechanical Enggineering

160. Fundamentals of Reversible Logic Gates and Their Applications

In current time, reversible logic gates are being used very fast due to its ability to design the more complex circuit with less power dissipation. Power consumption is the main factor in low-power VLSI design. Reversible logic gates reduce power in the big amount by eliminating the power loss during a loss of one bit of data in simple operations during conventional logic gates. The main purpose of this paper is to provide fundamentals of few reversible logic gates, the comparison between their operations and their applications.

Published by: Piyush Singh

Research Area: Digital Design

Review Paper

161. A Review of Low Power Consumption Clock Gating Techniques

This paper represents a review of some existing clock gating techniques for low power dissipation in digital circuitry designs. In this paper, the clock gating techniques are used which reduces the power consumption from the normal implementation of the same design. The 16 bit ALU (arithmetic logical unit) is used for reducing the dynamic power consumption through gating techniques by shutting down the clock at a given instant of time when it is not needed for work to prevent the unnecessary power consumption of the system. These designs are implemented on RTL level at VIVADO 2016.4 platform for synthesis and simulation by different gating techniques.

Published by: Priyanka Saraswat

Research Area: Digital Electronics

162. Karnal Bunt Disease of Wheat Study from Jhunjhunu, Rajasthan

The disease was first time reported in (1931) from karnal.The disease caused by fungi. Karnal bunt disease is soil borne as well as airborne.The soil-borne & seed borne teliospore germinate when the host is in the flowering stage, both quantity & quality of wheat grains are adversely affected. The spore mass smells strongly of rotted fish.

Published by: Dr. Ritu Sharma, Roshan Kumari

Research Area: Botany

163. Design and Analysis of Baseplate of Centrifugal Pump

Baseplates comes in as many configurations, design, and styles as there are pump models. No matter the design, the main purpose of the baseplate is to mount the pump and driver together, while maintaining the shaft alignment between the two pieces of equipment.The primary objective of this paper is to observe different types of baseplates based on the standards specified by American petroleum institute in API610.The theoretical study related to the selection of baseplate structural members carried out by finite element analysis using ANSYS to check the structural stiffness of the base plate.

Published by: Tejas, Rushabh Shah, Akash Sutariya

Research Area: Fluid Mechanics

164. Review Paper on Design and Simulation Result Analysis of Data Aggregation in Ns2 for WSN with Security

Nowadays, Wireless Sensor Networks (WSN’s) are becoming more and more promising and applicable to a variety of fields: military, environmental, medical, wildlife habitat, and transportation as well wearable devices, target-tracking. Wireless sensor networks (WSNs) have significant potential in many application domains such as agriculture, health, environmental monitoring, battlefield surveillance, and wildfire detection. They, however, cannot be used in large geographical areas due to the short communication range of sensors. In addition, sensor networks have been the lack of available network management and control tools, such as for determining the degree of data aggregation prior to transforming it into useful information. Designing different network management tools such for routing, localization, and data aggregation is, therefore, required in large scale WSNs. Only a few of the existing data aggregation methods have been developed for a large scale WSN. In this paper, we have done a review of some literature and techniques for data aggregation in large scale WSN.

Published by: Rachna Kumari, Sunil Dalal

Research Area: Computer Science & Engineering

165. A Review Paper on Improvement of Coexistence of LTE Femtocell Network with Dynamic Resource Allocation

A cognitive femtocell is a new small cell based on a smart home base station to solve the spectrum scarcity problem. Recently, dedicated resource allocation for cognitive femtocells is extensively researched to mitigate the co-channel interference. However, the cognitive femtocell may suffer from the lack of frequency resource for its users due to high data traffic load of the macro cell. Interference control and quality-of-service (QoS) awareness are the major challenges for resource management in orthogonal frequency-division multiple access femtocell networks. There should be a self-organization strategy for physical resource block (PRB) allocation with QoS constraints to avoid the co-channel and co-tiered interference. Femtocell self-organization including self-configuration and self-optimization is proposed to manage the large femtocell networks. Recently, operators have resorted to femtocell networks in order to enhance indoor coverage and quality of service since macro-antennas fail to reach these objectives. Nevertheless, they are confronted with many challenges to make a success of femtocells deployment. In this paper, we address the issue of resources allocation in femtocell networks using OFDMA technology (e.g., WiMAX, LTE). Specifically, we propose a hybrid centralized/distributed resource allocation strategy

Published by: Annu Kumari, Suraj Rana

Research Area: Computer Science & Engineering

166. A Review Paper on Comparative Research Analysis on LTE Techniques to Reduce Paper in Multi-Carrier Communication Systems

As we know in today world communication is increasing exponentially. We want the best quality of service at economical cost and at high speed. When we look in deep how these parameters can be carried out then lots of problems arises in front of us and one of them is PAPR. There are various technique to reduce like tone injection, OFDM is a multi-carrier transmission scheme. This is used in 4th generation wireless communication. The main advantage of OFDM, cross talk between the sub-channels is eliminated and intercarrier bands are not required. Coin have two sides similarly OFDM have some advantages and disadvantages, according to this quotation there has a major drawback arises in the OFDM is known as a PAPR (Peak to average power ratio). PAPR reduction techniques, based on computational complexity, bandwidth expansion, spectral spillage, and performance. PAPR problem is reduced by the technique.

Published by: Ritu, Tajendar Malik

Research Area: Computer Science & Engineering

167. Review Paper on Integration of Robust Different Hierarchical Routing Protocol of Wireless Sensor Network

Wireless Sensor Networks consist of small nodes with sensing and computation, communication capabilities. Wireless network is highly dependent on the specific application and are constrained by energy, storage capacity, and power. To increase the lifetime of networks, energy awareness is the essential consideration if we analyze routing protocols. Routing protocols of sensor networks are responsible for maintaining the routes in the network. In this paper, we analyze recent routing protocols for wireless sensor network and classify in three types of approaches according to network architecture in WSN. The three main categories on the basis of network structure: Flat, Hierarchical and location based routing protocols. We study the trade-off between energy and communication overhead savings in every routing protocol. We also highlighted the advantages and performance issues of each routing technique.

Published by: Nikita Balhara, Tajendar Malik

Research Area: Computer Science & Engineering

168. A Review Paper on Novel Approach for Removing Salt-And-Pepper Noise Using Trimmed Median Filter

We know that when we transmit data from transmitter to receiver definitely various types of noises added automatically to our main data and it’s very tough task at the receiver side to get exact data whatever be transmitted from transmitter side. In this review paper, our focus is to remove salt and pepper noise from contaminated image. Therefore we studied various research paper and finally we came to decision that various types filters are available and every filter is used for specific types of noise means used to remove noise. In our research work, we studied the concept of restoration of the pixel. Besides this, we deeply study various research paper in which we will extract salt and pepper noise by using a filter. There are many filters used to remove noise from an image. Every filter has its own advantages and disadvantages. So we have to select which type of filter is suited for us to carry out the desired result according to our interest. Noise removal from images is a part of image restoration in which we try to reconstruct or recover an image that has been degraded by using a priori knowledge of the degradation phenomenon. Noises present in images can be of various types with their characteristic Probability Distribution Functions (PDF). Noise removal techniques depend on the kind of noise present in the image rather than on the image itself. This paper explores the effects of applying noise reduction filters having similar properties on noisy images with an emphasis on Signal-to-Noise-Ratio (SNR) value estimation for comparing the results.

Published by: Minakshi, Suraj Rana

Research Area: Computer Science & Engineering

169. Experimentation of Diffuser Augmented Wind Turbine

Wind lens is the collection-acceleration device which shrouds a wind turbine. For given turbine diameter, the power augmentation can be achieved by Shroud diffuser, popularly known as wind lens. In this paper, a comparative numerical prediction of mass flow rates in the wind turbine has been carried out with various types of wind lens like straight diffuser with a brim, curved diffuser with the brim, stepped diffuser with the brim, bumped diffuser with the brim. All these eight diffusers are firstly analyzed in Ansys Fluent R14.5 for its velocity variation and pressure variation at inlet and outlet of the diffuser. From the CFD result From above CFD analysis, it is concluded that stepped diffuser with brim shows the higher percentage increase in velocity i.e. 80.33 %, as compared to bare wind turbine so stepped diffuser gave the good performance.

Published by: Ajitkumar Manedeshmukh, S. G Kulkarni, S. R Koli

Research Area: Windlense

170. A Review Paper on Robust Model Design for FSO Communication System for Analysing Of Different Parameters

Communication is an important part of our daily life. The communication process involves information generation, transmission, reception, and interpretation. The transmission using high bandwidth can handle vast amounts of information, which can be further improved by reduction in fibre losses, increase in data rates and distances, development of optical sources and detectors compatible with fibres. Today’s demand is a communication link with maximum performance and minimum errors. Free Space Optics is a medium with high bandwidth having maximum data rates and security issues favoring its promotion for the present era. Wide bandwidth signal transmission with low delay is a key requirement in present day applications. Optical fibers provide enormous and unsurpassed transmission bandwidth with negligible latency and are now the transmission medium of choice for long distance and high data rate transmission in telecommunication networks. After studying a lot of research paper some analysis is carried out. We have to see an impact of various conditions like atmospheric turbulence, path loss factor, distance, and BER. BER is one of the most important parameters which should be minimum otherwise distorted information will be received at the receiver side and BER increases with distance and other atmospheric turbulence.

Published by: Usha, Manisha

Research Area: Computer Science & Engineering

171. Review Paper on Image Compression Using Lossless and Lossy Technique

As we know today to store data is a big issue that’s why we are shifting towards cloud computing which is very advanced technology. Besides this if we compress our data that means which can take less space as compared to original data. There are lots of techniques to compress data and in our research we will implement some of them. Basically compression is of two type lossy and lossless. Compressing an image is significantly different than compressing raw binary data. If we used general or outdated technique to compression images then result would be not optimal as it should be. This is because images have definitely statistical properties which can be triggered or exploited by encoders which are implemented or design for them. In image we have to give up some fine details for the sake of saving a little more bandwidth or storage space. So we can say that lossy compression technology. In this dissertation compression of digital images are done with the help of DCT. Several encoding technique have also been used together with DCT to improve the performance of compression. A computational analysis of picture quality is also made with respect to compression ratio and PSNR.

Published by: Madhu, Sunil Dalal

Research Area: Computer Science & Engineering

172. A Hybrid System for Chemical Named Entity Simplification

One explicit challenge in medicine named entity recognition (NER) and normalization is that the identification and resolution of composite named entities, wherever one span refers to over one idea (e.g., compositeBRCA1/2). Previous Named Entity Recognition (NER) and normalization studies have either neglected composite mentions, used straight forward rules or solely handled coordination omission, making a strong approach for handling composites mentions greatly required to the present finish, we tend to propose a hybrid technique integrating a machine-learning model with a pattern identification strategy to spot the individual elements of every composite mention. Our method , that we’ve named SimConcept is the first to consistently handle many sorts of composite mentions. The technique achieves high performance in distinguishing and resolving composite mentions for three key biological entities: genes (90.42% in F-measure), diseases (86.47% in F-measure), and chemicals (86.05% in F-measure).The proposed SimConcept technique will later improve the performance of gene, disease chemicals concept recognition and normalization. We observe that in our datasets, approximately 10% of gene, disease, and chemical mentions are composite mentions, hence, it is important to handle them properly. This study presents a new method for bio-concept mention simplification in a systematic fashion.

Published by: Gunjal Sonali Vishram, Prof. N. B. Kadu

Research Area: Computer Engineering

173. Manufacturing Of Eco-Friendly Parking Tiles

In this project, we have manufactured parking tiles by using Electronic Waste. We use recycled Electronic Waste as a raw material in the manufacturing of parking tiles & it is one of the alternative methods for disposal of Electronic Waste. We have replaced Silica & Crush by Electronic Waste in a small amount. We have used Electronic Waste in powder form after recycling it. Electronic Waste does not contain metals. After manufacturing of “Eco-friendly Tiles,” we get the results as per conventional tiles. Due to the use of recycled Electronic Waste cost of tiles increases. Because now a day Electronic Waste recycling plants are minimum or negligible so that cost of parking tiles increases but after some years it becomes minimum due to an increase of Electronic Waste recycling plants.

Published by: Supriya Sunil More, Poonam C. Ombale, Jyoti A. Dalavi, Trupti B. Dalavi, Prajkta D. Ghadge, Prof. S. S. Lembhe

Research Area: Civil Engineering

Research Paper

174. Taxonomy of Load Balancing

Cloud computing is one of an emerging technology in the computer world these days. Virtualization is the concept behind cloud computing that allows sharing of resources like software, infrastructure, and platform. Different people share different views regarding cloud computing. Some enterprises take a lot of advantages from cloud computing while other considers it being an unsafe place for storing critical information. Load balancing is one of an important issue in cloud computing. This paper is for those who want to understand the basics of load balancing.

Published by: Divya Garg, Er. Anurag Jain

Research Area: Load Balancing

Review Paper

175. Review Paper on Shifted Histogram Using Optimal Shift Distance for Images with Entropy Value & Wavelet Decomposition Images

A histogram is a graphical representation of the brightness values that comprise an image. The brightness values (i.e. 0-255) are displayed along the x-axis of the graph. The frequency of occurrence of each of these values in the image is shown on the y-axis. Histogram of a digital image with intensity level in the range of [0, L-1 ] is a discrete function h(rk) = nk where rk is the kth intensity level and nk is no of a pixel in the image with intensity rk. Histogram equalization is a method in image processing of contrast adjustment using the image's histogram. Histogram equalization automatically determines a transformation function that seeks to produce output images that have a uniform histogram. When the automatic enhancement is desired that is the good approach because result from this technique are predictable and method is simple to implement. The method used to generate a processed image that has a specified histogram is called histogram matching or histogram specification. In this thesis we will use the advanced algorithm to enhance the quality of an image and we succeeded and also got the entropy value of image by changing the scaling factor K we got different value and also got different shifted histogram image. In our research work, we will work on the different level to analyze the effect of an algorithm. By changing scaling factor we analyze different EME and image enhanced significantly from which a lot of important information can be recovered.

Published by: Rekha, Vijay Nandal

Research Area: Computer Science & Engineering

Research Paper

176. Glimpse of Cloud Computing

In this paper, the concept of cloud computing has been studied. The service provider must ensure that the infrastructure and applications are protected and must take actions to reinforce user’s application and use strong passwords and authentication measures. In the first part, a brief introduction to the cloud computing has been given. It includes a definition of cloud computing given by NIST and other scholars. In the next section, the architecture and various service models, as well as deployment models provided by cloud computing, has been discussed. This is followed by the working of the cloud which includes the concept of virtualization. Then the light has been put on its major application areas. In the next part, its advantages and disadvantages have been highlighted.

Published by: Anushka Gaur, Anurag Jain

Research Area: Cloud Computing

177. Detection and Analysis of Microanuerysm in Diabetic Retinopathy Using Fundus Image Processing

Diabetic-related eye disease is a major cause of blindness in the world. It is a complication of diabetes which can also affect various parts of the body. When the small blood vessels have a high level of glucose in the retina, the vision will be blurred and can cause blindness eventually, which is known as diabetic retinopathy.Detection of the disease at an early stage enables the patient to get treatment by advanced methods like laser treatment to prevent total blindness. The paper deals with detecting the diabetic retinopathy retinal changes. The retinal images are first subjected to pre-processing techniques like colour normalization and enhancement process. There may exist different kinds of lesions caused by diabetic retinopathy in a diabetic patient’s eye such as micro aneurysm, hard exudates, soft exudates, hemorrhage etc. Automated analysis of the fundus (retinal image) image is very much essential and will be of help to facilitate the clinical diagnosis.

Published by: Nirav Gori, Hardik Kadakia, Vinayak Kashid, Mrs. Pranali Hatode

Research Area: Image Processing Using MATLAB

178. Image Processing using SIFT

Nowadays, computer Vision Technology is playing a very important role to understand the information present in image format. The object details those are in the form of image can be treated to find .This paper proposes the object finding method to help visually impaired people. The SIFT can extract distinctive features in an image to match different objects. The proposed recognition process begins by matching individual features of the user queried object to a database of features with different personal items which are saved database.

Published by: Kirti Bhure, J. D Dhande

Research Area: Image Processing

179. Study the Influence of Industrial Waste Iron Sludge on the Stabilization of the Expansive Soil for the Road Subgrade

The Aim of this paper is to Stabilize Expansive soil of Sub Grade and to improve its California bearing ratio and free swell index and other properties using Industrial Waste materials Iron Sludge. Expansive soil have tremendous strength but it becomes very soft when it getting wet, It expands/swells due to its mineralogical composition during its wet condition, It creates cracks or consolidated when it is dry. Expansive soils can be found on almost all the continents on the Earth. Destructive results caused by this type of soils have been reported in many countries. First of all, identify the engineering properties of soil and then add 5, 10… 30 % iron Sludge in natural Soil. And again check the change in engineering properties of soil like plastic limit, plasticity Index, swelling Index of treated soil. By comparing the test results of virgin soil and treated soil we check the feasibility of using Iron Sludge for stabilization of expansive soil.

Published by: Ahemadabbas S. Rajpura, Prof. B. R Shah, Prof. H. K Dave

Research Area: Pavement Engineering

180. Various Energy Efficient Schemes in WSNS: A Survey

Wireless Sensor Networks (WSNs) can be well-defined as one which can configure itself. It is infrastructure-less networks deployed to observe physical or else ecological surroundings, for instance, hotness, sound, tremors, pressure or impurities. All the information is sensed by the sensors which supportively pass the data through the network to a sink where the data can be perceived and investigated. Since these nodes are deployed in unhuman conditions so preserving their batteries is very challenging task. Clustering, described by LEACH protocol, is one of the techniques which helps in increasing their lifetime. This paper describes recent studies about the clustering approaches that are used to preserve the batteries of sensor nodes to make them work for the longer duration of time.

Published by: Rajveer Kaur Khosa, Pawan Luthra, Gagan Luthra

Research Area: Computer Engineering

181. Institute Administration Automation and Student Database Management System

The main objective of this project is to develop a method to use a personal computer to automate the administration procedures of an educational institute and effectively and efficiently manage students' database using a Web-based application. The program will enable the college staff to enter students’ information in the system which will generate a unique ID for each student at the time of admission. The staff will be able to manage the students' marks, fee information, personal information and all other academic information which is usually done manually. This ID will be used to reference the student in all the functions of this application. Since the system is automated, there is hardly any room left for human error, thus minimizing any potential complications in entering information and maintaining records. So, we propose a software application that will have a simple interface that would be easily understandable to everyone with minimal cost and can be used in various education institutions for automating the administration work and efficiently managing the student database with minimal error possibility.

Published by: Aishwarya Tamboli, Priti Shinde, Pravin Pariskar, Manisha Sonawane, Chinmay Anaokar

Research Area: Computer Applications

182. Studies on Road Accidents on National Highway No.6

Globalization has impacted many developing countries across the world. India is one such country, which benefited the most. Increased, economic activity raised the consumption levels of the people across the country. This created scope for increase in travel and transportation. The increase in the vehicles since last 10 years has put lot of pressure on the existing roads and ultimately resulting in road accidents. It is estimated that since 2001 there is an increase of 202 percent of two wheeler and 286 percent of four wheeler vehicles with no road expansion. Motor vehicle crashes are a common cause of death, disability and demand for emergency medical care. Globally, more than 1 million people die each year from traffic crashes and about 20–50 million are injured or permanently disabled. There has been increasing trend in road accidents in Jalgaon over a few years. GIS helps in locating the accident hotspots and also in analyzing the trend of road accidents in Jalgaon.

Published by: Dhiraj Borole, Jyoti R. Mali, Vishal Patil, Kiran Pachpole, Bhushan Pandhare, Rupesh Borole

Research Area: Civil Engineering

183. Validation of Ultimate Axial Load Carrying Capacity on Composite Steel Tube Column In filled With SCC by Using Nx-Nastron

This Research focuses on validation of Ultimate axial load carrying capacity of CFST column filled with Light weight concrete and self-compacting concrete using NASTRON. Three-dimensional nonlinear finite element modal is developed to study the force transfer effect between concrete and hollow steel tube. Model is developed for understanding the complex behavior of conventional composite circular steel tube and self-compacting concrete infilled tube with various grades and different diameters (D), thickness (t) and length (l). Using hyper mesh, the model is meshed and model is used in NASTRON finite element software. The result obtained for M20, M30 Grades of SCC concrete is compared with Analytical Codal relations along with standard results obtained from previous Researchers.

Published by: Madhu B. N, Dr. N. S Kumar

Research Area: Ramnagaram

184. Automation of Multiproduct Herbal Juice Manufacturing Plant

In the market there are more types of herbal products are available which are used as medicine. There is a Neem is one of the most useful medicinal plants. There are many other plants also use as medicine like Aloe Vera. Neem plant is the most eco-friendly plant for a human being from medical or/and hygienic point of view, And also for aggro point of view. Each part of Neem tree has medicinal property. Juice of Neem leaves free from chemicals useful for exporting the products to countries that are very cautious about residual pesticides. Also, the extracted residue can be used as organic fertilizer, thus increasing aggro output. Automation is useful for reducing human effort in industrial working. This gives more accurate results with high quality. With help of automation, the only single worker can handle the manufacturing plant. We used ARM microcontroller based automation system for multiproduct herbal manufacturing plant system is basically embedded system. The main objective of this system is to automate the process for the efficient functioning of the plant. In this automation project, we control solenoid valves and relays means motor, pump with the help of ARM7.

Published by: Girish Sunil Pharande, Rohit M. Kamble, Rupali M. Gore, Chinmay A. Dalavi, Rohit R. Yadav, Rahul J. Gade, Nitin B. Gurav, Prof. S. S Dhende, Missing

Research Area: Mechanical Engineering

185. Prediction of Axial Load Carrying Capacity of LWC INFILLED CFST Columns- ANOVA Approach

Concrete filled steel tabular columns have gained immense importance in recent decades due to numerous structural benefits especially in developed countries like china, Japan, U.S.A, Britain. Composite circular steel tubes Columns - with light weight concrete as infill for two different grades say M20 and M30 are tested for ultimate load capacity by previous researchers (both at international and national) in addition to results obtained by previous post-graduate students of Ghousia Collage of Engineering, R & D center, Civil department have been verified by ANOVA approach is presented in this paper. Steel tubes are tested for the different combination of Length, Thickness & Diameter with the help of Taguchi’s L9 (Latin squares) -Orthogonal array in order to save time and cost of experimentation and also to determines the effect of each parameter. This study further presents a numerical investigation into the behavior of concrete filled tabular columns using three-dimensional nonlinear finite element software ABAQUS 6.10.1 is carried out in this paper. The analytical results obtained are compared with the numerical results obtained from Abaqus 6.10.1. For this purpose a comparison between design codes Eurocode -4 and AISC-LRFD has been made in evaluating the axial compressive strength of concrete filled tabular columns. The obtained results were analyzed with the help of Signal/Noise (S/N) Ratio, Main Effects Plot & Analysis of variance (ANOVA) using Mini Tab V16. Regression equations are developed for all two grades of infills separately. This paper focuses on modeling of Infilled concrete filled steel tube (CFST) column under axial loading and economical aspects.

Published by: Karthik A R, Dr. N. S. Kumar

Research Area: Structural Engineering

186. Performance Analysis of Air Preheater in 210MW Thermal Power Station

The efficiency of the boiler in a thermal power station is greatly depending on the utilization of waste heat in the flue gas by air preheater and economizer. The increasing in the efficiency of the boiler can be achieved by increasing the performance of air preheater and economizer. Enhancing heat transfer rate by changing the profile of air preheater will lead to increasing the performance of the air preheater and economizer. The changing profile and increasing heat transfer area will increase the heat transfer rate. In 210MW Mettur thermal power station notched flat profile is used as heat transfer area in air preheater segment. In order to improve heat transfer rate, the notched flat profile is replaced by double undulated profile and single seal are replaced by the double seal. Hence heat loss in the air preheater is minimized. The performance of economizer is enhanced by increasing the diameter of the coils. Hence the economizer and air preheater absorb additional heat from exhaust flue gas. The changed profile in air preheater and increased diameter in economizer were analyzed by using ANSYS fluent software. Based on the results the percentage of efficiency in air preheater and economizer is significantly increased.

Published by: J. Manivel, L. Manimaran, M. Thiyagarajan, P. Satheeshkumar, Thiruppathi. R

Research Area: Mechanical, Thermal

187. Analysis of Readiness Level and Comparison in Automobile Industry of Gujarat by Identification of Critical Success Factors

The main purpose of this study is to identify the critical success factors within automobile industry of Gujarat. This study helps to find out the whether the organizations have the foundation to implement the lean tools and techniques. A survey is conducted within the automobile parts manufacturing organization of the Gujarat. The present study illustrates the reliability of the data obtained from the survey and analysis of the available data in terms of the critical success factors within the organization. Ultimately this study illustrates the present scenario of the awareness of the lean manufacturing in the organization as well as the primary tool needed to be considered while initiating the lean manufacturing implementation. Lean manufacturing offers waste-reducing strategies like the elimination and identification of the waste and also enhancing their productivity and competitiveness.

Published by: Nareshkumar D. Chauhan, Dr. P. H Darji, Dr. M. N Qureshi

Research Area: Lean Manufacturing

188. A Distributed Approach for the Development of the DBSCAN Clustering

Clustering plays an outstanding role in data mining applications such as scientific data exploration, information retrieval and text mining, web analysis, bioinformatics, and many others DBSCAN (Density-Based Spatial Clustering of Applications with Noise) is a density-based clustering algorithm. The key idea of the DBSCAN algorithm is that for each data point in a cluster, the neighborhood within a given radius has to contain at least a minimum number of points. We have proposed improved evenhanded workload allocation using hierarchical (Tree-Based) approach for constructing of data cluster

Published by: Ghanshyam Dewta, Rajesh Tiwari

Research Area: Parallel Computing

189. A Method for Webpage Quality Improvement Using Improved Grey Wolf Optimization (IGWO) Based Extreme Learning Machine

In emerging websites, there is a need to measure and evaluate the websites quality and to make it better understanding. Several metrics based on the dimensions of the criteria are content quality, organization quality, design quality and user-friendly quality. These factors depend upon the word count, page size, average link text count and so on. This research investigates an Improved Grey Wolf Optimization (IGWO) and Extreme Learning Machine (ELM) is proposed to correspond with quality related items. The proposed approach IGWO is compared to verify the performance of Grey Wolf Optimization (GWO) Support Vector Machine (SVM) model, traditional Extreme Learning Machine (ELM) and Ivory based models are made to test the webpages. The performance metrics captured in IGWO based ELM model can be used to predict the website designs are good or bad. The simulation results have proven the superiority of the proposed method over the other competitive counterparts.

Published by: Jayanthi .B, Dr. S. Suganya

Research Area: Software Engineering

190. Study on Strength Characteristics of Concrete by Replacing Sand Partially with the Foundry Sand

In the Present study we are investigating on mechanical (compressive strength and split tensile test) and durability (Resistance to sulfate attack test) properties of concrete by adding waste foundry sand as partial replacement of sand in various percentages, 10%, 20%,30% and 100% respectively. This report demonstrates the possibilities of using waste foundry sand as partial replacement of sand in concrete Tests were performed for compressive strength, split tensile strength and sulfate resistant test for all replacement levels of waste foundry sand at different curing periods (7-days & 28 days).

Published by: Ashok Chaitanya Reddy G., Thrimurthi Naik

Research Area: Civil Engineering

191. Geospatial Technology in Quantifying Seasonal Availability of Water Stored In Salaulim Reservoir Salauli, Goa State, India

Quantification of available surface water is one among the most important aspects of Water budgeting in the rapid changing climate and erratic rainfall conditions prevailing in India amidst the rapid human developmental activities. Though conventional methods are being employed for periodical estimation of existing surface water from water bodies, there is no standard Geospatial technology based simple methodology available for anytime-use by the planners and administrators. This research paper presents one such simple and accurate methodology for quantification of surface water from reservoirs and tanks using Remote Sensing and GIS techniques. The results obtained in this study have been evaluated with the published data. Thus, it forms a basic model to further strengthen and make it useful for the administrators in water resource budgeting and proper distribution of it for sustainable development of the society.

Published by: N. Jeyachandran, K. Palanivel, C. J. Kumanan

Research Area: Remote Sensing and GIS

192. Hybrid Multi-Hop Routing Approach for Heterogeneous Wireless Sensor Networks using Fuzzy Logic Technique

In recent years, Wireless Sensor Network (WSN) has led to many new protocols designed for such networks have to be energy aware in order to improve the lifetime of the network. To find an effective and an efficient routing protocol, across whole network topology, is a major issue in networking. So Multi-hop and clustering communication are most efficient routing methods in WSN. Though, cluster heads have to heavy traffic around the Base Station (BS). In this paper, we have implemented a Region Based hybrid multi-hop routing method for heterogeneous WSN in which to use multi-hop communication method for transmission and use fuzzy logic technique for clustering. Simulation results show that our method reduces consumption of energy and enhance the lifetime of network in comparison to other clustering and multi-hop communication methods.

Published by: Anju Verma, C. P Singh

Research Area: Wireless Sensor Network

193. Nano Sized Air Cooler

The performance of heat transfer is one of the most important research areas in the field of thermal engineering. There are a large number of refrigerants, which are used to transfer heat from low-temperature reservoir to high-temperature reservoir by using vapor compression refrigeration system. There are various obstacles faced in working of different refrigerants due to their environmental impact, toxicity, flammability and high pressure; which makes them more hazardous than other working fluids according to safety and environmental issues. Researchers observed the performance of different environmental friendly refrigerants and their mixtures in different proportions. They also observed the effect of working parameters like dimensions of the capillary tube, working pressures and working temperatures, which affect the coefficient of performance of vapor compression refrigeration system. From the literature, there seems to be need of new efficient, minimum global warming potential, minimum ozone depletion potential and environmentally friendly refrigerants. The air conditioner and air cooler are widely used in the world. These electrical devices consumed more electrical power and it does not benefit for the poor people. In practice, power shortage also occurs. These problems are rectified by modification of ordinary table fan. In the summer season, the ordinary table fan gives the small amount of cold air in the room. So the table fan is modified by using the copper tube with fins and special design Cooling Chamber. In this project the cooling of air by using cold water or any other refrigerant which is circulated in the copper tube for the purpose of reducing the heat in the surrounding environment, where it is of great importance in widely distributed villages with little or no rural electrification and also in the urban areas where power shortage is often in practice. Air cooling is a method of dissipating heat. It works by expanding the surface area of or increasing the flow of air over the object to be cooled, or both. An example of the former is to add cooling fins to the surface of the object, either by making them integral or by attaching them tightly to the object's surface. In the case of the latter, it is done by using a fan blowing air into or onto the object one wants to cool. The addition of fins to a heat sink increases its total surface area, resulting in greater cooling effectiveness.

Published by: Asfan Mohiuddin, Mohd Khalid Ahmed, Noman Khan, Mohd Mustafa Ali, Mohd Abdul Saboor

Research Area: Mechanical Engineering

194. Server Initiated Model Using Location Based Service

In current scenario everyone using the internet for effectuating their work uncomplicated. Location Based Service is one of the constituents of this internet world. With the comfort of location based service people chase location uncomplicatedly. But extant Location Based Service systems apply pull model or user initiated model. In the pull model, user chases their location then the user will access response but now I apply push model or server initiated model in which users will access clamant response. In the push, model server conveys to the user according to the extant location of a user. Many researchers applied many algorithms in LBS systems like RT tree algorithm but I will apply Binary search tree algorithm on the location-based service application which is convenient for the quick retort. In research work, I compare that Binary Search Tree gives us retort in less time more than other comparing technique.

Published by: Shraddha Tiwari, Dr. Pankaj Kumar, Dr. Raj Gaurang Tewari

Research Area: Computer Science and Engineering

Research Paper

195. Novel Technique for Workflow Computation with Ant Colony Optimization Method in Cloud Environment

Cloud computing used for task scheduling which guided by broker and compute by virtual machine , but cost of computation will increase if use random task localization and this problem exponential high when use workflow which have huge number of task with dependency, so in this paper optimize the cost and time by intelligent an colony optimization which give decision to broker.

Published by: Sakshi, Er. Amandeep Kaur

Research Area: Cloud Computing

196. Green Energy Based Maglev Train and Power Harvesting

Magnetic Levitation is a technology that has been experimented intensely over the past couple of decades. An advanced technology also abbreviated as Maglev; defines the term “Levitation” which addresses vehicle propulsion with magnets rather than with wheels, axles, and bearings. This system provides the advantage of negligible wear and tear of mechanical parts, making the system more effective and reliable. The implementation of a large-scale transportation system using magnetic levitation not only has huge social aspect but can be economical respect to maintenance. Maglev trains are much smoother and quiet as compared to wheel trains ; moreover their non-reliance on friction means that acceleration and deceleration can surpass that of wheeled transports, and they are unaffected by weather, providing the research aspect to this paper to not only have a green energy-powered propulsion model but also to emboss energy harvesting in the system via electromotive force a term existing as “ Back EMF” in coils or electromagnetic motors.

Published by: Shubham Charde, Ankit Komawar, Tanmay Dey, Kajol Jaiswal, Deepak Khushalani

Research Area: Embedded System

197. Rural Electricity Stress Assessment for a Feeder in Maharashtra State

Rural electrification is often considered to be the spine of the rural economy of a country. Rural electrification is seen to improve farm productivity and enhance overall improvement in health and education through better employment opportunities, since rural areas traditionally depend on agriculture related income generation activities. Our study realizes the need of rural electrification and focuses on assessment of rural electricity stress. It would help us to tackle the stress on electricity consumers in villages through the analysis of certain parameters.

Published by: Arjun Makar, Shubham Garg, Amit Singh, R. M Holmukhe

Research Area: Electrical Engineering.

198. Weighted Random Walk on PPI Network

Proteins in the same protein complexes should highly interact with each other but rarely interact with the other proteins in protein-protein interaction (PPI) networks. All interaction network weighting schemes have been proposed so far in the literature in order to eliminate the noise inherent in interactome data. Visualization representation of data visually and is an important task in scientific research. PPI are discovered using mass spectrometry, or in silico predictions tools, resulting in large collections of interactions stored in specialized databases. Using Random walk on weighted graphs for identifying the interaction easily between Protein subsets and measuring the evaluation performance of proteins, Graphs for PINs visualizing the high number of nodes and connections, the heterogeneity of nodes (proteins) and edges (interactions), the possibility to annotate proteins and interactions with biological information that enriches the PINs with semantic information, and maintained as a separate databases for easy retrieval information of proteins from various Protein databases.

Published by: Thillainayaki, M. Hemalatha

Research Area: Datamining

199. Evolving Cyber Security Challenges to the Smart Grid Landscape

Integrating smart solutions into the existing power infrastructure promises to offer attractive capabilities of dynamic monitoring, measuring and even controlling power flows in real time that can help identify losses and trigger appropriate technical and managerial actions to minimize the damage. With the vision of building a Smart India, Government of India’s National Smart Grid Mission (NSGM) is solely aimed at providing functional resources and financial assistance in planning and implementation of smart grids across the nation. NSGM proposes comprehensive solutions for the development, establishment, operations and management of smart grids, stipulate training & capacity building, strengthen consumer engagement and dispense funding to state-owned discus. Smart grid solutions vastly employ information technology in the underlying roots in varying forms of networking and application aspects to enable monitoring and control of the flow of electricity to end users. The extensive incorporation of information technology provides numerous benefits to the grid operations and management, such as increased visibility, predictability, in addition to the regulation of generation and demand to improve efficiency. However, this enhanced use of information technology to the grid has in parallel introduced the dimension of cybercrime to the smart grid as the grid is now constantly connected to the Internet and can be exploited by hackers by leveraging the wide array of cyber security vulnerabilities. Security of the smart grid is essential to ensure uninterrupted power supply and minimize resulting losses. Compromise of the grid may result in a huge information or business losses by the means of cyber espionage or grid collapse. An uninterrupted power supply lies at the heart of all sectors and failures to the same will result in cascading damages, compelling the establishment of robust smart grids. The paper offers insight into key cyber security threats and vulnerabilities concerning the smart grid technology and proposes protection strategies, methodologies, and technologies to safeguard the smart grid from resulting security damages.

Published by: Seema Goel, Ashish Jindal

Research Area: Cyber Security

200. Generalised Paranormal Operators

An operator T ∈B(H) is said to be generalized P-paranormal if ‖|T|^p U |T|^p x ‖‖x‖≥1/M^p ‖|T|^p x‖^2 for all x∈H, p > 0, and M > 0, where U is the partial isometry appeared in the polar decomposition T=U|T| of T. The aim of this note is to obtain some structure theorem for a class of generalized P-paranormal operators. Exactly we will give some conditions which are generalization of concepts of generalized paranormal operators.

Published by: N. Sivakumar, S. Angelin Abirani

Research Area: Mathematics

201. An Innovation in Palm Vein Authentication for Biometric Privacy Preservation

In real-time security applications, the image processing, and computer vision plays a major part in determining the whole operation. The main advantages of biometric privacy are, to keep the information safe and secure, and access the information from anywhere at any time. In some traditional cases, the security systems are processed by passwords, personal identification numbers, and identification cards. In these cases, several problems occur due to the card was stolen and password hacking. Hence, to avoid such limitations it is necessary to implement the digital biometric data units in terms of face, iris, palm, fingerprints and voice. Among these data, the palm is considered in this work to explore the possibility of cryptography. Initially, the palm images are selected and stored in the database to cross-check the identity of private images which is considered as input, then the enrollment is made by comparing the public host images. The image is authenticated with the help of database with images. Finally, the decision is taken by matching the originally targeted palm image.

Published by: M. Suganya, Dr. S. Suganya

Research Area: Computer Science

202. A Novel Technique for Path Completion in Web Usage Mining

World Wide Web is a huge repository of web pages and links. The Web mining field encompasses a wide array of issues, primarily aimed at deriving actionable knowledge from the Web, and includes researchers from information retrieval, database technologies, and artificial intelligence. The growth of web is tremendous as approximately one million pages are added daily. Users’ accesses are recorded in web logs. Most data used for mining is collected from Web servers, clients, proxy servers, or server databases, all of which generate noisy data. Because Web mining is sensitive to noise, data cleaning methods are necessary. Web usage mining consists of three phases preprocessing, pattern discovery and pattern analysis. Web log data is usually noisy and ambiguous and data preprocessing system for web usage mining is an important process. A data processioning includes data cleaning, user identification, session identification and path completion. The inexact data in web access log are mainly caused by local caching and proxy servers which are used to improve performance and minimize network traffic. The proposed method uses path completion algorithm to preprocess the data. The proposed path completion algorithm efficiently appends the lost information and improves the consistency of access data for further web usage mining calculations.

Published by: Padmapriya .R, D. Maheswari

Research Area: Data Mining

203. Design, Analysis and Comparing for Different Cylinder Head of C.I. Engine

The main aim of this work is to predict the design performance based on stress/strain and Behaviour of cylinder head under various operating conditions. The effects of various engineering operating conditions such as combustion gas maximum internal pressure, thermal stress behaviour and fatigue stress of the cylinder head have been analysed. In any working engine, the piston and the cylinder head are the most vulnerable members due to increased mechanical and thermal loadings. The mechanical loading is mainly due to gas pressure in the gas chamber and its magnitude can be judged in terms of peak pressure. Thermal loading is due to temperature and heat transfer conditions in the piston surface cylinder liner and cylinder head. The geometry modeling was carried out using popular computer-aided engineering tools, CATIA V5R19 and the analysis was carried out using a finite element analysis (FEA) software package ANSYS. The result can be used to determine the quality of design as well as identify areas which require further improvement, and also the maximum stresses is found not exceeding material strength of cylinder head. In this work, we have also designed and compare two types of cylinder heads and formulated the importance of fins.The main aim of this work is to predict the design performance based on stress/strain and Behaviour of cylinder head under various operating conditions. The effects of various engineering operating conditions such as combustion gas maximum internal pressure, thermal stress behaviour and fatigue stress of the cylinder head have been analysed. In any working engine, the piston and the cylinder head are the most vulnerable members due to increased mechanical and thermal loadings. The mechanical loading is mainly due to gas pressure in the gas chamber and its magnitude can be judged in terms of peak pressure. Thermal loading is due to temperature and heat transfer conditions in the piston surface cylinder liner and cylinder head. The geometry modelling was carried out using popular computer-aided engineering tools, CATIA V5R19 and the analysis was carried out using a finite element analysis (FEA) software package ANSYS. The result can be used to determine the quality of design as well as identify areas which require further improvement, and also the maximum stresses is found not exceeding material strength of cylinder head. In this work, we have also designed and compare two types of cylinder heads and formulated the importance of fins.

Published by: Kunal S. Nagrik, Nawaz M. Merchant, Mukesh S. Rajpurohit, Swanand S. Pachpore

Research Area: Mechanical Engineering.

204. A Survey on Current Issues Prevailing in Public Transport System

Public Transport system (PTS) is an important and an essential part of urban and rural dwellers. PTS enables a smooth mobility of people and goods. Without PTS no city can improve the standard of living of the people and can make progress. As population continue to increase, many problems arise which make the PTS an unreliable and inefficient service provider. So, providing a good PTS is required in today’s world. There is a need to check and know the causes and solutions for effective transport system. Objective of the paper is to identify the major problems that make PTS an unreliable system and suggest possible solutions to overcome the issues.

Published by: Mohankumari K. V, Anitha L, Apsara S, Rashmi G A, Jyothi B

Research Area: Computer Science

Research Paper

205. Enabling Technologies, Protocols, and Applications: A Detailed Survey on IoT

The Internet of things is used as a parasol catch word for combining and covering the major aspects related to the extension of the Internet and Web into the phenomenon, by means of vast positioning of spatially distributed devices that contains embedded identification, sensing and/or actuation capabilities. Internet of Things (IoT) consists of a large number of connected objects that are communicating with each other. To discuss the Internet of things in wider sense and precedence on protocols, technologies, and application along with related issues. The main factor IoT concept is the integration of different technologies. The IoT is empowered by the hottest developments in RFID, smart sensors, communication technologies, and Internet protocols. The primary hypothesis is to have smart sensor dealing directly to deliver a class of applications without any external or human participation. Recently development in the Internet and smartphone and machine-to-machine technologies can be considered first phase of the IoT. In the platinum should continue to raise IoT is expected to be one of the main hubs between various technologies by connecting smart physical objects together and allow different applications in support of smart decision making. In this paper, we discuss IoT architecture and the technical aspect that relate to IoT. Then, give overview about IoT technologies, protocols and applications and related issues with the comparison of other survey papers. The survey aims to help other researchers in delving into the details of such techniques by going through their classification and comparison. The classification has been done based on the inherent features of this authentication technique such as being distributed vs. centralized, flat vs. hierarchical, and more others.

Published by: Gururaj Kulkarni, S. H Manoor, P. V Mitragotri

Research Area: IoT

206. Design and Development of Screw Feeder

A screw feeder is a device that is mostly used to transport varieties of materials at a desired and controlled flow rate. Screw feeders are also called as screw augers. In many studies, there is no distinction between a screw feeder and a screw elevator. The difference between both of them is that a screw feeder is used to transport material in horizontal or inclined arrangement whereas in a screw elevator material is handled in a vertical manner. A screw feeder can transport varieties of particulate matter whether it is a chemical, semi-solid material, plastic, slurry etc. Apart from transportation screw feeders are used to measure flow rate as well as they are used to add small traces of materials (i.e. pigments) to powders. In this paper, design & manufacturing of screw feeder for achieving constant flow rate which is required to supply the material (in this application it is wheat) to the grinding wheels of the flour mill and hence will reduce non-uniform wear of grinding wheels and hence will increase its life.

Published by: Utkarsha Govind Kulkarni, Hemanshu P. Shah, Satyam M. Sanas, Abhishek P. Shete, Ganesh H. Kekan

Research Area: Design and Development

207. Review of Influence of Road Side Friction in Urban Area

India is a developing Asian country which faces various traffic problems. Among which side friction is one of the major problems in metro cities. Side friction can be defined as all that activities which are going on or along the roadway facility. It includes but not limited to pedestrians, slow moving vehicles(SMV), on road parked vehicles, roadside vendors, on-road stopping vehicles. These factors are frequent in developing countries but they are sparse and random so making it of less interest for the researchers for their studies. But in the day to day life everyone is interacting with these factors. So this paper is mainly focused on reviewing the influence of side friction causing parameters on traffic speed and road capacity for urban arterial roads. Many urban areas in India are influenced by side friction which needs to be defined with their causes and influence to arrive at mitigation techniques using relevant design standards.

Published by: Mayank Kanani, R. G Motwani, H. K Dave

Research Area: Transportation Engineering

208. ASIC Implementation of 64 -bit Comparator using Reversible logic

A need for low power ICs arises to keep the power density of ICs within tolerable limits. While the power dissipation increases linearly with advanced version processors, the power density also increases exponentially, because of the ever-shrinking size of the integrated circuits. Reversible logic is emerging as an important research area in the recent years due to its ability to reduce power dissipation, which is the main requirement in low power digital design. In our proposed method reversible comparator based on CMOS logic circuit is designed using reversible gates. In this design, we try to reduce optimization parameters like a number of constant inputs, garbage outputs, and quantum cost. The experimental results obtained for implementation in CADENCE EDA 180nm technology shows the considerable reduction in terms of Power Delay Product in comparison with the comparator designed using conventional gates.

Published by: K. Saranya, T. Saranya, P. Mallikarjunan, M. Rajadurai

Research Area: VLSI

209. Motivational Practices and Its Impact on Sales Executives and Operational Executives in Leading Indian Private Banks

This study aims at exploring the impact of motivational practices on job satisfaction in the context to Private banks in India. A total of 240responses from three leading Indian private banks were collected and analyzed objectively. It was found that motivational practices have a significant association with job satisfaction (JS). Communication and Remuneration were found to have a positive impact on job satisfaction (JS). It was also found that communication has the greatest impact on JS. Academicians, researchers, policy-makers, practitioners, students, local and foreign entrepreneurs of India and other similar countries could benefit from this paper by exploring the association between HR practices and job satisfaction

Published by: Amitabh Patnaik

Research Area: Management

210. Review of Industrial Waste used in Stabilization of Expansive Soil in Road Subgrade

The Aim of this review paper is to study the various industrial waste used for stabilization of Expansive soil in road subgrade. Expansive soil have tremendous strength but it becomes very soft when it getting wet, It expands/swell due to its mineralogical composition during its wet condition, It creates cracks or consolidated when it is dry. Expansive soils can be found on almost all the continents on the Earth. First various literature was studied and finally an industrial waste Iron Sludge was suggested because of its higher density for stabilization of expansive soil.

Published by: Ahemadabbas S. Rajpura, Prof. B. R Shah, Prof. H. K Dave

Research Area: Pavement Engineering

211. Use of Global Portal for giving Preferences while Online Food Ordering

Food zone is basically a website which focuses on online food ordering. The system is convenient for the customers. It sets up menu online and the customers can easily place order. This application can also be used by developing cities where it is difficult for the restaurants to publish themselves. One can register for its restaurant, cake shop, bakery products, Mess and a lot more. Once registered, then can receive order and provide services. If any order is not available then it is redirected to global portal where it is accessed by other subscribers. Quick access functionality for user creates an attachment with restaurants. Also, there is a module for the customer to book a table. Even customer can give feedback to any restaurant so further filtering process is done.

Published by: Minal M. Surve, Manali Mahadeo Thakur, Sharvari Rajendra Khanore, Mangesh K. Gosavi

Research Area: Computer Science And Technology

212. Identification of Human Actions in Video Database

The Human activity detection is a more highly sought research as they are used for the Surveillance, Health care system, content based search, and interactive game applications. The Human activity recognition is carried out by three main stages namely object segmentation, feature extraction, their representation and human action detection using different algorithms. This paper is an attempt to identify the human activities such as running, jogging, clapping and hand waving in a video database using the method of bag of features which is the extension of bag of words. The Size Invariant Feature Transform (SIFT) based bag of SIFTs is used for the local feature extraction from the images that are chosen for the human activity detection. After finding the SIFT features for both the database and the query video, the query video features are compared with each of the database video features, the distance is found using Euclidean Distance method and the K Nearest Neighbor classifier is used to find the classified category from the list of the video . Matlab based implementation is done with various activities identified and their efficiencies are compared.

Published by: Smita S. Patil, Santosh Saraf

Research Area: Image Processing

213. Survey of Various Methods for Image Denoising

An Image is a worth, a thousand words & in this digital age, images are everywhere. Most of the digital images contain some form of noise. The purpose of denoising is to reconstruct the original image from its noisy observation as accurately as possible. The important property of a good image denoising model is that it should completely remove noise as far as possible. Estimation of the noise level in an image is a very important parameter to improve the efficiency of denoising. This article presents different approaches used so far by the researchers for the estimation of blind noise level using the statistical and averaging method and denoising of an image. The paper also contains problems in different approaches identified by the survey. Image denoising has a very rich history beginning from the mid-70s. Patch based image modeling has achieved a great success in low-level vision such as image denoising. In particular, the use of image nonlocal self-similarity (NSS) prior, which refers to the fact that a local patch often has many nonlocal similar patches to it across the image, has significantly enhanced the denoising performance. However, in most existing methods only the NSS of input degraded image is exploited, while how to utilize the NSS of clean natural images is still an open problem.

Published by: Renu Sharma, Gaurav Kumar Sangal

Research Area: Image Denoising

214. Performance Evaluation of a Modified Method Based On Patch Based Image Modelling For Image Denoising

Digital images play a significant role both in daily life as well as in areas of research and technology. Data sets collected by image sensors are generally infected by noise. Imperfect instruments, problems with the data acquisition process, and interfering natural phenomena can all degrade the data of interest. Furthermore, noise can be introduced by transmission errors and compression. Thus, denoising process is often a necessary and the first step to being taken before the images data is being analyzed. It is necessary to apply an efficient denoising technique to compensate for such data corruption. Image denoising still remains a challenge for researchers because noise removal introduces artifacts and causes blurring of the images. The challenge of any image denoising algorithm is to suppress noise while producing sharp images without loss of finer details. A modified method based on patch-based image modeling is proposed in this research work. The main part of proposed method is the use of image nonlocal self-similarity (NSS) prior. NSS prior refers to the fact that a local patch often has many nonlocal similar patches to it across the image. This fact significantly enhances the denoising performance. Patch Groups are extracted from training images by putting nonlocal similar patches into groups. According to these Patch Groups, Gaussian Mixture Model learning algorithm is developed to learn the NSS prior. The whole process is repeated 4 times to make the system learn more and more. The iteration process regulates and optimized some of the variables. MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio) and Correlation coefficient has been taken as output parameters to evaluate the performance of proposed system. MATLAB R2013a has been taken as implementation platform using image processing toolbox.

Published by: Renu Sharma, Gaurav Kumar Sangal

Research Area: Image Denoising

215. Architecture in Water

This paper deals with the understanding of what is architecture in water. The main aim is to understand its types, study its evolution, its scope in the current scenario, a brief study of construction techniques, sustainable approaches, problems faced while and after construction. At last, the aim is to arrive at a conclusion that why architecture in water is important.

Published by: Manali Surana

Research Area: Architecture

216. Maximum Solar Power Tracker Mechanically By Using Dual Axis Tracker

To formulate a method for harvesting the maximum solar irradiance and thereby increase the output of system. To reduce the energy expenditure by solar tracking system and conserve energy without any extra hardware components. The solar power is tracked mechanically in both the axis by using dual axis tracker efficiently to obtain maximum irradiance available from the sun.

Published by: B. Balaji, A. Arulvizhi, J. Jayashree

Research Area: Power Electronics & Renewable Energy

217. Smart Public Transport System Using Internet-Of-Things

Efficient transportation could be an important issue to be considered in public transport system [PTS]. To make a city smart and digitalised this is a small contribution. Smart public transportation system [SPTS] using IOT shows that how IOT can be applied to PTS and present the navigational facilities for urban bus passengers. SPTS provides three novel information services for bus passengers: 1) Micro-navigation [MN] 2) Crowd-aware route recommendation [CARR] and 3) Bus arrival time estimation [BATE]. MN gives fine grained information or guidance about passenger’s bus journey by recognizing and tracking the bus a person boarded. CARR collects the crowd levels of different routes and predicts and suggests the best and less crowded routes to passengers. BATE collects bus locations and predicts the estimated arrival time to passenger’s location with shared route details so that BATE will be more accurate. SPTS provides an efficient and reliable PTS which is simple, attractive and user friendly.

Published by: Apsara .S, Rashmi G. A, Mohankumari K .V, Anitha .L, Jyothi .B

Research Area: Computer Science

218. Survey on Underwater Acoustic Wireless Sensor Networks of Routing Protocols

In the past few years wireless Sensor Network has been an emerging technology. As it is a permutation of computation, sensing and communication. In the 70% of the earth a huge amount of unexploited resources lies covered by oceans. To coordinate interact and share information among themselves to carry out sensing and monitoring function underwater sensor network consists number of various sensors and autonomous underwater vehicles deployed underwater. This paper is concerned about the underwater acoustic wireless sensor network of routing protocol applications and UW-ASNs deployments for monitoring and control of underwater domains.

Published by: Neha Jain, Hitesh Jangir

Research Area: Computer Science & Engineering.

219. Movement Direction Algorithm for Geographic Routing Protocol in Vehicular Networks

Vehicular ad hoc networks (VANETs) are a special type of the wireless network in which communication through other intermediate vehicles on the road. Due to the high mobility of vehicles, the design of an efficient routing protocol is one of the key issues, which has been considered a challenging problem to deal with such dynamic network in VANETs. The greedy perimeter stateless routing (GPSR) routing protocol uses the simple greedy forwarding based only on the position information which may fail to find a neighbor closer to the destination than itself. In this paper, we propose a movement direction algorithm under GPSR. It comprehensively takes into account the velocity vector information and underlying link expiration time to recover a local maximum. The simulation outcomes in varying scenarios show that the proposed algorithm enhances the packet delivery and reduces the end-to-end delay, compared to the existing geographic routing algorithms.

Published by: Vongpasith Phouthone, Zhu Xiao, Dong Wang, Vincent Havyarimana

Research Area: Vehicular Networks

220. Social Entrepreneurship – Creating Value for the Society

Poverty is unnecessary” -Muhammad Yunus Social entrepreneurship is the use of the techniques by start-up companies and other entrepreneurs to develop, fund and implement solutions to social, cultural, or environmental issues. This concept may be applied to a variety of organizations with different sizes, aims, and beliefs. Social Entrepreneurship is the attempt to draw upon business techniques to find solutions to social problems. Conventional entrepreneurs typically measure performance in profit and return, but social entrepreneurs also take into account a positive return to society. Social entrepreneurship typically attempts to further broad social, cultural, and environmental goals often associated with the voluntary sector. At times, profit also may be a consideration for certain companies or other social enterprises.

Published by: Dr. M. N. Prabadevi

Research Area: Social Entrepreneurship

221. Wind Power Turbine

In the recent years, Wind Turbines are acceptable as an alternative source of electrical energy instead of fossil or nuclear power plants, because of the environmental and economic benefits. Wind energy plays an important role in the supply of energy. Wind Energy, like solar energy, is a free power energy resource energy from the wind can be tapped using the turbines. Wind Turbine is a machine used for converting the kinetic energy in the wind into mechanical energy.If the mechanical energy is used directly by machinery, such as the pump or grinding stones, the machine is called Wind Mill. If the mechanical energy is then converted into electricity, the machine is called Wind generator. The goal this paper is to develop the Mathematical Model to generate the electricity from a Wind Turbine.

Published by: Dr. Vandana N. Purav

Research Area: Mathematics

222. Review on Jelly Fish Detection and Prevention Schemes in MANETs

The Mobile ad Hoc Networks work for a number of applications in the present times. Some of the uses require quick transmission of the data from an emergency disaster prone area to the help centers. If the objective of least end to end delay between the transmission is defeated for the delay sensitive applications, then it could lead to more harm. The jelly Fish attack is one such kind of many possible attacks leading to the delay in the transmission of the packets. This paper reflects the idea of jelly fish attack and various techniques concerning its identification and prevention.

Published by: Sukhpal Kaur, Dr. Rajinder Singh

Research Area: Computer Science Engineering

223. Review on Detection and Prevention Schemes for Flooding Attack in WSNs

The nodes of the wireless sensor networks are operated by limited batteries. These networks are open to various kinds of attacks. While most of these attacks focus on dropping the packets being transmitted in the network, the denial of service flooding attack consumes up the batteries of the sensor nodes leaving them dead. This nature of attack makes it too fatal as it leaves network dead. This paper presents survey about the detection and prevention schemes of the same.

Published by: Sukhwinder Deol, Lovepreet Kaur

Research Area: Computer Science & Engineering

224. CAD/CAM Selected In Industry 3D Entitys Develope from the Software

The contribution deals with the transformation of engineering drawings in a paper form into a 3D computer representation. A 3D computer model can be further processed in CAD/CAM system, it can be modified, archived, and a technical drawing can be then generated from it as well. The transformation process from paper form to the data one is a complex and difficult one, particularly owing to the different types of drawings, forms of displayed objects and encountered errors and deviations from technical standards. The algorithm for 3D model generating from an orthogonal vector input representing a simplified technical drawing of the rotational part is described in this contribution. The algorithm was experimentally implemented as ObjectARX application in the AutoCAD system and the test sample as the representation of the rotational part was used for verificaton.

Published by: Nikhil Ramesh Ambekar

Research Area: Industry

225. Remedial Measures to Seismic Effects for Architectural and Structural Design

Architectural and structural features are mutually dependent on each other in a seismic resistant design. Their interrelation should be such that it does not impede its behavior in seismic zones. This paper follows the study of principles, methodology, measures and certain remedies to contradict effects of the earthquake on structures. A proposition on step-back building form is presented, stating that how a step-back building can perform productively during ground motion. As a result, eccentric values are analyzed to reduce torsion so as to attain a stable structural configuration.

Published by: Harshita Chowdhary, Vikas Gandhe

Research Area: Earthquake Resilient Structures

226. The NavAid –An Navigation System for Visually Challenged

This paper presents an Electronic Travel Aid (ETA) for visually impaired and blind people. This device enables a blind user to quickly and safely walk through obstacle cluttered and unknown environments with a combination of eyeglasses and waist belt. The foremost innovation of this device is its ability to actively guide the user around obstacles in pursuit of a given target direction. Using a network of ultrasonic sensors, this is possible. And special feature lets the system automatically determine the direction of travel when traveling alongside walls, sidewalks, etc. It effectively calculates a distance of the detected object from the subject and prepares navigation path accordingly avoiding obstacles. It uses speech feedback to aware the person about the detected obstacle and its distance. Such speech messages are conveyed to the subject using earphone

Published by: S. Sivagami, Kushmitha V, Dinesh D, Amala T, Anu Priyam M

Research Area: Ultrasonic Sensors

227. Exploring the Performance Extents of Hybrid Renewable Energy Systems

The current electricity demand has asserted the mandatory requirement of establishing renewable energy systems. This paper reviews the major contributions on practically establishing the hybrid renewable energy systems. The contributions are investigated for its practical relevance with the growing demand, exploration of various renewable energy resources and the performance accomplishment. The perspectives on using various renewable energy resources are also observed to determine the viable resource. Eventually, the research gaps and the worldwide focus on hybrid renewable energy systems are summarized.

Published by: Balbheem .N, Dr. Sudarshan Patil Kulkarni

Research Area: Control Systems, Renewable Energy

228. Intelligent Methods used for Placement of Distributed Generation Units in Distribution Networks

Distributed generation (DG) plays a significant role in reducing real power loss, lowering the operating cost and improving the voltage profile. This paper formulates the DG placement problem a combined objectives as individual objectives and presents a solution method for optimally determining the bus locations and sizing of multiple DG units in distribution networks using biogeography-based optimization (BBO). BBO, inspired from the geographical distribution of biological species, searches for an optimal solution through the migration and mutation operators. Test results on a 33-node distribution network reveal the superiority of the developed method.

Published by: A. Arulvizhi, B. Balaji, G. Balambigai

Research Area: Power Systems

229. Comparison of Crystographic Techniques

The study of hiding information is referred to as cryptography. When communicating over the untrusted med. Such as the internet it becomes very important to protect the sensitive information and hence cryptography plays a crucial role there. It is the study of hiding of info. Over an untrusted medium like the internet where it becomes compulsory to protect the information from the third party or the eavesdropper. On the other hand, steganography provides a cover or a protection layer to the sensitive information being transferred. Steganography deals with the composting of hidden messages so that only the sender is aware of the message being sent and if the third party tries to interferes he/she gets nothing but the cover medium being developed with the help of steganography. There have been many logical combinations of steganographic techniques which result in efficient protection for any content to be transferred. In this paper, we try to try out some of the famous combination of steganographic techniques and result out the best of them in terms of speed efficiency, security, and reliability for the user.

Published by: Lakshay Thakur, Roshan Lal Chokkar

Research Area: Cryptography and Steganography