Volume-3, Issue-3

May-June, 2017

1. Performance Analysis of Data Transmission in Free Space Optical (FSO) Communication

— Free space optical (FSO) communication has become a viable technology for broadband wireless application which offers the potential of high bandwidth capacity over unlicensed optical wavelength. Atmospheric turbulence has most significant impact on the quality of laser beam propagating through the atmosphere over long distance. For optical wireless communication system, most frequently used system is dense wave division multiplexing (DWDM). We are applying 150m channel spacing with 40 GHz bandwidth and 1550nm laser source. FSO channel work like Afocal scheme, it can reduce the size of laser beam, and expected longer free-space transmission in FSO communication, receiver side equal gain combining technique in presence of strong atmospheric turbulence. The signal to noise ratio (SNR), good bit-error rate (BER) performance and clear eye diagram are obtained and will be evaluated numerically for different system parameters. Such as DWDM FSO communication in provided the long transmission distance and high transmission rate, it useful for high speed light based Wi-Fi and Li-Fi applications

Published by: Vipin Mishra, S. Sugumaran

Research Area: Free Space Optics (FSO)

2. Gamification: An Initiative to Improve Engagement and Performance in Education

Gamification is an initiative which can be used to complement the various conventional learning and teaching processes in schools and higher educational institutions. Students deem the present educational practices as boring and exhausting. Universities have failed time and again to motivate students to attend regular classes. This has forced many schools and universities to make it compulsory for students to maintain at least 75% attendance in every course they enroll into. Schools and universities have failed to motivate and engage students in the learning process in general as well. Gamification can be used to solve this issue to a great extent. Gamification can be embedded into the learning process as Games make it a much fun and enjoyable experience. People of almost all ages like to play games – not only for rewards but also to experience the feeling of winning and the joy of playing a game. Various game-related components such as points, badges, medals, Leader boards and so on can be used to implement gamification in a class of students. Every university maintains a database of students’ attendance and marks scored during the various assessment tests. In this paper, this data is being used in a class of university students. Various rules have been written to reward the students with points and badges. In the frontend, a user interface (web Application) is built using HTML, CSS, JavaScript, bootstrap, D3.js and jQuery. MySQL has been used as the DBMS to run the queries on the data. PHP is used to link the UI with the database, both of which are hosted on the server.

Published by: Mustaque Bin Rashid, Prof. Suganya .P

Research Area: Web Development / Applications of Computer Science

3. Industrial Security Solution with Embedded

This paper is about the design, implementation, and testing of an Embedded Based Industrial Security System. This is completely self-contained PIC- Microcontroller based Security System which gives a complete security measurements for an Industry. It has the facilities of Intruder Alarm, Proximity Detector, Attendance Entry, Fire sensor. PIC Microcontroller is linked to the PC through the RS-232port, the feature packed enables the Security System to be interfaced with the PC and to provide PC based output. During Computer, Aided display of the output, the PC takes control and monitor any signal from security system such as Proximity, Fire Occurrence, Attendance Entry, Unauthorized Entry. The response of the security system is reflected immediately in the monitor. The user can access the data to get security reports at any time using the display screen of the project.

Published by: Rohan Krishnarao Ninawe, M. Vishnu Teja, Prateek Mantri, G. Balaji Mohan

Research Area: Embedded

4. Mobile Cloud Computing Model and Big Data Analytics for Healthcare Applications

This paper reviews networked healthcare and the role of mobile cloud computing and big data analytic s in its ennoblement. The motivation and development of networked healthcare applications and systems are presented along with the adoption of cloud computing in healthcare. A cloud let-based mobile cloud-computing infrastructure to be used for healthcare big data applications is described. The techniques, tools, and applications of big data analytics are reviewed. Conclusions are drawn concerning the design of networked healthcare systems using big data and mobile cloud-computing technologies analytics

Published by: Dhanya .K, Prof. Preethi .S

Research Area: Cloud Computing

5. Design of Independent Traffic Light System to Automate Flow Adaptive To Traffic

Traffic is a flow of motor vehicles or any other means of transportation on pavements. A clear and concise statement of our problem is traffic lights are often unintelligent, flow density of traffic is high and unpredictable, and a cost friendly solution to reduce idling time at traffic signal and minimise human (traffic cops) efforts is needed; This paper presents simple independent traffic light systems deployed on the roads which can process signal timings in according to rate of traffic flow from a particular pavement. The system would intelligently decide time slice allocation for every road at a junction with help of sets of sensors and algorithm which you calculate the size of the most efficient time slot for that square. This idea can also be extended to railway crossings and toll plazas, letting the rail pass safely and giving car driver idea of idle time to take any other task or break respectively

Published by: Arjun Mohabey, Mayura Kulkarni

Research Area: Computer Networks, Adaptive Applications

6. Assessment of Porters Five Competitive Forces in Indian IT Sector

The research paper discusses the concept of Porters Five competitive forces and its application to Indian IT sector. Porters Five Forces is a simple yet powerful tool in understanding where the power lies in a business situation and identify weather new products, services or businesses have potential to be profitable. The tool is very effective as it helps in understanding both the strength of our current competitive position and the strength of position that we are considering to move into. With an understanding of where power lies, a business can take advantage of its strengths and improve on its weakness.

Published by: Abhishek Dakhole, Dattatry Mane

Research Area: Organisation Management

7. Self-Concept and School Adjustment of Children with Learning Disability

The aim of the study is to study attachment and personality in person with self concept, school adjustment and learning disability and compare it with normal children. The data has been collected from Delhi and NCR. They were further tested on Adjustment inventory for school studies of A.K.P. Sinha and R.P. Singh and Self concept questionnaire of Dr.Raj Kumar Saraswat. Children with learning disability obtained significantly low score in self-concept and adjustment when compared to normal children. The result indicates a significant relationship between self concept and adjustment. In General, the results indicated that the better adjustment people have, the more ability they will make progress in their life. . However, the differences between the groups were found to be low suggesting that suitable remedial/ intervention programmes may bring the children with difficulty on par with normal children.

Published by: Dr. Priyanka Pandey

Research Area: Psychology

8. A Case Study: Ways And Means to Measure and Reduce ATC Losses in Distribution Systems

Electricity system consists of generation, transmission & distribution networks. The transmission & distribution loss and commercial losses play an important role in determining the cost of energy utilized by the user. The generation capacity, transmission, and distribution capacity depends on the losses & demand. When the loss is more, the generation capacity, transmission, and distribution capacity are to be increased. The main aim of SEBs is to give the electricity at cheaper cost, so it is necessary to minimize the Aggregate Technical And Commercial (ATC) Losses. But so far, no attempt is made to accurately calculate the losses by the SEBs. A test feeder is taken to analyze the ATC losses. In the analysis, distribution transformers (DT) loading, Power factor, Regulation and energy meter working conditions are studied. The aim of the analysis is to assess the present ATC losses in secondary distribution system on a selected feeder. This work suggests improvement measures to reduce the ATC losses within the permissible value and implement some of our suggestions and then determine the new ATC losses. After corrective measures are taken, the ATC losses are found reduced

Published by: S. R Shankar, Dr. N. Kamaraj

Research Area: Efficiency of Electric Power

9. Implementation of Virtual Human for Military Application

With the advancement in technology we can control almost any gadgets or equipment’s with appropriate hardware and software. This paper deals with haptic technology to control the locomotion of the robot. Haptics is the concept used to interact with the virtual world by means of touch. Here we make use of MEMS (accelerometer) which relies on the same, for controlling various actions of the robot and thus increases the tele-presence. Robotics has been through a staple of advanced manufacturing for over half a century. Military field has a lot of challenging tasks under harsh environment but with the help of robots it can be tackled easily in such conditions. This System eliminates huge losses due to terrorism and antisocial elements which can save human life. The robot has the ability to move; shoot based on gesture commands and also detects the presence of human nearby. The hardware is divided into two major sections, the control room side and the mechanical model. Control room side consists of MEMS which receives the input co-ordinates from the hand gesture, and this processed information is transmitted to the robotic side which will be placed on the military arena. It is also enabled with an IR camera that acts as an eye for the robot.

Published by: Priyanka .C, Sanjana .S, Ramya P. S, Akilandeswari .M, Priya .G

Research Area: Electronics Engineering

10. Energy Efficient Electric Vehicle Using Regenerative Braking System

The Regenerative braking can improve energy usage efficiency and can also extend the driving distance of Electric Vehicles. This can improve the battery efficiency by 16-25%, depending on the speed and the motor size. Regenerative Braking power generation could provide a remarkable power source for vehicles. The power dissipated by the vehicles can be partially taken back for powering up for some of the utilities on board. In this paper, we have proposed a method where we can use rapid storage and acquiring technique using super capacitors and control mechanism. This project needs a motor to run the vehicle, relays to convert the reverse voltage into a usable voltage, ultracapacitors or supercapacitors to store the energy that is acquired.

Published by: N. Dheepika Lakshmi, D. Pooja Kanwar, Sandhyaa. R, S. Lakshmi Priya

Research Area: Electric Vehicles

11. Advanced Foot Step Power Generation Using Piezo-Electric Sensors

Day by day, the population of the country in-creased and the requirement of the power is also increased. At the same time the wastage of energy also increased in many ways. So reforming this energy back to usable form is the major concern. As technology is developed and the use of gadgets, electronic devices also increased. Power generation using conservative methods becoming deficient. There is a need arises for a different power generation method. At the same time the energy is wasted due to human locomotion. To overcome this problem, the energy wastage is converted to usable form using the piezoelectric sensor. This sensor converts the pressure on it to a voltage. By using this energy saving method, footstep power generation system we are generating power.

Published by: Anirudha Chavan, Shyam Lakhadive, Vaibhav Pondhe, Prof. Vineeta Philip

Research Area: Power Generation

12. Indoor Localisation Using RSSI Technique

As positioning systems that can track and monitor moving objects/people become more widely used in our everyday life, we face the challenge of doing the same in places where such systems cannot be practically implemented. This is where the need for an alternate system arises. The main objective of the project is to provide a wireless means of tracking and monitoring objects/people in closed environments such as mines. There are two parts in this system- Transmitter which is a small portable device that can be carried around by the user inside the mines, and Receiver which is stationary, can be interfaced to a PC or remotely connected to PCs outside the mine through Internet of Things. Additionally, a climatology unit is kept at various points in the mines, to monitor the ambient parameters such as temperature, humidity, light intensity levels along with a safety sensor that detects vibrations caused by landslides or earthquakes. The receiver display shows the location of the moving object/person and the values of the ambient parameters. The tracking and monitoring is done by using RSSI algorithm, that is implemented using Visual Basic software.

Published by: Ramya .B, Saranya .N, Jyotsna .M, Hardhika Mahavir, Senthil Kumar

Research Area: Wireless

13. Automatic Diagnosis of Epilepsy Using Electroencephalogram (EEG) Signal Analysis

Epilepsy is a very common neurological disorder. Electroencephalogram (EEG) is the major diagnostic tool used for analyzing the human epileptic seizure activity and there is a strong need of an efficient automatic seizure detection using it to ease the diagnosis. This work aims at an automatic system for diagnosis of epilepsy. Here we extract some features like fractal dimensions, sample entropy, Lyapunov exponent, etc of both normal and epileptic EEG signals. These feature values are used as inputs to train classifiers like Artificial neural networks, support vector machines, probabilistic neural networks etc., After the training, we test the classifier with test EEG data.

Published by: M. V Satya Sai Chandra, Dr. Paul K Joseph, Dr. Thasneem Fathima

Research Area: Bio Medical Signal Processing

14. Traumatic Fibroma of the Upper Lip: Case Report of an Uncommon Presentation

Local reactive focal overgrowth is frequently found in the oral cavities. Different types of localized reactive lesions may occur on the gingiva, including focal fibrous hyperplasia, pyogenic granuloma, peripheral giant cell granuloma and peripheral ossifying fibroma (POF). The inflammatory hyperplastic lesion may be defined as “an increase in the size of an organ or tissue due to an increase in the number of constituent cells, as a local response of tissue to injury. Irritation fibroma clinically resembles as pyogenic granuloma, peripheral giant cell granuloma or odontogenic tumors, so radiographic and histopathological examination is essential for accurate diagnosis.

Published by: Dr. Monica

Research Area: Periodontology

15. A Smart Phone Based Accident Fall Detection, Positioning and Rescue System

This paper proposes the architecture of accident fall detection, positioning and rescue system that uses 3G networks. To perceive the fall detection algorithm, the angles acquired by the electronic compass and the waveform sequence of the tri-axial accelerometer on the smart phone are used as the system inputs. The obtained signals are used to produce an ordered feature sequence and then tested in consecutive way by the proposed cascade classifier for identification purpose. As soon as equivalent characteristic is confirmed by the classifier at the current state, it can continue to the state; contrarily the system will come back to the initial state and halt for the emergence of another feature sequence. When a fall accident event is diagnosed the victim’s position can be acquired by global positioning system (GPS) and forwarded to the rescue centre via 3G network so that immediate medical help can be provided.With the proposed cascaded classification architecture, the computational burden and power consumption issue on the smart phone system can be mollified. Moreover, known fall incident detection accuracy and reliability up to 92% on the sensitivity and 99. 75% on the specificity.

Published by: Keerthana .B, Nikita Pandya, Pooja Joshi, Neha .N, Dr. S. Sathiyan

Research Area: Bio-medical

Research Paper

16. Unsupervised Method for Face Photo - Sketch Synthesis and Recognition

Today face recognition is a very important field in biometric identification. Face sketch recognition is one of the special type face recognition. In this paper, presents an unsupervised method for face photo- sketch recognition. The face photo- sketch synthesis has two main steps. One is edge detection for only recognition of face and secondly is for hair detection. In the recognition step, the artist sketch is compared with the generated sketch. PCA and LDA are used to extract features from the sketch images. The k-nearest neighbor classifier with Euclidean distance is used in the classification step. It has a useful application for digital entertainment and law enforcement.

Published by: Seena Jose, Prof. Shivapanchashari

Research Area: Image Processing

17. Clinical importance of chlorophytum borivilianum in oligospermia

White Musli is a aphrodisiac drug . It have an natural biological environmental effect on neuro hormonal sexual axis.It maintains the equilibrium in mind and body.It reduces the sexual harassments like libido, impotency, infertility, and oligospermia.It increases sexual disireness , reduces fatigueness, maintains sexual satisfaction level, reduces the early ejaculation, increases sperm maturity, increases sperm number, increases sperm activity, reduces the oligospermia and infertility. It maintains the mental and physical equilibrium by homeostasis of blood include the regulation of temperature and the balance between acidity and alkalinity i.e ph balance of the body.

Published by: Dr. Dipak Swain, Dr. Vivek Mahalwar, Dr. K B Mahapatra, Dr. A. K. Das

Research Area: Ayurveda

18. Smart Attendance Management and Analysis with Signature Verification

The main Aim of this project is to make Smart Attendance Management and Analysis System where after getting individual's signature of the student , the signature is scanned and converted into an image file. After segmentation, features are extracted by Contourlet transform and Moment Invariants from the signature. Verification of signature is made with the Database of student’s Signature and Excel sheet of absence and presence of student's attendance is generated.

Published by: Chauhan Hardika, Dr. Nehal Chitaliya

Research Area: Image Processing

19. Low Power Full Adder Circuit Design Using Two Phase Adiabatic Static CMOS Logic

Adiabatic logic is used to minimize the energy loss during operation of the circuit. Using two phase adiabatic static CMOS logic (2PASCL) the power consumption can be reduced. This paper compare the power consumption of Static Energy Recovery Full Adder(SERF) and the proposed full adder using two phase adiabatic static CMOS logic(2PASCL). The average power consumption of proposed full adder is 4.8pW which is very less in comparative study with SERF. The result of this work focuses on the reduction of power consumption with the scaling down technology.

Published by: Roopali, Uma Nirmal

Research Area: Low Power

20. Security Management for Controlling Theft using Arduino UNO

Now-a-days theft has become a big threat to people and their property. Securing and monitoring has become the main objective for controlling theft. Several technologies have been developed to control theft. The existing technologies can control only theft but not the culprits who steal the properties. The proposed system is used to provide security to control theft and giving alert to owner when there is a break-in, using Bluetooth. The advanced locking system technology is implemented along with the traditional locking system. There are three techniques to prevent theft. First, IR sensor which is placed infront and rear side of the house. This IR sensor senses the object passes near it. Then the passcode lock system is used to detect the passcode is correct or not. If the entered passcode is incorrect the Arduino UNO controller will be activated. Third is using indicators, it consists of two switches. The two switches are considered as the main power line and fuse box which is placed at the house. When these two switches are on off mode it is considered as power cut. But incase only when the fuse box switch is off the controller activates automatically and the alert is send to the owner through the Bluetooth application which is installed in the mobile phone. If there is any interrupt in any of these techniques, the message will be send to the owner and police station. Total system shutdown option is activated using this application. Then the security system starts monitoring the house. This shutdown option can be made on whenever necessary. This may reduce the power consumption. Such security system gives service at low cost compared to the cost of the available security systems.

Published by: S. Deepika, M. Nisha Angeline

Research Area: Embedded

21. Assisting System for Deaf and Mute Using Arduino Lily pad And Accelerometer

In our daily life, most of the task we carry out involves speaking and hearing. The deaf and mute people have difficulty in communicating with normal people who doesn’t know sign language and misinterprets. In this paper, we have designed a system based on sign language which uses accelerometer through which change in coordinates is measured and is further processed using two microcontrollers at transmitter and receiver side. Text to speech converter and LCD is placed at the output to convey the message of deaf and mute people. Arduino IDE is the software used for compiling and simulating the design. This is one of the fastest responsive systems in this category.

Published by: Rakesh N. S, Rachamadugu Saicharan, Praveena Kumar, Harish N. G, Aneeta S. Antony

Research Area: Electronoics and Communication

22. IOT Based Safety and Security System

The objective of project is to build a safety and security system that carries out various functions, like remotely controlling and checking the status of devices connected to the banks like fire alarm, Burglar Alarm etc using Arduino Uno.and give information using website and GSM Module

Published by: Shrey Khurana

Research Area: Computer Science

23. Product Rating Based On Review

This paper borders around the analysis of turbine blade static structural and modal vibration analysis. The blade is a rotating part which converts kinetic energy into mechanical energy. The turbine blade is a critical part of the turbocharger which has shown increasing development of failure destructive turbine disk. It deals with Static and vibration analysis of turbine blade which is made up of Titanium alloy to estimate its performance. The causes of failure for turbine blade have also been found out. The investigation has been done using CATIA and ANSYS 14.5 software. CATIA is used for modeling of turbine blade and analysis has been done by ANSYS 14.5 software. An effort has been made to investigate the effect of induced stresses, pressure and mode shapes at the various natural frequency on the turbine blade. A static structural analysis has been carried out to investigate the stresses and displacements of the turbine blade. A modal analysis has been carried out to investigate the mode shape and natural frequency for the designed tapered gas turbine blade.

Published by: Anurag Manni, Naman Jaiswal, Nayan Jaiswal

Research Area: Data Mining

24. Globalization Of Finance And Its Implications For The Stabilization Of Industries Of India

The financial system has benefited from the Globalization of financial markets and financial Institutions. Financial globalization may also create new risks to the stability of the financial system. This Article analyses the impact of four major factors on the financial stability. These factors include the Rapid race of Innovation in financial markets, the increased Globalization of the banking system, the broadening of the Non-Banking Investor based and changes in the Regional Regime. The risks and benefits forwarded by these developments on financial stability are assessed in the light of their impact on the main core functions of the financial system. This article starts by analyzing the sources of strength and risk to financial stability from Innovation in the financial markets.

Published by: Dr. V. Venkateswara Rao, D. Pushpa Sri

Research Area: Management

Review Paper

25. Review on OFDM-Mimo Channel Estimation by Adaptive and Non-Adaptive Approaches

With this paper review, the several routes in MIMO-OFDM with predictive estimation on a different kind of modulation because of OFDM turns a frequency-selective route into a parallel assortment of frequency even substations. The subcarriers possess the minimum frequency parting necessary to maintain orthogonally of the corresponding time site waveforms, the signal spectra matching to the several subcarriers overlap in occurrence. Hence, the available bandwidth is employed very proficiently so the review is real as an important view of under position different prediction evaluation which surrender table.

Published by: Bhalinder Singh, Rekha Garg

Research Area: Communication

26. Mimo Channel Estimation Using Fast Converging Evolutionary Optimization Algorithm

In this paper, a new method using fast converging particle swarm optimization for channel estimation in transmit diversity has been proposed. Also, various estimation techniques for improving the accuracy of channel estimation, comparing the LS estimator with Adaptive Least Square estimator receiver which includes a feedback of output and improves the BER performance of the system, close to the ideal channel performance, have been studied. In the channel, it is required to transmit the data from a transmitter to receiver but sometimes noise is added to the data that has to be transmitted and that noise is called the interference. To improve the estimation process, an evolutionary algorithm like optimization techniques can be utilized for the estimation of the channel. Therefore, a method can be developed based on Particle Swarm Optimization based Least Square estimator for transmit diversity case in OFDM. The results have been shown in support of the proposed method.

Published by: Monika, Mahendra Tyagi

Research Area: Wireless Communication

27. Impact of Distribution Feeder Reconfiguration for Loss Reduction on Bus Voltages - A Perspective

A huge power is dissipated in distribution systems as power losses. The loss reduction and bus voltage improvement are the critical parameters of effective distribution feeder power flow. There are several techniques followed for power loss reduction and voltage profile improvement in distribution systems. Specifically, Distribution Feeder Reconfiguration (DFR) method is employed for the proposed system. The most important criterion of Distribution Feeder Reconfiguration is loss reduction, voltage profile improvement and relieving of the power lines from overloading. The proposed method is tested on a 3-Feeder distribution network and IEEE 33-Bus system. Genetic Algorithm (GA) optimization approach is applied to get the optimal switching scheme for feeder reconfiguration. Simulation results from load flow analysis and GA methodology have shown that the implementation of this method leads to a significant enhancement in voltage profile and reduction in the real power loss. Finally, results of system loss reduction and voltage stability enhancement with a brief overview of approached model are revealed in this paper.

Published by: K. K. S. V. V Prakasa Rao, V. C Veera Reddy

Research Area: Power Systems - Electrical Engineering

28. Development of Modified Digital Beam Forming Algorithm Using Least Minimum Square Algorithm

The demand for increased capacity in wireless communication networks has motivated recent research activities toward wireless systems that exploit the concept of smart antenna and space selectivity. Efficient utilization of limited radio frequency spectrum is only possible to use smart/adaptive antenna system. The smart antenna radiates not only narrow beam towards desired users exploiting signal processing capability but also places null towards interferers, thus optimizing the signal quality and enhancing capacity. The existing algorithm for adaptive beam-forming (LMS (Least Minimum square) and CMA (Constant modulus algorithm)) is having some issues regarding performance. These issues can be resolved and performance can be improved by doing modification in existing LMS algorithm. In this work, a modified digital beam forming algorithm using LMS algorithm is developed. The aim behind developing this algorithm is to improve steady state response, reduce the phase difference between input and output signal and to reduce the error magnitude between input and output signal. The algorithm is modified by computing and combining the antenna response for interferer signal and data signal to the interferer signal and data signal. This response is calculated for both data signal and interferer signal using the distance between the antennas (π/2) and direction angle of signals. We also analyze the performance of Modified (LMS) algorithm for smart antenna systems which very important for smart antenna design. The performance of proposed method is also compared with existing CMA. The performance parameters for comparison are phase response, magnitude response, and error magnitude. MATLAB R2013 has been used as an implementation platform using wireless communication and antenna tool box.

Published by: Heena Antil, Rajesh Kumar

Research Area: Antenna

29. Reliability of a New Multicomponent Agility Test for Assessing Agility in Basketball Players: The Basketball Multicomponent Agility Test (BMAT)

Current agility tests assess one or multiple components of agility, including unidirectional, bidirectional, and multidirectional movements, which may or may not include retropulsion and rapid acceleration and deceleration transitions along with performing basketball-specific activities such as jumping, turning around 180o and 360o, along with picking a ball and throwing it when changing direction. Hence, there is a requirement for a test which is specific to a Basketball game and also possesses the intricate movements associated with the game in a single test. Objectives: To develop a new sport-specific agility test for assessing agility in Basketball players and determine its reliability by establishing the interrater and interrater reliability. Materials and methods: In this explorative study 54 male Basketball players were taken with the age group 20±3 years. Subjects having acute injuries of lower limb injuries, disabled sportsmen, peripheral nerve injuries of upper & lower extremities, history of recurrent ankle sprains/ other injuries of lower limbs were excluded. The subjects had to perform the Basketball Multicomponent Agility Test (BMAT) which is a special test that has been designed specifically for Basketball players after an intricate and thorough analysis of the game through various videos of time-motion analysis. The final test hence includes all the components occurring most commonly in the game. Results: The Intraclass correlation coefficient (ICC) across the trials for the Interrater reliability was .997 and p= < 0.01 with 95% CI. For the Intrarater reliability the ICC across the trials was .946 at 95% CI, with p= <0.01. Conclusion: The BMAT is a reliable assessment tool for sport specific agility assessment in Basketball players. It can be routinely used by sports scientists, strength and conditioning practitioners, for monitoring the training programs for Basketball players.

Published by: Lakshmi Pavani P., M. Vijayakumar, Payal Vashi, Shuaa D. Ghare

Research Area: Physiotherapy

30. Education and Women: Islamic Perspective

The very first word of the Quran that was revealed to Prophet Muhammad was, in fact, “Read”. Prophet Muhammad once stated that “Seeking knowledge is mandatory for all Muslims.” Islam has a very wide focus and it teaches equality. It teaches that men and women are equal before God. It grants women divinely sanctioned inheritance, property, social and educational rights. The attitude of the Qur'an and the early Muslims bear witness to the fact that woman is, at least, as vital to life as man himself, and that she is not inferior to him nor is she one of the lower species. This paper focuses on education of women in Islam and their equality.

Published by: Dr. Rubina Shahnaz

Research Area: Education

31. Application of Email Client with Rabbit Algorithm for Android Mobile

To propose an android application which uses Rabbit Algorithm to develop Email Client Application. This particular email client uses rabbit Algorithm for encrypting and decrypting confidential e-mail content. This application can be used to create, edit, send, retrieve and Read a simple email. The email client is designed for smart Android Using Java. Experiments show that The Google Mail service this app can be used as simple email Client with secure content feature.

Published by: Jadhav Vivek Vilas, Jagtap Mayur Sampat, Sane Hanumant Raghuji

Research Area: Android

Research Paper

32. Implementation of Value Stream Mapping Methodology in Pulley Industry

Nowadays in a competitive market, various industries are facing various problems because of changing scenario in terms of high-quality demand, reduced the cost of production and increased productivity. This thesis attempts to provide a successful solution for these problems through lean manufacturing techniques. Lean manufacturing is the best technique for the elimination of waste from the organization. Value Stream Mapping (VSM) is one of the lean manufacturing tools. In VSM processes in an organization are strictly divided into the two groups: Value Adding Processes (VA) and Non Value Adding Processes (NVA). The goal of VSM is to identify waste in terms of nonvalue-added processes. Current State Map (CSM) is drawn to give details about the current position and find various problem areas. Future State Map (FSM) is drawn to show the implementation action plan. In this thesis, a study has been carried out from Maheshwari Power Drive, G.I.D.C., Naroda, Ahmedabad. Three product line of different pulley like 36 8M 45 timing pulley, 22 8M 25 timing pulley, 32 8M 50 timing pulley are analyzed. In this study, first of all, collecting the details from each product line and create a three current state map and then choose any one as per requirement of the improvement. Then create a future state map for the plan of improvement and then apply the proposal within the industry.

Published by: Arpit K. Jayswal, N. D. Chauhan, Rahul Sen

Research Area: Lean Manufacturing

33. Optimal Blending Of Fly Ash with Geospatial Characteristics of Soil

Soil is the basic foundation for any civil engineering structures. It is required to bear the loads without failure. In some places, soil may be weak which cannot resist the oncoming loads. In such cases, soil stabilization is necessary in this study, fly-ash is used as a stabilizing material to stabilize the expansive soil dealing with engineering characteristics as the parameter for it. Present paper describes a study carried out to check the improvement in the properties of expansive soil with fly-ash in varying percentages. Fly-ash is added in 10%, 20%, 30%, and 40% and the change in index properties and engineering characteristics is to be examined. In such cases, soil stabilization is necessary. Numerous methods are available in the literature for soil stabilization. But sometimes, some of the methods like chemical stabilization; lime stabilization etc. adversely affects the chemical composition of the soil. Hence, in this project we are going to have a check on variation in the properties of soils on addition of varying percentage of soil.

Published by: Dr. Shivraj L. Patil, Saurabh S. Naik, Nikhil M. Nainani, Akash J. Khanchandani, Akash S. Visrani, Shubham S. Surve, Karan N. Lalwani

Research Area: Civil Engineering

34. Review on Religious Practice on Politics with Special Reference to Chhattisgarh State, India

The relation between religion and politics continues to be an important theme in political philosophy, in terms of political theorists and in practical political contexts. One reason for the importance of this topic is that religions often make strong claims on people’s allegiance in a particular community. In the new democracies the role of youth is of special importance. Young people always ready to face the challenge of fitting into an established political system or making changes. Hence these all issues related to religious politics motivated author to select this topic for review and hoping to explore the maximum of negative and positive aspect in the work. Moreover, study will focus how religious exercise in politics will influence effect the present youth with special reference to state Chhattisgarh, India.

Published by: Ashok Kumar Chaturvedi

Research Area: Political Science

35. Structural Morphological and Electrical Study on PI/ ITO/ PVDF Ternary Composite Thin Films

Studies of polymeric ternary composite thin films incorporating inorganic materials are of immense importance for current technological applications. Polyimide (PI) composite thin films incorporating indium tin oxide (ITO) and poly (vinlylidene fluoride) (PVDF) at various weight ratios were processed using an in situ generation approach with the spin coating unit. The resultant product was imidized up to 350º C to test the ability of the material to endure high temperatures without affecting the host matrix. The structural and morphological behavior of the PVDF/ ITO/ PI composite films was investigated using Fourier Transform Infrared, Scanning Electron Microscopy and Atomic Force Microscopy characterization techniques. The degrees of crystallinity and PVDF/ ITO particle size within the PI matrix were studied using X-ray diffraction. The electrical properties were analyzed using Differential Scanning Calorimetry, UV-visible spectroscopy and the four-probe technique. An overall improvement in the properties of the composite films was observed in comparison to those of pure PI. The synergistic improvement in the composite films is associated with the interaction mechanism between ITO/ PVDF with PI, where ITO becomes dispersed and interacts within the PI and PVDF compound matrix. This leads to a decrease in available free-space volume and increases the surface enrichment providing reinforcement to the matrix.

Published by: Prabhat Kumar

Research Area: Physics

36. The Conflict Between Tradition And Modernity , R.K. Narayan’s – The Guide

R K Narayan was born in British ruled India in the erstwhile city of Madras later renamed Chennai in 1906 and most of his works related to the fictional south Indian town of Malgudi. Narayan who is often compared with William Faulkner, alike the latter dwells in the social contexts and the usual life of his characters with humor and compassion and the energy that propels common life as the appealing inspirations. In 1933, Narayan met and fell in love with a fifteen year old girl who lived in his neighborhood and going against all astrological advice disapproving proposed marriage went ahead to marry her and though the marriage not very long lived with his wife Rajam dying prematurely, her entry into his life started changing times for him in better ways. The first three books written by Narayan, deal with socially accepted evil practices.Overall different novels written by Narayan throws light which shows the conflict between Tradition and Modernity.

Published by: Pankaj Kumar Raj

Research Area: English

37. Review on EES Application in Power Engineering System

In view of the projected global energy demand and increasing levels of greenhouse gases and pollutants, there is a well-established need for new energy technologies which provide clean and environmentally friendly solutions to meet end user requirements. Present review work is an effort to study the electrical power generation because of the need to reduce greenhouse gas emissions and to introduce mixed energy sources. Review based on the present and future Electrical Energy Storage (EES) system which is recognized as underpinning technologies to have great potential in meeting these challenges, whereby energy is stored in a certain state, according to the technology used, and is converted to electrical energy when needed. Review work starts with an overview of the operation principles, technical and economic performance features and the current research and development of important EES technologies, categories based on the types of energy stored. Work intends to mitigate this problem by providing a comprehensive and clear picture of the state-of- the-art technologies available, and where they would be suited for integration into a power generation and distribution system. Moreover, comparison had been made between RES and EES system.

Published by: Shiw Vilas Sah

Research Area: Electrical Engineering

38. A Study of Reduction of Vanadate

Vanadates are salts corresponding to oxidation state V of vanadium. The salts are pretty strong oxidizing agents having a standard potential comparable to that of nitric acid. Their structures and nature of species presents in solution have been extensively studied. The results show that in electronic configuration Vanadates show resemblance with phosphate to the extent that none of them is left with any unshared electron and both exist in modifications like Ortho, meta, pare etc. differing essentially in the water content of the acid and also in the extent of polymerization. However an important difference between the two is that whereas for phosphates the rate of interchange of different forms is quite slow, it is quite fast for Vanadates. Hence any form of vanadate when put into solution rapidly comes to an equilibrium common for all. This divergence in further manifested in their behavior towards acids. Increase of acidity in the case of phosphate lead to simpler molecules but for Vanadates as one passes from alkaline to acidic solutions the complexity of the vanadate ion raises leading ultimately to precipitation of (V 2 O 5) in about N/100 acid. On further increase in acidity the precipitate redissolves but now as a cation formulated variously as V. In this respect and in other chemical properties they are closer to chromates.

Published by: Satish Kumar Sinha

Research Area: Physics

39. Interdependence & Integration between Futures and Spot Market: Empirical Evidence in India

The objective of this paper is to study the co-integration technique is used to determine the existence of any such relation in the two markets during 20th Nov, 2009 and 31st Dec, 2014. The major findings of this study that Futures prices tend to influence spot prices or; spot prices tend to lead futures prices. Nifty Futures market leads the Nifty index cash market; a lead-lag relation can be traced during the mentioned time period. This paper indicates that the two markets have bidirectional causal relationship between spot and futures prices.

Published by: Dr. Saroj Kanta Biswal, Saktikanta Barik

Research Area: Finance

40. A Review on Extracting Deblur Image Using Fuzzy Logic Approach From Impulse Noise

The image processing is very crucial field of research in which we can get the complete and detailed information about any image. One of the main issues in our research field is to get the quality of an image. So we will try to propose an advanced algorithm to enhance the quality of an image by removing noise. Deblurring techniques are basically used to sharp an image using different methods & parameters so that we can the abundant amount of knowledge. As we know there are various types of noises occurred in an image and like salt & pepper noise, additive white Gaussian noise, flicker noise, shot noise and many more. To compensate these noises there are various types of technique like algorithm, filtering concept, fuzzy logic approach and much more. Every technique is suitable for a particular noise and we cannot apply randomly to remove a particular noise. In last few years there is lot of development and attentions in area of blur detection techniques. The Blur detection techniques are very helpful in real life application and are used in image segmentation, image restoration, and image enhancement. Blur detection techniques are used to remove the blur from a blurred region of an image which is due to defocus of a camera or motion of an object

Published by: Preeti, Sachin Suryan

Research Area: Enginnering

41. Robust Technique for Extracting Deblur Image Using Fuzzy Logic Approach from Impulse Noise

Image processing is very crucial in today world because of various noises, attacks, and many more problem faced by an image from a transmitter to the receiver side. By applying various algorithms and filters we can remove such type of noises and attacks. Blur detection techniques are very helpful in real life application and are used in image segmentation, image restoration, and image enhancement. Blur detection techniques are used to remove the blur from a blurred region of an image which is due to defocus of a camera or motion of an object. Blurring is a form of bandwidth reduction of an ideal image owing to the imperfect image formation process. It can be caused by relative motion between the camera and the original scene, or by an optical system that is out of focus. Deblurring techniques are basically used to sharp an image using different methods & parameters so that we can the abundant amount of knowledge. As we know there are various types of noises occurred in an image and to remove various techniques are used. Every technique is suitable for a particular noise and we cannot apply randomly to remove a particular noise. With advancement of time old technique are replaced by advanced method and today Fuzzy Logic is much more appreciated due to simple logic function and it is fourth generation technique

Published by: Preeti, Sachin Suryan

Research Area: Deblur of an Image

42. Cloud Federation Management and Beyond: Requirements, Relevant Standards, and Gaps

The big data requests make the cloud computing assets insufficient as well as incapable of catering the needs raised by big data requests. Business structures and the look enhancing factors have to reshape and rebuild their dynamic asset scaling abilities to modify it according to the needs. In order to tend to this administrative issue combined mists act and provide a stage. A cloud organization arrangement is proposed, planned as well as presented which caters to the need of the collaboration of the cloud suppliers in offering cloud IaaS administrations. Due to the fact that the proposed league development diversion is developed and presented, a cloud alliance arrangement system that empowers the cloud suppliers to progressively frame a cloud organization amplifying their benefit is proposed and presented. Moreover, a steady cloud alliance structure is consistently delivered, which is, the partaking cloud suppliers in the league which doesn't have motivating forces to split far from the organization. The performance and occurrence of broad examinations lead to the breaking down of various attributes pertaining to the project. The steadiness of the cloud organization acquired by our proposed system is clearly depicted by the consequences, returning high benefit for the partaking cloud suppliers.

Published by: Amit Singh, Anand Singh, Jackulin Mahariba

Research Area: Computer Science and Engineering

43. A Comparative Study of AAC Block & Clay Brick Under Gravity Loading For Buildings

Brick is the most commonly used building material in construction. AAC blocks are new construction material which is very light in weight. Compare to same size of (200mm x 100mm x 100mm,its 3 times lighter than traditional brick (clay brick);it means it covers more area in same weight as clay brick gives in one bricks. In this paper; attempt has been made to replace the clay brick with light weight AAC blocks. The usage of AAC block reduces the cost of construction up-to 25% as reduction of dead load of wall on beam makes it comparatively lighter members. The use of AAC block also reduces the requirement of materials such as cement and sand up-to 55%.

Published by: Alim Shaikh, Utkarsh Jain, Hussain Narayangarhwala, Suraj Pawar, Kanhaiya panwar, Narendra Choudhary, Archit Khandelwal, Mohd. Shadab Hussain

Research Area: Civil Engineering

44. Neurogenic Pulmonary Oedema- Case Report

Neurogenic pulmonary edema (NPE) is an increase in pulmonary interstitial and alveolar fluid that is due to an acute central nervous system injury and usually develops rapidly after the injury. It is still underappreciated in the clinical arena. It's sporadic and relatively unpredictable nature and a lack of etiologic-specific diagnostic markers and treatment modalities may in part be responsible for its poor recognition at the bedside. Neurogenic pulmonary edema in pediatric age group is largely underreported. Three patients presenting with acute onset neurogenic pulmonary edema following head trauma have been described by Neurogenic pulmonary edema in childhood by J. Ross Milley, Stephen K. Mark C. Rogers Nugent (1). We present a case of neurogenic pulmonary edema in a ten yr old female child following recurrent meningitis

Published by: Dr. Saurabh Karmani, Ghuliani Ranjit, Faiz Ahmad

Research Area: Medicine

45. Static Signature Matching Using LDA and Artificial Neural Networks

In recent years, the importance of biometrics in authentication and identification has emerged. Both government and private agencies make use of automated human identification using different biometric traits. Signature based authentication has been used for many years. This paper presents an automated static signature recognition approach. We have used Gabor filter for preprocessing of signature images. For matching purpose, artificial neural networks are used, which are trained by the back-propagation learning algorithm. The results show that the given approach yields a good solution to automated signature recognition problem because of its high accuracy (99.5%) and FRR (68%). On the other hand, computational time of the proposed technique is less than the previous approaches.

Published by: Shaina Kedia, Er. Gaurav Monga

Research Area: Digital Image Processing

46. A Watermarking Approach In DWT Domain Using Symlet and Coiflet Filters

Digital watermarking is the act of hiding a message related to a digital signal (i.e. an image, song, video) within the signal itself. It is a concept closely related to steganography, in that they both hide a message inside a digital signal. Watermarking has a number of uses in security, authentication and registration purposes. Image Watermarking is a widely sought after research area and many researchers have done extensive study on various aspects of digital image watermarking. Out of those techniques DWT based techniques are quite popular. In this research work a novel algorithm has been presented for Digital Image Watermarking, which uses the DWT technique to perform Watermark embedding and extraction process. The wavelet filter are of many kinds and erstwhile research have been mostly carried on ‘haar’ and ‘daubechies’ wavelet filter. In this research work, ‘symlets’ and ‘coiflet’ filters have been used. A comparative study of results in terms of PSNR and MSE with other filters is also available to give a better reasoning and insight.

Published by: Akanksha Singh, Mohd. Saif Wajid

Research Area: Computer Science

47. Improve Energy Efficiency in Cognitive Radio Ad Hoc Networks by Selecting Secondary User

Wireless networks combining the advantages of both mobile ad-hoc networks and infrastructure wireless networks have been receiving increased attention due to their ultra-high performance. Users have the capability to sense available spectrum in Cognitive Radio Networks (CRNs).Users can opportunistically access to the spectrum. Paper proposed for energy consumption for CRNs, Which is higher in traditional Cognitive Radio Ad Hoc Network (CRAHNs). Users mainly depend on spectrum access so the requirement of network architecture is user spectral. In the proposed network architecture, only parts of user’s are equipped with Cognitive Radio (CR) module. Additionally, user management done, a minimum number of users are selected to sense available spectrum, which aims at reducing the energy consumption further. The minimum number of users selection problem is formulated as an optimal routing algorithm problem under the constraints of energy efficiency and the real-time available spectrum information. Hence, a distributed optimal routing algorithm is proposed to calculate the optimal solution. The optimal routing algorithm in the proposed network architecture outperforms and traditional Cognitive Radio Ad Hoc Networks in energy efficiency.

Published by: Mr. Raghunath K. Borkar, Prof. Sheshnarayan Ghungrad

Research Area: Computer Science and Engineering

48. A Survey on Fingerprint Minutiae Extraction

The modern world is fully computerized and now it has become more and more important to authenticate people in a secure way. Current applications like online banking or online shopping use techniques that depend on personal identification numbers, keys, or passwords. In this paper we have surveyed on various minutiae extraction techniques.

Published by: Illa Singh, Rohini Sharma

Research Area: Fingerprint Minutiae Extraction

49. A Review on Sensor Network in Smart Grid

The traditional power grid in many countries suffers from high maintenance cost and scalability issues along with the huge expense of building new power stations, and lack of efficiency system monitoring that could increase the overall performance by preventing potential failure. To address these problems, a new generation electric power system called smart grid has been proposed as an evolutionary system for power generation, transmission, and distribution. It utilizes renewable energy generation, smart meters and modern sensing and communication technology for the effective power system. Traditionally, grid management has been realized through wired system formed by communication cables, which involves the heavy cost in terms of installation and maintenance of flexibility, self-organization, and rapid deployment. A smart grid uses digital technology to improve reliability, security, and efficiency of the electric system.

Published by: Priya Sharma, Gitanjali Pandove

Research Area: Networking

50. A Novel Approach for Efficient LDPC Decoding

Recently, LDPC codes have been proved to be capable of closely approaching the channel capacity and hence they are strongly promoted in many international standards. Though decoding is simpler compared to Turbo code decoding, efficient decoding techniques for LDPC codes are in demand to make it further simpler. The theoretical performance of LDPC codes appears simple and close to Shannon’s capacity of channel, but the practical implementation is still challenging due to tasks like numerical inaccuracy, limited memory resources, etc. We investigate methods to reduce the complexity and make decoding simple while still keeping the loss in performance negligible. The aim of this paper is to reduce the complexity by simplification of the component decoders. For this, we analyze the min-sum algorithm and derive a theoretical framework. With this framework, we are able to modify the algorithm in order to achieve good performance for regular as well as irregular LDPC codes.

Published by: B. LasyaSri, B. Ashok Raj, L. Nirmala Devi

Research Area: Channel Coding, LDPC Codes.

Review Paper

51. Review on Structural Software Testing Coverage Approaches

With the aim of discovering software bugs (blunders or different deformities) the test procedures incorporate the way toward executing a program or application, and confirming that the software product is fit for utilize. To assess at least one properties of intrigue the software testing includes the execution of a software part or framework segment. In this paper we review the different software testing and its methods.

Published by: Monika Thakur, Sanjay

Research Area: Software Testing

52. Designing and Performance Evaluation of Wireless Communication System Based on Advance STBC

Orthogonal frequency division multiplexing (OFDM) is an emerging technique for high data rate wireless communication systems over frequency selective channels and can be considered as one of the most promising techniques for future wireless system. However, it is well known that OFDM-based systems are sensitive to the inter-carrier interference (ICI) generated by a carrier frequency offset (CFO), which degrades the error probability performance for both single-antenna OFDM systems. Moreover, in a multipath fading environment, performances of OFDM system in a wireless channel are severely degraded by random variations in the amplitude of the received signals as well as by the presence of inter-symbol interference (ISI) and inter-carrier-interference (ICI) which also limit the OFDM system performance. Recently, Alamouti STBC has gained much attention as an effective transmit diversity scheme to provide reliable transmission with high peak data rates to increase the capacity of wireless communication system. In this research work, an advanced method for STBC-OFDM is proposed. The advancements which is done to the existing method is remapping of complex data after STBC encoding and serial to parallel conversion of complex data. This modification actually doubles the length of the data. At the receiver end again demapping of data is done which halfs the data length. This procedure helps in reduction of chances of error in the signal. The main objective of proposed method is to reduced the BER and SER in STBC-OFDM system. For each simulation, blocks of 1024 symbols are simulated. The proposed system is simulated with two transmitter antennas, two receiver antennas. We have used channel conditions, which have two independent paths with path delays in seconds and average path gains = [0 - 20] dB. The performance of the proposed method is compared with that of existing STBC-OFDM system using BER and SER. MATLAB R2013 has been used as an implementation platform to simulate the proposed method. Wireless communication toolbox and generalized MATLAB toolbox is used for the same.

Published by: Shubham Tyagi, Rajesh Kumar

Research Area: Communication

53. Design and Implementation of Fir Filter Using Retiming Technique

Finite Impulse Response (FIR) Filter can be designed by provision of specifications which are for a particular application requirement. An efficient FIR filter is designed using register reduction retiming technique. Also, an optimization environment is designed such that filter components of post retimed circuit such as adder and multiplier are upgraded depending on the Very Large Scale Integration (VLSI) design metrics such as area, speed and power. In conventional cut-set retiming of FIR filter, higher critical path delay and latency occurs due to unwanted pipelining. They require higher clock period. So overcome, FIR filter it’s designed using Novel node – splitting and Node merging techniques. These schemes reduce the critical path delay by 50% and latency by 60%. In this paper node merging method is simulated and its performance parameters such as power, delay, critical path, latency, clock period and number of registers are analysed. In Data Flow Graph (DFG) retiming of digital circuit is used to reduce the propagation delay and critical path. The reduced propagation delay in turn reduces pipeline overheads. Thus, cut-set retiming can be made more efficient without increasing the register complexity and latency. The FIR architecture for node merging has to be designed and its performance is to be analysed. The proposed FIR filter using retiming technique are simulated using MODELSIM 10.1b and power analysis of the proposed work is done using Xilinx ISE 9.2i. In this proposed work the layout will be developed using AARON 9.03 tool.

Published by: R. Dhivya, Dr. P. Brindha

Research Area: VLSI

54. Hybrid Recommendation Model With Nearest Neighbor Classification Based Collaborative Approach

The e-commerce product ranking models are designed to handle the very large volumes of the data involved in the database. Formally, the multifactor ranking models are incorporated over the online portals, which are capable of producing the multivariate lists. The product lists are prepared on the basis of various features, which include the popularity, accessibility and trust based factors which are associated with the e-commerce products for the realization of the content-based filtering over the e-commerce portals. In this paper, the multivariate and multifactor ranking algorithm has been proposed in order to solve the problems related to the low entropy, duplication and unbalanced feature analysis. The proposed model design is entirely based upon the popularity, visitor density, number of customers and security analysis based factors of the e-commerce pages containing the product lists. The multifactor values are organized in the different columns containing the different kinds of information, which are converted to the normalized and compatible values to create the data uniformity. The proposed model offers the collaborative index based product ranking model over the dense e-commerce databases. The proposed model has been designed to use the collaborative filtering based upon the k-nearest neighbor algorithm. The proposed model has been undergone the various experiments for the performance evaluation based upon the time complexity, resource utilization and other similar factors.

Published by: Ramandeep Sharma, Samarth Kapoor

Research Area: Soft Computing

Research Paper

55. Stochastic Economic Load Dispatch Using Pareto Distribution with Multiple Fuels Local Convex By Bacterial Foraging Optimization

In this paper, Stochastic Economic Load Dispatch problem with Multiple Fuels is solved using Pareto distribution with local convex optimization by bacterial foraging approach. Bacterial foraging optimization is swarmed intelligence technique used to solve the problem of the power system. The algorithm is based on the group foraging behavior of Escherichia coli (E-coli) bacteria present in the human intestine. This social behavior of E-coli bacteria has been used to solve optimization problems. This paper presents a BFO to solve Economic load dispatch (ELD) problems. The result is obtaining from test system with seven generating units. In this paper performance of the BFO is compared with Particle swarm optimization (PSO). The result clearly shows that the proposed method gives a better optimal solution as compared to the other methods.)

Published by: Akshay Rana, Shavet Sharma, Amandeep Thakur

Research Area: Power Electronics

56. Automatic Irrigation System Based On Volumetric Soil Moisture Content Detection

In the field of agriculture, use of the proper method of irrigation is crucial. To have it done with reduced human intervention and still ensure proper irrigation is a challenge. We have developed an automatic irrigation system which switches the pump motor ON/OFF on sensing the moisture content of the soil. The soil Moisture Sensor module is used to detect the moisture of soil and infer to the volumetric presence of moisture present in the soil and if there is water on the sensor. We would use this module and insert it into the soil and then adjust the on-board potentiometer to modify the sensitivity. The sensor would give us the output logic HIGH when the moisture is higher and LOW when it is lower than the threshold value set by the potentiometer. The Soil Moisture sensor measure the volumetric water content in the soil, indirectly by using some other property of the soil, such as electrical resistance, dielectric constant or interaction with neutrons, as a substitute for the moisture content. We will preferably design soil moisture sensor using Arduino. An Arduino code will be used which will read the amount of moisture present in the soil and accordingly send information from the moisture sensor to the phone via the GSM module.

Published by: Anirudh Itagi, Nidhish Meherotra, Utkarsh Shukla, Dipak Singh, Prof. Deepika Rani Sona

Research Area: Agricultural Advancements in Technology

57. 3D Face Reconstruction from 2D Images Using Data Mining Algorithm

Human faces are amazingly comparative in worldwide properties, including size, viewpoint proportion, and area of principle components, however can differ extensively in subtle elements crosswise over people, gender, race, or because of facial expression. We propose a novel technique for 3D face reconstruction of appearances that adventures the similitude of faces. Our technique use as info a solitary picture and uses an insignificant 3D reference model of an alternate individual's face. Traditional remaking techniques from single pictures, i.e. shape-from-shading, require learning of the reflectance properties and lighting and also profundity values for limit conditions. Late techniques evade these prerequisites by speaking to information confronts as mixes (of hundreds) of put away 3D models. We propose instead to use the input image as a guide to “mold” a single reference model to reach a reconstruction of the sought 3D shape.

Published by: Seema Chavan, Prajakta A. Satarkar

Research Area: Image Processing

58. Variation Tolerant SRAM Cell for Low Power Applications

Static Random Access Memory (SRAM) is the important component across a wide range of microelectronics applications like high performance server processors, multimedia and System on Chip (SoC). The lower power consumption, static noise margin (SNM), read and write stability are the major design metrics for designing an SRAM cell. It is difficult to achieve that conventional 6 T SRAM cell in scaled technology, particularly in deep-subthreshold region. In this paper, impact of process parameters variations on various design metrics of the proposed cell are presented and compared with conventional 6T and 8T.The proposed 9T cell utilizes a scheme with separate read and write word lines it is shown that the 9T cell achieves improvements in power dissipation, performance and stability compared with previous designs (that require 6T and 8T) for low-power operation. The 9T scheme is amenable to small feature sizes as encountered in the deep sub-micron/nano ranges of CMOS technology. The proposed 9T SRAM cell designed in 130 nm Complementary Metal Oxide Semiconductor (CMOS) technology in the power supply voltage of 1.8 V. The simulation is done by using AARON 9.03 tool to achieve the power consumption of 91.55% lesser than existing method, Then the read and write delay of proposed 9T SRAM cell is reduced by 8.3% and 23.0% lesser than conventional 6T and 8T.

Published by: Dineshkumar .C, M. Parimala Devi

Research Area: VLSI

59. Effect of Nidanparivarjan and Anutail Nasya in Vataj Pratishyaya-A Case Study

‘Vataj Pratishyaya’ or ‘Allergic rhinitis’ is a common disease of modern era due to increased exposure to environmental pollution and unhealthy lifestyle. Allergic patients experience emotional burdens like feeling tired and miserable when their nasal allergies at their worst, limiting them from doing well at work. The prevalence of ‘Allergic rhinitis’ has increased during the past three decades. According to various international studies, it is now estimated that 20% of the general adult population and 40% of children have this condition. In Ayurveda a detailed description of ‘Pratishyaya’ it's typing ‘Vataj Pratishyaya’ is available which is said to be a condition of less complication and good prognosis. In the present case study, a study carried out under designed protocol and the result of the case study was assessed in terms of the effect of ‘nidanparivarjan’ with ‘ And tail easy’ in ‘Vataj Pratishyaya’. The present study showed a highly significant reduction in the incidence and frequency of the symptoms of ‘Vataj Pratishyaya’ with the application of ‘Anutail easy’.

Published by: Dr. Kapil B. Shekhadar, Dr. Mahadevi Jadhav, Dr. Ankita Mandpe, Dr. G. G. Asati, Dr. Meera A. Aurangabadkar

Research Area: Maharashtra, Nagpur

60. Defining Quality in Construction Industry

Quality is a word with many implications depending upon the business. It is thus not possible to phrase an exclusive definition for the term quality. During recent years the significance of quality management approach for business enhancement has been agreed and applied by many industries. Successful implementation of various such methods was possible having that the sense of quality was appropriately defined. However such approaches have been far away from been practiced in the construction industry. The unique character of the industry being the reason. Besides quality have different perspectives in the construction industry itself. Thus an attempt has been made to highlight the various perspectives of Quality with respect to the construction industry.

Published by: Harshad Solanki Vijay, Prof. Ashok B. More, Mitesh Tank Ashok, Swarupa Jadhav Fattesinh, Sumalata Salian Sudhakar

Research Area: Construction Industry

61. Power Loss Minimization Using Optimal DG Allocation and Sizing in Distribution Systems

Several potential benefits of integrating renewable energy based distributed generation (DG) units to conventional distribution systems have been seen. The power input from renewable DG units placed close to the load centres provide an opportunity for system voltage support, reduction in energy losses and emissions, and reliability improvement. Therefore, the allocation of DG units and their optimal sizing is an important concern. This paper presents a simple approach for real power loss reduction, voltage profile improvement, substation capacity release and is based on voltage sensitivity index analysis. Load flow analysis is done using the forward-backward sweep method. Study carried out on an IEEE-33 bus test system validates the suitability of this proposed method

Published by: Purvi Kapoor, Shashikant

Research Area: Power System

62. Brainwave Controlled Robot

In the world, a number of people are handicapped. Currently, they use different technologies which give physically impaired, the ability to move around. But still there are a number of people who are fully handicapped and paralyzed but their mind still works properly. So our task for those people who are physically handicapped and little disturb from mine site is to help them so that they can move around the world using their mind power. For this, we have to try to design a robot, which is fully automated and controlled using Beta waves (human brain attention) with the help of a Mind wave sensor, which detects brain signal and also uses an Arduino to control the robot.

Published by: Jismy Shibu, Akash .J, Athul Johnny, Felicia Hyacinth Chelat

Research Area: Robotics

63. Discipline of Children: Impact of Different Way

Discipline is the training that makes people willing to obey or more able to control themselves often in the form of rules and punishment if these are broken. Objective of discipline is a goal of helping to develop a child with feeling of security, self confident. Discipline make them competent, caring and responsible member of society and nation.

Published by: Dr. Paras Jain

Research Area: Management

Review Paper

64. Review on Beacon Power Rate N VANET Routing

Vehicular networks have been considered as the key technology of cooperative driving safety applications that can significantly reduce the congestion but it use high number of resources ,in this paper understanding how this parameter vary in research till. environmental impact (e.g., energy consumption and carbon footprint). To increase the efficiency of transportation, it has been suggested to create intelligent transportations systems (ITS) by using advanced and emerging technologies (computers, sensors, wireless communications, etc.) in transportation to save lives, time and energy

Published by: Abhishek Sharma, Kanchan Bala Jaswal

Research Area: VANET

65. Parspective of Development Disparities in Bankura District, West Bengal

Regional disparity is a worldwide phenomenon which exits even in various developed countries. The co-existence of such condition in the developing and less developed nations or a region within a nation is known as regional disparity or regional imbalance. Regional disparity may be total or partial i.e. it may be intra-state or inter- state, it may be intra-district or even it may be intra Block. The district Bankura, is situated in the western part of West Bengal. At present, it is the fourth larger district of the state in respect to its size. The district has 3596,292 populations (2011) which shares 3.94% of the state total population and is characterized with predominance of rural population. Out of the total population of the district, 86.52% live in rural areas and are dependent mostly on agricultural pursuits. Out of 3828 Mouzas, 569 are considered as a backward. The District holds a distinct type of physical characteristics and is described as connecting link between the plains of Bengal on the east and the Chotanagpur plateau on the west. Geographically, the district has been distinguished in terms of its distinct physiographic units. The Western part differs from the eastern part in terms of physical as well as development perspectives. This paper attempts to explore the correlation between the three physiographic divisions and the spatiality of human development by using geo-spatial technologies.

Published by: Tanmoy Dhibor, Dr. Giyasuddin Siddque

Research Area: Development and Disparity

66. Teacher Professional Development

A society has conducted on teacher education institution in Eastern U.P. Descriptive type research has applied in ten institutions of Varanasi region in which 3 from jaunpur,3 from raibareli,2 from Ghajipur and 2 from Chandauli as randomization technique. Observatory schedule has used for data collection and need to collaboration with 1-working together,2-Learning together,3-Improving together and 4-supporting each other.

Published by: Dr. Narendra Kumar Singh

Research Area: Teacher Education

67. Asynchronous Grid Power Transfer Using VFT

Variable frequency transformer (VFT), introduced recently is a flexible asynchronous ac link which is used in power transferal process between asynchronous power system grids. VFT was first installed at Langlois substation, which interconnects the Hydro-Québec (Canada) and New York (USA) systems. The torque of the rotary transformer is externally altered in order to control the direction and magnitude of power transfer. MATLAB Simulink model of VFT is designed, which is used to indicate power transmission between two asynchronous grids and also to control the power flow direction. MATLAB Simulink model of VFT along with its control system is developed and result has been studied thoroughly. Simulation results for different torque and frequency conditions have been discussed. Moving further, power transfer and torque graphical representations are also obtained and results are compared. Thus, the working concept of VFT and its power flow conditions are verified by MATLAB simulation results.

Published by: Ekta Mishra, Ujjwal Utkersh, Hussain Gandhi, Pramod Kumar, Sudipta Dutta

Research Area: Power System

68. Robotic Fire Extinguishing Vehicle with Rocker Bogie Suspension System

Fire safety is the set of practices intended to reduce the destruction caused by fire. Fire safety measures include those that are intended to prevent ignition of an uncontrolled fire and those that are used to limit the development and effects of a fire after it starts. The robotic fire extinguishing vehicle can be used as a vehicle which can extinguish the fire in a fire hazard zone. The advantage of using this vehicle is that it didn't need the direct presence of the fireman at the fire zone. Instead, this vehicle can be controlled by a user with the help of a laptop. These vehicles can be classified under AGV as the vehicle movements are purely automatic. The rocker-bogie suspension we are using is an another positive factor as this will help the vehicle to move easily over the obstructions in their path. The vehicle can be contained with sensors which help them in detecting the intensity of temperature in the zone and also the PIR sensors used will help them to detect the human presence inside the zone. Special cameras used will help them in having a view of the surroundings through which they move.

Published by: Vishnu .V, Albin Sani, Alen Paul, Savio Mathew, Febin Davis, Rahul P. K, Nithin Rajan

Research Area: Fire and Safety

69. Ac-Dc Optimal power flow Based nodal pricing in deregulated power system

In This Paper an AC-DC Optimal power flow based nodal pricing methodology is presented. The active and reactive power generated and purchased at each bus is calculated by using OPF. Also, nodal prices can be obtained by using OPF. Here the nodal prices are important because they reflect the marginal generation and load at each bus. In general, these prices are also known as locational marginal Prices and spot prices. In this paper, for the load flow analysis, a well-known Newton-Raphson method is used and is modified to achieve compatibility for a.c.-d.c. systems with integrated d.c. links in the a.c. network. This Paper use the MATLAB Software to determine the OPF based Nodal pricing scheme without violating system constraints. This approach has been demonstrated by simulating the study with IEEE30 bus system and conclusions are drawn.

Published by: Juily N. Sukalkar, Dr. Sanjay B. Warkad

Research Area: Nodal Pricing

70. Smart Surveillance Analysis System Using Hadoop

Security and time play very important role in everyone's life. So it is required to develop a system which will make an individual feel protected. In case if any changes are detected then it can be analyzed in a minimum time. Up to some extent, environmental changes are also detected. The first task of multi-camera surveillance is Automation object detection analysis. Changes in the CCTV recording are detected using OpenCV and they are represented by using particular colors. On single machine it will take ample of time to analyze the CCTV video recording, this drawback is overcome by using Hadoop. Hadoop has a feature of centralized server processing and distributed processing. The analysis is done using algorithms. Color histogram, Mean square difference and SSIM index are the algorithms used for frame comparison. An algorithm with the accurate result is preferred. Experimental results show a reduction in analysis time.

Published by: Deepali Babanrao Maske, Mrs. Mehzabin Shaikh, Ketki Keskar, Nikita Chavan, Priyanka Mahangare

Research Area: Image Processing

71. Language Proficiency of English among +2 students in relation to their Locality and Stream of Study

The study compares the Language Proficiency of English among +2 Students of Shimla district in relation to their Locality and Stream of Study. A Sample of 600 students was selected randomly from the Shimla district of Himachal Pradesh. For comparing the data 2X2X2 ANOVA statistics technique was used. The result revealed that significant differences existed among rural and urban science and arts stream of English and Hindi medium students

Published by: Nidhi Mahindroo

Research Area: Education

72. The Experimental Investigation and Analysis of Spot Welding Process Parameters for Maximum Tensile Strength

This experimental study is based on an investigation of the effect of welding parameters on tensile shear strength in the resistance spot welding (RSW) process and optimization of welding parameters. The experiment conducted under varying parameters like forces, currents and weld times without disturbing water flow and room temperature. The setting of welding parameters was determined by using Taguchi experimental design of L9 orthogonal array method. The combination of the optimum welding parameters have determined by using analysis of Signal- to- Noise (S/N) rario. The experimental result clearly shows that it is possible to increase tensile shear strength of a joint by the combination of suitable welding parameters. Hence the experimental result proved the validity of the used taguchi method for enhancing the welding strength performance and optimizing the most suitable welding parameters in resistance spot welding operations.

Published by: Saiyed Faiyaz, Mrs. J. G. Borke

Research Area: Mechanical Engineering

73. Digitization: A Paradigm Shift of Agriculture

The Indian Agricultural sector provides employment to about 65% of the labour force, accounts for 27% of GDP, contributes 21% of total exports, and raw materials to several industries. Researchers show that 68% of the entire population of India is covered by the rural area and 58% of people depend on agriculture as their main source of livelihood. The fast Growing Population demands 50% of an increase in the production of the food to feed all. At the same time, the traditional inefficient practices, water scarcity for irrigation, less productive lands, double cropping, lack of crop rotation, lack of time for soil recreation are putting pressure on fertility and yields followed by the exploitation of the middlemen preventing the farmers from getting the best price for their products. Under such circumstances, the concept of Digitization of Agricultural Sector becomes more vital. There is a necessity of empowering the rural community by creating digital Infrastructure, providing various digital services, and Promoting digital literacy. Digitization in Agriculture can be defined as ICT and data ecosystems to support the development and delivery of timely, targeted information and services to make farming profitable and sustainable. The distinct vision of our Prime Minister assures regarding several initiatives taken to provide “Protective shield” to the farmers to increase production, Improve storage and connectivity with the consumers for better supply and profit. This paper intends to explore the initiatives taken by Government for providing Digital Infrastructure such as Automation, agricultural robots, smart sensors and decision support systems to the farmers and also to study about how it would result in improving the income of the farmers. It mainly focuses on the three areas that encompass Digital Agriculture i.e- Data Intelligence, Smart Analysis, and Communication.

Published by: Prof. Sonali Ganguly, Sujeet Prakash Patra

Research Area: Indian Agriculture and Technology

74. A Virtual Cloud Computing Provider for Mobile Devices

Mobile devices such as smart phones and tablets have become an essential part of our lives, because of their powerful capabilities Along with the explosive growth of the mobile applications and up-raising cloud computing concept, mobile cloud computing appears to be a new potential technology for mobile services. Mobile cloud computing maps cloud computing ideas and overcomes obstacles that deal with performance such as battery life, CPU, storage, bandwidth, environment that means heterogeneity, scalability, availability and security discussed in mobile computing. To solve these problems by accessing cloud computing platforms. To access these platforms is not always guaranteed to be available and is too expensive to access them.To overcome this issue by creating a virtual cloud computing platform using mobile phones.

Published by: Dhanya .K, Prof. Preethi .S

Research Area: Cloud Computing

75. A Novel Method for Solar Energy Harvesting Method Based On Optimization

Renewable power production can help countries to meet their sustainable development goals through provision of access to clean, reliable, secure, and affordable energy. A number of wind, hydropower and solar photovoltaic capacity power projects were installed worldwide every year in a renewable energy market having capacity more than a hundred billion USD annually. In recent years, an impressive reduction is being seen in renewable energy Portability improvement of technological devices has not been followed by energy accessibility of its batteries. Taking into account the low power consumption parameter of a variety of portable devices, the concept of energy harvesting from environmental sources and human body has gained a new significance. In the search of methods and materials that go with this need, are the energy generated methods from the piezoelectricity, thermoelectricity and electromagnetism. This research gives the ways and future trend of energy harvesting methods, as well as its mechanisms in portable medical devices with low power consumption. In this research, we will focus on energy harvesting. Total illumination is calculated against the total time of harvesting. The experiment has been carried out in an environment which contains some consuming units with total number of rooms. The width and height of the room are considered to be identical i.e. 100×100 having harvesting time of 10 hr. There are three environment in which experiment has been done these are • Sunny • Cloudy • Dark and other type. Total illumination is calculated with and without optimization. ABC (Artificial Bee colony) algorithm is used for the optimization and the results obtained are compared with the without optimization results.

Published by: Sunita Rani, Shavet Sharma

Research Area: Electrical Engineering

Review Paper

76. Review on Cognitive Spectrum Sensing By Met Heuristics

cognitive radio is widely expected to be the next Big Bang in wireless communications. Spectrum sensing, that is, detecting the presence of the primary users in a licensed spectrum, is a fundamental problem for cognitive radio. As a result, spectrum sensing has reborn as a very active research area in recent years despite its long history. In this paper, spectrum sensing techniques from the optimal likelihood ratio test to energy detection matched filtering detection, cycle stationary detection, eigenvalue-based sensing, joint space-time sensing, and robust sensing methods are reviewed. Cooperative spectrum sensing with multiple receivers is also discussed. Special attention is paid to sensing methods that need little prior information on the source signal and the propagation channel. Practical challenges such as noise power uncertainty are discussed and possible solutions are provided. Theoretical analysis of the test statistic distribution and threshold setting is also investigated. Spectrum sensing problem has gained new aspects with cognitive radio and opportunistic spectrum access concepts. It is one of the most challenging issues in cognitive radio systems. In this paper, a survey of spectrum sensing methodologies for cognitive radio is presented. Various aspects of the spectrum sensing problem are studied from a cognitive radio perspective and multi-dimensional spectrum sensing concept is introduced. Challenges associated with spectrum sensing.

Published by: Rahul Kumar, Kanchan Bala Jaswal

Research Area: Communication

77. Modelling and Control System Design for Electro Magnetic Suspension System

when any vehicle runs on the road, it is subjected to bump and potholes which result in vibration that affects the passenger comfort and vehicle handling. The suspension system is an assembly of tires, springs, shock absorbers and linkages that connect a vehicle to its wheels and is used to absorb and damp-out the road shocks. In designing of suspension, it is characterized by the suspension which has low spring stiffness, low damping rate which results in large suspension travel, while suspension having high damping rate is good for better handling that results in small suspension travel. These two contradictory needs the requirement of suspension with varying damping rate. This paper describes the design and simulation of the magnetic suspension system for the quarter car. Here in the designed suspension system, the damping value can be varied by changing the electric current supply in the electromagnet. Basically, this system works on Levitation technology, in which pre-defined air gap is maintained due to magnetic repulsion. Here two types of the controller are designed that is look-up table and fuzzy rules to maintain the predefined air gap. Here, when the bump comes, the air-gap fluctuation is sensed by the air sensor and this changed value of gap send to the controller and with respect to this air-gap value the current value from the look-up table or from fuzzy is decided by the controller and sends to voltage amplifier. Voltage amplifier should send that much current toward the electromagnet to vary the repulsion force which results in maintaining the predefined required air gap. Both Look-up tables and fuzzy rules are compared and validate the results.

Published by: Y. Yojana Reddy

Research Area: Mechatronics

78. Segmentation of Breast Images Using Gaussian Mixture Models

Breast cancer originates when cells grow uncontrollably in the breast resulting into a tumour that can be felt as a lump or observed on x-ray. The tumour is malignant that is cancerous if the cells invade surrounding tissues or spread to distant areas of the body. Breast Cancer can be observed both in women as well as men. Image processing aims at divide one picture into different types of classes or regions, recognition of objects and detecting of edges, etc that is done after the image is segmented. The main aim of this paper is to detect and separate background and foreground by using Gaussians Mixture Model, the parameters of the model and training data are learned by EM-algorithm. Pixel labelling corresponding to each pixel of true image is done by Bayesian rule. This hi labelled image is constructed during of running EM-algorithm.Numerical method of finding maximum a posterior estimation is done by using EM-algorithm and Gaussians mixture model which we called EM-MAP algorithm.

Published by: Miss. Ankita Satyendra Singh, Prof. M. M. Pawar

Research Area: Image Processing

79. Performance Comparison of AODV and DYMO Routing Protocols for Boundary Detection in 3-D Wireless Sensor Networks

In order to track and detect continuous nature objects in wireless sensor networks, a large number of sensor nodes are involved. These continuous objects like biochemical diffusions, forest fires, oil spills usually spread over larger area. The nodes that sense the phenomena need to communicate with each other for exchanging the information and also send sensing information to sink, possibly by passing through many intermediate nodes. For many geometry based algorithms triangulation serves as the basis for wireless sensor networks. In this paper, we propose a distributed algorithm that produces a Delaunay triangulation for an arbitrary sensor network, for communication between the sensor nodes. The information of occurrence of an event is then passed to a control node. The communication is done both with and without using relay nodes and a comparison is made between the two methods in terms of battery, total unicast messages received, throughput and delay. The two protocols in which we have worked are AODV and DYMO.

Published by: Aditi Pandey, Ranjana Thalore

Research Area: Wireless Sensor Networks

80. Image Transfer Learning For Image Classification of Flowers Using Tensor Flow

Human Being can process images easily. It’s very easy for us to distinguish between various objects that we come across in our daily life. These tasks which are quite rudimentary for the human brain tend to be very hard problems when the computers are involved in solving the problem. The image recognition is easy to us because we have been trained to recognize the objects through their images since infancy. Machine Learning fields over the last few years have made exceptional progress in this field. But training the computer for the same thing requires a lot of time and effort. This is where Transfer Learning comes into play. We will be using transfer learning on the basic TensorFlow library to train our module on Oxford 17 VGG and Oxford 102 VGG flower data sets. We have majorly used Google’s Inception v3 model and applied it on Oxford data set to categorize flowers. This gave an overall accuracy of 94.8%.

Published by: Ujjwal Rangarh, Tanmay Trehan, Shalini .L

Research Area: Machine Learning

81. Performance Comparison of AODV and DYMO Routing Protocols, for Congestion Detection in VANET

Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). VANET’s provide communication between vehicles moving on the roads. Congestion detection and control in VANET is essential and necessary for smart ITS in order to avert an accident. Special considerations are required to develop more sophisticated techniques to avoid and detect congestion. The constrained resources of the Wireless Sensor Networks (WSN) must be considered while devising such technique to achieve the maximum throughput. In this paper we have implemented congestion detection in a collision avoidance scenario in two routing protocols, AODV and DYMO, on the basis of sent and received beacons and packets dropped while nodes communicate with each other or the Base Stations. This paper also discusses and compares the advantages/disadvantages of AODV and DYMO based on battery usage, energy used in transmit mode, throughput, message received and sent. The various ways of congestion control are further discussed.

Published by: Rajashree Dutta, Ranjana Thalore

Research Area: Wireless Sensor Networks

82. Prediction of Movie Success for Real World Movie Data Sets

Predicting the success of a movie before its release has far been a huge point of concern for directors and producers alike, especially after they factor in real world data and the occurrence of unforeseen circumstances. Since these entities invest massively in movies, they need some kind of reassurance that the movie will be successful and reap in massive profit in terms of financial returns and credibility. In this paper, we talk about a prediction engine we have implemented that uses classification and fuzzy logic to categorize a movie as successful or not as well as used our own algorithm to calculate a target variable which is the IMDB score of a movie based on various parameters. Our engine has proved to be successful from the technical unit testing performed on it with the use of multiple iterations of input values.

Published by: Abhisht Joshi, Sanjai Pramod, Geetha Mary .A

Research Area: Data Mining

83. Effect of BG-II Cotton Hybrids and Non Bt Cotton on Weight of Different Instars of Spodoptera Litura (Fab.)

Laboratory evaluation of eleven Bt cotton cultivars expressing both Cry1Ac and Cry2Ab endotoxins (BT-II) and non Bt cotton on weight of first, second, third and fourth instar larvae of Spodoptera litura. Different plant parts were used i.e. leaves, squares and bolls at 60, 75, 90 and 125 days after sowing of the crop for bioassay. First instar larvae fed on leaves and bolls shows hundred per cent mortality. The final weight of the each instar was reduced at seven days after feeding when compared to non Bt cotton. Reduced in weight was more in case of first, second and third instar than fourth instar larvae. Among leaves, squares and bolls reduction in weight of all four instars was more on leaves followed by squares and bolls

Published by: Ramanjali Thirri, T. V. K Singh

Research Area: Agriculture

84. Campus Connect : Advanced QR based Identity Card

Educational institution in developing countries is a vast sector and it is expanding rapidly. With the rapid growth of technologies, educational institutions are still lagging behind. For identification of students they still lie on manual handwritten ID card and files. If proper ID card system is introduced then it would be much easier to identify a student and can track his/her progress. Therefore, in this research we implemented advanced using of QR code and student ID generation. We tried level best to make right implementation of QR code with student ID card. Automated student ID had image capturing facility and requirements of an ID and there is no need of hand written ID card. QR code is attached into ID card and student personal details can be found by scanning the QR code with smart phones (downloaded & installed QR reader software). QR code is said to be the next generation of bar code and using QR code with ID card brought positive outcomes. While using software tools, identity cards works fine and suitable for an educational institution as it is free. Thus, ID card will be a perfect use of modern technology in developing countries.

Published by: Muthuraj, Nagashayan, Thejaswi G. N, Rahulkumar Solanki

Research Area: QR code

85. Cryptography- A Fundamental Tool for Directions of Research Process-An Overview

In Today’s, Digital communications Era sharing of information is increasing significantly. The Information being transmitted is vulnerable to various passive and active attacks. Therefore the information security is one of the most challenging aspects of communication. Cryptography plays an integral role in secure communication and it provides an excellent solution to offer the necessary protection against the Data Intruders. Over a period of time, Data encryption techniques took a massive leap from simple methods too complicated mathematical circulations. In order to achieve secure communications, however still with its complexity erypgraphic algorithms are prone to one or many attacks. Therefore this paper presents a detailed study about the Directions of safety, protection that leads to the Research process. The various symmetric key encryption techniques, its comparison, and the attacks to which they are vulnerable to.

Published by: Dr. V. Venkateswara Rao

Research Area: Cryptography

86. Implementation of an Efficient and Robotically Operated Home Automation System Using the Robustness of IOT

With the advancement of Automation technology, life is obtaining less complicated and easier in all aspects. In today’s world, Automatic systems are being most well-liked over the manual system. With the speedy increase within the variety of users of the web over the past decade has created the web a region and parcel of life, and IoT is that the latest and rising web technology. Internet of things may be a growing network of the everyday object-from industrial machine to the commodity which will share data and complete tasks whereas you're busy with alternative activities. Wireless Home Automation system (WHAS) victimization IoT may be a system that uses computers or mobile devices to regulate basic home functions and options mechanically through the web from anyplace round the world, an automatic house is generally referred to as a sensible home. It’s meant to avoid wasting the electrical power and human energy. The house automation system differs from the alternative system by permitting the user to work the system from anyplace round the world through web affiliation. In this paper, we have a tendency to gift a Home Automation system (HAS) victimization raspberry pi that employs the combination of cloud networking, wireless communication, to produce the user with remote of varied lights, fans, and appliances within their home and storing the info within the cloud. The systems can mechanically amendment on the premise of sensors’ information. This technique is meant to be low value and expandable permitting a spread of devices to be controlled.

Published by: Muthubharathi .R, Vigneshkumar .B, Durgalakshmi .K

Research Area: Wireless Sensor Network

87. A New Hybrid Approach on Face Detection and Recognition

Face detection and recognition is an important paradigm when we consider the biometric based systems. Among various biometric elements, the face is the most reliable one and can be easily observed even from a distance as compared to iris or fingerprint which needs to be closely observed to use them for any kind of detection and recognition. Challenges faced by face detection algorithms often involve the presence of facial features such as beards, mustaches, and glasses, facial expressions, and occlusion of faces like surprised or crying. Another problem is illumination and poor lighting conditions such as in video surveillance cameras image quality and size of an image as in passport control or visa control. Complex backgrounds also make it extremely hard to detect faces. In this research work, a number of methods and research paradigms pertaining to face detection and recognition is studied at length and evaluate various face detection and recognition methods, provide a complete solution for image-based face detection and recognition with higher accuracy, a better response rate as an initial step for video surveillance.

Published by: Saloni Dwivedi, Nitika Gupta

Research Area: Face Detection

Review Paper

88. Review of Approaches Under Water Image Enhancement

Because of the poor perceivability conditions nature of the world's seas is as yet not very much investigated for this reason Underwater picture improvement procedures are utilized, on the grounds that the earth is a sea-going planet and as the reality around 70%of its surface is secured by water. Presently a days there is a solid enthusiasm for recognizing what lies in submerged, and besides, this field has made a significance to the utilization of submerged successions to screen marine species, Underwater mountains and plants, to accomplish this reason it is totally important to utilize the unmistakable pictures. Here additionally talked about the impacts of shading in submerged pictures. Regarding light reflection, portrays that the impression of the light differs enormously relying upon the structure of the ocean. Another worry is identified with the water that twists the light either to make crease designs or to diffuse. In particular, the nature of the water controls and impacts the separating properties of the water, for example, sprinkle of the clean in water . Perceivability reclamation alludes to various strategies that expect to lessen or expel the decay or corruption that have happened while the computerized picture was being gotten

Published by: Karamjit Kaur, Rajnish Kansal

Research Area: Image Processing

89. System to Detect Human Being Buried under the Rubble During Disaster

Death of lots of people occurs as a cause of earthquake. Such news comes in newspaper after the unavoidable casualty. Because of this, unlimited numbers of people die. It occurs as a result of disasters such as tunnel dropping, snowfall and fall of landslides. The effect of fall of landslides occurs in June 2013, due to heavy rain came in Uttarakhand. Such worst incident happened in 2013, because of this, lost precious lives. When many people are buried under rubble during disaster, at that situation the most important question come in mind that how to enter the area using rescue teams .The microwave life detection system is developed to detect subject or object buried under the rubble of collapsed building during the earthquake or other disasters. The object or subject includes human being/ victims. The proposed motion detection system uses microwave frequency electromagnetic signal which is able to detect motion of moving object. This system decides whether the object is in motion or not. The Doppler frequency shift of the wave is the operational principle of motion detection system. The motion detection system uses microwave doppler radar sensor sense these waves reflected back from the object if object is in motion and present below the ground level. Once the motion is detect, then able to decide whether the object is human being or not. Then system using microwave test bench is used to decide whether the object is human being or not. Also, system operate using microwave test bench used to detect the breathing and heartbeat signals of subject. The matlab simulink model show heartbeat and breathing signal. By using all these system, able to decrease world death rate to greater extent.

Published by: Apurva S. Ubhale, Prof. P. N. Pusdekar

Research Area: EXTC

90. Optimization of Resistance Spot Welding Parameters Using Taguchi Method

Resistance spot welding (RSW) is a major sheet metal joining process in many industries, such as the automobile, domestic appliances, and space craft fabrication. It is one of the oldest of the electric welding processes in use by industry today. Furthermore, other metal-to-metal connections, such as wire-to-wire joints in the electronics industry, are accomplished by resistance spot welding. Application-specific measures, such as the diameter of the welding spot, define the quality of the joint. The weld is made by a combination of heat, pressure, and time parameters. As the name implies, it uses the resistance of the materials to the flow of electric current that causes a localized heating in the parts to be joined. Understanding of physical mechanisms for easily manipulating and controlling weld qualities in advance is extremely important. This paper represents the optimization of various parameters of resistance spot welding. The experimental studies have been conducted under varying pressure, welding current, pressure, and welding time parameters. In this investigation the quality characteristic (tensile strength and nugget diameter) parameters have been considered using Taguchi Method. The experimental studies have been carried out by varying welding currents, welding pressure and weld times for joining two sheets. The results of the investigation indicate the welding current to be the most significant parameter controlling the weld tensile strength as well as the nugget diameter. The contribution of welding current, holding time and pressure to tensile strength are 61%, 29%, 4% respectively and the contribution of these parameters to nugget diameter are 81%, 1.7%, 17% respectively. Relationship graphs have been plotted between tensile strength and nugget diameter with parametric variations according to orthogonal array.

Published by: Shailesh Kumar Vshwakarma, Anurag Shrivastava, Sharmistha Singh

Research Area: Production Engineering

91. Reducing the Computational Complexity Of A 2d Gaussian Filter for Image Processing (An Overview)

The 2D Gaussian filter is one of the very useful techniques in image processing, this technique is very useful especially in image smoothing. Basically, the implementation of 2D Gaussian filter needs heavy computational resources, When this type of technique comes down to real time applications, efficiency in the implementation is vital. An obstacle for this is floating-point math representation, as it requires a heavy amount of computational power to achieve real-time image processing. On the other hand, a fixed-point approach is more satisfactory. By using fixed-point arithmetic, we increase the speed as well as efficiency in many ways. We also reduce the area of hardware by reducing the LUTs.

Published by: Deepak Raj, Dr. Poonam Singal

Research Area: Image Processing

92. Statistical Analysis of Polypropylene Fiber Reinforced Concrete

The capability of durable structure to resist weathering action and other degradation processes during its service life with the minimal maintenance is equally important as the capacity of a structure to resist the loads applied on it. Although concrete offers many advantages regarding mechanical characteristics, the brittle behaviour of the material remains a larger handicap for the seismic and other applications where flexible behaviour is essentially required. Reinforcement with randomly distributed short fibers presents an effective approach to the stabilization of the crack and improving the ductility and tensile strength of concrete. PolyPropylene(PP) fiber reinforcement is considered to be an effective method for improving the shrinkage cracking characteristics, toughness, and impact resistance of concrete materials. In the present study, we are carrying out the statistical analysis of PolyPropylene fiber reinforced concrete by comparing various properties such as compressive strength, tensile strength, workability properties with various content of fiber (0%,0.5%,1% and 1.5%).

Published by: Ch. Saketh, J. Manikanta Patel, M. Rajesh, G Sadanand, M. Manoj

Research Area: Civil Engineering

93. Calories and Nutrition Measurement from the Image of Food

Obesity is the major cause of overweight this leads to the type II diabetes, heart disease, and cancer.Measuring the food is very important for a successful healthy diet. Measuring calorie and nutrition in daily food is one of the challenge methods. Smartphone plays a vital role in today’s technological world using this technique will enhance the issue in intake of dietary consumption.In this project, a food image recognition system for measuring the calorie and nutrition values was developed. After taking the food image the color, shape, size and texture features are extracted and it is given to the K-nearest neighbor (KNN) for recognizing the food and then the calorie value is measured with the help of nutrition table.

Published by: CH. Kavya, R. Priyadarsini, B. Madhavi

Research Area: Image Video Processing

94. A Hop To Hop Energy Efficient Transmission for WBAN (Wireless Body Area Network)

It is a familiar fact that conservation and preservation of network energy is one of the primary objectives of the sensor nodes in a wireless sensor network. This becomes even more important when we are talking about Wireless Body Area Network (WBAN). In this case, the sensor nodes are working either very close to or inside a human body. Hence performance is a very important task here. In this project we aim to reduce the consumption of energy while a transmission is made. We tend to strategically toggle between working/non-working status of a sensor node while it is being involved or not involved in the transmission process. This was, we are able to increase the network time by a very good amount. Other deceptive parameters are also to be calculated. With the advancement in technology, we now have access to wearable physiological monitoring system. In this concept, an individual will wear a fabric in which a collection of sensors will be embedded. All these sensors will be connected to a central monitoring system. Sensors will continuously send data to these central monitoring systems. Hence, wireless sensors are now being used as wearable gadgets. But the limitation here is that they have very limited amount of energy. And when it comes in medical terms, every fault in an instrument can be a factor in determining the cause of a healthy life or an unnoticed illness. Hence, it becomes very important to work on these sensors and give them a long lifetime so that their monitoring does not get affected. There are many ways we can achieve this. Good amount of research has been done in this domain. We here are working on an algorithm in which a sensor node will be strategically switched on and off based upon its usage. This way, only the appropriate amount of energy will be used by the sensor and overall energy of the complete system or network will be preserved on a larger extent.

Published by: Er. Pinki Rani, Er. Rajnish Kansal

Research Area: Wireless Networking

95. A Study on Working Capital Management in Apgenco Ltd., Muddanoor, Kadapa(D)

Working capital management plays a significant role in better performance of business entities. This study analyzes the influence of working capital management on RTPP Ltd. The manufacturing firms are in general facing problems with their collection and payment policies. Moreover, the financial leverage, ratio of current asset to current liability and firm size also have significant effect on the firm’s profitability. The effective policies must be formulated for the individual components of working capital. Furthermore, efficient management and financing of working capital (current assets and current liabilities) can increase the operating profitability of manufacturing firms. For efficient working capital management, specialized persons in the fields of finance should be hired by the firms for expert advice on working capital management in the production sector.

Published by: B. Sathesh Naik

Research Area: Working Capital Management

96. A Review on Recognition of Indian Handwritten Numerals

This paper presents a detailed review of various handwritten numeral recognition of various Indian languages. Character recognition is a field of pattern recognition which is in active research for the past few decades for its vast fields of application and still remains a challenging topic for research. Handwritting recognition is one the applications of Character Recognition. Various hand writing recognition for Indian languages has been under research in the past few years. The major challenges with handwritten character recognition is that the non-uniformity in the writing style of character, different styles of writing the same character, smoothness of the curves of the character and similarity between two characters. Several techniques have been developed to recognize Indian Numerals and have varying recognition rate. Some of the techniques are discussed below.

Published by: Geetika Mathur, Suneetha Rikhari

Research Area: Image Processing

97. Analyzing the Performance of BER and SER in an Equilized OFDM System over AWGN by Using 16, 64, 128, 256 QAM Modulation

For wireless communications system, Orthogonal Frequency Division Multiplexing (OFDM) is a widely applied technique. This system also enables simple filtration or equalization by cyclic prefix insertion. The sensitivity of single-carrier systems to carrier frequency offset (CFO) is much lesser than that of OFDM systems. In present OFDM standards, such as IEEE802.11a/g or DVB-T, preamble (or pilots) is used to estimate and compensate the carrier frequency offset (CFO) and channel impulse response. There is a considerable problem i.e. the residual carrier frequency offset still destroys the orthogonality of the received OFDM signals after the CFO estimation and compensation. This situation further worsens the bit error rate of OFDM systems during the equalization process. In this research work, an equalized OFDM system over AWGN noise by using 16, 64, 128 and 256 QAM is designed. The designed system is modified by using QAM mapping at transmitter and receiver ends. Also, normalization of transmission bits and de-normalization of received bits is done for decreasing BER and SER. Performance analysis of designed OFDM architecture with ZF equalization is performed by using four efficient modulation indexes (16, 64, 128 and 256) with M-QAM modulation. Whole analysis is implemented over OFDM model with AWGN noise. Here the OFDM architecture is used to reduce noise (can be inter-symbol interference) which is the most important loss or attenuation in optical signals, thus mapping and equalization (filtering) is performed. After implementation of proposed method, we have evaluated the performance of the same by using Symbol Error Rate (SER) and Bit Error Rate (BER). These parameters are calculated and plotted with respect to input SNR. MATLAB R2013a has been used as an implementation platform using generalized MATLAB toolbox and wireless communication tool box.

Published by: Vandana Chhoker, Hitesh Taluja

Research Area: Wireless Communication

98. Typology of Retractable Roof Structure

Retractable roof structure is mostly used in a stadium and sports complex. Roof is helped to protect structure from various climatic conditions, it provides maximum circumstances to facilitates various activities. Which are designed with stadium and sports hall. Retractable roof structure gives quality atmosphere as well as remembrabal experience to the visitors. Retractable roof structure is the best structure which permits sunlight and ventilation. It gives required atmosphere to the ground. Retractable roof structure which can be fold level by level, the folding feature of retractable roof structure enhance the effectiveness and efficiency of whole structure. Now, we research different system and identity characteristics of retractable roof structure and it can be moving system or folding structure.

Published by: Saloni Patidar, Vikas Gandhe

Research Area: Structure

99. Server Initiated Model for Location Aware Web Application using Binary Search Tree

Location-based and Location-aware Services and systems are an integral part of a modern era of smartphones, faster internet, and all time connectivity. The usage of location awareness of a user and to accordingly provide him the necessary services is the core of the services based on mobile and desktop applications. In the push model, subscribers register spatio-textual subscriptions to catch their interests, and publishers post spatio-textual information or messages. This requires the location aware publishing of relevant notification and messages to the user. Such location aware publish services can be user initiated where a user types certain keywords to search for certain things around his area or can be server-initiated push model, where the messages and notifications are pushed directly by a server based on location and interest of users. In this research work, a novel searching algorithm based on binary search tree method has been proposed for location-aware server initiated model. To showcase the idea a small web application has been developed which asks users to allow location access and based on that the relevant shopping offers are displayed to the user. This helps the retail shops to regularly update their offers to attract more customers increasing their footfall and sales.

Published by: Shraddha Tiwari, Dr. Pankaj Kumar, Dr. Raj Gaurang Tewari

Research Area: Computer Science and Engineering

100. E-commerce Testing Framework

E-commerce applications are being built at a rapid pace with the increase in demand of business to be always online. Many of the small shops popularly known as “kirana” shops are going online in our locality to meet the demands of customer. They basically need an online presence, a product catalogue and payment gateway as the minimum requisites. The high demand of such applications and ease of technology has led to the emergence of several small and medium scale software development companies and freelance developers who can develop such applications at very minimal cost. However, the quality of such applications is compromised in various aspects. Software Testing is one such aspect. With very low costs involved the Testing phase for such applications is altogether skipped by the developers as they couldn’t afford the expensive testing tools available for these applications and rely on mostly manual testing. In this research work, this particular problem has been undertaken and a framework has been proposed which gives the developers an automated testing suite which they can use by paying very low cost. A small application with some common testing attribute related to a typical e-commerce application has also been developed to better understand the concept. It is realized that if sufficient research is put in this framework can surely provide a breakthrough in ecommerce application testing.

Published by: Ramsha Fatima, Upasana Dugal

Research Area: Software Testing

101. Energy Optimization and Variation of Cooling Load of Multistory Building at Same Latitude of Location with Different Degree of Rotation

Now a day energy is a fundamental need of everyone and saving of energy is main aim of an engineer. So more practical emphasis work should be carried out on main two approaches, to save the energy and keep the environment clean and human comfort is also a fundamental need in the present scenario. In this research work we are dealing with change in load due to the different orientation of a multistory building at same latitude of the location. For our analysis purpose we are considering Mechanical Department building of MGITER (latitude- 20.9079oN) which is situated at Navsari in Gujarat as a case study. From this research work we have concluded that the building at 0o is the optimal condition as per the orientation which saves about 3-4% economically from the other orientation

Published by: Fultariya Jay .J, Mandal Niraj .S, Kalapurackal Swapnil .E, Desai Hemal .A

Research Area: Energy Optimization

Review Paper

102. Analysis and Optimization of Fixture for the Welding Of Automotive and Non-Automotive Components

The present work consists of welding fixtures which are designed for the components which are difficult to weld in normal way or without any holding unit. Researching the possibilities for fixture design optimization has been in the sphere of interest of a number of authors worldwide for a longer period. Fixture design process and fixture design technique with conventional methods have been obsolete. This paper presents a review of fixture design analysis and optimization in terms of fixture layout, clamping position and part deformation. In any given manufacturing industry lots of non-standard unit or components required to complete the given fixture. These non-standard unit are adding to the design cost and time, and also libraries for non-standard parts cannot be made which gives no other option than to redesign the given part or unit. These non-standard parts are required in all types of industries, like BIW, heavy, construction machinery, aerospace and rail. In this paper optimisation of this non-standard unit will be done.

Published by: Sneha Kailas Ubale, Sachin V. Lomte, Ajit Kshirsagar

Research Area: Mechanical Engineering

103. Online Secure Payment System Using Shared Images

As a quick growth in online shopping is seen in recent time throughout the world. By increase in online shopping, many type of frauds like phishing, credit or debit card fraud are takes place. For the security of customer this paper has presents a new approach for providing limited information only that is necessary for fund transfer during online shopping there by safeguarding users data and increasing users confidence and preventing identity theft. The method uses combined application of stegnography and visual cryptography for this purpose

Published by: Bhupendra Singh, Prof. Monali Deshmuk, Zawed Ansari, Akshit Pandita

Research Area: Information Technology

104. Development of Speed- Flow Curve for Arterial Road

Increasing vehicular growth requires adequate transportation facilities. For designing any road facility speed-flow relation is essential to get required designing speed. As urban roads carries different types of vehicles having different dimensions, shape, speed etc. Two arterial roads of Jamnagar city are selected for data collection. Traffic composition affects traffic flow parameters. In this paper speed-flow curves are plotted using collected field data from peak and non-peak hour. Space mean speed and classified volume counts are used for speed-flow relation.

Published by: Mayank Kanani, R. G Motwani, H. K Dave

Research Area: Transportation Engineering

Review Paper

105. Review on Detection of Hypoglycaemia by Machine Learning Approach

The doctor concluded related to an indication that someone has the potential against diabetes mellitus (DM) the architecture of the proposed method is designed. With the data obtained from the authorities in the laboratory, the model has been adjusted. Split points and using the Gina index the best split points are identified in this paper. By identifying false split points to minimize the calculation of Gini indices a method is proposed and Gaussian fuzzy function is used because the clinical data sets are not crisp,In this paper review the different method of diabetes classification

Published by: Sannia, Shehnaz, Abhishek Bhardwaj

Research Area: Machine Learning

106. Effect of Plastic Grocery Bags on Environment and Its Reuse

Plastic, one of the most preferred materials in today's industrial world is posing serious threat to environment and consumer's health in many direct and indirect ways.

Published by: Mr. Yakub Ansari, Prof. F. I Chavan, Prof. M. Husain

Research Area: Civil Engineering (Environment)

107. Replace of Asphalt with Waste Polythene in Bitumen Road

In India consumption of Plastic is 15 million tons up to 2015 and is set to be the third largest consumer of plastics in the world. India is a top 20 number country that dump maximum plastic in the ocean. As per a survey conducted by Central Pollution Control Board (CPCB) in 60 cities of the country the quantum of plastic waste generation is estimated to be 15,342.6 tons per day. Plastic is a non-biodegradable material and researchers found that the material can remain on earth for 4500 years without degradation

Published by: Mr. Yakub Ansari, Prof. F. I Chavan, Prof. M. Husain, Prof. Vajed Shaikh

Research Area: Civil Engineering (Environment)

Research Paper

108. A Novel Technique to Remove Duplicacy of Files and Encrypt the Data Files Symmetrically In Cloud Environment

With the help of cloud computing users are allowed to store, retrieve and share their data from anywhere. Cloud computing provides sharing of hardware, software and infrastructural storage to different users at a time. Encryption of cloud is a need of new technology because clouds have data of different clients so encryption on cloud is essential for data security but cloud computation is also important so to reduce duplicacy is one more parameter , which is reduce by digest in this paper and encryption with the help of AES and blowfish.

Published by: Sandeep Kaur

Research Area: Cloud Security

109. Tumor and Edema Segmentation Using Efficient MFCM and MRG Algorithm

Momentarily, categorizing of brain tumor and segmentation is truly an exciting task in MRI. Numerous researches work in generating divergent plus interesting techniques and algorithms for this specified work of medical image processing. On behalf of enhancing a precise brain tumor extraction, we provide an effective methodology for both classification and segmentation i.e., separation of brain MRI images as well as labeling of brain MRI images in terms of edema, tumor, white matter (WM),gray matter (GM) plus cerebrospinal fluid (CSF). At this instant and in our recommended system of brain tumor detection encompasses six segments, i.e. pre-processing, filtering, Image registration, Feature extraction, Classification, Segmentation. At this moment, in case of preprocessing, the input MRI image is firstly fetched from the MRI database and as well subjected to skull stripping for rejecting the undesirable area from the image. In addition, by the utilizing Gaussian filter, the skull stripped image has been smoothened. Subsequently by utilizing Automatic image registration the filtered images are recorded into one coordinate system wherever the movement of the head is a situation often encountered during the imaging process. Shape, intensity and texture are the features that will be extricated from the registered images.On the basis of extricated features, the Brain MRI images are characterized into normal or abnormal images. Finally by utilizing the modified FCM segmentation algorithm tumor portion is extracted and edema is segmented applying modified region enhancing from the abnormal images. Therefore in case of normal image, the Gray matter, the white matter and the cerebrospinal fluid can be segmented. The outcomes are analyzed for illustrating the representation of the suggested classification plus segmentation methodology with prevailing techniques.

Published by: Rehna Kalam, M. Abdul Rahman

Research Area: Medical Image Processing

110. Renal Cell Carcinoma Nuclear Grading Using 2d Textural Features for Kidney Images

Cancer identification system is proposed based on the features present in the kidney images. Different algorithms such as CLACHE (Contrast limited adaptive histogram equalization), GLCM (gray level Co-occurrence matrices) and SVM (support vector machine) algorithm are used for the identification of cancer. CLACHE algorithm is used for the enhancement of the image. GLCM algorithm is used to improve the overall accuracy of the system and to extract the textural features. SVM algorithm is used to classify the different grading levels to identify the cancer present in the image. Images that are acquired for the identification of cancer are noisy. Noise is removed by the ROI extraction. Then the images are enhanced using CLACHE algorithm. Once the images are enhanced, features are extracted using GLCM. 21 textural features are extracted. Out of the 21 features extracted two best features are selected. The two best features are compared with the trained features for the increase in the accuracy of the system. After that based on the features different grading levels are obtained for the identification of the cancer. Grade 1 indicates the presence of cancer in starting stage, grade 2 indicates the presence of cancer in the moderate stage, grade 3 indicates the presence of cancer in the mild stage, grade 4 indicates the presence of cancer in the severe stage. In this study, 2D textural features are extracted and using these extracted features cancer identification is done which improves the overall accuracy of the system.

Published by: Jayashree G. R, Dr. K. M Ravi Kumar, Ravi Kiran .R

Research Area: Electronics and Communication (Signal Processing)

111. Preventing the Anonymous Authentication Using Cashma Technique

Security in web based session management is a serious concern, due to the recent increase in the frequency and complexity of cyber attacks. Traditionally most of the system are based on the pairs of username and password which verify the identification of the user only at the login phase. Once the user can be identified, no checks are performed during the working sessions, which are terminated by an explicit logouts or expire after an idle activity period of the user. In this approach a single shot of verification is less efficient and the user identity is permanent during the entire session. To overcome this aspect, a secure protocol authentication is used for continuous user verification. This protocol makes adaptive time outs and periodically request the user to input his authentication attributes over and over. For this adaptive method, CASHAMA authentication system is used which provides different verification methods such as Keystroke timing, Mathematical event and CASHMA certificate. The use of this CASHMA system will provide secure web service and prevent the loss of data.

Published by: Santhosh, Prof. Dr. V. JayaRaj

Research Area: Network Security,Web Security

112. Implementation of Pulse Compression for Space Applications

Pulse Compression is one of the key steps in the signal processing of a Radar system. Radar system uses Pulse compression techniques to provide the benefits of larger range detection and high range resolution. This is gained by modulating the transmitted signal and after that matching the received echo with the transmitted signal. Matched filter is used as the pulse compression filter which provides high SNR at the output. Matched Filter is a time reversed and conjugated version of the received radar signal. There are several methods of pulse compression that have been used in the past, out of which most popular technique is Linear Frequency Modulation (LFM). This paper deals with the design to develop and simulate pulse compression and matched filter algorithm in MATLAB to study the LFM pulse compression technique. Matched filter is used as the pulse compression filter which provides high SNR at the output. Matched Filter is mathematically equivalent to convolving the received signal with a conjugated time-reversed version of the reference signal. The main application of pulse compression Radars includes tracking of launch vehicles, unwanted particles in space, Missile guidance etc. Here, in this paper we are discussing the pulse compression application in tracking the launch vehicle so as to check whether it had followed the predetermined path or not.

Published by: Arya V. J, Subha .V

Research Area: Communication

113. Survey Paper Analysis On Deblur Image Using Various Technique Method

The image processing is an important field of research in which we can get the complete information about any image. One of the main problems in this research field is the quality of an image. So the aim of this paper is to propose an algorithm for improving the quality of an image by removing blur, which is an image blur. Review of different deblurring techniques is obtained for a good quality image. The deblurring techniques are basically used to sharp an image using different methods & parameters. Image restoration and recognition has been of great importance nowadays. Face recognition becomes difficult when it comes to blurred and poorly illuminated images and it is here face recognition and restoration come to picture. There have been many methods that were proposed in this regard and in this paper we will examine different methods and technologies discussed so far.

Published by: Renuka Yadav, Munesh Yadav

Research Area: Image Processing

114. Anomalous Behavior Detection in Crowded Environments Using Classifiers Artificial Neural Network and Support Vector Machine

Our propose method focuses to detect and localize anomalous behavior in videos of crowded area means different scenario from dominant pattern. Proposed method consist motion and appearance information therefore different kinds of anomalies can be robustly identified in a wide range of situations. Histogram of oriented gradients can easily captures varying dynamic of crowded environment. Histogram of oriented gradients can also effectively recognize and characterize each frame of each scene. Our method of detecting anomalies using artificial neural network and support vector machine consist both appearance and motion features which extracts this features within spatio temporal domain of moving pixels that ensures robustness to local noise and thus increases accuracy in detection of local anomaly with low computational cost. UCSD dataset which will be used and which consist various situations with varying human crowds as well as traffic data with occlusions when feed to our propose method can achieve significantly higher accuracy probably more for pixel level events detection as compared to any other methods.

Published by: Meenal Suryakant Vatsaraj, Prof. D. S Bade

Research Area: Electronics and Telecommunication Engineering

115. A Survey of Multipath Routing protocols in Wireless Multimedia Sensor Networks

There has been an rapid development in the field of wireless senor networks(WSN) in the recent years. The development is mainly due to the availability of small size sensor cameras and microphones The advances in micro electromechanical systems have promoted the progress of a powerful class of sensor-based distributed intelligent systems skilled of ubiquitously retrieving multimedia information, namely Wireless Multimedia Sensor Networks (WMSNs).So the WMSN is the current topic of research due to its applications in various fields. In order to improve the channel utilization rate, reduce transmission delay and balance the transmission load in WMSN multipath routing is a promising solution. Multipath routing helps to transfer data concurrently by reducing the delay and congestion in WMSN. In this paper, various protocols and schemes are being discussed on multipath routing strategy which will identify the areas of further development for WMSN.

Published by: N. Kusuma, Dr. A. Subramanyam

Research Area: Wireless Sensor Networks

116. Aqua Silencer

Air pollution is large problem from the public health of view, because every individual person breaths approximately 22000 times a day, inhaling about 15 to 22 kg of air daily. Polluted air causes physical ill effects decide undesirable aesthetic and physiological effects. Air pollution can be defined as addition to our atmosphere of any material, which will have a dexterous effect on life. The main pollutant contribute by automobile are carbon monoxide (CO), unburned hydrocarbon (UBHC), oxides of nitrogen (NOx) and Lead. These toxic gases are harmful not only to atmosphere, but also to the human and animal race. The Pollution Control Aqua Silencer is used in the exhaust to direct the gas from the engine after going through the process of reducing the toxic gases and also water is used to reduce the exhaust noise. The objective of this project is to design and fabricate a simple system, where the toxin levels are controlled through chemical reaction to the more agreeable level. The whole assembly is fitted in the exhaust pipe; it does not give rise to any complications in assembling it. This system is very cost effective and more economical.

Published by: Nitish Kumar, Virendra Pal Singh, Sudhanshu Raj, S. P. Madnawat, Mohan Singh

Research Area: Mechanical Engineering

117. Analysis of Cooling Process for Data Centre’s at Africa

Among the most popular cyber centers, there are few problems that generally interrupts the process of complete automation and cooling process. Modern data centers are generally keen to a lot of neatness’s the industry consumes a lot of heat by consuming a huge amount of heat. So, for that, a substantial cooling process is required. This paper is basically a survey on the cooling process and also the human-automation on cyber centers and also a prototype networking software that helps cyber owners to forget their worries about the login and logout time of their customers. This system supports all types of human activities and also provides security and reliability. This paper based on the literature survey finds that Africa is lagging behind this scenario. It is based on Research and process for selecting the best location to build data centers for cloud providers in West Africa. This paper studies this problem by taking main considerations on Network performance, costs, and submarine cables.

Published by: Asha Yadav, Minakshi Memoria

Research Area: Networking

118. Extracting Deblur Image Using Fuzzy Logic Approach from Impulse Noise in Dip

Image processing is very crucial in today world because various noises, attacks, and many more problem faced by an image from transmitter to receiver side. By applying various algorithms and filters we can remove such type of noises and attacks. Blur detection techniques are very helpful in real life application and are used in image segmentation, image restoration and image enhancement. Blur detection techniques are used to remove the blur from a blurred region of an image which is due to defocus of a camera or motion of an object. Blurring is a form of bandwidth reduction of an ideal image owing to the imperfect image formation process. It can be caused by relative motion between the camera and the original scene, or by an optical system that is out of focus. Deblurring techniques are basically used to sharp an image using different methods & parameters so that we can abundant amount of knowledge. As we know there are various types of noises occurred in an image and to remove various techniques are used. Every technique is suitable for a particular noise and we cannot apply randomly to remove a particular noise. With advancement of time old technique are replaced by advanced method and today Fuzzy Logic is much more appreciated due to simple logic function and it is fourth generation technique

Published by: Renuka Yadav, Munesh Yadav

Research Area: Image Processing

119. Recognition of Online Handwritten Characters Using Lipi Toolkit

Handwritting deformation and complex structure has been one of the most challenging problems in handwritten recognition. In this paper a online handwritten recognition tool has been for recognition. Online handwriting data is collected as strokes, where a stroke is defined as the sequence of data points captured from the event of a pen-down to the subsequent pen-lift. Lipi toolkit engine is used to develop the character recognition system. Lipi toolkit is open source engine. Engine uses backpropagation and nearest neighbour for pattern classification and recognition which employs unsupervised learning algorithms. It has shown that the Lipi engine is feasible for online handwritten English character recognition to a certain degree.

Published by: Tanvi Zunjarrao, Uday Joshi

Research Area: Image Processing

120. High Security Data Hiding in Videos Using Multi-Frame, Image Cropping and LSB Algorithm

An art of invisible communication by embedding secret information in other sources like text, image, audio, and video is called steganography. A high security data hiding technique is proposed in this paper. Selected frames from the video are cropped into four equal parts, block of secret data is hiding in each three channels of crop of a frame using LSB technique in a predefined sequence, and then image crops are joined to get stego image/ frame. This stego frame is replaced in video in its original position. Comparative study is performed between proposed approach and existing approach using different metrics such as visualization test, MSE, PSNR and CPU time. Experimental results shows that the proposed approach is more secure compared to the existing approach.

Published by: Bharathi D. A, Anitha .P, Kiran S. M

Research Area: Network Security using Image processing

121. Efficient Timing Closure in SOC through Timing Quality Checks and Engineering Change Order

Ensuring correct operation of design despite rising levels of design complexity has been a major focus of research and development since the dawn of digital system design. As design size and complexity increase, so is the need to verify designs quickly and reliably. This, combined with the reduced design cycle of 3-6 months, makes verification an extremely challenging task. Once the chip is taped out, if the chip is not meeting timing or if the chip is consuming too much power then it is a big issue and results in huge loss. So in order to avoid these post silicon surprises, preliminary signoff checks are must. This paper covers the various kinds of timing quality checks that are used in the industry including the checks related to connectivity, clock, Max slope and Max capacitance, checks for Latch etc. Also in advanced technology nodes one has to consider the effect of PVT variation, temperature inversion, noise effect on delay, which is adding more scenarios for STA to cover. With big SOC project, one timing ECO run normally takes 3~5 days. The turn-around-time for timing ECO and timing signoff has become a bottle neck in the later stage of the project. So there is an immense need of effective implementation of ECO with new technologies including physically aware ECO with less resource, reduced design cycle time and reduced manual effort. The proposed algorithm is tested on multiple industrial design and found to achieve good improvement interms of Worst Negative Slack, Total Negative Slack and Failing End Points. Also the algorithm is physically aware meaning that the placement blockages, congestions are considered while inserting buffers. The algorithm works under Distributed Multi Scenarios Analysis (DMSA) environment and considers the effect of ECO across multiple corners and modes.

Published by: Shanthala .L, Dr. R. Jayagowri

Research Area: Very Large Scale Integration (VLSI)

122. Investigation of Phenol Adsorption Characteristics by Chemically Treated Ganga Soil

In this study, chemically modified natural clay was employed to remove phenol from its aqueous solution. The effects of various parameters on phenol adsorption were investigated through batch adsorption in order to find out the phenol adsorption characteristics onto the surface of modified adsorbent. The adsorption of phenol was found to increase at lower solution pH and comparatively lower temperature. The adsorption was also found to increase with increase in initial concentration and contact time but decrease in adsorbent dose. The maximum adsorption capacity of 87.08 mg/g was found at a solution pH of 3, initial concentration of 100 mg/L, adsorbent dose of 1 g/L and temperature of 30 °C. The adsorption capacity was found to increase with decreasing temperature indicating exothermic nature of the adsorption process. The Adsorption characteristics was correlated by Langmuir, Freundlich and Tempkin isotherms at three different temperature and Langmuir isotherm exhibited a better fit to the experimental data. The kinetics of the adsorption process was also studied by using pseudo first-order, pseudo second-order, intra-particle and Elovich model at three different temperatures and concentrations. It was found that pseudo second-order kinetic was well correlated with the given experimental data. The thermodynamic study of phenol adsorption also confirmed the exothermic nature of the adsorption process.

Published by: Adwitiya Mullick, Ayan Kumar Bhar, Bishwarup Biswas, Mahua Ghosh, Piyali Sardar, Monal Dutta, Dipankar Bhattacharyay

Research Area: Adsoprtion

Review Paper

123. Review on checkpoint optimization in WSN

A shared heterogeneous computing is comprised in distributed system & data resources are distributed across the network boundaries. Owing to geographically distributed resources, which is heterogeneous in nature, owned by different individuals or organizational that owns policies with varying loads & the Resource Management system caused by the availability, even obtaining the QOS in the resource faults existence a comple which overhead of checkpoint by clustering based checkpoint and optimize the number of nodes in cluster by Flower pollination algorithm and use centrality base trust case depend on connectivity and importance of node using game theory approaches.

Published by: Gurbhej Singh, Er. Aayushi Chadha

Research Area: WSN

Review Paper

124. Review On Grid Wireless Sensor Energy Reduction Approaches

Sensor nodes have limited battery power with limited lifetime, then ultimately increase the survival time of network. During data sensing the battery of sensor nodes cannot be change in the sensor network areasReduce the energy consumption of nodes by finding the centrality of nodes then find the high centrality of nodes as a cluster head. Balance the energy and distance by bacterial for optimization method

Published by: Deepak Bisht, Er. Aayushi Chadha

Research Area: WSN

125. Design of Wave Generator and Pumping Aerator

Aquaculture, also known as aquafarming, is the farming of aquatic animals like fishes, prawns etc. The farmers, particularly in coastal areas are dependent upon aquaculture. In the processes of Aquaculture, farmers need to face several problems. One of the main problems is the death of aquatic animals due to lacking oxygen levels in water. In order to provide sufficient oxygen to the aquatic animals, many aerator machines were developed. But the costs of these machines being very high, the farmers aren’t able to afford it. Therefore, in order to provide the farmers with cost-efficient technology, we have designed the wave generator and pumping aerator. These aerators enhance the water with more dissolved oxygen in an economically feasible methodology.

Published by: Kaliki Sai Krishna Reddy, R. Nandhini, M. Sujatha

Research Area: Aqua Culture

126. Exhaust Manifold Optimisation and Structural Analysis through F.E.A Approach

An exhaust manifold collects the exhaust gases from multiple cylinders into one single pipe. Exhaust manifolds are generally made up of cast iron or stainless steel which collect engine exhaust gas from multiple cylinders and deliver it to the exhaust pipe. Individual exhaust headpipes for each cylinder are commonly collected into a one tube called header. The design of an exhaust manifold which is studied and experimented in the paper depends on pressure drop and volumetric flow rate. Various geometrical types of exhaust manifold had been studied using experimental methods as well as numerical methods(CFD). This paper reveals about severe heat cycles conditions, the exhaust manifold of an engine can have problems of crack and extensive plastic deformations, the finite element method is being applied to predict thermal stress and deformations in manifold area.

Published by: Abhishek Srivastava, Dr. Shailendra Sinha

Research Area: I.C Engine, Finite Element Analysis

127. Strategies in Research

plan or scheme by which the activity of searching for and assessing information found is carried out is called a research strategy. A research strategy usually involves a number of steps. Firstly, the analysis of the major concepts of the topic. Secondly, defining relevant keywords and their synonyms. Thirdly, searching appropriate information sources (e.g. databases), and fourthly, assessing the quantity and quality (relevance) of the information found. The research strategy, a subset of research design, includes elements of data collection and interpretation and emerges from both the research purpose and question. These strategies differ in their Ontological assumptions, Starting points, Steps or logic use of concepts and theory, Styles of explanation and understanding and the status of their products. Each strategy has connections with particular philosophical and theoretical traditions, i.e. research paradigms (Blaikie 2007).The paper has been analyzed in view of the research strategies which are done in carrying out the research activity. They provide a ladder which helps in carrying out the research. The strategies Inductive, Deductive, Retroductive & Abductive have been explained in the paper with their epsitelmogical assumptions. The paper analyses their importance & also brings out its applications that have come over the years.

Published by: Garima Malhotra

Research Area: Economics

128. Fishers Management System Using Geo-Located in Android Application

Fisherman is an integral part of fishery management. This app is going to defend Fisherman from fog, wind, cyclone, heavy rainy climate and to safeguard the fisherman from dangerous situation by giving alerts to user from Admin. In day to day life, because of many cyclone problems and heavy rain, some of the fisherman missing in sea, those who went for fishery. To protect them from this problem, Admin sends the weather information to the User by using this mobile application. Also this app allows anglers to accurately view their location on a map and send related information about that location and also the fishery information to Admin. In addition to that, they will send details about sea like more fishery area, dangerous spot and limits of border. The detail which was sent by user is posted to this app by Admin. Simultaneously, dangerous spot was informed to User. Admin mark this area detail in map by different color marker. Marker intimates about dangerous spot in sea, fishery area, and cyclone and border area. And also there is chatting feature is available in this app for the user. This chatting app is for making conversation between the fishers.

Published by: Pavithra .R, Saranya .B, Prasanna Devi .P, Suganya .G, Kalaivani .J

Research Area: Android

129. Synthetic Speech Spoofing Detection using MFCC and SVM

Now-a-days synthetic voice is frequently used to defraud a biometric access systems which is speaker recognition based. This paper presents synthetic speech detection in automatic speaker verification system (ASV) for the purpose of spoof detection. Feature extraction is done by canonical Mel Frequency Cepstral Coefficients (MFCC) algorithm and classification of natural and synthetic voice is done using Support Vector Machine (SVM). Several experiments are carried out, showing that nonlinear SVM performs better than linear SVM.

Published by: Anagha Sonawane, M. U Inamdar

Research Area: Signal Processing

130. Optimization of Structure to Achieve Economy in Transportation

KALESHWARAM Project (Dr. B.R.A. Pranahitha Chevella Sujala Sravanthi Project), comprises of 28 packages. This Road Bridge under consideration is selected from package 15 of this project. The Kaleshwaram project main canal on its way is crossing the existing road at chainage K.M 6.740. The proposed road bridge is intended to establish Connectivity between TEEGUL Village and RAMNAGAR Village by crossing kaleshwaram Project main canal at KM.6.740. The existing road is a B T Road for which a Single lane Road bridge is proposed. A Single lane road bridge is that permits two-way traffic in a single lane width. This kind of roads was common in rural areas. This structure has to be inevitably provide across this irrigation canal to establish the connectivity. As the irrigation canal crossing BT road along the proposed alignment the government of Telangana proposed a Double Lane Road Bridge. Instead, proposal of a single single-ledge was examined in the place of Double Lane Road Bridge on the basis of traffic study at the site of the structure. Before the proposal of Single Lane Road Bridge, soil Investigation was done at the proposed site to arrive the soil characteristics. Traffic survey was conducted for the road at the proposed site of the structure. The data thus obtained lead to the choice of a single lane road bridge. The Single lane road bridge thus proposed was designed in the light of the relevant IRC & IS codes. Its estimate is arrived to be 0.36 Crores and the Double lane Road bridge is of 0.83 Crores as per department estimate. Thus by optimizing and adopting a Single Lane Road Bridge over a Double Lane Road Bridge, economy in the cost of structure will be achieved.

Published by: J. Ashwini, Dr. M. D. Subhan

Research Area: Traffic Survey

131. Social Freedom of Female Teachers

A survey type research has been conducted on secondary level at Jaunpur districts to study the social freedom of Female teachers. Sample size 400 were selected on the basis of subject and locality based on random technique. For measuring the social freedom of female teachers has taken standardized tool which is developed by L.I Bhushan. In order to analyze the data statistical technique has used mean, S.D and CR values. Findings were rural & urban and science & art related female teachers are similar in social freedom.

Published by: Dr. Narendra Kumar Singh

Research Area: Teacher Education

132. The Role of Satellite Zigbee Technology in Flood Monitoring and Communication System

India is facing a severe provocation with an increasing frequency of flood nowadays. It is pivotal to utilize the state of the art sensing and communication technologies to monitor and detect the flood occurrences. In this paper, various weather monitoring techniques have been reviewed. The system displays these readings in real time on a display. It also keeps track of historical information on an hourly and daily basis. The historical data can be pulled up on the display at the request of the user. Various techniques are used to monitor the weather like satellites, radars, microcontrollers, wireless sensor network and many other simple instruments. Weather can also be monitored by using remote wireless sensors. In this system we use ZigBee technology. ZigBee is the latest wireless weather monitoring techniques. The vital role of the designed satellite ZigBee technology in flood monitoring and communication system is based on Mobile App. This Mobile App is used to communicate with the people during flood times and is to continuously monitor, detect and report the environmental status to a control unit using water level sensor, satellite ZigBee and the readings are displayed in it. The main objective of this project is to rescue the people who are present in flood areas by sending and receiving the messages using this Mobile App. This system was developed using Embedded C language with the help of Proteus software. The developed system gives a timely alert of flood occurrences. The proposed system can be beneficial to the neighborhood and act as a precautionary action to save lives and properties of the people in the case of flood times.

Published by: P. Nivethitha, S. R Karthiga, C. Reikha

Research Area: Based on Communication

133. Patterned Fabric Defect Detection Using Wavelet Golden Image Subtraction Method

In this paper decomposition of fabric, the image is done using wavelet transform method. The wavelet decomposition for the defective image as well as for original image is done. The wavelet decomposed defective image vertical component is subtracted from the non-defective image. Finally thresholding and filtering techniques used to get a defect.

Published by: Sarojini Ganapati Naik, M. S Biradar, Kishor B. Bhangale

Research Area: Image Processing

134. Conversion of Window Air Conditioner into Air Source Heat Pump and Experimentation on Heat Pump Setup

Air source heat pump water heaters are a promising technology and use the same mechanical principles as refrigerators and air conditioners. While refrigerators remove heat from the interior and discharge it to the environment, heat pump water heater take heat from the environment and concentrate it to heat water for service needs. The heat pump water heater, based on the vapour compression cycle, absorbs heat from a renewable energy source. Heat pump is a device that provides heat energy from a source of heat to a destination called a "heat sink". Heat pumps are designed to move thermal energy opposite to the direction of spontaneous heat flow by absorbing heat from a cold space and release it to a warmer one, and vice-versa. A heat pump water heater operates on an electrically driven vapor-compression cycle and pumps energy from the air in its surroundings to water in a storage tank, thus raising the temperature of the water. The hermetically seal compressor compress the refrigerant and send to the condenser. The evaporator absorbed surrounding heat and send to compressor. The condenser gives heat to the water.

Published by: Vaibhav Borate, Akshay Bhandare, Navanath Gawali, Devendra Jagtap, Prof. S. H Sonawane

Research Area: Thermal

135. Location Based Smart Energy Meter

The paper deals with monitoring and controlling of electric power consumption on real time basis, thereby generating consumption statistics using IOT. It helps the user to know his/her power consumption. This could sub-sequentially reduce the manual work involved in the process of collecting the number of units consumed and for avoiding the manual costs and errors. The setup of this system is simple and does not require much hardware. The main elements are sensors which are interfaced to Intel Galileo Zen 2 with a Wi-Fi module for transmission of data (to the open source IOT platform Thing speak, where statistics can be viewed, there by controlling can be done).

Published by: K. C Mohan Kumar, V. Venugopal Reddy, Y. Bhaskarrao

Research Area: IOT

Research Paper

136. Study and Synthesis of Manganese Doped Tio2 Nanoparticles

Nanoparticles of un-doped, 5%, 10%, 15% Mn doped TiO2 were prepared by the sol-gel technique by adding different proportions of Manganese to the Titanium dioxide and characterized using XRD and SEM. This increase in doping proportion of Mn in the oxide material reduced the band gap to a larger extent, so this material is activated under visible light. As the doping level of Manganese increased, the material acquired the property of Ferro-magnetism at room temperature. The simulation studies were carried out using DFT tool and analyzed.

Published by: P. Prudhvi Raj, Y. Bhaskar Rao

Research Area: Nano Materials and Sciences

137. Improving the Performance for Crime Pattern Analysis Using Data Mining Techniques

As the crimes rates against women is increase day by day, the new problems are faced by the law organisation. Due to which this cause more burdens on the crime against women resources. The law organisation is able to generate such increases or decreases in crime, so it is necessary to find out the most useful method to control and avoid crimes against women. The aim of this paper is to classify clustered crime against women based on occurrence frequency during different years by the process of Data mining. Data mining is used to analysis, investigate and discovery of patterns for occurrence of different crimes against women. We connected a hypothetical model in light of information mining strategies, for example, grouping and characterization to real crime dataset recorded by OGD. The k-means clustering, KNN algorithm, decision tree algorithm and prediction method for future purpose, is used for the classification and clustering of crimes

Published by: Chhaya Yadav

Research Area: Data Mining

138. An IOT Approach to Monitor Water Quality Using MQTT Algorithm

The degradation of water resources has become a common problem. The conventional methods of water quality monitoring involves the manual collection of water sample from different locations. These water samples were tested in the laboratory using the rigorous skills. Such approaches are time consuming and no longer to be considered efficient. Moreover, the current methodologies include analysis of various kinds of parameters of water quality such as physical and chemical. The old method of water quality detection and communication was time consuming, low precision and costly. Therefore, there is a need for continuous monitoring of water quality parameters in real time. By focusing on the above issues, a low cost water quality monitoring system is developed and designed that can monitor water quality in real time using IOT. In the proposed system water quality parameters are measured by the different sensors such as pH, turbidity, dissolved oxygen and temperature for communicating data onto a platform via microcontroller system i.e. Arduino model. So in order to meet all these requirements, other technologies can be used such as MQTT (Message Queuing Telemetry Transport) which allows publishing and subscribing od data between the sensor and end device. Instead of using GSM network or any other technology, MQTT algorithm will be implemented to make the system feasible, modular, scalar and cost-efficient. Not only this , with the help of MQTT algorithm there will be simultaneous flow of data between the sensors and server.

Published by: Mehwish Mir

Research Area: Internet of Things

Research Paper

139. Development of Data Mining Model for the Evaluation of Human Skill Placement in the Engineering Sector

Data mining is one of the widespread research areas of present time as it has got wide variety of application to help people of today’s world. It is all about finding interesting hidden patterns in a huge history database. In this research work, data mining is comprehensively applicable to a domain called placement chance prediction, since taking wise career decision is so crucial for all of us for sure. A strategy to predict the overall absorption rate for every branches as well as the time it takes for all the students of a particular branch to get placed etc. are also proposed. From each combination of attributes from the history database of student records, corresponding placement chances is computed and stored in the history data base. From this data, various popular data mining models are built and tested. These model can be used to predict the most suitable branch for a particular new student with one of the above combination of criteria. A strategy to predict the overall absorption rate for various branches as well as the time it takes for all the students of a particular branch to get placed etc. are also proposed. The proposed method is tested on the data set provided by A.I.M.T college Lucknow and data is passes through the various data mining model, namely decision tree ,neural network and navie bayes classifier on area of the application to a domain, development of classifier and future outcomes were also configured on this thesis. At last this research work puts forward the data mining algorithm namely C 4.5 * stat for numeric data sets which has been proved to have competent accuracy over standard benchmarking data sets called UCI datasets. It also proposes to improve the standard C 4.5 algorithm.

Published by: Arun Mishra

Research Area: Data Mining

140. Implementation of Anonymous and Secure Communication System with Group Signatures

For Privacy Preserving Communications Both Anonymity and end to end encryption mechanism is essential. Identity Based Encryption technique is best suitable for secure and anonymous communications. For solving anonymous and secure communication problems both cryptographic and IBE based protocols needed which governs the proper communication between two parties. For the purpose of authentication of the user proxy server is maintained between user and service providers. The GM and KGC is essential in anonymous communication for issuing both signing and decryption keys for getting plaintext from ciphertext in original form. Public key encryption and digital signature mechanism needed for guarantees of secure communication between both ends. Finally protocol realizes secure and anonymous communication between sender and receiver. The Communication Protocol along with IBE and Group signatures allow secure anonymous authentication. In this way, illegitimate users cannot use anonymous system and cannot effect the communication between source and destination whereas legitimate users access systems without compromising anonymity. In this way the proposed system get secure and anonymous communication over the network. Keywords: Anonymous Communication, Anonymous Authentication, Secure Channel, Identity-Based Encryption, Group Signature.

Published by: Mr. Vaibhav P. Thakare, Prof . Chetan J. Shelke

Research Area: Network Security

141. Experimental Investigation of Mortar Cube with Pumice Powder and Ceramic Tile Powder

An experimental investigation was carried out to evaluate the properties of cement Mortar. In this project study, ordinary Portland cement is replaced partially with pumice powder and fine aggregate is replaced partially with ceramic tile powder. In this research is to study the utilization of ceramic waste as a partial replacement of fine aggregate in a mortar. In this experimental investigation, prepare mortar cube of size 70.7mm x 70.7mm x 70.7mm with mix proportion 1: 3. The aim of this study is to determine the optimum % replacement of pumice powder in mortar cubes. .Cement mortar is made by replacing cement with pumice powder of different percentages like 5%, 10%, 15%, 20% & 25% with curing of 3, 7 & 28 days. The various combinations of pumice powder and ceramic waste powder were added to the mortar. Compressive strength test, splitting tensile strength test, water absorption test and the density test were performed and the results were analyzed. Mortar cube shows light weight behavior by replacing cement with pumice powder. The density of mortar is decreasing by adding pumice powder. The density of mortar cube is increasing by adding pumice powder and ceramic tile powder. Mortar cube shows almost similar strength compare to conventional mortar by adding pumice powder and ceramic tile powder.

Published by: Jitha Mathew .V

Research Area: Civil Department

142. Implementation of Secured Sensor Nodes Using Cryptographic Algorithms

Application of wireless sensor networks (WSN) to commercial, home environments and military purpose are increased in wide range. As the wireless sensor networks continue to grow, they are vulnerable to attacks and hence need for security mechanisms. Identifying suitable cryptography for WSN is important challenge due to limitation of energy, computation capacity and storage resources of sensor nodes. For this purpose, Cryptography plays a vital role in securing the data in W SN. In this paper we implemented two symmetric cryptographic algorithms algorithms: block cipher AES (Advanced encryption standards) and the Lightweight block cipher PRESENT. Our main aim of implementing the symmetric cryptographic algorithms in sensor nodes to provide secure communication which guarantees the confidentiality, integrity and avoids key exchange via unsecured channel that impose real threats. The experimental results are carried by implementing these algorithms in Atmega 32 bit microcontroller using simple C codes.

Published by: M. Jothimeena, R. Sherin jenny

Research Area: Electronics

143. Study Of Mechanical Behavoir Of Composite Material By Vibration Analysis

In present time there is an increasing need for an alternative material to conventional materials. Growing interest in using environmental friendly materials brings natural fiber made the composite material in focus. They are strong, lightweight, cheap and biodegradable. But one needs to check whether its properties satisfy that of existing material. The target of the study is to experimentally justify biaxial fiber composite as a promising alternate material. The polymer composite samples are made with natural/synthetic fiber as reinforcement and a synthetic resin as matrix material. To find its natural frequency and damping of the composite materials, vibration test is carried out. ANOVA technique is used to find the level of the parameter.

Published by: Rohit Raman, Upasana Saikia

Research Area: Nature of Composite Material

144. Effect of the Fungicide Dimethomorph at Different Application Rates on Enzyme Activities in Groundnut (Arachis Hypogaea l.) Soils

Soil microbial diversity is indispensable to maintain functional diversity and enzyme-mediated critical soil processes that detoxify soil from environmental pollutants, like pesticides. Thus, the present study was carried out to assess the effect of different concentrations of the fungicide dimethomorph on the activities of phosphatase, and urease, of black and red soils of groundnut cultivated fields of Anantapuramu District , Andhra Pradesh, India

Published by: P. Ramanamma, D. Meghana, V. Rangaswamy

Research Area: Microbiology

145. Irrigation Water Management and Crop Production

Agriculture being a key element of the national economy is challenged by variety of problems in development planning. Among these the major ones are climatic changes, topographic constraints, population pressure, ecological degradation & low level of technological advancement, so it needs good potentials of agricultural development. One of the mitigation to reduce challenges of this development is Irrigation practices Looking at this Irrigation Project area, it is with trace amount of rainfall over the year, this does have direct impact on human & cattle population, so it has to be supported by irrigation. Residents of the area develop Teff, Maize & sorghum though the available rain is not promising to harvest yield that even can feed few months. There is no promising grazing area for the cattle of the area too. Irrigation from its very nature has the capacity to solve animal feeds. The methodology used in this development study was aimed at plainly defining and describing the agronomic situation of the area and out lining the major crop production constraints and developing recommendation for implementation. Primary and secondary data were collected from the Kebele development agents, farmers and Wareda agricultural and development office using checklists through group discussion and key informant interview on crop production, cropping pattern, farming practice and production constraints. Crop water requirements of crops are computed using crop wat 4 windows model. In general, as a conclusion the agro-climatic condition of the project site, the suitability of the soil for crop production, physical feature of the command area and the availability of irrigation water are suitable for development of irrigation. Despite the above facts, the sustainability of the project is very much dependent on the full participation of the beneficiaries in all aspects of the project implementation. The participatory approach will create a sense of responsibility and ownership and greatly contributes to the success of the irrigation schemes constructed in previous years.

Published by: Ebissa G. K

Research Area: Civil Engineering

146. Video Transmission in Heterogeneous Network with Improved QOS

Wireless communication systems that consist of cellular, WLAN and Wi-Max access networks simultaneously are termed as heterogeneous wireless networks. Heterogeneous networks connect computers and other devices with different protocols. In the existing system the Greedy Approach was used for video transmission in heterogeneous network. It minimizes the video quality distortion by scheduling the most valuable packets for transmission. But there is a loss occurs when large number of packets is transmitted. The proposed work considers Wi-Fi and Wi-Max in the heterogeneous network for transmission. In this process for multi-resolution video transmission to heterogeneous clients and for channel adaptation, Scalable video coding (SVC) is being developed in response to the need of robust video delivery for heterogeneous clients. The clients receive and decode different fractions of the video bit stream to obtain the desired resolutions and qualities. Multicast probe (MP) frame was initiated which contains the information of the video bit stream and the timer starts for the multicast response (MR) frame. Upon receiving the MP frame, if a client does not subscribe to the multicast group, the MP frame is simply ignored. Otherwise, an admitted client estimates the signal-to-noise ratio (SNR) and path loss of its wireless channel. The simulation results are performed using MATLAB.

Published by: M. Edhayadharshini, Alamelu

Research Area: Wireless Communication

147. Classification of Land and Marine Resources Using SVM Classifier

In the last several years, there have been significant decrease in ecosystem marine and terrestrial resources. Therefore the conservation and management of these natural resources are very essential aspect for the present and for future generation. The main objective of the paper is to build and develop the advanced image processing methods applied to remote sensing images for the marine and land resources conservation. Different image processing techniques have been implemented in preprocessing stage in order to acquire high resolution satellite imagery. The paper in mainly focused on three ecosystems from the canary islands where, after different evaluation and extensive analysis are made. Pansharpening process is used to enhance the image quality, then, a different RPC models have been used to perform the orthorectification and finally, advanced techniques have been used for atmospheric correction. The final procedure is to develop the marine and terrestrial product map using advanced classification techniques for the management of marine and natural resources.

Published by: Raghunatha .M, Prof. Shobha .S

Research Area: Image Processing

148. Face Recognition To Handle Facial Expression, Occlusions And Posture Variation

In this paper, we present a framework for analyzing faces, with the specific goals of matching, comparing, and averaging their shapes. Here we handle variations of facial expression, pose variations, and occlusions between a gallery and probe scans. The radial curves are drawn from the nose tips and filled to the occluded part to form the shape of full facial surfaces. This representation seems natural for measuring facial deformations and is robust to challenges such as large facial expressions, large pose variations, missing parts, and partial occlusions due to glasses, hair, and so on. In this, we consider ORL data set for handling different types of challenges, like SVD is used to the estimation of missing facial parts. Here we using MATLAB for implementing our project.

Published by: Bharti Khemani, Dr. Archana Patankar

Research Area: Face Recognition

149. Improved Learning for Special Ones Using Image Mapping

Hearing Impaired students have always have had issues when it comes to quality education. Same education is not provided to normal students and hearing impaired students. Due to this, they do not have equal opportunities as compared to normal students and they are always having an inferiority complex. This is because there is a vast gap between hearing impaired students and normal students. We designed a system that enables the same education curriculum to be used for both normal and special students. With some elementary techniques such as text mining and image mapping, we designed a system that will translate text entered in that system to images so that a visual representation can be obtained for better understanding.

Published by: Poorva Awale, Gaurav Bhosale, Vishakha Panchal, Prof.Suhas M. Patil, Shubham Kumbhar, Atish Kulkarni

Research Area: Data Mining

150. Smart Vehicle

Automobile is probably the one which has significantly changed human life. In the last two decades it spread drastically in every level of society hence, safety becomes the main concern. Road Accidents account a severe threat to the lives in both ways physically as well as financially. even after digital control of the vehicle. Many people lost their life every year in vehicle collision .We have developed a device which will automatically activate the safety switches on stipulated time before unusual situation. The aim of this project is to build a cost effective Adaptive Front Lighting System with automatic turn indicator, with fog sensors and solar powered batteries for more efficient and reliable power source, that will help achieve enhance safety, comfort and reliability. The new design and build can fit into an existing fixed headlamp with a very close eye on cost and reliability. Use of existing headlamps will also allow the AFLS addition to maintain the vehicle’s conformity to existing vehicle aesthetics as well as government regulation.

Published by: Avinash Gupta, Ashish Yadav, Yash Vardhan Gaur

Research Area: Electrical Engineering

151. Software Agent Modelling Of Web Application

Businesses are becoming automated nowadays, with almost every business getting an online representation in the form of Web Application. The different kinds of businesses require dynamic nature of Web Applications which require less dependency on a human controlled software interface. With the applications catering to the needs of hundreds to thousands of users simultaneously, it’s hard to manage such kind of applications using a combination of human interface. This particular need has led to the study and research in the field of software agents or intelligent agents, which use some kind of intelligence to aid the various operations of the application in use. Several studies and research has been made in this area which has resulted into development of some high quality software applications over the web, which boast to have complete functionality driven by these intelligent agents and require minimum to no human interference. In this research work, software modelling of Web applications using intelligent agents has been envisaged. The various fundamentals of agent research has been discussed in detail with special heed to implementation framework. Finally, an agent based model has been developed using the latest tools and techniques. This research work provides comprehensive analysis and implementation of an agent based software application.

Published by: Arti Verma, Yogendra Singh

Research Area: Software Engineering

152. Calibration of Bone Mineral Density Using Artificial Neural Network

Osteoporosis is one of major disease that may lead to bone fracture. when the Bone Mineral Density lows, resulting in osteoporosis. DEXA is the basic tool to analyze the Bone Mineral Density Value,which is high in cost and not available in all hospitals. So, here we consider Electromyography(EMG) signal in order to predict the BMD value. Feed Forward Network classifier is used to train and test the data.

Published by: Aruna .M

Research Area: Artificial Neural Network

153. Fabrication and Analysis of Freon Wheel

Energy consumption has increased a lot during the past two decades. It has increased the cost of energy a lot, and it has constantly led to the inventions of alternative ways of harnessing energy. Freon Wheels are one such ways of harnessing low grade energy with Minimum pollution. It could be used in areas where there is waste heat or in tropical regions where solar energy is wasted. This method is also eco friendly and at the same time may even reduce the cost of producing crude oil. In this context a new device (Freon wheels) that is a gravity engine driven by thermal gradient for converting Waste/solar heat into useful work is proposed and its efficiency is studied. The fabrication of Freon wheel is done by using four cylinders as per the design. The cylinders are welded together with 900 each other to the shaft, the bearing are mounted on the both ends of the shaft. The experiment is conducted on the equipment by providing some means of heat source and the speed is obtained by the Freon wheel is 10rpm.

Published by: Dalli Murali Krishana, V. Jagadesh Babu, B. Anjaneyulu Naik, D. Asha Sindu

Research Area: New Power Generation Method

154. Antimicrobial susceptibility patterns of uropathogenic Escherichia coli and Urinary tract infection in pregnancy and their prevalence in female around Dhanbad, Jharkhand

Urinary tract infections are common during pregnancy and the most common causative organisms is Escherichia coli. Pregnant women are at increased risk for UTIs. Beginning in week 6 and peaking during weeks 22to 24, approximately 90 percent of pregnant women developed ureteral dilation ,which will remain until delivery increase bladder volume and decrease bladder tone ,contribute to increased urinary stasis and ureterovesical reflux, the physiologic increase in plasma volume during pregnancy decrease urine concentration. Up to 70 percent of pregnant women develop glycosuria, which encourages bacterial growth in the urine. Increase in urine progestins and estrogens may lead to a decreased ability of the lower urinary tract to resist invading bacteria allowing some strains of bacteria to selectively grow. These factors may all contribute to the development of Escherichia coli during pregnancy. The purpose of this study was to evaluate the prevalence and their antibiogram profile of uropathogenic Escherichia coli (UPEC) in and around Dhanbad. Materials and methods: A total of 641 urine samples were collected from the suspected patients of UTI. The samples were cultured on MacConkey agar for isolation and identification. Antibiotic susceptibility test was done by disc diffusion method. Female pregnant patients of different age groups were included for this study. Result: 29.48% urinary isolates were identified as Escherichia coli. 51.32% UPEC isolates were sensitive to Nitrofurantoin and Piperacillin/Tazobactum. 25.38% isolates were susceptible to Levofloxacin and Amikacin followed by Cefotaxime (12.16%). Conclusion: Prevalence of Escherichia coli among urinary isolates was high in our study. Antibiogram profile of these isolates varies to different antibiotics in terms of their susceptibility pattern. Continuous surveillance of Antibiogram profile of UPEC isolate is mandatory because it vary significantly.

Published by: Dr. Sujeet Kumar Tiwary, Dr. Rajendra Kr, Dr. S. Sharan, Dr. B. K Singh, Dr. S. K Sinha, Dr. N. K Jaiswal, Dr. R. K, Dr. K. Kumari

Research Area: Microbiology and Physiology

155. Agile Development Testing Paradigms

Software testing in the agile development is too complex issue in the Information Technology world. Since agile methods don't focus much on testing activities and agile software development doesn't include testing practices required for the quality of project, the process of finding the suitable method for testing, mainly for large scale projects is challenging. In this paper, we propose a concept of integrated agile software testing in a large scale project. This research define the software testing process technologies and principles for the agile software testing and identifies the best practices for testing software products in agile development process.

Published by: Saurabh Srivastava

Research Area: Software Testing

Research Paper

156. Seismic Analysis and Design of G+7 Residential Building Using STAADPRO

Structural designing requires structural analysis and earthquake or seismic analysis of any structure prior to construction. Earthquake or seismic analysis is the calculation of the response of a structure subjected to earthquake excitation. Various seismic data are necessary to carry out the seismic analysis of the structures in this study the seismic response of the structures is investigated under earthquake excitation expressed in the form of member forces, joint displacement, support reaction and story drift. The response is investigated for g+7 building structures by using STAAD PRO designing software. We observed the response reduction of cases ordinary moment resisting frame. In this case, we have taken earthquake zone 2, response factor 3 for ordinary moment resisting frame and importance factor 1. Initially, we started with the designing of simple 2-dimensional frames and manually checked the accuracy of the software with our results. Then according to the specified criteria assigned it analyses the structure and designs the members with reinforcement details for G+7 residential building RCC frames. The minimum requirements pertaining(Be appropriate) to the structural safety of buildings are being covered by way of laying down minimum design loads which have to be assumed for dead loads, imposed loads, and other external loads. In order to be able to prevent or to minimize the occurrence of cracks, it is necessary to understand basic causes of cracking and to have knowledge about certain properties of building materials, the specification for mortar and concrete, the Architectural design of building, structural design, foundation design, construction practices & techniques and environments.

Published by: B. Gireesh Babu

Research Area: Civil Engineering

157. Closed Sequential Pattern Mining Using Binary Representation by Same Support Threshold Value

This paper is Closed Sequential Pattern Mining by Same Support Threshold Value (ClospamSSV). The main intend is to find the closed frequent item sets from huge sequence database. The ClospamSSV discovers ideally Minimal Closed Sequential Patterns in long sequence databases. The experimental evaluation shows that the proposed algorithm outperforms the Clospam. The Same Support Value is used to prune search spaces according to the given supported threshold value.

Published by: N. Jayaveeran, S. Ramesh

Research Area: Data Mining

158. Matching Domination of Kronecker Product of Two Graphs

A dominating set D is called a connected dominating set, if it induces a connected subgraph in G. Since a dominating set must contain atleast one vertex from every component of G, it follows that a connected dominating set for a graph G exists if and only if G is connected. The minimum of cardinalities of the connected dominating sets of G is called the connected domination number of G and is denoted by γc(G). We have defined new parameter called the matching dominating set and the matching domination number.We consider Kronecker product of two graphs, matching domination of product graphs and recall the results associated to the matching domination of Kronecker product of graphs. We prove the following: • In G1(k)G2 then deg(ui, vj ) = deg(ui).deg(vj ). • If G1 and G2 are finite graphs without isolated vertices then G1(K)G2 is a finite graph without isolated vertices. • |VG1(k)G2 | = |VG1 ||VG2 | • |EG1(k)G2 | = 2|EG1 ||VE2 | • If G1 and G2 are regular graphs, then G1(K)G2 is also a regular graph. • If G1 or G2 is a bipartite graph then Gl(k)G2 is a bipartite graph. • The matching domination number of c4(k)Km is 4. • If G1, G2 are two graphs without isolated vertices then γm[G1(k)G2] = γm(G1).γm(G2) where G1(k)G2, is the Kronecker product of graphs.

Published by: P. Bhaskarudu

Research Area: Graph Theory

159. Symbolism in Anita Desai’s Novels

Symbols have a vital role to play in displaying different states; generally, symbols used by Anita Desai are a part of circumstantial details of the narrative. In order to present submerged psychic truth she uses the technique of symbolism thoroughly carefully chosen a cluster of images, myths symbols are most prominently amongst the devices deployed by her. These symbols are capable of objectifying the inner psychic layers of the characters.

Published by: Bandna Semwal

Research Area: Symbolism

160. A Lot Can Happen Over Coffee (A Study with Special Reference to Cafe Coffee Day)

Café Coffee Day is a part of India's largest coffee conglomerate, Amalgamated Bean Coffee Trading Company Ltd. (ABCTCL). ABCTCL have their own 10,000 acres of estates where the coffee seeds are grown. The net worth of the coffee plantations is around US$250–300 million. They are one of the largest producers in Asia to produce Arabica coffee beans. To augment the balance, they also procure coffee beans from 11,000 small and medium coffee growers. Cafe Coffee Day was founded by V. G. Siddhartha from the state of Karnataka. The USP of CCD was providing a broadband internet over a cup of coffee. For over two decades they have brought in drastic changes in the Menu. They have modified their logo with easily identifiable bright-purple-and-red identity. CCD is expanding and exploring its layout to embrace sprawling lounge and squares and crafting sub-divisions for everything from highways to hospitals. This paper attempts to study the journey of CCD in brewing fresh formulations to stay relevant in the market.

Published by: Dr. S. Gayathry

Research Area: Marketing

161. Intrapleural therapy for the prevention of recurrent spontaneous pneumothorax-A Randomized Comparative Evaluation of Bleomycin Pleurodesis & Autologous Blood Pleurodesis

Intrapleural therapy for the prevention of recurrent spontaneous pneumothorax-A Randomized Comparative Evaluation of Bleomycin Pleurodesis & Autologous Blood Pleurodesis Mudassir A. Khan, M. Akbar Bhat, A. Majeed, Naveed Khan, Faheem, Hilal, Saima N, Asif M. BACKGROUND: Pneumothorax is free air in pleural space i.e. between visceral and parietal pleura. Among various treatment options for recurrent pneumothorax, one is chemical pleurodesis; intended to achieve a symphysis between parietal and visceral pleura, in order to prevent accumulation of air (pneumothorax) in the pleural space. OBJECTIVE: Our objectives in this study were to evaluate the efficacy of autologous blood pleurodesis in the management of persistent air leak in primary spontaneous recurrent pneumothorax and to compare the efficiency, side effects, cost and complications of autologous blood pleurodesis vis a vis bleomycin pleurodesis. STUDY DESIGN: It was a prospective randomized comparative evaluation of autologous blood & bleomycin pleurodesis involving patients with persistent air leak resulting due to primary spontaneous recurrent pneumothorax. We followed the patients for a period of 1-22 months with average follow up of 11.766 months. METHODS: The study entitled, “Intrapleural therapy for the prevention of recurrent spontaneous pneumothorax-A Randomized Comparative Evaluation of Bleomycin Pleurodesis & Autologous Blood Pleurodesis” was carried out in the department of CVTS, SKIMS Srinagar Kashmir from May 2010 to Oct 2012. Total of thirty (30) patients with primary spontaneous recurrent pneumothorax were included in the study; 16 patients in Study Group (receiving autologous blood) & 14 patients in Control Group (receiving bleomycin). On an average 54.7ml (1ml/kg body weight) of peripheral venous blood taken from the patient's arm vein was immediately injected into the pleural cavity via the chest tube & chest tube was clamped for 1-2hrs. In bleomycin pleurodesis at 15 min after instillation of 20 ml of lidocaine 1%, about 55.7 units (1 iu/kg body wt.) of bleomycin in 100 ml of normal saline were instilled into the pleural cavity via the chest tube and the tube clamped for 1-2hrs. RESULTS: One (6.3%) patient in the Study group had failure of cessation of air leak after blood patch pleurodesis. Hence the success rate of cessation of air leak in Control group was 100% while as it is 93.7% in Study group (p-value=0.178, insignificant). In Study group 3(18.8%) patients had post-procedure pain but none had fever; while as in Control group 13(92.9%) patients had post-procedure pain & 6(42.9%) patients had fever. None of the patients from Study as well as Control groups had post-procedure empyema, tension pneumothorax, anaphylaxis, chest tube clogging or progressive respiratory failure. Per patient average cost of the procedure in Study group was Rs 53.13, while the average cost of procedure per patient in Control group was Rs1925.00 (p-value ≤0.0001). After 1-22 months (average 11.76) follow up, in Study group 3(20%) out of 15 patients had recurrence, and also in Control group 3(21.4%) out of 14 patients had recurrence of pneumothorax.( p-value (0.44) insignificant). CONCLUSION: The effectiveness of blood pleurodesis in cessation of air leak is approaching to that of bleomycin pleurodesis with similar recurrence rates in both groups. However the incidence of immediate post-procedure pain and fever is much higher in patients of bleomycin pleurodesis. Also compared to bleomycin, the autologous blood pleurodesis is very much cost effective. Our limited experience indicates that pleurodesis with self-donated blood is an easy-to-perform, painless, convenient, rapid and inexpensive procedure that is moderately effective in the short and medium term.

Published by: Mudassir Ahmad Khan, M. Akbar Bhat, A. Majeed, Naveed Khan, Faheem, Hilal, Saima .N, Asif .M

Research Area: Medicine

162. Study of Hopfield Neural Network for Noisy Random Patterns Using Evolutionary Approach

In this paper, a vigorous attempt has been made to study Hopfield neural network for storing and later recalling of random patterns using conventional hebbian learning rule and genetic algorithm. Storing of these patterns in the network is done using Hebbian learning rule followed by recalling of these patterns on presentation of distorted input patterns is done using both the methods i.e. Hebbian rule and genetic algorithm. The optimal weight matrix obtained is used to generate new weight matrices for the efficient recalling of prototype input patterns. Performance evaluation of the network is done on the basis of pattern recall with maximum noise present in patterns. The results thus obtained shows that the recall of these random patterns is more successful by using genetic algorithm.

Published by: Srishti Gangwar, T. P Singh

Research Area: Artificial Neural Network

163. Fingerprint Based Universal Debit Card

We are designing the system which will read the AADHAR CARD number which will act as a UNIVERSALDEBIT CARD. Using this card automatically it will deduct the ticket charges from your account. So, the passenger doesn’t have to wait for long time in a long queue. Due to its transparency, we can keep tab on corruption. Using this system we can reduces human interference which effectively encourage corruption. It will make overall transaction digital and transparent. This transparency in money transaction will reduce scope of corruption. It will also help to eradicate. Exploitation which otherwise may occurs when transaction is through notes. Moreover this project can be major step towards success of Digital India drive of government.

Published by: Dhonddev Suhas, Gajanan Deshmukh, Vishal Joshi, Nitin Dawande

Research Area: GSM Module

164. A Trinity Approach for Secure Image Access and Retrieval in Cloud

Images play an important role in human’s day to day life and it consumes much more space for storage rather than other formats. Hence, the need for cloud storage outsourcing arises. The Privacy of user and transfer of images in the network is the main concern. For privacy-preservation purposes, sensitive images, such as medical and personal images are needed to be encrypted before outsourcing, which makes the CBIR technique on plaintext realm to be inoperative. To ensure user privacy, a keyword based technique is introduced to provide individuality for the users. User validation for accessing their images from the cloud is provided by generating an OTP. The cryptography and segmentation techniques are upholding image security during transfer. Additionally, the illicit publication of user images is recognized with the help of watermark extraction.

Published by: T. E Bavisha, Ms. M. Madlin Asha

Research Area: Image Security

Research Paper

165. Under Water Image Enhancement by Color Convolution with Total variation

Due to concern about the current state of the world’s oceans, several large scale scientific projects have begun to investigate the condition of our oceans. These projects are making use of underwater video sequences to monitor marine species. The move to using underwater video monitoring introduces labor intensive manual processing techniques. This leads to the need for an automated system capable of processing the data at a much greater speed. This thesis investigated whether the development of suitable image processing techniques could be used for preprocessing underwater images which enhance the image. The main objective of this thesis reduce the noise ratio and increase the PSNR of image. In underwater situations, clarity of images are degraded by light absorption and scattering. This causes one color to dominate the image. In order to improve the perception of underwater images. Improve the color noise by convolution method which reduce the color blurriness and total variation (TV) improve the noise after blurriness we get the significance improvement in PSNR from existing method approximate multiple five increment of PSNR

Published by: Karamjit Kaur, Rajnish Kansal

Research Area: Image

166. Monitoring Traffic Signal Destructions Using SVM Classifier

Typically vehicles are generally in movement so number plate detection from vehicles becomes very difficult problem due to possession of images, next to with that number plate may have other designs and some more additional stickers also. within this paper, we have taxing our process for number plate detection which includes many steps, the images of the vehicle’s number plate are composed from the car parking areas and from the network. Firstly, pre-processing of giving input sampled similes are done then feature drawing out of those pre-processed images by applying convolves Gabor and Zonal based algorithm. After that morphological operations are made to find the numbers and also to the segmentation of images, every single character is segmented parallel processing histogram. All the features of every number are designed using zonal based approach. The features are used as put in to the neural networks for quality identification.

Published by: Shruthi .U, Prof. Srinivasalu .G

Research Area: Image Processing

167. Effect of Environmental Parameters on Solar PV Performance with MPPT Techniques on Induction Motor Driven Water Pumping System

A photovoltaic cell produces electrical energy directly from visible light but their efficiency is fairly low and hence is expensive as compared to other available energy resources. Various factors affect pv system efficiency. This paper presents the important environmental factors which affect working of pv system by using MPPT techniques .These affects are solar Irradiation, temperature, humidity and wind speed . The variation of these factors at different condition has been studied to improve working of MPPT techniques for more reliable applications. In India there is a huge demand of energy due to various reasons like industrial development and increasing population. The main drawback in replacing conventional energy sources with new and more environmentally friendly alternative sources such as solar and wind energy, is how to capture them for maximum energy and how to deliver the maximum power at a minimum cost for a given load. The output power of photovoltaic cells or solar panels has nonlinear characteristics which are affected by temperature, light intensity and other environmental conditions and hence it is necessary to study them and rectify them for maximum and output.. To assess the overall performance with varying weather conditions, a PV model based on the Shockley diode equation has been used to predict the electrical characteristics of the cell with regard to changes in the environmental conditions of irradiation, temperature, humidity and wind speed.

Published by: Vishakha Garg

Research Area: Solar System (Renewable Energy)

168. Combining Left and Right Palm Print Images for more Accurate Personal Identification

Recognition of a person by means of the biometric characteristic is very important technology as biometric identifiers can’t be shared and they intrinsically represent individual’s bodily identity. Palm print is one of the important biometric characteristics with high user acceptance and it has gained much attention because of its good performance. Biometric characteristics are used to identify a person by measuring the behavioral and physiological characteristics. In single biometric technology, there are a number of chances for fraudulent activities. Multi-biometric system provides high accuracy than any other technologies. Combining left and right palm print images to perform multi-biometrics is easy to implement and can provide better results. Here an SVM method is used as the identification time of this system is higher than others. By feature extraction, LMR PCA IDA are extracted and these features don’t depend upon iteration method and hence the computation time is reduced and SVM works on clustering based method which reduces the computation time

Published by: Shruthi .N

Research Area: Signal Processing

Research Paper

169. Novel Approach of Text Classification by SVM-RBF Kernel and Linear SVC

In suspicion, characteristic dialect handling is an exceptionally brilliant strategy for the human-PC interface. Regular dialect grateful is once in a while alludes to as an Artificial Intelligence-whole issue since normal dialect distinguishing proof appears to include wide learning about the outside world and the capacity to control it. NLP has vital have regular qualities with the field of computational semantics and is frequently viewed as a sub-field of computerized reasoning. In this paper working two learning approaches knn and support vector machine (SVM) yet SVM gives importance great exactness, accuracy, review than KNN, SVC.

Published by: Gurvir Kaur, Er. Parvinder Kaur

Research Area: Artificial Intelligence

170. Fuzzy Based Stable Election Protocol for Heterogeneous Wireless Sensor Networks

Wireless Sensor Networks have been increasingly with the use of advanced methods to develop these kinds of networks in various fields like biometrics, weather monitoring, military applications etc. Wireless Networks are deployed in various regions and one of the key issues is that, the sensor nodes are largely dependent on the batteries which are fitted in them at the time of installation. In most of the cases the sensor nodes have to be largely dependent on the fixed non rechargeable batteries. Thus it is for utmost importance to save the energy as much as possible and preserve the network energy and hence its lifetime. There have been several routing protocols designed and all are primarily focused to provide maximum network lifetime by ensuring the efficient use of sensor node energy. Among these protocols the clustering based protocols are the most widely used and are extensively researched to devise new routing protocols to preserve the network energy. In this research work the main focus is to study the various available clustering based routing protocols and observe their rules and features. An attempt is also made to devise a new protocol based on Fuzzy Based Stable Election Protocol for heterogeneous networks. A simulated virtual environment is envisaged to be built in MATLAB to understand the network setup and implement the algorithm for an energy efficient routing. A number of protocols have been studied in depth in this research work. The proposed protocol have shown improvement in number of dead nodes and average energy per node as compared to the existing SEP protocol when a comparative study was done on similar simulation parameters on both the methods.

Published by: Nimisha, Faseeh Ahmad, Dr. K. K Sharma

Research Area: Computer Science

171. Review on Anticancer Activity of Medicinal Plants

This article has been prepared to review some medicinal plants used for the treating cancer disease. The plant sources of India are likely to provide effective anticancer agents. Herbs have a vital role in the prevention and treatment of cancer. Examples are provided in this review of promising bioactive compounds obtained from various plants with medicinal and other therapeutic uses. The photochemical exploration of these herbs has contributed to some extent in this race for the discovery of new anticancer drugs. In recent years owing to the fear of side effects people prefer to use of natural plant products for cancer treatment. This review also helps to summarize the diverse methodologies and various ways to evaluate the potential natural compounds having anticancer activity. Although drug discovery from medicinal plants continues to provide an important source of new drug leads, numerous challenges are encountered including the procurement of plant materials and their selection.

Published by: Manivel .G, Kandasamy C. S, Hariprasad .R, Baskar .K, Jegadeesh .S, Venkatanarayanan .R

Research Area: Anti Cancer Activity

172. Regularization of Contract Labour

There are many benefits for permanent employment and hence sometimes the triangular relationship is used as ruse to conceal the employer’s identity as the real employer, to deny employer-employee relationship and deprive workers of the benefits of a permanent employment. The courts order regularization of Contract Labour in case the contract is found to be a ruse to deny permanency to the Contract Labour. There is substantial ambiguity pertaining to the standards for regularization and test courts used to see if the contract is sham. This Article tries to adress this ambiguity

Published by: Arun Sasi

Research Area: Labour Law

173. Age Estimation Using Classifier Artificial Neural Network and Support Vector Machine Based On Face Images.

The most prominent challenge in the facial age estimation is lack of sufficient and incomplete training data. Aging is slower and gradual process therefore faces near close ages look quite similar this can allows us to utilize the face images at neighbouring ages with modelling to particular age. There are many potential applications in age specific human computer interaction for security control and surveillance monitoring. In the last few years biologically inspired features are used for human age estimation for face images but recently more focus put on method like scattering transform. The propose approach exploits scattering transform gives more information about features of the facial images. An efficient descriptor consisting scattering transform which scatters the gabor coefficients and pulled with Gaussian smoothing in multiple layer and is evaluated for facial feature extraction. These extracted features are classified using support vector machine and artificial neural network. Results for face based age estimation obtain by artificial neural network is more effective than support vector machine.

Published by: Rajan Vishnu Parab, Prof. Dattatray S. Bade

Research Area: Image Processing

174. Traffic Monitoring System Using IR Sensors

The project deals with counting the vehicle direction wise and also to alert the driver if there is any road block further ahead.system is implemented using two IR sensors in each signals and main roads.when the vehicle is sensed using first sensor the counter is incremented. When the second sensors sense the vehicle the counter is added to “vehivle count” list and the previous counter is decremented .it also stores the details of direction and location.the vishicle owner is informed about the traafic jam through a display screen placed in every main roads with the details of an alternate deviation

Published by: Deekshitha, Disha D, Malavika, Soumya

Research Area: Computer Science

175. Classification and Retrieval of Texture Images Using Gabor Filtering and Statistical Features

Content Based Image Retrieval (CBIR) is a developing trend in Digital Image processing. CBIR is used to search and retrieve the query image from wide range of database. Many features and algorithms can be used for efficient image retrieval. The features of CBIR as colors, shapes, textures etc. can be derived from image itself. This project represents the retrieval of images based on the texture images. The focus of project is on the images processing aspects and particular using texture features. With the help of Gabor filter features and some statistical feature of texture images we form a feature vector for extraction of features. For retrieval of images these features are useful. The most accurate result is obtained using Gabor features applied on Brodatz texture database. For comparing and finding similarity between features of query image and another image in the database is done by using Euclidean distance, Vector cosine angle distance and Manhattan distance. To analyze the better performance of retrieval of images these distances we plot the precision and recall graph with number of retrieved images respectively.

Published by: Vaishnavi Gadewar, Apoorva Deshmukh, Akshay Ekurge, Ashok Shinde

Research Area: Image Processing & Retrieval System

176. Voice Based Email for Blind People

Abstract - The advancement in computer based accessible systems has opened up many avenues for the visually impaired across a wide majority of the globe. Audio feedback based virtual environment like, the screen readers have helped blind people to access internet applications immensely. However, a large section of visually impaired people in different countries in particular, the Indian sub-continent could not benefit much from such systems. This was primarily due to the difference in the technology required for Indian languages compared to those corresponding to other popular languages of the world. In this paper, we describe the voicemail system architecture that can be used by a blind person to access e-mails easily and efficiently. The contribution made by this research has enabled the blind people to send and receive voice based e-mail messages in their native language with the help of a mobile device. Our proposed system GUI has been evaluated against the GUI of a traditional mail server. We found that our proposed architecture performs much better than that of the existing GUIS. In this project we use voice to text and text to voice technique access for blind people.

Published by: K. Jayachandran, P. Anbumani

Research Area: Android

177. An Object Tracking Mechanism in Wireless Sensor Networks

The continuously widening variety of Wireless Sensor Networks (WSNs) applications requires node this is certainly precise which needs efficient and error free localization practices. Localization methods created in past times are totally centered on really good computation this is certainly numerical of network variables such as for example transmission range, propagation form, transmitted or received power, delivering or arrival time, connection information etc. These variables are susceptible towards ecological presence and circumstance of hurdles in environment. As wireless sensor companies tend to be ubiquitous in general, localization is a factor this is certainly essential be fixed. Localization of a node that is unknown be identified through a collection of research nodes. In this work, we provide a novel hybrid localization strategy, which determines the location this is certainly exact of an unknown node through the mixture of both range free and range based practices.

Published by: Pinki Rathee, Sanjeev Indora

Research Area: Networks

178. Literacy Level of Muslim Girls in Uttar Pradesh

This paper main aims to find out the literacy level of Muslim girls in Uttar Pradesh and it also aims to compare the literacy level of Muslim girls in Uttar Pradesh between two census i.e. 2001 and 2011. The study is based on the secondary sources of data which has been collected from the census of India 2001 and 2011. In this paper, Researcher’s focused on the status of Muslim girls’ literacy rate in Uttar Pradesh. It is found that more than half i.e., 53.95 per cent of the total population of the Muslims in India is illiterate with 17.48 per cent literate people just for the name sake only. If we talk about Uttar Pradesh then we found that 50.59 per cent Muslim girls are literate in 2011 (as per census 2011) in which 47.04 literate in rural areas and 56.44 literate in urban areas. This show better result from the census report 2001 in which 31.58 Muslim girls were literate in rural areas and 47.31 Muslim girls were literate in urban areas. The results have revealed that the literacy level of Muslim girls in Uttar Pradesh is not satisfactory and needs special attention.

Published by: Pooja Singh, Dr. Meena Bhandari

Research Area: Education

179. Rural Road Pavement Performance Evaluation and Design

In this work a rural road is constructed and considered under the project of PMGSY from Utterbani to Marikhui, Purmandal Taluka ,Samba District, Jammu and Kashmir State, India for Pavement Performance Studies. The objective of the work was to conduct Pavement Performance Studies and on this road which includes Structural and Functional Evaluations and design of pavement.. Road inventory survey included the findings relating to properties of bitumen and soil, rainfall, temperature, properties of shoulder material, sub base, base and type of adjoining land etc. In periodic survey surface drainage rating, roughness value, sub grade moisture content has been investigated. In pavement condition survey, rut depth, longitudinal depression, cracking of bituminous layer, percentage of raveling, severity of potholes and area of patching has been measured. In the traffic survey different types of vehicles including commercial vehicles have been recorded for 24 hours X 3 days for the computation of MSA. In the axle load surveys, type of vehicle, number of axles and load on each axle will be recorded to determine the vehicle damage factor (VDF). In the non destructive structural evaluation, deflection studies would be done. The distresses observed on this road are a few percentages of raveling, road cutting, patching, potholes, and roughness. Comparison has been done considering pavement condition index (PCI). This paper attempts to address the issues relating to the design of such village road through which all round development of the district can be achieved.

Published by: Vivek Poonia, Mohit R. Raina, Naveen Kumar, Hitanshu Bhagat, Pravin J. Gorde, Yash Wanjari

Research Area: Civil Engineering

180. Secure Data Retrieval For Decentralized Disruption Tolerant Military Networks

Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Disruption- tolerant network (DTN) technologies are becoming successful solutions that allow nodes to communicate with each other in these extreme networking environments. Typically, when there is no end-to-end connection between a source and a destination pair, the messages from the source node may need to wait in the intermediate nodes for a substantial amount of time until the connection would be eventually established. The concept of attribute-based encryption (ABE) is a promising approach that fulfills the requirements for secure data retrieval in DTNs. Especially, Cipher text-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encrypt defines the attribute set that the decrypt needs to possess in order to decrypt the cipher text. Thus, different users are allowed to decrypt different pieces of data per the security policy.

Published by: Miss. S. Anitha, Miss. K. Induja, Miss. N. Ramya, Mr. R. Sathishkumar

Research Area: PHP

181. Designing and Performance Evaluation of Digital Video Tide-Marking Using 3D DWT Technique

Digital tide-marking is a way or technology that hides statistics right into a digital media. It’s far a two-manner which entails embedding and extraction. Video tide-marking approach is by some means much like picture tide-marking. This mechanism is used to overcome the hassle of security, copyright and content authentication of the digital media. The goal of this scheme is to create a tide-marking device to make a video comfier. In this paper, we proposed a virtual video tide-marking method with multi-degree discrete 3-D wavelet transform using MATLAB. Inside the proposed method, first, the video frames are extracted from the host video. Then, each body gets watermarked with multi-level discrete 3-D wavelet transforms the use of a key which is also known as embedding. After that, each watermarked video body get reconstructed. Watermarked video is obtained after reconstruction of watermarked video body. The effectiveness of body is evaluated using body satisfactory measures in opposition to some attacks.

Published by: Shekhar, Chetan Marwaha

Research Area: Digital Watermarking

182. QR Code Based Image Steganography

Image Steganography is the process of embedding secret data in images such that its existence cannot be detected by others apart from sender and the receiver. The present work focus on combination of cryptography and steganography to secure the data while transmitting over the network. This paper presents image steganography using Block based Discrete Wavelet transform for embedding of encoded secret message using Quick Response Code (QR) code into image while embedding process is further protected by Advanced Encryption Standard (AES) cipher algorithm. Efficiency of the proposed method was measured by Peak Signal-to-Noise Ratio (PSNR) .

Published by: Ashwini Warang, Dr. Archana Patankar

Research Area: Image Processing

183. Microstructural Characterisation of Thermal Spray Coatings on Stainless Steel AISI Ss-316 L

Thermal spray coating process is a surface modification technique in which a coating material like cermet’s, metallic, ceramic and some other materials in form powder are feed into a torch or a gun, the powder inserted into torch will be melted by high temperature developed by torch. Coating thickness can achieve by applying multiple layer of melted coated material. This paper aims at the study of microstructural characterisation of thermal spray single layer and multi-layer coatings. Coatings on the substrate were followed by Scanning electron microscopy to know the different phases present in the coated as well uncoated SS 316L. By seeing SEM result it’s found that single layer coating is not done properly. As compared to SEM result of single layer coated AISI 316 L multilayer SEM results is more accurate, there is no crack on the coating surface and there is much less porosity in the multilayer coated sample.

Published by: Hitesh Saini, Er. Pardeep Singh

Research Area: Mechanical Engineering

184. Wear characterisation of thermal spray coatings on Stainless Steel 316 L

Thermal spray coating process is a surface modification technique in which a coating material like cermet’s, metallic, ceramic and some other materials in form powder are feed into a torch or a gun, the powder inserted into torch will be melted by high temperature developed by torch. Coating thickness can achieve by applying multiple layer of melted coated material. This paper aims at the study of mechanical characterisation of thermal spray single layer and multi-layer coatings. Coatings on SS 316L is followed by the wear test .It has been found that the wear rate of base metal i.e. SS 316L is more than single layer and multilayer coatings of Ni-30Cr powder (. The multilayers have shown the maximum resistance to the wear rate.

Published by: Hitesh Saini, Pardeep Singh

Research Area: Mechanical Engineering

185. Analysis of Adaptive Neuro–Fuzzy Based Expert System for Parkinson’s disease Diagnosis

The real world Parkinson’s Disease(PD) is a chronic progressive neurological disease that affects a small area of nerve cells called neurons in the area of the brain called the substantia nigra. Medical Expert System technique is a solution of this problem. This paper summarizes regarding the classification of Parkinson’s disease by using adaptive neuro fuzzy inference engines. The learning focuses on diagnosis of P.D. by using adaptive neuro fuzzy inference system(ANFIS). The outcome obtained by fuzzy inference system is evaluated. MATLAB toolbox is designed for the simulation of the model. This also confirms that adaptive neuro is better option in which we use the symptoms of the patient which is suffering from Parkinson’s Disease and get a result.

Published by: Pawanpreet Kaur, Harshdeep Trehan, Varinderjit Kaur, Dr. Naveen Dhillon

Research Area: Computer Science and Engineering

186. Experimental Reduction of Combustion Noise at Idle Speed in a Single Cylinder CRDI Diesel Engine BT Optimizing the Fuel Injection Pressure

A new technique in the automobile is emerging nowadays to control the noise produced by the engine during a combustion process. The effort has been made by using electronics medium and injection pressure method to reduce the noise produced by the engines in case of the single cylinder. Fuel pressure and temperature has a great effect on the performance of engine and the noise which is produced by the engines during its operation and to control over this problem is challenging for the researchers so the emerging technique of ECU has been introduced in this study ti control the noise and eventually got good results and the results clearly showed the noise reduction by using these ECU control technique.

Published by: Rupinder Singh, Pardeep Singh, Jaswinder Singh

Research Area: Mechanical Engineering

187. Oral Ulcers -Diagnosis A Dilemma

Oral ulcers are characterised by a loss of the mucosal layer within the mouth. This loss may be acute or chronic, localised or diffuse. This is one of the most common oral problems presenting in primary care and can arise as a result of a number of disorders. Some of these relate to problems around the oropharynx but there is a wide variety of systemic disorders that can also give rise to these lesions. Recurrent aphthous stomatitis (RAS) is the most common chronic disease of the oral cavity, affecting 5-25% of the population. The underlying aetiology remains unclear, and no curative treatment is available. The present review examines the existing treatments for RAS with the purpose of answering a number of questions: How should these patients be treated in the dental clinic? This article reports a cases of recurrent apthous ulcer that presented with oral and lip ulcerations and highlights the importance of early diagnosis and proper management.

Published by: Dr. Smriti Ticku, Dr. Prashanth Rajaram, Dr. Beema Vinod Kumar, Dr. Purva Mansabdar

Research Area: Oral Surgery

188. An Improved Energy Efficient Threshold Based Routing For Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are being used extensively for monitoring and surveillance in several fields like military area, agricultural fields, forests, nuclear reactors etc. A Wireless Sensor Network generally consists of a large number of small and low cost sensor nodes powered by small non rechargeable batteries and equipped with various sensing devices. It is expected that it will be suddenly active to gather the required data for some times when something is detected, and then remaining largely inactive for long periods of time. So, efficient power saving schemes and corresponding algorithms must be developed and designed in order to provide reasonable energy consumption and to improve the network lifetime for WSNs. The cluster-based technique is one of the good approaches to reduce energy consumption in wireless sensor networks. The lifetime of wireless sensor networks is extended by using the uniform cluster location and balancing the network loading among the clusters. In this research work various energy efficient schemes apply in WSNs have been studied. The clustering based approach has been studied and a modified protocol has been implemented which is based on selection probability. The sensor only transmits when the threshold level is achieved for this selection potential. It selects a node as a cluster head if its residual energy is more than system average energy and have less energy consumption rate in previous round. The goals of this scheme are, increase stability period of network, and minimize loss of sensed data.

Published by: Govind Lal Yadav, Harikesh Pandey

Research Area: Networks

189. Secure and Constant Cost Public Cloud Storage Auditing with Deduplication

Information uprightness and capacity effectiveness are two essential necessities for distributed storage. Verification of Retrievability (POR) and Confirmation of Information Ownership (PDP) strategies guarantee information respectability for distributed storage. Evidence of Proprietorship (POW) enhances stockpiling proficiency by safely evacuating superfluously copied the information on the capacity server. Be that as it may, an insignificant blend of the two systems, with a specific end goal to accomplish both information trustworthiness and capacity proficiency, brings about non-minor duplication of metadata (i.e., validation labels), which repudiates the destinations of POW. Late endeavors to this issue present huge computational and correspondence costs and have likewise been demonstrated not secure. It requires another answer for bolster effective and secure information trustworthiness inspecting with capacity deduplication for distributed storage. In this paper, we take care of this open issue with a novel plan in view of strategies including polynomial-based validation labels and homomorphic straight authenticators. Our plan permits deduplication of both documents and their relating confirmation labels. Information respectability examining and capacity deduplication are accomplished all the while. Our proposed plan is likewise portrayed by consistent ongoing correspondence and computational cost on the client side. Open inspecting and group reviewing are both upheld. Henceforth, our proposed conspire beats existing POR and PDP plans while giving the extra usefulness of deduplication. We demonstrate the security of our proposed conspire in light of the Computational Diffie-Hellman issue, the Static Diffie-Hellman issue, and the t-Solid Diffie-Hellman issue. Numerical investigation and trial come about on Amazon AWS demonstrate that our plan is proficient and versatile.

Published by: Shubham Srivastav, Harikesh Pandey

Research Area: Computer Science & Engineering

190. The Experimental Reduction of Combustion Noise at Idle Speed in a 4 Cylinder CRDI Diesel Engine by Optimizing the Fuel Injection Pressure

The design and development of modern internal combustion engines is marked by a reduction in exhaust gas emissions and increase in specific power and torque. This paper aims at the study of noise reductuion in4-stroke common rail direct injection engine at idle speed. Idle speed is basically a speed of engine when vehicle is not running i.e not in motion . Now a days , this siuation oftenly comes at redlights ,in traffic and in waiting while parked outside a business or residence etc. This paper presents a study about the effects of Fuel Injection Pressure on the combustion process. The end conclusion of the whole experiment is that reduction of noise takes place by optimizing the fuel pressure. In this experiment idle speed is 850 rpm. Then we set the fuel pressure at 200 bar at this pressure the noise is minimum which is 56 db. Further increase the fuel pressure the noise of the 4 cylinder CRDI diesel engine increases gradually at different stages like at 300 bar fuel pressure the noise of CRDI diesel engine is 60db.

Published by: Jaswinder Singh

Research Area: Mechanical Engineering

191. Study of Polymer Matrix Composite with Natural Particulate/Fiber in PMC : A Review

The evolution of composite material has replaced most of the conventional material used for automobile, aviation and other area of construction. Moreover in the field of composite, a rapid growth has been noticed in the area of natural reinforced composite material. The reason behind this growth in the research field of natural reinforced composite is the advantages of them over the other reinforcement, such as low cost, and lower environmental impact. This paper gives a review of some of developments with a discussion of the problems with the present generation natural reinforced composites and prospects for further developments. Various physical and mechanical properties of natural reinforced polymer matrix composite have been studied with the combination of different natural reinforcement with polymer matrix. The issues discussed relate to the mechanical properties in general, environmental degradation and long-term durability. The aim of this review is to provide an overview of the properties, development and performance of natural reinforced polymer matrix composite.

Published by: Shivanku Chauhan, Rajesh Kumar Bhushan

Research Area: Composite Material

Review Paper

192. Review On Power System Reconfiguration and Loss Minimization for an Distribution Systems

— The quickly expanding development expenses of electrical creating stations and the fuel utilized in that have concentrated consideration on the need to diminish the power and vitality misfortunes in transmission and dispersion lines. A piece of these, the another essential region in which conveyance computerization is being connected is the region of system reconfiguration (NR). Concurring this system reconfiguration it alludes to the end and opening of switches in a power circulation framework with a specific end goal to modify the system topology, along these lines the stream of energy from the substation to clients end. There are two essential motivations to reconfigure a dispersion organize amid typical method of operation. These variables are relying on the present stacking conditions, reconfiguration may wind up noticeably vital keeping in mind the end goal to wipe out over-burdens on particular framework segments, for example, transformers or line areas. For this situation it is known as load adjusting. As the stacking conditions on the framework transform it might likewise wind up noticeably beneficial to reconfigure so as to diminish the genuine power misfortunes in the system.

Published by: Amandeep, Shavet Sharma, Akshay Rana

Research Area: Power System

193. Analysis of Heat Reduction through Roof Using Innovative Insulation Technique

Buildings have significant and continuously increasing impact on the environment. The power consumption for comfortable housing is ever increasing, which is adding additional burden to the power crisis of the world. The main objective of this project is to reduce the heat transfer through the building roof by providing thermal insulation, thereby reducing the heat load on the building. Moreover, if the building is to be air-conditioned then effective thermal insulation will reduce the power consumption drastically and saves lot of energy consumption. New innovative type of insulation is proposed in this work to reduce the heat transfer through roof structure by using seashells and coconut shells. The coconut shells and seashells layer along with normal tiles will provide very good thermal insulation and it will maintain low roof bottom surface temperature when compared with the normal conventional concrete roof without insulation. Two identical experimental rooms were constructed on the top of the college mechanical engineering department block and were instrumented with thermocouple and RTD along with data logger for obtaining continuous experimental results. The amount of heat reduction provided by the insulated roof structure was calculated using analytical method. Then the cooling load requirement for air-conditioning and the corresponding energy cost per year was calculated for the new CAD lab of the mechanical engineering department. The result showed the huge energy savings potential for this innovative thermal insulation technique. The electricity savings obtained is around 39.7%.when compared with conventional concrete roof. This innovative technique for providing thermal insulation to the building is more affordable and comfortable for living.

Published by: A. Muralimanohar, Dr. J. Amos Robert Jayachandran, S. Srinath

Research Area: Energy Managment

194. Comparison of Techniques for Diabetic Retinopathy Detection Using Image Processing

Diabetic retinopathy remains an alarming prospect to patients and disappoints doctors. Destruction of damaged retina by photocoagulation remains the primary treatment almost 50 years after its presentation. The diabetes pandemic requires new ways to deal with the pathophysiology and enhance the discovery, prevention, and treatment of retinopathy. This point of view considers how the exceptional life systems and physiology of the retina may incline it to the metabolic worries of diabetes. The parts of neural retinal modifications and debilitated retinal insulin activity in the pathogenesis of early retinopathy and the instruments of vision misfortune are accentuated. Potential intends to defeat confinements of current creature models and demonstrative testing are additionally given the objective of quickening treatments to oversee retinopathy even with continuous diabetes. Modified exudates disclosure and retina pictures gathering would be valuable for diminishing diabetic retinopathy screening costs and engaging standard examinations. We proposed the wander that applies numerical showing which enables light drive levels highlight, exudates acknowledgment, capable and revise revelation of retina pictures.

Published by: Deshmukh Prajakta, Chavan Shruti, Rodrigues Winnie, Shinde Ashok

Research Area: Image Processing

195. Segmentation of Brain MRI Using Multilevel Iterative Discrete PSO Based SVM

Image Segmentation is an important part of image processing which can be used to separate objects in images, ignoring the effects of lights and textures. The higher resolution and better spatial discrimination of soft tissues make MRI an effective method among other medical diagnostic modalities. The existing Particle Swarm Optimization (PSO) technique is not much effective approach since the space for feasible solutions of min – cut partitioning problem is excessively large, particularly when the number of vertices is in the thousands. In this paper, multilevel segregating method is combined with discrete PSO and developed Multilevel Iterative Discrete Particle Swarm Optimization algorithm (MIDPSO) for min – cut partitioning. MIDPSO works in three steps- partitioning phase, refinement phase, and recursive partition. The classifier Support Vector Machine (SVM), based on structured risk minimization is used here. By selecting the best features in the dataset; SVM increases the performance as well as reduces the computational time complexity. The proposed technique considers local as well as global to meet the requirement of precise segmentation. The proposed method aims in classifying the healthy and pathological tissues in the MRI images with high sensitivity, specificity and accuracy in least time.

Published by: Dhanya G. S, Dr. R. Joshua Samuel Raj, Sam Silva A

Research Area: Biomedical Image Processing

196. Digital Money Monitoring

Il an system is to generally audit or maintain the transaction of each and every amount of a individual (i.e) tracking by this way will avoid the black money. If this system is implemented throughout the country then there will be no words will be hearing like black money. the bit coin means that for each and every currency in our application surrendered by the user will be generating the unique id for every currency, when the amount is transferred from source to destination not only the amount and count of the currency will be taken in addition to that unique id will also be transferred so that can track the path of the currency travelling around .If the unique id is not in a rotation then can analyze which is the last account it has entered and from that account it is unseen in this way maintain the auditing.

Published by: S. Divya Bharathi, D. Divya, S. Barath, K. Sakthipriya, S. Vijayalakshmi

Research Area: Dot Net

197. Enhance Energy Efficient Low Cost WSN System for Precision in Agriculture Zone

Big amount of data is collected by the sensors from the end Subsequently, this considerably big amount of data must be processed, analyzed and stored in a effective ways. In this manner, an of computing resources and storage be provided to compute this large amount of data. To focused on introducing the latest technologies like as sensors, WSN to revise approaches to agriculture by collecting the data about the various parameters of soil, analyzes the data and performed the computations, giving the best optimal solutions for the farming. The application of computing in agricultural economy will open up a vast range of prospects, such as the vast storage of agriculture information, the cloud management of agricultural production process, the storage of agricultural economy information, early-warning and policy-making based on the agricultural products market, the tracing management of agricultural products quality

Published by: Prashant Suresh Mahure, Amit Fulsunge, Kartik Ingole

Research Area: Electronics and Communication

198. Laplace Transforms and Its Applications

Laplace transform is a very powerful mathematical tool applied in various areas of engineering and science. With the increasing complexity of engineering problems, Laplace transforms help in solving complex problems with a very simple approach just like the applications of transfer functions to solve ordinary differential equations. This paper will discuss the applications of Laplace transforms in the area of physics followed by the application to electric circuit analysis. A more complex application on Load frequency control in the area of power systems engineering is also discussed.

Published by: Manju Devi

Research Area: Mathematics

199. PSLQ Algorithm: A New Approach In Mathematics Experimental

While extensive usage of high-performance computing has been a staple of other scientific and engineering disciplines for some time, research mathematics is one discipline that has heretofore not yet benefited to the same degree. Now, however, with sophisticated mathematical computing tools and environments widely available on desktop computers, a growing number of remarkable new mathematical results are being discovered partly or entirely with the aid of these tools. For many years, researchers have dreamed of a facility that permits one to recognize a numeric constant in terms of the mathematical formula that it satisfies. With the advent of efficient integer relation detection algorithms, that time has arrived. This article briefly discusses the nature of mathematical experiment. It then presents a few instances primarily of our own recent computer aided mathematical discoveries, and sketches the outlook for the future.

Published by: Manju Devi

Research Area: Mathematics

200. A Review on the Page Recommendation Model using Machine Learning Approaches

The word “page or product range” means to rank the system to display the results and to provide suggestions to others. In day to day activities we rely on E-commerce ranking system such as the page indexing or product ranking of movies like reviews of movies from newspaper etc These E-commerce ranking basically help us to decide what we should opt for when we have multiple options An E-commerce ranking system (RS) helps people that have not sufficient personal experience or competence to evaluate the, potentially overwhelming, number of alternatives offered by a Web site In their simplest form RSs recommend to their users personalized and ranked lists of items Provide consumers with information to help them decide which items to purchase. In this paper, we have propsoed the improved model for the purpose of product recommendation with the higher accuracy and optimized elapsed time based parameters.

Published by: Ramandeep Sharma, Samarth Kapoor

Research Area: Computer Science

Research Paper

201. Spectrum Senesing by Cognative Radio with Hybrid Metaheuristics

Range detecting instruments empower Cognitive Radio systems to recognize Primary clients (PUs) and use range openings for Secondary client (SU) transmission. In this paper, exceptionally effective cost improvement of Particle Swarm Optimization is proposed i.e. PSO-ACO. Hybridization of Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO) essentially builds the location rate as Ant Colony Optimization (ACO) quickens from false minima which diminishes the false minima. With this, throughput increments upto 92% and mistake rate lessens upto 10-3. PSO-ACO hybridization altogether beats and fastly unite as a result of ACO advancement

Published by: Rahul Kumar, Kanchan Bala Jaswal

Research Area: WSN

202. Augmentation of Batching Plant Productivity without Affecting the Quality of Concrete

Ready mixed concrete (RMC) is the prime material required for buildings and Government & Non-Government infrastructure work, and it is exponentially growing industry in India. RMC is produced to meet client’s/customer’s requirements and its deliveries must be conventional to construction site. Therefore, due to technological operating constraints – the material cannot be prepared in advance and stored. To operate effectively the concrete production scheduling & truck dispatching are always handled by experienced staffs. This paper represents the constructive and unconstructive impacts due to geographical, political and regulatory differences. Also, various other factor like controlled and uncontrolled delays which occurs during preparation, transportation and utilization of RMC plants in India. Also, paper focuses on delay factors effecting batching plant by with stochastic mathematical models. The main objectives are (1) Identifying the sources of delay in concrete batching plant (CBP) (2) assessing their impact on production, time, cost and efficiency (3) how each factor can affect the rate cost of CBP in unit price. Researched data were collected for different batching plant sites to verify the designated model.

Published by: Sudeshna Wawhal

Research Area: Construction Management

203. ZigBee Based Real Time Weather Monitoring System Using MATLAB GUI

Weather monitoring is very essential to aviation services in real time. In this project, we are monitoring the atmospheric parameters such as Temperature and Humidity through the wireless system with the help of ZigBee module which is operating in 2.4GHz frequency and IEEE 802.15.4 protocol. The wireless system consist of two modules one is Transmitter and another one is Receiver module. The transmitter section consists of atmospheric parameters (i.e. Temperature and Humidity with real time), Microcontroller and ZigBee module. At the receiver section using Personal Computer to monitor the parameters and store them for the further process.

Published by: K. Tanveer Alam, Mahammad Dada .V

Research Area: Embedded Systems, Networking and Internet of Things

204. Virtual Reality a Communication Tool in Architecture Education

Learning experiences of the students of Architecture for the Design Studio from the first year of Architecture Education to fifth-year, students learning experiences as interrelational, perceive the experiences as transitional and understand that their learning experiences aid in the production of outcomes. Studio culture is generated partially by a student culture that encompasses interaction, these learning experiences are also affected by interaction. This study explores the meaning students make their learning experiences in the design studio, which are affected by interaction. A studio is a workspace where students explore a set of skills with or without the presence of an instructor. The instructor works with students during the designated class time and then students continue to work on their own to develop their core subject and the key activity of Architecture Education. Therefore, the Design studio is the most important piece in the set of subjects. It is the essential activity offering the main chance for the future architect to become a good designer To lay the foundation and to help accomplish the task of understanding the architectural design studio and student perceptions, the culture of architectural education and the architectural design studio culture need to be defined and described and a body of literature on learning needs to be understood, specifically focusing on how students learn and experience learning in learning environment. The participants in the design studio found that their learning experiences through interrelations perceived their learning experiences through transitions, and also described the experiential outcomes of their learning experiences. How students interact with one another, both academically and socially, is an example of a theme that can be categorized under interrelations. An example of a transition, which is moving from one perception to another, is moving from a perception of confusion to clarity. Interrelations, transitions and experiential outcomes are, therefore, the domains that overarch the categories and themes that emerge from the data.

Published by: Prof. Ismita Singh

Research Area: Architecture Education

205. Survey of Various Load Balancing Techniques in MANETs

Mobile ad hoc networks are category of wireless networks but in these networks the nodes are mobile in nature. The constantly moving nodes bring a lot of topological changes in the network. Issues like link breakage, energy consumption, and load balancing are considered while designing routing protocols or techniques for these networks. This paper describes various load balancing studies done by the authors in the past.

Published by: Megha Talwar, Chetan Marwaha

Research Area: Computer Science & Engineering

206. On Some Statistically Convergent Double Sequence Spaces Defined By Orlicz Functions

In this article we define different type of statistically convergent, statistically null and statistically bounded double sequence spaces on a semi-normed space by Orlicz functions. We study their different properties like solidness, denseness, symmetricity, completeness etc. We obtain some inclusion relations

Published by: Dr. Naveen Kumar Srivastava

Research Area: Functional Analysis

207. Bitopological Connected Graph

A graph G = (V, E) is called a bitopological graph if there exist a set X and a set-indexer f on G such that both f(V ) and f  (E) ∪  are topologies on X. The corresponding set-indexer is called a bitopological set-indexer of G. We prove the existence of bitopological set-indexer. We give a characterization of bitopological complete graphs. We define equi-bitopological graphs and establish certain results on equi-bitopological graphs. We identify certain classes of graphs, which are bitopological and define bitopological index β τ (G) of a finite graph G as the minimum cardinality of the underlying set X. We discuss about embeddingand NP-completeness problems of some classes of non-bitopological graphs.

Published by: U. Rajkumar

Research Area: Mathematics

208. Rural Development and Poverty Alleviation in India

Rural Development in India is one of the most important factors for the growth of the Indian economy. India is primarily an agriculture-based country. Agriculture contributes nearly one-fifth of the gross domestic product in India. In order to increase the growth of agriculture, the Government has planned several programs pertaining to Rural Development and poverty alleviation in India. The Ministry of Rural Development in India is the apex body for formulating policies, regulations and acts pertaining to the development of the rural sector. Agriculture, handicrafts, fisheries, poultry, and diary are the primary contributors to the rural business and economy.

Published by: Priyanka Sengar, B. K Upadhyay

Research Area: Rural Development

209. Seclusion, Categorization and Molecular Documentation of Microorganisms from Intestine of Gut from Fish by Using 16s R DNA Sequencing

The genomic DNA sequence of an organism specifies the features of its vender, but knowing this string of letters by no means tells you the exact Mother Nature of the conforming organism. This present study deals with to Isolation, characterization and molecular identification of Microorganisms from Intestine of Gut from fish by using 16DNA Sequencing. Bacterial strain was isolated and characterized using various biochemical tests and confirmed through molecular approach. Bacterial 16S r DNA gene was amplified using suitable primers. The amplified 16S r DNA gene sequence was compared with the sequence in NCBI sequence database and Phylogenetic and molecular evolutionary analyses were conducted using 16S r DNA sequencing. There are different organisms were isolated and identified the three of its bacillus spand remaining one is Pseudomonas sp. Bacillus sp. is a gram positive, oval shaped bacteria which forms white raised irregular colony. The Pseudomonas is a gram negative aerobic gammaproteo bacteria. The sequence when submitted to NCBI gene bank database using BLAST showed 99 – 100% maximum identityand query coverage.

Published by: R. Senthil Malar, Dr. A. Kumaraswamy, Dr. T. Selvamohan, N. K Parameswaran

Research Area: Bioinformatics

210. IOT Based Waste Management System for Smart Cities

In the Present Scenario we have seen that there are different waste boxes and over-weight trash cans in the urban gatherings and the area territories that are flooding an immediate aftereffect of wealth waste. It might prompt to a few issue and physical pain to the comprehensive group that take in the foul to stay away from such circumstance we are expecting to Design an IOT Base Waste Management structure to make our city neat and clean. In this research work we are making the correct precision level based and E-mail caution based framework giving quick chance of agreeable waste. To execute this framework, the running with sections, for example, 1) ARM Processor 2) IR sensors 3) RF Module can be utilized. We are giving in this idea on the off chance that we need to make a city clean, by then nature and the comprehensive group must be smart. So we are utilizing smart watches, Smart Phones and other Digital Display Devices to make the city clean.

Published by: Akhil Nair .R, Dr. P. Valarmathie

Research Area: Internet Of Things

211. Literature Review on Sugar Mill Coupling and It`s Bearing Materials

In sugar mill power from driver to top roller is transmitted by solid shaft coupling. After that development is power transmission mechanism lead to improve is crushing efficiency. In this literature serve is done on the all most on coupling development is study. For the latest coupling called as rope coupling with spherical plain bush required selection of bushing material. Non-metallic bushing material is study and by Appling AHP method material is sleeted Keywords— Sugar Mill, AHP, Link coupling, Nylon impregnated with 6% of oil, PEEK.

Published by: Vinod P. Hage, A. U. Gandigude, G. Iratkar

Research Area: CAD, CAM, FEA, Sugar, Mill

212. Designing and Performance Evaluation of a 3-Level Watermarking Based On Encryption and Compression

As the mobile handheld gadgets geared up with fingerprint sensors, it turns out to be important to protect the private records of a user (i.e., fingerprint image) in the remote applications. Virtual image watermarking is the process of hiding statistics in any shape (text, image, audio and video) in original image without degrading its visual quality. Watermarking is carried out for copyright protection of the authentic records. In this work, we have introduced a new concept with current gray-scale image watermarking strategies. The novelty of the method is that first we have compressed the cover image with the usage of wavelet compression method before going for the encryption of the same. After that we have encrypted the cover and watermark image that is based on random key array generation, the usage of consumer key, a few constants and fixed operations. The mixture of all 3 steps collectively made the proposed approach extra robust and more secure in term of watermarking as compression itself is pretty endorsed for facts transfer and information protection. Also, watermark is extracted with reverse application of the same steps. Some output parameters are also calculated to reveal the accuracy and robustness of proposed method. Those parameters are Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Correlation value between unique watermark image and extracted watermark image. The PSNR, MSE and Correlation values imply that the visual similarity of the signed and attacked images is right. Additionally, we've computed the behavior by clubbing the same watermark with different Cover images in terms of MSE, PSNR and Correlation Value and analyze the difference between authentic watermark and extracted watermark. The embedding algorithm is robust against common image processing operations. It is concluded that proposed algorithm is agreeably optimized, robust and show the development over different comparable said strategies.

Published by: Kirtika Gupta, C. S. Rai

Research Area: Data Security

213. Design and Analysis of Composite Tank with End Domes

The work is aims to establish an optimal design method of vacuum molded composite tank under internal pressure specifically for storage of LPG. In this geodesic path equation was used to calculate the variable thickness of the dome portions, instead of constant thickness throughout the structures. The head shape is obtained by the numerical solution of the elliptical integral. The finite element analysis was performed to identity of safest design cylindrical and dome portion of the structure. The stagnation of fiber matrix composite leads to the variable thickness dome. The experimental test of leak proof and the pressure test also carried out and the results also investigated.

Published by: Ramesh Kumar .M, S. Raja

Research Area: Composite Materials

214. Hiding Information in Encrypted Video Stream by Using Code word Technique

To preserving the privacy as well as maintain security of video it needs to be stored in an encrypted format. For copyright protection, access control and transaction tracking we use information hiding techniques, that can be embedded a secret message and secret image into a video bit stream. The quality of video in the absence of the original reference assesses by information hiding techniques. The edge quality information and the no of the bit streams processed in an encrypted format to maintain security as well as privacy. In this paper hiding information directly in the encrypted version of H.264/AVC video stream is proposed. The proposed scheme contains the three main parts, i.e. encryption of video, embedding secret message and extraction of secret message and video. After analyzing the H.264/AVC codec property, the code words of intra prediction modes (IPM), the code words of motion vector differences (MVD), and the code words of residual coefficients are encrypted. The data hider embeds additional data in the encrypted domain, they use the code word substitution technique. The code word substitution technique gives information without knowing the original video content. After decryption of video secret message remains hidden, its invisible to a human observer. The extraction of data can be done either in the encrypted or in the decrypted domain.

Published by: Gote Yogita Ram, Prof. Ashruba Korde

Research Area: Image Processing

215. Efficient Use of Safety and Emergency Management on a Construction Site

Construction Industry in India has changed drastically during the last few decades. It is the second largest employing sector next to agricultural sector, but first in terms of accidents close to the road accidents. From the construction of building simple structures, roads and minor civil work projects, the construction industry has changed significantly over the last few decades. Safety on construction job site has been ignored by construction companies worldwide and particularly in countries where labour force is required. Due to increasing numbers of reported accidents and injuries on construction projects, safety is becoming an important issue in construction environment today; also safety is usually discarded by its operator.

Published by: Makarand P. Garole, Uday Phatak

Research Area: Civil Engineering

216. Big Data in Cloud Computing

This paper aims to provide definition, characteristics, and classification of big data along with environment for carrying net analytics in clouds for Big Data application. The relationship between the big data, cloud computing, big data storage systems, and Hadoop technology are also presented. This paper provides a comprehensives review of the big data state of the art, characteristics, management and research challenging aspects.

Published by: Mythreyee .S, Poornima Purohit, Apoorva D.R, Harshitha .R, Lathashree P.V

Research Area: Big Data

217. Review on Load Balancing Techniques for Mobile AD HOC Networks

Mobile Ad Hoc network is a group of nodes or a collection of nodes; they communicate with each other without any central administrator. Life of node as well as network is directly proportional with battery capacity. Lifetime of the node usually depends upon the load over the node. If a node is overly loaded, that means it is forwarding more packets and hence it might die out soon. So load balancing is another aspect to be considered while designing the routing scheme for mobile ad hoc networks. This paper presents the survey of various studies regarding the load balancing in the mobile ad hoc networks.

Published by: Harpreet Rupra, Rasbir Singh

Research Area: Computer Science & Engineering

218. Performance Analysis of Various 4-Wheelers with IC Engines for Hybridization

A major portion of the vehicles used for transportation run on fossil fuels which is a non-renewable source of energy. It is estimated that we will run out of resources of fossil fuels in the next 25 years if the consumption continues at the same rate. Due to the rising demands for petroleum and the depleting resources, the cost of fuel has also increased. Another drawback of using these energy sources is the pollution that they cause which affects the environment and the health of the people. To reduce the dependency on fossil fuels and make use of the abundantly available natural resources there is a need to develop a vehicle which can make a transition between these two and hence reduce the pollution, cost of fuel thereby increasing efficiency. 164W of solar energy is received by every square meter of the earth’s surface on average. This can be utilized through solar cells to generate electricity which can be converted to motive energy to run an automotive. This can be done using hub motors which decrease the maintenance required as compared to the petroleum only cars. Since they derive the motive energy from solar powered batteries the need for refuelling is eased.

Published by: Hitha .P, Siri .S Sosale, Sushmitha .S, Rekha K. R

Research Area: Electronics and communication

219. Design and Fabrication of Automatic Fruits Peeling Machine

The purpose of this research is to design, fabricate, test, and evaluate the prototype of a semi automatic all fruits peeling machine. The design concept is that fruit peeling is accomplished by placing fruits between the rotating fruit holders which are placed horizontally. The machine parts contacting edible parts of the fruit are made of food-grade stainless steel. In operation, a fruits is placed in between the rotating fruit supporting holders which are designed to hold the fruit and cutting tool is fed slowly which is mounted on the screw rod and cut upper skin of fruit without damaging fruit .This type of machine are used for business purpose it has high cutting speed at very low input power

Published by: Praveen Kumar S. Nahata, Oruganti Santhosh, Poorna Chandra G. S, Utkrash Sahu, Manjunath Naik H. R

Research Area: Manufacturing

220. Eco-Ethological Study on Semnopithecus Entellus in Chitrakoot (Satna), Madhya Pradesh

Eco-ethological aspect of the Hanuman langurs were studied from September, 2012 to December 2013 at the various troops sites in Chitrakoot. For this study four bisexual troops were monitored to study the group size, age-sex composition and other ecological behavior patterns. In present investigations it was recorded that they feed on natural and provisioned food. Around thirty plant species were identified as food which ratifies their folivorous nature. Major circadian activities of Hanuman langur such as resting, walking, sleeping, feeding, grooming, mating and playing was also recorded. Inspite of a round the year breeding, observations on decreased birth rate in the Semnopithecus entellus envisage bad indicator for future of this endangered species was also discussed.

Published by: Manoj Kumar Mishra, Surya Kant Chaturvedi

Research Area: Wild Life Biology

221. Virtual Wardrobe

The Virtual Wardrobe system is designed to reduce the losses incurred by the sellers when the customer decides to return the clothes or wearable apparel purchased online when incorrect or undersize garments are delivered to them. This system plans to replace the traditional way of shopping by simply viewing at the pictures of the garments and wearable apparels.

Published by: Harshini .S, Gokul .S

Research Area: Artificial Intelligence

222. Electricity Generation Using Air Borne Wind Turbine

This paper presents a novel Air Borne Wind Generator. Magenn Air Rotor System (M.A.R.S), a type of Air Borne Wind Generator that is used to generate electricity. It rotates around a horizontal axis in response to the wind and the electricity is sent down with the help of tether which can be stored in batteries or can be used instantly. It generates clean renewable energy and is economical compared to the other conventional methods. The paper briefly presents the design and construction features. Advantage and disadvantages of the design Implemented is presented.

Published by: Bhaskar .T, Madhu Sudan Reddy, Basava S. Mannur

Research Area: Renewable Energy Resource, Electrical

223. Study of Tosca of Cloud Application with Its Services

With the advent of Cloud Computing, organizations are increasingly migrating their information and communication technology (ICT) resources to the cloud. Cloud computing is driving formidable change in the technology industry and transforming how to do business in around the world. [4] Using TOSCA, the cloud providers are able to define the interoperable description of services and their relationships, and to enable the portability and automated management across cloud platforms and infrastructures. However the verification of the cloud orchestration design with TOSCA is still crucial to ensure and alert when the safety properties of the cloud design are violated. In this paper, formal verification of cloud orchestration design is described and also presents the different services of TOSCA.

Published by: Snehal V. Raut, Dr. H. R Deshmukh

Research Area: Cloud Computing

224. Enhancement in Cooperative Positioning Using Ad-Hoc on Demand Vector Protocol in Vehicular Ad-Hoc Network

In a city environment, the routing protocol is designed for VANET. Obtaining not only shortest path but the most efficient path for the packet to reach its destination is the main goal in VANET. Packets are routed through the fastest path rather than the shortest path. Fastest path is considered as the shortest time for the packet to reach destination irrespective distance. While the shortest path is the path that adopted by routing protocol to a network condition and performs routing accordingly. VANET have transported system which consists real-time vehicle safety estimated traffic condition on real-time dense vehicle network. A number of safety models in vehicle applications such as collision avoidance, lane management, and emergency braking assistance system fully depends on accurate and reliable knowledge of vehicles positioning their one-hop node area. In this paper presents, the performance of evaluation of Ad-Hoc On Demand Vector Routing (AODV) protocol in terms of energy consumption, packet delivery ratio, average end-to-end delay, packet loss. In our approach, we propose the VBFR algorithm to improve the performance of the cooperative positioning. In AODV, the node inside each hop is allowed to communicate themselves and RSU to reach their destination node. This system considers each vehicle get to communicate with nearest node and RSU to transmit or receive the message like the emergency or update their position and send RREQ to them and wait for RREP after selecting a one-hop node in a forward direction.

Published by: Prachi Vasant Magare, Kailash T. Jadhao

Research Area: Electronics and Telecommunication Engineering

225. Designing and Performance Evaluation of Low Bit Rate Audio Streaming Over Wireless Personal Area Network

The IEEE 802.15.4 is a Personal Area Network well-known designed for programs like wireless monitoring and control of lights, protection alarms, movement sensors, thermostats and smoke detectors. IEEE 802.15.4 specifies bodily and media access manages layers that have been optimized to make certain low strength consumption. For the conversation among two nodes, best throughput for IEEE 802.15.4 is 250 kbps on a 2.4GHz band. However, because of header overhead, the done throughput is much less than 250 kbps. Also the range of nodes taking element in a conversation has a substantial impact on throughput. The best bit rate for Zigbee/IEEE 802.15.4 is 250 kbps for the 2.4GHz band. The bit rate of 250 Kbit/s consistent with the channel and cannot be fully used for the payload (audio records). There is an overhead associated with the manner that the conversation works. Numerous mechanisms have to be taken into account while estimating the powerful transmission rate. ZigBee has a layer shape, and every layer adds additional header statistics, in order that the payload at the quit is less than the quantity of information this is sent. The overall amount of more bytes relies upon at the layer from which the utility runs, and on the operating mode of the verbal exchange machine. The principle goal is to calculate maximum throughput for audio streaming the usage of IEEE 802.15.4 for 10 different nodes. IEEE 802.15.4 defines specific layers but right here, we do not forget the Physical layer (PHY) and Medium Access manage (MAC) sublayer.

Published by: Manoj, Gurpeet Kaur

Research Area: Wireless Personal Area Network

226. Design and Analysis of Hybrid Nanogrid

With pace of time there is a huge development in technologies. In recent time there is a concern of energy as right now fossil fuel is used but as population increasing in near future to meet demand it would be very tough that why we are focusing on renewable energy. Distributed energy resources based micro grid and Nano-grid framework is most technically viable bottom-top approach to sustainably meet ever-increasing demand of rural and urban communities. Recently the growth of DC operative home appliances like mobile and lap top chargers, ovens and hair dryer’s etc. are increasing and therefore a DC/DC converter is an efficient way to meet the electricity need from the local DER and helps in improving the system efficiency. In our dissertation we took three different section of solar panel and after that simulation carried out with help of buck boost converter and besides this MPPT algorithm (P & O method) for solar PV module and closed loop PI control system also used. The proposed methodology is to extract maximum DC power from solar PV system and it is directly fed to DC load or DC Nano grid. The simulation results demonstrate the buck boost converter application for maintain constant voltage at DC bus irrespective of variation of solar PV generation. Also it improves the system efficiency by reducing no. of conversions. In our dissertation work analysis of ploy crystalline, mono crystalline and thin film crystalline is done and got different simulation result.

Published by: Vijeta Pal, Sourabh Maheshwari, Ameer Faisal

Research Area: Nano Grid

227. Implementing Secure And Efficient Auditing Protocol For Cloud Storage

In cloud storage environment, data owners host their data on cloud servers and users can access the data from cloud servers. Due to the data outsourcing, this process of data hosting service introduces new security challenges, which requires an independent auditing service to check the data integrity in the cloud. Because, owner need to be convinced that the data are correctly stored in the cloud. Two-Party storage auditing system could not be guaranteed to provide proper auditing result thus Third-Party auditing is the better choice for the storage auditing in cloud computing. In this we try to evaluate ECC algorithm for encryption and decryption.A Third-Party auditor is capable to do a more efficient work and convinces both the cloud serviceproviders and the owner. There are chances of data being lost or get misplaced in cloud storage environment. For this we propose replication mechanism to third party auditing such that it will enhance the data availability. We divide a data file into fragments and replicate the fragmented data over the cloud nodes. Each of the nodes stores only a single fragment of a particular data file that ensures that even in case of a successful attack, no meaningful information is revealed to the attacker.Furthermore, the nodes storing the fragments are separated with certain distance to prohibit an attacker of guessing the locations of the fragments. Hence user will get the belief that his data is safely stored on the cloud and could retrieve data without any modification.To better protect data security, the first attempt to formally address the problem of authorized data deduplication.

Published by: Manisha L. Narad, Prof. Amruta Amune

Research Area: Cloud Computing

228. Homomorphism and Isomorphism of Rough Group

The chief objective of this study is to show the usefulness of Rough set theory in Group theory. The aim of this paper is to determine the definable and undefinable groups also construct the rough group ,upper rough group, homomorphism and isomorphism of rough group using rough set theory.

Published by: L. Jesmalar

Research Area: Mathematics

229. RER: Reactive Efficient Routing for Wireless Sensor Networks

In Wireless Sensor Networks (WSNs) the major challenge is to provide efficient and reliable communication between source and destination, especially in industrial WSNs (IWSNs) with dynamic and harsh environments. Hence, a Reactive Efficient Routing (RER) is designed to improve the routing protocol to provide efficient packet delivery against the unreliable wireless links. Here Dynamic Source Routing (DSR) protocol is used in the proposed system and a special technique called biased back-off scheme used to find a robust guide path through which cooperative forwarding opportunities are more. So, the data packets are sent to the destination efficiently. Performance of RER is measured using four parameters Bit error rate, Packet delivery ratio, Throughput and Control overhead packet through simulation.

Published by: Ranjan .V, Vishmitha K. V, Sushmitha J. V, Vidyashree R. Koti

Research Area: Computer Networks

230. Impact of Attacks on Permutation Only Image Encryption Scheme

Permutation is a commonly used primitive in multi- media (image/video) encryption schemes, and many permutation-only algorithms have been proposed in recent years for protection of multimedia data. In permutation-only image ciphers, the entries of the image matrix are scrambled using a permutation mapping matrix which is built by splitting and shuffling the part of the image. The literature on the cryptanalysis of image ciphers indicates that permutation-only image ciphers are insecure against ciphertext-only attacks and/or known/chosen- plaintext attacks. However, previous studies have not been able to ensure the correct retrieval of the complete plaintext elements. In this paper, we re-visited the previous works on cryptanalysis of permutation-only image encryption schemes and made the cryptanalysis work on chosen-plaintext attacks complete and more efficient. We proved that in all permutation-only image ciphers, regardless of the cipher structure, the correct permutation mapping is recovered completely by a making multiple combination of two encrypted image. To the best of our knowledge, for the first time, this paper gives a combination attack that completely determines the correct plaintext elements using a deterministic method. Also, the detection of hacker at adminside with the help of IP detection and blocking system is to be done in this system for future prevention of permutation attack.

Published by: Ambare Snehal Bharat

Research Area: Information Security

231. Comparative Study of Low Cost Adsorbents in the Elimination of Methylene Blue Dye from Aqueous Solutions

Textile industries consume large volume of water and chemicals for wet processing of textiles. As a result, produce large volumes of colored (dye) water as waste. The effectiveness of adsorption for dye removal from wastewaters has made it an ideal alternative to other expensive treatment options. The present study gives the preliminary experimental results using low cost adsorbents viz; plantain flower petals, banana peels, snake gourd seeds, and egg shell in the eliminating methylene blue dye from aqueous solutions. The effect of various factors on the adsorption of the dye was studied in batch mode which includes pH, concentration of adsorbent and dosage of adsorbents. The study revealed that plantain flower petals were very effective in the removal of methylene blue dye and about 99.7 % removal of dye was observed.

Published by: M. Padmaja, R. Pamila

Research Area: Environmental Engineering

232. Performance Evaluation of Modified Clipping and Filtering Method for PAPR Reduction

For providing high data-rate offerings over wireless channels, Multiple Input Multiple Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) gadget had been proposed in the latest beyond. This gadget affords the advantages of space-time coding and OFDM, when its miles mixed with area time coding. The MIMO-OFDM gadget also suffers from the excessive peak-to-average power ratio (PAPR) trouble. This happens due to the inter-symbol interference between the subcarriers of the communiqué system. Through the use of clipping and filtering the entire look for the number of sub-blocks and the rotation elements should be done, if you want to achieve top-rated PAPR discount. As the number of sub-blocks and rotation factors will increase, PAPR reduction improves. Because the quantity of sub-blocks will increase, the range of calculation additionally will increase. This case ends in growth the complexity exponentially which ends up inside the technique put off. PAPR reduction is collectively optimized in both the real and imaginary element by means of the use of Fast Fourier Transform (FFT) algorithm inside the modified Clipping and filtering scheme. In this work, a modified clipping and filtering approach is offered. This approach is combined with interleaving for PAPR reduction using Quadrature Phase Shift Keying Modulation (QPSK). The main objective of this technique is to keep away from the usage of any greater IFFTs and enhance PAPR reduction. Cumulative Distribution feature (CDF) of PAPR has been taken as an output parameter. The value of this parameter is plotted with respect to PAPR for present and modified techniques. MATLAB R2013a has been used as an implementation platform. Generalized MATLAB toolbox and wireless communication Toolbox has been used for implementation.

Published by: Komal, Manisha Sharma

Research Area: Wireless Communication

233. A Modular Feedforward Phase/Frequency Detector Design for High Speed PLL

Phase Frequency Detector (PFD) is convert the input analog signals into digital output by comparing both input signals in terms of phase and frequency. PFD is widely used in Phase lock loop (PLL) as a phase detector. This paper describes a fully functional modular Feedforward phase/frequency detector and to show the characteristics and behaviour of some PFD designs in order to improve some important aspects as the delay time and the power consumption in the classical model. Circuits are design using 180nm TSMC CMOS technology.

Published by: Raju Patel, Aparna Karwal

Research Area: VLSI Design & Embedded System

234. Performance of Strip Footing On Slope Stabilized With Piles

The present paper is the study of the performance of strip footing placed on sandy slope stabilized with a number of rows of piles at various locations. The parameters such as a number of pile rows and location of pile rows are varied. The length of piles, the diameter of piles, the spacing between two adjacent piles in a row and setback distance of strip footing were kept constant. The study revealed that provision of rows of piles along the slope improves the bearing capacity of strip footing. The bearing capacity increases as the number of rows of piles increases.

Published by: Surabhi S. Somwanshi, Dhatrak A. I, Thakare S. W

Research Area: Geotechnical Engineering

235. Performance of Equal Skirted Strip Footing Resting On Sand Slope Subjected To Lateral Load

Skirted foundations are considered a viable foundation type for a variety of offshore applications, facilities for the oil gas industry and structures where scour is major concern. In offshore structures, power transmitting cables and earth retaining structures, the lateral forces acting on the footings may be dominant. Thus there is need to study performance of skirted strip footings subjected to lateral loads. In the present study, static lateral load tests were performed to shed some lights on the performance of equal skirted strip footings. Different parameters were the effect of the ratio of depth of skirt to width of footing (d/B), the ratio of distance of footing from crest to the width of footing (b/B). From the results of laboratory tests, it was found that as the depth of skirt increases and as the distance of the crest to the width of footing increases, the ultimate lateral load carrying capacity of footings increases significantly.

Published by: Pratieksha S. Deshmukh, Thakare S. W, Dhatrak A. I

Research Area: Geotechnical Engineering

236. Improving the Speed of Data Leakage

A human mistakes are one of the main causes of data loss.in recent year,the leak of sensitive data have grown rapidly for a research institutions.The exposure of sensitive data in storage and transmission poses a serious threat to organizational and personal security. Commonly , information is content in storage and transmission for exposed sensitive data. Such an approach usually requires the detection operation to be conducted in secretly and leakages of the data is not able to predictable. However,detecting the data leak by scanning information or files some detectors are available in to the market.(e.g. Antivirus(AV),Network Intrusion Detection System(NIDS)). In this paper, for detecting large and inexact sensitive data patterns we uses a principal component analysis algorithm and advanced encryption algorithm.Our algorithm is designed for high detection accuracy.This detection is presented by parallel execution of sampling and AES algorithm.Our system is more efficient for detection of accuracy in recognizing transform leaks.We encrypt the important data from owner and receiver side and send the data leak detection result to the owner. We describe the high encryption form both side for getting high security and maintaining the secrecy.

Published by: Pooja A. Dagadkhair, Vidya Jagtap

Research Area: Information Security

237. A Survey on Contextual Operation using pair wise Ranking and COT for Recommender Systems

The interest for universal data preparing over the Web has required the improvement of setting - mindful recommender frameworks fit for managing the issues of data over-burden and data sifting. Contemporary recommender frameworks saddle setting - mindfulness with the personalization to offer the most exact proposals about various items, administrations, and assets. Nonetheless, such frameworks run over the issues, for example, scantily, cool begin, and versatility that prompt to uncertain suggestions. The cutting edge setting demonstrating techniques for the most part regard settings as specific measurements like those of clients and things, and catch importance's amongst settings and clients/things. In any case, such sort of significance has much trouble in clarification, e.g., it is not natural that a client is more important to weekday than end of the week. A few takes a shot at multi-area connection forecast can likewise be utilized for the setting mindful suggestion, yet they have constraints in creating proposals under a lot of relevant data. Persuaded by late works in characteristic dialect handling, we speak to every setting esteem with an idle vector, and model the relevant data as a semantic operation on the client and thing. Moreover, we utilize the relevant working tensor to catch the regular semantic impacts of settings. For the relevant data of every client thing communication, the logical operation can be demonstrated by duplicating the working tensor with idle vectors of settings. However a client thing collaboration results can be created under particular relevant data yet can't be yielded under other logical circumstances. So we propose a pairwise positioning imperative on the relevant data.

Published by: Sachin Madhukar Kolase, Prof. V. V Jagtap

Research Area: Wireless Networks and Communication

238. Design and Fabrication of Hand Operated Vacuum Cleaner

Dust removing problem is increasing more and more now a days. Hence it has become to provide some equipment for removing dust. There different types of waste, dry waste, vegetable waste, dust particles and soon. Generally, little equipment has been evolved in the market for cleaning the dust particles which are known as a vacuum cleaner. But these vacuum cleaner costs more in the market and not every human being can afford it. These devices need an electrical energy for its operation and not user-friendly. In India, especially in summer, there is power crisis and most of the cleaning machine is not used effectively due to this problem, particularly in bus stands. Hence it is a need to develop low-cost, user-friendly vacuum cleaning machine. In this project, an effort has been made to develop a manually operated vacuum cleaning machine so that it can be an alternative for conventional vacuum cleaning machines. In this work, modeling and fabrication of the vacuum cleaning machine were done using suitable commercially available software and components. The conventionally used materials were considered for the components of vacuum cleaning machine. These vacuum cleaners may be used in homes as well as in industry.

Published by: Pravesh Kumar Singh, Ritesh Kumar, Shashi Kant, Vivek Kumar Tiwari, T. Madhusudhan

Research Area: Design and Manufacturing

239. Current Regulations for Labelling and Advertising Of Nutritional Supplements

The present study is on to regulate the nutritional supplements for labeling and advertising. Nutritional are commonly used in the entire world. There is a tendency for underreporting their ingestion by patients and the magnitude of their use is under-recognized by Physicians. This review will mainly discuss single ingredients and complex mixtures of natural nutrition’s marketed under a single label and advertising. These create difficulties in developing and harmonizing nutrition information listings, which have broad international applications. For these reasons, the Codex guidelines on nutrition labeling play an important role to provide guidance to member countries when they want to develop or update their national regulations and to encourage harmonization of national standards with international standards. As for all products on the market, advertising for dietary supplements must be truthful and substantiated. The U.S Food and Drug Administration (FDA) and Federal Trade Commission (FTC) work together in regulating dietary supplement advertising. FDA is primarily responsible for claims on product labeling, while FTC has primary responsibility for claims in advertising, including print and broadcast ads, infomercials, catalogs, and similar direct marketing materials. These two agencies collaborate to ensure consistency in dietary supplement advertising regulation. The conclusion of current regulations for labeling and advertising of nutritional supplements was marketers of dietary supplements should be familiar with the requirements under both DSHEA and the FTC Act that labeling and advertising claims be truthful, not misleading and substantiated.

Published by: Yacob .M, Ramesh Reddy .K, Alagusundaram .M, Jayachandra Reddy .P

Research Area: Nutritional Regulations

240. Password Based Circuit Breaker with GSM Module

This project focuses on the safety of the lineman while working so they do not feel the sudden electric shock. As lineman has to deal with live wires very often, the chances of critical accidents are already very high. However, with the right amount of coordination among lineman and substation, a lot of these accidents can be avoided. The project aimed at providing the solution that ensures the safety of maintenance staff. Here, as soon as the lineman detect the fault in the electric line, an SMS will be sent to the substation staff, who would switch off the line and turn it on when the fault is being resolved, thus redusing the chances of accidents and saves the power as well. The proposed system is fully operated on a microcontroller.

Published by: Yash Pal Gautam

Research Area: Modify the Keyword Using the GSM Module Send the Message

241. Design and Implementation of HDLC Controller Using VHDL Code

High Level Data Link Control (HDLC) is a bit oriented full duplex data link layer transceiver. HDLC controller has a Flag register with 8-bit pattern of 01111110 which generates the state of HDLC protocol. This paper describes the HDLC controller design using VHDL code consists of 16-bit cyclic redundancy checker (CRC) and FIFO. FIFO used for transmits the data. HDLC controller implement on Spartan 6 Xilinx FPGA.

Published by: Payal Gupta, Pankaj Gulhane

Research Area: VLSI

242. Contextual Operation Using Pair Wise Ranking and Cot for Recommender Systems

The interest for omnipresent data preparing over the Web has required the improvement of setting - mindful recommender frameworks equipped for managing the issues of data over-burden and data separating. Contemporary recommender frameworks outfit setting - mindfulness with the personalization to offer the most exact proposals about various items, administrations, and assets. Be that as it may, such frameworks run over the issues, for example, meagerly, chilly begin, and versatility that prompt to loose suggestions. The cutting edge setting displaying strategies as a rule regard settings as specific measurements like those of clients and things, and catch importance's amongst settings and clients/things. In any case, such sort of pertinence has much trouble in clarification, e.g., it is not instinctive that a client is more pertinent to weekday than end of the week. A few chips away at multi-space connection forecast can likewise be utilized for the setting mindful proposal, yet they have restrictions in producing suggestions under a lot of logical data. Roused by late works in normal dialect handling, we speak to every setting esteem with an inactive vector, and model the relevant data as a semantic operation on the client and thing. Furthermore, we utilize the logical working tensor to catch the basic semantic impacts of settings. For the relevant data of every client thing collaboration, the logical operation can be displayed by duplicating the working tensor with inactive vectors of settings. However a client thing collaboration results can be produced under particular logical data yet can't be yielded under other relevant circumstances. So we propose a pairwise positioning limitation on the logical data. Our pair-wise positioning limitation uncovers the relative data among various logical circumstances and can be utilized to further improve setting demonstrating. Besides, we propose the top-n suggestion. It is another huge estimation of recommender frameworks.

Published by: Sachin Madhukar Kolase, Prof. V. V Jagtap

Research Area: Wireless Networks and Communication

243. Faculty Information System(FIS)

This is real time java based web application for faculty management. Where it consists of semester wise department time table. After completion of every session they should update student attendance with respective subject. Where absent students will be informed to their parents via text message. The system will generate the attendance percentage automatically day by day. The faculty can shift their session to another faculty when they are not able to take classes or busy in some other activities and the requested notification can be sent to the faculty mobile number.

Published by: Barge Sandesh, P. Phaniram Prasad, Sree Ananth Kumar .P, Musam Ahmed, Soumya .N

Research Area: Faculty Management

244. Online Internet Knowledge Management System for College

This project is aimed at developing an online intranet knowledge management system that is of importance to either an organization or a college. The system (KMS) is an Intranet based application that can be accessed throughout the organization or a specified group or Department. This system can be used as a knowledge or information management system for the college. Students or Staff logging should be able to upload any kind of technical information. Students or Staffs logging in may also access or search any information put up by others. Knowledge Management System should facilitate knowledge sharing from the grass root level like project teams to the entire college or organization.The Knowledge Management System is a web based system,which provides a platform for students and the staff of an organization or institution to upload any kind of technical or course related data.Students or Staffs logging in may also access or search any information put up by others. Knowledge Management System facilitates knowledge sharing from the grass root level like project teams to the entire college or organization.

Published by: Vikas .R, Venkateshwar .A, Nikesh Reddy, Tilak Kumar, Ranjeet .H

Research Area: Applications Of Knowledge Management

245. A Review E-Mail Spam Detection and SVM Classfication Techniques

Today emails have become to be a standout amongst the most well-known and efficient types of correspondence for Internet clients. Hence because of its fame, the email will be misused. One such misuse is the posting of unwelcome, undesirable messages known as spam or junk messages. Email spam has different consequences. It diminishes productivity, consumes additional space in mail boxes, additional time, expand programming damaging viruses, and materials that contains conceivably destructive data for Internet clients, destroy stability of mail servers, and subsequently clients invest lots of time for sorting approaching mail and erasing undesirable correspondence. So there is a need of spam detection so that its outcomes can be reduced. In this paper, we show different spam detection techniques

Published by: Shradhanjali, Prof. Toran Verma

Research Area: Data Mining

246. E-Mail Spam Detection and Classfication Using SVM and Feature Extraction

Today emails have become to be a standout amongst the most well-known and efficient types of correspondence for Internet clients. Hence because of its fame, the email will be misused. One such misuse is the posting of unwelcome, undesirable messages known as spam or junk messages. Email spam has different consequences. It diminishes productivity, consumes additional space in mail boxes, additional time, expand programming damaging viruses, and materials that contains conceivably destructive data for Internet clients, destroy stability of mail servers, and subsequently clients invest lots of time for sorting approaching mail and erasing undesirable correspondence. So there is a need of spam detection so that its outcomes can be reduced. In this paper, propose a novel method for email spam detection using SVM and feature extraction which achieves accuracy of 98% with the test datasets.

Published by: Shradhanjali, Prof. Toran Verma

Research Area: Data Mining

247. A Survey Paper on Approaches of Natural Language Processing (NLP)

With the increasing usage of the Web and other text application areas, the demands in both text mining and natural language processing (NLP) have been increasing. Researchers in text mining have hoped that NLP—the attempt to extract a fuller meaning representation from free text—can provide useful improvements to text mining applications of all kinds. The primary goal of Natural language processing (NLP) is to implement within computers the skill to understand a normal human language or natural language. It is related to the field of computer- human interaction. One of the motivation of NLP is for the society whose access to web information is obstructed simply by their inability to use key-board and operating system. Natural language comes under the domain of artificial intelligence with the goal of understanding and creating meaningful expressions in human-language. Artificial intelligence is the capability of a machine to imitate intelligent human behavior .Therefore NLP uses Artificial Intelligence, and is used to recover information in data mining. This paper presents a survey on Natural language processing (NLP) and its approaches.

Published by: Samta Tembhekar, Monika Kanojiya

Research Area: Natural Language Processing

248. Geospatial Based Study to Predict Future Shoreline Positions from Historical Data for a Part of Palk Bay Coast, South India

The coastal zone has been receiving tremendous attention of the geoscientific community worldwide, as 70 percent of global population, over two third of world’s mega cities, huge industrial complexes, major economic zones, etc., are concentrated along global coast. Developing and most populated country like India changes along the shoreline and coastal environment due to coastal process are the directly impact coastal economic development and land management (Welch et al. 1992; Stokkom et al. 1993). Hence, the present study has focuses to study the shoreline modification of 43 years of periods between 1972 and 2015. For attempting of this unique freely available software Digital Shoreline Analysis System (DSAS) is used which works within the Environmental Systems Research Institute (ESRI) Geographic Information System (ArcGIS) software (Ref). Rate of shoreline change statistics for 43 years of duration between 1972 to 2015 has been calculated using LRR model. In addition, using EPR model to predict future shore line positions in Palk bay. Thus the present study has been calculated from chronological observations of different satellite datas and disastrous impacts like tsunami and storm have not been taken into consideration (Mukhopadhyay et al. 2012; Fenster et al. 1993).

Published by: Kumara Ganesh .U

Research Area: Remote sensing

249. Experimental Investigation of Hardness Value of Coir Fiber/Epoxy Resin Composite

Composite materials are emerging chiefly in response to fulfill demands from technology due to rapidly advancing activities in aircrafts, aerospace and automotive industries. Natural fibers have recently attracted the attention of scientists and technologists because of the advantages that these fibers provide over conventional reinforcement materials, and the development of bio fiber composites has been a subject of interest for the past few years. The present work focuses on investigation of hardness value of coir fiber/epoxy resin composite at 10%, 15% and 20% volume fractions of coir fiber and different fiber lengths 10 mm, 20 mm and 30 mm. Initially alkalization process consisted of immersing coir fibers in a 1% (v) NaOH aqueous solution for 6 hrs to improve physical properties of coir fiber. The test specimens were prepared and tested according to ASTM standards for micro hardness testing. The experimental results shows that with increase in volume fraction and fiber length, the hardness of composite increases and better hardness value is obtained at 20% volume fraction and 20 mm fiber length.

Published by: Mr. Bochare R. H, Prof. Gidde R. R

Research Area: Composite Material

250. Averaging Representation of Standard Face Images and Recognition by KPCA and GFMTAveraging Representation of Standard Face Images and Recognition by KPCA and GFMT

Face recognition has received substantial attention from both research communities and the market, but still remained very challenging in real-time applications. This texture mapping of the face images to be morphed to a standard shape. Triangulation of face images with face key points image-averaging technique to derive abstract representations of known faces. This standard shape improves the probability of recognition of faces. Glasgow Face Matching Test (GFMT) and Kernel PCA on image averages appear to preserve face information. Thus the approach with KPCA and GFMT has improvement in efficiency with constraints.

Published by: Jagan Kumar, Geetha

Research Area: Computer Science Engineering

251. Current Trends in Regulatory Authority Actions against Misbranded and Adulterated Drugs

Globally every country is the victim of misbranded or adulterated drugs, which result in life threatening issues, financial loss of consumer and manufacturer and loss in trust on health system. For minimizing adulterated and misbranding drugs or not of standard quality drugs, there is urgent requirement of more stringent regulation and legal action against the problem. The adulteration and substitution of crude drug is a burning problem. substitution is helpful in places where unavailability of particular crude drug and or unwanted adverse effects of desired crude drug are there and have a choice of other drug with similar pharmacological effect and less unwanted after effects. But in most cases, it is unacceptable because the conversion of authentic drug into substandard drug may cause variety of adverse effects from mild and moderate to severe life threatening reactions. So, understanding of all the ways of adulteration and substitution is necessary to rectify this illegal act and maximizing consumers' safety. However, India has taken some preventive steps in the country to fight against the poor quality of regulatory organization drugs for protecting and promoting the public health.

Published by: Doni Prakash Kumar, Umasankar .K, Alagusundaram .M, Jayachandra Reddy .P

Research Area: Drug Regulatory Affairs

252. Current Trends in Follow up Procedures with MOH for the Registration of the Pharmaceutical Products

Regulatory Authorities in both developed and developing countries share the responsibility of ensuring the access of safe and effective medicines to patients. For better treatment safety and efficacy for the drugs must be justified and rationalize for public security. The quality, safety, efficacy data has its own importance in the registration dossier. The International Conference on Harmonization (ICH) Common Technical Document (CTD) can serve as a resource for most local Marketing Authorization (MA) applications. Additionally a significant amount of mandatory and highly country specific documentation require strategic planning and allocation for successful and timely local approvals. Regulatory involvement in the drug approval process which directly/indirectly accelerated the launching of drug into market. The regulatory documents whether in-house of documents to be submitted to regulatory authorities should be carefully reviewed by the skilled personal to minimize raised by the regulatory agencies and speed up the approval process.

Published by: Satyanarayana Reddy Bijivemula, Alagusundaram .M, Jayachandra Reddy .P

Research Area: Drug Regulatory Affairs

253. Emerging Issues and Challenges in Banking and Financial Services on Indian Economy- Post Demonetization

The Government of India announced the demonetization of all Rs 500 and Rs 1,000 paper money of the Mahatma Gandhi Series On 8 November 2016,. The government claim that the action would stop the shadow (process of people making, selling, and buying things) and crack down on the use of illegal and (make fake money or goods) cash to fund illegal activity and terrorism. The sudden nature of the announcement and the lengthy cash shortages in the weeks that followed has created noteworthy disruption throughout the (process of people making, selling, and buying things), threatening money-based output. The move was heavily criticized as poorly planned and unfair, and was met with protests, lawsuits, and strikes. The purpose of this paper is to describe the changes that are happening in Indian Banking and related to managing money part/area as a hit/effect of demonetization. In trying to (ask lots of questions about/try to find the truth about) factors which may account for never-before-seen change, this study raises the pro's and con's of currency demonetization in different (related to managing money) Banking parts/areas. Data were collected through surveys that were mailed out to no. of people (who were part of a study, etc.) in Hyderabad. People (who were part of a study, etc.) in the study completed the survey (without revealing his/her name) and filled out a separate permission-related form. People who responded have appointments in a variety of departments, including Banking, Finance, Capital markets and Insurance parts/areas. People who responded were from variety of (related to managing money) Institutions from both private and public institutions, the majority being research oriented. To protect the (not knowing or telling someone's name) of the people who responded, we are not capable to list the institutions here or to further identify them. Secondary Data is collected from Internet and Newspapers. With the centre's decision to throw out/cancel old currency notes of Rs 500 and Rs 1,000 on November 8, 2016, the (related to managing money) part/area is now supporting structure itself to deal with the move's hit/effect. Experts say that it is a good move as it will bring more formal money in the (related to managing money) part/area.

Published by: V. Kanakalatha

Research Area: Management

254. Utilization of Demolished Brick & Marble Waste in Concrete for Partial Replacement Of Coarse Aggregate

The demand of construction material is increasing every day. Concrete is widely used in construction. In this research waste Brick & Marble is used as coarse aggregate produced from demolition of building which is waste material. We can use this waste material as coarse aggregate. Waste Brick and marble are vary economic as compared to natural aggregate & reduce the waste generated by demolition of building. This study aimed to investigate the suitability of using brick ballast and marble waste in concrete. Three replacement levels 10%, 20% and 30%, were compared with the conventional concrete. The tests on concrete showed that the mechanical properties (compressive and splitting tensile strengths) of concrete containing waste brick ballast and marble ballast were well comparable to those of the concrete without brick ballast. The production of normal aggregates and building stones through quarrying is an expensive process. Quarrying involves deep excavation and blasting of rocks. This has created an unpleasant environment by leaving scars on land. Brick ballast and marble waste products chips when crushed to the required nominal sizes such as 10mm, 14mm, 20mm, etc. provide a rough and irregular surface which aids in bonding of cement paste and the aggregate. Therefore the bond strength of concrete is likely to be increased when these aggregates are used. Careful consideration of the water absorption of brick ballast aggregates will be taken in the mix design to ensure that the workability of the mix is achieved.

Published by: Md. Mamun, Zeeshan Khan, Amir Mirza Baig

Research Area: Civil Engineering

255. FPGA Implementation of Built In Self Repair Technique for Hard & Soft Errors in Memories

Anything that changes the normal operation can be defined as an error in a memory. They can be of two types: - Soft errors & Hard errors. Soft errors are caused by external elements (such as radiation environments, electrical noises etc.) outside of the designer's control. Hard errors are mainly due to manufacturing defects or due to unknown sources. Since an error in the memory can affect the whole system, error detection & correction techniques are important. Our objective is to detect and correct errors in offline stage and in field usage. During offline test stage, BIST (Built in Self-Test) module will check for the errors in the entire memory. If any fault is detected, SEC-DED (Single Error Correction Double Error Detection) module will be initiated to correct one error. If there exits more than one error, reconfiguration module will remap the faulty cells with the spare memory cells. During the field usage, if any error occurs, the controller will categorize the errors to three types and apply different techniques to correct them. The whole system is implemented in FPGA and simulation results are noted.

Published by: Sojy Yacob, Anu C. Kunjachan

Research Area: VLSI

256. Effect of Green Gram FLDs on income of the among Green Gram Growers in Dewas District (M.P.)

Green gram is an important pulse crop in our country after chickpea and pigeon pea, cultivated in three different seasons’ viz., kharif, rabi and summer. India is the largest producer of green gram that accounts for 54% of the world production and covers 65% of the world acreage and it is grown on about 3.70 million hectares with annual production of 1.57 million tonnes. Green gram is grown in the Dewas distric (M.P.). the study was conducted in Dewas district, where FLD was conducted by ATMA Dewas M.P. during 2015-16, six villages and 120 green gram growers had benefited by this programme. All the beneficiaries were selected purposively for the study. The mean income of beneficiaries after FLD was Rs. 28.69 thousand which was found significantly higher than mean income of beneficiaries before FLD (Rs.15.56 thousand). Majority of the beneficiaries after FLD were in high income level category whereas beneficiaries before FLD in low level income category.

Published by: Kavita Padiyar, Dr. Sandhya Choudhary, Dr. Abhay Wankhede, Dr. V. K Swarnakar

Research Area: Agriculture

257. Application of Graph Theory in Matrix Representation

Graph is completely determined by specifying either its adjacency structure or its incidence structure. These specifications provide for more efficient ways of representing a large or complicated graph then a pictorial representation. As computers are more adept at manipulating numbers than at recognizing picture. It is standard practice to communicate the specification of a graph to a computer in matrix.

Published by: Sanjay Kumar Bisen, Dr. Arivnd Kumar Yadav

Research Area: Mathematics

258. Production of Bio-Ethanol from Biomass (Press Mud)

This document gives formatting instructions for authors preparing papers for publication in the Proceedings Bioethanol is a renewable; eco-friendly energy source can be produced from bio-mass. Increasing the use of bio-ethanol for energy generation purposes is of particular interest now a day because they allow reducing the Greenhouse Gases (GHG). The production of low cost ethanol by using lignocelluloses material basically the sugar industry wastes like bagasse and press mud. Press mud was characterized as moisture (70-75%), ash (18.25%) and protein content (1.68 g/L). Press mud contains sufficient amount of cellulose (22.3%) and hemicelluloses (21.67%) so it has allure for use as a potential feedstock. Press mud drying study was also carried out to avoid microbial spoilage and increase storability. The acid hydrolysis of press mud with optimized parameters (H2SO4, 1.5 %; solid to liquid ratio 1:5 and time 15 min.) resulted in sugar release of 21 g/L. Furthermore, the activated carbon detoxification technique was carried out to remove phenolics, which are destructive to fermentation process. The batch fermentation of detoxified press mud using saccharomyces cerevisaie NRRL Y-12632 (pH-4.5, Temp- 28°C, RPM- 120, Time- 96 hrs.) resulted 11.65 g/l of total solvents. Hence, clean and green, effective utilization of press mud for bio-ethanol production successfully achieved.

Published by: Sangram S. Pawar, Dr. Prakash Chavan, Dr. Sandeep Bankar

Research Area: Chemical Technology, Biotechnology

259. Home Automation Based On IOT

Home Automation using cloud network is a system that uses computers or mobile devices to control basic home functions and features automatically through internet from anywhere around the world, an automated home is sometimes called a smart home. This network uses a consolidation of a mobile phone application and PC based program to provide the means of user interface to the consumer. The home automation system differs from other system by allowing the user to operate the system from anywhere around the world through internet connection. In this paper we have developed a Home Automation system that employs the integration of multi-touch mobile devices, cloud networking, wireless communication, and power-line communication to provide the user with remote control of various lights and appliances within their home. This system uses a consolidation of a mobile phone application, handheld wireless remote, and PC based program to provide a means of user interface to the consumer. The home automation system differs from other systems by allowing the user to operate the system without the dependency of a mobile carrier or Internet connection via the in-home wireless remote. This system is designed to be low cost and expandable allowing a variety of devices to be controlled

Published by: A. Mathi, P. Thilagavathy

Research Area: IOT

260. Detection and Removal of Shadows for Side Scan Sonar Images By Effective Image Processing Algorithms

This paper proposes the designing of a effective image processing algorithms for removal of shadows generated around the image. Usually Side Scan Sonar is used for ocean investigations like surveys for marine archaeology, mining, drowned objects at the sea floors,pipeling,underwater communications, fisheries research, environmental studies etc.This paper make use of Fuzzy C-Means Clustering for shadow region detection and Inpainting algorithm to compensate the shadow region. Thus clear image can be obtained.

Published by: Vikas .A

Research Area: Image Processing

261. A Review on Static Analysis and Material Optimization using FEA of Centrifugal Pump Impeller

Centrifugal pumps are simplest equipment used in any process plant. Centrifugal pumps are commonly used in processing plants, water supply plants, steam power plants, oil refineries, etc. Its purpose is to convert energy of an electric motor or turbine into the kinetic energy and then into pressure energy of a liquid that is being pumped. The energy changes take place with the help of two main components i.e. the impeller and the volute or diffuser. The impeller is the rotating component that converts input energy into the kinetic energy. In this paper literature survey is done on centrifugal pump impeller and its design and structural/static analysis using FEA Software’s for different materials.

Published by: Ghanshyam G. Iratkar, A. U. Gandigude

Research Area: FEA

262. MYPAL-A Fingertip Technology Using Cloud Computing

myPAL app is a hotel app that will be active on guest phone once he/she enters the checks-in number and thereafter the guest can avail all the information regarding the facilities provided by hotel. Guest can request for any services communicating directly to the respective department in hotel. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures.This communication and access to hotel services will be disconnected automatically from guest phone once the guest checks out from hotel. It is developed in visual studio 2015 and powered by SQL server 2014. As the data is stored at cloud so the data is completely secured. It also artificial intelligence features that is voice recognition. This feature will be benefit for those who has problem in speaking. They will directly connect to app and can avail all the services of hotel and guest can view all real time services and promotions.

Published by: Heena Batra, Parul Tushir

Research Area: Cloud Computing

263. Pneumatic Based Auto Railway Gate Control System

There are many railway crossings which are unmanned due to lack of manpower and unavailability of electricity needed to fulfill the demands. Hence, many accidents occur at such crossings, since there is no one to take care of the functioning of the railway gate when a train approaches the crossing. This paper describes the automatic railway gate control system using pneumatic cylinder with sensor assistance for saving precious human lives and preventing major disasters in railway track. Here pneumatic power is used so that it can be efficient in the remote area also.

Published by: Jimmi Kumar Bharti, Akash Bhardwaj, Akhil Das, Mishal Raj

Research Area: Mechanical Engineering Automation

264. Analysis of Sino-Nasal Diseases Causing Proptosis

ABSTRACT: Objective: To analyse different sino-nasal diseases causing proptosis in patients presenting in ENT department. Study Design: Retrospective descriptive study. Settings: Department of ENT and Head & Neck surgery, Allied Hospital, Punjab Medical College Faisalabad. Period of study: Two years (June 2014 to May 2016). Patients and Methods: This study consisted of 30 patients who presented with history of proptosis because of some sino-nasal disease. Inclusion criteria: Patients having unilateral or bilateral proptosis of either sex with some lesion in the sino-nasal region. Exclusion criteria: Patients with proptosis due to endocrine and ophthalmological causes. Data Analysis: SPSS software, version 10 was applied to analyse the data. Chi square test was used to analyse the data. Results: Out of 30 patients; 56.6% were males and 43.4% were females ranging from 06 to 67 years with mean age of 34.3 years. In this study 70% of the patients had unilateral proptosis while 30% patients presented with bilateral proptosis. Different sino-nasal diseases causing bilateral proptosis were observed in this study. We found bilateral allergic nasal polyps in 3.3%, bilateral allergic fungal rhinosinusitis in 16.6% and both allergic nasal polyps and fungal rhinosinusitis in 10% of the patients. The remaining 70% of the patients having unilateral proptosis had nasal polyps in 6.7% , allergic fungal rhinosinusitis in 10% and both nasal polyps and fungal rhinosinusitis in 6.7% of the patients. Fungal ball in the maxillary sinus was diagnosed in 6.7% of the patients. Among 15 patients with fungal disease and proptosis 10 patients (66.7%) were immunocompetent whereas the remaining 05 patients (33.3%) were immunocompromized and metabolically moribund. Fronto-ethmoidal mucoceles in 6.7%, juvenile nasopharyngeal angiofibroma in 6.7%, inverted papilloma in 13.3% and malignant growths of nose and paranasal sinuses were diagnosed in 13.3% of the patients. 16.6% patients were smokers, another 16.6% were diabetic and 13.3% of the patients had hypertension. Treatment: All the patients underwent different surgical procedures to treat the basic pathological lesions causing unilateral or bilateral proptosis aiming at total clearance of the disease and orbital repositioning. Conclusion: Undoubtedly a number of sino-nasal diseases can cause either unilateral or bilateral proptosis but fungal infection of the nose and paranasal sinuses is quite a common cause and is increasing day by day even in young, healthy otherwise immunocompetent patients. These patients need awareness programs regarding importance of early diagnosis and prompt treatment to prevent fungal rhinosinusitis and hence to manage proptosis.

Published by: Dr. Naeem Akhtar, Dr. Adeel Niaz, Dr. Muhammad Waqas, Dr. Muhammad Anees -ur- Rehman

Research Area: OTO-Rhino-Laryngology

265. An Empirical Analysis of the Influence of Reformative and Rehabilitative Methods for Juvenile Delinquents in India

This research paper discusses the contemporary rehabilitative programs and reformative methods employed to support juvenile delinquents and examine the measures required for their re- existence into the mainstream society. In particular, this research studies the techniques, the rehabilitative programs and reformative models to evaluate the efficacy of such programs in addressing the personal requirements for juvenile delinquents. The major examples of the techniques, rehabilitative programs and therapeutic models are: training skills required to sustain in coordination, placing them in jobs, providing housing and infrastructure facilities, treatment for substance abuse, social connectedness involving peers and family and lastly proper therapeutic treatment.

Published by: Sonia Shali

Research Area: Social Science and Humanities

266. Review and Study of Water Hyacinth and Their Application on Environment

Eichhornia crassipes, commonly known as (common) water hyacinth, is an aquatic plant native to the Amazon basin, and is often a highly problematic invasive species outside its native range. Day by day growth of water hyacinth is increases in maximum amount and it is big challenge to control it. As per observation it is clear that actual application of water hyacinth is useful in number of sector but no one can studied it’s adverse effect on environment. There are no.of research was carried out on that still it is not stated that how it will effect in environment. This paper just go for review of water hyacinth at different aspect

Published by: Shubhangi A. Lakade, Sagar M. Gawande

Research Area: Civil Engineering

267. Current Regulations for Herbal Products

Herbal medicines make up an important component of the modern toward alternative medicine. Herbal medicine is becoming ever more popular in now a day’s world as people seek out natural remedies. Herbal medicines are widely used for treatment of human ailments in various systems of medicines like Ayurvedic, Homeopathic, Sidha, Unani and other regional systems of medicines. Herbal drug products classification vary from country to country, some categories include functional foods, dietary supplements and traditional medicines. A detailed literature survey for regulations of herbal drug products in Europe, US and India, Russia, Africa, south Korea was performed to identify recently introduced changes in regulations or newly introduced regulations compliance with the regulatory bodies. Committee for Herbal Medicinal Products (HMPC), Committee of European Medicines Agency (EMA) is developing guidelines for quality, nonclinical studies, clinical efficacy and safety. Traditional herbal medicines registration scheme(THMRS) has been recently introduced by Medicines and Healthcare Products Regulatory Agency (MHRA, UK). US FDA has issued draft guidance for Industry on “Complementary and Alternative Medicine Products and Their Regulation”. Drugs and Cosmetics Rules have been amended recently to control the quality, safety and efficacy of herbal drug products in India. This article provides an overview of herbal medicines and aimed to explain the regulations of various herbal medicines, standardization of herbal medicines, pharmacovigilance and marketing surveillance regulatory status of herbal medicines.

Published by: Chaduvu Ramkrishna, Jayachandra Reddy .P, Alagusundaram .M

Research Area: Herbal Drug

268. Estimation Model on Facade in High Rise Building

As we are aware with the increasing competitive market in the construction industries due upcoming speedy and efficient techniques construction personnel have to be more careful in all their decisions. Many existing studies shows schedule management focus on the planning stage particularly on schedule estimate based on labor and equipment resources. For this study, facade was selected because of its importance in construction activity in terms of schedule estimation for high rise construction. To develop a schedule estimation model for facade, an in depth case study was conducted. Results of case study have then used in Monte Carlo Simulation. Finally, by using the results of the simulation, a schedule estimation model for facade construction will be developed conducting multiple regression analysis. This developed model will help the project managers to easily, quickly and accurately perform schedule estimation when problem occur that may cause construction delay and time extension

Published by: Swapnali Sharad Onkar, Prof. Sanghmesh Ghale, Prof. S. V Pathaskar, Prof. Meena Kaulgi

Research Area: Construction & Management

269. Orthotic (Pressure Sensing Insole) Using FSR Sensor for People Suffering With Foot Pronation

Technological advancements have led to the development of numerous orthotics for the physical assistance and restoration of human locomotion. While many challenges remain with respect to the mechanical design of devices it is atleast equally challenging and important develop strategies to control them in concert with the intentions of the user. Custom fit orthotics, while helpful, fail to completely alleviate pain caused by this illness. A major weakness of these orthotics is their inability to adapt to changing conditions, either in the patient or the ground. There are many avenues of improvement like an orthotic device which detect the ulcer occurance symptoms in the patient.The aim of this paper is to develop an orthotic device that can be used with the patient suffering from foot pronation. Our objective is to make a Pressure sensing insole which can be adjusted in shoe to recognize the foot strike pattern, to adapt changes in foot pattern and pressure during walking, standing and to provide pneumatic stiffness control to correct the foot posture. The system is composed of an insole integrated with FSR Sensor that can be fit in shoe, a Pneumatic control for stiffness variation. This paper presents initial design considerations and the evaluation of a proof of concept system for foot pronation.

Published by: Munish, Sarita, Dr. S. L Yadav

Research Area: Biomedical Engineering

270. Monitoring and Controlling of Different Process Parameters by Using LabVIEW and Arduino

The design and implementation of process under consideration is done by using LABVIEW software and Arduino Uno. Temperature and level sensors are used to measure temperature as well as level. LabVIEW is used to control temperature and level within set values. The system contains Arduino unit interface in between the PC, the sensors circuit and hardware. Monitoring and controlling of parameter is done using LabVIEW. In general boiler has temperature greater than 200 Degree Celsius, so this is not possible practically to create such environment in laboratory, so a miniature boiler tank model is used where temperature rises up to 150 Degree Celsius. In laboratory model is prepared for measurement of temperature and level measurement with temperature ranges from -55 to 155 deg. C. The LabVIEW monitors and controls temperature, level with set points.

Published by: Prashant A. Shirke, Umesh Thorkar, Kalyani B. Kshirsagar, Shamal G. Pusdekar, Rani J. Welukar

Research Area: Industrial Automation

271. Water Scarcity and Rain Harvesting Method- A Case Study of Diphu Town, Assam India

Water is the basic need for the all the living things in different ways including the ecosystem in which we are all part of. The importance of water is well known. Water is our most precious natural resources. Its uses are innumerable and its importance cannot be underestimated. Its role ranges from domestic uses, agricultural and industry to religious, recreation, landscape decoration and even therapy. Water is basic to life. Due to the growing population over the decades, millions of people worldwide suffer from the lack of water especially in the urban areas where population concentration is very high. Because of this the demand of water is very high with overuse of ground water resulted in a drop in water table levels and have made the cost of water is high. It is found that rain harvesting, the collection of rain water from surfaces upon which it falls, is a long standing practice of many countries still use as a means for dealing with water problems of today. Rain is harvested in many ways and it is vital supplementary source of water. Diphu is the hilly town, the district headquarter of Karbi Anglong district, Assam, in the north eastern state part of India. The largest administrative district with over population of 61000. Located at an altitude of 186 m (610 ft) has suffered acute water problems, the mismanagement of the town committee, lack of proper knowledge on ground water potential areas has led the people suffered silently , pay a huge sum of money to buy a tank of water. This paper tries to attempt to understand the water scarcity problem’s as well the reason and the rainwater harvesting method practice by the local people. Keywords: water, scarcity, rain harvesting, population increase;

Published by: Rebecca Kramsapi

Research Area: Geography

272. An Enlightment Of Diagnosis Of Pandu Vyadhi By Clinical Presentation And Its Management By Combination Of Aarogyavardhini Vati With Mandur Bhasm And Punarnavadi Mandur -A Single Case Study

There are many diseases which commonly occurs in all age groups, one of which is Pandu Vyadhi. In all Ayurveda samhita Pandu Vyadhi is described as a condition in which skin becomes pallor or yellowish white in colour. This disease comes under Raktdhatu Kshaya & Rasvaha Strotas dushti. It is correlated with anaemia, evaluation of its severity is done by haemoglobin percentage. Every disease can be diagnosed by two ways, one by clinical presentation & another way by pathological investigation. Pandu Vyadhi has Vishistha lakshanatmak presentation by this, primary diagnosis can be done & by haemoglobin percentage diagnosis can be confirmed on opd basis. Proper diagnosis helps in proper drug management. Aacharya Charak explained Mandur Bhasm &Punarnavadi Mandur as a drug management for Pandu Vyadhi. Aacharya Vagbhata suggests use of Aarogyavardhini vati. In this paper a single case study is presented. A male patient is diagnosed by clinical presentation &signs which further confirmed by Hb%evaluation which was 5.9gm%.Drug management is given in combination, after one month of follow up there is subjective improvement in patient & Hb%was 9.9 gm %is noticed. Which enlightens the importance of diagnosis & effect of drug management given.

Published by: Dr. Vinita Bhayekar, Dr. Meera Aurangabadkar, Dr. G. H Kodvani, Dr. G. G. Asati, Dr. Pranali Bhende

Research Area: GAC Nagpur, OPD

273. Comparative Study of Seismic Behaviour of Open Ground Storey Buildings, After Replacing Rectangular Columns with Circular Columns

The earthquake resistant design of structures requires that structures should sustain, safely, any ground motions of an intensity that might occur during their construction or in their normal use. However ground motions are unique in the effects they have on structural responses. The most accurate analysis procedure for structures subjected to strong ground motions is the Push over analysis. Pushover analysis is based on the assumption that structures oscillate predominantly in the first mode or in the lower modes of vibration during a seismic event. This leads to a reduction of the multi-degree-of-freedom, MDOF system, to an equivalent single-degree-of- freedom, ESDOF system, with properties predicted by a nonlinear static analysis of the MDOF system. The ESDOF system is then subsequently subjected to a nonlinear time history analysis or to a response spectrum analysis with constant-ductility spectra, or damped spectra. The seismic demands calculated for the ESDOF system are transformed through modal relationships to the seismic demands of the MDOF system. In this study the seismic behaviour of a frame building has been analysed by using push over analysis. The seismic performance evaluation of the building has been carried out by changing the sizes of the columns and also by replacing the rectangular columns with the circular columns. Static type of pushover analysis is to be used in this research work where the loads consist of permanent gravity loads and incremental horizontal forces at each storey level. Capacity curves (base shear versus story total drift) obtained from static pushover analysis using commercially available software called Etabs (Etabs 2015) are used for the calculation of some seismic demand parameters. The dimensions of the buildings have been kept constant and only the column sizes have been changed. Three different combinations of the rectangular column dimensions are taken and the non linear response of each is evaluated by using the pushover analysis. The rectangular columns are then replaced with the circular columns of suitable dimension. The buildings are designed for the gravity and seismic loadings as per IS 456: 2000 and IS 1893: 2002.

Published by: Kapil Verma

Research Area: Structural Engineering

274. Corporate Social Responsibility in India: Issues and Challenges

The purpose of this article is to provide a broad summary of the value propositions evident in the research on the business case for Corporate Social Responsibility (CSR). Over a last 30 to 40 years, there has been a stable increase in information produced by small and large organizational set ups in relation to their social and environmental impacts. It is very well understood by organizations that govt. alone will not be able to succeed in its endeavor to uplift the downtrodden society for further compulsion of Corporate Social Responsibility (CSR) has filtered the myth that the ultimate goal is not profit making, rather trust building an assert able with societal relationship and only long term survival mantra for any organization. We would try to light on (CSR) of Indian organizations which would be helpful for both economic and social interest. This article is based on the secondary data and focuses on the findings & reviewing of the issues and challenges faced by Indian organizations with respect to Corporate Social Responsibility (CSR).Stockholders demand that corporate operations be managed efficiently and that improved market value reward their investments. Companies Act 2013, brought an end to the long run discussion on CSR practices by the corporates.The journey of CSR as a corporate responsibility has two broad perspectives, pre Companies Act 2013 and post Companies Act 2013. CSR policy is still in a nascent stage and faces number of challenges. The Union Budget 2015 clarified that any expenditure on the Swatch Bharat Abhiyan is to be claimed as deduction u/s 80 G and not under CSR. Thus, Indian law on CSR still awaits clarification on many areas wherein claiming deduction u/s 80, exemptions from tax and treating it as CSR all are in existence.

Published by: V. Kanaka Latha

Research Area: Management

275. NC Cloud A Network-Coding-Based Storage System in a Cloud-of-Clouds

To ensure outsourced information in different distributed storage condition, we give adaptation to internal failure and tried and true information honesty for distributed storage. Assume if distributed storage encounters the changeless disappointment and loses every one of its information at that point, there is a need to recover the lost outsource information with help of other surviving cloud stockpiles. We propose an Intermediary based Capacity for blame tolerant various distributed storage condition called as System coding based capacity. Useful least stockpiling recovering (FMSR) codes are utilized for recovering lost outsourced information in numerous distributed storage condition. We additionally approve that FMSR codes lessen repair activity and cause less money related cost amid information exchange than customary deletion [RAID-6].

Published by: Amogh S. Kinagi, Pundalik .R

Research Area: Cloud Computing

276. Glass Fiber Reinforced With Partial Replacement of Cement with Fly Ash

Concrete is one of the most widely used construction material in today’s world. Cement being one of the essential constituent of the concrete. Environmental issues are also playing a vital role in today’s world, the production of cement one of the major constituent of concrete leads to release the of significant amount of carbon dioxide a greenhouse gas contributing 7% of greenhouse gas emission to the earth atmosphere, beside deforestation and burning of fossil fuels. Safe disposal of glass waste generated in day to day life due to limited life span and after use it is either stock piled or sent to land fill is also a challenging task. There is now a significant world-wide interest to solve the environmental problem caused by industrial waste and other material by including such material in the manufacture of concrete. Effort have been made in concrete industry to use waste glass in concrete production not only provide significant environmental benefits but also enhances performances of concrete when used at optimum amounts. IN this study, glass fibers in different volume fraction with 20%, 30% and 40% replacement of cement by fly ash has been to study the effect on compressive strength, split tensile strength, of concrete and compared it to the conventional concrete. For each mix standard sizes of cubes, cylinders and as per Indian Standards were cast and tested for compressive strength and splittensile strength at age of 7days and 28days.

Published by: Hifzurrahman, Zeeshan Khan, Amir Mirza Baig

Research Area: Civil Engineering

277. Multi-Purpose Agricultural Robot

The paper presents about the multiple agricultural tasks done by the single robot. To develop the efficiency of the agricultural tasks we have to find the new ways. This project deals with a novel approach for cultivating lands in very efficient way. Distinctiveness of this agriculture robot system are it is multitasking abilities which can drill, pick and place, seeding, pumping water & fertilizers, weather monitoring to work in both agriculture, afforestation and gardening platform.

Published by: N. Kishore, V. Avinash, Chennakeshwar, K. Pranaka, Vinod Kumar Reddy, S. Srinivaslu, Dr. M. Ravindran

Research Area: Robotics

Research Paper

278. Composites Classification and Manufacturing Operations: A Review

A composite material is composed of two or more dissimilar constituents with one constituent as the reinforcing phase and the other as the matrix. These constituents do not dissolve in each other and they work together to give the composite special properties which makes it widely used in different aspects of industry. This paper covers the classification of composite materials and a number of the manufacturing processes used in their production.

Published by: Maha S. Hirmaz

Research Area: Manufacturing Engineering