Volume-5, Issue-2

Volume-5, Issue-2

March-April, 2019

Research Paper

1. Fingerprint detection using enhanced minutiae singular point matching technique

Fingerprint matching is the procedure used to decide if two arrangements of unique finger impression edge detail originate from a similar finger. There exist numerous calculations that do unique mark coordinating from multiple points of view. A few techniques include coordinating details focuses between the two pictures, while others search for likenesses in the greater structure of the unique finger impression. In this proposed work, we propose a method for fingerprint matching based on singular point minutiae matching technique. The term "minutia" is used to refer to small ridge details found in fingerprints; most often, they are termed as main points described on ridge structures. Minutiae pi and qi are considered to coordinate if their traits are inside a certain Limit.

Published by: Rozi Kumari, Puneet JainResearch Area: Electronics And Communication Engineering

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: Fingerprint pattern matching, Minutiae, FRR, FAR, ROC, EER

Review Paper

2. Experimental study on waste foundry sand and steel slag concrete

Generation of waste foundry sand as by-product of metal casting industries causes environmental problems because of its improper disposal. Thus, its usage in building material, construction and in other fields is essential for reduction of environmental problems. Similarly, in foundries (where the ferrous and non-ferrous metals are melted.), the slag is produced after the completion of the melting process it can also be used as a building material, construction and in other fields. This research is carried out to produce low-cost and eco-friendly concrete. This paper demonstrates the use of waste foundry sand as a partial replacement by fine aggregate and slag is as coarse aggregate in concrete. An experimental investigation is carried out on concrete containing waste foundry sand in the range of 0%, 20 %, 40% by weight and slag is fully replaced (100%) for M-25 grade concrete (OPC). The material was produced, tested and compared with conventional concrete in terms of workability and strength. These tests were carried on a standard cube of size 150mm×150mm×150mm for 7, 14 and 28 days to determine the mechanical properties of concrete.

Published by: Chandrashekhar D. Sahare, Kishor T. Jadhao, Sohan R. Dudhe, Pallavi S. Godichore, Ashwin D. Parate, Nikeeta B. DetheResearch Area: Concrete Technology

Organisation: J D College of Engineering and Management, Nagpur, MaharashtraKeywords: Waste foundry sand, Steel slag, Cement (OPC), Low-cost concrete, Eco-friendly, Compressive strength, Split tensile strength

Research Paper

3. Design and implementation of agrobot by using IoT

Many advances in technology have made the agriculture business a much less labor-intensive industry. Farmers are looking for new ways to implement technology to cut costs and reduce labor hours. One of the ways that farmers are beginning to explore new technologies in farming come from the automatic machines. Internet of Things (IoT) technology has brought revolution to each and every field of common man’s life by making everything smart and intelligent. IoT refers to a network of things which make a self-configuring network. The Agriculture stick being proposed via this paper is integrated with Adriano Technology, Here we use two applications to show the working of a robot which is going to do crop harvesting and fertilizing in a real-time manner. Other accessories are slaves performing specific operations. The approach is now to develop smarter machines that are intelligent enough to work in an unmodified or semi-natural environment.

Published by: S. Mutharasu, Divya V., Dhivya Bharathi K., Elakkiya M. V., Janani E.Research Area: IoT

Organisation: Vivekanandha College of Engineering for Women (Autonomous), Tiruchengode, Tamil NaduKeywords: Arduino Uno, IoT

Research Paper

4. Hybrid electrical vehicle battery parameters monitoring system on smart phone through bluetooth

Through this project, we have tried to implement a battery management system for a hybrid electric vehicle. The idea of this project came from an electric vehicle safety system. In the electrical vehicle there is a possibility of battery explosion due to excessive temperature, high current or may be improper working due to high discharge current for monitoring these parameters on Smartphone we have designed circuit for same and also for efficient fuel consumption we introduce accelerometer based circuit for slope detection for fuel source change. By using reverse back emf of vehicle tires we can charge a battery. We have used ATmega328p, Bluetooth, accelerometer sensor, lead-acid battery as the hardware part and programming is done in Embedded C using Arduino tool and for Android App, we used MIT app inventor 2. This paper highlights the use of Bluetooth instead of ZigBee in communication.

Published by: Sachin Katmande, Pratik Kangane, Pravin Lokhande, Vishwalata LaksheResearch Area: Embedded Automation

Organisation: Dr. D. Y. Patil Institute of Technology, Pune, MaharashtraKeywords: Accelerometer sensor, Bluetooth, ATmega328, Lead acid battery

Research Paper

5. Advanced billing system for government departments

Making payments for electricity, water, a property is more of a routine job which needs to be done but often delayed mainly due to its tedious nature. Also getting access to various details of the same is also tedious. Earlier the existing system was manual payment methods where the user needed to visit the nearby payment center and pay their respective bills. The proposed system is more secure, error-free and easily incorporable to any further developments and changes to building an application program to reduce the manual work of managing amount of units consumed by the costumers and generating the bills for various departments like the municipality, electricity and water department.

Published by: Ranjitha H. T., Chethana M.Research Area: Billing System

Organisation: Bangalore Institute of Technology, Bengaluru, KarnatakaKeywords: Billing system, Bill payment, Bill generation

Review Paper

6. Recommendation of food tourism using Artificial Neural Network – A survey

According to “Global Report on Food Tourism” of the World Tourism Organization (UNWTO), food tourism is commented as a fast-growing segment of the tourism industry. Food tourism means traveling to seek enjoyment via eating and drinking experiences at the destination. movies. Such a system can suggest a set of recipes to users based on their interest, or the popularities of the dishes. For tourism services like"TripAdvisor" , the most successful online forum in the travel and tourism industry which recommends the food items based on the search history. Here, we using the ANN algorithm to predict that which algorithm is better to analyses the datasets of food recipes. Finally, it can make some recommendations for the tourist with better-personalized traveling experience and food services.

Published by: Suruthi P., Varsa Sukirthana S., Raguvaran S.Research Area: Data Analysis

Organisation: KPR Institute of Engineering and Technology, Coimbatore, Tamil NaduKeywords: Analysis, ANN Algorithm, Datasets, Neural Networks

Survey Report

7. Forward secure ID based ring signature for data sharing

Cloud computing provides services where one can access information from any place, from anywhere, at any time. So basically cloud computing is subscription based service where one can obtain network storage space and computer resources for data storage as well as data sharing. Due to high fame of cloud for data storage and sharing, a large number of participants gets attracted to it. The security is the biggest concern for the adoption of the cloud. The major issues in this regard are efficiency, data integrity, privacy, and authentication. In order to handle these issues concept of a ring, the signature has been introduced for data sharing amongst a large number of users. Ring signatures are used to provide user’s anonymity and signer’s privacy. But the expensive certificate verification within the ancient Public Key Infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. ID-based ring signature had been introduced which eliminates the process of certificate verification. Further enhancement of security with forwarding security concept has been introduced. According to this idea, if a secret key of any user has been compromised; all previously generated signatures that embrace this user still stay valid. This property is very vital to any giant scale knowledge sharing system because it is not possible to raise all knowledge data owners to re-authenticate their data whether or not a secret key of 1 single user has been compromised. Thus we propose a secure ID-based ring signature with forwarding security.

Published by: Swati Khatal, Tabassum MaktumResearch Area: Cloud Security

Organisation: Terna Engineering College, Navi Mumbai, MaharashtraKeywords: Authentication, Data sharing, Cloud computing, Forward security

Research Paper

8. Comparison of recovery profile of sevoflurane and propofol as induction agent in day care surgery

Daycare surgical procedure is those procedures which are performed in a hospital or an outpatient setting/surgeon’s office where the patient is discharged within 24 hours. 1% Propofol and 8% sevoflurane are commonly used induction agents for such procedures. It is of great importance to select a better induction agent with rapid onset and recovery with minimal side effects. Our study comprises of 60 cases undergoing various daycare surgical procedures that were admitted in National Institute of Medical Sciences and Research Hospital, Jaipur from January 2017-June 2018. This study was carried out to compare which out of propofol and sevoflurane is a better induction agent for day care procedures. In our study, we found that induction was faster and with fewer complications with propofol as compared to sevoflurane which was associated with a higher incidence of postoperative nausea and vomiting. We concluded that propofol is a better induction agent than sevoflurane for daycare surgical procedures.

Published by: Robin Lohia, Dr. Meenaxi SharmaResearch Area: Medical

Organisation: National Institute of Medical Sciences and Research, Jaipur, RajasthanKeywords: Propofol, Sevoflurane, Recovery, Daycare surgery

Research Paper

9. Content based Image Retrieval System using K-Means Clustering Algorithm and SVM Classifier Technique

The dramatic rise in the sizes of pictures databases has blended the advancement of powerful and productive recovery frameworks. The improvement of these frameworks began with recovering pictures utilizing printed implications however later presented picture recovery dependent on substance. This came to be known as Content Based Image Retrieval or CBIR. Frameworks utilizing CBIR recover pictures dependent on visual highlights, for example, surface, shading and shape, rather than relying upon picture depictions or printed ordering. In the proposed work we will use various types of image features like colour, texture, shape, energy, amplitude and cluster distance to classify the images according to the query image. We will use multi-SVM technique along with clustering technique to compare the features of the input image with the input dataset of images to extract the similar images as that of the query image.

Published by: Harleen Kaur Maur, Puneet JainResearch Area: Electronics and Communication Engineering

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: CBIR, SVM, Content Based Image Retrieval, Modified SVM, Clustering based SVM Technique.

Research Paper

10. Multi domain sentiment classification approach using supervised learning

Digital info out there on the net is increasing day by day. As a result of this, the demand for tools that facilitate individuals to find and analyzing of these resources also are growing in variety. Text Classification, particularly, has been terribly helpful in managing the information. Text Classification is that the method of assignment language text to 1 or a lot of classes supported the content. Its several necessary applications within the globe. As an example, finding the sentiment of the reviews, denote by people on restaurants, movies and different such things area unit all applications of Text Classification. During this project, the focus has been ordered on Sentiment Analysis that identifies the opinions expressed in a very piece of text. It involves categorizing opinions in text into classes like 'positive' or 'negative'. Existing works in Sentiment Analysis centered on decisive the polarity (Positive or negative) of a sentence. This comes below binary classification, which suggests classifying the given set of components into 2 teams. The aim of this analysis is to handle a unique approach for Sentiment Analysis known as Multi category Sentiment Classification. During this approach the sentences area unit classified below multiple sentiment categories like positive, negative, neutral then on. Classifiers area unit engineered on the prognostic Model, that consists of multiple phases. Analyses of various sets of options on the info set, like stemmers, n-grams, tf-idf then on, are thought of for classification of the info. Totally different classification models like Bayesian Classifier, Random Forest and SGD classifier area unit taken into thought for classifying the info and their results area unit compared. Frameworks like woodhen, Apache driver and sickest area unit used for building the classifiers

Published by: Parineeta Jha, Sajid KhanResearch Area: Machine Learning

Organisation: Technocrat Institute of Technology, Bhopal, Madhya PradeshKeywords: Sentiment, Positive, Negative, Sentiment analysis

Research Paper

11. Evaluating Alzheimer’s patients' assistance systems in HCI Domain

Nowadays, computer systems play a very important role in the health care context. However, many of these systems are also becoming increasingly complex. In particular, the design of these systems should be compatible with Alzheimer’s situation, as the condition of Alzheimer patients is growing worse, especially with the poor understanding of the disease, lack of support language difficulties, and memory loss. These systems should meet the various needs of such patients. In this paper, we are focusing on evaluating Alzheimer's assistance systems. Usually, in designing those systems, the human-computer interaction (HCI) is left behind. Thus, we demonstrate several aspects to improve Alzheimer’s patient ability to interact with these systems. Moreover, we discussed the key factors that affect the success or failure of those systems taking into consideration criterion such as bringing down health care costs, learnability, usability, dependability, readability, and facilitate automating. At the end, the paper illustrates using charts, and tables to show the impact of applying HCI when designing an interface to achieve user-friendly, intuitive interfaces, and higher usability of the systems.

Published by: Master Prince, Bashayer A. Alafri, Maram S. Alqueflie, Reem A. Almijmaj, Yassmeen A. AlnasserResearch Area: Computer Science

Organisation: Qassim University, Buraydah, Saudi ArabiaKeywords: Alzheimer patients, Human-Computer Interaction, Usability, Intuitive interfaces, User-friendly

Research Paper

12. Analysis of psychological variables between training under a coach and self training athletes

Sports Psychology addresses the interactions between psychology and sports performance, including the psychological aspects of optimal athletic performance, the psychological care and well-being of athletes, coaches, and sports organizations, and the connection between physical and psychological functioning. Sports psychologists can participate in various activities, mostly focused on working to understand what motivates athletes and how athletes can improve their performance. The purpose of the study is to find out Psychological variables between training under a coach and self-training athletes. Thirty athletes training under a coach (15) and self-training (15) was selected randomly from Virudhunagar district, their age group between 22 to 26 years. The subjects were divided into two groups as under a coach group and self-training group. As per the available works of literature, the standardized questioners were used to collect relevant data on the selected variables as stress, anxiety, achievement motivation, and happiness. The collected data were statistically analyzed by using an independent t-test. In all the cases 0.05 level of confidence was fixed as a level of confidence to test the hypothesis. The result shows that there was significantly different between training under a coach group and self-training group on stress, anxiety, achievement motivation, and happiness.

Published by: Dr. G. Peter Michael RajResearch Area: Physical Education

Organisation: Arul Anandar College, Karumathur, Tamil NaduKeywords: Coach, Self-training athletes, Data

Survey Report

13. A survey on motion picture prediction using data mining

In this study, a mathematical model used to predict an upcoming movie success class. This will help to suggest as your interest before release based on several attributes and It will take the suggestion from different linked social sites to determine the interest of the audience. It also shows the most interesting result on top of your list. Many film studios collectively produce several hundred movies every year; the budget of this movie is of the order of hundreds of millions, making their Box office success absolutely essential for the survival of the Industry. Knowing which movie is going to succeed and which are going to fail before the release could benefit the Industry. In this paper, we have enlisted some existing movie prediction using data mining for predicting success and failure by considering their advantages and disadvantages.

Published by: Abhishek More, Sharique Khan, Thabreez IzzudeenResearch Area: Data Mining

Organisation: K.C. College of Engineering, Mumbai, MaharashtraKeywords: Data mining, Predictive analysis, YouTube, Twitter, IMDb

Dissertations

14. Family impact on students’ motivation in Kanyakumari district

This study tries to identify the impact of some family important variable on students' Motivation. Several studies had stressed out the significance of study students' motivation as a move toward to improve their academic performance and develop the firm image. The families and society's changing values and cultures have a great impact on the students' motivation and their academic integration and recital. The questionnaire has consisted of some items. Results showed that students tend to attribute their academic success to internal factors such as hard working while they feature their failure to external factors such as family crisis.

Published by: T. Karthika DeviResearch Area: Kanyakumari District

Organisation: University of Jerusalem, Chennai, Tamil NaduKeywords: Family, Emotional impact, Peer group, Family situation impact

Review Paper

15. Multifunctional robots: A review

Robots replace humans in performing repetitive and dangerous tasks which are guided by a computer program or electronic circuitry. The goal of a robot is to reach remote areas and perform various tasks such as locomotion, sensing harmful gases, metal detection, sound sense, live video streaming and so on. Since these robots perform many functions, they are referred to as multifunctional robots. There are various types of robots. Robots which are used to keep an eye, supervisory control on intrusion thereby function as spy robots. Military robots are used to carry out many risky jobs that cannot be done by the soldiers, thereby saving human lives and reducing manual error in the field of defense. A wireless multipurpose robot can be navigated around the disaster areas to find the humans who need help and also to identify forest fire. Combat robot is designed to tackle cruel terror attacks which can be radio operated, self-powered and has all the controls like a combat vehicle. Soft spider robots are used to perform delicate surgical procedures in the human body which is too unpredictable to be performed by rigid robots. Camouflage robot is designed to duplicate the colors on which it moves on, hence being impersonated by the outside world. Rescue robots are a type of mobile robots which are used to complete search and rescue missions during natural disasters and other emergency situations. Therefore, robots play a very important role in making the tasks performed by humans easier, faster and efficient, thereby increasing speed and productivity.

Published by: S. B. Soumya, Seemab Sultana, S. M. Shivani, Vamaravelli Kavya, Pushpa Y.Research Area: Electronics and Communication Engineering

Organisation: Atria Institute of Technology, Bangalore, KarnatakaKeywords: Multifunctional, Supervisory control, Impersonated

Research Paper

16. Comparative analysis of ECC and Hessian Elliptic curve based message cryptosystem

Security is the major concern in nowadays in many applications, many algorithms were proposed majorly categorized into symmetric and asymmetric key cryptographic algorithms. The limitations with symmetric key cryptography are the scope of knowing the shared key between the communicators to intruders. Hence, asymmetric key cryptography algorithms were performed, among those ECC is one best mechanism. This paper is aiming at the analysis of time complexity, efficiency and security levels of Elliptic Curve Cryptography(ECC) and based upon the analysis, further extension to a strong encryption and decryption algorithm. In addition to that ECC will be extended to other ECC based derived algorithms include Hessian algorithm. Due to the many important properties making the model attractive in cryptography, a paper code is implemented in the Magma software to ensure the correctness of formulas in this work. A comparative analysis will be done among the ECC and Hessian algorithm.

Published by: Palaka Venkata Gangadhar Naveen, Nayana Rao, Dr. R. SivaranjaniResearch Area: Cryptography

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: ECC, Hessian curve, Encryption, Decryption, Security analysis

Research Paper

17. Intelligent model for predicting water quality

Over the decades, water pollution has been a real threat to the living species. The real-time monitoring of drinking water is nothing less than a challenging task. This paper aims to design and develop a low-cost system for the real-time monitoring of water quality using Internet of Things (IoT) and Machine Learning (ML). The physical and chemical parameters of the water such as temperature, level, moisture, humidity, and visibility are measured using respective sensors. ESP8266, the core controller is employed to process the measured values from the sensors. The data acquired from Sensors are sent to the Django server. Random Forest (RF) and K-Nearest Neighbours (KNN) algorithm are used in the analysis and prediction of water quality.

Published by: Ashwini K., J. Janice Vedha, D. Diviya, M. Deva PriyaResearch Area: Computer Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Water quality, Internet of Things (IoT), Machine Learning (ML), K-Nearest Neighbours (KNN), Random forest

Research Paper

18. Hear global on reality index base

As urban environments grow and become even more complex, businesses need highly accurate location intelligence technology to stay ahead. Building a scalable network that detects and identifies objects as fast as your brain starts with the vision of the vehicle. Forward-facing cameras and radar will soon be standard equipment in all cars. This project aims at every car learning from every car, car Parking place identification and continuing to enable an autonomous world with the help of tracking device (precise, end-to-end tracking and accurate, real-time, and historical locations for devices, people, and things). By combining open data with proprietary sources and technologies car sensor data and AI, the HEAR location platform offers a uniquely complete location data set along. The raw images captured by cameras may contain noises, the lighting of workspaces, a flickering of light sources. The preprocessing includes filtering out the noises, images conversions into different color spaces, blurring the image, edge detection, line detection, circle detection. The current project paper comprises of the development of image processing based parking space management. This project will implement based on the theories of Background subtraction algorithm. The usage of this algorithm will be used as a mapping method to reduce the error of detecting the vehicle. The explanation of algorithms such as Background subtraction algorithm and the implementation of Open CV as software to manipulate the image program will be used throughout the project

Published by: Pureti Anusha, Koncha Tejaswini, Mula Srilakshmi, Dhulipalla Sai kumar, Darla SrujanaResearch Area: Data Analytics

Organisation: QIS College of Engineering and Technology, Vegamukkapalem, Andhra PradeshKeywords: Photogrammetric, Image enhancement, Cascaded file, Background subtraction, Pixel transforms

Research Paper

19. Extraction of Neem (Azadirachta Indica) oil using blends of hexane, ethyl acetate and acetone by sonication

Neem oil is a very beneficial oil for human utility in various fields and is commonly extracted by a solvent like hexane and ethanol. This work stresses on investigating the usability of blends of pure solvents while adopting a new technology of sono assisted extraction for the extraction of oil from neem seeds. The prepared blends have been analyzed on the basis of total pressure, bubble point temperature, molecular weight for the different compositions solvents that is to be mixed to form the blends. In this work, it is proposed to use ethyl acetate + acetone, hexane + acetone and hexane + ethyl acetate binary blends with the comparison to unary pure solvents and also recording the solvent recovery in each case after distillation. The reusability of the solvents recovered after the first sets of extraction is also a topic of major concern.

Published by: Priyanuj Bhuyan, Saikat Sen, Vivek BihariResearch Area: Chemical Engineering

Organisation: Guru Ghasidas University, Bilaspur, ChhattisgarhKeywords: Neem Oil, Blends, Sono Assisted Extraction, Hexane, Ethyl Acetate, Acetone

Research Paper

20. Importance of healthcare dietitians’ communication skills

The nutritional professional competency and the communication competency together are very important for a dietitian to provide quality nutritional care to the patients. Dietitians provide nutrition counseling to patients and it is very important that Dietitians should master the art of communication. This article stresses the need and importance of possessing good communication skills by dietitians who are an integral part of the patients’ treatment care.

Published by: S. Ramesh, B. Manimegalai, Annie ValsanResearch Area: Management

Organisation: Christian Medical College and Hospital, Vellore, Tamil NaduKeywords: Communication skills, Healthcare dietitian, Nutrition

Research Paper

21. A non-intrusive approach for drowsy and drunk driving using computer vision techniques

This paper presents a holistic, non-intrusive approach for drunk and drowsy detection of the driver using computer vision techniques of facial landmark detection and motion detection. The driver's continuous real-time video feed is observed with the help of a smartphone camera. A single scalar quantity, Eye Aspect Ratio (EAR) which characterizes persistent eye blinks continuously analyses this feed. Simultaneously the system checks the body and the head movements using the differential imaging technique, which operates in real-time. A severity score indicating the fitness to drive is generated cumulatively using both methods. The driver is notified with the sound of an alarm if the results are positive based on a threshold value of the severity score.

Published by: Madhu, Khushboo Mishra, Shubham Karki, S. R. DhoreResearch Area: Computer Vision

Organisation: Army Institute of Technology, Pune, MaharashtraKeywords: Computer vision, Real-time processing, Motion detection, Facial landmark detection, Eye Aspect Ratio, Severity score

Review Paper

22. Open CV based border security surveillance robot

At present, the surveillance of International border areas is a headache for border guarding forces. The border guarding forces patrolling the border seriously, but it is not possible to monitor the border at each and every moment. Robot becomes an essential requirement of the surveillance when a trespasser enters the restricted area and it report’s nearby board security control unit. The use of robots in the border for surveillance reduces the risk factor of soldiers. The spy robot uses Raspbian operating system with remote monitoring and control algorithm through the Internet of Things (IoT) has been developed which reduces manual error and prevents the entry of unknown persons. The spy robot system comprises of Raspberry Pi (small single-board computer), Pi camera and sensors. PIR sensor detects the living objects and sends information regarding the detection of the living object is sent to the users through the web server and pi camera capture the moving object which gets transferred through mail simultaneously. The user controls the robot with wheel drive control buttons on the webpage. This surveillance system using a spy robot can be modified in different ways for the use in industries, banks, and shopping malls.

Published by: Jeevanantham R., Hemanth Thethan S, Akash K. P., S. PadmavathiResearch Area: Computer Science Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Border security, Raspbian OS, IoT, Spy Robot, Raspberry Pi, PIR sensor

Research Paper

23. Machine learning approach for flight delay prediction

In the cutting edge world, aircraft assume an essential job for transporting individuals and products on time. Any deferral in the timings of these flights can unfavorably influence the work, what's more, the business of thousands of individuals at any given minute. Estimating these postponements is essential amid the arranging procedure in business aircraft. A few procedures have just been proposed for outlining models to gauge the deferral in takeoff time of air ship. In our paper, a two-stage predictive model was developed employing supervised machine learning algorithms for the prediction of flights. The first stage of the model performs binary classification to predict the occurrence of flight delays and the second stage does the regression to predict the value of the delay in minutes. Then, each of the algorithms’ prediction accuracy and the receiver operating characteristic (ROC) curve were compared. Furthermore, an application was fabricated utilizing the model which uses highlights that are promptly accessible before the takeoff of a plane furthermore, can educate travelers and aircraft about flight delays in advance, To reduce the monetary losses.

Published by: Neelima SahuResearch Area: Machine Learning

Organisation: K. J. Somaiya College of Engineering, Mumbai, MaharashtraKeywords: Flight delay prediction, Classification, Regression, Machine learning, FDP application

Review Paper

24. Tooling Platform – Future of software forge

Tooling platform is an open-source software forge. Software forge is a web-based collaborative software platform which can be used for both developing and sharing software applications. Different independent projects can be stored and shared using the Tooling platform. It also acts as a place for maintaining the source code developed by the software development team. It also provides the way for version control of the stored source code. Documentation feature provided in the Tooling platform provides easy maintenance of the developed software application. For users, it can also act as a repository of computer applications. Software forges have gained a lot of popularity in recent years. Forging software is proven to be a successful software development model for many software projects. Tooling platform is used for managing source code repositories, bug reports, discussions, wiki pages, blogs for single or any number of individual projects.

Published by: Swathi NayakResearch Area: Software Engineering

Organisation: N.M.A.M. Institute of Technology, Nitte, KarnatakaKeywords: Software Forge, Software Engineering, Software Development

Research Paper

25. Importance of good nutrition during hospitalization

Good nutrition is deemed mandatory during hospitalization to prevent patients from vulnerable infections, enabling speedy recovery, fast wound healing and avoid frequent hospital readmissions. Clinical dietitian in a healthcare setup is the right person to ensure that patients are getting enough nutrition. Dietitians discuss and find out the nutritional status of the patient and provide support during the course of hospitalization as well as provide a nutritional plan to be followed at home at the time of discharge.

Published by: B. Manimegalai, S. RameshResearch Area: Clinical Dietetics

Organisation: Christian Medical College and Hospital, Vellore, Tamil NaduKeywords: Clinical dietitian, Nutrition screening, Nutrition tool, Nutrition assessment

Review Paper

26. Study on effect of rice husk ash (pozzolanic and green supplementary material) on concrete

Rice Husk Ash (RHA) is a highly reactive Pozzolanic material that can be used for replacement of cement at various percentages. The Rice milling industry generates a huge amount of rice husk during milling of paddy which comes from the agricultural field. This rice husk can be used as supplementary cementing material with Ordinary Portland cement. The main aim of this review paper is to show the modified properties of concrete made from the addition of RHA in different percentages. The effects of RHA on concrete properties such that compressive strength, workability, tensile strength shall be investigated.

Published by: Bhupendra Kumar, Pooja SemwalResearch Area: Civil Engineering

Organisation: Faculty of Technology, Suddhowala, Dehradun, UttarakhandKeywords: Rice husk ash, Compressive strength, Workability of concrete

Research Paper

27. A comparative analysis of IoT features between AWS and Azure

The technological advancements in the area of “Internet of Things” (IoT) have taken a big leap in the last few years. IoT has changed our surrounding in many ways, some of which is noticeable and some are unnoticeable. These days Organizations are investing huge funds in the field of IoT. Internet of Things (IoT) is basically the identification of objects in the LAN or WAN by providing the objects a unique IP address. Objects, pets or humans are equipped with embedded sensors, which helps them to routinely transfer data over the LAN/WAN without any human intervention. IoT is a swiftly growing technology which is making customers life more prolific and enjoyable. In this paper, we will try to compare the features of services offered by AWS and Azure with respect to the IoT Platform. Both Azure and AWS are market leaders in cloud-based IoT and offers numerous services for users to work on the IoT platform.

Published by: Prashant Dutta, Pranay DuttaResearch Area: Internet of Things

Organisation: Madhya Pradesh Poorv Kshetra Vidyut Vitaran Company Ltd., Jabalpur, Madhya PradeshKeywords: Internet of Things (IoT), Azure, Amazon Web Service (AWS), MQTT (Message Queuing Telemetry Transport)

Case Study

28. Challenging role of dietitian to improve oral food intake in a post bone marrow transplant patient – A case report

Bone Marrow Transplantation (BMT) involves the administration of high doses of chemotherapy, immunosuppressive medications, and infusion of marrow cells. During and after treatment, patients may develop a poor appetite, mucositis, anorexia and gastrointestinal failure which severely affect the food intake and leads to malnutrition (1, 2). It is important to follow dietary guidelines for post bone marrow transplant patient to improve or maintain nutritional intake. The dietary approach varies from patient to patient based on their condition. This case report explains the crucial role of a dietitian to improve the nutrient intake and nutritional status of the post bone marrow transplant patient.

Published by: K. Priya, K. Jayalakshmi, S. Ramesh, B. ManimegalaiResearch Area: Clinical Dietetics

Organisation: Christian Medical College and Hospital, Vellore, Tamil NaduKeywords: BMT, TPN, AML, Nutrition Support, ONS

Research Paper

29. IoT based interactive warehouse monitoring system integrated with Android application

An integrated warehouse management module is provided enabled by IoT (Internet of Things) The system and method are providing capacity and capability of remotely managing the warehouses consists, edible materials including food grains and providing of vital information like moisture contents, contamination levels if any to the warehouse managing team. The device is enabled with necessary facilities for storing of vital information in cloud-based utilities for enabling the team which manages the warehouse to take instantaneous decisions on the materials stacked. Fire alert mechanisms and providing information related to earthquakes in the vicinity of the warehouse to nearby police and other agencies are provided/incorporated in the device. Information on marked variations on a weight of the contents of the stacked materials inside the warehouse can be instantaneously shared to the warehouse management team with the help of cloud services and android application and steps to curb pilferage of the contents are incorporated in the system.

Published by: Hariharan P. R., Karthik Hariraj, kalpanasonika RResearch Area: Warehouse Management

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Internet of Things, Warehouse management, Cloud storage, Cloud services, Android application

Review Paper

30. History of dental implants, in memoriam: Dr. Per-Ingvar Branemark, the man who made people smile

Dr. Per-Ingvar Branemark, the father of modern implant dentistry died unexpectedly on December 20, 2014, in his birthplace Gothenburg, Sweden at the age of 85 by a heart attack. He was a Swedish professor of anatomy who accidentally discovered an intimate bone-to-implant contact with titanium, the phenomenon that he called it “osseointegration”. Few scholars and even fewer individuals in the world haven’t heard his name due to his valuable innovation and noteworthy favor to humanity. This article is written in order to appreciate his invention and asking God for forgiveness at his first death anniversary.

Published by: AliResearch Area: Dentistry

Organisation: Mashhad University of Medical Sciences, Mashhad, IranKeywords: Dental implants, Dr. Per-Ingvar Branemark

Review Paper

31. Design and analysis of hybrid fiber metal on street lamp post

Half and half materials of any class are basic for current requests. This paper manages the corrosion of composites made flax/E-Glass strands which are created by hand layup strategy utilizing LY556 Epoxy and HY951 hardener. The properties of this composite are dictated by testing like hardness and the corrosive quality which are assessed tentatively as per ASTM gauges. The consequence of the test demonstrates that half and a half composite of flax/E-glass fiber has obviously better properties than that of the metal components.

Published by: Rabin P., Mahesh S., Pranav PrakashResearch Area: Composite Material

Organisation: Dhanalakshmi College of Engineering, Chennai, Tamil NaduKeywords: Hybrid fiber metal, LY556 Epoxy and HY951 hardener

Research Paper

32. Application of machine learning techniques in estimation of crop yield

It is a process in which we can know what happened in the past. And we know that past is the best forecaster of the future. In this research paper we apply evocative analytics in the agriculture production domain for sugarcane crop to find efficient crop yield estimation. In this paper we have three datasets like as Soil dataset, Rainfall dataset, and Yield dataset. And we make a combined dataset and on this combined dataset we apply several supervised techniques to find the actual estimated cost and the accuracy of several techniques. In this paper three supervised techniques are used like as K-Nearest Neighbor, Support Vector Machine, and Least Squared Support Vector Machine. It is a comparative study which tells the accuracy of training proposed model and error rate. The accuracy of training model should be higher and error rate should be minimum. And the proposed model is able to give the actual cost of estimated crop yield and it is label like as LOW, MID, and HIGH.

Published by: Keerti Mulgund, Rupa S. G.Research Area: Machine Learning

Organisation: Smt Kamala and Sri Venkappa M. Agadi College of Engineering and Technology, Lakshmeshwar, KarnatakaKeywords: Crop yield estimation, Support Vectors, Least square Support Vector Machine, Data analytics, Agriculture analytics

Research Paper

33. Fusion of two and three colored and gray scale images using modified – Laplacian Pyramid Technique

Image fusion is a process of blending the complementary as well as the common features of a set of images, to generate a resultant image with superior information content in terms of subjective as well as objective analysis point of view. The goal of this exploration work is to build up some novel picture combination calculations and their applications in different fields, for example, split identification, multi-spectra sensor picture combination, restorative picture combination and edge location of multi-center pictures and so forth. The initial segment of this exploration work manages a novel break identification system dependent on Non-Destructive Testing (NDT) for splits in dividers smothering the assorted variety and multifaceted nature of divider pictures. It pursues diverse edge following calculations, for example, Hyperbolic Tangent (HBT) sifting and shrewd edge recognition calculation. The combination of locator reactions are performed utilizing Haar Discrete Wavelet Transform (HDWT) and most extreme guess with mean-detail picture combination calculation to get increasingly noticeable identification of split edges. In the proposed framework we have performed picture combination for two just as for three pictures. The proposed framework gives improved edge location in pictures with unrivaled edge confinement and higher PSNR.

Published by: Kajal, Puneet JainResearch Area: Image Processing

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: Image fusion, Laplacian Pyramid Technique, Discrete Wavelet Transform (DWT)

Research Paper

34. Graft materials in lateral window approach for maxillary sinus lift procedure before implant placement

Endosseous dental implants have been widely used in the past decades for rehabilitation of edentulous area as a successful and predictable treatment strategy. Achieving the adequate volume of bone is the prerequisite and a challenging issue for severely atrophic areas. Several reconstructive procedures have been used for vertical and horizontal bone augmentation before implant placement. Maxillary open sinus lift procedure is a conventional technique for elevating the sinus floor and placing the bone graft in the posterior atrophic maxilla before implant placement. This article represents the graft materials used for lateral approach sinus lift surgery.

Published by: AliResearch Area: Oral Surgery

Organisation: Mashhad University of Medical Sciences, Mashhad, IranKeywords: Graft material, Maxillary sinus lift

Research Paper

35. Intelligent model to identify the duplicate products in catalog management

Nowadays electronic catalog management provide more information about the products to the customers. Catalog management in the e­commerce system supports the definition, storage, retrieval, and management of product information in the e­commerce process. In which electronic catalog contains a duplicate of the product so it reduces the customer’s experiences and it should not provide much more relevant information about the products in the search recommendations. This paper presents the method to solve the duplicates of the product and increase the search recommendations with the help of the Relational Database Management System (RDMS) and (DBMS). So, it creates a systematic and impressive catalog that helps the customers to get all the product descriptions and images they need and reduces the duplicates to make a buying decision

Published by: M. Kavitha, Akilandeswari E., P. Tamije SelvyResearch Area: Computer Science Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Electronic commerce, Catalog, Merchant, Eliminate duplicate

Review Paper

36. The Future of Cyber Security

In the near future, cyber security will play a dominant role in personal and business applications. As society is becoming more and more digitized, there are more chances to win by exploiting this. As a result of the growing proliferation of digitization and connected devices, the demand for cyber security solutions is growing at a relatively high rate. The complexity and connectivity of digitized systems have a direct impact on their security. The goal of this review is to summarize the logical predictions of the future of cyber security.

Published by: Adharsh Krishnan, M. Deva PriyaResearch Area: Cyber Security

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Cyber security, Information security, Cloud systems, IoT systems, Digitization, Cyberspace, Cyber defense

Review Paper

37. ATM- Security using machine learning technique in IoT

The idea of designing and implementation of the real-time ATM security project came with the incidents of accessing the ATM by the unauthorized users instead of an authorized user. This project will give access to the user only after identifying the image of the user taken by the CCTV in the ATM and compare the identified image with the image of the user that was stored in the database created during the account creation which comes under the banking session of banks. In some cases the authorized user is not able to use the ATM for some emergency purposes, in such cases, the OTP is sent to the users registered mobile number and the person who came instead of the authorized user have to enter the OTP that the authorized user received. This method will reduce the risk of ATM usage by common people. The face detection and face recognition are done using deep learning techniques and machine learning. The IOT components like Camera, RFID reader, Tag, Relay, Motor were used. The Raspberry pi 3 (2015 version) is used as the main component. Here the open CV is used as the platform and the python language is used for the deep learning techniques and face detection Haar cascade is used for face detection. The face recognition module is done by Local Binary Patterns (LBP) algorithm. And an alert message is sent to the authorized user as a text message if the user is found to be the third party user.

Published by: Udhaya Kumar N., Sri Vasu R., Subash S., Sharmila Rani D.Research Area: IoT

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: ATM, Camera, RFID reader, Tag, Relay, Motor, Raspberry Pi 3 deep learning, Open CV, Python, Haar cascades, CCTV, Local binary patterns, Alert message

Research Paper

38. Accident detection system based on Internet of Things (IoT)- Smart helmet

The objective of our smart helmet is to provide the means for detecting and reporting accidents. The working of this smart helmet is very simple; vibration sensors are placed in different places of the helmet where the probability of hitting is more, which are connected to the microcontroller board. When the rider met with an accident and the helmet hits the ground, these sensors sense and gives to the microcontroller board, then controller extracts GPS location using the GPS module that is interfaced to it. When the data exceeds the minimum stress limit then the GSM module automatically sends a message to the registered emergency contacts and the link through which the location and the speed of the victim will be displayed in the mobile application and in the web application.

Published by: Kabilan M., Monish S., Dr. S. Siamala DeviResearch Area: Computer Science And Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Camera, Emergency contacts, GPS, Internet of Things, Raspberry Pi, Smart helmet

Others

39. Restaurant management system Android application

The main target of this paper is to conduct a thorough and in-depth analysis of the vast field of Software engineering and at the same time explore the opportunities and the conditions that could lead into building a successful Android app. The simplicity and ease of access to a menu is the main component that facilitates ordering food in a restaurant. A user-friendly menu completely changes the patron’s dining experience. Existing programs provide an app that restaurants can use to enter their menus into Android-based tablets and make it easier for the diners to flip, swipe and tap through the menu. This system is used to provide the restaurants with a tablet menu that would recommend dishes based on a recommendation algorithm which has not been implemented elsewhere. This system uses a cloud-based server for storing the database.

Published by: Sucharita M. Samantaray, Karan Dhoke, Pranay Pawar, Rina MishraResearch Area: Computer Technology

Organisation: Bharati Vidyapeeth Institute of Technology, Navi Mumbai, MaharashtraKeywords: Restaurant management system, Android App, E-commerce, Food ordering system

Research Paper

40. Decentralized secure money transfer using blockchain

A blockchain is just a chain and a list of blocks. Each block, in the blockchain, will have its own digital signature. Each block doesn’t just contain the hash of the block, but its own hash in part, calculated from the previous hash Calculating and comparing the hashes allow us to see if a blockchain is invalid. We create a system that Allows users to create wallets and Provides wallets with public and private keys using Elliptic-Curve cryptography. Secures the transfer of funds, by using a digital signature algorithm to prove ownership and finally allow users to make transaction your blockchain

Published by: Suganya T., Vignesh A., Vignesh Kumar N., Vivin Kumar D.Research Area: Block Chain

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Blockchain, Netbeans, MySql

Research Paper

41. The association between Myopia and near work activities in young adults in Durgapur, West Bengal

Myopia is one of the most prevalent refractive error that can be defined as a state in which the eye fails to see distant objects properly. Most of the young adults are affected by myopia in the world due to many factors. A few researchers showed in their research articles that near work activities lead to the progression of myopia. The main objective of this paper is to identify all the main factors of myopia in young adults in the southern region of West Bengal, especially in Durgapur. To meet this objective a sample of 2500 young adults were selected using simple random sampling procedure and examined through Snellen’s Chart and retinoscope and found 575 young adults have been suffering from various grades of myopia. In the next phase, we have identified the relevant factors of near work activities such as types of light used, time spent on near work per day, uses of the cell phone. We have analyzed the data through SPSS 16.0 software and interestingly we found some significant associations among them.

Published by: Atanu Maulik, Dr. Kavita BhatnagarResearch Area: Optometry Science

Organisation: NIMS University Rajasthan, Jaipur, RajasthanKeywords: Myopia, Refractive error, Near work activities, Retinoscope, Snellen’s chart

Review Paper

42. Patient health monitoring system

Health is one of the primary capabilities that a human need to go on with his life. That is the main reason the healthcare provided to the human must be bestowed in ample means and effective ways to ensure his health based on health monitoring parameters and the medical assistance being provided directly. The new technological development and its implementation now involve the internet and the sensors often known as the Internet of Things (IoT), which enables the worldwide approach to the health care base system development. This steers to the health system management that in a real-time approach it supplies a set of particulars relevant to the patient being monitored. In all the countries the death rates are becoming high due to the absence of well-timed medical treatments. These can be shut out through standard health care. The paper puts forward an IoT approach for a superior health monitoring system, by involving the sensors where they sense the body temperature plus the heartbeat and tells the doctor or the attending staff of the patient about the state of the patient. The project uses the KNN algorithm to predict the shape and condition of the sufferer to prevent them from going into further bad state. When the bad condition of the patient is predicted and detected by the system, it sends mail to the doctor in the most emergency situation or else in other cases it keeps on updating the sensed values in the web page created. The system also includes a buzzer beeping situation, where the beeping occurs when the nurse has to be notified of the state of the patient. Whereas, the previous systems developed did not do the predicting part, which plays the most important role in taking care of the patient. Thus, the project results in taking the greatest possible measure in helping the patients improve their situation.

Published by: Siva Priya S., Shruthi M. G., Sruthi S.Research Area: Internet Of Things

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: IoT, Machine learning, KNN, Emergency

Others

43. Drowsy driving warning and traffic collision information system using IoT

Driver lassitude induced drowsiness accounts for a major of road accidents. To avoid such accidents, a precautionary system is needed. The idea is to develop driver sleep detection, drunk and drive monitoring system. Digital Image Processing (DIP) technique is used to detect fatigue. Haar cascaded algorithm is used for eye detection. In this paper, a system is proposed to avoid road accidents using the alert system along with collision information system. IOT module is used to get location information and to send messages. Wi-Fi module is used to update location information in the server.

Published by: Madhan Kumar A., Kabilan M., Karthikeyan S. B., Sathiyapriya S.Research Area: Embedded System

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Haar cascade algorithm, DIP, IOT, Wi-Fi

Research Paper

44. Sensor design system and power adjustment of transmitter in FSO communication

The main problem related to FSO communication is atmospheric attenuation. To cope with such problem and maintain a dedicated connection, the transmitter power has to be adjusted continuously depending upon the weather condition of that particular time. Here we propose a design where we utilize the precipitation detection sensor and visibility sensor of ASOS. The weather conditions are detected using these sensors and some statistical data collected over time. Each condition provides some set of rules and equations which interlinks the power of receiver and transmitter. The transmitter if operated on such equation would yield the maximum efficiency. This results in power saving of the model. An automatic power device for FSO could be designed. In the below-discussed idea, we strictly restrict ourselves on atmospheric attenuation domain. Other factors like pointing Loss, Free space loss, Divergence loss are not taken into consideration. To take these issues into consideration, calculations have to be complex. While designing a real model, these factors would be taken as an important factor of attenuation too. Here Noise Equivalent Power and transmission power equation have been proposed which has visibility as a variable.

Published by: Diptangshu ChattopadhyayResearch Area: Communication Engineering

Organisation: Jalpaiguri Government Engineering College, Jalpaiguri, West BengalKeywords: Power, Attenuation, ASOS, FSO, Precipitation, Visibility, Atmosphere

Review Paper

45. Walking stick with heart attack detection

The Walking Stick with Heart Attack Detection is equipment that is used daily to indicate a heart condition, to detect heart attack and to call for emergency help. It was designed specially to help senior citizens and patients with heart disease. It consists of three basic sub-projects Circuit, Analysis Algorithm, and Bluetooth Communication. The first unit is worn on the user’s wrist captures abnormal heartbeat signal from the patient., and the rest two are installed in the stick. The microcontroller on the stick runs a heart attack algorithm. A warning is given out to the person about his heart condition. The Bluetooth emergency calling system calls for medical help at the moment of the heart attack. The effectiveness of the proposed method is confirmed by experiments on a commercially available walking stick. Each of the three subprojects responded positively.

Published by: Cheedella Sai TejaResearch Area: Electronics Engineering

Organisation: Sathyabama Institute of Science and Technology, Chennai, Tamil NaduKeywords: EGC, Heart beat, Heart attack, Bluetooth, Stick

Review Paper

46. License plate detection and string conversion using Haar-like cascade classifier

This paper presents a core module for intelligent transportation based on the method Haar-like cascade classifier for high accuracy license plate detection. Many real-time car license plate detection is reasonable and effective only under certain conditions and assumptions. Therefore a real-time method Haar-like cascade and Tesseract search for Optical Character Recognition (OCR) has been proposed. Using accurate prediction and fast analysis strategy our proposed system can constructively out pass the problems in real-time scenarios. After binge analyzing the system with various inputs to establish that the proposed system is superior to the existing systems in terms of accuracy and time consumption.

Published by: Ashwin B., T. Goutham, P. KalpanaResearch Area: Computer Science Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Haar-like feature, Optical character recognition, Convolutional neural network, Tesseract, Edge features, Adaboost, Cascading classifiers, Recurrent neural network, Long short term memory

Research Paper

47. Role of splenorrhaphy in selected cases of splenic trauma

The term splenorrhaphy actually represents a variety of “spleen sparing” techniques aimed at controlling the hemorrhage from a splenic injury while sparing the patient from the long-term immunologic consequences of splenectomy. This is a hospital-based observational interventional study done on 50 cases in Department of General Surgery NIMS University and Medical College and Hospital, Jaipur during January 2017- June 2018. The severity of the splenic injury can objectively be described with a grading system developed by the American Association for the Surgery of Trauma.

Published by: Dr. Gulrez Siddiqui, Dr. Ashok Kumar GuptaResearch Area: Medical

Organisation: National Institute of Medical Science and Research, Jaipur, RajasthanKeywords: Splenectomy vs. splenorrhaphy, Complication of splenectomy, Advantages of splenorrhaphy

Research Paper

48. Automatic speed control of a vehicle using RFID technology

Most of the road accidents occur due to traffic violation and over speeding. Running vehicle avoiding the traffic lights has become a major issue now a day. Observing traffic violation manually has become tedious and too complicated, on account of expanding the number of vehicles on the road. The number of a road accident is continually expanding and has turned into a noteworthy region of concern. To decrease the number of road accident we propose a system which controls the speed of vehicle consequently in any basic zone, without significant inconvenience to the driver. Here, we review a model dependent on RFID innovation. One RFID reader set inside the vehicle which reads the RFID tag set either at the traffic light or at speed limit board. A decision is taken by a controlling module in the vehicle and controls the speed appropriately.

Published by: D. Pavankumar, A. Selvarani, C. R. Vigneshkumar, Nimmalapalli Sri HarshaResearch Area: Elecronics

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: RFID (Radio Frequency Identification), ECU (Electronic/Engine Control Unit), Driver assistance systems

Thesis

49. Analysis of object-oriented system quality model using soft computing techniques

Quality plays very important role in software industry because the objective of every software industry is to produce good quality software with in time and budget. Number of quality models have been proposed and used by various authors to build good quality software and these software quality models are also responsible for improving the performance, this improvement directly reflects the quality, increase users satisfaction and decrease the cost of quality. This report we have discussed and compared various quality models and soft computing techniques used for predicting the quality of software product and software system. It is found from the literature that there are lots of quality models and we measure quality based on their characteristics, so here, in this work we gives the characteristics definition and then comparison of quality models related to quality characteristics. In this study we exploring the information about soft computing technique for predicting the quality of a system or product and also develop a new quality model using soft computing (Fuzzy, Neural Network and Neuro-fuzzy) approach which is responsible to predict the software quality of an object-oriented system. In this report, we also identifies the most important factors of object-oriented system like Efficiency, Reliability, Reusability and Maintainability and also proposed a model based on these four factors that evaluating the quality of object-oriented system using soft computing technique i.e. Fuzzy Logic, Neural Network and Neuro-Fuzzy.

Published by: Anil KumarResearch Area: Software Quality

Organisation: Saroj Institute of Technology and Management, Lucknow, Uttar PradeshKeywords: Software quality model, Soft computing techniques, Neural Network, Fuzzy Logic

Review Paper

50. Weather adaptive traffic prediction and analysis of accidents using machine learning algorithms

Predicting traffic flow is one of the fundamental needs for comfortable travel, but this task is challenging in vehicular cyber-physical systems because of ever-increasing uncertain traffic big data. Although live data with outstanding performance recently have become popular, most existing models for traffic flow prediction are fully deterministic and shed no light on data uncertainty. Also, they are many inventories in automobile industries to design and build safety measures for automobiles, but traffic accidents are unavoidable. There is a huge number of accidents prevailing in all urban areas. In this study, a novel dynamic approach is proposed for predicting citywide traffic flow based on weather. The proposed system utilizes the neuro-wavelet algorithm to select the required features for traffic prediction. The system also proposes the K Nearest Neighbor algorithm to predict the accuracy of accidents occurred in urban regions.

Published by: S. Bharath, Dr. S. Siamala Devi, M. Guruswamy, M. AravindResearch Area: Data Analytics

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Traffic prediction, Feature selection, Classifier methods, Accident analysis

Review Paper

51. Exploring the relative predictive efficiencies of spatial regression models

Spatial regression models are standard tools for analyzing data with spatial correlation. These models are broadly used in the social sciences for predicting the socio-economic factors. In this paper, we discuss about various spatial regression models and explain the concepts based on real data to demonstrate how to obtain and interpret relevant results. We describe prediction efficiencies of various predictors relative to the efficient minimum mean square error predictor in spatial models containing spatial lags in both the dependent variable and the error term. We consider Multiple Linear Regression Model (MLRM), Spatial Autoregressive Models (SAR), Spatial Autoregressive in the Error-term Model (SEM) and Spatial Durbin Models (SDMs) to estimate the literacy progress in the districts in Odisha as a result of changing socio-economic factors over time. The goodness of fit of the different models are compared along series of hypotheses about the performance of the specifications considering spatial relationships among the observations. The spatial analysis proved the existence of positive spatial autocorrelation and persistence of disparities in literacy attainment level across the regions during the analyzed period. The results of econometric analysis confirmed the expected positive impact of economic growth on literacy progress level as well as the necessity to incorporate the spatial dimension into the model.

Published by: Bhabani Shankar Das Mohapatra, Dr. E. G. RajanResearch Area: Spatial Data Mining

Organisation: Jawaharlal Nehru Technological University, Hyderabad, TelanganaKeywords: Spatial regression, Spatial analysis, Exploratory spatial data analysis, ML method, Euclidean distance, Lagrange multiplier tests

Others

52. Passenger service system

Increased competition in the commercial transportation industry has made service quality of every transportation agencies as one of the key competitive measures to attract passengers against their rivals in-flight services, particularly food delivery and waste collection, have a notable impact on perception of the overall airline’s service quality because they are directly and indirectly provided to passengers during flight. This is the scenario in every industry. This project consists of two sections, passenger section, they can request their needs by pressing a button in the keypad and it sends to the control room section and it is displayed on an LCD control room section. The requested needs may be food, water and if it is “any other help”, the air hostess directly goes to the requested person.

Published by: Abhiram P. S., Mohammed Aslam, Sreebal Anil V. A., Minnuja ShellyResearch Area: Computer Science

Organisation: Universal Engineering College, Thekkumkara, KeralaKeywords: Flight, Passengers, Airline, Services, Air hostess

Others

53. A text reader for the visually impaired using Raspberry Pi

In this paper, an innovative, efficient and real-time beneficial technique that enables the user to hear the contents of text images instead of reading through them has been introduced. It uses the combination of Optical Character Recognition (OCR) i.e. Tesseract and Text to Speech Synthesizer (TTS) in Raspberry Pi. This kind of system helps visually impaired people to interact with computers and day-to-day text effectively through vocal and keyboard interface. Text-to-Speech is a device that scans and reads English alphabets and numbers that are in the image using the OCR technique and changing it to voices. We are including obstacle detection via ultrasonic sensor and color detection. This device consists of three modules, image processing module, voice processing module and an object detecting module. The device was developed based on Raspberry Pi 3 Model R, Clock Speed of 1.2 GHz.

Published by: C. Ebenezer Durai, A. Selvarani, S. Siva Suthan, M. Anwin KushalResearch Area: Embedded

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Raspberry Pi, OCR, Camera, Image processing, Tesseract, Voice processing, Obstacle detection, GPS detection

Research Paper

54. Survey on generative adversarial networks

GAN stands for Generative Adversarial Networks.GANs are the most interesting topics in Deep Learning. The concept of GAN is introduced by Ian Good Fellow and his colleagues at the University of Montreal. The main architecture of GAN contains two parts: one is a Generator and the other is Discriminator. The name Adversarial stands for conflict and here the conflict is present between Generator and Discriminator. And hence the name adversarial comes to this concept. In this paper, the author has investigated different ways GAN’s are used in real time applications and what are the different types of GAN’s present.GAN’s are mainly important for generating new data from existing ones. As a machine learning model cannot work properly if the size of the dataset is small GAN’s are here to help to increase the size by creating new fake things from original ones.GAN’s are also used in creating images from the given words that are text-to-image conversion.GANs are also applied in image resolution, image translation and in many other scenarios. From this survey on GAN author aim to know what are the different applications of GAN that are present and their scope. The author has also aimed at knowing the different types of GAN’s available at present. The author has also aimed at knowing the different applications of GAN and different proposed systems by various authors.

Published by: N. Yashwanth, P. Navya, Md. Rukhiya, K. S. V. Prasad, Dr. K. S. DeepthiResearch Area: Deep Learning

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Generative Adversarial networks, Generator, Discriminator, Neural network, Deep Learning

Survey Report

55. Answer script evaluator: A literature survey

Every college, university, school conduct exams and most important part of exams are the results. In order to get these results, the exam papers have to be evaluated one by one manually. This process of evaluating the exam papers is time-consuming and requires more manpower. To overcome this solution, we have come up with a thought that removes the manual evaluation process. Our project focuses on developing a system that evaluates an answer script against a pre-uploaded marking scheme. Initially, the answers are taken in digital format and those digital answers are processed using algorithms such as word2vec where the word’s similarity index is extracted and the words similar to it are noted. Using this we can also get the meaning of the paragraph and we can match it with the answer key and get the match percentage. Using this percentage, we can calculate the marks to be awarded.

Published by: Sachin B. S., Shivaprasad K., Somesh T., Sumanth Hegde, Radhika A. D.Research Area: Machine Learning

Organisation: Vidyavardhaka College of Engineering. Mysore, KarnatakaKeywords: word2vec, Deep Neural Networks, doc2vec

Research Paper

56. Smart helmet to detect and prevent accident

The impact when a motorcyclist involves in a high-speed accident without wearing a helmet is very dangerous and can cause the fatality. Wearing a helmet can reduce shock from the impact and may save a life. There are many countries enforcing a regulation that requires the motorcycle's rider to wear a helmet when riding on their motorcycle, Malaysia is an example. A smart helmet is a special idea which makes motorcycle driving safer than before. This is implemented using GSM and GPS technology. The working of this smart helmet in IoT is very simple, vibration sensors are placed in different places of the helmet where the probability of hitting is more which are connected to microcontroller board. So when the rider crashes and the helmet hit the ground, these sensors sense and gives to the microcontroller board, then controller extract GPS data using the GPS module that is interfaced to it. When the data exceeds minimum stress limit then GSM module automatically sends the message to ambulance or family members. It also has an alcohol detector sensor which detects whether the person is drunk and switches off the engine if the sensor output is high.

Published by: L. Sindhu, G. Swedha, G. Nandhini, S. J. Raffel, M. RashikaResearch Area: Internet of Things

Organisation: Dhirajlal Gandhi College of Technology, Salem, Tamil NaduKeywords: IoT, GPS, GSM, Sensors, Helmet

Review Paper

57. IoT based smart energy meter

In the recent digital era, technology starts to find new ways of improving and enhancing human lives, all the devices are getting smarter than we could expect it would be. In the same way, we have an idea of making the energy meters of Electricity Board highly smarter using the technology “Internet of Things (IoT)”. The smart energy meter is connected with Electricity Board, household appliances and the user through IoT and mobile application. We are focusing on making the smart energy meter too smartly connect with the household appliances through IoT and also to connect with the authorized persons through a mobile application to have control over it.

Published by: Ahin Shapiro R., Dr. A Balamurugan, D. Satheesh Kumar, G. SwaminathanResearch Area: Internet of Things

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Internet of Things, Smart systems, Energy meter, Electricity board

Review Paper

58. Study on bamboo reinforcement concrete structure

Bamboo is used as a construction material from earlier days of construction. It was used as reinforcement in a rural area and as formwork also. Concrete is a brittle material so it cannot be used as a single material in construction due to its low tensile strength. In this study, we tried to find out the properties of bamboos from past studies. and from the past study, we can find out the better way to improve the strengths of bamboo as a reinforcement in concrete structures.

Published by: Rajneesh Bhandari, Pooja SemwalResearch Area: Civil Engineering

Organisation: Uttarakhand Technical University, Dehradun, UttarakhandKeywords: Bamboo, Concrete, Reinforcement

Review Paper

59. Detailing aspects of the reinforcement in reinforced concrete structures retaining wall: A case study

This thesis studies the impact of reinforcement detailing on the behaviour of a reinforced concrete structure. Using a retaining wall as a case-study, the performance of two commonly used alternative reinforcement layouts (of which one is wrong) are studied and compared. Reinforcement Layout 1 had the main reinforcement (from the wall) bent towards the heel in the base slab. For Reinforcement Layout 2, the reinforcement was bent towards the toe. This study focused on the reinforcement details used in the D-region, and on how it impacts the capacity, joint efficiency and failure mode of the structure.

Published by: Vipin Singh, Pooja SemwalResearch Area: Civil Engineering

Organisation: Faculty of Technology, Suddhowala, Dehradun, UttarakhandKeywords: Modeling, Analyzing, Reinforced concrete structure, D-region

Research Paper

60. Removal of cardiac atherosclerosis

Atherosclerosis is a condition in which the plaque, made up of organic and inorganic substances such as fat, cholesterol, and calcium gets deposited in the inner walls of the arteries. This result in the narrowing of the arteries that prohibits the supply of the oxygen-rich blood to the heart and the other parts of the body. The stent is a miniaturized mesh-like tube structure that pushes the plaque depositions against the arterial walls and restores the normal blood flow in the artery. In this paper gives the study of the deformation of a coronary stent that is deployed in the coronary artery of the heart. The catheter inserted into the arteries of blood vessels. Using an ultrasonic sensor to predict the distance by applying an ultrasonic wave. The ability to use a laser that generates an intense beam of coherent monochromatic light will assist to breach the plaque. A Motor being used for a centrifugal fan to grind the broken plaque. GSM is proving for telecommunications. This proposed model can detect the plaque in arteries and remove the plaque by using devices. We have done this process in the prototype model by using a microcontroller.

Published by: Asif Farhan S., Niranjana E., Kaviyaa R., Prabavathi R.Research Area: Biomedical

Organisation: Rajiv Gandhi College of Engineering and Technology, PondicherryKeywords: Catheter, Laser, GSM, Prototype, Microcontroller

Review Paper

61. Share market analysis for share selection using data mining technique

The share market has been a field of vast interest both for those who wish to make money by trading shares in the share market. Generally, there is an opinion about share markets like high risk and high returns. Even though we have a huge number of potential investors, only very few of them are invested in the share market. The main purpose is they are not able to take risk of taking the skill of investors. Though get low returns they want to save their money. One important reason for this problem is that they don’t have proper guidance for making their portfolio. In this paper we focus the real-world problem; we had selected three indices such as SENSEX, NIFTY. The analysis is purely based on the data collected from the past three years. The Data mining technique, Time series interpretation is applied for the Data analysis to show the ups and downs of a particular index. The correlation and Beta are the tools which give the suggestion about the share and its risk. The correlation tool is used to identify the relationship between the index and the company individually. This Beta is used to identify the risk associated with the share.

Published by: Munaf Patel, Zahir AalamResearch Area: Data Analysis

Organisation: Thakur College of Engineering and Technology, Mumbai, MaharashtraKeywords: Linear regression, Data analysis, Correlation, Beta, Time series

Research Paper

62. IoT based accident detection and prevention system with android application

A system of accident detection and prevention powered by IoT((Internet of Things) The method helps in detecting and preventing vehicular accidents with immediate intimation and information like real-time tracking of the vehicle to closed ones, vehicular speed met. The device is connected over the cloud to use its basic functionalities of storage and perform historical analysis. Vital information’s that help over as an aid at the red-zone is passed over to the nearest police stations, hospitals, highway authorities, etc. Information is instantaneously notified and shared to the closed ones of the victim using the cloud services and mobile application at the time of the accident to avoid delay of information and aid and

Published by: Johnny Antony Puthur, Dr. S. Siamala DeviResearch Area: Computer Science and Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Internet of Things, Accident detection, Accident prevention, Bluetooth low energy, Cloud storage, Cloud services, Android application

Research Paper

63. An adaptive approach to prognosticate an individual’s capability for emolument through Machine Learning

One of the major integrant to be considered while granting a loan is the customer‟s ability to pay back the amount to the bank as per the bank's provided a schedule. Our work focuses on the analysis of all the attributes that might affect the customer‟s ability to pay the loan. It is basically a credit scoring mechanism used by the bank to make sure a customer's intentions to apply for a loan are legit using Ensemble Algorithms. Our work gives a probabilistic predictive model or a scorecard to estimate the probability of defaulters in the current global scenario. Our work is due diligence fulfilled by the investors involved with the bank. Our aim is to prognosticate correct credit worth which will cause a significant increment in the profits of commercial institutions.

Published by: Jujjuri Goutham, T. Anitha, S. Joshua Johnson, Routhu Dhanunjay, Vemuri Susmitha, Nagavarapu SravaniResearch Area: Machine Learning

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Random forest classifier, Defaulters, Mathew's correlation coefficient, Credit scoring

Others

64. Use of housing society

Over the last few years, we have observed a focus on engineering science has been established whose products are likely to create a large market in the near future. It has been known ''Housing Society". First, a user must be registered in the system so that his password can be identified. This impression is securely stored in a central database or a smart card given to the user. The impression is fetched when an individual needs to be verified. Depending on the information, a software system can operate either in a verification (authentication) or a recognition mode.

Published by: Sanket Vikas Sagare, Zishan Usman Baig, Niranjan Bapuso kadam, Faique ShaikhResearch Area: Computer Engineering

Organisation: AISSMS Polytechnic, Pune, MaharashtraKeywords: Algorithms, Security, Authentication, Ridges, Valleys, Authorization, Database

Research Paper

65. Development of particle reinforced composite by plastic and e-waste

The main aim of this project is to develop Particle reinforced composites. Thermoplastic is taken as matrix material. Thermosetting plastics and E-Waste glass powder of 60µm is taken as particles. The formed structure exhibits high strength, low mass density and less weight compare to wood and steel. Due to its superior performance, the composite reinforced materials are mainly used indoors, frames, the automobile industry, especially for vehicle body applications. In this project particle reinforced Composite formed from Plastics and Electronic wastes. A formed specimen is subjected to tensile, hardness and bend test. It exhibits high tensile and bending strength.

Published by: A. Kanagaraj, C. Franciskennathamreth, M. Ajithkumar, V. Anandh, R. NagarajResearch Area: Material Science

Organisation: Akshaya College of Engineering and Technology, Coimbatore, Tamil NaduKeywords: MCC, Surface hardness, Fiber volume ratio

Research Paper

66. A novel prototype to secure network using malware detection framework against malware attack in wireless network

A new and novel proposed algorithm based on malware detection has been used that overcomes the disadvantages of the existing algorithms and helps to eliminate viruses and worms from entrusted environment. In the wireless networks suffers from various spyware programs that prevents access to legitimate users who obtains services from target web server. In our proposed prototype helps to authenticate the sender to make the dynamic rule set to avoid the formations of unavailable networks which any user who obtain web services. In our proposal architecture diagnose malware whether malware based data has been really being sent to the valid user or is it being morphed by the attacker in the middle. The proposed algorithm has been tested against various existing algorithms to study how effectively the algorithm is working, and how effectively it is overcoming the drawbacks of the present malware detection algorithms. The algorithm is projected to serve the purpose of prevention of being used malware based programs to drop it by the user and also to identify that the non-infectious message is reaching only to the valid user.

Published by: G. Jagadish, L. Jaswanth, K. Sowjanya, P. Sri Harsha, M. Nikhil KumarResearch Area: Security

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Virus and worms, Malware detection framework, Client, server, Wireless LAN

Review Paper

67. Enormous information for Internet of Things

With the quick advancement of the Internet of Things (IoT), Big Data innovations have risen as a basic information examination instrument to convey the learning inside IoT frameworks to all the more likely meet the reason of the IoT frameworks and bolster basic leadership. In spite of the fact that the point of Big Data investigation itself is widely examined, the dissimilarity between IoT areas, (for example, social insurance, vitality, transportation furthermore, others) has disconnected the advancement of Big Data approaches in each IoT area. Along these lines, the common understanding crosswise over IoT areas can propel the advancement of Big Data examine in IoT. In this work, we along these lines direct a study on Big Data innovations in various IoT areas to encourage and animate information sharing over the IoT spaces. In light of our audit, this paper talks about the likenesses and contrasts among Big Data advances utilized in various IoT spaces, proposes how certain Big Data innovation utilized in one IoT area can be re-utilized in another IoT space, furthermore, builds up a reasonable system to plot the basic Big Data advancements over all the audited IoT spaces.

Published by: P. Mounika, N. NaliniResearch Area: Internet of Things

Organisation: Saveetha School of Engineering, Kuthambakkam, Tamil NaduKeywords: Big data, Animate, Innovation, Bolster

Research Paper

68. Extended hybrid approach for detecting spammers on Twitter

One of the biggest social networks is Twitter for providing message posting and use direct message services via “tweets”.366 million currently active users on Twitter, Is the second largest space to share common news or message post. These features are also used by spammers on Twitter, spammers are not new on Twitter. spammers must be detected in improving the quality of Twitter message services. In this spammer detected by using metadata, content, interaction, and community-based features methods. Tweet meta information extracted and analyzed based on user-id, tweets,tweet-time and tweet-type. Content Features are extracted based on user posting content with URL, Mention-tags and hash-tags. Interaction and community-based features are analyzed by following and follower information. The proposed approach to introducing network-based features for spammer ratio detection by using unique IP address based user classification. Spammers can be detected by analyzing their tweets based on the extended hybrid approach by using the random forest, decision tree, and Bayesian network on the Twitter dataset that has benign users and spammers.

Published by: Subash G., S. Yuvalatha, V. Lenin Kumar, G. ManimegalaiResearch Area: Network Security

Organisation: Sree Sakthi Engineering College, Karamadai, Tamil NaduKeywords: Spammer detection, Spammer detection in Twitter, Network-based Twitter spammer detection, Extended hybrid approach

Research Paper

69. Bunch ensemble with averaged co-association matrix maximizing the expected margin

The problem considered is cluster analysis with the usage of the ensemble approach. The paper proposes a method for finding optimal weights for the averaged co-association matrix applied to the construction of the ensemble partition. The main idea is to find such weights for which the expectation of ensemble margin takes its maximum value. A latent variable pairwise classification model is used for determining margin characteristics dependent on cluster validity indices. To construct the ensemble partition, we apply a minimum spanning tree found on the averaged co-association matrix as an adjacency matrix. The efficiency of the method is confirmed by Monte-Carlo simulations with artificial data sets.

Published by: A. V. S. N. Kaushik, D. Harsha vardhan, Dr. M. Rama Krishna Murthy, B. Sai Chaitanya, G. Nikhil DasResearch Area: Data Mining

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Cluster ensemble, Weighted co-association matrix, Latent variable model, Cluster validity index, Margin expectation, Minimum spanning tree

Review Paper

70. Automatic opening and closing of railway gates and signaling in railways using IoT

The Internet of Things (IoT) is a group of devices which are connected together in the network. It is used in sound vibrator and ZigBee transceiver which will receive frequency of the vibration and the time from which the train reaches the sensor from the server. In this, we are using a sound vibrator which will detect vibrations from the track and the signal is transferred to the gear motor and the gate will get closed automatically. When the train passes the gate another sound vibration sensor is fixed at another end and it will transfer the signal to the gate and gate will open automatically. Here the additional features added are we can calculate the current speed of the train and we can also track the track damage. The main objective of this work is to provide automatic closing and the opening of gates and railway system. We can avoid careless mistakes done by the gatekeeper and we can reduce manpower in the railway system.

Published by: Dinesh Kumar S., Prem Kumar R., Venkatesan G., Vinston Raja R.Research Area: IoT

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: IoT, Zigbee, Sound vibration detecting sensor, Arduino

Research Paper

71. Child in safety with localization awareness

Aiming at a increasing security to children, this paper implements safety to the children by using a safety monitoring system using our android mobile phones. In particular a feeling of insecurity will be among the minds of the parents when the child is being alone. In fact nowadays, child kidnapping is happening frequently and that too it is too common among girl child. This system helps the children to be safe and monitors the child’s daily environment. This system allows to send the child location along the photos and videos to the parent mobile by means of GPS (Global Positioning System) and GSM module (Global Space for Mobile communication).

Published by: Dhinesh Kumar M., Devaram Gnanendra Reddy, Appadi Sumanth Teja, V. JeyaramyaResearch Area: Embedded

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Safety monitoring of the child, Mobile communication, RFID module, GPS module, GSM module, Raspberry Pi, Raspbian Jessie, Python programming

Research Paper

72. A graphical password authentication approach for secure banking

Authentication is the process to provide sure information security and the graphical password authentication method is an accessible and easy process to provide authentication. The major problem of user registration, approximately text base password, is well known. If the login user is inclined to select a simple password which is frequently in his mind it becomes straightforward for attackers to guess. If the password is machine generated it is mostly over complex for the user to keep in mind. User authenticated password using cued click points graphical password scheme includes memo ability, usability and security evaluations. This paper is on enhanced user graphical password authentication with a usability and memo ability, so that users select more random or more difficult to guess passwords. In click-based graphical passwords, image or video frames provide the database to load the image and then give authenticated access to all information in the database.

Published by: Neha Prakash Patil, Shraddha Rajesh Patil, Dipali Vinayak Khadse, Priti Murlidhar Patil, Sudesh L. FarpatResearch Area: Malkapur

Organisation: Padm Dr VB Kolte College of Engineering and Polytechnic, Malkapur, MaharashtraKeywords: User Authentication, Cued Recall, Graphical Password Scheme, Security, Memorability

Research Paper

73. Simulation of grid connected photovoltaic system

Nowadays, we can see that the demand for energy increasing rapidly. To fulfill this demand we need to produce more and more energy. As compared to conventional energy sources we can use non-conventional energy sources which are a noiseless operation, easily available and pollution free for our environment. We can see the solar energy has a great potential to meet the energy demand acting as a standalone system or grid-connected mode, but the main problems with the solar system are irradiation level and temperature condition fluctuation and synchronization of AC power with the grid. In this project we can try to solve this problem by using MPPT for improving the efficiency, we should get maximum output under varying conditions which can be tracked continuously by a special technique called maximum power point tracking. In this project, we can make a MATLAB simulation of the solar PV system, along with i-v and p-v curves. Simulation of P&O algorithm with converters which is carried out with a grid-connected solar PV system and get maximum output under varying conditions.

Published by: Anjana PatelResearch Area: Renewable Energy

Organisation: Mahatma Gandhi Institute of Technical Education and Research Center, Navsari, GujaratKeywords: PV system, MPPT, Boost converter, Inverter

Research Paper

74. Modeling and simulation of D-STATCOM for reactive power compensation and voltage regulation

Flexible AC Transmission Systems (FACTS) technology opens up new opportunities for controlling power and enhancing the usable capacity of the present as well as new and upgraded lines. D-STATCOM is a FACTS device which can independently control the flow of reactive power in the distribution system. Most of the loads in this system, being inductive in nature consume more reactive power. As a result, the power factor of load deteriorates and this limits the active power flow in the line. So, developing a D-STATCOM, based on voltage source converter, which injects the reactive power in the distribution line. The output voltage of D-STATCOM is made leading to that of system voltage for the purpose of controlling VAR generation

Published by: Bijal Chandrakantbhai KansaraResearch Area: Power Quality

Organisation: Mahatma Gandhi Institute of Technical Education and Research Center, Navsari, GujaratKeywords: D-STATCOM, VSC, Reactive power, SRF theory

Research Paper

75. Face attendance

Educational institutions’ administrators in our country and the whole world are concerned about the regularity of student attendance. Student overall academic performance is affected by it. The conventional method of taking attendance by calling names or signing on paper is very time consuming, and hence inefficient. The system is made up of a camera which takes the photos of individuals and a computer unit which performs face detection (locating faces from the image removing the background information) and face recognition (identifying the persons) First, face images are acquired using a webcam to create the database. Face recognition system will detect the location of the face in the image and will extract the features from the detected faces.

Published by: Pankaj Phanse, Aditya Nitin Tilekar, Pranav Aminbhavi, Pooja Dherange, Snehal RokadeResearch Area: Pune

Organisation: AISSMS Polytechnic, Pune, MaharashtraKeywords: Algorithms, Security, Authentication, Ridges, Valleys, Authorization, Database

Research Paper

76. Design of semi-autonomous vehicle

A web-controlled and partially autonomous vehicle system is presented in this paper. It highlights the idea to develop a remote-controlled car which can be driven from anywhere using the Internet over a secured server. This car will also have automation features like obstacle avoidance system and lane detection system so that it can drive itself safely in case of connectivity failure. The main goal here is to minimize the risk of human life and ensure the highest safety during driving. At the same time, the car will assure comfort and convenience to the controller. A miniature car including the above features has been developed which showed optimum performance in a simulated environment.

Published by: Ajith Narayanan K., Monish V., Pavalan E., L. Ashok KumarResearch Area: Embedded

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: ARM-LPC 2148, Semi-autonomous driving, Collision detection, Internet, Instruction, Web-server, Robotics, Embedded systems

Research Paper

77. Bio-medical texture characterization using DOST

We present a new efficient approach for detecting tumor of cancer in the human body based on a recently published discrete orthonormal space-frequency transform known as the DOST. We develop a frequency-domain implementation of the DOST in two dimensions for the case of dyadic frequency sampling. This manual detection may have chances of false detection. So a computerized method for cancer detection is needed. A feature selection algorithm based on statistical two-sample t-test method is used for the selection of significant coefficients from the high dimensional DOST(Discrete Orthonormal Stockwell Transform) coefficients. The selected significant coefficients are used as features for the classification of human body tumor as benign or malignant.

Published by: Sravani Palika, K. S. N. Sarat Chandra, K. Lavanya, S. A. BhavaniResearch Area: Image Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: DOST, Frequency domain, Spatial domain, Biomedical image processing

Research Paper

78. Digital image steganography using LSB and pseudo-random technique

This paper purposed an image based steganography that uses the Least Significant Bits (LSB) techniques and pseudo-random encoding technique on images to enhance the security of the communication. In the L-SB approach, the fundamental thought is to replace the Least Significant Bits (LSB) of the cover picture with the Bits of the messages to be covered up without pulverizing the property of the cover image significantly. The LSB-based method is the most difficult one as it is hard to separate between the cover-object and stego-object if few LSB bits of the cover are replaced. In Pseudo-Random technique, an arbitrary key is utilized as a seed for the Pseudo-Random Number Generator is required in the inserting procedure. Both the systems utilized a stego-key while installing messages inside the cover picture. By utilizing the key, the chance of getting attacked by the attacker is reduced.

Published by: Naveen Kalia, Manit Kapoor, Dr. Naveen DhillonResearch Area: Steganography

Organisation: Ramgarhia Institute of Engineering and Technology, Phagwara, PunjabKeywords: Steganography, LSB, Random-key, Image, Secret message, Stego-key, Cover image, Techniques

Thesis

79. An arduino based intelligent shopping system-mechatronics approach

Internet of Things (IoT): Let devices and physical objects connect each other by their sensing, communicating and processing capabilities. This paper develops an intelligent shopping using the shopping cart system to provide IoT service in a hypermarket. The major instances are difficulty in finding the specified products and standing in a big queue in the billing section. This really takes a long time and creates customer un-satisfaction to the owner. Each cart is provided with an RFID based smart shopping system with an IoT enabled technology. It proposes the quick pathfinding schemes which help the customer to find the location of the product. The main facility that the proposed model provides the customer only needs to carry an RFID smart card. It also provides a centralized and automated billing system using RFID technology. The whole information will be sent to IoT cloud server through a GSM module. If the product is purchased the number of product availability is low. The IoT cloud server alerts the seller through SMS. The system facilitates faster billing and standing in a queue reduces the average time required for shopping.

Published by: Dr. J. Krishnakumar, A. Aruljothi, M. Pavadharani, A. SaraswathiResearch Area: Mechatronics

Organisation: Avvaiyar College of Engineering and Technology for Women, PuducherryKeywords: Shopping, RFID tag, RFID reader, GSM, IoT

Review Paper

80. Review – IoT used for health monitoring

The day-by-day development of the Internet of Things causes a revolution in modern technology, which makes our life easier and automated. Due to a busy schedule and irregular lifestyle, health hazard is not an age-dependent factor in the recent era. Under these circumstances, Internet of Things has provided a much easier solution for remote real-time health monitoring of patients from the hospital as well as home. One such healthcare application is to monitor the patient health status Internet of Things makes medical equipment more efficient by allowing real-time monitoring of patient health, in which sensor acquire data of patient's and reduces the human error. The significant challenges in the implementation of the Internet of Things for healthcare applications are monitoring all patient’s from various places. Thus Internet of Things in the medical field brings out the solution for effective patient monitoring at a reduced cost. The purposed work will explain the concept of monitoring of patients health using a microcontroller and different sensors and the reports are accessible through the mobile application.

Published by: Devyani Mashale, Dr. Rupali J. ShelkeResearch Area: Embedded System

Organisation: Walchand Institute of Technology, Solapur, MaharashtraKeywords: Heart rate, Blood pressure, Respiration rate, Body temperature

Research Paper

81. Semantic text analysis using machine learning

As the amount of information on the World Wide Web grows, it becomes increasingly burdensome to and just what we want. While general-purpose search engines such as Ask.com and Bing high coverage, they often provide only low precision compared to others, even for detailed and relative queries. When we know that we want information about a certain type, or on a certain topic, a domain-specific search engine can be a powerful tool. Like www.campsearch.com allows complex queries over summer camps by age-group, size, location, and cost. Domain-specific search engines are becoming increasingly popular because they increase accuracy not possible with general, Web-wide search engines. Unfortunately, they are also burdensome and time-consuming to maintain. In this paper, we use machine learning techniques to greatly automate the creation and maintenance of domain-specific search. It describes new research in semi-supervised learning, text classification, and information extraction. We have built a demonstration system using these technics like Web Scrapping, Fuzzy C-Means and Hierarchy Clustering for a search engine which gives accurate results which is a more advantage when compared to other Search engines. Searching with a traditional, general purpose search engine would be extremely tedious or impossible to perform search operations. For this basis, domain-specific search engines are becoming popular. This article mainly concentrated on Project an effort to automate many aspects of creating and maintaining domain-specific search engines by using machine learning techniques. These techniques permit search engines to be created quickly with less effort and are suited for re-use across many domains.

Published by: Bhargavi Joga, Sarath Sattiraju, Venkatesh Kandula, Narayana Murthy Kallempudi, Mandava Kranthi KiranResearch Area: Machine Lerning

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Machine learning, Web scrapping, Reference management software

Research Paper

82. An IoT based smart traffic control system

An automated Pi based traffic control system using webcams and sensors that help in reducing traffic density in busy traffic junctions. The design of this traffic infrastructure can help to avoid traffic congestions. This paper describes a system where webcams are integrated with the Raspberry Pi to operate the lanes of traffic junction based on the count of traffic and RFID Sensors for emergency vehicles to be prioritized for the safety of passengers. As a result, the improvement in the traffic system can be exponentially improved, which can lead to progressive in the overall traffic system.

Published by: Bevara Atchyuth, Irugatla Sarat Kumar, Swarna Datla, Ganta Ajay RahulResearch Area: IoT

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Internet of Things (IoT), Raspberry Pi, Web Cam, RFID, Traffic Control

Research Paper

83. Partial replacement of PPC with glass powder

Disposal problem of waste material is becoming critical day by day. A million tone of waste glass powder generated every year in the world. In this topic, an attempt has been made to utilize glass powder, which is a waste of glass industry. The research work is a determination of the effect of the use of Glass powder as a replacement of cement to assess the pozzolanic nature of fine glass powder when mixed in concrete and compare the difference in performance with other pozzolanic materials are mixed in concrete like silica fume and fly ash. The concrete in place of cement to some extent i.e., 10%, 20%, 30% and mechanical properties of M40 (Design Mix) are investigated. Cube specimen of 36 numbers were cast, cured and tested for 3, 7, and 28 days strength. Compression was conducted and the results were compared. The finding revealed an increase in compressive strength with the increase in the replacement of cement by Glass powder. To reduce the demand for cement, glass powder decreases the unit weight as well as the porosity as indicated by a decrease in water absorption. It reduces the quantity of cement to be used in concrete. Also, glass powder is proved to be economical and is considered an environmentally friendly construction material.

Published by: Shubham G. Keshattiwar, Vipul Rathod, Dhiraj Wankhede, Saurabh Kurrewar, Aishwarya H. MeshramResearch Area: Civil Engineering

Organisation: Jagadambha College of Engineering and Technology, Kinhi, MaharashtraKeywords: Glass powder, Replacement to PPC, Compressive and tensile strength, Cost effective material, M 40 (Design Mix)

Research Paper

84. Image enhancement by averaging histogram equalization

Image Processing is defined as the process of converting an image into digital form and perform operations on it, in order to get an enhanced image or to extract some useful information from it. Image Processing has various categories in which Image Enhancement is one of them. Image enhancement is defined as the process of adjusting digital images such that the results are more suitable for display or further image analysis. The fundamental requirements for any vision based application are contrast enhancement and brightness preservation. The existing systems don’t satisfy both the requirements simultaneously. In this paper, a system is proposed which consists of step by step processes like color stretching, histogram averaging and re-mapping. The proposed system employs a search process to find optimal algorithmic parameters, such that the mean brightness difference between the input and output images is minimized. The proposed system is tested against different images to test the working of the system.

Published by: Anurag Cherukuri, B. Ravi Kiran, Buela Rani Badugu, Ravali Sujatha Alamuri, Yashwanth AythaResearch Area: Image Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Color stretching, Histogram averaging, Remapping

Research Paper

85. Neuromarketing: Understanding why we buy what we buy

In recent times, there has been an emerging field of study called neuromarketing, it has taken the marketing world by storm.it makes use of neuroscience research in a marketing context. The purpose of this paper is to understand how neuromarketing is carried out and to evaluate the influence of neuromarketing tools on traditional marketing inputs in order to give a deeper understanding of consumer behavior. The job of any marketer has less to do with designing attractive ads and more to do with understanding consumer behavior. It is said that people buy with emotions and justify it with logic, but this has proven to be true by neuromarketing research. Neuromarketing seeks to replace the traditional type of market research. Every year, nearly 450 billion dollars is invested in various advertising campaigns. still, traditional ways for testing and predicting the success and efficiency of those advertising campaigns have usually failed because they depend on customers’ willingness and capacity to describe how they react or feel when they are exposed to an advertisement.

Published by: Yogesh Maniyar, Atif Ahmed, Yash TyagiResearch Area: Marketing

Organisation: Christ (Deemed to be University), Bengaluru, KarnatakaKeywords: Neuromarketing, Consumers, Packaging

Research Paper

86. Decentralized file sharing application in a global approach

Use of semantic technologies has been prevalent in sharing files and media over the internet. This project proposes a new cooperative file sharing and storage system that allows users to store, share and find files over a robust and scalable network. This system is based on peer-to-peer technologies and provides a self-managed, decentralized, efficient and distributed way to store and retrieve files on peer nodes. Each node donates storage space to the system. The system also provides its users with a global hierarchical directory structure to browse for files like a file-system maintaining RDF Graphs forming Ontology in individual systems with the implementation of peer to peer communication in global scenario overcoming the drawbacks of Network Address Translation using TCP Hole Punching technique.

Published by: K. Mohan Krishna, M. Kranthi Kiran, P. Kiran Kumar, M. Tejasmika, K. Ravi Teja Reddy, K. SandeepResearch Area: Semantic Desktop, Networking

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Resource description framework, TCP hole punching, Decentralized

Research Paper

87. Color detection and shade matching in dentistry

It is a challenge for every aesthetic dentist to determine and replicate the appearance of teeth, as it requires humility, patience and perseverance to mimic natural tooth to its closest sense and form. To provide the patient with an aesthetic restoration the dentist must consider the scientific basis of color as well as the artistic aspect. The shade matching using digital processing techniques gives accurate results by eliminating subjective errors. In this work, the captured image is processed through MATLAB in PC and the exact shade of tooth is determined.

Published by: Dr. S. Mangai, A. Mathi Vadhana, A. Arshiya, P. Gomathi, M. DiwakarResearch Area: Digital Image Processing

Organisation: Velalar College of Engineering and Technology, Erode, Tamil NaduKeywords: Tooth restoration, Shade detection, Image processing, Aesthetic

Research Paper

88. A rule based sentiment analysis in Telugu

Sentimental Analysis in the English language is a relatively easier task to perform as it has a predefined set of rules followed and accepted universally. But, when it comes to Indian languages, there isn’t a benchmark dataset. Moreover, if a dataset exists, it cannot be validated as a similar sentence may differ in the meaning as the regional languages are very unpredictable and have no proper rules. In this paper, we used a Rule-Based Approach for Telugu sentiment analysis using Telugu SentiWordNet. Here, we obtained the sentiment using SentiWordNet and validated the results using ACTSA which is an annotated corpus data set.

Published by: Pravarsha Jonnalagadda, Krishna Pratheek Hari, Sandeep Batha, Hashresh BoyinaResearch Area: Computer Science

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: SentiWordNet, SentiPhraseNet, PoS tagger

Review Paper

89. A review on three-dimensional performance analysis of wavy fin tube heat exchangers in laminar flow regime

In recent years, thousands of numerical and experimental studies have been performed on heat exchangers with different configurations. Mainly heat transfer and frictional characteristics have been studied in detail with respect to different geometrical parameters in various ranges of Reynolds number. Further, these studies have been cross-verified with researches already performed in this field. With the advent of new tools like CFD for the study of thermo-hydraulic characteristics, it has become easier to understand flow phenomena around the tubes for different rows and also in rest of flow regions. These studies also bring about some correlations so as to easily find the values of colburn and friction factor for various different geometrical parameters so as to suit the different industrial conditions and requirements. An overview of the work already done on plate-fin heat exchangers is presented in this paper.

Published by: Dhananjay Kumar Yadav, Amit KumarResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: Plate-and-fin heat exchangers, Wavy fins, CFD

Research Paper

90. Controlling game using head movements

The Project aim is to develop a game which replaces a computer mouse and keyboard for people who suffer from Acheiropody or Amputees. This application which can be stand-alone or web-based is based on tracking the head movements to control the actions in the game. This idea is an extension of a project from Tom Mitchell's “Machine Learning” book. We used neural networks to recognize the face and also to track the movements of the head, which requires us to have knowledge of the Tensor Flow framework which supports large computational power.

Published by: Bhavya Siripurapu, K. Rohini, P. Sumathi, A. Kranthi, Suresh KurmallaResearch Area: Neural Networks

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: TensorFlow, Mobile net, Depth wise separable convolution networks, Artificial Intelligence

Review Paper

91. A review on thermodynamic analysis of organic Rankine cycle with different working fluids

The development of the world today has largely been achieved through the increasingly efficient and extensive use of various forms of energy. Over the past decades, the growth in energy consumption around the world has shown that fossil fuel energy source alone will not be capable of meeting future energy demands. With the increase in fossil fuel consumptions, more and more industrial activities produce an increasing amount of waste heat. Energy generated as a result of industrial activities that are not practically utilized is referred to as industrial waste heat. Several studies have shown that the specific amount of industrial waste heat is poorly measured, it is estimated that 25 to 55% of the input energy in industries are actually used while the remaining are discharged as waste heat.

Published by: Sanjeev Kumar, Brijendra Kumar YadavResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: ORC, EES, Simulation model, Rankine cycle, First law efficiency, Second law efficiency, Turbine size factor

Survey Report

92. Secure data outsourcing in mobile cloud computing

With the popularity of mobile cloud computing, mobile devices are used to store/retrieve data to/from the cloud storage from anywhere at any time. Thus, cloud security issues become more severe. There are different studies conducted to solve cloud security problems. Due to the limited computing capabilities of mobile devices, most of the techniques are not applicable for a mobile cloud. Thus, a lightweight scheme is needed that can provide both confidentiality and integrity to the cloud data.

Published by: Vidhya Vijayan, Shandry K. K.Research Area: Computer Engineering

Organisation: College of Engineering, Kidangoor, KeralaKeywords: Mobile cloud computing, User revocation, Algebraic signature

Review Paper

93. Review paper on design and development of hybrid two wheeler

This work deals with the design and fabrication of hybrid two-wheeler system. In recent days availability of fuel is depleting day by day and also pollution is increasing globally with an increased number of vehicles. This leads to the evolution of various alternative fuels and concepts, in that HEV system (hybrid electric vehicle) is one of the effective systems. This paper involves the fabrication of two-wheeler which is driven by both fuel and electric energy with the help of engine and Electric motor. The electric motor is the hub motor which drives the front wheel which is driven by the battery and the engine drives the rear wheel. The goal of this paper is to implement the most efficient and less polluting vehicle. In our project, the hybrid vehicle model combines the internal combustion engine of a conventional vehicle with a battery and electric motor of an electric vehicle.

Published by: Ravikumar R., Chethan M., Neeloy Debnath, Ajay P. Kumar, Prajwal L SandyalResearch Area: Hybrid

Organisation: Acharya Institute of Technology, Bengaluru, KarnatakaKeywords: Hybrid vehicle, Fabrication, Two wheel hybrid vehicle

Research Paper

94. Optical wireless data transmission with Vigenere cipher encryption

The project is designed to share data with high frequency. And ultimately establish communication as secure as possible. For secure communication, the data is send using encoded form so the unauthorized user can’t access the data and if he receive data then data will be in the encoded format. So it’s of no use to an unauthorized user. This paper is based on the concept of Li-fi. Here, transmitted data are encrypted by a Vigenere cipher algorithm in order to ensure secured optical communication. Further, the encrypted data is decrypted on the receiver portion. In today's digitalized era, for the proper functioning of our daily professional life, we need effective communication. Whereas the limitations like low bandwidth and data rate in Wi-Fi, Microwave and RF along with EMI interference hampers the interactions. The Optical Wireless Data Transmission overcomes the above limitations. This innovative and new technology provides high-speed wireless access that offers significantly greater data capacity than Wi-Fi along with inherent security properties that eliminate unwanted external network intrusion. For security purpose, a secured encryption system has been designed based on the Vigenere Cipher technique which is impossible to break. The project consists of an LED at the transmitter section to transmit encrypted data which can be received at the receiver using the IR sensor by any angle with high reliability. In addition, the integration of wireless data transfer along with encryption generates a measurable reduction in both infrastructure complexity and energy consumption

Published by: Pooja Patil, Sayli Wangikar, Minakshi Patil, Rajendra MohiteResearch Area: Extc Engineering

Organisation: Bharati Vidyapeeth College of Engineering, Navi Mumbai, MaharashtraKeywords: Optical wireless transmission, LED, Data rate, Encryption, IR sensor

Research Paper

95. Three-dimensional performance analysis of wavy fin tube heat exchangers in laminar flow regime

The current study is focused on two fin configurations, the wavy-fin in-line and the wavy-fin staggered. These two fin configurations are numerically investigated in both staggered and in-lined tube layouts. Heat transfer and pressure drop characteristics of the heat exchanger are investigated for Reynolds numbers ranging from 200 to 2000. Model validation is carried out by comparing the simulated case friction factor (f) and Colburn factor (j) with the experimental data of Bhuiyan et al. [2013]. In this study the effect of geometrical parameters such as fin pitch, longitudinal pitch and transverse pitch of tube spacing are studied. Results are presented in the form of friction factor (f) and Colburn factor (j). This study reveals that the flow distinction between plain and wavy fin has a profound influence on the heat transfer and flow friction performance of these configurations when compared on the basis of tube layouts. For laminar flow conditions heat transfer and friction factor decrease with the increase of longitudinal and transverse pitches of tube spacing whereas they increase with fin pitches for both in-line and staggered configurations.

Published by: Dhananjay Kumar Yadav, Amit KumarResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: Heat transfer, Fluid flow, Laminar flow, Heat exchanger

Research Paper

96. Thermodynamic analysis of organic Rankine cycle with different working fluids

An ORC is a suitable means of carrying out this purpose. The ORC works with a high molecular mass organic working fluid with the characteristic of having a phase change of liquid to vapor occurring at a temperature which is lower than the phase change of water to steam for a given pressure. The recovery of low-grade heat can be achieved using organic fluids. These low-grade heat sources can be from biomass energy, solar energy, geothermal energy, and industrial waste. This work presents an analysis of the organic Rankine cycle (ORC) using R143a, R600a, R134a, and RC318 as working fluids under constant external conditions. An EES program has been developed to parametrically compare the first and second law efficiencies and turbine size factor with an increase in turbine entry temperature, heat source temperature, turbine efficiency and pinch point temperature difference.

Published by: Sanjeev Kumar, Brijendra Kumar YadavResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: ORC, EES, Simulation model, Rankine cycle, First law efficiency, Second law efficiency, Turbine size factor

Others

97. Scan and drive: An Android-based application

Recently we have noticed that there is huge congestion that is escalating at the toll plaza on the expressways and highways. These toll plaza mostly uses the traditional way of issuing toll ticket which causes heavy traffic of vehicles on the road. In the traditional way of issuing ticket manual ways are used because of which a lot of time is wasted of the travelers. To avoid such problems we are developing the android application which will make easier for the travelers to get the toll ticket without wasting any time. This application which will display the toll price of the different toll plaza and if you are visiting through that toll plaza you just need to make a payment online. After your payment, a QR code will be given to you and while visiting at toll plaza you just need to scan the QR code. QR code generated will be unique for each transaction made by the traveler.

Published by: Rahul Sirisilla, Akshay Loke, Neel Dave, Aditya ShetyeResearch Area: Information Technology

Organisation: Vidyalankar Institute of Technology, Mumbai, MaharashtraKeywords: QR code, Toll plaza, Transaction, Android application

Research Paper

98. SentiPhraseNet: An extended SentiWordNet approach for Telugu sentiment analysis

Sentimental Analysis in English language is a relatively easier task to perform as it has a predefined set of rules followed and accepted universally. But, when it comes to Indian languages, there isn’t a benchmark dataset. Moreover, if a data set exists, it cannot be validated as a similar sentence may differ in the meaning as the regional languages are very unpredictable and have no proper rules. In this paper, we used a Rule-Based Approach to build SentiPhraseNet. Here, we obtained the sentiment using SentiPhraseNet and validated the results using ACTSA which is an annotated corpus data set.

Published by: Abhinav Garapati, Naveen Bora, Hanisha Balla, Mohan SaiResearch Area: Natural Language Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: NLP, Sentiment analysis, POS tagging, Rule based, SentiWordNet, SentiPhraseNet

Research Paper

99. Artistic style transfer using deep learning

In this paper, we are implementing the style transfer using convolutional neural networks. The style transfer means to extract the style and texture of a style image and applying it to the extracted content of another image. Our work is based on the work proposed by LA Gatys. We use a pre-trained model, VGG 16 for our work. This work includes the content reconstruction and style reconstruction from the content image and style image respectively. Now the style and content are merged in a manner that the features of content and style are retained.

Published by: P. Mounica, A. Nagaratnam, Mohammad Farzana, K. MuralidharResearch Area: Neural Networks

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Style transfer, Artistic style, Content loss, Style loss, Gram matrix, VGG16, CNN, Texture transfer, Image synthesis, Imagenet

Research Paper

100. Finding rising stars in co-author networks

Finding rising stars is a challenging and interesting task which is being investigated recently in many organizations and Academic networks. This paper addresses the problem of finding rising stars in Co-author networks. Predicting future rising stars is to find talented researchers in Co-author Networks. An effort for finding rising stars named PubRank is proposed, which considers the mutual influence and static ranking of conferences or journals. In this work, modification of PubRank is proposed by considering attributes like mutual influence based on authors’ contribution, co-authors’ citations, the order of appearance and publication venues. This method can be effectively used for mining the Co-author networks to search for rising stars in the research communities and organizations.

Published by: Akil Reddy Gopavarapu, K. S. D. Sai Sowmya, B. Shanmuk Abhishek, P. Vinod BabuResearch Area: Computer Science Engineering

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Rising stars, Co-author networks, Citations, Author order, Publication venue score

Review Paper

101. Text mining methods and techniques- A survey

Text Mining is an area where the goal is to discover and extract information such as relations and patterns that are hidden in the Text. The main objective of this paper is to get a deeper knowledge of the text mining techniques and text classification methods used in text mining. This paper describes different methods and algorithms used in text mining like text preprocessing, vector-space model Information- Retrieval and TF-IDF

Published by: Shitanshu Jain, Dr. S. C. Jain, Dr. Santosh Kumar VishwakarmaResearch Area: Data Mining

Organisation: Amity University, Gwalior, Madhya PradeshKeywords: Knowledge discovery, Text mining techniques and methods

Research Paper

102. Effective width of cold-formed C-section by IS:801 and comparing it with AISI:2007

Buildings built with cold formed sections as primary members (frames) and secondary members (purlins) offers viable alternative solutions for wide range applications of social sectors like housing, education etc. Design of cold formed sections has obvious complexity in view of buckling of sections and stress in the compression element, especially in flexure. In this study, using IS: 801 equations, effective section properties of C section are calculated for a wide range of configurations with different b/t ratios for flange subjected to maximum allowable stress. The study also includes simple design tools and few standard colds formed sections having a similar configuration but for thickness to be used for residential or community shelters for different wind zones. A resource is made to compare the results with similar studies using AISI code.

Published by: Pratik Thakre, Pallavi P. Gawande, Ankur H. Akre, Sneha J. Rodke, Sachin D. Dadhey, Kushalkumar YadavResearch Area: Steel Structure

Organisation: J D College of Engineering and Management, Nagpur, MaharashtraKeywords: Cold formed section, Primary members, Buckling of section, B/T ratio, IS: 801, AISI

Review Paper

103. Review on the factors influencing tourist’s impulse buying behavior in luxury restaurants in Sri Lanka (reference to Kandy city)

Impulsive buying behavior is common and ordinary behavior that most people makes on purchasing from time to time. There are empirical studies that discussed the impulsive buying behavior of the customers. In Sri Lankan context as an emerging industry, most of the tourist follow impulsive buying behavior in the restaurants due to various reasons. Accordingly, paper investigates the concept of impulsive buying behavior and factors that influence to impulsive buying behavior in luxurious restaurants in Sri Lanka. Paper accomplishes research propositions in line with the empirical justifications encouraging future research priorities.

Published by: Jayasooriya S. S. W.Research Area: Tourism Marketing

Organisation: University of Kelaniya, Colombo, Sri LankaKeywords: Sri Lankan tourism industry, Impulsive buying behavior, Consumer buying behavior

Survey Report

104. Customer purchases in e-commerce by using big data – Literature survey

In the epoch of Bigdata, the customers view the surplus of the economy, while social commerce grows enormously. This paper started with the concept of providing the customers trustworthy product with reasonable discount and quality products in e-commerce websites. As well as, this determines the better product comparing some of the e-commerce websites. This is done by using the result of the dataset which comprises the details of distrust level, a range of discounts and the customer feedback that is analyzed using the Apriori algorithm in RStudio. The frequent quality product purchased is displayed to the customers in a user-friendly website.

Published by: Shobhanjaly P. Nair, Abhinayaa K. S., Arthi U., Harshini S.Research Area: Big Data

Organisation: Anand Institute of Higher Technology, Kazhipathur, Tamil NaduKeywords: Big Data, Apriori algorithm, E-commerce, Social commerce

Research Paper

105. Qualitative data analysis on contextual advertisements

The internet advertising market is growing day by day much faster than any other advertising platform. The technology and methods used for advertising online go more and more towards automated processes that analyze the content of the page and then matches the ads with these parameters. Advertisers in web pages like Facebook and LinkedIn have some preferred set of users they wish to reach by showing their ads. Some sites offer fine-grained sets of user characteristics – including their career, wealth, education information, etc — that advertisers can specify for targeting their audience, and each of these characteristics requires different amounts of money for targeting. Generating contextual advertisements for websites is a problem of growing interest. The recent $240 million investment by Microsoft in Facebook clearly reaffirms the opportunity in contextual advertising for online social networks. Content-contextual advertisement programs such as Google AdSense and Yahoo Contextual Match work by automatically spotting keywords in web pages and displaying ads based on the keywords. The displayed ads are also referred to as Contextual Advertisements. Contextual advertising allows advertisers to display ads relevant to the content of the website rather than using the data about the visitor. Contextual ads can complement the content. Contextual ads are very effective for particular kinds of content. Some studies indicate they can increase click-through rate by 63%. These ads are generally represented by a URL along with a textual description that is also used to match the ad with the target page. User activity on venues such as forums, marketplaces, and groups on social networking sites are excellent targets for monetization.

Published by: Bayyavarapu Kranthi Kumar, Dadi Sharmila, Buraga Srinivasa Rao, Gedda PoojithaResearch Area: Contextual Advertisements

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Content-based advertising, Contextual advertising, RAKE, Scrapy, Advertising

Research Paper

106. Developing an advanced smart parking system using IoT

Internet of Things (IoT) plays an important role in connecting the surrounding things of an environment to the network and provides easy access from the remote location. It is essential that the people should be update along with the growing technology. In a present world, there are numerous number of vehicles owned by the people. Due to this large number of vehicles, there will be a lot of discomfort for parking of a vehicle at public places such as shopping complexes, function halls, and cinema theatres. In such places it is very difficult to find an vacant place to park the vehicle, even though it is a paid facility along with the security guard. In this study we design an Advanced Smart Parking System (ASPS) which identifies the vehicle and displays an empty slot on the display at the entrance gate of the parking. So that the person will know whether there is any availability or not before entering into the parking place. This system of design also provides the shortest path from the entrance gate to the assigned parking slot by showing the directions through LED’s. This process of implementation does not involve human interaction except the payment collection.

Published by: Dharmana Satyanarayana, Mounika Dulla, Abhinav Andrews Giduturi, DVVR Sarat Chandra, S. PrathapResearch Area: Internet Of Things

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Automatic license plate recognition, Smart parking system, Available parking slots

Research Paper

107. Smart irrigation using IoT

Smart Irrigation can transform agricultural discipline from being manual and static to automatic and dynamic resulting in higher production with lesser human intervention. This model maintains the desired soil moisture level in the soil and sends the data to Arduino. The Arduino acts as a control unit. Based on the sensed values, water will be supplied to the plant which can help us to avoid over-irrigation and under irrigation. Water sensor is used to sense the amount of water still available in the tank. Information from the two soil moisture sensors will be regularly updated to the web page using WIFI module and message alert will be sent to the user. Sensor values are uploaded to the thingspeak channel to generate graphs for analysis, the same can be viewed in-app and motor can be controlled. Real-time data can be viewed in thingspeak cloud.

Published by: Himavamshi, Yamini R., Vishnu Chaithanya Reddy K.Research Area: Internet of Things

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Automation, Two soil sensors, Wi-Fi, Real-time data

Others

108. Smart mobile devices using ultrasound proximity networking model in IoT applications

For sending a small amount of data such as URLs, IoT commands or encryption key are extremely common in IoT applications. Smartphones are used to transfer text commands to interact with IoT devices. This application uses ultrasound as a means of data transmission for proximity networking on commodity, consumer hardware. This application closely examines different modulation or demodulation schemes that are inaudible to humans and achieve a high data transfer rate. This application is designed a library to run well on low- powered devices, and provide a socket-like interface for easy deployment. This helps protect users from various attacks improving the security of our system.

Published by: Saranya S., S. Suma Christal Mary, Gayathri N., Anushree K.Research Area: Networking

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Modems, Smart devices, Transceivers, Filters, Device-to-device computing, Internet of Things, Acoustics

Research Paper

109. Exploring the potentials, issues, and challenges for community-based tea tourism development (with reference to Hanthana mountains)

The community-based tourism could be one way of creating a more sustainable tourism industry. Community based tourism brings numerous benefits to the wider community by increasing the standard of living in rural areas, which helps in reducing migration to urban areas. The study begins with an assessment of potential tea tourism products that could be developed in the community of Hanthana and the neighboring communities. The research based on qualitative approach in-depth interview and potential identification tool to identifying the tea tourism potentials within the Hanthana area. According to the findings, Hanthana can remark as the most suitable place to promote the tea tourism in Sri Lanka. Paper accomplishes research propositions in line with the empirical and theoretical justifications encouraging future research priorities

Published by: Jayasooriya S. S. W.Research Area: Tourism

Organisation: University of Kelaniya, Colombo, Sri LankaKeywords: Sri Lankan tourism industry, Tea tourism, Community based tourism, Sustainable tourism

Research Paper

110. Harassment- The threat to engineers’ life

This study has been done to investigate the events of harassment happening in an engineering college in India. Here the pie chart has been used to analyze the data that we have obtained from engineering students. The places and different ways a student is being harassed is brought to light here. Based on the answers by the participants, suggestions or initiatives to be taken to reduce harassment is stated below.

Published by: Mugunthan B.Research Area: Social Science

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Harassment, Ragging, Findings, College, Engineering

Research Paper

111. Purification of Noyyal River by using phytoremediation technology

Noyyal River is one of the highest polluting rivers in India and heavy metals present in river water is out of standard level. The effluent water of textile industries and spinning mills present in Trippur district discharged into the Noyyal River which polluted the Noyyal river. Because of this contamination affects the crop yields and human health. But purification of River Noyyal by using physical and chemical methods are highly expensive and complicated. In this study phytoremediation technology used for the purification of Noyyal river. Lesser Indian reedmace (Typha angustifolia) serve as a phytoremediation plant which helps in the cleaning up of contamination from the polluted river. The test results show that after phytoremediation treatment COD, BOD, cadmium, chromium, lead, zinc, copper and mercury level gradually reduced within 0 to 15 days interval. Lesser Indian reed mace plant easily grows in the banks of the river. If plantation of Lesser Indian reedmace planted in banks of the river which helps on the removal of heavy metals present in the water gradually. From the result, it can be concluded that the phytoremediation technology is suited for purification of Noyyal river.

Published by: Abarna M., D. RoopaResearch Area: Environmental Engineering

Organisation: Gnanamani College of Engineering, Namakkal, Tamil NaduKeywords: Noyyal River, Phytoremediation technology, Typha Angustifolia, Lesser Indian reed mace

Review Paper

112. Review on haze removal technique using advanced dark channel prior filter

This paper reviews and correlates various haze removal techniques to improve the atmospheric light estimation because the intensity of the dark channel is a rough approximation of the thickness of the haze. Images of outdoor scenes are usually degraded by the turbid medium (e.g., particles, water-droplets) in the atmosphere. Haze, fog, and smoke are such phenomena due to atmospheric absorption and scattering. The irradiance received by the camera from the scene point is attenuated along the line of sight. Furthermore, the incoming light is blended with the air light. The degraded images lose the contrast and color fidelity. In poor weather condition, fog removal from an image is an unavoidable problem. Various methods of fog removal have been described in literature. Initially, methods using multiple images which included the use of polarization filter. This method suffers from high time complexity and requirement of multiple images, resulting in non-suitability to real-time applications. This leads to the development of single image fog removal technique such as Dark Channel Prior (DCP), Improved Dark Channel Prior (IDCP), Dark channel prior with Histogram Specification, Anisotropic Diffusion and Improved Dark Channel Prior using Guided Filter. In proposed method, the dark channel is used to improve the atmospheric light estimation because the intensity of the dark channel is a rough approximation of the thickness of the haze. This property is used to estimate the transmission and the atmospheric light. A number of techniques has been proposed by various researchers to improve the atmospheric light estimation and to calculate air-light. The main intent of this review paper is to study and compare the distinct techniques of haze removal along with its drawbacks

Published by: Rakesh Sharma, Maninder KaurResearch Area: Image Processing

Organisation: I. K. Gujral Punjab Technical University, Kapurthala, PunjabKeywords: Image, Dehaze, Haze, Air-light, Contrast, Attenuation, Dark channel

Research Paper

113. Experimental investigation of clayey sand with plastic gunny bag as reinforcement

The soil which is generally weak and possesses high deformation values in vast areas are covered with soil deposits having low shear strength and high compressibility. Clayey sands (SC) mostly tend to exhibit high liquid limit (LL) and plastic limit (PL). The technique of combining any two materials of different strengths to form a composite single material of greater strength is the frequent procedure followed in civil engineering practice. The soil is quite good in compression and weak in tension can’t bear the load alone. When a material of high tensile strength is introduced in the soil as a reinforcing material, the soil turns into a composite material and tends to possess relatively very high strength and attains the ability to carry loads of heavyweights. Reinforced earth is a technique primarily used to increase the ease of construction and cost-effectiveness. Keeping in view the research findings outlined about, in the present experimentation, it was carried out to investigate the efficacy of plastic gunny bags stabilizing the weak soil, thereby, improving the shear strength and bearing capacity of the soil. A systematic methodical process followed involving experimentations in the laboratory under controlled conditions. It was observed that 1cm thickness and 0.03mm thickness of plastic gunny bags with clayey sand effectively improved the shear strength and bearing capacity of the soil.

Published by: A. Harika, V. Jagadeesh, S. Navya Sri, P. Manikanta, Ch. Praveen KumarResearch Area: Geo Technical Engineering

Organisation: Gayatri Vidya Parishad College for Degree and P.G. Courses (A), Visakhapatnam, Andhra PradeshKeywords: Clayey sand, Reinforced earth, Plastic gunny bags, Shear strength, Bearing capacity

Research Paper

114. Brake pad wear detection using machine learning

Most of the vehicles use a brake disk and brake pad system to stop the vehicle. Brake pad wear is a very important parameter in this system it has a direct effect on the braking performance of the vehicle. A machine learning approach, without using any intrinsic properties like the coefficient of friction of the brake pad material or the area of the brake pads or the composition of the brake pad material, has been proposed. The braking performance of the vehicle is reflected in its stopping distance and hence it is essential to relate the stopping distance and the brake pad wear. The same has been proposed in this document.

Published by: Chetan C. Harlapur, Priyatamkumar Kadiyala, Ramakrishna S.Research Area: Machine Learning, Automobile

Organisation: KLE Technological University, Hubballi, KarnatakaKeywords: Brake pad thickness, Stopping distance, Multivariate linear regression, Second order curve

Research Paper

115. Gesture based car control with gyroscope sensor and IoT based controlling

With many new devices to control the daily life products, we have our smart phones, when connected to a network with suitable supporting software is capable of controlling many other objects or devices it is connected to via the network. These Devices use any one of the protocols available for Internet communication to communicate between them. A Web controlled vehicle system is presented in this project work. It highlights the idea to develop a remote-controlled car which can be driven from within the car using the Internet over a secured server. This car has Ultrasonic sensors to measure the safety distance between itself and any other vehicle or any other obstacle. The main goal here is to minimize the work done or needed to drive a car with ease of driving experience. At the same time, the car will assure comfort and convenience to the controller. A miniature car including the above features has been developed which showed optimum performance in a simulated environment.

Published by: Kalaichelvan M., S. Sathiyapriya, Ch. Sai Ravi Teja, Jinka SumanthResearch Area: Microcontroller

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Remote control, IoT, Vehicle

Research Paper

116. Case study on LinkedIn, a media for career development

Social media is becoming a necessity in today’s world, more than ever before. Social media is delivering everything we want to know about pretty much anything, in a split second, and at our fingertips. While some embrace it and use social media regularly, others still don’t for multiple reasons; finding it difficult or they don’t want it to be intrusive or a mainstay in their lives. There are also more contemporary methods of obtaining professional contacts, such as networking online. Social networking sites such as Facebook, Twitter and LinkedIn are ideal for contacting and becoming noticed by employers that you otherwise wouldn’t have been able to speak with in person. For instance, did you know that according to the Bullhorn Reach Report, 97% of users registered with LinkedIn use it to source candidates for jobs? LinkedIn has several groups that you can engage in to showcase your knowledge and allow you to meet new people. This paper attempts to Highlights to understand. To know the various application usages, To know the purpose of using the LinkedIn, To know the role of LinkedIn in networking professional. & To know various professionals using it for career development. The results revealed that 44% of the respondents used LinkedIn for getting knowledge, to maintain relationship with professionals and for developing their career, 44% viewed LinkedIn is ranked as excellent in application usage, 46% said that LinkedIn meet their needs very well, 50% of the respondents said somewhat agreed that LinkedIn has helped them in networking professionally& 70% responded that they use LinkedIn for their profession.

Published by: Dr. Veena C. AngadiResearch Area: HR

Organisation: Global Institute of Management Sciences, Bengaluru, KarnatakaKeywords: Social media, Career development, Application usage

Research Paper

117. Luminance-chrominance-gradient high dynamic range imaging with improved bitonic filter tone mapping technique

In this paper, we will discuss a new process for High-Dynamic-Range Imaging. In contrast to the traditional method, we are processing the High-Dynamic-Range imaging process in luminance-chrominance-gradient space rather than RGB space. The main motive is to get the more efficient technique and also to avoid color-distortion generating from three different color channels. We introduced a camera responsive function for luminance channel so that we can find out the HDR luminance. On the other hand, for chrominance channels, we introduced weighting in relation to the saturation level. Our technique produces more natural tone-mapped images with more information. Once the luminance, chrominance, and gradient values are extracted from the image, based on logarithmic of the luminance value, the tone mapping technique approximates the appearance of the HDR image. In local tone mapping, there is a detail loss, artifact and higher computation time because of the tone mapping technique. To increase the image quality and to increase the performance of tone mapping is the main idea of the research. Improved Bitonic Tone Mapping (IBTM) is a new technique proposed for efficient tone mapping. In this method, edges have high weights than flat surfaces and a weight factor is added to the bitonic filter. When compared to different tones mapping algorithms like Reinhard, Drago, Exposure, and Gamma, Local adoption etc. shows that from the proposed technique we can achieve higher performance.

Published by: Ravi Teja Sankuratri, B. Ravi Kiran, Mohan Teja Chitturi, Pavan Kumar Rudhramahanti, Samhita RevuResearch Area: Image Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Improved bitonic filter, Luminance, Chrominance, Gradient, Tone mapping, High-Dynamic-Range

Research Paper

118. Land use and land cover change detection for Velachery using remote sensing and GIS techniques

The knowledge of land use/land cover changes is very important in understanding natural resources, their utilization, conservation, and management. Though urban growth is seen to be a worldwide phenomenon, in countries like India the rate of urbanization is very fast. India possessed a number of fast-growing cities. This paper presents the land use/land cover changes that have taken place in Velachery, from 2008 to 2018. To classify the urban land use and land cover supervised classification method has been employed. The GIS is used to prepare the different layers belonging to various land uses identified from remotely sensed data. The land use and land cover classification maps were prepared through Remote sensing and GIS technology. Nowadays in the analysis of temporal data at the district and city level, Remote sensing and Geographical Information System have gained great importance as vital tools in the analysis process. The results indicate that there was a significant increase in the built-up land decrease in the vegetation.

Published by: S. Thangaperumal, S. Aishwarya, H. GowsalyaResearch Area: Civil Engineering

Organisation: St. Joseph's College of Engineering, Chennai, Tamil NaduKeywords: Land use and cover, Change detection, Urban growth, Remote sensing, Geographical Information System

Review Paper

119. IoT based crack and pollution detection using Raspberry pi

The IoT integrate heterogeneous end system, which provides open access to a large selected set of information for the advancement of digital service. To surveil the safety of high rise buildings and the small deform of surroundings by contaminants are a pivotal task. We should ensure the fire safety, safety from excessive loads, vibrations, etc…. and it is essential to observe the strength of the clear-cut constructions in the event of infrastructures and we should ensure the environmental changes around us because of natural changes in the habitat. In recent years, a major consideration should be given to framework health monitoring technology to Diagnose condition of the framework using a sensor attached to them, and the number of research projects on the health monitoring of architectural structures is on the rise. If life-cycle cost is to be reduced for the building from fabrication to sustainment, much attention should be given to strength of the building. The detecting issues on the crack and pollution in the buildings play a major role in our project. Cracks can significantly increase the rate of gas and liquid transport into a structure. Although there is a general awareness that cracking can be caused when the building is not that much strength to face external issues. The cause of the cracking is important as it may have profound implications on the crack morphology, which can greatly influence the relative contribution to transport and the subsequent impact on overall performance. Prevention is better than cure, we need to be alert before the pollution level crosses the safer limits and to monitor the building before the arrival of distracts.

Published by: Jayachitra R., Kanusiya Devi T., Johned Blessy J., Harihara Sudan K., M. VivekkumarResearch Area: Embedded and IoT

Organisation: Sri Eshwar College of Engineering, Kondampatti, Tamil NaduKeywords: Raspberry Pi, Python IDE, Sensors, Crack, Pollution

Research Paper

120. Agricultural mapping and statistical analysis of Thanjavur district using remote sensing and GIS

Mapping and analyzing the agricultural lands using remote sensing and GIS technique is faster and cost-effective compared to conventional site verification method. Thanjavur is a district in Tamil Nadu which rich in agriculture. It is a lower riparian of Cauvery river. It is rich in alluvial soil, but its crop production is falling due to urbanization and water insufficiency. Failure of monsoon and insufficient river water are also major reasons. Since agricultural lands are depleting, the cost of agricultural products is increasing. LANDSAT 7 imagery is processed using ARC MAP 10.4 and classified using ERDAS IMAGINE 2014. By analyzing the results obtained through the process for decade 2009-2018 we concluded the percentage in area change for agricultural lands with crops and without crops, barren lands, urban areas, and water bodies. The study is to determine the drop in agricultural lands and its causes.

Published by: Thangaperumal S., T. Velan, J. Gnana JeevaResearch Area: Civil Engineering

Organisation: St. Joseph's College of Engineering, Chennai, Tamil NaduKeywords: GIS, LANDSAT, ERDSAS, Urbanization, Remote sensing

Research Paper

121. Automatic Waste Management

With an increase in population, the situation of cleanliness with relevancy garbage management is degrading hugely. The overflow of garbage publicly areas creates unhealthful condition within the surroundings. It is going to unfold many serious diseases amongst the folks living close. It conjointly degrades the valuation of the realm. To avoid this and to boost the improvement, Garbage Management System is projected during this paper. This paper presents a system to spot a garbage full condition which is able to be set by sensors (weight and level) during a timely manner and to alert the area |room} concerning constant. The role of the room is to seek out the current standing of auto and to send the SMS to the motive force alongside garbage container’s position. the motive force would then attend a given location and collect the rubbish. With the assistance of the system, we are able to offer an answer to this problem in Garbage Management System.

Published by: Manisha Rawal, Asha Sale, Mohammad Sayed, Rohan Mishra, Hrishikesh KagdeResearch Area: Electronics and Telecommunication Engineering

Organisation: Bharati Vidyapeeth College of Engineering, Navi Mumbai, MaharashtraKeywords: Sensors, Garbage management, Control room

Review Paper

122. Antibiotic Prophylaxis before dental procedures in patients at risk of Bacterial Endocarditis, a review article

Several studies show that dental procedures especially in case of gingivitis, peri-apical lesions and periodontitis with inflamed periodontal tissues or infected pocket epithelium surrounding the teeth may be a cause of bacterial invasion through the bloodstream and resulting in Infective endocarditis which is a severe disease that may affect the heart valves or the endocardium. The most common bacteria responsible for bacterial endocarditis are alpha-hemolytic streptococci like Streptococcus viridians but oral pathogens like Eikenella corrodens, Aggregatibacter actinomycetemcomitans, Capnocytophaga, and Lactobacillus species can cause bacterial endocarditis. In this review, we searched the United States National Library of Medicine at the National Institutes of Health (PubMed) to make out all articles that included the terms endocarditic, prophylaxis, oral or dental in the title. Several published sources of information relating to dental procedures, bacteremia, and infective endocarditis were reviewed. This review is focused on the patients that need prophylactic antibiotics and the recommended antibiotics for adults and children for dental procedures in which the prophylaxis is necessary. Antibiotic prophylaxis is indicated for patients with prosthetic cardiac valve, history of infective endocarditis, distinct Congenital Heart Diseases (CHD) and Cardiac transplant recipients with cardiac valvular disease. The most important pathogen responsible for endocarditis during dental procedures is S viridans (alpha-hemolytic streptococci). Antibiotic regimens for endocarditis prophylaxis are used against S viricians, and the recommended standard prophylactic regimen is a single dose of oral amoxicillin. For patients with high cardiac risk, antibiotic prophylaxis is recommended for all dental procedures like manipulation of gingival tissue or the periapical area of teeth or perforation of the oral mucosa.

Published by: Ali Forouzanfar, Hamideh Sadat Mohammadipour, Lohrasb DehghaniResearch Area: Dentistry

Organisation: Mashhad University of Medical Sciences, Mashhad, IranKeywords: Bacteremia, Infective Endocarditis, Oral, Dental procedures

Research Paper

123. Analysis in the changes in Chennai-Pallikaranai Wetland

The deterioration of Wetlands has become a devastating issue in the current scenario. Wetland, being the source for several species is a major Biodiversity which is under extreme danger. These wetlands also play a major role in flood control and in groundwater recharge. The major cause for this problem is Urbanization and Industrialization. The change caused in these wetlands reflects on its biodiversity which depletes the natural resources in and around the area. Based on its extent of deterioration, respective remedial measures might be taken to replenish the environment and in saving the endangered species. This could be achieved by the help of several LANDSAT images from USGS and with the help of remote sensing software ArcGIS. This project shows various wetland maps for Pallikaranai from 2008 – 2018, compares the rate of depletion/expansion of wetland’s water surface area and identifies the variation in dump yard area in the Pallikaranai wetland. The results indicate that there was a significant increase in the dump yard area land.

Published by: Thangaperumal S., Barath E.Research Area: Civil Engineering

Organisation: St. Joseph's College of Engineering, Chennai, Tamil NaduKeywords: Deterioration, Wetlands, Biodiversity, Remote sensing

Survey Report

124. Facebook spam detection

SPAM is any unwanted message or material in any form posted by so many fake peoples. Social networking sites play an important role because near about all peoples are spending more time on social sites just like Facebook, Instagram, We-chat, WhatsApp. The main thing is that all spammers know they can easily spread spam or fakes news through social sites. This project also provides the reason how user become victim to spam attack. A technique is proposed in the end discusses how to handle different types of spam or fake news.

Published by: Sajid Shaikh, Chaitali Jagdale, Mrunali Ghate, Sharad BabarResearch Area: Social

Organisation: MIT Polytechnic, Pune, MaharashtraKeywords: Facebook, Spam Detection, Caption, Spam, Secure Post

Thesis

125. Automation in body control module of a car

The number of automobile users is increasing day by day. At the same time, the number of people prone to accidents continues to rise. This is because drivers are exposed to a number of distractions. In order to reduce this, automation came into existence. Over the past two decades, the automotive industry has aggressively researched ways to exploit modern computing and electronic advances in body control modules to provide safety, reliability, comfort and entertainment technologies for users. In this paper, the automation system deals with the development of a Body Control Module (BCM) including features providing automatic control of windshield wipers, headlamps, sunroof, power window regulators with an anti-pinch feature. Developments of these features were accomplished using a PIC micro-controller 16F877A along with components like sensors, actuators, current drivers & signal conditioning circuits. The developed automation system is tested on a general purpose PCB with DC motors and LED.

Published by: Madhu A. R., Pradeepika R., Sandhiya P.Research Area: Engineering

Organisation: R. M. K. Engineering College, Kavaraipettai, Tamil NaduKeywords: BCM, Sunroof control, Power window, Anti-pinch, Windshield wiper, Headlight control, PIC16F877A

Review Paper

126. PSoC based haemoglobin measurement system

Globally, anemia is ranked to be the third killer disease and it continues to be a serious problem for health as well as social and economic development. It is estimated that iron-deficiency anemia affects 42% of children under age 5 and 53% of children from 5 to 14 years of age. In worldwide, the majority of the 56 million pregnant women and 468 million non-pregnant women affected by anemia live in sub- Saharan Africa and Southeast Asia. Also, children affected by anemia will result in impaired cognitive performance, motor development and language development. This project is that of a hemoglobin measurement system using PSoC. Hence the proposed project aims at constructing a non-invasive system for haemoglobin measurement.

Published by: Meera N., Akilandeswari S., Revanth S., Venkata Vivek, Veera AmudhanResearch Area: Electronics and Communication Engineering

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Haemoglobin, PSoC, LED

Research Paper

127. Smart Street light system using IoT

Nowadays conservation of energy is an essential part of day and day by day energy resource are getting reduced so our generation may face a lot of problem due to this lack of resource. In order to save energy, we have automated the street light which helps cities to save energy, cost and maintenance. The project aims to describe a method for modifying street light illumination by using sensors at minimum electrical energy consumption. When presence is detected, all surrounding street lights glow at their brightest mode, else they stay in the dim mode. LED bulbs shall be implemented as they are better than conventional incandescent bulbs in every way. This shall reduce heat emissions, power consumption, maintenance and replacement costs and carbon dioxide emissions. Also, a demonstration with a real-time prototype model involving costs and implementation procedure has been developed using the internet of things (IoT) to visualize the real-time updates of street processing and notifying changes to occur. The street light will obtain power from the solar panel. During the rainy season, it gets power from the government supply.

Published by: Kiruthika M., Kaviya R., Indhuja M.Research Area: IoT

Organisation: RMK Engineering College, Gummidipoondi, Tamil NaduKeywords: Street light, LDR Sensor, PIR Sensor, Solar Panel, IoT

Research Paper

128. Design and fabrication (development) of e-bike

The technology has been changing day by day, every day new invention and new technology will arrive. Whenever a new technology invented is to solve a past, existing problems. In this era the major problem is pollution and future problem is fossil fuel scarcity. In order to solve these problems, much new technology has been invented. In this invention, one of the best inventions is electric vehicles. These vehicles are free from pollution and also it will help to preserve some amount of fuel to the future generation. The current rate of usage of fuels continuously for the next 5 decades there will be arising of fuel drought.

Published by: K. Sai Chandu, G.M.V Siva Kumar, Kannaji, B. Kiran Kishore, P. Rama KrishnaResearch Area: Design

Organisation: Avanthi Institute of Engineering and Technology, Narsipatnam, Andhra PradeshKeywords: Bi-cycle , Motor (BLDC Motor with Hub), Battery, Dynamo, Throttle, LED Light

Research Paper

129. Maximize lifetime of Wireless Sensor Network by optimal sink deployment and sensor to sink routing

Wireless sensor networks typically contain hundreds of sensors. The sensors collect data and relay it to sinks through single hop or multiple hop paths. Sink deployment significantly influences the performance of a network. Since the energy capacity of each sensor is limited, optimizing sink deployment and sensor-to-sink routing is crucial. In this paper, this problem is modeled as a mixed integer optimization problem. Then, a novel layer-based diffusion particle swarm optimization method is proposed to solve this large-scale optimization problem. In particular, two sensor-to-sink binding algorithms are combined as inner layer optimization to evaluate the fitness values of the solutions. Particle swarm optimization constitutes currently one of the most important routing algorithms. Its popularity has stimulated the emergence of various variants of swarm-inspired techniques, based in part on the concept of pairwise communication of numerous swarm members solving the optimization problem in hand. PSO is a population-based optimization method. PSO consists of a swarm of particles which move towards an optimal solution of the problem. Particle uses their position and velocities (P Best & G Best) to find an optimal route. This paper show better result of Maximizing lifetime of wireless sensor networking by using PSO routing Fully Informed Particle Swarm Optimization (FIPSO) and Diffusion PSO Performance of those algorithms is also evaluated over a set of benchmark instances Compared to existing methods that the sinks are selected from candidate positions, our method can achieve better performance since they can be placed freely within a geometrical plane. Several numerical examples are used to validate and demonstrate the performance of our method. The reported numerical results show that our method is superior to those existing. Furthermore, our method has good scalability which can be used to deploy a large-scale sensor network.

Published by: Manpreet SinghResearch Area: Wireless Sensor Network

Organisation: Adesh College of Engineering and Technology, Faridkot, PunjabKeywords: Wireless Sensor Network, Sink placement, Particle Swarm Optimization (FIPSO and Diffusion PSO), Lifetime, Energy

Research Paper

130. Bus tracking system using Android and web application

Transportation becomes very difficult in cities like Mumbai. The public transports, especially BUSES are developing around the globe. Such public transports reduce the usage of personal vehicles so reducing fuel consumption and mollifying traffic congestion. The problem with BUSES is that the commuters DO NOT know the exact temporal arrangement of the arrival of BUSES at their stops. This leads to looking ahead to BUSES for 30-35 minutes because the commuters are not aware of what time exactly the BUS is to arrive. The approximate arrival time of BUSES is known but there could also be a delay in arrival thanks to traffic. Seeing that people started avoiding public transports and started victimization non-public vehicles, many applications were developed; but these applications were unable to mitigate the problems. Some applications provided only the arrival time and point in time of BUSES at their supply and destination. Some of them provided time-tables, but even they weren't correct as they failed to contemplate the delay thanks to unpredictable factors like – traffic, harsh weather situation, etc. The timetables were not timely updated leading to waiting for BUSES.

Published by: Mayur Kharat, Manoj Mishra, Sanket Panchal, Pooja Walve, Suyog KadgeResearch Area: Engineering

Organisation: Atharva College of Engineering, Mumbai, MaharashtraKeywords: Arduino, LED display, Wi-Fi module, JAVA JDK, ANDROID STUDIO 3.1, ASP.NET

Case Study

131. Anomaly detection in code base

Any product when under development, goes through numerous changes before finally being released to the customer. While these changes are being done, it adds new features, modifies existing ones. How do we know if a product is in good shape to be released? Yes, we test the product, run the existing unit, functional, performance tests etc. What if the number of tests is in 10000s. How do we analyse each test result? Is there an automated way to detect the overall health of the product using the results of regression tests? Anomaly Detection using machine learning algorithms gives us a way to find out the overall health of the product. Using Anomaly Detection, we can quickly find out about the code base and if new changes should be allowed in before the existing code base is stabilized. It helps to determine, how far the existing code base is away from being released to the customer. It can help the code base to be almost always stable irrespective of the number of code changes that are merged into it.

Published by: Sudipto NandanResearch Area: Machine Learning

Organisation: Oracle India Private Limited, Bengaluru, KarnatakaKeywords: Anomaly detection, Regression results, Isolation forest, Principal Component Analysis

Survey Report

132. Twitter sentimental analysis

This paper presents the effectiveness of linguistic features to identify the sentiment of Twitter messages using the apache storm framework. We calculate the effectiveness of present lexical resources and features that capture information about the informal and creative language used in microblogging. In the past few years, there has been a huge growth in the use of microblogging platforms such as Twitter. Influenced by intensification, companies, and media organizations are increasingly seeking ways to excavate Twitter information about what people think and feel about their products and services. Here we download Twitter messages for a particular hashtag and carry out sentiment analysis i.e. to find a positive, negative or neutral sense of that tweet using apache storm framework. Each hashtag may have 1000 of comments and new comments are added every minute, in order to handle so many live tweets we are using apache storm framework.

Published by: Mandar Menjoge, Vedant Bhawalkar, Mazhar Sayyad, Jainam GosaliyaResearch Area: Social

Organisation: MIT Polytechnic, Pune, MaharashtraKeywords: Sentiment analysis, Apache storm framework, Preprocessing, NLP, K-means clustering, Porter stemming algorithm

Case Study

133. Fire monitoring system using RF module

The objective of this project is to design and monitor system for the fire alerts in the surrounding environment using Flame sensor. It is transmitted wirelessly using an RF module. The output is displayed in LCD and Lab-VIEW GUI.

Published by: Vedashree J., Abinaya S., Ganesh Babu C., Muchenedi Hari KishorResearch Area: Embedded

Organisation: Bannari Amman Institute of Technology, Erode, Tamil NaduKeywords: Open-source platform, Flame sensor, Lab-VIEW

Research Paper

134. Forensic Criminology

This research focuses on the history development of forensic science and also shed light on the fusion of science and law that is how forensic science has brought in the administration of justice. This research aims to point out the flaws in the laws with reference to forensic evidence.

Published by: Barani ManikantanResearch Area: Role of Forensic Science Under Law

Organisation: CMR Law School, Bengaluru, KarnatakaKeywords: Forensic, Criminal justice, Judicial approach

Research Paper

135. 3D reconstruction of regular objects from multiple 2D images using a reference object

The dimensional analysis of an object from an image reduces a lot of burden for a user, like the traditional measuring tape method. Using the dimensions will make reconstruction of the 3D model of the real-time object easier. However, this method is not used in the current implementation. Dimensional analysis can also be helpful in online shopping where the user’s availability for fitting is not possible. 3D model replaces the fitting stage in online shopping. Once the dimensions of an object’s surface are found, it is easy to calculate surface areas, given surface areas we can calculate volume. But the calculation of volume requires more than one dimension of the object. In this paper, an approach using a reference object, whose real-time dimensions are already known is used. The whole process is divided into three tasks - Object detection using SURF algorithm, Dimensional Analysis of the 2D object using pixel per metric ratio given that there is a reference object on the same plane and 3D reconstruction using Structure from Motion algorithm.

Published by: Krishna Sai Joga, K. Kavya Sree, Navya Spandana, G. Gowri PushpaResearch Area: Image Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Object detection, SURF, Dimensional analysis, Pixel per metric, 3D reconstruction, Structure from motion

Research Paper

136. Secure distributed cloud service using trusted third party

Cloud storage is a system with a distributed data center that takes advantage of virtualization technology and provides an interface for data storage. It makes servers or data centers able to work together for conveniently sharing and accessing resources. Enterprise cloud user demand that there is a secure supply chain and that every step in that supply chain can be verified in real-time and when things go wrong it is more possible to figure out what went wrong and that there is someone who can be held accountable. Before storing data to an untrusted cloud server, some measures should be adopted to guarantee the security of data. However, the communication overhead will increase when users transmit files encrypted by traditional encryption schemes. Remote data integrity checking enables a data storage server to prove to a verifier that it is actually storing a data owner’s data honestly. We use Hadoop file system to provide high throughput access to user data. If the semi-honest cloud server does not delete the data honestly and returns an incorrect deletion result, the misbehavior of the cloud server can be detected by the data owner with an overwhelming probability. The user cannot deny after requiring the cloud server to delete the data. This implies that the proposed scheme can support traceability.

Published by: Hari Kumar P., Chandra Sekar S., Dinesh Kumar V., Gopikrishna G.Research Area: Cloud Computing

Organisation: SRM Easwari Engineering College, Chennai, Tamil NaduKeywords: Data integrity, Cloud storage, Cloud security, Hadoop file system

Research Paper

137. A study on impact of stress levels among students using random forest algorithm

Mental health presents one of the greatest and real challenges to the current generation of students. The competitive lifestyles cause them to manage different challenges to achieve their goals and people to be eager to achieve something, causing them to manage multiple frustrations and demands. In this pressurized and highly technical environment, anxiety disorders have slowly occupied their mental health. Nowadays Generalized Anxiety Disorder (GAD) is one of the mental health problems among students. It has been reported that about 2-5% of them. Here our raw data like questionnaire is a valuable resource, but it is underutilized at some circumstances. It could potentially be converted into useful and understandable knowledge via data mining technology. Data mining is capable to identify hidden patterns and relationships that can be used for predicting different disorders. For effective prediction, the random forest approach is one of the classification data mining techniques which produces good predictive characteristics. Therefore, this research adopts a random forest approach to predict different disorders like Generalized Disorder, Anxiety Disorder, Depression, and the accuracy of the predictive result is reported.

Published by: Pinninti Kusuma, Dokkari SivaResearch Area: Data Mining

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Data mining, Random forest, Generalized anxiety disorder, Knowledge

Research Paper

138. Neonatal incubator monitoring system using IoT

There are many innovations occurring in the medical field like needle-free diabetes, robotic check-up, etc. But still, medical accidents are happening in today world due to improper care which even leading to death. We are aware that many infants were dead in recent times due to both human error and machine error. Hence we discuss the advancements that can be brought to the present machines such that the newborn babies would be safe and thus leading to the prevention of accidents that occur in the incubator. To control the accident, need to monitor continuously with better involvement, it is done only through automation. The medical staff can monitor anytime, anywhere. Prevent the infant from the fire and also keep them safe.

Published by: Vignesh T. C., Jai Kumar S., Hari Krishna R., Krishna Raj M.Research Area: Information Technology

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Health, Monitoring system, Nenotel patients, Incubator alert messages

Research Paper

139. Deforestation: A quantitative analysis using remote sensing and GIS

Deforestation and forest degradation are the second leading causes of greenhouse emissions and fossil fuel combustion, which is responsible for over 17% of global carbon dioxide emissions. Deforestation and forest degradation have become an important issue concerning climate change mitigation, highlighted in the Governmental Panel on Climate Change Fourth Assessment Report in 2007. About 75% of the emissions from tropical deforestation and forest degradation have been from developing countries containing large areas of tropical forest, including India. Global initiatives such as the United Nations Framework Convention on Climate Change program on Reducing Emissions. In this thesis, we are mapping about the deforestation for maintaining future of living organisms.

Published by: Thangaperumal S., k.Jaya Surya, Anbin B. BervinResearch Area: Civil Engineering

Organisation: St. Joseph's College of Engineering, Chennai, Tamil NaduKeywords: Deforestation, Remote sensing, Mapping, Forest degradation

Research Paper

140. Impact of CSR Spending on firm’s financial performance

This paper examines the impact of CSR spending on the firm’s financial performance. The government has made CSR spending mandatory by which the organizations can significant contributions to the benefit of the public. The data for the study was collected for 5 years and the study takes into consideration the top ten companies for CSR spending. In order to find out whether CSR spending has an impact, three variables are taken into consideration such as ROA, EPS, Net Profit. Independent Pooled OLS Regression, Fixed Effect and Random effect method was used. The findings were that the Net profit has a significant relationship with the CSR Spending whereas ROA and EPS have no impact.

Published by: Grizel MenezesResearch Area: CSR

Organisation: Christ University, Bangalore, KarnatakaKeywords: CSR Spending, Financial Performance, EPS, ROA, Net Profit

Research Paper

141. A study of groundwater quality and mapping using GIS techniques in Kodungaiyur, Chennai

Groundwater quality in Kodungaiyur, Chennai district has special significance and needs great attention of all concerned since it is the major alternate source of domestic, industrial and drinking water supply. The present study monitors the groundwater quality maps using GIS techniques for a part of Kodungaiyur. Physico-chemical analysis data of the groundwater samples collected at predetermined locations forms the attribute database for the study, based on which, spatial distribution maps of major water quality parameters are prepared using curve fitting method in Arc View GIS software. GIS has been used extensively to assess the water quality all over the world, advancement of Geographical Information System (GIS) and Spatial Analysis help to integrate the laboratory analysis data with the geographic data and to model the spatial distributions of water quality parameters, most robustly and accurately. The objective of the study is to evaluate the water quality map in Kodungaiyur. For this purpose, Inverse Distance Weighed (IDW) spatial interpolation technique has been used to estimate the spatial distribution of the water quality parameters and WHO standards. The results are compared with WHO permissible limits from the point of view of the suitability of groundwater for human consumption.

Published by: S. Thangaperumal, S. Monica Shree, D. P. Noel Bhuvana RaniResearch Area: Civil Engineering

Organisation: St. Joseph's College of Engineering, Chennai, Tamil NaduKeywords: Groundwater, Quality, GIS, Image interpretation, Thematic, Spatial distribution, Attribute database, Water quality Index

Review Paper

142. Towards privacy preserving content based image retrieval in cloud computing

Content-Based Image Retrieval applications have been rapidly developed along with the increase in the quantity availability and importance of images in our daily life. However, the wide deployment of Content-Based Image Retrieval scheme has been limited by its the server computation and storage requirement. Privacy-Preserving Content-Based Image Retrieval scheme, which allows the data owner to outsource the image database and Content-Based Image Retrieval service to the cloud, without revealing the actual content of the database to the cloud server. Local features are utilized to represent the images, and Earth Mover's Distance is employed to evaluate the similarity of images. The proposed scheme transforms the Earth Mover's Distance problem in such a way that the cloud server can solve it without learning sensitive information. The security analysis and experiments show the security an efficiency of the proposed scheme using a Secure Hash Algorithm.

Published by: M. Meena, C. S. Kavya, K. Balaji, M. Kishore, P. Suman KumarResearch Area: Computer Science

Organisation: Mother Theresa Institute of Engineering and Technology, Chittoor, Andhra PradeshKeywords: Cloud Computing, Searchable Encryption, Image Retrieval, Local Search, Earth Movers Distance

Research Paper

143. Any time medical assistance and medicine vending machine using machine learning

This research aims to bring one step solution to the people for their medical treatment which includes online diagnosis, online consultation with medical experts and providing generic medicines. A major advantage is that people can access this ATMAMVM in public places available 24x7. This project provides basic medical treatment facilities within the reach of the people not benefited so far due to their location and also in concern of physically challenged and aged people. It is mainly focused to treat minor health ailments and to provide first aids.

Published by: Sivasubramaniyan S., Srivarshini M., Deepthi P. S., Dr. Janarthanan P.Research Area: Healthcare Using Computer Science Technology

Organisation: Sri Venkateswara College of Engineering, Sriperumbudur, Tamil NaduKeywords: Medical equipment, Patients, Drugs/medicines

Research Paper

144. A study on stress and its management among young adults- An empirical study

Stress is a physical, mental or emotion factor which causes mental tension. Everyone needs stress free life irrespective of their life span. But how many do live stress-free life is the big question nowadays. Stress has become a common worry for every individual in this present generation people. Mainly students are facing lots of stress from different factors and are not able to control their stress levels and suffer with some health issues which are a huge damage for the younger minds of this generation, which in turn damages the new ideologies which are to be generated as the nation’s development is in the hands of young minds. The main objective of the study is to find the stress levels and reasons of stress and the ability of handling stress among young adults (17-22 years) and the sample size is 84 where 64 males and 24 females are responded for the survey and data is collected through primary data collection method with a questionnaire of 25 questions and the results found the factors and level of handling stress among them.

Published by: P. Sai Dheeeraj Reddy, P. Venkata Subbu PadminiResearch Area: Business Administration

Organisation: Sree Vidyanikethan Institute of Management, Tirupati, Andhra PradeshKeywords: Stress, Younger minds, Generation, Ideologies

Research Paper

145. Footings resting on a trench of waste glass material

One of the best method used to improve the bearing capacity of a soil is by making a trench filled with granular material. Present study focused the effect of providing waste glass as a replacement material in the trench. The results shows that, glass is a good replacing material at an optimum configuration with rectangular shaped trench.

Published by: Athira C. H., Binil GopinathResearch Area: Ground Improvement

Organisation: St. Thomas Institute for Science and Technology, Thiruvananthapuram, KeralaKeywords: Bearing capacity, CBR, Plate load test, Trench, Waste glass

Research Paper

146. Characterization of municipal sewage sludge and reprocess as fertilizer at Jijiga University sewage treatment plant

Jigjiga University is one of the new universities in Ethiopia, which is established from 2009. The total area of this campus is 350 hectares and the total population is 21374 students and 2155 teaching as well as non-teaching staff. The maximum quantity of sewage flow in the campus is 882337 lit/day approximately. University constructed a treatment plant in the campus and the following treatment process is followed like Screening, sedimentation (primary and secondary), coagulation, oxidation ditch, sludge digestion, and oxidation pond. But here they are focusing only on the sewage treatment process. But here I am focusing to use sewage sludge as a fertilizer after the treatment process. The profitable indicators selected were money, process and administration, and user costs because they resolve the profitable affordability of a particular technology to society. Environmental indicators include energy use because it in some way measures resource utilization, and performance of the technology. Find the treated sewage sludge nutrients such as potassium, ammonia, nitrogen, phosphorus, and other compost. These indicators also determine the reuse possibilities of the treated wastewater sludge as fertilizer. Community indicators detain educational recognition of the technology through public participation and also measure whether there is an improvement in the community from the specific technology. The overall results of this study prove that sewage sludge having fertility content and we can use sewage sludge as a fertilizer by sewage treatment technology.

Published by: Udhaya Kumar, Ismail Mahamud MahamedResearch Area: Environmental Engineering

Organisation: Jijiga University, Jijiga, EthiopiaKeywords: Municipal sewage sludge, Screening, Fertilizer, Nutrients, Community, Treatment technology

Review Paper

147. Achieving secure file download by traffic and energy saving encrypted search technique and generate key image using BVCS

Cloud Computing is a model of Internet-based computing where resources like storage space, online software are provided by different cloud service providers to different types of cloud users who need cloud services. When a cloud user outsources the data on cloud, it has to provide more security for outsourced data preventing data manipulated or accessed by unauthorized users. To maintain data integrity, each and every cloud service has to be stored securely. For easier accessing of files and to generate file indexes, each file is stored in cloud server. Now cloud users search files and again send download request to cloud server. This process is time consuming and also there is a chance that the cloud service provider might access those files which is stored in the cloud server, because both the encrypted file with correspondent keys and file indexes are stored in cloud server. To overcome these problems, this system introduces storage nodes for storing file indexes and encrypted files and cloud server stores files keys. When a cloud user uploads file, the file index is generated automatically and file is encrypted by using AES algorithm with automatically generated key. After that by Visual cryptography scheme, the key is converted into image and then generated as key image and source images respectively. The encrypted file and the file indexes are stored in storage node, key and source image are stored in cloud server and key image is passed to file owner. Whenever file owner or file users want to download or access files then perform search and then put key image as an input. If valid, it matches the key with the source image and later it can be downloaded.

Published by: Jeshima Firdouse R., Shivani G.Research Area: Cloud Computing And Security

Organisation: Velammal Institute of Technology, Chennai, Tamil NaduKeywords: BVCS, Traffic efficiency, Energy efficient, FAH Algorithm, AES Algorithm

Research Paper

148. Studies on optimization of fermentative hydrogen production by an isolated strain

Facultative strain of bacteria capable of producing hydrogen was isolated from soil sample rich in decomposed biomass. The isolated strain was characterized and the process parameters, namely pH, temperature and fermentation time were optimized for the maximum hydrogen production. The optimum conditions were found to be: pH-7, temperature-34oC and fermentation time-42hrs. Under these optimum conditions, the isolated strain achieved the highest hydrogen production rate of 2.84 ml H2/L.h

Published by: Manikkandan T. R.Research Area: Bio Fuel

Organisation: Annamalai University, Chidambaram, Tamil NaduKeywords: Biohydrogen, Facultative bacteria, pH, Temperature, Fermentation time

Research Paper

149. Design and analysis of velocity profile of air in engine inlet manifold

This project deals with the improvement of the performance and to achieve the even distribution of flow at each cylinder, to select the best turbulence model for the analysis of intake manifold using computational fluid dynamics, to achieve the maximum mass flow rate through the runners. To achieve the even flow of distribution and improve the volumetric efficiency, we divided his analysis into four different parts. In each part, a different iteration of inlet manifold used in Maruti Gypsy’s G13BB engine is used. In this analysis, plenum size is only changed in small values to show the effects of the shape of runners on output. Dividing the work into four different parts provide the greater refinement in the result. Runner shape is determined by the operating conditions of the engine assembly in which the inlet manifold is used. The intake runner diameter influences the point at which peak power is reached while the intake runner length will influence the amount of power available at high and low RPM. To find the best results, we perform the experiments in Ansys Fluent for possible designs and find the effect of curved and branched runners were providing higher volumetric efficiency and even flow of distribution to each cylinder. For designing final intake manifold we select the best design from all four parts and perform the experiment using computational fluid dynamics software Ansys Fluent. This project work brings the design concept and analysis method of “DESIGN AND ANALYSIS OF VELOCITY PROFILE OF AIR IN ENGINE INLET MANIFOLD”.

Published by: Josbin C Mathew, Dharmadurai R., Ajay Krishnan P., Mohammad Shabeeb P. K., Dr. P. ManiiarasanResearch Area: CFD Stimulation

Organisation: Nehru Institute of Engineering and Technology, Coimbatore, Tamil NaduKeywords: Intake manifold, Plenum, Volumetric efficiency, Computational fluid dynamics

Research Paper

150. Classification of attack types for intrusion detection system using machine learning algorithm: Random forest

In the current era of Big Data, a high volume of data is being grown in vast and the speed of generating the new data is accelerating quickly. Machine Learning algorithms are used for such large datasets to teach computers how to reply to and act like humans. In machine learning with the help of generalization ability, the increase in the size of the training set increases the scope of testing. In this paper, we analyze the results of the attacks classified using Intrusion Detection System, and the training time of Random Forest algorithm is measured by increasing the size of the KDD dataset in intervals thereby observing the changes in the final evaluation metrics obtained

Published by: Dasari Sree Lalitha Chinmayee, C. Visishta, Garbhapu Navya, Sajja Ratan KumarResearch Area: Network Security

Organisation: Anil Neerukonda Institute of Technology and Sciences, Bheemunipatnam, Andhra PradeshKeywords: Classification, Intrusion detection system, KDD dataset, Evaluation metrics

Research Paper

151. Fault detection monitoring and controlling of induction motor using Zigbee

Our project is basically based on monitoring and controlling of the induction motor by the use of a Zigbee module. Microcontroller and other sensors play an important role in this monitoring and controlling of the induction motor. This type of monitoring helps to take preventive measures against induction motor when a fault occurs.

Published by: Niraj, Tejas Borde, Prasad MulumkarResearch Area: Electrical

Organisation: Universal College of Engineering and Research, Pune, MaharashtraKeywords: Fault detection, Zigbee

Research Paper

152. Android mobile hacking using Linux

Backdoors are one of the most complicated types of Android malware. A normal backdoor carries out its functionalities such as installing itself into the system directory, disabling system apps, or gaining access to app’s data, to steal and upload sensitive info, download and ask to install applications and set up mobile botnets when setting proper Android permissions. This project focus on how Android devices are hacked using backdoors and how they can be stopped from doing so. The backdoor application when installed and turned on the mobile allows an attacker to read, write and modify the data. Due to Backdoor attacks Confidentiality, Integrity, and Accountability of the information security are lost. When the application is installed on the victim's mobile and the victim opens the application it creates the meter-preter session which permits the attacker to access functions like webcam, contacts, read SMS, send SMS, read call log, write call log, access storage, install applications.

Published by: Arulpradeep S. P., Vinothkumar P., Nilavarasan G. S., Sai Harshith Kumar S., Naveen P.Research Area: Android

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Kali Linux, Android, Back-doors, Meter-preter, Metasploits , Apache2 server, Payload, MSF-venom

Research Paper

153. Artificial Lampyridae Classifier (ALAC) for coronary artery heart disease prediction in diabetes patients

Soft computing techniques and its applications extend its wings in almost all areas which include data mining, pattern discovery, industrial applications, robotics, automation and many more. Soft computing comprises of the core components such as fuzzy logic, genetic algorithm, artificial neural networks, and probabilistic reasoning. In spite of these, recently many bio-inspired computing attracted attention for the researchers to work in that area. Machine learning plays an important role in the design and development of decision support systems, applied soft computing and expert systems applications. This research work aims to build an artificial Lampyridae classifier and also compared with Takagi Sugeno Kang fuzzy classifier and ANN classifier in terms of prediction accuracy, sensitivity, specificity, and Mathew’s correlation coefficient. The significance of MCC is to test the ability of the machine learning classifier in spite of other performance metrics. Implementations are done in Scilab and from the obtained results it is inferred that the built ALC outperforms that that of TSK fuzzy classifier and ANN classifier.

Published by: B. Narasimhan, A. MalathiResearch Area: Computer Science

Organisation: Government Arts College, Coimbatore, Tamil NaduKeywords: Soft Computing, Fuzzy logic, Machine learning, CAHD, Diabetes, Artificial neural network, Applications of soft computing

Research Paper

154. Development of conducting organic polymer film by R. F. plasma polymerization

Electrodeless R.F. capacitive coupling is used to make plasma polymer. The thickness of the film measured to be 8.0 µm. The film is made conducting by doping with Iodine. The resistivity measured with Vander Pauw’s Method and it was found to be 1.7 KΩ cm. Hopping conduction mechanisms found to be the probable mechanism of charge transport in the obtained polymer film

Published by: Mukesh NigamResearch Area: Plasma Physics

Organisation: Lakshmi Narain College of Professional Studies, Gwalior, Madhya PradeshKeywords: R.F.Power, Polymer, Capacitively coupled, Doping, PolyAcetylene

Review Paper

155. College bus tracking system

This project is based on a Real-Time College Bus Tracking Application which runs on the website. This enables students to find out the location of the bus so that they won't get late or won't arrive at the stop too early. The main purpose of this website is to provide the exact location of the student's respective buses in Google Maps besides providing information like bus details and distance. College students use this website. It is a real-time system as the current location of the bus is updated every moment in the form of latitude and longitude which is received by the students through the website on Google maps. The application also estimates the time required to reach a particular stop on its route. This mode of communication can be useful for the bus tracking system.

Published by: Sangavi K. A., Vinitha N., Vimala R., Ramesh A.Research Area: Electronics And Communication Engineering

Organisation: Sri Eshwar College of Engineering, Kondampatti, Tamil NaduKeywords: GPS, Arduino UNO, Wi-Fi module

Review Paper

156. Non-destructive testing by liquid penetrant testing and ultrasonic testing – A review

Non-destructive testing (NDT) is commonly thought of as a broad field. However, at its core, it refers to a good cluster of tested review ways to analyze the soundness of a cloth, part or structure while not with chemicals or physically neutering it. When it involves correct results, non-destructive testing is reliable due to the variability of obtainable and complementary choices. Any given piece of kit or machinery may be subject to a variety of NDT that eliminates the danger of oversight or quality. This paper consists of a detailed review about the latest researches carried out for finding out the defects using LPT and Ultrasonic method and how it improves the quality of the products by reducing the time taken for testing. NDT is one of the finest and accurate quality tool used in reducing the costs of testing. The Liquid Penetrant Testing (LPT) technique is usually used for the scrutiny of non-ferrous materials and non-magnetic materials like Al, chrome steel in addition as alternative materials which may not be inspected by the Magnetic Particle technique. Ultrasonic testing is mostly used for finding minute deflections and flaws in the materials using transducers.

Published by: C. Chris Roshan, Raghul C., Hari Vasanth Ram, Suraj K. P., John SolomonResearch Area: Non-Destructive Testing

Organisation: Hindustan Institute of Technology and Science (Deemed to be University), Chennai, Tamil NaduKeywords: Non-Destructive Testing (NDT), Liquid Penetrant Testing (LPT), Ultrasonic Testing (UT), Transducers, Non-ferrous, Non-magnetic, Magnetic particle technique

Others

157. Accident detection and rescue information system

Nowadays accidents have been a quite common problem for the people who are in highly populated countries. Every day most of the people here are met with accidents and losing their lives. At least if there is an availability of emergency facilities there is a chance of saving lives. This project is to overcome the drawback mentioned if any vehicle met with an accident immediately a vibration sensor in the pre-installed device kept in the vehicle gets activated and sends signals to the Arduino microcontroller. Now the microcontroller will send an alert message through GSM modem includes the location coordinates to the police station or to the rescue team so that the rescue team or police can be able to locate the location easily using GPS modem to provide emergency facilities or they will take them to the nearest hospital once the information received. The proposed system has been simulated and practically designed using hardware components and the results are satisfied with the explanation.

Published by: K. Ramamohan Reddy, M. Lavanya Latha, B. Mallikarjuna ReddyResearch Area: Electronics and Communication

Organisation: Audisankara Institute of Technology, Nellore, Andhra PradeshKeywords: Arduino, GPS, GSM, Vibration Sensor

Technical Notes

158. Event detection and identification using social media data stream

Today Social Media plays an important role in our life. Some popular social media platform such as Facebook, Twitter etc. Using these we can be connected with each other. We Create and share the Events on social media. Events such as Earthquake, conference, News, Weather news. To detect and identify the specific event from a group of the event is the crucial task. Traditional methods are not efficient for the detecting events and it requires more human intervention and having less accuracy. Our Aim is to detect and identify the events with less human intervention and higher the accuracy using LDA, HITS method.

Published by: Uday Pradip Patare, Abhishek Gajre, Ankita Mahajan, Pradnya Patil, Y. S. DeshmukhResearch Area: Information Technology

Organisation: Sanjivani College of Engineering, Kopargaon, MaharashtraKeywords: Event detection, LDA, HITS, Twitter

Research Paper

159. Performance analysis of Vortex tube refrigeration system

This paper represents the experimentation of the Vortex Tube Refrigeration system. Vortex tube also known as Ranque-Hilsch Vortex tube. A Vortex Tube is a Mechanical Device, which generates cold and hot streams from a single injection of pressurized gas. Without any moving parts or chemical reaction within the tube, the intersecting phenomenon of energy separation results only from fluid dynamic effects. The Control valve is a screw located at the hot end and cold end with thread on it which is used to restrict the flow of air due to which the small forced vortex takes place after stagnation point and free vortex get away through the hot end as hot air and cold end as cold air. At the other end small orifice plate is located to further reduce the temperature Drop. The 2.5 HP compressor is used for experimentation for low pressures. Also, for higher pressures it is difficult with a low capacity compressor to get the accurate results. For this purpose, a model has been developed using experimental data to predict the results for the pressure range of 1to 6 bar. We have attached Thermo-electric module to system to generate electricity without affecting the efficiency of the system.

Published by: Jitendra Patil, Saurabh Murkute, Ketul Chauhan, Abhishek Dahake, Yogendra Borje, Shinu Philipose, Anmol Arora, Md. Hasan AkhtarResearch Area: Mechanical

Organisation: S. B. Jain Institute of Technology, Management and Research, Nagpur, MaharashtraKeywords: Vortex Tube, Design of vortex tube, Thermoelectric module

Research Paper

160. Women protection system using microcontroller and Android application

Women Protection System aims at helping women from any type of physical attack. A Conductive Belt having magnetic circuit is used which will prevent any kind of attack from occurring. A mobile application is to be implemented that informs the user-defined numbers about the emergency alert and location of the use. This application can be accessed automatically as well as manually. The microcontroller is used to achieve this purpose. The connectivity between the microcontroller and the mobile is maintained through the Bluetooth modem. At the same time, women are facing problems like kidnapping, harassment, molestation etc. The women security issue has become most important. The women security system has considered for providing a solution to different problems. The important part of the system is the prevention of incident & communication through a wireless medium. A security system in which prevention will be the highest event & communication is the second event.

Published by: Gayatri Sanjay Chopade, Pramod Rodge, Pournima Fulwade, Pranit BandkarResearch Area: Computer Engineering

Organisation: Shivajirao S. Jondhale College of Engineering, Thane, MaharashtraKeywords: Conductive belt, Microcontroller, Bluetooth modem

Research Paper

161. Particulate emission control and direct carbon dioxide capture

The atmosphere is one of the valuable resources which needs to be protected for future generation. It’s being increasingly polluted every year. In the past 10 years the air in the many regions of our country such as Delhi, Mumbai is seriously polluted. Due to modernization and development, the use of automobiles was increased which emit harmful exhaust toxic gases with particulate emission. The level of CO2 content in the atmosphere was increased up to 410 ppm. In the meantime, CO2 is also the raw products for many industries such as food processing industries, Pharmaceutical industries, fire extinguishers etc. We have conducted experiments to capture carbon dioxide from direct air. This process is carried out using a carbon absorbent solution made to react with atmospheric air in the reaction chamber in which carbon dioxide present in the air directly captured in the absorbent solution. Air is constituents of various gases. Here we discussed in capturing the carbon from the air. Direct air capture is leading technology to capture CO2 from the air. Here various concentrations of solutions are made to effective capture of carbon dioxide. In addition, Electrostatic precipitator is implemented to control the particulate emission. It holds the small micro dust particles up to 2.5 PM. The operation performs in controlling particulate and capturing carbon dioxide from the air.

Published by: A. Kanagaraj, M. Hariharan, R. Ajith, S. Nandha Kumar, P. DeepanResearch Area: Mechanical

Organisation: Akshaya College of Engineering and Technology, Coimbatore, Tamil NaduKeywords: Atmosphere, Particulate emission, Electrostatic precipitator, Direct air capture

Others

162. An approach to develop a smart and intelligent wheelchair

We live in a world, where the technology is growing to the next level every day. But it is very strange to see paralyzed people depending on someone's help for there mobility. In this project, we have developed a smart wheelchair which helps the completely paralyzed patient to move on their own. This is achieved by the voice control method by using an android application connected to the accelerometer. Another method is a hand gesture control method. In this method, we use the flex sensor to control the motion of the wheelchair. Hand gesture control can be used only by partially paralyzed patients. The Android-based voice control through the Bluetooth has been designed in the motor, the motor is controlled by the predesigned embedded C software.

Published by: Naveen Kumar K., T. Swetha M. E., B. S. Sai Kumar, K. RahulResearch Area: Embedded C

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Flex, Voice controller, Accelerometer

Review Paper

163. Food adulteration prediction using data mining algorithms

Major food adulteration and contamination events seem to occur with some regularity, such as the widely publicized adulteration of milk products with melamine.With globalization and rapid distribution systems, these can have international impacts with far-reaching and sometimes lethal consequences. These events, though potentially global in the modern era, are in fact far from contemporary, and deliberate adulteration of food products is probably as old as the food processing and production systems themselves. This review first introduces some background into these practices, both historically and contemporary, before introducing a range of the technologies currently available for the detection of food adulteration and contamination. These methods include the vibrational spectroscopies: near-infrared, mid-infrared etc. This subject area is particularly relevant at this time, as it not only concerns the continuous engagement with food adulterers, but also more recent issues such as food security, bioterrorism, and climate change. It is hoped that this introductory overview acts as a springboard for researchers in science, technology, engineering, and industry, in this era of systems-level thinking and interdisciplinary approaches to new and contemporary problems. In food safety and regulation, there is a need for a system to be able to make predictions on which adulterants are likely to appear in which food products. The aim is to identify the minimum detectable limit for the adulterants in milk. There are many adulterants that are added to milk including water, flour, starch and even urea in quantitative measures making it undetectable. MATLAB was used to write the algorithm code.

Published by: J. Sathyaleka, R. Sangeetha, R. Ramya, S. Prince Sahaya BrightyResearch Area: Data Mining

Organisation: Sri Ramakrishna Engineering College, Coimbatore, Tamil NaduKeywords: Naive Bayes, Decision tree

Research Paper

164. Bus detection for blind people using RF transceiver

This paper presents a bus detection system using RF MODULE technology that aims to ease the traveling and movement of blind people. The proposed system consists of two detection subsystems, one on the buses and the other on the bus stations, database system. In the bus detection subsystem, the nearby stations will be easily detected and then announced through a voice message inside the bus. Moreover, any existing blind person in the surrounding area of the station will be detected by the bus subsystem to alert the bus driver about the number of blind persons. In the bus station subsystem, the coming buses will be detected and then announced in the station in order to alert the blind people. A complete system prototype has been constructed and tested to validate the proposed system. The archived results show that the system performance is promising in terms of system functionality, safety, and cost.

Published by: Sunil Kumar S., M. Krishnaraj, A. Jeevarathinam, A. Rahul RajResearch Area: Information Technology

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: RF module, System integration, Engineering design, Blind, Detection

Research Paper

165. The graphical secret code in internet banking for improved security transaction

Internet Banking is a course of action of organizations given by a gathering of sorted out bank workplaces. Bank customers may get to their assets from any of the part branch or working environments by means of web. The main problem in Internet Banking is the realness of the client. On account of unavoidable hacking of the databases on the web, it is difficult to accept on the security of the information on the web. Phishing is a kind of online information misrepresentation that expects to take tricky information, for instance, electronic keeping cash passwords and cash exchanges information from customers. One importance of phishing is given as "it is a criminal activity using social planning techniques. Secret word based verification is a standout amongst the most broadly utilized techniques to verify a client before allowing gets to anchored sites. The wide selection of secret key based validation is the consequence of its minimal effort and effortlessness. Customers may enroll different records on a comparable site or over various goals, and these passwords from similar customers are presumably going to be the same or practically identical. We proposed framework having the character for each individual note and a proficient viable client verification conspire utilizing use diverse cryptographic natives, for example, encryption and pixel distinguishing proof and clients have extra pixel recognizable proof framework. In proposed framework implies that for every last cash in in our application surrendered by the client we will produce the interesting id for each money, when the sum is exchanged from source to goal not just the sum and check of the money will be taken notwithstanding that one of a kind id will likewise be exchanged with the goal that we can track the way of the cash going around. The unprecedented development of internet keeping money and web based business frameworks has prompted a gigantic increment in the quantity of usernames and passwords oversaw by singular clients.

Published by: P. Jebaselvi, Dr. C. K. GomathyResearch Area: Computer Science Engineering

Organisation: Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, Enathur, Tamil NaduKeywords: Password, Web Service, Privacy transaction, Secret code transaction, Service sector secure transaction, Internet banking, Graphical secret code

Review Paper

166. Electrocardiography signal interpretation system using filters with FPGA

In this proposed method, for analyzing electrocardiography signals system design used. This Procedure manipulates high pass least-square linear phase filtering technique to filter out the standard wander noise ingrained in the input ECG signal which is more effective than the existing filter. Discrete Wavelet Transform and support vector machine exploits to extract the reduced feature set from the input ECG signal and classifying the signal. They are implemented in the Xilinx system generator (XSG).

Published by: Hannah Maria John, N. G. Elakiya, A. Deepika, K. Priya, S. L. BharathiResearch Area: Signal Processing

Organisation: Panimalar Engineering College, Chennai, Tamil NaduKeywords: DWT, XSG, ECG

Research Paper

167. Multibanking system

Multi Banking system - The main idea is to implement a web application through which users can perform different bank accounts transactions on a single platform. This concept is a new idea for improving future banking and increasing confront for users. In general, users need to log into different online bank accounts to perform transactions which require many security issues and time taking process but using this application user can save their time and use all features that are available in every bank. Transaction calculations and updations are maintained by admin and provide customer support for users. This system will act as a mediator between banks and users. Users can maintain single username and password and contact only one customer care service for any problems.

Published by: Sudharshana Rajendran, Harshavartini D., P. S. SmithaResearch Area: Service Composition Of Bank Transactions

Organisation: Velammal Engineering College, Chennai, Tamil NaduKeywords: Multibanking, Single interface, Integrated system, Dynamic service composition, Service-oriented architecture, Service Composition

Research Paper

168. Kulumi- The diary app

The Diary App is a web application which user can write everyday activities, thoughts, and feelings, take selfies in each episode of their life story and make memories with their friends that will last for a lifetime. By this application the user can attach images, video, audio, and important messages can be starred and can be viewed. The data user composed is securely stored in a database the privacy is in handoff the user. There is a search box by which we can specifically filter out the required information according to the date so that the user can view the date’s activity easily. There is also another feature by which a user can share his/her memories globally so that other users can see the shared event.

Published by: U. K. Adithya, Karthigeyan S., M. Guru VenkateshResearch Area: Application

Organisation: RMK Engineering College, Kavaraipettai, Tamil NaduKeywords: Kulumi, Slambook, Moments

Research Paper

169. BOT kitchen

Nowadays everyone is concerned with how to make life easier and IoT is one such field which makes peoples life easy and less hectic. The kitchen is an integral part of a humans life. People go to the kitchen on a regular routine to make food for themselves, making food is a tedious job and managing it is more of a headache. So our aim is to reduce the risks as well as reduce the headache of managing the kitchen by introducing BOT KITCHEN, which in itself will be efficient enough to make cooking food easier. The application of this product is that it would manage kitchen inventory using RFID. Another important application is that it would manage dustbin by identifying the waste that is whether it is biodegradable or non-biodegradable.

Published by: Shaifali Phogat, Pranav Kapur, Dr. M. Uma DeviResearch Area: Internet of Things

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: IoT, RFID

Research Paper

170. Using various materials as a partial replacement of cement

Day by bay population growth rate is increasing as the same construction growth rate is also rising. Since a large number of natural resources and materials were used. Also, cement is used in a huge quantity which causes rising Co2 pollution, so because of this, we need to find a new substitute for cement. Disposal problem of waste material is becoming critical day by day. Millions tone of waste is generated every year in the world. In this topic, an attempt has been made to utilize, which is waste of industry, municipal solid waste, agricultural waste. The research work is the determination of the effect of the use of various waste as a replacement of cement to assess the pozzolanic nature. Also comparing the chemical compositions of various waste materials, physical and chemical properties were studied. Then final result concluding the best materials which are most widely used globally in a bulk quantity. Reduce the demand for cement, glass powder decreases the unit weight as well as the porosity as indicated by the decrease in water absorption. It reduces the quantity of cement to be used in concrete. Also, glass powder is proved to be economical and is considered as environmentally friendly construction material.

Published by: Shubham G. Keshattiwar, Siddharth S. Tode, Shubham M. Menewar, Akshay H. Shirbhate, Akshay Khadse, Girish V. Mahalle, Aishwarya H. MeshramResearch Area: Yavatmal, Maharashtra

Organisation: Jagadambha College of Engineering and Technology, Yavtamal, MaharashtraKeywords: Glass powder, Silica flumes, Fly ash, Sugarcane bagasse ash, GGBS, Rice husk ash, Paper pulp ash replacement to PPC, Cost-effective material

Research Paper

171. The impact of parent brand on the brand extensions on the purchase decision in the food industry

Brand extension is one of the most used and successful expansion strategy that brands have used and can use to gain advantages in the market. This project focuses mainly on two brands- Cadbury and Kellogg’s- and their brand extensions. Consumers’ viewpoints about the two brand and their extensions were gathered and analysed. The main objective of this research was to understand whether parent brand consumption, parent brand visibility and awareness of brand extensions had an impact on the performance of brand extensions and the purchase decision of brand extensions by consumer.

Published by: Anoushka L ShyamanoorResearch Area: Marketing

Organisation: Christ University, Bengaluru, KarnatakaKeywords: Parent Brand, Brand Extensions, Parent Brand Consumption, Parent Brand Visibility, Awareness of Brand Extensions, Purchase Decision of Brand Extensions, Performance of Brand Extensions

Research Paper

172. Deposition of CaO (lime) on rocks near the temples submerged in the waters of Lonar crater, Maharashtra, India

At Lonar Crater on the northern side, near the water body, the base part of the temples submerged in the waters which were never exposed for the last 22 years due to constant rise of water level, are now exposed due to decrease of water level to a large extent, debris of rocks of unknown origin are found to be covered by a white layer. To investigate in detail whether the white layer on these rocks near the temples otherwise found to be submerged in the waters of Lonar crater and now exposed, are of SiO₂ (silica) origin or NaCl (common salt, sea salt) origin, or any other component, a search was conducted to find the source, its origin and the cause for these phenomena through this study. Representative samples of these rocks from debris near the temple towards north side of the crater was collected and stored in a polythene bag for further investigation. XRF analysis carried out of two rocks of both sides i.e., of sample No. 1, white layered part 16 elements with their oxides were detected of which CaO (Calcium Oxide i.e., quicklime) – 76.000% being the major content and others such as Fe₂O₃, SiO₂, Al₂O₃, MgO etc., in minor quantities. Similarly of sample No.2, the white layered part showed that 16 elements with their oxides were detected of which CaO – 85.900%, being the major content, and others such as SiO₂, MgO, Al₂O₃, SO₃, Fe₂O₃, P₂O₅ etc., in minor quantities. The original rocks i.e., the black part of both the samples showed that major component was SiO₂, Al₂O₃, Fe₂O₃, CaO, MgO, and TiO₂, with other components in minor quantities. For the first time such a high percentage of CaO (Calcium Oxide i.e., quicklime) has been detected which is found to be deposited on the surface of debris of rocks near the temples on the northern side of the crater. White rusting/white coating of SiO₂ (Silica) has been observed and reported by Jadhav and Mali. This work being of preliminary investigation, a search was conducted to know the cause and how CaO (Calcium Oxide i.e., quicklime) found in such a high percentage deposited on the rocks or the rocks were found to be coated or encapsulated by a white layer of CaO and to record and document this phenomena with detail studies.

Published by: Raju D. Jadhav, Harishchandra B. MaliResearch Area: Maharashtra

Organisation: Independent ResearcherKeywords: Lonar crater, Deposition of CaO on rocks, Submerged temples in waters, Debris of rocks

Review Paper

173. Remote operated car body cover – A literature review

It is not possible to park the car in a safe place all-time so anyone requires a body cover which can cover the car immediately by pressing a switch without any kind of contact with the car. In this paper, the remote operated car body cover literature is reviewed which can cover the car by pressing one remote key. This cover is motor driven and has another mechanism that helps to cover the whole car with a very quick operation. It covers the whole car with a thin and strong material that protects the car against the various conditions like sunlight, rain, dust, mud, minor scratches in a parked condition.

Published by: Syed J. M., M. V. GudadheResearch Area: Production Engineering

Organisation: Prof. Ram Meghe Institute of Technology and Research, Amravati, MaharashtraKeywords: Car cover, Battery, DC motor, Semi-automatic

Research Paper

174. Effect of cutting conditions on surface roughness and cutting forces in hard turning of AISI 4340 steel

In the present work, the comparison study for surface roughness and main cutting force is studded between Dry, Wet lubricant and Solid lubricant condition during the turning the AISI 4340 steel, hardness 60 HRC with CBN insert. The water-based lubricant used as a wet lubricant and boric acid in powder form is used as a solid lubricant. The objective of this study is to know about optimum machining parameters and best conditions with dry or solid lubricants for hard turning operation and it is also important to find the research gap through different studies. The results indicated that there is a significant effect on surface roughness (Ra) and main cutting force (Fc) when cutting under different conditions (Dry, Wet and Solid condition) with different cutting parameters. It has been found that with solid lubricants surface roughness value decreased as compare to dry hard turning. The proper selection of lubricants in the solid state along with cutting conditions and tool angles is essential for achieving the overall improvement in hard turning process. With the use of lubricants in the solid form hard turning may become a viable alternative to dry and wet hard turning process.

Published by: Rishi SharmaResearch Area: Manufacturing

Organisation: Abhilashi Group of Institution, Mandi, Himachal PradeshKeywords: Hard turning, Cutting conditions, Surface roughness, Response surface methodology

Survey Report

175. Survey of mobile social network middleware: Data dissemination, routing and forwarding, and social awareness

Due to the increase of an internet of things, there are different techniques and systems are developed, from these technology ones is a Middleware, for Mobile Social Network (MSN). MSN is the intersection and combination of a social network and mobile communication. This paper summarizes about the different types of Middleware that are applied on MSN for Data Dissemination, Routing and Forwarding, and Social Awareness. The target of this paper is to criticize middleware’s grounded on their characteristics, platform that they implement it and also based on architecture. In this paper different practices are such as location-based mobile social matching and place-based ad hoc social practices, and based on their result of response for a different amount of user are discussed, in addition to GIS (Geographic Information System), LBS and J2ME technology are used.

Published by: Abraham Teklu, Ajeet Singh, Aynishet AlemuResearch Area: Mobile Social Network

Organisation: Assosa University, Asosa, EthiopiaKeywords: Data dissemination, Routing and forwarding, Social awareness

Research Paper

176. Advanced image enhancement (brain tumor) DWT-SVD method using CNN

The mind tumors, are the most widely recognized and forceful illness, prompting an exceptionally short future in their most elevated evaluation. In this manner, treatment arranging is a key stage to improve the personal satisfaction of patients. For the most part, different picture methods, for example, Computed Tomography (CT)and ultrasound picture are utilized to assess the tumor in a mind, lung, liver, bosom, prostate… and so forth. Particularly, in this work, CT pictures are utilized to analyze tumor in the cerebrum. Anyway, the colossal measure of information produced by CT examines thwarts manual grouping of tumor versus improvement tumor in a specific time. In any case, it has some impediment (i.e) exact quantitative estimations is accommodated a predetermined number of pictures. Subsequently trusted and programmed order plot is basic to keep the passing rate of a human. The programmed cerebrum tumor characterization is extremely testing errand in extensive spatial and basic changeability of encompassing locale of mind tumor. In this work, programmed mind tumor identification is proposed by utilizing Convolutional Neural Networks (CNN) grouping. The more profound engineering configuration is performed by utilizing little parts. The heaviness of the neuron is given as little. Test results demonstrate that the CNN chronicles rate of 97% precision with low multifaceted nature and contrasted and the all other condition of expressions techniques.

Published by: Abubakkar Sithik, Dr. G. RanganathanResearch Area: Image Processing

Organisation: Gananmani College of Technology, Namakkal, Tamil NaduKeywords: CT-scan, DWT-SVD, CNN

Research Paper

177. Temperature-humidity monitoring using PLC and HMI

This paper presents the monitoring system for a warehouse which consists, temperature and humidity. Temperature and humidity sense by HTS711 sensor and monitor by PLC. These values display on HMI. This system also detect any unwanted movable object entering in the warehouse by using the Proximity sensor

Published by: Sneha Kamble, Rushikesh Sagar, Vaibhav MasenwarResearch Area: Automation

Organisation: Dr. D. Y. Patil College of Engineering, Pune, MaharashtraKeywords: Programmable logic controller, Human-machine interface, Proximity sensor, HTS711, IF2OF2 analog input-output module

Research Paper

178. Cloud based data storage by securing it through face recognition mode

Trust of Clients cannot be completely trusted or beneficial through the cloud. Many information gets corrupted due to the unwanted users by the employees in the hierarchy of an Organization. Separate Organization handles the data securely, but in many cases, data is being given away for money because of the single level Management. We move forward to an advanced safe Technology to overcome this issue, where data are downloaded by an Organization or a set of admins in a hierarchy through face detection mode. If any of the admin rejects in accepting the request the file cannot be downloaded and thereby the data is made secure. Advanced Encryption Algorithm is the medium to make this technology secure and beneficial. Many such technologies can offer such a new form of security based work for efficient and brand form of storage process in the software as well as any other field in cloud computing.

Published by: Nadar Steffy Felicia Inbamani, Kumar P.Research Area: Cloud Computing

Organisation: Rajalakshmi Engineering College, Chennai, Tamil NaduKeywords: AES, DES, CLOUD, SaaS, PaaS, IaaS

Research Paper

179. Smart industry automation

In this new era, everyday life is filled with technology from the startup till to bed. Internet of Things (IoT) is fast becoming a disruptive technology business opportunity, with standards emerging primarily for wireless communication between sensors, actuators, and gadgets in day-to-day human life, all, in general, is referred to as “Things”. This offers the capability to measure for understanding environment indicators. This paper addresses how to accomplish factory/Industry environment and get the data out of it check the possibility of planned IIoT use case and building up Proof of concept(POC) which will simulate factory/Industry environment to solve it.

Published by: B. Raakesh, S. Lakshmanan, K. Gowtham, R. Rajitha Jasmine, S. Dinesh KumarResearch Area: Information Technology

Organisation: R.M.K. Engineering College, Chennai, Tamil NaduKeywords: IoT, POC, Industry 4.0

Research Paper

180. Purification and properties of three novel monocot lectins from the family Zingiberaceae

Three new monocot lectins from the members of Zingiberaceae, namely, Alpinia galanga L. (AGTL), Curcuma amada Roxb. (CARL) and Elettaria cardamomum M. (ECSL) have been purified by sepharose and agarose affinity chromatography. These lectins possess similar physicochemical and biological properties. In SDS-PAGE, all the lectins gave a single band corresponding to a subunit of 16 and 17kDa and yielded single band peak on PAGE (pH 4.5). The lectins agglutinate rabbit and sheep red blood cells (RBCs) but are inactive towards chicken and human ABO erythrocytes. The haemagglutination activity of these lectins is inhibited by mannose and their derivatives while other simple sugars D-galactose, D-maltose, D-fructose, sucrose, lactose, D- sorbitol, D-mannitol did not react. The lectins activity were enhanced at acidic but stable at physiological pH range of 6- 8. Lectins were stable at 50°- 60° C but able to agglutinate for a short period when it increases.

Published by: P. Sathyapriya, S. ArvinthResearch Area: Plant Molecular Biology

Organisation: UPASI Tea Research Foundation Tea Research Institute, Coimbatore, Tamil NaduKeywords: Monocot lectins, Rhizome, Seeds, Tubers, Zingiberaceae

Research Paper

181. Impact of celebrity brand endorsements on buying behaviour towards luxury brands

Celebrity Endorsements are an important aspect of marketing that helps the brands to gain attention and improve their brand image. There are many aspects of celebrities that appeal to consumers, such as trustworthiness, credibility, attractiveness, expertise and product-celebrity match. Endorsements don’t only add to the brand image of the company, but it also increases the image of the celebrity endorser. Luxury brands require endorsements in order to improve consumer perception through the endorser’s personality. This paper helps to see the impact of celebrity brand endorsements on buying behavior towards the luxury brands and affirms the attributes that appeal to the consumers.

Published by: Rini AnandResearch Area: Marketing

Organisation: Christ University, Bengaluru, KarnatakaKeywords: Celebrity endorsements, Buying behaviour, Consumer perception, Brand image

Others

182. Role of community in enhancing the learning level of Government school Children: My experience in Mayurbhanj district, Odisha

A report: How the relationship between community and school played a big role in enhancing the learning level of children in Government schools of Mayurbhanj in the state of Odisha, India. The current scenario depicts the non-association of schools with communities. In order to build a strong relationship between schools and communities for an overall development of Children aged between 6 to 9 years, CARE India during its intervention in Mayurbhanj district initiated some actions to bridge the gap between school and community. The results mentioned in this paper are quite visible in the community library study report prepared by CARE India.

Published by: Lokesh Prasad DashResearch Area: Education

Organisation: CARE India, Bhubaneshwar, OdishaKeywords: Government school Children, Learning level, CARE India

Research Paper

183. Student feedback prediction using machine learning

Advances in natural language processing (NLP) and educational technology, as well as the availability of unprecedented amounts of educationally-relevant text and speech data, have led to an increasing interest in using NLP to address the needs of teachers and students. Educational applications differ in many ways, however, from the types of applications for which NLP systems are typically developed. This paper will organize and give an overview of research in this area, focusing on opportunities as well as challenges. In the proposed methodology, we are collecting student feedback about classroom, exam and lab facilities. After that, we are predicting the dataset using natural language processing. In NLP, we will use 2 approaches: NLTK toolkit and the random forest algorithm approach. After predicting the data, we will be analyzing the positive, negative and neutral nature of the data. This will help in effectively improving the performance of the institution and to create plans to enhance institutions’ teaching and learning experience. Student’s feedback improves communication between the lecturer and the students, allowing the lecturer to have an overall summary of the student’s opinion.

Published by: Nilesh Singh Sengar, Kartik Chourey, Shraddha Bajaj, S. AbinayaaResearch Area: Information Technology

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: NLP, NLTK, Random forest algorithm

Others

184. Deep learning architectures for crime occurrence detection and prediction

Due to the escalation in the rate of crimes, there is a requirement of the system that will detect and predict crimes at the dynamic time. The objective of this survey is to learn Data Mining techniques that will go on to help in detecting and predicting crimes using association rule mining, decision trees & naive Bayes, k-means clustering and Machine learning techniques such as deep neural network and artificial neural network. Noticeable findings from this survey were that when the dataset instances have a large number of missing values pre-processing becomes an important task and crime does not occur uniformly across urban landscapes but concentrates in specific areas. Hence, predicting crime hotspots is a very crucial task and also applying post-processing will help in decreasing the rate of crimes.

Published by: Arnav Singh Bhardwaj, Divakar K M, Ashini K A, Devishree D S, Sheikh Mohammad YounisResearch Area: Computer Science And Engineering

Organisation: S. J. C. Institute of Technology, Chikkaballapura, KarnatakaKeywords: Predict crimes, Data mining techniques, Decision trees, Post-processing

Review Paper

185. Bioavailability enhancers: An overview

Oral absorption of the drug is a very important issue especially when the drug is poorly bioavailable, given for long periods and expensive. Poorly bioavailable drugs remain sub-therapeutic because a major portion of a dose never reaches the plasma or exerts its pharmacological effect unless and until very large doses are given which may also lead to serious side effects. Any significant improvement in bioavailability will result in lowering the dose or the dose frequency of that particular drug. Bioenhancers are chemical entities which promote and augment the bioavailability of the drugs which are mixed with them and do not exhibit a synergistic effect with the drug. The various bio enhancers available are piperine, garlic, Carum carvi, Cuminum cyminum, lysergol, naringin, quercetin, aziridine, glycyrrhizin, stevia, cow urine distillate ginger.

Published by: Tulasi Iswariya, Shivani GuptaResearch Area: Pharmacy

Organisation: Gitam Institute of Pharmacy, Visakhapatnam, Andhra PradeshKeywords: Oral absorption, Bio enhancers, Improve bioavailability

Research Paper

186. Characterization of hybrid thin films for application in the field of solar cells – A response to climate change

The enhancement of greenhouse gases due to the increased usage of fossil fuels leads to global warming followed by climate change. To overcome these researchers have been concentrating on renewable energy. Solar energy is an inexhaustible source of energy. It could supply all the present and future energy needs of the world. The amount of solar radiation reaching the earth differs from the radiation reaching the top of the earth’s atmosphere. Flat-plate collectors are used to collecting solar energy and the collected energy is stored in different types of energy storage systems and used for different applications like water heating systems, thermoelectric systems. Solar cells are used for the direct conversion of solar energy into electrical energy. In this study, the importance of more economic hybrid thin films for application in the field of solar cells and photodetectors were highlighted. The optical absorption and photoconductivity for the hybrid thin films were found to increase with increasing concentration of zinc telluride.

Published by: C. S. A. RajResearch Area: Thin Films

Organisation: Arul Anandar College (Autonomous), Karumathur, Tamil NaduKeywords: Hybrid thin films, Renewable energy, Photoconductivity, Climate change

Research Paper

187. Customer satisfaction survey of quick-service restaurant with special reference to subway: A study in Navi Mumbai

This research evaluates the extent of customer satisfaction for Subway food chain marketing strategies. In the present scenario, a lot of big and small QSRs are trying to win the customer share of heart and develop loyalty. So, the first basic need is to know the customer liking and disliking for the services provided by the food chains. Here the research will try to explain the factors which affect the customer satisfaction for QSR services. The objective of the study is to find out the effect of the food quality, service quality, ambiance and price on customers’ satisfaction in the Subway restaurant of Kharghar and Sea wood. To research that convenience sampling technique was used to collect the data. The questions were rated on a 5-point Likert scale

Published by: Arpita Pandey, Saritprava DasResearch Area: Primary Research

Organisation: ITM Business School, Mumbai, MaharashtraKeywords: Customer satisfaction, QSR, Fast-food

Research Paper

188. Test case recommendation system

A code transaction modifies a set of code files and runs a set of tests to make sure that it does not break any of the existing features. But how do we choose the target set of tests? There could be 1000s of tests. Do we run all those tests? In that case, are we not wasting resources, and delaying the whole process of merging a code change? Can we choose a static set of tests? In that case, we have a chance of missing a set of tests which may be related to the code changes. How do we find out the optimal set of tests for a given code change – is the goal which we are trying to solve using the Recommendation System.

Published by: Sudipto NandanResearch Area: Machine Learning

Organisation: Oracle India Pvt. Ltd., Bengaluru, KarnatakaKeywords: Test case selection, Singular value decomposition, SVD, Recommendation system, Latent factor collaborative filtering, Alternating least square

Research Paper

189. Linear programming problem applications in engineering curriculum

The goal of this paper is to submitting linear programming methods and the applications in Engineering Education through a scientific approach in the Curriculum. In solving Linear Programming and Optimization Problems we utilized operation research techniques and according to gathered date, the decision making was recognized systematically and linear programming a model was formed after model solving and execution it in academic semesters and comparing the results with the previous semester.

Published by: Dr. N. Ramya, Indira SinguluriResearch Area: Operation Research

Organisation: Vignan's Institute of Information Technology, Visakhapatnam, Andhra PradeshKeywords: Scientific approach, Optimization problems, Decision making, Research techniques

Research Paper

190. Seismic base shear variation between regular and irregular RCC structure in various zones by STAAD.PRO

Multistorey structures are frequently caused by the earthquake by the scarcity of provision. Earthquake often occurs on zone 4 and zone 5 region due to lack of remedies building cannot be elevated beyond the certain height. This present study was done base shear variation between regular and irregular configuration informs of the various zone such as zone II, zone III, zone IV, & V various soil conditions such as Medium, Soft, Hard respectively. So, such preliminary data were considered to get better performance of buildings as well as two designs were done such as manual design & software design by Staad.pro. Eventually, base shear performance was found for between different zone region and soils respectively. This SLA was assumed out by considering different seismic zones & soils. As per data, ACP was done for Regular & Irregular structure to get a view of the plan.

Published by: R. Arun, K. Suhana, L. Saicharan ReddyResearch Area: Design Project

Organisation: Sir Vishweshwaraiah Institute of Science and Technology, Madanapalle, Andhra PradeshKeywords: Staad.Pro, Static Load Analysis, Auto Cad Plan

Others

191. Crime scene prediction and analysing its accuracy with frames using deep neural network

Crime scene prediction without human intervention can have an outstanding impact on computer vision. In this paper, we present DNN in the use of a detect knife, blood, and gun in order to reach a prediction whether a crime has occurred in a particular image. We emphasized the accuracy of detection so that it hardly gives us the wrong alert to ensure efficient use of the system. This paper use Nonlinearity ReLu, Convolutional Neural Layer, Fully connected layer and dropout function of DNN to reach a result for the detection. We use Tensorflow open source platform to implement NN to achieve our expected output. This system can achieve the test accuracy of 90.2 % for the datasets we have that is very much competitive with other systems for this particular task.

Published by: Devishree D. S., Divakar K. M., Ashini K. A., Arnav Singh Bhardwaj, Sheikh Mohammad YounisResearch Area: Computer Science Engineering

Organisation: S. J. C. Institute of Technology, Chikkaballapura, KarnatakaKeywords: Crime scene, Neural Layer, Convolutional, Tensorflow

Research Paper

192. Tracking the prisoner location and escape prevention

The main aim of the project is to track the prisoner whether he or she is inside or outside the prison by using RSSI(Received Signal Strength Indication) and using GPS. The location of the prisoner can be viewed by jailor wherever and whenever by using IOT device. If the prisoner is trying to move outside the jail it automatically indicates through buzzer in the control room based on the signal strength. When the signal strength is low the device automatically activates the neuron simulator. If the prisoner is trying to break the module is sensed by the vibration sensor, it will automatically produce alarm in the prisoner section and control section.

Published by: Venkateswararao P., Vengatesh D., Vetrivel R., Haresh R., Ajay Karthik B.Research Area: IoT

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Prisoner Location, IOT, RSSI, GPS, Latitude, longitude, Neurostimulator.

Research Paper

193. Net metering based bi-directional power flow system and power quality improvement using multilevel inverter

Recent advancements in Power Electronics converters has led to the development of Multilevel Inverters that has proved to be one of the most promising solutions for the medium voltage, high power applications. Multilevel Inverters are considered to be the best available choice for the Grid-connected Photovoltaic Modules (PV) as they (PV Modules) comprise of several sources on the DC side. By the use of MLI, output with high quality and with less harmonic distortions can be obtained which can further be improved by increasing the level of the Multilevel Inverter. This paper presents a model of a 15-level Cascaded H-Bridge MLI interfaced suitably with a Boost Converter and PV arrays. The proposed 15-level inverter is modeled and simulated in MATLAB 2018a using Simulink and Sim Power System toolboxes. Passive filters for power quality improvement is also used at the output stage of Multilevel Inverter.

Published by: Himanshi SikarwarResearch Area: Renewable Energy

Organisation: Government Mahila Engineering College, Ajmer, RajasthanKeywords: MLI, H-bridge, SM, SG, AMR, Net meter

Review Paper

194. Construction of predictive modelling for cardiac patient using probabilistic neural network

Coronary Artery Disease (CAD) is a major disorder in heart rhythm invoices the reduction or blockage of blood flow due to the narrow artery which results in coronary artery disease Our project is to investigate and detect the occurrence of coronary artery disease (cardiac block) using a probabilistic neural network. We would apply the probabilistic neural network to CT Images and, Feature extraction by using the Gray Level Co-Occurrence Matrix (GLCM). Image recognition and image compression are done by using the Gaussian bilateral filter method and also large dimensionality of the data is reduced. Automatic cardiac block classification is done by using a Probabilistic Neural Network (PNN). The segmentation process is done by using the K-means clustering algorithm and also detects the cardiac block spread region. PNN is the fastest technique and also provide good classification accuracy.

Published by: Nivetha P., Keerthi S., Kamalesh S.Research Area: Machine Learning

Organisation: Velammal College of Engineering and Technology, Madurai, Tamil NaduKeywords: Cardiac detection, PNN, GLCM, Feature extraction, K-means cluster, Machine learning

Others

195. P2DB-chat

The project titled peer-to-peer distributed blockchain database messaging presents the development of an instant messaging application based on the concept of peer-to-peer using Inter Planetary File System (IPFS) and Blockchain. The P2P architecture is a decentralized architecture, where neither client nor server status exists in a network. Every client act as a server. This report describes one possible way to implement a chat system using a Peer-To-Peer model instead of a client/server model without the need to sign up for the specified service to be able to use it.

Published by: Kesavan S., Charles R., Raja Prithya P., Rajavel V., B. KirubaResearch Area: Decentralised

Organisation: Hindusthan Institute of Technology, Malumichampatty, Tamil NaduKeywords: Decentralized applications, Dapps, IPFS (Interplanetary Filesystem), P2P network, Peer-to-Peer, P2DB-chat

Research Paper

196. Replacement of fine aggregate by using glass material in concrete

Glass powder (GP) used in concrete making leads to a greener environment. In shops, damaged glass sheets & sheet glass cuttings are going to waste, which is not recycled at present and usually delivered to landfills for disposal. Using GP in concrete is an interesting possibility for the economy on waste disposal sites and conservation of the environment. This project examines the possibility of using GP as the fine aggregate replacement in concrete. Natural sand was partially replaced (0%-20%) with GP in concrete. Compressive strength (cubes and cylinders) up to 28 days of age were compared with those of high-performance concrete made with natural sand.

Published by: Ratilal Narayan Patil, Dr. S. L. Patil, Chetan Pandurang Patil, Suvarna Namdev Patil, Pratima Tedgya Valvi, Puja Vishwas GadeResearch Area: Civil Engineering

Organisation: Shrama Sadhana Bombay Trust's College of Engineering and Technology, Jalgaon, MaharashtraKeywords: Compressive strength, Durability, Split tensile strength, Waste glass concrete, Workability, Economy

Research Paper

197. Aerodynamic optimization of passenger vehicle

The growth in computational fluid dynamics has brought about a rapid increase in the study of vehicle aerodynamics aiding to meet the stringent fuel economy and pollution laws. Though there has been a lot of research in the segment of sedans and sports vehicles, there has been considerably less amount of research on the hatchback segment of vehicles. This paper aims at a study in the computational fluid dynamic simulations of a widely used passenger hatchback vehicle and a proposed model to obtain the reduced coefficient of drag value for the proposed model based on the initial widely used model and to understand the effect of the shape of a vehicle on the drag value of the vehicle. The widely used hatchback passenger vehicle (initial model) is designed based on a body, similar to that of a typical hatchback model widely sold in the Indian market. The drawbacks of the initial model are obtained via the CFD simulations and the proposed model is designed to overcome those drawbacks and offer minimal resistance to air thereby reducing the Coefficient of Drag value.

Published by: Hussain Ezzy, Mohammed Zain M., Dr. N. PrakashResearch Area: Automobile Engineering

Organisation: Hindustan Institute of Technology and Science, Chennai, Tamil NaduKeywords: Drag Optimization, Computational Fluid Dynamics, Vehicle Aerodynamics, Wake Effect, Hatchback

Technical Notes

198. Mathematics in financial market

It is about the use of mathematics and its theories in Financial Market.

Published by: Yash DroliaResearch Area: Mathematics

Organisation: NMIMS Anil Surendra Modi School of Commerce, Mumbai, MaharashtraKeywords: computational finance, Mathematical Finance, measure theory, sobol sequences for random numbers, poisson processes

Research Paper

199. Identification of novel compounds to treat Alzheimer’s disease

Alzheimer’s disease or Alzheimer’s is a brain disorder characterized by progressive loss of neural functions and dementia in elderly people. It has perilous effects on memory and other cognitive activities. Apolipoprotein (APOE) is responsible for delivering cholesterol-rich lipoproteins to the bloodstream. The maintenance of optimum levels of cholesterol is absolutely necessary as an imbalance might lead to cardiovascular and neurological diseases. Out of the four alleles for the APOE gene, the main causative agent for the onset of Alzheimer’s is the e4 allele. APOE e4 allele leads to the production of amyloid plaques which further cause the accumulation of amyloid β peptide. The excess build-up of such toxic products leads to neuronal death giving rise to early symptoms of the disease. Our research mainly focuses on the identification of potential inhibitors against Sortilin (SORT1), an APOE receptor associated with Alzheimer’s. We have employed scientific software to identify the specific conformations of ligands that show the maximum interaction with the target compound and further analyzed these results by generating descriptors computationally for QSAR studies. The optimum model was generated with r2 = 0.794, s= 0.108. We have been able to select two ligands which can be used as potential drugs to treat Alzheimer’s.

Published by: Kusumitha Shrinivasan, Swarnali Sarkar, Anand Prem RajanResearch Area: Neurobiology

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Alzheimer’s Disease, Amyloid precursor protein

Research Paper

200. EPOT- Earning Point On Time

EPOT refers to the systematic process of searching for prospective employees and stimulating them to apply for jobs in an organization. Candidates search jobs mostly using online job searching sites and applications, but these sites provide only permanent jobs. People moving to a new location they did not get any contacts for household works. Our system proposes a solution for the above-mentioned problems by providing time-based jobs as well as part-time jobs. By using the Google map API, our application may get the users locations and gives a contact for the work they needed. As it helps the user to identify the correct person according to ratings and feedback.

Published by: Ranjani M., Dinesh Kumar T., Saranya P., Vetrichelvi V. N., Nagajothi S.Research Area: Android Application

Organisation: Hindusthan Institute of Technology, Malumichampatty, Tamil NaduKeywords: Job searching, Part-time job, Full-time job, Service-based job, EPOT, Earning point on time, Android app

Research Paper

201. Framework for enhancing privacy of files in web using random key generation technique

In general online websites contain millions of articles related to different domains. The major flaw found in these websites is the absence of security for files uploaded without any protection. It is made in such a way as it is simply available for any users to change the content of these files. Thus, to overcome the above drawback we propose the system “Framework for Enhancing Privacy of the Files in Web Using Random Key Generation Technique” which makes all the files protected using key generation and encryption techniques so that no other invalid user is allowed to access the file. Even the authorized user must request to the admin to get the key for the particular file from the database to access it. Thus the system provides secured data access with original information uploaded by the data owner, it also avoids the duplication of the same content from different users of the web.

Published by: Anjana K., Kumar P.Research Area: Cloud Security

Organisation: Rajalakshmi Engineering College, Chennai, Tamil NaduKeywords: AES, Cloud, Key Generation

Research Paper

202. Implementing Li-Fi protocols

LI-FI is the latest technology in the Field of wireless communication. Nowadays many people are using internet to fulfill most of their tasks through wired or wireless networks. As the number of users is increasing, the rate of data transmission in the wireless network automatically decreases. WI-FI provides us speeds near about 150mbps as per IEEE 802.11n but still it is not able to fulfill the requirement of the user because of such reason we are introducing the LI-FI. According to the German physicist Harald Hass, LI-FI provides much higher data transmission speeds (10gbps and max up to 224gbps per second) by using visible light. In this condition the LI-FI/WI-FI is analyzed. It’s the same idea band behind infrared remote controls but is more powerful. Haas says his invention, which he calls D-LIGHT, can produce data rates faster than our average broadband connection. Nowadays, parking vehicles is one of the most tedious jobs. Hence, in order to solve this problem, a reliable system is proposed. Our system solves the current parking problems by offering guaranteed parking reservations with the lowest possible cost and searching time for drivers and the highest revenue and resource utilization for parking managers.

Published by: Nikhil Bajirao Belhekar, Anurag Sanjay Autade, Vishakha Sanjay Dhamdhere, Abhishek Ramesh DarekarResearch Area: Computer Science

Organisation: Trinity College of Engineering and Research, Pune, MaharashtraKeywords: Dynamic pricing, Dynamic Resource Allocation, Li-Fi, Smart car parking, VLC

Review Paper

203. Railway trail defense structure based IoT

The only scientific solution to natural calamities is the development of a system to predict, detect and take preventive measure using recent advancement in technology, Railway trail defence structure based on IoT. Using two types of sensor to sense and detect the obstacles. In this project, we implement an idea such as using a camera for live stream monitoring and the sensor to detect the obstacles. The main part of this paper is RPI3 which controls all the operation and passes the information through a webpage. The camera mounted on the front of the vehicle. PIR and ultrasonic sensor are used for sensing the moving and non-moving obstacles. Detecting any obstacles the signal will be sent to RPi3and it will transmit the signal to the webpage. The webpage will be transmitted to the monitor within the monitor the image of the object will appear and the locomotive pilot will turn off the engine. We also used GPS to track the train through the entire path and in which it stops due to any problems.

Published by: R. Senthil Kumar, I. Kirubakaran, A. Loganathan, K. Janani, Pyndaplang KharkongorResearch Area: Automation

Organisation: Adithya Institute of Technology, Coimbatore, TamilnaduKeywords: Raspberry Pi-3, IoT, Ultrasonic Sensor, PIR Sensor, Webcam Monitoring, GPS

Research Paper

204. College bus tracking system

Continuous Campus University Bus Tracking Mobile Application is a versatile application to help grounds individuals distinguish the present area of the transport progressively. Constant Campus University Bus Tracking Mobile Application is a mixture portable application. In any case, for this advancement, it is created for Android client as it were. It can indicate refreshed estimation time entry and the number of people inside the transport. This undertaking utilizing two gadget's implanted inside the transport, which is GPS Tracker gadget and IoT individuals counter gadget. All gadgets will transmit the information into a cloud database which is Firebase. Constant Campus University Bus Tracking Mobile Application is created as a stage for the client to get the information transmitted from the database. Other than that, Student will know the time entry of the transport and the present amount of individuals inside the transport to lead them to stay away from dawdled realizing that they hang tight for the transport that pack of traveler. The understudy additionally to make grumbling and input by means of the stage. Moreover, this task utilizing PhoneGap as an instrument stage to build up the application. The GPS Tracker gadget utilizing Arduino and IoT individuals counter utilizing Raspberry PI to transmit information. By and large, this undertaking utilizing the reusability procedures and Agile technique to finish all the framework which is included four associations to make it full framework fill in of course.

Published by: Arun S., Shibu J., Vennila S., Kalaiselvi T., Mugundhan V.Research Area: Computer Science and Engineering

Organisation: Hindusthan Institute of Technology, Malumichampatti, Tamil NaduKeywords: College Bus Tracking System, Depot, GPS, PhoneGap

Research Paper

205. Online voting system using blockchain

Blockchain as a secure trusted and decentralized architecture is used to create secure schemes, which can serve economics and society with trusted parties. Normally the concept of the voting system is spread wide all over the world. In different generations, different methods of voting system are followed. At the initial stage, the voting system was done by using the paper. Then the second level of development is that the voting is done through the Electronic Voting Machine (EVM). But there were some issues regarding the results. There were some safety issues regarding voting results. In order to increase security, we introduced the concept of blockchain in the voting system. This provides secure results and if any changes are done they can be identified easily. We will introduce a new concept called nonce. The nonce value is calculated by using the SHA256 algorithm.

Published by: Santhosh Kumar T. P., Lakshmi Shree R., Sridhar D., Sachin M., Velusamy A.Research Area: Web Application

Organisation: Hindusthan Institute of Technology, Coimbatore, Tamil NaduKeywords: Blockchain, EVM, SHA256 algorithm

Research Paper

206. Arduino based smart street light system with accident avoidance in U-turns

In this paper, we are going to discuss the streetlight system and the accident avoidance system which may help society to reduce the number of accidents which is usually happening in u-turns and also with the help of IOT based smart street lights, we can reduce the energy consumption. Streetlights play an important role in cities which means to avoid accidents, secure roads and provide better vision since evening to morning. As the world is ready to accept the technology, we need to upgrade that street light system which will reduce the energy consumptions and save energy. Also one of the major problems happens in cities is accidents, so we are applying IR mechanism to avoid the accidents that usually happens in u-turns. As our goal is to save energy, so we are using LEDs which is directional light source it can emit light in a specific direction thereby optimizing the efficiency of streetlights. The IR sensors detect the objects and set the intensity of LEDs to high for some time. The work has achieved better performance and reduces energy consumption as compared to the current system.

Published by: Rushikesh Bharatrao Choudhery, Shraddha M. Bute, Akash M. Nikam, Nividita R. Bhujade, R. S. SawantResearch Area: IoT

Organisation: Jagadambha College of Engineering and Technology, Yavatmal, MaharashtraKeywords: LED (Light Emitting Diode), IR (Infrared Sensor)

Research Paper

207. Comparative analysis of lasers in optical communication system

This paper investigates the comparative study of various lasers by varying the bit rate and dispersion. The suitability of various lasers like vertical cavity semiconductor emitting laser, directly modulated laser and Continuous wave laser for an optical transmission link is evaluated. The results have been carried out by evaluating the value of Quality factor and BER at different values of bit rate and dispersion. It is found that using Continuous wave laser; the signal can travel up to transmission length of 71 km with acceptable BER and Q factor. In addition, the effect of dispersion has also been discussed.

Published by: Satnam Singh, Puneet JainResearch Area: Optical Communication System

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: Vertical Cavity Surface Emitting Lasers (VCSEL), Pseudo-Random Bit Sequence (PRBS), Continuous Wave (CW) Lasers Directly Modulated (DM) Laser

Research Paper

208. Prognostication of breast cancer using data mining and machine learning

In this study, WPBC that is Wisconsin Prognostic Breast Cancer (original) dataset to find an efficient predictor algorithm, to predict the recurring and non-recurring nature of breast cancer. Breast cancer is the most common disease found among the women, it is difficult for the physicians to know the exact reason behind breast cancer, and they need a smart system for predicting the illness on time before it is too late to be treated. It is one of the crucial reasons for death among females all over the world. The cancer tumor is generally categorized into benign and malignant tumors. Using machine learning and data mining techniques it can easily identify the cancer cells, provide benefits to the medical system. Use of classification algorithm C5.0 and XGBOOST sums up to have a considerably better result, improving the performance of the system. İn Classification, the calculation separates the information into unmistakable gatherings. It fundamentally pursues two stages of preparing first to learn and after that to a group.

Published by: Shriya D. Narvekar, Ameya Patil, Jagruti Patil, Saniket KudooResearch Area: Computer Engineering

Organisation: VIVA Institute of Technology, Virar, MaharashtraKeywords: C5.0, Confusion matrix, F1 score, WPBC dataset, Xgboost, Breast cancer

Research Paper

209. Automotive control system using CAN protocol

In the latest years, various developments are done in Automobiles Industries. This automobile is being developed by more of electrical parts for efficient operation and development of CAN based automobile control system CAN is a standard protocol for efficient and reliable communication between the sensor, actuator, controller and other nodes in real-time applications. CAN enable us to connect all the devices together using only two wires. The efficient data transfer rate up to 1Mbps. The CAN Protocol is used to exchange information between ECU. To provide an accurate result to the driver different sensors are used like Temperature sensor, Fuel level sensor, RPM sensor Ultrasonic Sensors, etc. CAN bus to implement the system to alert the driver. This paper provides the development and implementation of various previously presented systems, which are useful to improve the driver vehicle interface.

Published by: Surekha P. Gaikwad, Atmeshkumar S. PatelResearch Area: Electronics And Communication Engineering

Organisation: Matsyodari Shikshan Sanstha's College of Engineering and Technology, Jalna, MaharashtraKeywords: CAN (Controller Area Network), ECU (Engine Control Unit), Temperature sensor, Fuel level sensor, RPM sensor, Ultrasonic Sensors

Research Paper

210. Decentralized secure money using blockchain

The blockchain is a decentralized transaction and managing the data. This technology introduced on the first for Bitcoin cryptocurrency which makes more easier for the transaction. Blockchain technology has highly raised up in 2008. The main purpose of the Blockchain technology is to provide security, anonymity and data integrity without any third party organization in control of the transactions. This helps on improving in research areas especially from the perspective of technical challenges and limitations. In this research, we have conducted survive mapping study with the goal of presenting the Blockchain technology. The main objective of the researchers is to make the challenges in understanding the current research areas. This the future way to developing more and more on Blockchain technology. A blockchain is just a chain and list of blocks which secures the transfer of funds, by using a digital signature algorithm to prove ownership. Each block in the blockchain will have its own digital signature. We create a web page that contains the login and registration page. We create a key pair of each user that contains the private key and public key. Every time we check this blockchain is valid or not. The main reason for the paper is to research and focus on revealing and improving limitations of Blockchain from privacy and security perspectives. On the basis of this studying the blockchain we highly recommend the researchers to develop in the future.

Published by: Dr. S. Gunasekaran, Dr. G. Ravi Kumar, S. Nirmal Balaji, Gokul R., R. Mahilan, Pooja M.Research Area: Blockchain Technology

Organisation: Coimbatore Institute of Engineering and Technology, Coimbatore, Tamil NaduKeywords: Blockchain, Cryptocurrency, Transaction, Security, Data integrity, Anonymity, Peer-to-peer computing Ethereium

Research Paper

211. Optimization of generation-specific buying plan for premium lingerie brand

Buying a plan is the most important aspect of a profitable retail business. Retail buying plan includes sales forecast process by analyzing the factors affecting it namely aggregation of sales and exogenous variables. The conventional buying plan is centered around a common customer profile. However, in the future, we need a generation specific buying plan catering to their specific design expectations. In this study propose a new replenishment strategy formulated for Gen Z customers. The new buying plan strategy weighs the recent trends and prevailing sales scenarios to forecast the replenishment quantity and re-order point. The evolved strategy carries its references to sales history data, trends, aggregation of data for the product topology, especially for Gen Z customers.

Published by: Vinosha B., Nithyaprakash V.Research Area: Retail Management

Organisation: Bannari Amman Institute of Technology, Sathyamangalam, Tamil NaduKeywords: Forecast quantity, End of month stock, Actual sales quantity, Absolute deviation

Research Paper

212. Analysis and prevention of suicides using World Health Organization (WHO) data

Youth committing suicides is the major public health issue in the world. It is the third leading death reason in the United States of America for ages between 13-18. Many adults who have suicidal thoughts or make a decision of committing suicide plan never approach any professional for help or advise. Most of the cases, people attempting suicide don’t express it a lot in person due to the judgmental attitude of society. We have come with an idea of using WHO published data on suicide. With this we evaluate results to recognize and reduce the suicidal risk of the age group committing more suicides. We can use the same data to target the right audience through social media and campaigns to prevent it and reduce the cases. Linear regression and Random Forest algorithms are used which can predict the possible cases of suicides. We included a prediction algorithm called fbprophet. Once the analysis of the dataset is completed, we visualize the data and the group of audience committing more suicides will be targeted on social media. In the part of prevention, the audience is targeted on Facebook by using a parameter like the age, sex, and region. For this Facebook provides a paid medium through which we can provide awareness and motivation for targeted people.

Published by: Ronanki Bharath, Janaki S., Bhanu Narra, Rishabh Gupta, S. RamaResearch Area: Data Analytics

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: WHO Data, Prediction, Fbprophet, Suicide, Linear Regression, Random Forest

Review Paper

213. Eliminating the redundant data for side channel in cloud

In recent years, the amount of data stored at the cloud storage is increasing rapidly due to the prevalence of data outsourcing. In order to be cost-effective and to reduce the bandwidth consumption, cloud stores use cross-user client-side data deduplication which eliminates the need to store redundant copies by keeping only a single copy of the data at the cloud storage. Cloud storage providers generally adopt data deduplication, a technique for eliminating redundant data by keeping only a single copy of a file, thus saving a considerable amount of storage and bandwidth. Even then, the attackers use many deduplication protocols to steal information. For example, an attacker can perform the duplicate check to verify whether a file (e.g., a pay slip, with a specific name and salary amount) is already stored (by someone else), hence breaching the user privacy.

Published by: C. V. Usha Kiran, C.Reddineelima, B. Lijitha, K.Somesh, G.VenugopalResearch Area: Computer Science and Engineering

Organisation: Mother Theresa Institute of Engineering and Technology, Dandapalle, Andhra PradeshKeywords: Cloud Storage, Side Channel, Data Deduplication, Privacy

Research Paper

214. Application of 8D methodology for productivity improvement in assembly line

Productivity rate means the number of products produced for a specific amount of time. For an Industry to meet the customer demands on time, the productivity rate should be high. This research paper deals with the application of the 8D methodology for increasing the productivity by reducing the cycle time of the process in a wheel and rim assembly line. The 8D methodology is problem-solving eight disciplinary methods which help in identifying, analyzing, providing solutions and eliminating the reoccurrence of the problems. This paper deals with identifying the root cause of the problem and providing the solutions and also to prevent reoccurrence of the problem. This paper also deals with Value Stream mapping and Cause and Effect Diagram for analyzing the problem. This methodology helps to identify and solve the problem through the simplest approach by a step by step procedure.

Published by: Pradeep S., Ganesh Kumar S., Karthik R., Sai Suraj A., Gopi Kishore S.Research Area: Manufacturing Methodology

Organisation: Hindustan Institute of Technology and Science, Chennai, Tamil NaduKeywords: Productivity improvement, 8D methodology, Value stream mapping, Cause and effect diagram

Research Paper

215. A survey on empowering women in the workplace special reference to Kurukshetra University, Kurukshetra

Today the empowerment of women has become one of the most important concerns of the 21st century. But practically women empowerment is still an illusion of reality. The career priorities of working professionals are consistent across genders, women in the workplace continue to face issues limiting their growth trajectory within organizations. There is still a dearth of strong female leaders in organizations that women can look up to as role models. By reviewing major strands of the theoretical, methodological, and empirical literature on women empowerment from the different fields and attempt to summarize what we know and don’t know about what leads to women’s empowerment in the education sector. This paper attempts to analyze the status of women empowerment in Kurukshetra University, Kurukshetra by randomly collecting data from various faculty members of different departments. and highlights the reasons why working women in university feel they are under-represented in leadership positions. Based on the analysis, this study will provide some concrete recommendations regarding the key drivers which will facilitate working women in their careers within the university.

Published by: ShivaniResearch Area: Management

Organisation: Kurukshetra University, Kurukshetra, HaryanaKeywords: Women Empowerment, Leadership, Kurukshetra University

Research Paper

216. Smart route potential generation by using insolent plate system combined with cosmic panel

Through this project, we have tried to generate the electricity through the insolent plate system and cosmic panel. The idea of this project came from a road power generator. The smart route potential generation system is a new type of unconventional source of energy as well as combined a cosmic panel for a more need of binary generation. As it works by reusing the wasted energy from vehicles and cosmic rays, the kinetic energy can be converted to electrical energy. Millions of vehicles are traveling on our roads and panel is the field of technology and research related to the devices which directly convert sunlight into electricity. Which can be both combined process are used in powering roadway signs, street lights, and storage systems for back-up and emergency power. This will help the economy by producing electricity at less cost than petrol and nuclear. In this paper, an experimental approach is presented in order to prove the concept of operation of the SRPG system as a usable form of energy.

Published by: N. Mohamed Asif, K. MaheswaranResearch Area: Electronic and Electrical Communication

Organisation: M.I.E.T Engineering College, Tiruchirappalli, Tamil NaduKeywords: Insolent Plate, Cosmic Panel, Power Generation, Alternative Energy, Renewable Energy, Flywheel, Belt Drive

Research Paper

217. E-Cycle

Nowadays personal and efficient modes of transportation used in India include bicycles, mopeds, and motorcycles. These mopeds and motorcycles tend to be more costly in terms of initial buying cost, ever-rising prices of fuels required for driving these vehicles & high maintenance costs. Also, the fossil fuel deposits are getting depleted day by day and it’s hard to find the new ones to replace them. Moreover, pollution due to these fuels is jeopardizing the environment continuously. On the other hand, the low buying cost and zero running cost of traditional bicycle sometimes tend to be inconceivable as lots of muscle power is wasted by rider propelling the pedals to rotate the driving rear wheel. Keeping all this in mind, we proposed a new way to cater to people as well as to provide a solution for environmental pollution. Thus Solar Energy is one of the freely available energy sources in nature which could be harnessed easily and converted to electrical energy using a low-cost mechanism such as solar panel and used for the purpose of instilling mobility. Hence, a Solar Powered Electric Bicycle is proposed over here. Our solar powered electric bicycle developed is driven by Brush-less DC motor. The solar panels mounted, on the bicycle, which will charge the battery, which in turn drive the motor.

Published by: Rahul Bodar, Shrikishan Agarwal, Brijen VasaniResearch Area: Mechanical/ Mechatronics

Organisation: SVKM’s NMIMS Mukesh Patel School of Technology Management and Engineering, Mumbai, MaharashtraKeywords: E-cycle, E bike, electric cycle

Research Paper

218. Fully automatic solar based grass cutter using AT89S52 microcontroller

In our day to day life, Automation is a very important part of the invention. Presently manually handled devices are commonly used for cutting the grass over the lawn or gardens. Because of this, there is pollution and loss of energy. The old grass cutters need to be replaced by automated one where sensors are used for guidance and obstacle detection using the battery as a power source. In our project solar panel will be attached to the top of the robot this will reduce the more power consumption. This paper presents an overview of hardware and software technological development for making efficient and costs effective grass cutter.

Published by: Ankita Ambatwar, Nikhita Nakhate, Dhanashri Shinde, Shubham DhargaveResearch Area: Electronics Engineering

Organisation: Priyadarshini College of Engineering, Nagpur, MaharashtraKeywords: Solar panel, Battery, Grass cutter, Ultrasonic sensor, Motors, 8051 series microcontroller

Others

219. Smart glove for hand gesture recognition

Human beings have a natural ability to see, listen and interact with their external world. Unfortunately, there are some people who are differently abled and do not have the ability to use their senses to the best extent possible. Such people depend on other means of communication like sign language. This presents a major roadblock for people in the hearing and speech impairment communities when they try to engage in interaction with others who are unfamiliar with the sign language, especially in their educational, social and professional environments. Therefore, it is necessary to have a gesture recognition or sign language detection system to bridge this communication gap. The main aim of the proposed system is to develop a smart glove for real-time gesture recognition using IoT. A mobile application is used as an interface to convert gestures into speech or voice output.

Published by: Bhavana Madabathula, Geethika Dantuluri, Alekhya Sripada, Gompa Haasini, Anusha VangalaResearch Area: IoT

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Flex, IMU, Bluetooth TTS, DOF

Review Paper

220. Drowsiness detection with driver assistance for accident avoidance based systems

This concept proposes a new approach to automotive safety and security with automatic car system based on autonomous region. We are proposing three concepts that are different but nearly related to tired driver detection system and an external traffic detection system based on intrusion. In recent times, automotive crashes related to fatigue have actually magnified. We have proposed a driver alert system to minimize these issues by observing the driver's eyes and sensing using IR sensor as well as a driver based local environment recognition using ultrasonic sensor.

Published by: Vikas Chauhan, Sanjay Patel, Prudhvi Chowdary, Dharshen R. S., Sai Siva Reddy, A. Mohammed ArifResearch Area: Electronics and Communication Engineering

Organisation: SRM Institute of Science and Technology Chennai, Tamil NaduKeywords: Drowsiness detection, Advanced driver assistance system, Driving-system design, Eyes Detection, Face Detection

Research Paper

221. Measurement of VO2 in sedentary healthy females: A normative study

To measure normal values of VO2 in sedentary healthy females aged 18-25 years. To know normal values of VO2 in sedentary healthy females aged 18-25 years. 20 healthy females aged 18-25 years were selected as per the inclusion & the exclusion criteria. The study was conducted after taking consent from the subjects, personal details were obtained through performance, instructions about the procedure were given and required materials were used. Normal values of VO2 were measured using power lab machine with the treadmill. VO2 values of healthy females appear lower than those standards reported for females of comparable age, weight, and height in western countries. Current study presented normative data of VO2 in sedentary healthy females aged 18-25 years

Published by: Dr. Aishwarya S. Rangari, Dr. Subrat Samal, Dr. Snehal SamalResearch Area: Cardio-respiratory

Organisation: Shri K R Pandav Ayurved College and Hospital, Nagpur, MaharashtraKeywords: VO2, Aerobic capacity

Research Paper

222. Augmentation of information management protection in hybrid clouds

As the growing technology of cloud, tremendous information is generated every day from multiple sources. Information is receiving from the distinct data center as a collaborated service nature of computing technology. Hybrid cloud model will hold the business critical content securely and on-premises control enables the process of consumer grade level alternative solutions. However, there will be a process specific security controls in the content-specific environments, it is important to manage all generic type of information and its sources in hybrid cloud access platform. Hybrid cloud platform deals with the various business insights, which increases the volume of cloud systems. Any private and public users can request for cloud services and use it as a model of on-demand services. It is necessary to monitor and regulate the security systems for controlling access from generating a large amount of data. So, the proposed system will bring the solution for a secured level of information management in a hybrid cloud service model.

Published by: Dr. R. PoorvadeviResearch Area: Cloud Computing

Organisation: Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, Kanchipuram, Tamil NaduKeywords: Cloud Vendor, Hybrid Cloud, Information Process, Service Level Agreement, Identity And Access Management, Cloud Service Provider, Service Provisioning

Technical Notes

223. Utilization of waste plastic in fly-ash bricks

The main aim of our project is to utilize those plastics and fly ash in the manufacturing of bricks. In this project, plastic bricks were cast with different proportions with quarry dust & fly-ash. The plastic percentage is varied by 5%,10%,15%,20% with the casting of quarry dust and fly-ash was constant. The tests are conducted compressive strength test, water absorption test, and efflorescence test. Here the strength properties of plastic bricks comprising of waste plastics, fly ash as the constituents and the design considerations for pavement block incorporating waste plastic bags is presented. A comparative economy, etc. compression strength test was performed on the plastic brick and its strength was found to be 6.66 N/MM2 which is higher than red clay bricks which have a compressive strength of 3-5 N/mm2.

Published by: Etaveni Madhavi, Darshak Sai Ginjipelli, Kadavaluru Uday kumar, Gachu Shekar, Lavudya ApoorvaResearch Area: Concrete Materials

Organisation: St. Mary's College of Engineering and Technology, Hyderabad, TelanganaKeywords: Plastic Waste, Flyash, Compressive Strength, Water Absorption

Research Paper

224. Offline speech recognition on android device based on supervised learning

Offline Android Smartphone Assistant is a virtual personal assistant which is implemented to perform basic functionalities of the smartphone in offline mode with speech commands. The task includes open apps, toggle wi-fi, toggle Bluetooth, call a person, send messages, control brightness, open torch, etc. The key functionality of the Offline Android Smartphone Assistant is the capability of performing each and every task without the use of the internet. The users can interact with the assistant through natural voice commands. Many companies had established several virtual assistants like Google Assistant, Apple’s Siri, Amazon Alexa, etc. However, the virtual assistants established by several companies do not provide many offline functionalities. In this proposal, we provide easy to access every system functionality without using the internet using Speech Recognition. This application will help people in areas where internet connectivity is hardly possible. The application also provides the functionality of a screen overlay. The application uses Natural Language Processing for processing the voice commands and performing the required tasks.

Published by: Reeta Bandhu, Nikhil Kumar Singh, Betawar Shashank SanjayResearch Area: Computer Engineering

Organisation: Sinhgad Institute of Technology, Lonavala, MaharashtraKeywords: Natural language processing, Speech recognition, Offline application, Voice commands, Screen overlay

Research Paper

225. Cloud based employee attendance management system using NFC and Face Recognition

For every organization, the attendance process is one of the important aspects to consider employee performance. Yet it is something that should be done swiftly and efficiently, without giving any effort into it. Manual attendance system could be time-consuming and error-prone, and other new system developed could prove to be complex and costly. Hence, the proposed system called as “Cloud-Based Employee Attendance Management System using NFC and Face Recognition” provides several important operations such as captured attendance records using NFC, automatic time calculation, leave and overtime checking, working hour’s evaluation, real-time updated information access, and generating reports. In order to add on to the security of genuine attendance tracking, facial recognition mechanism is embedded, so the system could not be fooled. An online portal is developed for managers to keep track of this process and manage employee attendance easily. The system can be used by any companies from small to medium size to implement cheap and efficient attendance tracking mechanism.

Published by: Ankit Rana, Vipul Pugaokar, Akshay Sawant, Arti GoreResearch Area: Computer Engineering

Organisation: Saraswati College of Engineering, Navi Mumbai, MaharashtraKeywords: Attendance management system, Face Recognition, Cloud Computing, NFC, Web Portal

Research Paper

226. A research paper on: Automatic switching of relays according to set limits of voltage on distribution side

This Paper Presents The Design, Construction And Working Of Protective Mechanism For Single Phase Devices Against Over Voltage And Under Voltage Stage. Which Circuit Is Fabricated Using Microcontroller Atmega328, Voltage Regulator Ic, Comparators, Relays, And Other Devices. In Over Voltage Conditions, When The Supplied Voltage Is 240 V Or Above, The Relay Operates With Buzzer, However In Under Voltage, When Voltage Is 180 V Or Less, The Relay Operates With Buzzer, On Such Conditions,16×2 LCD indicates the status of the voltages as regulated voltage, low voltage and over voltage. Buzzer also beeps when over or low voltage detected. The Main Advantage Of This Protective Circuit Is That, It Can Protect The Single Phase Household Equipment As Well As On Distribution Side. In Future, This Model Can Be Modified For The Protection of Three-Phase Power System And Industry Level Equipments.

Published by: Jitendra Laxman Lohar, Ganesh Ghashiram Chawla, Kshitij Pramod khachane, Shivdas Santosh Gai, Shubham Gajanan KachareResearch Area: Power Distribution (Single Phase)

Organisation: Padm. Dr. V. B. Kolte College of Engineering and Polytechnic, Buldana, MaharashtraKeywords: Microcontroller Atmega328, Over voltage, Under voltage, Buzzer, LCD display

Research Paper

227. Machine learning algorithms for intrusion classification

The usage of the Internet, the amount of network traffic volume is rapidly raising high. Preventing such huge, sensitive data from security attacks is equally important. Monitoring network traffic may indicate a possible intrusion in the network and therefore anomaly detection is important to detect and prevent such attacks. One of the approaches to anomaly detection is based on machine learning classification techniques. Here we apply seven different machine learning techniques: K-Means, K-Nearest Neighbours (KNN), Fuzzy C-Means (FCM), Support Vector Machine (SVM), Naïve-Bayes (NB), Radial Basis Function (RBF) and Ensemble method (Weighted average method) comprising of K-Nearest Neighbours and Naïve-Bayes (NB) on NSL-KDD dataset and evaluate the performance of these techniques. We also deduced how the change in the training size can affect the training time and the accuracy of each algorithm

Published by: Alapati Avinash, Alla Haripriya, B. SandeepResearch Area: Computer Science And Engineering

Organisation: Anil Neerukonda Institute of Technology and Sciences, Bheemunipatnam, Andhra PradeshKeywords: Intrusion, Anomaly detection, NSL-KDD dataset

Others

228. Design development of women’s casual wear (travel jacket)

The present generation of women who are under the age category of 18-25 are the ones who travel a lot. Out of which most of them are gallivanter, fashionistas, early adaptors, and digital natives. They are in search of something new. They wish to travel seeking new experiences that are filled with fun, adventure, and activities that get them the at most pleasure. This thirst for pleasure makes them go on trips very often. Travel jackets have become an essential part of the traveler’s kit. They search for travel jackets to complement their travel plans. Wearing travel jackets make them happier and also comfortable during travel. These travel jackets create an emotional feel to the wearer, every time they wear it. In this paper, the expectations and the needs of the target customer are collected and travel jackets are designed and developed to fulfill their needs and expectations. Through our study, we tried to incorporate these details into the garment through the emotional design process.

Published by: Pragatheswari, Nithya Prakash V.Research Area: Design Development

Organisation: Bannari Amman Institute of Technology, Sathyamangalam, Tamil NaduKeywords: Travel, Jacket, Emotional design, Women, Pleasure, Happiness, Fun

Research Paper

229. Video transmission using Li-Fi

Light Fidelity is a wireless communication technology which uses light to transmit data from one location to another by virtue of light emitting diodes. The vision of our project is to design a system capable of transmitting data at a high data rate over the visible light spectrum and infrared radiation. In the existing system, only audio can be transmitted, but the intricacies were fixed and now video can also be dispatched. The video to be transmitted is chosen and it is fed to the LI-FI module with the aid of the microcontroller. The receiver module now sends the video to the laptop where it can be viewed.

Published by: Senthamizhselvi R., Raghul S., Karthikeyan B., Nandha Kumar G.Research Area: Communication

Organisation: SRM Easwari Engineering College, Chennai, Tamil NaduKeywords: Video transmission, Li-Fi, Micro controller, Data rate, Quality

Research Paper

230. Developing a neuro-fuzzy based framework for labour productivity assessment

Labour productivity assessment is the key to optimal planning and allocation of resources for a construction project. In this study, a detailed questionnaire covering major factors influencing work productivity has been identified by surveying the labourers and their supervisors. The relative importance index (RII) has been used to consolidate the responses and identify the key factors. Based on the factors identified a field study is conducted to develop an automatic productivity assessment tool. The worker performance is estimated using data collected from wearable devices. The data is calibrated against the site supervisor estimated labour performance by training a neuro-fuzzy interference system. The developed model can serve as a framework for the automatic assessment of labour performance in a construction site. This can find extensive applications in making the resource allocation process in major construction sites more rational.

Published by: Anushya Bharathi, Dr. G. Chitra, S. VaidyanathanResearch Area: Civil Engineering

Organisation: Thiagarajar College of Engineering, Madurai, Tamil NaduKeywords: Labour productivity, Neuro-fuzzy system, Activity study, Expert system, Resource optimization

Thesis

231. Diagnosing the obstructive sleep apnea from encountered multi parameter values

Patients suspected of suffering sleep apnea and hypopnea syndrome (SAHS) have to undergo sleep studies such as expensive polysomnography to be diagnosed. Healthcare professionals are constantly looking for ways to improve the ease of diagnosis and comfort for this kind of patients as well as reducing both the number of sleep studies they need to undergo and the waiting times.

Published by: Navin R., Palur Sai Vivek, Pulu Gulla Lakshmi Vineeth, V. Sathya Narayanan, D. Padmapriya M. E.Research Area: IoT And Embedded Systems

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Obstructive sleep apnea diagnosis, SAHS, Sleep studies

Research Paper

232. Preliminary screening of suitable clones for manufacturing green tea from the existing released clones in northeast India

In India, the existing clones and variety of tea plants have been developed for manufacturing of black tea (CTC & Orthodox Tea). But till now no clone & variety of tea has been identified exclusively for manufacturing of Green Tea (steamed/ roasted) So one humble attempt was made to identify tea clones from the existing released clones for preference of manufacturing Green Tea on the basis of their taste & their Polyphenol: Amino Acid ratio. Selected ten clones representing the China Jat, Assam Jat, Cambod Variety and Industry released Clones of Assam on the basis of their availability and potential quality on CTC and Orthodox Tea were analyzed with their morphological character,chemical analysis and green tea taste by tea taster indicates that TV-1, TV-7, P126 have the best potentiality for manufacturing green tea.

Published by: Bhupen DekaResearch Area: Tea

Organisation: Tocklai Tea Research Institute, Jorhat, AssamKeywords: Green tea, Catechin, Epigallocatechin-3-gallate, Antioxidants, CTC (Curling Tearing Crushing), Orthodox, Cambod, Industry released

Research Paper

233. Factors to be considered for location selection for affordable housing

Due to the rise in population in metro cities, there has been a substantial rise in the demand for houses. This demand, however, is more from the service-going employees which majorly falls under lower and medium income group. To fulfill this increasing demand and meet these uprising challenges, affordable housing has more or less become the necessity of our developing country. Affordable housing is a challenge that many countries are currently dealing with. “Affordable housing refers to any housing that meets some form of affordability criterion, which could be income level of the family, size of the dwelling unit or affordability in terms of EMI size or a ratio of house price to annual income.” Along with constructing the right number of houses, constructing it within the right budget is also equally necessary. With an increase in the rate of land parcels in and around the metro cities, selection of appropriate land parcel plays an important role in keeping the project within the desired budget. Budget is the most crucial constraint of the project and not much buffer is available for the same. Undertaking an affordable housing project should be such that the profitability of the developer company is achieved as well as the financial needs of the consumer are complimented. It should be a win-win situation for both parties. To execute such a project, the location for the project should be well planned. This is especially important for targeting the pricing sensitivity to locational advantage. Selecting the appropriate location will solemnly solve the budgetary restriction for the developer and the tenements. In this research paper, we will discuss the factors to be considered while selecting an appropriate location to execute a successful affordable housing project.

Published by: Sarvesh S. Nerurkar, Swati SakpalResearch Area: Construction Management

Organisation: MIT College of Management, Pune, MaharashtraKeywords: Affordable housing, Right budget, Appropriate land parcel, Profitability of the developer

Case Study

234. Outcome Based Education, need for the hour- NBA

Outcome-Based Education (OBE) model is being adopted at a fast pace at Engineering colleges in India at the moment. It is considered as a giant leap forward to improve technical education in India and help Indian Engineers compete with their global counterparts. Outcome Based Education (OBE) is an important demonstration Tool for student-centered instruction that focuses on measuring student performance through outcomes. Outcomes include Engineering Knowledge, Problem Analysis, Ethic, Individual and Team Work, Communication etc... It enables the students to perpetuate these outcomes as they perceive over the years of engineering. The students are evaluated for all the required parameters (Outcomes) during the course of the program. The attainment, defined by the NBA, gives a substantial opportunity for Tier-II students to bridge this gap of employability. In this present paper, a case study is developed through CO-PO mapping and attainment for Mechanical Engineering Students of Tier-II. The formulated rubrics assessment is indicative of a continuous improvement strategy that can be easily adaptable by faculty and students across engineering streams.

Published by: S. Nithya PoornimaResearch Area: Education

Organisation: BMS Institute of Technology and Management, Bengaluru, KarnatakaKeywords: CO-PO Mapping, Outcomes, Rubrics, Attainment

Research Paper

235. To find out correlation between the temperament and the parameters of a smile: A photographic study on visagism

In order to design a more life-like smile, it is necessary to co-relate it to the personality of the subject. It is possible using a novel concept of “Visagism”. With the Visagism concept, clinicians can design a smile that blends the patient’s physical appearance with his/her personality and desires. Aim: To find out as to whether the concept of Visagism is present in dentate individuals. Setting and Design: A self-reporting questionnaire was formulated which highlighted the reaction of female subjects to different situations in life and hence their personality was determined. Materials and Methods: The photographs of teeth of the same subjects were taken, and their tooth forms, long axes, and embrasure lines were drawn using the software. Statistical Analysis Used: These parameters were then statistically analyzed and correlated with the individual personality. Results and Conclusion: A definite correlation was found between the temperament and the parameters of a smile. The parameter of tooth form was more closely related to the personality and the most common temperament was found out.

Published by: Dr. Pradnya V. Bansode, Dr. Seema D. Pathak, Dr. M. B. Wavdhane, Dr. Devika M. KalaskarResearch Area: Dentistry

Organisation: Government Dental Hospital and College, Aurangabad, MaharashtraKeywords: Esthetics, Personality, Smile design, Visagism

Research Paper

236. Quality improvement in carbon bush machining

This paper presents a Lean Six Sigma improvement in a production line of the company’s Carbon Bush Machining Sector, in order to eliminate losses that cause low productivity, affecting the fulfillment of the production plan and customer satisfaction. The use of Lean methodology following the DMAIC (Define, Measure, Analyze, Improve and Control) stages allowed analysing the factors that cause wastages of carbon bush. The root cause for wastages were identified with helps of quality tools like (control chart, Pareto chart, cause and effect and diagram, etc). The major problem and cause that contributes for wastage which we assumed were through handling of work pieces (carbon bush), done by both machines and humans. The solution was generated after collection of various data through inspection.

Published by: Kamatchi T., Kishore S., Bhuvanesh M., Karthikeyan M., Arun Senthil Kumar A.Research Area: Six Sigma

Organisation: Velammal College of Engineering and Technology, Madurai, Tamil NaduKeywords: Lean Six Sigma, DMAIC, Carbon Bush, Quality Tools

Research Paper

237. Design and development of wheel spray pump

In the agricultural sector generally, the farmer uses the traditional way that means spray carried on back and spraying crop. This becomes time consuming, costly and human efforts is a major concern, these problems can be overcome by using mechanically operated wheel spray pump. It facilitates the uniform spread of the chemicals, it is capable of spraying chemicals at the desired level, precision made nozzle tip for adjustable stream and capable of throwing foggy spray as per requirement. In our project we use the slider-crank mechanism to convert rotational motion into a reciprocating motion to operate the pump, thus the pesticide is spread through the nozzle. This work gives a continuously foggy flow of pesticide at the required pressure and height. A special arrangement is implemented in this project to adjust the pressure as high or low. We also use two wheels at the back of the frame to balance the complete assembly. By using the wheel spray pump, spraying time and human efforts reduce and results in cost reduction.

Published by: Akash Manoj Holam, Bharat Maruti Kadwaikar, Manish Mahendra Pawar, Abhijeet Gurunath Naik, Rahul Damodar BelekarResearch Area: Automobile Engineering

Organisation: Rajendra Mane College of Engineering and Technology, Ambav, MaharashtraKeywords: Cost, Nozzles, Pump, Spraying time, Reduced human efforts, Back pain

Research Paper

238. Implementation of ROS-I on industrial robot simulation environment

This paper presents the procedure for the implementation of ROS-I architecture into the Robotic simulation offline programming environment. The Implementation is done by developing the packages which are necessary for implementing into ROS-I that are related to modeling and Configuring of the Industrial Robot. The Communication between ROS-I and Roboguide will be established, and motion planning can be performed through Rviz moveit! Interfaces.

Published by: Prasanth T.Research Area: Mechanical Engineering

Organisation: Bannari Amman Institute of Technology, Sathyamangalam, Tamil NaduKeywords: ROS-I, Rviz, Moveit

Research Paper

239. Software defect prediction

Software Defect Prediction is an important aspect in order to ensure software quality. Deep Learning techniques can also be used for the same. In this paper, we propose to extract a set of expressive features from an initial set of basic change measures using Artificial Neural Network (ANN), and then train a classifier based on the extracted features using Decision tree and compare it to three other methods wherein features are extracted from a set of initial change measures using dimensionality reduction techniques that include Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Kernel PCA. We use five open source datasets from NASA Promise Data Repository to perform this comparative study. For evaluation, three widely used metrics: Accuracy, F1 scores and Areas under Receiver Operating Characteristic curve are used. It is found that the Artificial Neural Network outperformed all the other dimensionality reduction techniques. Kernel PCA performed best amongst the dimensionality reduction techniques.

Published by: Sree Abirami S., Umavathi R., Benula L., Mathiyalagan P.Research Area: Journal

Organisation: Sri Ramakrishna Engineering College, Coimbatore, Tamil NaduKeywords: Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA), Kernel PCA

Research Paper

240. Event management and social media marketing

Event management is a multidisciplinary occupation, it is an exciting and continuously growing industry. It attracts people who possess creative talents, and organizational skills which they use to execute all event and event-related functions. Event managers are in a work environment in which no two days are the same. Events not only provide people with Entertainment, Unique, and Memorable experiences but also have the ability to reflect and mold a society. Thus it becomes important for an Event Manager or Event Management organisation to understand their Capabilities, Target Market and the Trends in the Event Management Industry, the marketing of their services also need to be done right in order to keep the present customers informed and attract new potential customers, not to forget to remain a step ahead of the competition in this ever-evolving industry. Social Media Marketing is gaining more and more acknowledgment with various industries increasing brand awareness and focusing on increasing their interactions with their customer. Similar practices of using social media to promote the event and event-related content can be useful for an organization in the event management industry too.

Published by: Namratha J., Dr. A. Thiruchelvi, Natasha J. Research Area: Tourism Management

Organisation: Anna University, Chennai, Tamil NaduKeywords: Event management, Event managers, Events, Event management organizations, Social media and social media marketing, Promotion, Brand awareness

Research Paper

241. Anticipating thyroid disorders using data mining techniques

Anticipating the Thyroid disease is one of the currents focuses in Medical research. The most difficult undertaking of the restorative field is to give the infection analysis at the beginning period with higher precision. The sickness forecast assumes a critical part in information mining. Information mining is mostly utilized as a part of medicinal service associations for basic leadership, diagnosing malady and giving better treatment to the patients. It is a procedure for investigating huge informational collections to discover a few examples. These examples can be useful for forecast demonstrating. In this theory, the principal objective is an order of thyroid ailment. An investigation of thyroid sickness finding systems utilized as a part of information mining. The thyroid is one of the impulsive syndromes in the restorative field. Thyroid hormones control the body's metabolic rate. Also, information mining methods have been connected in different areas the order, after the effects of the restorative informational index which helps the method for medications to the patients. In proposing a procedure, look at different calculations, for example, naval forces' bayer, random backwoods, irregular tree, REP Tree, D tree to discover which calculation to give the best outcome for thyroid ailment expectation. An exploratory examination is conveyed out our calculation to accomplish better exactness. There are numerous information mining grouping Algorithms, for example, naval forces, REP Tree, arbitrary tree, irregular forest, D tree and k-overlap cross approval et cetera. The proposed Algorithm gives exactness 99.80% with cross approval k=6.

Published by: S. Sai Vasavi, S. Shruthi, S. Sai Sri Harshini, VNVLS SwathiResearch Area: Data Mining

Organisation: CVR College of Engineering, Pocharam, TelanganaKeywords: Classification, D tree, Information mining, REP tree, Thyroid disease, WEKA

Research Paper

242. Importance of use of sanitary napkin during menstruation cycle

In respect to carrying the present research paper, the main aims are to provide the importance of using sanitary napkins in the menstruation cycle. Awareness and essential information need to provide to all female in rural areas so that effectiveness will be developed in a systematic manner. Furthermore, thematic analysis has been implemented that assists to find effective information towards the aim. Descriptive research design also ascertains that make proper outcomes in business will in-depth information in the society

Published by: Garima WadhwaniResearch Area: Social Issue

Organisation: Cognus Technology, Jaipur, RajasthanKeywords: Napkin, Mensuration, Female, Care, Awareness

Research Paper

243. Elimination of cylinder head valve guide wrong fitment

The Engine is powered by burning the air-fuel mixture inside the combustion chamber and the power is delivered to run the Vehicle. The mixture of air-fuel is required in the correct quantity to attain maximum efficiency. There are two valves present in the Engine cylinder head which is inlet and exhaust valve. This two valve will have different parameters, in which the exhaust valve is small and the inlet is big compared to the exhaust valve. Valve Guides and valve seats are very important for the continuous proper working of the inlet and exhaust valves. The valve guide is helpful for the valve to sit in the correct position with respect to the valve seat. Valve Guide is a cylindrical piece which is manually loaded in the machine and pressed into the cylinder head during the cylinder head machining process. Since the valve guide is inserted in the valve guide press machine manually there is a chance of inserting in the wrong direction inside the cylinder head. This problem leads to a drastic amount of scrap and increases in material cost. The solution to this problem can be solved by adding an airline and pressure sensor in the valve guide holder in valve guide press machine. This can eliminate the problem and also improves in the quality time and in the reduction of the amount of scrap.

Published by: Deepak Sekar, Mohan Y, Mithun CResearch Area: Manufacturing

Organisation: Hindustan Institute of Technology and Science, Chennai, Tamil NaduKeywords: Cylinder Head, Valve Guide, Poke-Yoke

Research Paper

244. Analysis of David Fincher as an Auteur

Director David Fincher is an acclaimed director and is one of the most sought after directors presently working in Hollywood. His films have elements which set him apart from other filmmakers. His choices of shots in his films and camera work in his film qualify him as an auteur of his films. This paper will closely examine all of his ten feature films which show his style of film making over the years. The films that will be taken under observation are Alien 3 (1992), Se7en (1995), The Game (1997), Fight Club (1999), Panic Room (2002), Zodiac (2007), The Curious Case Of Benjamin Button (2008), The Social Network (2010), The Girl With The Dragon Tattoo (2011) and Gone Girl (2014). This paper will examine the idiosyncrasies observed over the years in his films during different narrative plot points. Using the variation of auteur theory as laid out by American film theorist Andrew Sarris, this thesis will explore the signature elements of Fincher’s camera positioning, camera motion, and camera angling in order to qualify Fincher as an auteur. Their usage will help us understand the narrative function that these shots play in his films.

Published by: Mayank ShuklaResearch Area: Film

Organisation: Amity School of Communication, Noida, Uttar PradeshKeywords: Auteur Theory, Camera Angle, Camera Movement, Camera Positioning, David Fincher, Alien 3, Se7en, Fight Club, Panic Room, Zodiac, Gone Girl

Transaction Paper

245. Air and water quality monitoring system

The degradation of water resources and air pollution has become a common problem. The conventional methods of monitoring involve the manual collection of water and air sample from different locations. These samples are tested in the laboratory using rigorous skills. Such approaches are time-consuming and are no longer to be considered to be efficient. Moreover, the current methodologies include analyzing various kinds of parameters of quality such as physical and chemical. The old method of quality detection and communication is time-consuming, low precision and costly. Therefore, there is a need for continuous monitoring of water and air quality parameters in real time. By focusing on the above issues, a low-cost monitoring system is using that can monitor air and water quality in real time using IoT. Each device has a unique identification and must be able to capture real-time data autonomously. Basic building blocks of IoT consist of sensors, processors, gateways, and applications. In the system, water quality parameters are measured by different sensors such as pH, turbidity, dissolved oxygen, temperature, CO2 level and Air quality for communicating data onto a platform via microcontroller based system.

Published by: Aditya Pradeep Kavathekar, Swastika Anil Jadhav, Krutika Gajanan Gaikwad, Pooja Pramod Pataki, Kartik K. NikamResearch Area: IoT

Organisation: Sanjay Bhokare Group of Institute, Miraj, MaharashtraKeywords: IoT, Sensor, Air, Water, Quality, NGO, Government

Research Paper

246. Effective student attendance system

Taking attendance in a class can often be a time-consuming and a manual process, which is prone to human error(s) and hence recording incorrect data. Also, querying the data per student can be, the tedious process since it involves some sort of manual tracking/counting of days attended. With advent of smartphones and tablets which are very handy to use, this process can be made completely automated and error free by using the right technologies. For this project, we are creating an android based application that can be used for Attendance tracking which is easy to use and free from any manual tasks. Users (Professor/Course Instructor) just have to add courses he/she plans to take for Fall/Spring/Summer semester in the application. Once the student ID is recorded, an application will update the appropriate attendance database for that particular course.

Published by: Tejashri Mansur Desai, S. G. Bavachkar, Aditya Jayant Desai, Hemangi Suresh Salunkhe, Sumitra Rajendra Teli, Pravin Chandrakant PatilResearch Area: Collage Managment System

Organisation: Sanjay Bhokare Group of Institute, Miraj, MaharashtraKeywords: Admin Model, Teacher Registration, Assistance Registration

Research Paper

247. Attacks and threats in Wireless Sensor Networks

Wireless sensor networks is a rising subject to research and improvement, The advances and traits in Wireless Communication technology have made the deployment of small, low fee wireless sensor nodes connected through a wireless medium, known as Wireless Sensor Networks (WSNs), technically and economically possible. These WSNs have were given several packages in diverse fields like an army, environmental monitoring, fitness, enterprise and so on. Security has already ended up a primary subject for WSNs because of the wide utility of WSNs in security-vital regions. In this paper, we check out the security-related troubles and demanding situations in wi-fi sensor networks. We identify the security threats, overview proposed safety mechanisms for wi-fi sensor networks

Published by: G. V. Pavan Nikhil, Anisetti Kalyan Rahul, Chikoti Akash, Prathik Reddy, K.ManikandhanResearch Area: Networks and Communication

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Wireless Sensor Networks (WSNs), Security, Attacks and challenges, Security mechanism

Research Paper

248. Product aspect ranking and its application

E-commerce is a transaction of buying or selling something online. E-commerce allows the customers to overcome the barriers of geographical and also allows them to purchase anytime and from anywhere and also consumers having the privilege to review positively or negatively on any product over the online. The consumer review is very important in knowing the product’s aspect and feature and it also very useful for both other consumers and firm. So in the way of finding the product aspect ranking we have proposed the methodologies in which it extracts the reviews and preprocessing, finding the aspect identification of the product, classifying the positive, negative and neutral reviews of the product by the sentiment classifier and also proposing the ranking algorithm used for the product ranking. In the data preprocessing there are methods available in which it initially differentiates the meaning and meaningless words and also it removes the postfix from each word and then tokenize each sentence by removing the emotion icons and also space. In aspect identification, we will identify the aspect from the numerous review which is given by the consumer whether it is positive or negative and on its basis of high or low score we will give a ranking. The main aims of sentiment classifier are to classify the review. The concurrent consideration of the aspect frequency and the pressure of consumer’s opinion given to each aspect on their overall opinions in the products aspects ranking and in its application.

Published by: Thirunagari Lakshmi Narasimha Vedavyas, Vanam Udayram, Kateeb Shaik Sharukh Mastan, V. EthirajuluResearch Area: Computer Science Engineering

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Product aspects, Aspect ranking, Aspect identification

Research Paper

249. An experimental study on partial replacement of perlite powder and GGBS with cement in ternary blended concrete

In the present scenario in the world, the cost and environmental pollution of cement are very high which is obtained from the cement industries. Alternately we want to decrease the cost and environmental pollution by adding waste industrial materials. Among the many types of admixtures, Perlite Powder (PP) is a material with very low thermal conductivity & GGBS from industries which can be made blended concrete with perlite and GGBS powder. For the strength purpose, partial replacement of cement is carried out by GGBS at 20%. In this work different tests have been performed on M30 grade of concrete like compression test, tensile test, water absorption test. The Present work describes the comparative study of partial replacement of Perlite and GGBS powder in cement. And the Compression and Tensile tests were performed for 7days and 28days and 56 days of curing at 4% PP + 20% constant of GGBS, the compressive strength and tensile strength both are observed to be increased by 0.54% and 1.68% respectively as compared to the conventional concrete of M30 grade. And also did water absorption at 1050C and by taking of perlite powder in Mix which controls the thermal properties of concrete.

Published by: K. N. Lakshmaiah, G. Devika, D. Harish Babu, N. V. NarayanaResearch Area: Structural Engineering

Organisation: Narasaraopeta Engineering College (Autonomous), Guntur District, Andhra PradeshKeywords: Perlite powder, GGBS, Blended concrete, Compressive strength, Tensile strength

Research Paper

250. Ensure the securities in IoT for smart home monitoring system

Smart building using IOT technique is used to maintain home automation in a smart way. In order to improve security in the home, the various sensor is used. In that PIR and MQ-6 sensors plays a major role. The data from various sensors are sent to the Arduino board and get stored in the cloud. In this paper home monitoring system with intrusion, detection technique is used. For data security, wireless sensor network (WSN) playa a major role. To facilitate data encryption, a method namely DES based on efficient key generation mechanism was proposed.

Published by: Kaviya S., Divya Lakshmi R., Jenifa G.Research Area: IoT

Organisation: KPR Institute of Engineering and Technology, Coimbatore, Tamil NaduKeywords: IoT tecnique, Intrusion detection, DES, RSA

Research Paper

251. A research paper on control of an elevator in case of failure of rope holding the inside cage

This paper explains a safety system in the current elevators which would ensure that passengers are safe even if the rope of elevator cage breaks. Elevators are largely used to ease work of human being and reduce the time of traversing up and down a multi-story building. Hence it has become equipment of prime importance. The safety of people in the elevator thus brings us to the idea of developing a low-cost and simple mechanism which can be installed in every elevator ensuring rope breakage safety of the people.

Published by: Rushikesh Rajendra Khadilkar, Jayesh Totaram Bharambe, Ajinkya Goroba Keskar, Eshwar Rajendra DhandeResearch Area: Mechanical Engineering

Organisation: PES Modern College of Engineering, Pune, MaharashtraKeywords: Elevator, Rope, Safety, Brakes, Sensors, Solenoid, Controller, Cage

Review Paper

252. Comparative study on the working of two non-governmental organizations in India – Make A Difference (MAD) and Latika Roy Foundation (LRF)

This review paper entails various details regarding a national level NGO (Make A Difference (MAD)) and a regional level NGO (Latika Roy Foundation (LRF)). A study regarding the individual structures and functions of these organizations has been done and suggestions as to how these two organizations can work in a coordinated manner have also been provided. MAD has a more macroscopic impact whereas LRF has a more microscopic impact. It is the amalgamation of these two impact levels which forms the foundation of the review paper. A macroscopic entity can have a more profound effect if it is enhanced microscopically, and a microscopic entity can have more outreach if provided with the required macroscopic resources. This is precisely the reason, for suggesting a coordinated helping system between a national level NGO and a regional or a state level NGO. Such a system is not only self-sustained but also mutually beneficial to the two organizations as explained earlier. Reasons for the selection of the said NGOs, their structures, recruitment processes, funding sources, and functioning have been covered in remarkable detail as well.

Published by: Kusumitha Shrinivasan, Meenakshi Jaikumar, Dr. Anand Prem RajanResearch Area: Public Relations

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: National, Regional, Impact, Structures, Functioning

Research Paper

253. Design scheme for copyright management system based on digital watermarking and blockchain

In the past, traditional digital copyright protection system based on digital watermarking focused on implementation of watermarking text or image ignored the generation and storage of watermark information. In this paper, a new design scheme of a copyright management system based on digital watermarking and blockchain is proposed which combines digital watermarking, blockchain, perceptual hash function, Quick Response (QR) code, and Inter Planetary File System (IPFS). The blockchain is used to securely store watermark information that implements to provide a timestamp authentication. A perceptual hash function is used to generate a hash value based on the structure information of the watermark image can be confirmed without the original image. A QR code is used to generate a QR image containing image hash and copyright information of the owner. IPFS is used to store and distribute watermarked images without any centralized server and can reduce information-leakage, improves security and transparency of information to facilitate circulation in the network. Here we give BST to check the perceptual hash values to see whether the image is copyrighted or not.

Published by: Orisi Pravallika, K. Soma Sekhar, CH. Seshadri RaoResearch Area: Ieee

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Copyright management, Digital watermarking, Blockchain, DHA, QR code, IPFS, BST

Research Paper

254. Optimization of CNC turning process parameters for surface roughness of AA3003 using ANN Tool on MATLAB

The aim of the present research focuses on the prediction of machining parameters that improve the quality of the surface finish. The surface roughness is one of the important properties of workpiece quality in the CNC turning process. An effective approach of optimization techniques “ANN tool on MATLAB” and Response surface methodology has been implemented.T he factors investigated was spindle speed, feed rate and depth of cut. The parameters that affect the turning operation are vibration, tool wear, surface roughness, etc. Among this surface roughness is an important factor that affects the quality of the manufacturing process. The main objective of this report is to predict the surface roughness on AA 3003, by optimizing the input parameters such as spindle speed, feed rate and depth of cut by using carbide tool. A second order mathematical model is developed using “Taguchi method and optimization of surface roughness using ANN tool on MATLAB for response surface methodology.” The experimental results indicate that the proposed mathematical models suggested could adequately describe the performance indicators within the limits of the factors that are being investigated. The feed rate is the most significant factor that influences the surface roughness and however, there are other factors that provide secondary contributions to the performance indicators. Therefore, this study attempts the application of response surface methodology and “ANN tool on MATLAB” to find the optimal solution of the cutting conditions for giving the minimum value of surface roughness.

Published by: Krishan Kant Sharma, Kanaram Choudhary, Himanshu Prabhakar, Laxmikant Prajapat, Rohan Pradhan, Ravi Choudhary, Vijay Kumar JangidResearch Area: Mechanical Engineering

Organisation: Sri Balaji College of Engineering and Technology, Jaipur, RajasthanKeywords: Optimization CNC Process Parameters, Artificial Neural Network Tool, MATLAB

Research Paper

255. Analysis of speech recognition techniques

This paper focuses on speech recognition techniques such as LPC(linear predictive coding), MFCC(Mel-frequency Cepstral coefficients) with Hidden Markov Models, LPCC(linear predictive Cepstral coding), and RASTA and will compare these techniques to find a most accurate and efficient way to recognize speech. Speech recognition is the process in which program or machine do the identification of words or phrases and convert them to machine-readable format. Additionally, this paper also focuses on NLP(natural language processing) techniques used with the speech recognition process. Once the speech signal is converted to text then NLP is used to understand and generate what has been said. NLU(natural language understanding) and NLG(natural language generation) are two important steps in NLP, through this paper, we will compare and analysis techniques to find out which we can use with speech recognition for effective results. The Objective of this paper is to find out the best technique which is currently used.

Published by: Pranit Gadekar, Mohmmad Hilal Kaldane, Dipesh Pawar, Omkar Jadhav, Anita PatilResearch Area: Artificlal Intelligence

Organisation: Ramrao Adik Institute of Technology, Mumbai, MaharashtraKeywords: LPC, LPCC, MFCC, Hidden Markov model, NLP, NLU, NLG

Research Paper

256. Kinesics of engine assembly line using lean management

This paper explains the use of kinesics and visual management to improve line productivity in engine assembly. We use principles of visual management and lean production together to reduce losses and reduce the time taken to produce one complete engine. Since the assembly is done by hand, humane factors such as vagueness, error, speed and many more affect the productivity. These can be reduced by using signs and symbols which help workers to make the right decision in the shortest time. we will explain in detail how this can be done, and how effective results can be, along with the better organization of the factory floor and better communication without any verbal intervention. This will help increase productivity and reduce losses hereby helping the line to maintain its lean standards.

Published by: Rajesh Kannaa T. J. N., Damian LaffreyResearch Area: Total Quality Business Management

Organisation: Hindustan Institute of Technology and Science, Chennai, Tamil NaduKeywords: Kinesics, Assembly line, Lean management

Others

257. Monitoring healthcare system using IoT

The project looks at the construction of a simple device that will be capable of transferring the data of a patient's vital signs to a remote device wirelessly. The necessity of this project is to alleviate the difficulty that is encountered by medical experts in monitoring multiple patients simultaneously. The project will enable them to observe patients without having to be physically present at their bedside, be it in the hospital or in their home. A patient's body temperature, heart rate, and blood pressure are transferred wirelessly through an agent such as Bluetooth technology and stored in a database using SQL yag. The interface between application and database is web service using NetBeans java servelets

Published by: Chinta Prudhvi Kiran, Mandava Omkar Chowdary, Dr. A. MuruganResearch Area: IoT

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Vital signs, Remote device, Bluetooth technology, SQL yag, Java servelets

Research Paper

258. Eradication of hydraulic anamolies using smart sewer inspection robot

This paper presents a robotic mechanism for detecting and eliminating blockages in sewage pipes. It is a robot that will be used to clean the interior of the pipes using a brushing mechanism. One of the critical areas of the oil and gas industry is the transport of oil and other fluids through a network of pipes. Over time these pipes have accumulated the amount of slug and other deposits; this leads to a decrease in pipeline carrying capacity, reduced reliability, loss of power due to higher pumping pressure required and irregular flow. This will not only clean the interior of the pipe but also be able to send live video feedback to the personnel on the ground depicting the kind of residues found in the pipes. The robot can also be added with additional sensors to relay any other critical information.

Published by: P. KavithaResearch Area: Electronics And Communication Engineering

Organisation: MAM School of Engineering, Siruganur, Tamil NaduKeywords: Sewage, Cleaning, Blockages, Robot, Detection, Rotating. Pipelines

Research Paper

259. Location based reminder application

The aim to develop Location based reminder system provides an interactive user-friendly environment to user's as well as privacy about their saved location and current location. Location-based service, provide many facilities for smart mobile phone users. They can navigate the map, set location while driving. With the using of “Location Based Reminder System” the user can set their task or reminder for a particular location. When the user is near about the location, it will automatically remind for a saved task. Location Based Remind System consumes the low data because in this project the user’s data saved in the local system.

Published by: Babeetha S., Sundar A, Dharshini K, Ajitha GResearch Area: Android Development

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Location based reminder system, LBS, GPS

Review Paper

260. The scope and market of alternative medicine and India’s potential to become a global distributor

The use of alternative medicine and therapies has been on a rise in the last few decades. Herbal medicine has become popular not just in developing countries but in Europe and America as well. India, with it's rich heritage of non-conventional medical treatments and therapies along with it's the natural abundance of flora and fauna can become an international hub for herbal medicine. In this paper, we explore the scope of alternative medicine and analyze the market available for the same both domestic and foreign. We also try to narrow down on significant hurdles which Indian herbal exports face and solutions for the same.

Published by: Pragati Gupta, Anjika ShuklaResearch Area: Global Herbal Market

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Herbal medicine, Market potential, Market share, India, Export

Case Study

261. Affordable eye care services: A case study on Aravind Eye Hospitals

With the goal of giving affordable eye care services to a nation which has around 20 million blind citizens and 80% of it because of curable cataracts, at 58 years old, Dr. V. Begun, the Aravind Eye Hospital. Famously known as the McDonald's of cataract surgery, with a bed quantity of in excess of 4000 beds and serving 0.25 million patients consistently, this is one of the world's biggest eye care frameworks cooking generally to the poor populace. Destitute individuals with cataract can recover their visual perception at a cost as low as $40 or even free, on the off chance that they can't manage. It was exhibited by this non-benefit framework that it is for all intents and purposes conceivable to consolidate high quality, low cost, world scale, and maintainability. It has been viewed as one of a kind plan of action by numerous organizations and has demonstrated that care given at low cost can likewise yield maintainability and even gainfulness. Aravind framework's effective assembling unit, Aurolab, has created 6%-7% of the lowcost focal points worldwide in 2002, which were sold in excess of 100 nations. This Organization has been a wellspring of contextual investigations to national, however International offices too.

Published by: Nripendra Mishra, Anand Prem RajanResearch Area: Social Entrepreneurship

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Case study, Affordable eye care, Aravind Hospitals

Review Paper

262. Automated essay scoring using machine learning

Through this project, we aim to build a linear regression model for automated essay grading. Essays form a huge part of certain college applications and are a part of major competitive exams such as GRE, GMAT etcetera. Manually grading the essays can be extremely time consuming and pressurizing for the instructor. To make these tasks simple, we can train an essay grading program to do the grading automatically. The aim of the grader would be to predict the score of the essay with as much accuracy as possible. The machine assigns scores and should be near the human grader’s score. A dataset of around 2000 essays was used. The essays were graded on the basis of parameters like word count, coherence, number of long words, correct grammar, etc. Feature selection is used to arrive at the most accurate score prediction.

Published by: Aarnav Singh, Daksh PantResearch Area: Computer Science

Organisation: SRM Institute of Science and Technology Chennai, Tamil NaduKeywords: Automated, Essay, Scoring, Linear, Regression, Model, Quadratic, Weighted, Kappa

Review Paper

263. Design and fabrication of automatic and multifunctional pneumatic machine

A pneumatic machine is for sheet metal industry and can be made into multiple machines and should be used as “U” shaped clamp and also circle cutting cum straight cutting machine. This machine is simple to maintain easy to operate. Hence we tried out hands-on Pneumatic Shearing Machine In shearing operation as the punch descends upon the metal, the pressure exerted by the punch first cause the plastic deformation of the metal. Since the clearance between the punch and the die is very small, the plastic deformation takes place in a localized area and the metal adjacent to the cutting edges of the punch and die edges becomes highly stressed, which causes the fracture to start on both sides of the sheet as the deformation progresses. And the working of the pneumatic system depends upon air compressor, which converts mechanical energy into, pressure energy of compressed air. The compressed air should be proposed to move the piston of the pneumatic cylinder. The linear movement of the piston and piston rod can be used to get various mechanical operations like bending, cutting, punching, and hammering etc.

Published by: Jhunjhun Kumar MishraResearch Area: Pneumatic System

Organisation: Sathyabama Institute of Science and Technology, Chennai, Tamil NaduKeywords: Design and modeling of components, Designing components of pneumatic system, Fabrication of pneumatic sheet metal clamp making machine

Research Paper

264. Dynamic double tail comparator proposed having low-voltage low-power using 180nm technology

The necessity for ultra-low-power, high speed, and area efficient analog-to-digital converters is driving toward the use of dynamic regenerative comparators to maximize speed and power regulation. This paper describes the Double Tail Dynamic Comparator designed in 180nm CMOS Technology. The circuit works on very less power supply of 200mV. The power dissipation of the circuit is approx. 160 nW. The slew rate of the circuit is quite high. The design work at the 1 GHz of frequency it is shown that in the proposed dynamic comparator both the power consumption and delay time are significantly reduced.

Published by: Sapna Balayan, Anshu GuptaResearch Area: Electronics And Communication

Organisation: Mody University of Science and Technology, Adawala, RajasthanKeywords: Dynamic clocked comparator, Double-tail comparator, High-speed Analog-to-Digital converters (ADCs), Low-power analog design, Super Source Follower (SSF), Instrumentation Amplifier (IA), Pseudo-Differential Amplifier (PDA)

Research Paper

265. Aquaculture monitoring and control system: An IoT based approach

Internet of things(IoT) is one of the rapidly developing fields for giving social and financial points of interest for rising and creating an economy of the nation. Presently IoT field is flourishing in areas like medical, agriculture, transportation, training, etc. This is of most importance because of aquaculture is a backward region of applied science. contrasted with other zones like agriculture, consequently, it’s essential to determine the issues that are in this area with the assistance of technology. Water quality might be a basic issue, it mainly depends upon numerous parameters like dissolved oxygen, carbonates, turbidity, ammonia, nitrates, salt, pH, temperature, etc. The proposed system continuously monitors the water quality parameter using sensors, the detected information is conveyed to the aqua-farmer mobile via the cloud. accordingly, actions will be taken in time to reduce the losses and improve productivity. Among the issues, the slow latent period within the care of water quality, and therefore the wastage of resources like water, in cultivation are the necessary problems has to be addressed. The proposed system monitor the aquarium and uses the waste water from the aquarium to grow the plants, in turn, the pH and ammonia neutralized water from hydrogen clay pellets in grow bed is fed back to the aquarium.

Published by: Preetham K., Mallikarjun B. C., K. Umesha, Mahesh F. M., Neethan S.Research Area: Aquaculture and Agriculture

Organisation: Siddaganga Institute of Technology, Tumakuru, KarnatakaKeywords: Aquaculture, Machine to Machine (M2M) Connectivity, Round Trip Time (RTT)

Review Paper

266. Raid hailing services guardian system

While cabs have become the new idea of public transport, the increase in cab users has also given way to more crime. In cases of harassment of female passengers traveling alone in cabs in the cities has reported where the victims have been unable to escape due to locked rear doors using Child lock. This feature is indeed dangerous at the time of any disaster or emergency. The paper aims at providing passenger security in public transportation vehicles (/cabs) by providing child lock control to the passenger and also generating reliable driver profile to ensure the safe journey. The Driver profile is cumulative with respect to the passenger feedback and behavioral analysis of driver. The behavior analysis parameters such as alcohol consumption and sudden change in velocity, direction, abrupt brakes, are detected using suitable sensors. The profile would be generated using Cognitive Agents which provides reliability to the system.

Published by: Seema B. Hegde, Vinay Kumar G., Srinidhi Patil, Subrahmanya M.Research Area: Engineering

Organisation: Siddaganga Institute of Technology, Tumakuru, KarnatakaKeywords: Cognitive agent, Child lock, Driver profile, Behaviour analysis, Cumulative performance evaluation

Research Paper

267. Dominating electrons,causes of earth’s magnetic field

The inner core of the earth is made of molten iron due to the extreme heat the electrons have been removed from their higher orbit and ionized. Ionization is the remove (or) escaping of electrons of the atoms from their orbit. The electrons thus ionized rising, flee towards the surface of the earth from south pole to the North pole distinctly paths on the Earth's surface and stirs the electrons in the higher orbit of the atoms of Soiled, Oceans and atmosphere causing a great magnetic field. Those stirred electrons which cause the magnetic field are called Dominating Electrons.

Published by: Einstein KannanResearch Area: Physics

Organisation: Independent ResearcherKeywords: Ionization, Stirred electrons

Others

268. SBT to assess the impact of BDA on customer’s online behaviour

With the rise of social network sites, almost every person has a profile. This profile contains various likes and dislikes about various items. It also contains their valence about other users on the network. In this paper a cloud-based recommendation engine is proposed which provides recommendations about various products given that a user likes a product X taking the balance theory of likes and dislikes over the network. This project can be used to provide personalized recommendations for advertisements or can be used by the user to explore other potential items that he may be interested in.

Published by: D. Madhu, Dr. T. Hanumantha ReddyResearch Area: Data Mining

Organisation: Rao Bahadur Y. Mahabaleswarappa Engineering College, Bellary, KarnatakaKeywords: Structural Balance Theory, Hybrid collaborative filtering, Singular Value Decomposition, Recommendation system

Research Paper

269. Disease detection using image processing

Malaria is a life-threatening disease which is caused by a Plasmodium parasite which is transmitted by infected mosquito’s bite. Similarly, Dengue fever is a very painful mosquito-borne disease caused by the dengue virus. Manual Detection of both of the diseases takes too much time and tropical and sub-tropical areas are experiencing these diseases at the high level and due to detection taking too long an automated system for detection of these diseases has become a need which consumes less time and cost. There are existing techniques for prediction of malaria using neural networks, multi-layer perceptron. Based on the survey in this paper we propose a system for prediction of malaria and dengue using image processing concepts such as segmentation techniques and morphological operations such as flood fill. In many laboratories, the blood cell count is done manually and needs to be done by an expert. This project uses a digital camera which works with a traditional microscope where the camera provides microscopic images to the computer. The proposed hardware is cost-efficient.

Published by: Naresh Mali, Shreya Nalawade, Saurabh Singh, Shweta Babar, Swapnil ShindeResearch Area: Image Processing

Organisation: Ramrao Adik Institute of Technology, Mumbai, MaharashtraKeywords: Malaria, Dengue, Image processing

Research Paper

270. Nap detection and alert system using OpenCV

In recent years driver fatigue is one of the major causes of vehicle accidents in the world. A direct way of measuring driver fatigue is measuring the state of the driver i.e. drowsiness. So it is very important to detect the drowsiness of the driver to save life and property. This project is aimed towards developing a prototype of a drowsiness detection system. This system is a real-time system which captures image continuously and measures the state of the eye according to the specified algorithm and gives a warning if required. Though there are several methods for measuring the drowsiness, this approach is completely non-intrusive which does not affect the driver in any way, hence giving the exact condition of the driver. For detection of drowsiness eye aspect ratio value of the eye is considered. So when the closure of eye exceeds a certain amount then the driver is identified to be sleepy. Corrections for drowsiness include both in and out vehicle alarms and its repetition turns the engine off after giving a signal to the vehicles behind. We are also providing security for the owner i.e., if the vehicle is driven by another person and does any kind of suspicious activities then ,not the actual person but the owner will face problems, in order to avoid the problem for the owner, when the engine starts we automatically capture the image of the driver along with date and time without knowledge of the driver. Then he can easily identify the person who is driving and the owner will be saved.

Published by: Bapathu Ramakrishna Reddy, Bitragunta Lakshmi Durga Pratyusha, Chakicherla Bala Sai Vagdevi, Annapureddy Venkata Ajaya Kumar Reddy, Ajay Rahul HariResearch Area: Transportation

Organisation: NRI Institute of Technology, Vijayawada, Andhra PradeshKeywords: Face Detection, Locating Eyes, Eye-Aspect Ratio, Security, Drowsiness

Review Paper

271. Development of a cabin crew utility application (JEDZENIE)

This project is based on advanced computer software named as “JEDZENIE” provided in the aircraft for user-friendly customer care and crew management. The project will be used as advanced software installed in passenger seat utility screen. This software will be handled by airline crew members. This software includes the home page, login page & admin page. The passenger login with his/her seat no. & select the food that needed & proceed. The time when he/she order the food, the information is passed to the screen that is placed in the front of the cabin crew. So the project helps to reduce the work of cabin crews and easily access to passengers regarding food & other services. This will help to take the function into more advances in this generation and also for upcoming advanced passengers. This project is more useful in the case of physically/mentally challenged customers

Published by: M. R. Ranjith, Vignesh V. NairResearch Area: Aviation

Organisation: Regional Institute of Science and Management, Thiruvananthapuram, KeralaKeywords: Aircraft, Cabin crew, Passenger, Food order

Research Paper

272. An exploration of the indian women writers

This work is to analyze the progress of Indian women in the field of writing right from the creation and sense the glitches faced by them. The themes of sexuality and man-woman relationship from the origin till the contemporary authors are discussed which became the theme of writing this paper. But they are found not merely as the raw material and each has engrossed various angles and given inimitable solutions. Their versatile treatment of women's issues reveals their sensitive nature as a woman writer, and this quality affirms their works as an outstanding contribution to Indian literature in English proving their uniqueness.

Published by: Dr. S. Bharathi, G. VadivelmuruganResearch Area: English

Organisation: IFET College of Engineering, Villupuram, Tamil NaduKeywords: Sufferings, Emotion, Relationship, Problems

Research Paper

273. Altered particle swarm optimization based attribute selection strategy with improved fuzzy Artificial Neural Network classifier for coronary artery heart disease risk prediction

The application of soft computing in decision support system in disease prediction is one of the emerging interdisciplinary research areas in the field of computer science. Machine learning algorithms plays an important role in risk prediction of diseases. Attribute selection among the dataset is the key factor that influences prediction accuracy. Mathew’s correlation coefficient performance metric is also taken into account. Particle swarm optimization algorithm is altered and applied for performing attribute selection. Improved fuzzy artificial neural network classifier performs the prediction task.

Published by: B. Narasimhan, Dr. A. MalathiResearch Area: Computer Science

Organisation: Government Arts College, Coimbatore, Tamil NaduKeywords: Soft computing, Attribute selection, Feature selection, Artificial Neural Network, Classification, Mathew’s correlation coefficient, Particle swarm optimization

Research Paper

274. D2D Smart Billing System

“D2D (Day to Day) Smart Billing System” is developed that abets a person in everyday shopping in malls involving some automation in customarily practiced process. Malls and supermarkets are self-service shops offering a wide variety of food and household products. This system helps the customer in everyday shopping by minimizing the time required and increase the shop productivity. The main objective is to provide a robust techno-savvy trolley with low-cost, high efficiency and easily adaptable system. Each techno-trolley is set up with a Raspberry Pi that is a unique identification device for that trolley. The camera scanner on the trolley will scan the purchased product and display it on LCD that is interfaced to the raspberry pi. The web-based application for trolleys and mobile-based application for baskets are designed to minimize the waiting time in “Queue” at the billing counters. At the billing counter, the confirmation of the total bill is done and the same is forwarded to the admin.

Published by: Pushkar P. Saraf, Arati D. Khanolkar, Akshada S. Pawar, Uddhav B. Ghodake, Snehal J. Salokhe, Dr. G. A. PatilResearch Area: Computer Science and Engineering

Organisation: D. Y. Patil College of Engineering and Technology, Kolhapur, MaharashtraKeywords: Raspberry Pi, LCD, hybrid mobile app, web app, productivity, time, supermarket, malls, QR, Barcode, scanner

Research Paper

275. Load rebalancing for distributed file systems in clouds

The key building blocks for cloud computing applications are Distributed File Systems which are based on the Map Reduce programming paradigm. Nodes simultaneously serve computing and storage functions In such file systems. A file is partitioned into a number of chunks allocated in distinct nodes in order so, over the nodes, MapReduce tasks can be performed in parallel. However, failure is the norm in a cloud computing environment. In the system, nodes may be either upgraded, or replaced, or added. Files can also be dynamically created, or deleted, and appended. Our algorithm is compared against a centralized approach in a production system and a competing distributed solution presented in the literature. The results indicate that our proposal is comparable with the existing centralized approach. It also considerably outperforms the prior distributed algorithm in terms of load imbalance factor, movement cost, and algorithmic overhead.

Published by: Harsh Vardhan Pawar, Aditya Sinha, Richa Sharma, S. BabeethaResearch Area: Cloud Computing

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Chunk, DHT, MapReduce

Review Paper

276. Old age people problem’s and their importance in everyone’s life

The old people population is huge and becoming issue day by day because of human health issues. These individuals are challenged with various physical, mental and social changes that challenge their feeling of self and ability to live joyfully. Numerous individuals experience isolations and sorrow in seniority, either because of living alone or because of the absence of close family ties and diminished associations with their way of life of the source, which results in a failure to effectively take an interest in the public works. With progressing age, it is unavoidable that individuals lose association with their companionship systems and that they th ink that it is progressively hard to start new bonds and to have a place with new systems. The present examination was led to explore the connections among dejection, depression and friendliness in older individuals.

Published by: Anjali Kumari, Tanvi Nagrale, Tripti Pragyan Mohapatra, Anand Prem RajanResearch Area: Social Development

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Old age people issues, Importance, old age homes

Research Paper

277. Designing homes for senior citizens

From the designer's perspective, we ideally look to answer several considerations catering to the end user needs. It is always challenging to design concerning specific age groups where we tend to respond beyond the design standards as such. This paper will help you to comprehend that there is a list of things you ought to keep in mind while designing homes for elderly people.

Published by: Adarsh Manoj SamaniResearch Area: Construction Management

Organisation: MIT College of Management, Pune, MaharashtraKeywords: Senior citizen home, Designing, Designer's perspective, Design standards

Research Paper

278. MAAK – A smart security device for women and children’s safety

In Today’s world, many women and children are abused on a regular basis. BBC (British Broadcasting Corporation) says that about four children are being physically or sexually abused every hour and India is said to be the most dangerous country for women. Hence, Our objective is to develop a device using sensors that get activated if women or children get in a dangerous environment and sends an emergency signal via Short Message Service (SMS) to the programmed contacts which reveal the location using Global Positioning System (GPS). In addition to that, it also reveals the nearest Police station for the user

Published by: Madhav, R. Ambrish, J. Karthick, G. Raghav, Mythili ShankarResearch Area: Information Technology

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: GPS, Sensors, IoT, Android Application, Package-SMS

Research Paper

279. Development and evaluation of polyherbal foot care cream

Feet are an important organ of the human body but are often neglect. Feet need to be taken care for comfort, beautification, and protection from various microorganisms. The object of the present work is to formulate and develop foot care cream with polyherbal ingredients having various activities like healing and antimicrobial. The various herbs have been reported to having antimicrobial activities are to be selected, aqueous and ethanolic extract of it has been incorporated in foot care cream and was evaluated for its activities. It has been concluded that the product has been good foot care property.

Published by: Ashitosh Chandrakant Edake, Aditya Vishnu Deokar, Onkar A. Dindore, Rajkumar B. Dhule, Pooja Dhavne, Kirti DhanakeResearch Area: Pharmacy

Organisation: D. S. T. S. Mandal's College of Pharmacy, Solapur, MaharashtraKeywords: Foot care, Polyherbal cream, Aqueous extract, Ethanolic extract, Antimicrobial

Research Paper

280. Implementation of TTL based packet marking for IPV4

There are more chances nowadays for a network to be attacked The common attacks are DoS and DDoS attacks. They are mainly responsible for causing disturbances for the network. There are so many mechanisms in preventing these attacks like packet marking. This packet marking is mainly used to find the source of an attack. While solving this process, the main problem is to minimize the number of IP packets used in the tracing of the attacks. The number of packets that are beginning from the individual sources is not adequate to trace back the aggressors and consequently, a proficient bundle checking plan is required in this unique circumstance. This paper focusses on finding the source of the attack using the less number of hops counts. For implementing this project we are mainly using NS2 and prove that it is more efficient than existing algorithms of finding the attacker.

Published by: Kolipakula Yuvanaga Venkata Manishankar, Samayamanthula Navyasainarayana Datta, D. Nagasai Shanmuka Sreenivas, K. ManikandanResearch Area: Computer Science Engineering

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Denial of Service (DoS), Distributed Denial of Service (DDoS), Probabilistic Packet Marking (PPM), Deterministic Packet Marking (DPM)

Research Paper

281. Buck boost flyback converter to fed LED’s

Street lighting, which is one of the major factors in energy waste and light pollution at nights. To meet this challenge, Light Emitting Diodes (LED) are adopted due to low power consumption and less maintenance compared to conventional lights. In led street lights capacitance and Total Harmonic Distortion (THD) is more. These can be reduced by injecting the additional current into the multiplier input by using the buck-boost flyback converter. Using this converter also leads to an increase in the lifetime of LEDs.

Published by: K. Sarath Bhushan, T. Mahesh, Y. Suresh, M. Divya JyothiResearch Area: Power Electronics

Organisation: KKR and KSR Institute of Technology and Sciences, Guntur, Andhra PradeshKeywords: Integrated converters, Power LEDs, Long lifetime converters, Street lighting

Review Paper

282. A literary review of MANET security

Mobile ad-hoc network is a wireless network that can be formed without any pre-existing infrastructure. MANET consist of both that is the legalized node and the malicious node and every node within the network acts as a router to relay packets to the destination. In this paper, current security threats and the various attacks in the MANET are investigated and various attacks such as active attack, passive attack, external attack, and internal attack.

Published by: Nitika Sharma, Dr. Rashmi PopliResearch Area: MANET Security

Organisation: J. C. Bose University of Science and Technology, YMCA, Faridabad, HaryanaKeywords: MANET, Security, Attacks, Ad-Hoc Network

Research Paper

283. Intelligent helmet for bike safety

A clever helmet protected built-in electronics offering safety and convenience features. Helmet points include a global finding system. The helmet is conscious of the user's location and interactions with the environment. The helmet can furnish records to a user, screen the user's actions and condition, and send records to others about user's place and condition. Biker’s protection is incredibly comprised if they don’t wear a helmet which is a nicely recognized fact. But then also humans keep away from carrying a helmet. Besides each time accident occurs, humans are reluctant to help a victim and the time lengthen in attaining of an ambulance can decrease existence saving possibilities of the victim. Many a times mother and father are additionally involved and don’t comprehend of where about of son. Even if our bike is stolen then probabilities of getting it lower back are also slim. For all the above problems, we motive a totally new applied sciences solution, where a circuit working is reader will be installed internal the bike. When this reader will feel the RF Id signal from helmet transmit sign only if the helmet is positioned on the head due to the fact of which a hidden swap gets activated and helmet transmits the RF signal.

Published by: Sanket Patil, Raju Kavaldhari Yadav, Mudra DoshiResearch Area: Bike Safety

Organisation: Universal College of Engineering, Mumbai, MaharashtraKeywords: Intelligent helmet for bike safety, IR sensor, Alcohol sensor, LCD, Buzzer

Research Paper

284. Optimizing the level of pressmud compost for bhendi

A field experiment was conducted in a sandy clay loam soil with bhendi as the test crop (cv. Arka Anamika) in Sivapuri village, Chidambaram Taluk, Cuddalore district, Tamil Nadu. to study the effect of pressmud compost on plant growth, yield attributes, yield and nutrient uptake by bhendi. The presumed compost was applied @ 5, 7.5, 10, 12.5, 15, 17.5 and 20 t ha-1 as a basal dose. All the experimental plots received a common fertilizer schedule of 100:60:50 kg NPK ha-1 (RDF). The results of the experiment clearly revealed that application of pressmud compost had a significant influence on growth, yield, and uptake of nutrients. Increasing levels of pressmud compost gradually increased the growth attributes. The significantly maximum value was recorded with the application of 15 tonnes of pressmud compost ha-1. Thereafter, there was no significant improvement. A similar trend was observed in the yield attributes and yield of bhendi. Regarding nitrogen, phosphorus and sulphur uptake by plant and fruit, significantly higher values were recorded with 15 tonnes pressmud compost. However, the subsequent increase in pressmud compost application failed to attain the level of statistical significance.

Published by: K. N. N. Arvindh Ramnathan, Dr. P. Poonkodi, Dr. A. AngayarkanniResearch Area: In Sivapuri Chidambaram

Organisation: Annamalai University, Chidambaram, Tamil NaduKeywords: Bhendi, Pressmud compost, Nutrient uptake, N, P and S

Review Paper

285. A novel approach for active safety system

In this modern day automotive world, the occurrence of accidents is much more due to several factors. This can be avoided when the driver is alert. So a system has to be developed which gives the driver the information about the nearby vehicles whether it is a danger, no danger, potential danger. This paper presents you how to classify the vehicles in its ROI and categorize their stage of danger. Specifically, stereo cameras and Millimeter Wave (MMW)-radar are fused to help the driving ego-vehicle. Cameras are used to identify near lateral dynamic objects and MMW radar to detect far longitudinal objects. This process is simulated using python using CV2 library, numpy library.

Published by: Devaharsha Meesarapu, V. V. Sai Rama Datta, G. Sai Krishna ChaitanyaResearch Area: Automotive

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Camera, MMW-Radar, Python, OpenCV

Review Paper

286. Geofencing for disaster information system

Due to the lack of effective and coordinated disaster management system which consists of the stages like disaster mitigation, preparedness, response, and recovery has led to both the increase in the loss of both life and property. The paper proposes an effective disaster information system which uses the geofencing technique so as to detect the movement of users. This technique creates a geofence around the user and thus monitors the user’s entry and exit from the fence. This model uses a K-Nearest Neighbour (KNN) algorithm along with real-time data collected from smartphones. For crowd disaster mitigation and real-time alert to avoid an occurrence of a stampede, this android application is an easily deployable context-awareness mobile Android Application Package. The application provides high accuracy when the user is in the fence.

Published by: Diksha Kewat, Vaishnavi Tonpe, Kiran Baxani, Dr. Sanjay SharmaResearch Area: Computer Science

Organisation: New Horizon Institute of Technology and Management, Thane, MaharashtraKeywords: Geofencing, KNN, Disaster management, Google API

Research Paper

287. An energy efficient approach for data aggregation in wireless sensor networks based on sink mobility

A network that does not include any central controller and allows nodes to enter or leave the network at any time is known as a wireless sensor network. There are very small sized nodes deployed in these networks in large areas. The energy consumption of the nodes in these networks is a major concern since it directly affects the lifetime of the network. These dead node cause several problems. To enhance the network lifetime mobile sink is introduced which improve network performance. But mobile also leads to another challenge such as mobile sink scheduling and (re)routing. The complete network is divided into fixed size clusters and based on the energy and distance, cluster heads are chosen from the clusters. The remaining nodes of the cluster are considered to be individual. Several clustering algorithms have been designed by researchers which can be broadly categorized based on the manner in which clusters are formed and the kinds of parameters included during the selection of cluster heads. This research focuses on aggregating the data from cluster heads by deploying multiple mobile sinks. The bee colony algorithm is used to make the base station mobile. The simulation of the proposed technique is performed in MATLAB and results are analyzed in terms of various parameters.

Published by: Baljinder Singh, Amit Verma, Manit Kapoor, Dr. Naveen DhillonResearch Area: Wireless Sensor Network

Organisation: Ramgarhia Institute of Engineering and Technology, Phagwara, PunjabKeywords: WSN, Mobile sink, Energy efficient

Review Paper

288. The future of food preservation: Nanotechnology

Nanotechnology has been used to treat illnesses for a long time. It has been successfully employed as a means of drug discovery. However, it's used in food preservation is yet to become commonplace. Through this review paper, the authors wish to throw light on the application of nanoparticles in the preservation of food, to improve food color, texture as well as flavor. We also explore the use of nanotechnology in the encapsulation of the foodstuffs as a means of preservation. The article includes details about the usage of nanoparticles in the nutraceutical industry as well as its usefulness as a nanosensor. The purpose of the paper is to make use of nanotechnology in the food industry a well-known application of nanoparticles. It will be useful for professionals working in the food industry or entrepreneurs who wish to venture into the field of food preservation. Scientists may use the information and data provided in the paper to further their research.

Published by: Pragati Gupta, Anjika Shukla, Ujjawal Sharan, Anand Prem RajanResearch Area: Food Nanotechnology

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Nanotechnology, Food, Preservation, Ingredients, Biosensors

Research Paper

289. Prediction of Pneumonia using deep learning

The project is to classify pneumonia by processing the image of chest X-ray using diverse deep learning algorithms. For classification purpose, we have to develop an algorithm which can most accurately predict on a validation set of chest X-rays. Deep learning is very helpful in automatically discovering chest diseases at the experts level, providing the two Liberian radiologists with some respite and used for saving countless lives potentially worldwide. The problem is solved using Convolution neural networks[9]. Convoluted neural networks are used to classify where each neuron is tightly connected to other neurons. Inception network was used in the development of CNN classifiers. Inception network was heavily engineered. It used a lot of tricks to improve performance in terms of speed and accuracy. With much more robust and large dataset our project can intervene in all domains.

Published by: A. Raghavendra Reddy, G. Sai Ravi Teja, D. Sai Tej, P. Vinod BabuResearch Area: Deep Learning

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Pneumonia, Deep learning, Classification, InceptionV3, Convolution neural networks, Prediction, Django

Review Paper

290. Enhanced fingerprint recognition and OTP to improve ATM Security

In the previous few years’ robberies of ATM is increasing and becoming a problem for Banks. In the current system, we operating ATM using a PIN number which can be stolen or guessed and can be hacked during the transaction. That raises a question on the present security and demands something new in the system which can provide the second level of security. So for that in this paper, there is added some extra security to the current ATM Systems. We use the fingerprint system and One Time Password (OTP) which is sent to the user registration mobile number through GSM Module system. After that, the user will be able to complete the transaction securely. The working of this ATM machine is when the customer places his finger on the fingerprint module when access it automatically generates different 4-digit code as a message every time to the mobile of the authorized customer through GSM modem which is connected to the microcontroller [1]. The code received by the customer should be entered by pressing the keys on the keypad provided. This proposal will go a long way to resolve the problem of bank account safety and transaction.

Published by: Shivam Kumar Rajput, Aniket R. Patne, Amit Varma, Girish VisheResearch Area: Electronics Engineering

Organisation: K.C. College of Engineering and Management Studies and Research, Thane, MaharashtraKeywords: ATM, OTP, Biometric, Security, Fingerprint, GSM

Research Paper

291. Mitigation of voltage sag/swell using dynamic voltage restorer

In this paper complete design procedure of the DVR is described. Among the power quality problems sag/swell are occur both on the transmission and distribution side. These power quality problems are solve by the DVR. DVR is the series connected device to compensate the voltage sags and swells on the distribution side. Here the detection of voltage sag and swell is carried out by the SRF theory, where as the control of the voltage injected by DVR is done by the SPWM technique. IGBT based full bridge voltage source inverter fed by the constant DC voltage source is used to convert the DC voltage to AC voltage at desired voltage and desired frequency.

Published by: Kalpeshkumar Babubhai PatelResearch Area: Electrical

Organisation: Mahatma Gandhi Institute of Technical Education and Research Center, Ethan, GujaratKeywords: Dynamic voltage restorer, Voltage sag, Voltage swell, PLL, SRF theory, SPWM.

Research Paper

292. Correlation between shoulder performance and scapular muscle strength among college students

Shoulder girdle motion is complex and involves a synchronous movement of the scapula and humerus. The scapula serves as the platform for humeral motion. Shoulder injuries are common in the course of the student population. A decrease in shoulder strength plays an important role in the decrease in scapular muscle strength. The hand does not function as an independent factor, but it also depends on the proximal joint stability. Therefore the focus of the study is to correlate shoulder performance and scapular muscle strength among college students. 55 college students with the age group of 18-25 years, both male and female were analyzed. Shoulder performance was assessed by using Closed Kinetic Chain Upper Extremity Stability Test (CKCUEST) and scapular muscle strength was assessed by using push-pull dynamometer. Statistical analysis was done by using Karl Pearson’s correlation coefficient test with p<0.05. There was a statistically significant correlation between shoulder performance and scapular muscle strength among college students.

Published by: Priya S., Abhilash P. V., Sujina K.Research Area: Physiotherapy

Organisation: Laxmi Memorial College of Physiotherapy, Mangalore, KarnatakaKeywords: Shoulder performance, Scapular muscle strength, Closed Kinetic Chain Upper Extremity Stability Test, College students

Research Paper

293. Analysing current online health services and proposing a model for health consultancy for baby care

In this paper, we are going to analyse the current online health services provided by the government and our major focus will be in the field of baby healthcare. Baby care is one of the toughest jobs in life. Caring for a newborn in itself is a challenge. There are various things which need to be kept in mind for the good health of the baby. Our idea is to propose a model of “health consultancy for Baby Care”. The model is an online medical consultancy service which will keep the parents of the newborn baby well informed about the various aspects which should be kept in mind during the baby care. Baby health is a very important aspect when it comes to a healthy society. A healthy baby in the initial stages of life is essential because this will make the baby grow into a healthy human being in the future. So this proposal is an effort from us to enlighten the people with some important techniques which can be helpful for them to take care of their babies.

Published by: Suyash Gupta, Akash Deep Saha, Anand Prem RajanResearch Area: Social Sciences, Social Entrepreneurship

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Healthcare, Online health consultancy, Baby care

Research Paper

294. Motion and Bluetooth controlled office automation cum power saver

The Motion & Bluetooth Controlled Office Automation Cum Power Saver, where the lights in the room will automatically turn on upon detecting a human motion and stay turned on until the person has left the room or there is no motion. Initially, when there is no human movement, the PIR Sensor does not detect any person and its OUT pin stays LOW. When the person enters the room, the change in infrared radiation in the room is detected by the PIR Sensor. The output of the PIR Sensor becomes HIGH. Since the Data OUT of the Sensor is connected to Digital Pin 8 of Arduino, whenever it becomes HIGH, Arduino will activate the relay by making the relay pin LOW as the relay module is an active LOW module. This will turn the Light ON. The light stays turned ON as long as there is movement in front of the sensor. If the person takes a nap or leaves the room, the IR Radiation will become stable (there will be no change) and hence, the Data OUT of the PIR Sensor will become LOW. This, in turn, will make the Arduino turn OFF the relay (make the relay pin HIGH) and the room light will be turned OFF. Along with Motion controlled this system will have control in users hand on Android mobile; the user can turn ON/OFF Load in a single click. The Android application will help the user to monitor the current status of Motion Sensor as well as to update new Delay Time to keep the load on even there is no Motion. By using the Android application it will be possible for the user to say after what time the system will shut down the load. The system will start buzzing if time to Shut Down the load is less than 30 Sec.

Published by: Sagar W. Warade, Sagar V. Kharche, Swapnil V. Phirke, Amit S. Wale, Umesh S. Khachane, Amarjeet R. RamResearch Area: Electrical

Organisation: Padm Dr. VB Kolte College of Engineering, Buldhana, MaharashtraKeywords: PIR sensor, 8 pin Arduino, Bluetooth module, Buzzer

Research Paper

295. Module for DYSPRAXIA

In India 6 to 10 % of the population is affected by dyspraxia with 2% are severely affected by dyspraxia. It is defined as the Developmental Coordination Disorder (DCD) of the brain in childhood causing difficulty in activities requiring coordination and movements. Developmental coordination disorder may occur alone or with other developmental disorder such as DYSLEXIA, Attention /Hyperactivity Disorder (ADHT). It usually continues to adulthoods. The main objective of this module is to improve the child's disability. To support individual and families affected by DCD and to help perfection in health and educate to assist that dyspraxia/DCD. The further most important objective is to educate teachers and school-based therapists to increase the awareness and understanding of DYSPRAXIA. The major aim of the project is to improve the child’s gross motor movements. To increase the mental confidence of dyspraxia patients. To identify great scientist to the world with this disorder. Better living conditions and more hope in the life of people with DYSPRAXIA. And to create awareness about DYSPRAXIA in future and Mainly to save many people’s life.

Published by: Joel Andrews, Joseph A., Dr. V. Thulasi BaiResearch Area: Dyspraxia

Organisation: KCG College of Technology, Chennai, Tamil NaduKeywords: DYSPRAXIA, Movement disorder, Difficulty in running, Walking, Stairs, Neurological problem, Coordination difficulty

Research Paper

296. Coal mine safety system using Li-Fi technology

In this project, we tend to propose a mine safety system that utilizes visible radiation communication technology which that emitting diode lights and a geomagnetic correction technique, which direct towards supporting mine operating people who travel underground. To verify the effectiveness of this system, we conducted an experiment targeting mining people. Although getting correct gas run data and police work voices inside are tough, we confirmed that using this system, accurate voice information, and gas detection can be obtained utilizing Visible Light communication technology which employs LED lights. In this project we are using Visible Light Communication (VLC) system based on white LEDs has emerged as an eco-friendly IT green technology using THz visible light spectrum in the provision of both lighting and wireless access.

Published by: Kolli Pardha Sri Sai Vignesh Naidu, P. Visalakshi, P. Chervith ChowdaryResearch Area: Smart Communication Society

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: VLC-Visible Light Communication, LED-Light Emitting Diode.

Research Paper

297. A study to assess the knowledge and attitude of secondary school teachers regarding first aid management of selected emergencies among school children, at selected secondary schools at Ghataprabha, in view to prepare information booklet

"There is nothing more precious to a parent than a child and nothing more important to our future than the safety of our children.” Bill Clinton. First aid and emergency care should be provided by the teachers in situations like accidents, vomiting, convulsions, injuries, etc. A teacher should have adequate training regarding first aid and emergency measures since teachers act as a pivot in the school health services. The objectives of the study were 1. To assess the knowledge of secondary school teachers related to First aid management of secondary school children, in selected emergencies. 2. To identify the attitude of secondary school teachers regarding selected emergencies and First aid management, in secondary school children. 3. To find the association between knowledge and of secondary school teachers with selected demographic variables. 4. To find out the correlation between knowledge and attitude of secondary school teachers regarding selected emergencies and First aid management, in secondary school children. 5. To prepare an Information booklet based on selected First aid emergencies management for secondary school teachers. Methods A descriptive approach with descriptive correlation design was used for 50 secondary school teachers drawn through purposive sampling technique in a selected high school at Ghataprabha. The conceptual framework for the study was developed from Orem’s self-care theory. Incorporated with a modified model. The hypotheses formulated were that there will be an association between knowledge and selected demographic variables. The content validity and reliability of the tools were established. The pilot study was conducted using a structured knowledge questionnaire and Likert five-point scale. Each participant observation of the attitudes of teachers with the help of five-point Likert scale, a questionnaire was administered which was collected on the same day. An average of 4-5 observation was done per day following which the knowledge questionnaire was administered to the participant. The collected data were analyzed using descriptive and inferential statistics. The study findings revealed that Majority (48 %) of teachers had poor knowledge & (36%) of teachers had average knowledge & only (16 %) teachers had good knowledge. Age is associated with the level of knowledge of school teachers (2 = 14.92 P>0.05.) & Experience is associated with the level of knowledge of school teachers (2 = 12.99 P>0.05). It was also found that there is a positive correlation between knowledge & attitude of school teachers regarding first aid management of emergencies. The ‘r’ value computed was 0.72. Interpretation And Conclusion Majority (48 %) of teachers had poor knowledge of first & emergency management of selected emergencies.& (36%) of teachers had average knowledge & only (16 %) teachers had good knowledge. Majority of 15 female respondents have poor knowledge of First aid management of selected emergencies; whereas 9 Male has poor knowledge of first aid management. Only Six Male & two female have good knowledge. Age is associated with the level of knowledge of school teachers (2 = 14.92 P>0.05.) & Experience is associated with the level of knowledge of school teachers (2 = 12.99 P>0.05).

Published by: Grace Chetan GaikwadResearch Area: Nursing

Organisation: Yashwant Nursing Institute, Kolhapur, MaharashtraKeywords: First aid management, Emergencies, Knowledge, Attitude, Secondary school teachers

Research Paper

298. Estimation of chlorophyll content in young and adult leaves of some selected plants in polluted areas

In the present study chlorophyll a (Chl. a) and b (Chl. b) content of ten different plants have been recorded. The qualitative difference of chlorophyll a (Chl.a) and b (Chl.b) content between young and adult leaves were observed. A total of ten plant species were selected namely Mango (Magnifera indica L.), Hibiscus (Hibiscus rosa-sinensis L.), Neem (Azadiracta indica Juss), Ashoka (Polyalthia longifolia (sonner)Thw, Enum), Ficus (Ficus benghalensis L.) andNerium indicum Mill. Gard Datura stramonium L, Acacia nilotica(L) Willd .ex Del.ssp.indica (Benth)Brenan. and Bogainvillea spectabilisWilld, Ficus religiosa L.were used for analysis of chlorophyll content. In all the cases the adult leaves showed higher chlorophyll content in comparison to young leaves. This has been proved that the age of leaves was an important factor for chlorophyll content.

Published by: Jayashri Mulay, Samrudhi KokateResearch Area: Botany

Organisation: New Arts, Commerce and Science College, Ahmednagar, MaharashtraKeywords: Young and Adult leaves, Chlorophyll a and b

Review Paper

299. Chatbot generation and integration: A review

In the modern era of technology, chatbot is the next big thing in the domain of conversational services. A chatbot is a virtual person who can effectively talk to any human being using interactive textual as well as verbal skills. There are many statistics available which suggest that integration of chatbot in any business as a part of their customer service increases the business progress and customer satisfaction exponentially. Hence it becomes crucial to understand the crux of the chatbot technology. Owing to extensive research in this field, there are numerous methodologies available to create a conversational entity. It becomes quite confusing to decide a perfect method to generate conversational agent for the desired purpose. Also, generation of chatbot is one issue and successful integration is in itself another problem which is many times overlooked. This paper provides some valuable insights on how to generate as well as how to integrate a chatbot.

Published by: Aarsh Trivedi, Vatsal Gor, Zalak ThakkarResearch Area: Computer Science, Software Engineering

Organisation: Parul University, Vadodara, GujaratKeywords: Chatbot, AIML, ChatScript, REST API, Human computer interaction

Research Paper

300. Intelligent automatic traffic control using IoT

With an outsized population and enormous quantity of vehicles, there's conjointly a giant hassle of automotive accidents or road accidents, and with these overcrowded roads, there's a problem of delay in first aid service. To overcome this delay in first aid service, our project gives a solution that is “Intelligent Automatic Traffic Control with Ambulance Using IoT” which includes alerting and tracking mechanism with automatic traffic light controlling system such that the ambulance can achieve a freeway in order to provide the first aid to the patient as fast as possible. To monitor the traffic level, we use IR sensors. The level of the traffic is updated in the server page using IoT. The RF Transmitter and receiver is used to detect the ambulance arrival. The traffic signal is controlled automatically.

Published by: S. Giridhar Manikanta, G. Malar Selvi, K. Surya Narayana RajuResearch Area: Smart Communication Society

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: RF Module, Arduino Uno, IR Sensor,Alarm, IoT

Research Paper

301. Design and development of web portal for IT service management

Through analyzing the IT service management framework and associated processes of Organization, this paper establishes various indicators of IT service management process. The weights of each measure are calculated with a logical hierarchy process (AHP), and the evaluation was executed in the Organization. And the suggestions are proposed with the meditation of both the evaluation results and the real position of Organization’s IT service management. The case is extremely considered in the views of IT service management objectives and misunderstandings, customer fulfillment model of IT service management, knowledge supporting formation of IT service management. It is terminate that if the organization wishes to successfully contraption IT service management’s customer satisfaction model, it should eliminate the misunderstandings of IT service objectives first, while the advocacy of knowledge supporting structure of IT service management can play a number of effects.

Published by: Mukunda Vijay Dahake, Mahesh Arun Pandit, Minal Nago Rane, Komal Sanjay SharmaResearch Area: Computer Science And Engineering

Organisation: Padm Dr. VB Kolte College of Engineering and Polytechnic, Malkapur, Buldana, MaharashtraKeywords: Management, Process, Application, Development, Documents, Web

Research Paper

302. Face recognition based door unlocking system using Raspberry Pi

Today we are facing security issues in every aspect. So we have to resolve these issues by using updated technology. In this project, we are using the Face recognition module to capture human images and to compare with stored database images. If it matches with the authorized user then the system will unlock the door by an electromagnetic lock. The need for facial recognition system that is fast and accurate that continuously increasing which can detect intruders and restricts all unauthorized users from highly secured areas and aids in minimizing human error. Face recognition is one of the most Secured System than biometric pattern recognition technique which is used in a large spectrum of applications. The time and accuracy factor is considered about the major problem which specifies the performance of automatic face recognition in real-time environments. Various solutions have been proposed using multicore systems. By considering the present challenge, this provides the complete architectural design and proposes an analysis for a real-time face recognition system with LBPH Algorithm. In this algorithm, it converts the image from color to greyscale image and divides into pixels and it will be allocated in a matrix form and those images will be stored in the database. If an image is detected then microcontroller will send power to the motor driver unit then the electromagnetic lock will unlock the door and it will lock again when there is no power supply to that unit. Finally, this paper concludes for the advanced implementations achieved by integrating embedded system models against the convention.

Published by: Thulluri Krishna Vamsi, Kanchana Charan Sai, Vijayalakshmi M.Research Area: Security

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Face recognition, Local binary histograms, Keypad password, Electromagnetic lock

Research Paper

303. IoT based ATM monitoring using cloud data with sensors

In this system, we are using sensors like IR sensor, LDR sensor, Temperature sensor, smoke sensor, and the vibration sensor. The IR Sensor is used to monitoring the person IN/OUT in the ATM room. If more than 2 person enters the ATM, then it gives an alert to the user. LDR sensor is used to monitor the light intensity inside the ATM room. If the LDR output values are lower than the threshold value, then the ATM room light will automatically switch ON. Temperature Sensor is used if the temperature inside the ATM room goes below the specified limit, then the AC can be switched off, thus we can have a power saving. Smoke Sensor is to monitor the smoke level in the ATM room. If the smoke sensor value crosses the threshold value, the buzzer will get ON automatically. The Vibrator Sensors used to monitor the ATM when try to break. This will lock the door and send the message to the police station. The whole system relates to the IoT. So the user can monitor the ATM (like temperature level, Smoke) from anywhere and also can control the loads (Like AC, light, door) from the long distance

Published by: P. Visalakshi, D. V. Sai Teja, K. Muni KiranResearch Area: Smart Communication Society

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: IR-Infrared, LDR-Light Dependent Resistor, ATM-Automated Teller Machine, IoT-Internet of Things

Research Paper

304. Detection of spoofing attacks in network over IP calling

Detection of call is one of the key process this generation for customers to look over and find the details and information of the caller. It is easy to identify a caller by the method of caller detection. But the calls that come from an IP based computer system through a scheme of VoIP it is difficult to find or detect a call where mostly attackers use this kind of technique. This caller detection process is also used by many banks in order to take the confirmation of the customer. This detection can be done by using a smartphone by installing an appropriate application in the mobile or by using service providers that offer caller ID spoofing. The upgrade of old hardware is very costly, and there is no mechanism available to end users where there is no storage of information and it also very difficult to locate the physical location of the attacker. The main drawback is that it is more complex when it is considered in the real world. In this article, we consider an appropriate solution named as Passive IP Trace-back to overcome the challenges in deployment in caller id detection. PIT is a kind of technique where we can find out the history of the attacker through which we can consider that a specific person is trying to attack the victim. PIT exploits the path back-scatter messages to find the location of the attacker. The scheme of PIT is used as an efficient software for computers to validate their effectiveness in the detection of spoofing attacks.

Published by: Vijay Ankamma Reddy Male, Hruthik, P Renuka DeviResearch Area: Security And Trust Computing

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Network, Exploits, Spoofing, PIT, VOIP, Challenges.

Research Paper

305. Moringa oleifera as a natural coagulant

The powder obtained from the seeds of the M.olifera shown to be an effective primary coagulant for water treatment. In this paper, preliminary investigations M.olifera seed suspension for the softening of hard water is furnished. To analyze the influence of Moringaoleifera seeds in coagulant activity when used for natural raw water treatment. Water samples were collected from pond, tap, and the lake of Kammanahalli, HennurBande and Bagalur rural areas of Bangalore and are labeled as sample 1, sample 2 and sample 3 respectively. In each of the water sample, 25mg of dried M.olifera seed extract was added and allowed to settle for 1 hour 15 minutes. The parameters such as color, turbidity, odor and pH were analyzed before and after the inoculation of M.olifera seeds of all the three water samples. The water was analyzed for the parameters such as color, odor, turbidity, and pH. When the seeds are dried, crushed and added to water, the powder acts as a coagulant. Removal of efficiency was found to increase with increasing dosage of M.oleifera. The higher dosage was required to achieve equivalent residual hardness. Based on the results it is ascertained that seeds stored in dry containers at room temperature can be used as a coagulant for few years. Creation of awareness amongst the rural farmers on the usefulness of the M.olifera enables its cultivation which will have overall economic benefits to the entire country.

Published by: Dr. Vanitha G. Ramesh, Ashrith KumarResearch Area: Applied Genetics

Organisation: Indian Academy Degree College - Autonomous, Bengaluru, KarnatakaKeywords: Moringa oleifera, Coagulant, Colour, Odour, Turbidity, pH

Research Paper

306. Eye ball movement controlled mouse and keyboard using camera

Some are not ready to work with PCs in light of a sickness. Eye controls of extraordinary use to the eventual fate of characteristic contribution as well as more essentially the impeded and debilitated. Besides executing a controlling framework in it empowers them to work PC without the assistance of someone else. It is increasingly useful to the crippled. Those have to work PCs without hand this one is most valuable those can work cursor by the development of the eye. In this paper, the camera is catching the picture of eye development. First, distinguish student focus position of the eye. At that point, the distinctive minor departure from understudy position gets diverse development of cursor. The Implementation process for Pupil location utilizing Raspberry Pi and on the terminal of the Raspbian picture introduced on a raspberry pi. The eye tracker depends on pictures recorded by a transformed webcam to gain eye developments.

Published by: Vidhat Ganga, Saaima T., Sweta Kumari, Monika Jain, Rohan Madan, R. Veera AmudhanResearch Area: Electronics and Communication Engineering

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Virtual keyboard, Virtual mouse, Eyeball controlled computer, Rasberry Pi, PIR sensor

Research Paper

307. Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks

Internet of Things (IoT) devices is rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides, analyze and characterize intruders and attacks facing IoT devices and services.

Published by: M. Hemanth Kumar, Dr. A. Swarupa RaniResearch Area: Cyber Security

Organisation: Siddharth Institute of Engineering and Technology, Chittoor, Andhra PradeshKeywords: Internet of Things, Cyber-attack, Security threats

Research Paper

308. CFD analysis of heat transfer enhancement in double pipe heat exchanger using single and double triangular tape as inserts

The need to increase the thermal performance of heat transfer equipment (for instance, heat exchangers), thereby effecting energy, material, and cost savings, as well as a consequential mitigation of environmental degradation, has led to the development and use of many heat transfer enhancement techniques. These methods are referred to as augmentation or intensification techniques. This project deals with the analysis of heat transfer augmentation for fluid flowing through pipes using CFD. Using CFD codes for modeling the heat and fluid flow is an efficient tool for predicting equipment performance. CFD offers a convenient means to study the detailed flows and heat exchange processes, which take place inside the tube. Friction factor and Nusselt number for water flowing through the specified pipe were obtained first for the smooth pipe and then for the pipe with a single/double triangular tape insert in the Reynolds number range and Prandtl number. Calculated values (obtained from empirical equations available in literature) were compared with CFD values. Comparisons were also made between the smooth tube results and the single/double triangular tape results to establish the heat transfer augmentation due to the use of the insert. Simulations were carried out using commercial CFD software ANSYS.

Published by: Timesh Sanjiv Patil, Sanket Sunil Mane, Sagar Ramesh Ramne, Karan Ganesh KadamResearch Area: Mechanical Engineering

Organisation: Dilkap Research Institute of Engineering and Management Studies, Mumbai, MaharashtraKeywords: Heat transfer, Double pipe heat exchanger, CFD analysis

Research Paper

309. Insightlabs next generation school automation and data analytics

This project is based on a comprehensive study and research of Schools in India, where a school, even after being considered as an organization, perform and consolidate their daily operations such as Time Tabling, Communication, Attendance, Human Resource and Accounts using Files and Paperwork. It has been established that there is a growing need that these schools need to go ‘digital’. Apart from being digital, it has been found that classrooms generate a lot of data in the form of Academics, Demographic data, Attendance, Classroom Interaction, etc. This data is just given to the students and the parents in the form of a Report Card. This data is considered ‘Raw’ and useless as it just acts as a notification or information. This project helps Schools visualize and generate Insights through Data Mining and Machine Learning algorithms such as Random forests, etc.

Published by: Rahul I., Krishna Priya Udaykumar, Leela Sai KumarResearch Area: Exploratory Data Analysis

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: EDA, Data mining, Visualization, Machine learning

Research Paper

310. Structural health monitoring

In the past decade, we have seen growing interest in SHM based on wireless sensor networks and the reason for this is the poor installation and expenses of maintenance. WSNs allow a deep deployment of measurement points on an existing structure, facilitating exact and fault-tolerant damage identification techniques without installing a fixed wired infrastructure. We provide a hierarchical decentralized SHM system that executes flexibility-based damage identification and localization. Flexibility-based methods exactly identify and localize damage on a wider range of structures than the previous System, by externally correlating data across various sensors. Our hierarchical system organizes nodes into clusters using a novel multilevel search approach that incrementally activates sensors in the damaged regions, allowing much of the network to remain asleep.

Published by: Karthikeyan B., Jagatheswaran S.Research Area: IoT

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: WSN (Wireless Sensor Networks), SHM (Structural Health Monitoring)

Review Paper

311. Study of waste polythene used in flexible pavement

Waste polythene which is increased week to week becomes messed of the waste polythene it turns pollutes the environment, especially where there is no garbage collection system existed. A large amount of plastic comes into the tourist trekking regions and housing area are discarded or burned which is released harmful gases into the environment and air. The waste polythene collected from domestic and industrial sectors can be used in the production of plastics coated aggregate. Waste polythene, mainly used for packing and carrying any food. It’s made up of Polyethylene, Polypropylene, and polystyrene. There softening point varies between 110 degree Celsius – 140 degree Celsius and if the wastes polythene is heated thesis temperature range then they do not produce any toxic gases but the softened waste polythene have tendency to form a film like structure over the aggregate, when it is sprayed over the hot aggregate at 160 degree Celsius – 170 degree Celsius. The Plastics Coated Aggregates (PCA) is a better raw material for the construction of flexible pavement. PCA was mixed with hot bitumen of different types and the mixes were used for road construction.

Published by: Mayank Mohan Mishra, D. S. RayResearch Area: Transportation Engineering

Organisation: Babu Banarasi Das University, Lucknow, Uttar PradeshKeywords: Waste plastics, Plastic coated aggregate, Bitumen, Polyethylene, Polypropylene, Polystyrene

Research Paper

312. Real-time monitoring system (websocket-based) for remote intelligent buildings

These days, wireless sensor networks (WSNs) in digital engineering are used inside the tracking of far off sensible buildings, and the need for emerging web 3.0 is turning into increasingly in every component of electronic engineering. however, the key demanding situations of tracks are the tracking approaches and storage fashions of huge ancient monitoring facts. To deal with these barriers, we try to design a WebSocket-based totally real-time tracking system for far off sensible homes. On one hand, we utilize the modern-day HTML5 WebSocket, Canvas and Chart technology to screen the sensor records collected in WSNs within the web browser. The proposed monitoring system helps the latest HTML5 browsers and legacy browsers without native WebSocket capability transparently. then again, we advocate a storage model with lifecycle to optimize the NoSQL data warehouse. eventually, we've got made the tracking and garage experiments to illustrate the prevalence of our technique. The monitoring experimental consequences display that the average latency time of our WebSocket monitoring is generally lower than polling, FlashSocket, and Socket solution, and the storage experimental outcomes show that our storage model has low redundancy price, garage area, and latency.

Published by: P. Bhavana Reddy, Ashitosh Reddy, Vishnu Vardhan Reddy, Chandra Sai Sarath, Manikandan KResearch Area: Network And Communication

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Redundancy price, Garage area, Latency

Research Paper

313. A study of supply chain management in civil engineering

Supply Chain Management (SCM) is a concept that has flourished in manufacturing, originating from Just-In-Time production and logistics. Today, SCM represents an autonomous managerial concept, although still largely dominated by logistics. SCM endeavors to observe the entire scope of the supply chain.

Published by: Shaikh Tanveer Shahnawaz Ahmed, Patil Ashish Ashok, Shaikh Tanveer Ajiz, Sonawale Pranit PrakashResearch Area: Civil Engineering

Organisation: Dilkap Research Institute of Engineering and Management Studies, Neral MaharashtraKeywords: Management, Optimizing, Delivery, Flexibility

Research Paper

314. Customer satisfaction concerns of selected hypermarkets in Pimpri Chinchwad area

Sole traders in grocery retail are decreasing rapidly in and around Pimpri Chinchwad suburb of Pune City. Traditionally Pune city was known as pensioner’s city and Pimpri Chinchwad was known as a hub for working class people. With rapid industrialization, the scenario is changed, now Pimpri Chinchwad is covered under township development plan and several hypermarkets are active in the area. As consumers start believing neighborhood supermarkets to pick up their daily groceries and other needs, many big retail brands are constructively judging the tier II markets such as Pimpri-Chinchwad to confirm a stable growth. Structured retail is fast growing in upcoming smaller markets such as Pimpri-Chinchwad that already has outlets of brands such as More, Big Bazaar among others. Brands such as Spencer's, Reliance, and Auchan from Max Hypermarkets are going up speedily in Pune. Customer satisfaction is a fundamental aspect of a successful business. Evaluating customer satisfaction level from time to time enhances the profitability of the business. It helps to ascertain the place where it stands and can frame concrete plans for ensuring success in the future.

Published by: Vijay Sidram BurkuleResearch Area: Management

Organisation: Savitribai Phule Pune University, Pune, MaharashtraKeywords: Customer satisfaction, Hypermarket

Thesis

315. Video encryption and decryption using RSA algorithm

Information security has become the area of concern as a result of widespread use of communication medium over the internet. This paper focuses on the data security approach when combined with encryption and steganography techniques for secret communication by hiding it inside the multimedia files. The high results are achieved by providing the security to data before transmitting it over the internet. The files such as images, audio, the video contain a collection of bits that can be further translated into images, audio and video. The files composed of insignificant bits or unused areas which can be used for overwriting of other data. RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and it is different from the decryption key which is kept secret (private). A user of RSA creates and then publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, and if the public key is large enough, only someone with knowledge of the prime numbers can decode the message feasibly.

Published by: Ankita Lokhande, Shweta Hargude, Saloni Karangutkar, Dipali JunankarResearch Area: Computer Engineering

Organisation: New Horizon Institute of Technology and Management,Thane, MaharashtraKeywords: Upload, Encryption, Sending, Receiving, Decryption

Review Paper

316. Need for ultra-high voltage power transmission in India

In recent days, the global scenario has been changed a lot and there is a tremendous development in every field particularly in the electrical field. If we don’t converge our innovative ideas for the development of new power technologies we may face a decreasing trend in the development of the power sector. The transmission of power with Ultra high voltage may be one excellent and efficient way of electricity transmission. The rapid growth in industrial sectors, the usage of Ultra High Voltage (UHV) is very much needed to meet the load demand. High voltage (HV) is the range between 66 kV and 400 kV, if the voltage is above 800 kV, it can be defined as UHV. With the advancement of new power technologies in the world, it could be seen that Japan, Russia, Italy, Brazil, America (U.S), and Canada began to improvise UHV technology in the 1960s and 1970s.nOver a century of power transmission evolution, research, engineering, construction, and operation of alternating current (AC) overhead power transmission lines of ever-growing rated voltages and development of substation apparatus for such lines made it possible to raise the transmission voltage from 10 kV to 1200 kV and the power transmission capacity from 180 kW to 5 GW, i. e. by four orders of magnitude. At present commercial AC transmission lines and networks of a medium, high, extra-high.

Published by: Nagendra R. GouthamasResearch Area: Electrical Engineering

Organisation: Independent ResearcherKeywords: Ultra High Voltage, Power transmission, UHV power transmission

Research Paper

317. Design and simulation of the single phase Z-Source Inverter

Z-source converter overcomes the conceptual and theoretical barriers and limitations of the traditional voltage-source converter (abbreviated as V-source converter) and current-source converter (abbreviated as I-source converter) and provides a novel power conversion concept. The Z-source concept can be applied to all DC-to-AC, AC-to-DC, AC-to-AC, and DC-to-DC power conversion. Z – source inverters have been recently proposed as an alternative power conversion concept as they have both voltage buck and boost capabilities. These inverters use a unique impedance network, coupled between the power source and converter circuit, to provide both voltage buck and boost properties, which cannot be achieved with conventional voltage source and current source inverters. To facilitate understanding of Z – source inverter, this paper presents a detailed analysis, showing the design of impedance network, implementation of simple Boost control PWM technique and simulation of Z – source inverter for different values of modulation indices.

Published by: R. Santhosh Kumar, Maria Sushma S., Praveen Kumar M.Research Area: Power Electronics

Organisation: ATME College of Engineering, Mysuru, KarnatakaKeywords: Z-source, Converter, Inverter, Simple Boost control, MATlab Simulink

Review Paper

318. Pricing of cloud computing services

Pricing cloud computing has always been a big challenge not only to many Cloud Service Providers (CSPs) but also to many cloud consumers because of the exponential growth of new service features or characteristics appear almost daily. However, pricing of cloud services is a challenging task due to its services complexity and dynamic nature of the ever-changing environment. In this project, we propose a solution based on value-based pricing, which does not only consider how much does the service cost to a CSP but also how much a customer is willing to pay for the service. We demonstrate that the cloud extrinsic values would not only become one of the competitive advantages for CSPs to lead the cloud market but also increase the profit margin.

Published by: K. Mounasree, M. Manasa, Harika B. R., M. Udaykumar, M. RoshiniResearch Area: Cloud Computing

Organisation: Mother Theresa Institute of Engineering and Technology, Chittoor, Andhra PradeshKeywords: Cloud computing, Cloud Service Provider (CSP)

Research Paper

319. Study of software development for a PID controller system

In a Nuclear Power plant, there are a variety of machines performing different specific tasks. One of those is a standalone PID controller having multiple input/output being used in NPP Control is having an inbuilt processor. System control module and multiple communication channels, a floating-point arithmetic unit, multiple Ethernet controllers and also, an Analog Input acquisition module, Digital Input acquisition module, Contact Output Module is to generate contact out being used for annunciation purpose. We have used C programming to write applications, drivers code in a Linux environment. Cross compiler is used for compiling the code. A general purpose PID controller can be used to control a number of different parameters, which can be represented as an Analog Signal. It monitors critical parameters and issues alerts in case of deviant behaviors. Countermeasures can be deployed to take appropriate actions. The uses of such a general purpose PID controller can be extended to various applications in different fields.

Published by: Yashika Thakur, Yash Siddham, Karan Patel, Deepali MasteResearch Area: Computer Engineering

Organisation: Atharva College of Engineering, Mumbai, MaharashtraKeywords: PID controller, Linux environment, C-Programming

Research Paper

320. Online marks entry system

This paper describes the entry of student’s oral, practical, term work marks manually. After checking the answer sheet and taking oral and practical, faculties have to fill up marks in paper or sheet provided by the exam cell manually. Therefore there are possibilities of mistake happening during entering these marks. To minimize this problem we are going to make one system which allows the staff to enter the marks and verify the marks and then generate the report of this mark sheet. We are developing a system i. e ONLINE MARKS ENTRY SYSTEM to reduce the efforts of entering marks manually by the institute staff. Here in this system, the college department staffs are provided with the user name and password through the mail, where they will log in and subjects will be allocated to the staff by the head of the department and according to their subjects, they will enter the internal marks of their subjects. They can verify the marks and then generate the report of the sheet.

Published by: Ansari Abrar Shaukat Ali, Muhib Lambay, Shaikh Mohd Rahil, Shaikh Zain ul haq, Anas Sami Ahmed DangeResearch Area: Cloud Computing

Organisation: Theem College of Engineering, Maan, MaharashtraKeywords: Marks entry, Excel sheet, PDF generation, Faculty, HOD

Research Paper

321. Entrepreneurial spirit- A marketing perspective

We frequently hear that somebody has started a new App it is getting good no of hits every day or somebody has started a new business and getting a good response. Now there is a good environment to start the new business & with Entrepreneurial spirit, everybody needs to start business or start-ups. Now it is not necessary to invest in land and hoardings to sale your products. With the modernization, a seller has many platforms like e-sale, internet sale, etc., everything is available only it This article puts focus on Entrepreneurial spirit and its characteristics with a marketing perspective.

Published by: Vijay Sidram BurkuleResearch Area: Management

Organisation: Savitribai Phule Pune University, PuneKeywords: Productivity, Engagement, Loyalty

Research Paper

322. A study on smart irrigation system using IoT

Agriculture plays an important role in the life of a Gross Domestic Product of every country. It is the backbone of economy of every country. Many problems have been found in this field. As the most serious problem is the shortage of water resources for the present as well as for future generation. It is necessary to adopt some smart techniques to preserve the water. The most highlighted feature of this paper is how smartly and automatically control the water supply to the agriculture fields according to the need. For this, sensors used are soil moisture sensor and DHT-11 temperature sensor. All the information is sent on the farmer mobile application using Wi-Fi Relay Module and Arduino UNO R3.

Published by: Bobby Singla, Satish Mishra, Abhishek Singh, Shashank YadavResearch Area: Information Technology

Organisation: SRM Institute of Science and Technology, Ghaziabad, Uttar PradeshKeywords: Arduino Uno (R3), Soil Moisture Sensor, DHT-11 Temperature Sensor, Android Application

Research Paper

323. Timetable Generation– An optimal solution to the multi-constrained problem

Timetabling is the appointing of an occasion to a specific timeslot in a timetable. Timetabling turns into an issue when the allocating task turns out to be difficult to be inferred where certain particular prerequisites should be satisfied. Genetic Algorithm (GA) develop as one mechanization timetabling strategy to take care of timetabling issue via seeking arrangement in multi-indicates and the capacity refine the current answer for a superior arrangement. Genetic algorithm is a metaheuristic that copies the method of natural selection. It might be performed in multiple different ways with different types but it will all follow the same concept. This research aims to create an artificial intelligence through the use of evolutionary algorithm, specifically genetic algorithm combined with adaptive and elitist traits that can generate a university schedule timetable with the goal of generating a valid and as optimal as possible solution with certain constraints.

Published by: S. Suryaa Charan, Sai Theja K., Jagadeesh, ManikkannanResearch Area: Computer Science

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Timetabling, Multi-constrained problem, Soft computing technique, Scheduling problem, Genetic Algorithm, NP-Hard problem, Automation

Research Paper

324. Twitter data analysis for Indian election

Social media use is at an all-time historic high for India, so we considered one popular social media platform, Twitter, and tried to see if we could predict how a group of people felt about an issue by only analyzing posts from social media. For our research, we looked at tweets that focused on the 2019 Indian Prime Minister Election. Using these tweets, we tried to find a correlation between a person’s tweets and whom he is going to vote. We wrote a program to collect tweets that mentioned one of the candidates, then developed a sentiment algorithm to see which candidate the tweet favored, or if it was neutral. After collecting the data from Twitter and comparing it to the results of the Electoral College, we found that Twitter sentiments corresponded with 73.8% of the actual outcome of the Electoral College. The overall sentiment of all tweets collected leaned more positively towards BJP than it did for Congress. Using the tweets that were collected, we also try to predict at how different geographical locations affected a candidate’s popularity.

Published by: Suraj Gupta, Anish Anand, Sudhanshu Singh, Vaibhav Kapil, Mukesh Kumar SinghResearch Area: Sentiment Analysis

Organisation: IMS Engineering College, Ghaziabad, Uttar PradeshKeywords: Bhartiya Janta Party (BJP), Indian National Congress (Congress), Sentiments, Twitter

Case Study

325. Lite -pay - Finding new escaping inflation in Lite-coin

Lite- coin Core is one of the free software which enables the use of this currency. Lite coin is a peer-to-peer Internet currency that facilitates instant, no charge payments to anyone in the world. Lite-coin is a free/libre, third-party payment network without any central authorities. Mathematics secures the network and permits individuals to control their own finances. Lite-coin traits faster transaction confirmation times and improved storage efficiency than the leading math-based currency, Lite-coin is a proven medium of commerce complementary to Bitcoin. Lite pay is a tool to admit payments from customer anywhere on earth. Lite-coin differs from Bit coin in the total number of coins that each cryptocurrency produces. Lite-coin distinguishes itself. The Bitcoin never exceeds 21 million coins whereas Lite-coin can accommodate up to 84 million coins.

Published by: R. JanakiResearch Area: Crypto Graphy

Organisation: Vagdevi Vilas College, Bengaluru, KarnatakaKeywords: Block Chain, Bit coin, Lite-coin, Lite-pay, Crypto currency

Research Paper

326. Design, development, and manufacturing of hydraulically operated coil spring compressor for MacPherson type suspension system

The purpose of this tool is for use on, a MacPherson-type independent suspension assembly of a vehicle, the tool includes upper and lower C-shaped pressure brackets which for receiving spaced coils of the spring intermediate the opposed connected ends of the spring. Lower bracket is linearly adjustable for initial alignment with the spaced spring coils. A bottle jack is positioned below the lower bracket. Hydraulic pressure is provided through bottle jack mounted on the base for moving the bracket toward one another to compress the spring and for releasing the spring.

Published by: Haresh Sunil Rawool, Amit Anil Phansekar, Rushabh Ajay Kadam, Aditya Satish Dhoke, Niranjan Nagesh ManchekarResearch Area: Mechanical Engineering

Organisation: Rajendra Mane College of Engineering and Technology, Ambav, MaharashtraKeywords: Macpherson, Plunger, Hydrualic pressure, Suction valve

Research Paper

327. The Internet of Things: applications and security metrics with the Ugandan perspective

As the Internet of Things (IoT) increasingly becomes a reality, thousands of devices get connected to IoT platforms in smart cities and regions. These devices will actively send data updates to cloud-based platforms, as part of smart applications in various domains like healthcare, traffic, and education among others. Therefore, it is important to assess the ability of modern IoT systems to handle high rates of data updates coming from devices. The paper aims at developing metrics that can be used to assess the IoT cybersecurity status of a country in terms of the Intensity, Readiness, and Adoption with a special focus of Uganda as a case study. To achieve this, a design science approach was employed. Data were collected from a sample of 127 respondents from 7 firms around Kampala district. Finally, the impact of the proposed metrics is demonstrated through an application to the IoT assessment model.

Published by: Davis Matovu, Mugeni Gilbert B., Karume Simon, Mutua Stephen, Gilbert Gilibrays OcenResearch Area: Internet of Things

Organisation: Busitema University, Busia, UgandaKeywords: Internet of Things, Cybersecurity, IoT applications, Metrics

Others

328. E-attendance system using face recognition

Traditionally, the attendance of the students has been a major concern for the colleges and the faculties have to spend quite some time of their lectures for taking the attendance manually. In this paper, we are introducing a new way of attendance monitoring by making use of smartphones available with the teachers. We have suggested the use of YOLO algorithm for face detection and Siamese network for face recognition. This system will automatically mark the attendance of the students and thereby save the time and efforts for the faculties. The designed system will be quite efficient and reliable as Siamese network has proven to render high accuracies in face recognition.

Published by: Aditya Ladage, Pooja Pache, Sahil Maniar, Sheetal PereiraResearch Area: Computer Engineering

Organisation: K. J. Somaiya College of Engineering, Mumbai, MaharashtraKeywords: YOLO (You Only Look Once), Siamese, CNN (Convolutional Neural Network), R-CNN (Region based Convolutional Neural Network), DNN (Deep Neural Networks), Darknet, CUDA

Research Paper

329. Virtual reality of interior architecture

VR is an interactive computer-based on experience takes place within a simulated environment. It always gives in mainly auditory and visual feedback but may also allow other types of sensors. The environment created by virtual reality can be similar to the real world. By implementing our project in Virtual Reality, it has become convenient for the market value also for business purpose. Lots of manpower and resources are wasted in the civil engineering field. In order to use man power efficiently, the planning of jobs should be done well in advance. Usually, the 3D model is done using unity gaming software. In this virtual reality plays an important role in making the human efforts to the zero. In our project, we have implemented the sample room of a flat in the vr3d model. Basically in civil field builder spends lakhs of money In building the sample rooms to show to their customers, implementing VR room it has made very simple and efficient for the purpose of making sample rooms. It is very economical. The virtual reality is based applications require a significant level of effort in creating a virtual environment that represents the real world. To save the money that will be wasted by building sample rooms we can simply render the sample room in virtual reality. This will save the cost, resources, and manpower that will be needed for future development purpose.

Published by: Sneha More, Tejas Wagh, Yugant SuryawanshiResearch Area: Information Technology

Organisation: KC College of Engineering, Thane, MaharashtraKeywords: Virtual reality, Interior, Real time visualization, Dynamic, Interior design, Computer Graphics, Mobile devices, Video compression, Interior architecture

Review Paper

330. Gujarati word recognition

In this paper, we describe various techniques of character recognition for Gujarati text detection. We usually use OCR for character recognition. For the development of Gujarati text detection tool, we use the review of this paper. Recognition and its types can be described with the help of basics. A special property of the text can be taken into consideration while recognition process going on.

Published by: Monika Sudhakar Ugale, S. T. PatilResearch Area: Deep Learning

Organisation: Vishwakarma Institute of Technology, Pune, MaharashtraKeywords: Fetchers wrenching techniques, Offline text detection online text detection, Handwritten word detection, Printed word detection

Review Paper

331. A review on casting defects reduction in a foundry shop using DMAIC technique

To become globally compatible and to gain business as well operational excellence industries are implementing various quality improvement initiatives like Lean manufacturing, ISO certification, Total Quality Management, Quality Circle, etc.. But results explored by these initiatives are time constrained and not that much profitable. So methodology, which can provide breakthrough improvement in a short time, is required to be introduced and implemented. Six Sigma is the same methodology which can provide breakthrough improvements in a short time period, so it is very essential to explore its application for gaining quantum gains and profit in terms of quality, market share and customer satisfaction.

Published by: Wasim Ahmad, Anil Verma, Priyanka JhavarResearch Area: Production

Organisation: Sri Satya Sai University of Technology and Medical Sciences, Sehore, Madhya PradeshKeywords: Total Quality Management, Six Sigma, DMAIC

Research Paper

332. A new mechanism on hate speech detection with hateful and offensive expressions on Twitter using various machine learning techniques

A lethal online substance has turned into a noteworthy issue in this day and age because of an exponential increment in the utilization of the web by individuals of various societies and instructive foundation. Separating hate speech and offensive language is a key test in the programmed detection of dangerous content substance. In this paper, we propose a way to deal with naturally order tweets on Twitter into three classes: hateful, offensive and clean. Utilizing Twitter dataset, In this paper, we propose a way to deal with distinguish hate expressions on Twitter. Our methodology depends on unigrams and examples that are consequently collected from the preparation set. These examples and unigrams are later utilized, among others, as highlights to prepare a machine learning calculation. Our analyses on a test set made out of 2010 tweets demonstrate that our methodology achieves an exactness equivalent to 87.4% on identifying whether a tweet is offensive or not (twofold classification), and precision equivalent to 78.4% on distinguishing whether a tweet is hateful, offensive or clean (ternary classification).

Published by: Md. Ah Hassan Rayon HussainResearch Area: Soft Computing

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Twitter, Hate speech, Machine learning, Sentiment analysis

Research Paper

333. Real time emotions recognition and analysis based music player

One of the most essential components of an individual’s body is the human face and it acts as the main indicator for the behavioral and the emotional state of the individual face and it's very important for the human to extracting the required input from the human face can be done by using camera directly. The mean of this examination is making facial expression Recognition (FER) conspire by Utilizing the CNN Algorithm and tensor flow to recognize the face by the camera. Facial expression analysis is used in a different way to detect human emotions. There are four types of emotions are recognized: happy, sad, angry, neutral depends on the mood. The playlist itself have the songs in the database, it plays the songs according to the mood detect by the Camera. This research paper is effective because we are using the different algorithm i.e. CNN model which is based on Machine Learning which gives accuracy and reduces the time to recognize the emotions

Published by: Mahek Gupta, Shreya Singhal, Mohit PandeyResearch Area: Android

Organisation: ABES Institute of Technology, Ghaziabad, Uttar PradeshKeywords: Face Recognition, Emotion Detection, CNN, Face Analysis, Tensor flow.

Research Paper

334. Casting defects reduction in a foundry shop using DMAIC Technique

This work presents a systematic procedure to identify as well as to analyze major casting defects. Defects are responsible for time waste, money and eventually they affect productivity adversely. The defects need to be diagnosed correctly for appropriate remedial measures; otherwise, a new defect may get introduced. The proper classification and identification of a particular defect is the basic need to correct and control the quality of the casting. Keeping rejection to a bare minimum is essential to improve the yield and increase the effective capacity of the foundry unit and also improve productivity. Casting defect can negatively impact the bottom line of a foundry. A defect in a casting deteriorates casting surface quality and mechanical properties. It is responsible for loss of profitability, quality level and productivity of component. So it is preferably necessary to reduce it as much as possible by appropriate analysis. The present work is carried out in the foundry to minimize casting rejection due to a major defect. Quality analysis is carried out which includes the Root cause analysis to find out actual reasons behind occurring the blowholes. Quality control tools such as Pareto analysis, Cause, and Effect (Ishikawa) diagram, and Why-why analysis are used for analysis. Accordingly corrective actions and preventive measures are suggested and implemented.

Published by: Wasim Ahmad, Anil verma, Priyanka jhavarResearch Area: Production Engineering

Organisation: Sri Satya Sai University of Technology and Medical Sciences, Sehore, Madhya PradeshKeywords: Six sigma, DMAIC, Casting process, Defects reduction, ANOVA

Research Paper

335. Automated wet waste composting system for wet waste material

Composting is the acceleration of the natural process of breakdown of the organic material into a more stable organic substance. This paper focuses on the aerobic composting method. In the presence of oxygen, microorganisms consume organic matter and release heat and carbon dioxide; resulting in compost. This document addresses a composting plan and recommendations for AUI. After analyzing the background, the waste stream, the restrictions and the methods that will be used; a composting tumbler has been made in order to convert AUI’s organic waste into compost

Published by: Aditya Rao, Hrishikesh Manjerakar, Smit Soni, Priyanka SinghResearch Area: Mechanical And Electronics

Organisation: Thakur College of Engineering and Technology, Mumbai, MaharashtraKeywords: Wet waste composting Arduino Uno

Review Paper

336. A review on thermodynamic analysis and performance of SRC and ORC power generation systems using waste heat source

The development of the world today has largely been achieved through the increasingly efficient and extensive use of various forms of energy. Over the past decades, the growth in energy consumption around the world has shown that fossil fuel energy source alone will not be capable of meeting future energy demands. With the increase in fossil fuel consumptions, more and more industrial activities produce an increasing amount of waste heat. Energy generated as a result of industrial activities that are not practically utilized is referred to as industrial waste heat. Several studies have shown that the specific amount of industrial waste heat is poorly measured, it is estimated that 25 to 55% of the input energy in industries are actually used while the remaining are discharged as waste heat.

Published by: Surendra Kumar Vishwakarma, Sujeet Kumar SinghResearch Area: Thermal Engineering

Organisation: Patel College of Science and Technology, Bhopal, Madhya PradeshKeywords: SRC, ORC, Waste heat source, Organic fluids

Research Paper

337. Implementation of automated wind power generation system on Indian highway

Wind energy has been the subject of research in the field of power generation. As the population increases and energy demand increases, renewable energy sources such as wind can be used to generate electricity with proper technology. To make the traditional method more efficient, i.e. Horizontal wind turbine axis, experimental research has shown that for low wind conditions vertical axis wind turbine can be used. The omnidirectional vertical axis wind turbine uses less space and higher power output. Since the rollers used in earlier models lead to a high loss of friction, we make use of magnetic levitation. We propose this design model with two steps, each with three blades in each stage. The blades are savonius type blades. Power generation is done using a pulley and belt system with the help of a DC motor.

Published by: Ajay Mishra, Ashutosh Mishra, Mohit PandeyResearch Area: Mechatronics

Organisation: Thakur College of Engineering and Technology, Mumbai, MaharashtraKeywords: Wind energy, Wind turbine, Vertical axis wind turbine, Savonius blade

Research Paper

338. Thermodynamic analysis and performance of SRC and ORC power generation systems using waste heat source

In this work mathematical models of Steam Rankine Cycle (SRC) and Organic Rankine Cycle (ORC) power systems have been developed to explore the feasibility that combines the fluid-flow temperature, waste heat steam and low-boiling-point organic working fluids for power generation. The effects of the thermodynamic parameters on the SRC and ORC performance are examined. Among the commonly available working fluids, a selection based on environmental and technical criteria was carried out resulting in a list of 8 working fluids: R143a, R245fa, R600a, R124, R134a, RC318, R236fa, and Ammonia. Using the numerical models, we calculate and compare thermal efficiency, generating capacity, etc. of two power systems, namely SRC and ORC under the same heat source conditions. The results show that under the same condition of heat source, ORC has the highest thermal efficiency and power generation.

Published by: Surendra Kumar Vishwakarma, Sujeet Kumar SinghResearch Area: Thermaal Engg

Organisation: Patel College of Science and Technology, Bhopal, Madhya PradeshKeywords: Waste heat, SRC, ORC, EES, Simulation model, Rankine cycle, Power generation

Research Paper

339. Antifungal activity of Pseudomonas fluorescens against Rhizoctonia solani under in vitro condition

Rice is a major food crop in India which is affected by both biotic and abiotic stresses. Rice is infected by many diseases that are caused by fungi, bacteria, and virus. Among them, Rhizoctonia solani is an important pathogen which causes a major yield loss in rice. The application of chemicals hazardous to humans causing environmental pollution. Hence, in order to reduce these problems, there is a need for sustainable agriculture using natural resources to compact the diseases. In the present study, The PGPR Pseudomonas were collected from different places and were evaluated against the Rhizoctonia solani under in vitro conditions. Among the five isolates, Pf1 showed the highest reduction percentage against the pathogen.

Published by: Anupriya N., A. Anushiya Devi, R. Anushya, M. Apoorva, R. Anusiya, T. Suthin RajResearch Area: Plant Pathology

Organisation: Annamalai University, Chidambaram, Tamil NaduKeywords: Rhizoctonia solani, Pseudomonas fluorescens, Antifungal activity, Rice

Review Paper

340. Structuring senses- The impact of design on human mind

Senses, the only information input media, play a mediating role between the built spaces and their experiences by the users. These spaces act as a stimulus on the senses of its users, the response to which is initially generated by the ‘non-conscious’ mind of the user; eventually leading to a like or dislike towards space. Architecture is all about experience created in a space, the look, feel and aesthetics; the success of which is measured by the time a user spends appreciating the space. Structuring senses, as the name puts forward, is a study that focuses upon the relationship between a space structure and its impact on the sensory media of the users, aiming to establish a balance and reduce the gap between the design intent and the design product. This declaration shall point towards an exchange of dialogue between a person and space.

Published by: Sagar JhanglaniResearch Area: Architecture

Organisation: Indian Education Society College of Architecture, Mumbai, MaharashtraKeywords: Senses, Spaces, Architecture, Design, Feel, Emotion

Research Paper

341. Fault diagnosis tool for circuit breaker wiring harness

A new concept of fault diagnosis is based on measuring the contact resistances of the individual contacts of the internal circuits of the high voltage circuit breaker by using the IOT based circuit. In this equipment, we measure the resistance of the NO and the NC contact by using the voltage and current sensor, Arduino kit. In this ardinuo kit we are programmed such that the sensor senses the value of the voltage and current it goes to the Arduino kit and pre-insert value of the resistance formula in a programmed and according to the value resistance we will get the condition healthy or unhealthy and also we get the resistance values of the contact for the preventive maintenance.

Published by: Manisha K. Aher, Bhagyashri Deore, Nilesh KothavadeResearch Area: Electrical Engineering

Organisation: MET's Institute of Engineering, Nashik, MaharashtraKeywords: Microcontroller (Arduino kit), NO and NC contact, Voltage supply current sensor, Voltage sensor, High voltage circuit breaker display

Research Paper

342. Enhancement of throughput of DEEC routing protocol in WSN

A WSN is composed of a large number of sensor nodes which consist of sensing, data processing, and communication capabilities. Fault-free and trustworthy data transfer amongst source and destination is the challenges in WSN. The energy efficiency in WSN is a key essential element for improved communication. It is believed that 70% of the energy is used up in data transmission only. The lifespan of the WSN diminishes due to additional energy consumption. Routing protocols as long as providing an optimum data transmission route as of sensor nodes to sink node to save energy of nodes in the system network. Data collection shows a significant part in energy preservation of sensor network. In wireless sensor network energy is mostly used up for three purposes – signal processing, data transmission, and hardware operation. To make the most of the network lifespan data transmission is augmented by applying energy-efficient and reliable routing protocols. The protocols have more traffic overhead and more energy consumption. This thesis proposed enhanced energy efficiency in DEEC routing protocol. The experiment results represented that it also reduced the traffic of the WSN and increases the overall system performance.

Published by: Suraj Soni, Balram YadavResearch Area: Electronics and Communication

Organisation: SCE, Bhopal, Madhya PradeshKeywords: DEEC protocol, Energy efficiency, Routing protocols, Throughput analysis, WSN

Research Paper

343. Contamination of refrigerator is a threat for infections

Food that we eat may be perishable, semi-perishable and non-perishable. People generally use the refrigerator to store the perishable and semi-perishable food items. But during long time preservations without recalling may lead to the development of microbial contamination. Raw vegetables and fruits also play a major role in the spread of bacteria, fungi, and parasites. This may further lead to foodborne illness which is a threat to human infections. Cross contamination is also possible between the contaminated foods and fresh foods. Proper cleaning and maintenance reduce the bacteria as well as fungal load. Therefore, the monitoring of microbiota in the refrigerator is important for food safety.

Published by: Dr. Ch. LalithaResearch Area: Microbiology

Organisation: Dr. V. S. Krishna Govt. Degree and P.G College, Visakhapatnam, Andhra PradeshKeywords: Refrigerator, Contamination, Food Infections, Cleaning and Food Safety

Review Paper

344. Manual applicator road marking machine: A review

This paper summarizes the ongoing researches about the road marking and devices used in road marking. Road marking machines are widely used for marking purpose essential for road safety and traffic control. Various types of road marking devices as fully automatic road marking machine, semi-automatic road marking machine, manual road marking machine, etc. are available in the market. Automation in road marking has evolved and developed with time but mostly in India, manual applicator road marking machine has a great impact in road marking operations due to its size, ease and lower cost. Various types of materials such as thermoplastic, traffic paints, epoxy, etc. are used as marking materials by calculating desirable properties. Horizontal, vertical and straight line marking is possible by manual applicator road marking machine.

Published by: Ashish Bhaiswar, Vishal Francis, Laukik RautResearch Area: Design And Analysis

Organisation: G. H. Raisoni College of Engineering, Nagpur, MaharashtraKeywords: Road Marking, Road marking Devices, Manual Applicator Road Marking Machine

Research Paper

345. Implementation of automatic solar tracking and cleaning system

With the growing requirement of electricity and concern for the environmental impact of fossil fuels, implementation of eco-friendly energy sources like solar power is rising. The solar PV modules are generally employed in dust environments which is the case in tropical countries like India. The dust gets accumulated on the front surface of the module and blocks incident light from the sun. The power output reduces as much as by 30% if the module is not cleaned for a month. Accumulation of dust on even one panel in an array reduces their efficiency in energy generation considerably and need to keep the panel surface as clean as possible. In this paper, we designed a system which not only tracks sun but also clean module automatically. This mechanism required an LDR for tracking the sun. While cleaning the solar panels, a mechanism consists of sliding brushes has been developed. In terms of daily energy generation, the present tracking -cum cleaning scheme provides about 30% more energy output as compared to the stationary PV module. This paper gives an idea about the combination of tracking and cleaning system.

Published by: M. L. Thorat, Rutuja Walimbe, Aishwarya Patil, Dhananjay Kulkarni, Supriya ThoratResearch Area: Engineering

Organisation: RMD Sinhgad School of Engineering, Pune, MaharashtraKeywords: Solar energy, Solar cleaning system, Single axis solar tracker, Environmental factors, Proteus software

Research Paper

346. Role of Benzydamine mouthwash in radiation induced oral mucositis- Single blind randomized control study

The aim of this paper is to determine the effect of Benzydamine in addition to normal saline mouthwash and compare it with normal saline mouthwash only, in reducing radiation/chemoirradiation induced oral mucositis in patients with Head and Neck malignancies. An open-label single-blind randomized controlled trial was conducted. Arm A - Radiotherapy/ Chemoirradiation who were randomized to receive Benzydamine mouth wash and normal saline mouth wash. Arm B - Radiotherapy/Chemoirradiation who were randomized to receive normal saline mouthwash only. Forty patients were accrued in the trial, 20 in the control arm and 20 in study arm. All patients completed the treatment protocol except 4 patients in the control group who discontinued treatment after 4 to 5 weeks. A number of patients in control vs. study arm of Chemo irradiation group were 14 vs. 13 and in Radiotherapy group 6 vs. 7 patients. The occurrence of Grade 3 mucositis was less in the control arm 30% vs. 40% but the onset was later among patients in the study arm (week 3). In the Chemo irradiation group requirement for analgesic (92.8% vs. 53.8%), topical anaesthetic (35.7% vs. 7.6% - significant), occurrence of mouth pain (28.5% vs. 15.3%) and Ryles tube feeding (28.5%vs15.3%) were less in the study arm and also tolerated more number of cycles of concurrent chemotherapy (76% vs. 14% p= 0.036). A number of patients having a break in treatment (0% vs. 42.8% -significant) and occurrence of oral thrush (16% vs. 28.5%) were more in study arm of Radiotherapy only group but the number of patients included was small (6 vs. 7). Nausea and vomiting was the predominant complaint in study arm probably induced by the study mouth wash. The occurrence of dryness of oral mucosa and throat was more in study arm of the chemo-irradiation group but less in radiotherapy only group. Overall the addition of Benzydamine mouth wash to normal saline mouthwash along with oral care protocol during treatment did not show significant benefit. But there seems to be some benefit with the use of study mouth wash in the chemo-irradiation group only. Since the sample size is small will need to do the study with larger numbers to document statistically significant benefit

Published by: Dr. V. Srinivasan, Dr. S. Ashok Kumar, Dr. P. AnandhiResearch Area: Radiation Oncology

Organisation: Government Arignar Anna Memorial Cancer Hospital and Research Institute, (RCC), Kancheepuram, Tamil NaduKeywords: Benzydamine mouth wash, Normal saline, Oral mucositis, Radiotherapy, Chemoirradiation

Review Paper

347. Review on multi storey building foundation strength against various soil properties and seismic force

The foundation stability for different types of multi-storied building is becoming one of the most important areas of study since last few years. But unfortunately, there are many factors associated with the stability of the foundation are yet to be discovered. However it has been seen that many have attempted to establish the correlation between different coefficients and factors associated with beams and column failure, but only a few research works have been considered the failure against seismic force. There are only a few numbers of research evidence available which indicate that the analysis of the stability against seismic force is one the most important parameter in this regard. In this work, a detailed study related to the different factors associated with the building foundation as well as their effect and correlation with the seismic forces has been done. From the study, it has been found that the deep foundation provides better resistance than the shallow foundation against seismic force.

Published by: Sangitika Nandi, Anshul GargResearch Area: Civil Engineering

Organisation: Lovely Professional University, Phagwara, PunjabKeywords: Pile foundation, Shallow foundation, Load bearing capacity, Soil properties, Seismic force

Review Paper

348. Advanced techniques for transformer protection

Power transformer can be expensive and are an incredibly valuable component in the power system. Faults can lead to repairing or replacement, therefore, it is necessary to minimize it thereby reducing the damage. Currently, the protection by electromagnetic relay makes use of the individual relay and monitoring equipment for identification. This paper firstly summarizes all available protection methods then suggests a certain method to implement advanced relay with high performance, flexibility monitoring capability and advanced programmable

Published by: Sushil Deshmukh, Yash Raj Gujre, Rahul Rajendra Yadav, Shruti NemaResearch Area: Electrical Engg

Organisation: Lokmanya Tilak College of Engineering, Navi Mumbai, MaharashtraKeywords: Advanced relay, Fuzzy logic, Artificial neural networks, Protection, Advanced numerical method

Research Paper

349. Richard Rorty’s criteria for progressive left

Richard Rorty’s progressive Left is the main political viewpoint that satisfies the criteria for any nation. It ingrains trust in the individual since it depicts a future that is the satisfaction of the ethical character of America. It is a future-arranged viewpoint yet does not endeavor to portray the methods through which the change will happen in extraordinary detail. The most essential part of the progressive Left is the trust an individual must have in his or her nation and what's to come. This is anything but a visually impaired trust, the kind that would make an individual fall into spectatorship and not want to play a participatory part, but rather the kind that makes an individual feel that his or her battles are not futile. Americans can't expect that their nation will fall flat at accomplishing its objectives. An admired future may not be accomplished in their lifetime, but rather they should at present have to trust that their relatives will have the capacity to live in an ethically impartial society. This paper will explore his four criteria for Progressive Left.

Published by: Bilal Ahmad DadaResearch Area: Philosophy

Organisation: Aligarh Muslim University, Aligarh, Uttar PradeshKeywords: Progressive left, Cultural left, Escatological left, Nation progress, Nationalism, Solidarity

Research Paper

350. Linear control starter for single phase induction motor

This paper is based on the advancement of power electronics technology. In this paper, we forced on designing and development of Linear control starter for single-phase induction motor. An induction motor takes a large current while starting so we had to make a starter which will be reduced starting current of an induction motor. In this circuitry, we also gave high voltage and low voltage protection circuitry. In this, we have used a microcontroller with solid state power electronics device i.e. thyristors. The results show that this method can be reduced starting current.

Published by: Priyang Sharma, Prashant Jagtap, Sandeep TiwariResearch Area: Electrical Engineering

Organisation: G. H. Raisoni College of Engineering, Nagpur, MaharashtraKeywords: Induction motor, Thyristors, Microcontroller

Review Paper

351. A review: Use of nanoparticles in solar desalination

The current paper reviews a present work about the role of nanomaterial in many fields especially in a solar energy distillation system. The nanomaterial increases the absorptivity of sunlight and thermal conductivity of the base material. Benefits of using nanomaterial in solar still are thermal performance improvement with acceptable consequences. There is a lot of studies done on solar still using nanomaterial with different parameters and his effects. The purpose of this review consists of exhibiting the performed researches, the main objective of the studies and results, mathematical data and measurements. It was observed that many statement issues that should be taken into account, namely few works have analyzed nanoparticles in solar still active configurations, furthermore, investigations are required to examine the effects of nanoparticle size, the shape of the nanograin and amount of the nanoparticles.

Published by: Virani Digesh DevrajbhaiResearch Area: Mechanical Engineering

Organisation: Gandhinagar Institute of Technology, Kalol, GujaratKeywords: Solar still, Nano particles, Solar desalination

Research Paper

352. A study of mechanical properties of lightweight cement mortar

The present work contributes to the difference between mechanical properties of lightweight cement mortar by using common waste such as coconut shell powder, wood waste and sea shell powder as the partial replacement of sand. These waste material can be found easily and I tried to make better use of them in this present work. The mechanical properties conducted were workability, compressive strength test and split tensile strength test. The results were concluded by describing the best material for replacement of sand and its optimum quantity which is to be added to produce light weight cement mortar. Lightweight cement mortar can be used in cases of underwater construction, for better heat resistance, eco-friendly construction. In, by and large, the mortar is plastic liquid-like structure comprises of OPC cement or Ordinary Portland Cement, water and Fine aggregate. The common mortar can be used for masonry works in most of the cases. But to impart special characteristics to the common mortar we need to add some ingredients such as fly ash, rice husk ash, metakaolin, etc. So, in this present work, I used different waste material as partial replacement for the fine aggregate or sand.

Published by: Kola Sarath, Sandeep SalhotraResearch Area: Civil Engineering

Organisation: Chandigarh University, Mohali, PunjabKeywords: Lightweight Cement Mortar, Waste Materials, Density, Compressive Strength, Tensile Strength.

Survey Report

353. Survey on color lines model for eliminating specular reflection

Detection of highlights is a prominent issue in computer vision, graphics. Many algorithms in image processing assume diffuse only reflections and deem specular reflections to be outliers. However, in the real world, the presence of specular reflections is inevitable since there are many dielectric inhomogeneous objects which have both diffuse and specular reflections. Hence, detection, and sometimes removal, of specular reflection (highlights) in an image may be critical. Proposed work takes help of global color-lines information to effectively recover specular and diffuse reflection. Our critical observation is that each image pixel lies along a color line in normalized RGB space and the different color lines meaning distinct diffuse chromaticities intersect at one point, known to be the illumination chromaticity. Pixels along the same color line, spread over the entire image and their distances to the illumination chromaticity give the number of specular reflection components. With such non-local overall information from these color lines, our method can effectively separate specular and diffuse reflection components in a pixel-wise way. We also present an efficient algorithm for complete removal of the highlights and it is suitable for real-time applications.

Published by: Samruddhi Patil, Chaya JadhavResearch Area: Image Processing

Organisation: Dr. D. Y. Patil Institute of Technology, Pimpri, Pune, MaharashtraKeywords: Diffuse reflection, Specular reflection, Illumination chromaticity, Global color lines

Survey Report

354. Analysis of water shortage in India

Climate change, water supply limits, and continued population growth have intensified the search for measures to conserve water in irrigated agriculture, the world’s largest water user. Policy measures that encourage adoption of water-conserving irrigation technologies are widely believed to make more water available for cities and the environment. At the time of Independence, i.e., in 1,947, the per capita accessibility of water in India was 6,008 cubic meters a year. It boiled down to 5,177 cubic meters a year in 1951 and to 1,820 cubic meters a year in 2001. As per midterm examination (MTA) of the tenth Plan, per capita accessibility of water is probably going to tumble down to 1,340 cubic meters in 2025 and 1,140 cubic meters in 2050. Nearly 40 percent of water demand in urban India is met by groundwater. So groundwater tables in most cities are falling at an alarming rate of 2-3 meters per year. Another factor is water leakage. This article analyses the distribution of water in the Indian subcontinent and how the Rainwater harvesting system has panned out so far in the Indian context. It focuses on the areas that need improvement and the consequences that follow if we humans don't stop the wastage of this precious commodity.

Published by: Jaineel Parikh, Jairaj NairResearch Area: Bio-science And Technology

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Water supply limits, Rainwater harvesting, Water consumption, Water wastage

Case Study

355. Shopping using NFC

The traditional system currently implemented for shopping at a retail store has been in place for a long time. However, it has its fair share of disadvantages associated with it. It requires the retail store to keep the products to be sold, ready on shelves to be picked up by the customer. This consumes a lot of space which gets overcrowded during sales and other offer periods. In addition to consumption of space, it also takes a lot of time for the cashier to scan the products and generate a bill which results in subsequent delay for other customers waiting in the queue. There is a need to find solutions to these problems and make shopping at a store a convenient option for users. To overcome these problems, we propose to use NFC (Near Field Communications) technology and improve the user’s shopping experience. NFC is a groundbreaking technology that works for short-range communication. NFC tags are available that can magnetically store data. To implement the system NFC tags will be placed in front of every product which can be scanned by the consumer’s mobile that must have NFC enabled. The tag can be placed in front of a sample product or an image depicting the product. The user must be connected to the internet to make use of this application. As soon as the consumer scans the tag all the details about the product will be added in the user’s cart. This will reduce the load on the cashier to scan every product to generate a bill, making the system more efficient and easy to use. There will be an android application for consumers. The store manager/admin will have the responsibility to manage (add/remove) products available for consumers to shop. A store admin can manipulate the data stored in the NFC tag. Admin will have a desktop website at his/her disposal to add information about the products available. Once the consumer registers for the shopping application he/she has to verify their account at admin’s desk. The admin has to add images, details, price, etc. of the product to be viewed by their consumers on their mobile application after the tag is scanned. This system will reduce the workforce required to maintain the products on the shelf. Hence the system will be cost effective and efficient for the store and convenient for the users.

Published by: Mh. Tabrez Shaikh, Krishan Sidhwani, Amit Solanki, Prerit Udasi, Naveen VaswaniResearch Area: Computer Engineering

Organisation: Watumull Institute of Electronics Engineering and Computer Technology, Mumbai, MaharashtraKeywords: NFC, NFC shopping, NFC tags

Research Paper

356. Application of blockchain in Usage Based Insurance

Usage Based Insurance (UBI) consists of schemes such as Pay As You Drive (PAYD) and Pay How You Drive (PHYD). In this paper, we detail the application of Blockchain in Usage Based Insurance schemes - PAYD and PHYD. Using Blockchain, we propose an effective mechanism to store transaction data and also the condition of the vehicles. We also detail measuring these parameters to calculate premium amounts, create new insurance schemes and also a new market for used vehicle sale.

Published by: Amith Kumar V., Abhiram Prasad, Dr. Rajashekara Murthy S.Research Area: Computer Science And Engineering

Organisation: R. V. College of Engineering, Bengaluru, KarnatakaKeywords: Insurance, PAYD, PHYD, MHYD, Blockchain, Smart contract, Public Key, Private Key

Research Paper

357. Phase transfer switch with power factor correction

In the present scenario of three phase application, if low voltage is available in any one of the three phases and needs equipment to work in normal voltage, then the phase contacts must be changed manually. The product developed will solve the problems related to three phase applications. The main aim of this product is to provide an uninterrupted power supply for three-phase loads even in the failure of a phase in a three-phase system. The product is very useful in those industries, factories, home spaces and offices where the continuous supply of electricity is needed. Normally three phase supply if one or two-phase fails, power will not be there in the gadget connected to that particular failed phase(s), to avoid these failures, we bring intelligent three phase changer with Arduino, which shifts power from alive phase to the failed phase(s) instantaneously,thus keeps all the circuits alive.

Published by: Gunjan Pramod Shete, Sadika Shahanawaj Naikwadi, Pradnya Sanjay Kumbhar, Padmaja Jitendra Patil, Pallavi Ashok TandaleResearch Area: Power System

Organisation: Nanasaheb Mahadik College of Engineering, Peth, MaharashtraKeywords: Transformer, Rectifier, Relay, Arduino UNO

Review Paper

358. A review on environment risk factor influencing scrub typhus

Scrub typhus is an acute febrile widespread disease in Asia & Pacific islands which causes unspecific symptoms & signs. This is one of the biggest diseases in our country especially in the Terai region and South India for many years. Scrub typhus, a dreaded disease in the pre-antibiotic era, is an important military disease which caused thousands of cases in the Far East during World War. It is a zoonosis and is a widespread disease in Asia and the Pacific Islands. Scrub typhus is an acute febrile illness which generally causes non-specific symptoms and signs. The clinical manifestations of this disease. Deaths are attributable to late presentation, delayed diagnosis, and drug resistance. The public health importance of this disease is underestimated because of difficulties with a clinical diagnosis and lack of laboratory methods in many geographical areas. Scrub typhus is known to occur all over India and physicians should be aware of this potentially serious but easily treatable disease. The aforesaid environmental factors affect the incidence and cause of Scrub typhus drastically as there is a high need to control this disease. So, a survey was conducted regarding this aspect.

Published by: Mohd. Minnatullah, Kamal Nabh Tripathi, Anupam MehrotraResearch Area: Environmental Engineering

Organisation: Babu Banarasi Das University, Lucknow Uttar PradeshKeywords: Scrub typhus, Febrile illness, Zoonosis

Research Paper

359. Liver disease prediction using machine learning

Data Mining technologies have been widely used in the process of medical diagnosis and prognosis, extensively. These data mining techniques have been used to analyze a colossal amount of medical data. The steep increase in the rate of obesity and an unhealthy lifestyle eventually reflects the likelihood and the frequent occurrence of liver-related diseases in the mass. In this project, the patient data sets are analyzed for the predictability of the subject to have a liver disease based purely on a widely analyzed classification model. Since there are pre-existing processes to analyze the patient data and the classifier data, the more important facet here is to predict the same the conclusive result with a higher rate of accuracy. There are 5 distinct phases in this process. First, the min-max algorithm is applied to the original liver patient data set that could be collected from the UCI repository. In the second phase, significant attributes are demarcated by the use of PSO feature selection. This helps to bring out the subset of critical data, from the whole normalized datasets of liver patients. After this step, the third phase involves the usage of classification algorithms for comparative analysis and categorization. Accuracy Calculation is the fourth phase. It involves the usage of Root Mean Square value and a Root Error value. The fifth phase is the evaluation phase. Depending on the studies, a simple evaluation process is executed to preserve the integrity of a precise result reflection. J48 algorithm is considered to be a better performing algorithm when it comes to feature selection with an accuracy rate of 95.04%.

Published by: Vasan Durai, Suyan Ramesh, Dinesh KalthireddyResearch Area: Machine Learning

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Chronic diseases, Classification schemes, Training datasets, Machine learning, Classifiers, Algorithms, Classification models

Others

360. Mobile accelerometer based robot

In this project, we present the controlling of a Robot using BLUETOOTH technique. The robot is controlled by a mobile accelerometer through Android Application. In the course of the Android Application, User can use various commands like forwarding, backward, stop, left, right. These commands are sent from the Android mobile to the Bluetooth receiver. This project is built on the 8051 microcontrollers; this project is housed on a robot base, which moves forward, When the data is received from the Bluetooth to the microcontroller, according to the signal the robot moves that direction. L293D is used to drive the motors. This project uses regulated 5V, 500mA power supply. 7805 three terminal voltage regulator is used for voltage regulation. Full wave bridge rectifier is used to rectify the ac output of the secondary 230/12V step-down transformer.

Published by: Doddala MadhumithaResearch Area: Electronics

Organisation: Saveetha School of Engineering, Chennai, Tamil NaduKeywords: Bluetooth, Microcontroller, Android mobile

Research Paper

361. ICTs in Governance – A case study of GHMC in Telangana

The developments in Information Communication Technologies (ICT) and with potential benefits resulting out of these applications led to a new possibility for governments in carrying out its programs and services in their State and Country. India, even while carrying on with its stiff bureaucracy and a rigid governance structure, has been distinctly at the forefront of this new development of putting in to use ICTs. The recent Greater Hyderabad Municipal Corporation (GHMC) initiative in employing and integrating ICTs in their services in the capital city of Hyderabad in the newly formed State Telangana is chosen for the paper. The case study method is employed considering the GHMC’s ICT project being vast and ever-changing services provided by the project. The paper looks at the role played by ICTs in the functioning of GHMC which had won the Swachhta Award for the year 2018.

Published by: B. Sunil, Shyamsunder Chitta, Hariprasad SoniResearch Area: Basic Research

Organisation: Symbiosis Institute of Business Management, Hyderabad, TelanganaKeywords: GHMC, ICT, Governance

Review Paper

362. Textile System

The proposed system is developed to create a simple, user-friendly and to use software that avoids the tedious task done by the existing system. The proposed system is accessible only to the authenticated user of the system wherein all users of the system contain their valid user id and password. The proposed system handles the various requirements of the textile. The administrator of the system has been assigned to make their settings of the system. He also has the right to see the login details. The main requirement of this project is to make the task of inserting the employee related details, product related details and maintain them very simple and time-saving. After inserting the details it must be retrieved whenever necessary by search criteria which will give the actual information needed by the valid user. There are several reports that are generated based on the employees and room which will show employee information, salary records, and attendance. It will also showroom check-in details and check out details.

Published by: Asif Tamboli, Amar Bhandekar, Sunil Pardeshi, Sanjay Sabane, Balwante S. S.Research Area: TexTile Engineering

Organisation: BMIT, Solapur, MaharashtraKeywords: Textile Management System, Front office module, Back office module, Human Resource Management module, Accounts module

Case Study

363. Big data analytics using Apache Hadoop: A case study on different fertilizers requirement and availability in different states of India from 2012-2013 to 2014-2015

In today’s digital world large volume of data is being generated from various sources including social media, healthcare, transportation, industries, sensors, etc. This data includes structured, semi-structured and unstructured data. This huge volume of data cannot be stored and processed using traditional systems thus it is termed as big data. To store and analyze this type of data parallel storage and analysis is required. This can be achieved by using big data analytics. Using Apache Hadoop such huge volume data can be analyzed efficiently. In this paper, a case study is performed on different fertilizers requirement and availability in different states of India in three years from 2012-2013 to 2014-2015 using Apache Hadoop.

Published by: Avinash Pratap Budaragade, Jones Temitope MaryResearch Area: Big Data Analytics

Organisation: Visveswaraya Technological University, Belgaum, KarnatakaKeywords: Big data, Apache hadoop, Apache pig, Pig latin, HDFS

Research Paper

364. Application of Pareto Principle and Hartman's Principle for the safety issues in construction industries

The Pareto principle says that the for many events the 80% of the consequence is due to the 20% of the cause if we apply this to the safety and Identify the 20% of the causes we can reduce the potential accidents by 80% and this will automatically allow us to improve the safety performance in this way we used Pareto’s Principle. The problems identified must be solved but according to the effectiveness and the compatibility so now we use the Hartman’s principle of the Pareto’s priority index and find which safety issues must be addressed and solved with the immediate effect so that there increase in the quality of the safety in the industry. We selected the construction industries for the application of this principles as they are industries where we have many safety issues, ill-organized sector and the 11% of employment in India is in construction industry followed by the agriculture which is 53%. As India is the developing country and pushing toward the urbanization the employees in the agriculture sector are moving towards the construction or the manufacturing industries. In the last decade, there is a prominent increase in employees in the construction industries.

Published by: Ch R. V. B. S. Sarath ChandraResearch Area: Health and Safety

Organisation: University of Petroleum and Energy Studies, Dehradun, UttarakhandKeywords: Pareto’s Principle, Hartman’s Principle, Pareto priority index, 80 |20 rule safety, Prioritization, Construction industry, Employees

Research Paper

365. Exploring impact of Obstructive Sleep Apnea Syndrome (OSAS) with and without comorbidities on Quality of Life (QoL)

OSAS has become a significant public health problem with the increasing demands of modern society. It is often associated with serious and adverse consequences as it is most of the time associated with comorbid conditions. Objectives of this paper are: To assess the impact of OSAS with and without comorbidities on Quality of life in either gender of different age The sample of 205 patients diagnosed as having OSAS was divided into two groups depending on the presence and absence of comorbid conditions. OSAS patients with comorbidities were 179 and 26 patients were without comorbidities. The patients were administered with the specific evaluation scale SAQLI. In Group with Comorbidities- Quality of life (SAQLI) of patients was strongly affected by the degree of apnea severity and age. Gender comparison revealed more affection in females in domains Daily functioning, Social interactions, Emotional function. In Group without Comorbidities- Quality of life (SAQLI) of patients was strongly affected by the degree of apnea severity however, no correlation was observed gender and age wise in patients without comorbidities. Conclusion: The impact of OSAS in patients without comorbidities was significantly less than in patients with comorbidities.

Published by: Dr. Leena A. Deshpande, Dr. Amitabh K. DwivediResearch Area: Occupational Therapy

Organisation: Government Medical College, Nagpur, MaharashtraKeywords: OSAS, SAQLI, Quality of Life, Comorbidities

Research Paper

366. Design, development and fabrication of water pumping system using wind energy.

The project consists of designing, & testing the performance of a Lenz vertical axis wind turbine. Due to the increasing environmental & economic cost of fossil fuels, alternative sources of energy are needed. One such source is wind energy. Much of the current wind turbine research focuses on large scale wind turbine. An alternative approach is a small scale wind turbine design specifically to produce power at low wind speed Water is the primary source of life for mankind and one of the most basic necessities for rural development. The rural demand for water for crop irrigation and domestic water supplies is increasing. At the same time, rainfall is decreasing in many arid countries, so surface water is becoming scarce. Groundwater seems to be the only alternative to this dilemma, but the groundwater table is also decreasing, which makes traditional hand pumping and bucketing difficult. As these trends continue, mechanized water pumping will become the only reliable alternative for lifting water from the ground. Diesel, gasoline, and kerosene pumps (including windmills) have traditionally been used to pump water. However, reliable solar (photovoltaic [PV]) and wind turbine pumps are now emerging on the market and are rapidly becoming more attractive than the traditional power sources. These technologies, powered by renewable energy sources (solar and wind), are especially useful in remote locations where steady fuel supply is problematic and skilled maintenance personnel are scarce.

Published by: Swapneel D. Rawool, Shreyash S. Koyande., Sagar S. Vaidya, Shailendra S. Surve, Shubham S. PrasadeResearch Area: Automobile Engineering

Organisation: Independent ResearcherKeywords: Wind Turbine, Anemometer, Lenz

Research Paper

367. Parallel image filtering for faster image communication and comparative analysis

We all know that image processing is the field of massive calculations. So, in the major requirements list have parallel processing on the top. In this paper, we have demonstrated the parallel execution of image denoising. Also, the comparative analysis is there, to ensure that the algorithm takes sufficient time and show proficient results when parallel computing is done. Also, instead of taking a single image and applying all filters to it, we used multiple image array and loop through all the filters and followed by PSNR comparison of the same. We used parallel MATLAB for the parallel programming and then listed out all the parameters and their execution cost to be specifically determined.

Published by: Akshat Singhal, Nimit Agrawal, Jivjot Singh, Saksham SharmaResearch Area: Image Processing

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: Hybrid Filter, Median Filter, Mean Filter, Parallel, Social Media, Noise Removal

Research Paper

368. Food calorie estimation using machine learning and image processing

In today’s world a healthy lifestyle is a must for every individual and what they consume is of utmost importance in order to achieve the same. Our paper focuses on creating software which gives the calorie of the food which the user is going to consume. In order to achieve this, the software will take two images as input from the user, the top view and the side view. The image will have a probe object as well which is a coin whose volume will be known. The food item in the image will be detected with the help of Faster R-CNN algorithm. We are using Faster R-CNN algorithm since it is the fastest among all the object detection algorithms. In Faster R-CNN we don’t use selective search algorithm on the feature map to identify the region proposals, we use a separate network is used to predict the region proposals. This makes it the fastest algorithm and therefore it can be used for real-time object detection. In the next step, we will segment the image using grabcut algorithm. It is needed for foreground extraction with minimal user interaction. After segmentation of images, the volume of the food item is calculated using the known volume of the probe object. After the calculation of volume, the mass of the food item is calculated with the help of formulas and then the calories of the food item will be calculated using the relation between mass and calories.

Published by: Shaikh Mohd. Wasif, Swapnil Thakery, Amir Nagauri, Sheetal Ignatius PereiraResearch Area: Computer Engineering

Organisation: K. J. Somaiya College of Engineering, Mumbai, MaharashtraKeywords: Machine learning, Calorie estimation, Image processing

Research Paper

369. Child tracking system

There are many cases of missing children. This project proposed a technique to track their child location. The child has no need to carry the mobile phone. This system makes the use of android mobile and a GPS device. The parent can track their child location with the help of GPS and GSM. The location is sent to the parent mobile with the help of google map. We have to define the area of the child’s school and whenever the child is out of the defined location then alert message will be sent to the parent’s mobile phone. There is one more concept in which a child can press the help button when he will be in trouble and the alert message will be sent to all the contacts added in the emergency help.

Published by: Sweta P. Thakur, Snehal J. Badhe, Nishigandha R. Parkhe, Puja PadiyaResearch Area: Android GPS

Organisation: Ramrao Adik Institute of Technology, Navi Mumbai, MaharashtraKeywords: Android, GPS

Research Paper

370. Configuration of anti-collision system for stacker and reclaimer

This Paper deals with the solution for collision detection in the area of industrial machines. Now a day’s, the world is focusing to improve the industries with automation. In order for the automation, the requirement of workers will decrease and time-consuming to do the job is also decrease but protecting the device from collision becomes difficult because sometimes we require more than one system to complete the work in small areas. In these situations, there will be a collision between those machines. Due to this collision, devices can cause damage to the equipment’s as well as the workers in that field. Thus collision detection and collision avoidance are very important so that we provide the anti-collision solution. In this paper, we describe the theoretical introduction, practical solution and also real application

Published by: Neelapu Vinay, Sandeep Sivvam, Jyothi Lakshmi T. S.Research Area: Automation

Organisation: Gayatri Vidya Parishad College for Degree and P.G Courses (A), Visakhapatnam, Andhra PradeshKeywords: Anti- collision, Stacker & Reclaimer, Radar, Radio modems, Controller

Research Paper

371. Forensic analysis on Android wear

With smartphones floating everywhere in the market, it will not be wrong to say that we are living in a smart era. Nowadays along with Smartphones, the use of wearable devices is also on rising, in which smartwatches are topping the charts. Even though small, these devices contain a lot of useful information which can be used as potential evidence in case of cyber crimes. This paper defines the concept of Android wear along with outlining the basic architecture. It also covers the procedure of data extraction from these smart devices and collection of artifacts even in the absence of mobile phone. The paper explores smartwatches as a potential source of evidence along with the crucial information it stores which can be used to solve cybercrimes.

Published by: Sana Shekh, Dr. Atul Kumar Pandey, Ankur RajputResearch Area: Forensic Science And Technology

Organisation: National Law Institute University, Bhopal, Madhya PradeshKeywords: Android wear, Smartwatch forensics, Digital forensic, Internet of Things, Forensic investigation

Research Paper

372. Effect of adding clotrimazole lozenges in reducing the severity of radiation/chemo- irradiation induced oral mucositis in patients with head and neck malignancies

This paper aims to determine the effect of clotrimazole lozenges in addition to soda bicarbonate mouthwash and compare it with soda bicarbonate mouthwash only, in reducing radiotherapy/chemoirradiation induced oral mucositis in patients with Head and Neck Malignancies. A randomized controlled trial was conducted. Arm A - Radiotherapy/Chemoirradiation who were randomized to receive clotrimazole lozenges and soda bicarbonate mouth wash. Arm B- Radiotherapy/Chemoirradiation who were randomized to receive soda bicarbonate mouthwash only. Fifty-six patients were accrued in the trial, 28 in control arm and 28 in study arm. Fifty-two patients completed the treatment protocol. 4 patients in control arm defaulted due to various reasons. A number of patients in the control Vs study arm of Chemoirradiation group were 16 Vs 16 and in Radiotherapy group 12 Vs 12 patients. The occurrence of Grade 3 mucositis was more in the control arm 30% vs. 40% and the onset was later among patients in the study arm (week 3). In the Chemoirradiation group requirement for analgesic (92.8% vs. 53.8%), topical anaesthetic (35.7% vs. 7.6% - significant), occurrence of mouth pain(28.5% vs. 15.3%) and Ryles tube feeding (28.5% vs. 15.3%) were less in the study arm and also tolerated more number of cycles of concurrent chemotherapy (76% vs. 14% p= 0.036). A number of patients having a break in treatment (0% vs. 42.8% -significant) and occurrence of oral thrush (32% vs. 9%) were less in study arm of chemoirradiation and Radiotherapy. Nausea and vomiting were the predominant complaints in study arm probably induced by the chemotherapy. The occurrence of dryness of oral mucosa and throat was more in study arm of chemoirradiation group but less in radiotherapy only group.Overall the addition of clotrimazole lozenges to soda bicarbonate mouthwash along with oral care protocol during treatment showed significant benefit in decreasing the incidence of oral thrush.

Published by: Dr. V. Srinivasan, Dr. P. Anandhi, Dr. S. Ashok KumarResearch Area: Radiation Oncology

Organisation: Government Arignar Anna Memorial Cancer Hospital and Research Institute, Kancheepuram, Tamil NaduKeywords: Soda bicarbonate mouthwash, Clotrimazole lozenges, Oral mucositis, Radiotherapy and Chemoirradiation

Technical Notes

373. Benefits of Turmeric

This paper explains a few benefits of turmeric. It belongs to family Zingiberaceae Indian turmeric is considered to be the best in the world. Erode, a city in South India state of Tamil Nadu is the world’s largest producer of turmeric and the most important trading centre for turmeric. This paper also defines the major constituent of Turmeric.

Published by: SrinidhiResearch Area: Importance Of Turmeric

Organisation: Sarojini Naidu Vanita Pharmacy Maha Vidyalaya, Secunderabad, TelanganaKeywords: Health, Advantage, Ayurveda, Cosmetic, Medicinal value

Research Paper

374. A comparative study on intercooler for turbocharged unit using mathematical modelling

In today’s era pollution is a major problem of the environment. But vehicles are the major cause of environmental pollution to overcome from this effect in BS3 engines intercooler is used to cool down the compressed air temperature from the turbo charged unit. The purpose of the research paper is to take mathematical modeling of an intercooler and reduce the outlet temperature by cooling it down with some modification.

Published by: Pranay A. Nimje, Kiran K. Jadhao, Shubham V. Thakare, Shital G. Gore, Avinash P. SarkateResearch Area: Mechanical Engineering

Organisation: Babasaheb Naik College of Engineering, Pusad, MaharashtraKeywords: Intercooler, Turbocharger, Mathematical modelling

Research Paper

375. Prediction model for brain tumor patients based on MRI images

The paper presented here describes the predicted survival time for brain tumor patients using Magnetic Resonance Imaging (MRI). The accuracy is improved using the denoising wavelet transform (DWT) method. For this work BraTS, a dataset is used. MRI images are used to extract the histogram features so that the prediction model can be trained using the machine learning methods. MRI information is damaged due to the noise in MRI imaging. And the 2D wavelet transform was able to improve the results. The SVM with a 10 folds cross-validation helps to achieve the best accuracy by Daubechies 4 level 4 (db4-L4). With the same 10 folds, Daubechies 2 level 1 and 3 produces better results when the age factor is removed. An accuracy of 66.7% is achieved with a 10 % hold validation method in Daubechies 2 level 3.

Published by: Ashutosh Kaushik, Ankit Kumar, Rashmi K. A.Research Area: Image Processing, Machine Learning

Organisation: S. J. C. Institute of Technology, Chikkaballapur, KarnatakaKeywords: Denoising wavelet transform, Machine learning, MRI, Histogram, MRI images, Glioma brain tumor

Research Paper

376. Education system

What is happening to our education system nowadays? Public and private sector have man difference that leads to a lack of knowledge. After coming of the English system the Vedic Gyan that are given in gurukuls have become less important and that place is taken by English. The difficulties faced by students in both private and public school is also discussed in this paper

Published by: Shubham Goyal, Monika BazzadResearch Area: Mechanical Engineering

Organisation: Mahavir Swami Institute of Technology, Jagdishpur, HaryanaKeywords: Education system, Private School, Public School

Research Paper

377. Influence of water on birds and insect pests in the paddy fields of Kannur district, Kerala

The vast water bodies of a paddy field attract avian fauna. These water bodies serve as feeding, breeding, nesting and roosting places for the birds. During the winter, migratory birds arrive the water bodies. Since Mundakan (Rhabi) season coincided with the winter season, there was the highest number of birds in the paddy field. Most of the birds were insectivorous and carnivorous. Insectivorous birds consumed insect pests of paddy and as a result, the number of insect pests in the paddy field was less.

Published by: Prabhakaran P. V., Dr. Aravindan TharemmalResearch Area: Agriculture

Organisation: Sree Narayana College, Kannur, KeralaKeywords: Mundakan (Rhabi), Fresh Water Paddy Field (FWPF), Coastal Paddy Field (CPF), Midland Laterite Hillock Paddy Field (MLHPF)

Research Paper

378. Eyeball controlled wheelchair using Raspberry Pi

In the growing world of technological advancements, here comes another small uphill. The Eyeball Controlled Wheelchair (ECW). The major purpose of this concept is to make locomotion possible, not only to people who find it difficult to move with their legs but also people whose motor limbs are not functional. Thus controlling a wheelchair with just eyeball movement. The applications of the eye tracking and movement are more efficiently rather than controlling the wheel-chair with a Remote Control operated by motor organs.

Published by: Ramkiran Venkatesh, Kedarnath Reddy V., Saiteja Paidimarri, Rajesvari M.Research Area: Electronics and Communication

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Eyeball, Wheelchair, Raspberry Pi

Research Paper

379. Acute school bus surveillance and notification system

Everywhere around the world, school children’s safety has become a major priority for both the parents and also the school administration. Every parent thinks about the safety of his/her kid. Then why not think about the safe transportation facility that could be provided by the schools? The major concerns of both the parents and the administration are about the route that the buses take, student’s attendance on the bus, and also the speed that the bus travels with. Another concern that the school administration might face is the usage of fuel by the driver. The proposed system improves the safety of the children along with giving the parents and the administration of peace of mind. This work displays a framework in which it gives a presentation about the monitoring of the bus using a GSM module along with the location of it, the information about the student present on the bus using the RFID Tag, and when in an emergency, the motor is controlled by the relay module, with the help of an ultrasonic sensor the level of fuel can be identified and also the speed of the bus is calculated. These hardware models are connected to one another by the microcontroller and from this information about the student attendance, the speed, the fuel level is shown to the administration with the help of cloud through a Wi-Fi module. In this manner with a wireless module, we can ensure the safety of each and every child present in the bus and also parents and the school authorities can keep a tab on the children and also the driver’s behavior.

Published by: K. Sree Veda Samhitha, Abdul Gaffar H.Research Area: Internet Of Things

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: RFID, GSM Module, IoT, Safety, School Bus, Sensors

Survey Report

380. IoT based home automation and security systems: A literature survey

With the significant growth of internet usage across the globe, the Internet of Things (IoT) has become an emerging solution for connecting and controlling real-world objects ranging from industrial machines to home appliances to the internet. One of the major applications of IoT technology is used in the home automation industry to build smart homes. These home automation systems allow users to perform and complete daily activities when they are busy with other tasks. Smart homes have the ability of remotely connecting, monitoring and controlling various home appliances and other objects over the internet. The smart homes are laid with various types of sensors that act as an interface for wireless communication and control between the user and the home appliances. Various types of sensors play a major role in making a home smarter, safer and automated.

Published by: Somraj Chowdhury, Rajkumar Jain, Thimmaiah M. B., Prajwal R., Rakesh K. R.Research Area: Computer Science & Electronics

Organisation: Vidyavardhaka College of Engineering, Mysore, KarnatakaKeywords: Internet of Things (IoT), Wireless, Smart home, Sensor

Research Paper

381. Vehicular pollution and status monitoring using RFID

Vehicles on the road are the primary cause of atmospheric pollution. With the increase in vehicles, the air quality has been degraded to such a level that it causes various health issues like asthma, bronchitis, etc. These vehicles release many poisonous gases like carbon monoxide, nitrogen oxides, sulfur dioxide which leads to harmful effects on human health by causing lung irritation and various respiratory diseases. This degradation of air quality has also made our environment more vulnerable to some serious environmental issues like global warming. The project basically focuses on vehicle pollution monitoring. In this project, we demonstrate the idea of pollution control in the vehicle from a remote location. If any person who is driving a car and needs to check his car’s pollution level then he can check it using our app. The project monitors the pollution level on roads by using RFID technology and also measures the various types of pollutants and their level in the air.

Published by: Mavuduru L. S. Lalita Indraja, Chhavi Sharma, Prachi KhairwalResearch Area: IoT

Organisation: Inderprastha Engineering College, Ghaziabad, Uttar PradeshKeywords: RFID, IoT, VB, Vehicular pollution, Gas sensor

Review Paper

382. Improving the quality of care and operational efficiency of Indian hospitals through mobile personal health records- A detailed study of VYTAL mobile app

Healthcare spending in India is witnessing a rapid growth of 12%, estimated to reach $195.7 billion by the year 2018. Indian families are becoming aware and not shying away from spending on quality care for their loved ones. Some of the contributing factors of these trends have been rising incomes, lifestyle diseases and increasing access to insurance. To meet the consumer demands, healthcare providers are also gearing up to standardize the quality of service delivery, control cost and enhance patient engagement. Strong mobile technology infrastructure and notable technology initiatives have helped in fuelling this trend. This paper studies one such important initiative that holds great promise in improving the quality of care and reducing costs i.e. digitization of health records through mobile apps that easily connect families with the healthcare ecosystem. The findings in this paper are based on our study of Vytal Healthtech applications, various surveys conducted with clinical and administrative heads of leading Indian Hospitals and interview with medical specialists. This paper discusses the applicability and benefits of such technologies and highlights the right features that address the requirements of Indian healthcare providers, patient communities and Indian urban families. The findings can be of tremendous use to progressive Indian healthcare providers and policy makers

Published by: Prashant H. Pawar, Gunjan JainResearch Area: Management

Organisation: Singhania University, Jhunjhunu, RajasthanKeywords: Medical records, Indian hospitals, Healthcare, Indian hospitals

Research Paper

383. Design and fabrication of automatic plantation device for cotton seeds

In our project, we select automatic plantation or sowing device for cotton seeds. It sowing and plantation of cotton seeds in the soil of the farm. For that, we use our device assemblies like a cylinder, cone teeth, holder, ball bearings, cultivator, nut and screw. This all assembly will complete our sowing device final construction. This each component have the specific functions work the brief function of each component is as like below.

Published by: Kadiya Kishan D., Shah Alap P.Research Area: Agricalchar

Organisation: Samarth College of Engineering and Technology, Himatnagar, GujratKeywords: Ball bearing, Cone teeth, Cylinder, Holder, Solid rod, Hub

Research Paper

384. Study on the Awareness of Youth in Youtube Educational Programme

A Youtube educational program is a program written by the institution or ministry of education which determines the learning progress of each subject in all the stages of formal education. Besides the primary educational program, some schools use a different educational program written by another source which uses different learning progress - either in some subjects, such as the Mofet educational program in Israel or in all subjects, such as special education.

Published by: Akansha MaheshwariResearch Area: Media

Organisation: School of Broadcasting and Communication, Mumbai, MaharashtraKeywords: Youth, Youtube Educational Programmes, Media Habits

Research Paper

385. Influences of Islamic Architecture on the Architecture of chosen temples in the vicinity of Gulberga, Bidar and Bijapur Karnataka India

Islamic Architectural influence on Hindu temples in the areas of Gulberga and Bidar and Bijapur was studied. The paper tries to examine the Islamic Architectural influence on temples in the areas of Gulberga, Bidar, and Bijapur. For the purposes of the study the first two capital cities of Bahamani kingdom namely Gulberga and Bidar have been chosen, the next capital is that of Bijapur which was the capital of Adilshahi. The research proves in many ways the influence of Islamic Architecture in terms of planning, socio-cultural, socio-political, scenarios, on a culture which is very different from Islam.

Published by: Hrishikesh. S. PratinidhiResearch Area: Architecture

Organisation: Ramesh Phirodia College of Architecture, Walunj, MaharashtraKeywords: Influences of Islamic Architecture on Hindu temples

Research Paper

386. Correlation between the water level and the growth of weeds in the paddy field in Kannur District, Kerala

The presence of water in the field appears to inhibit the growth of weeds, which are largely terrestrial or semi-aquatic species. The lack of retention of water in the Midland Laterite Hillock Paddy Field (MLHPF) favored the excess growth of weeds. But in the other two regions (ie FWPF and CPF), the weed growth was less because these regions were filled with water up to a certain extent during the southwest monsoon.

Published by: Prabhakaran P. V., Dr. Aravindan TharemmalResearch Area: Agriculture

Organisation: Sree Narayana College, Kannur, KeralaKeywords: Weeds, Fresh Water Paddy Field (FWPF), Coastal Paddy Field (CPF), Midland Laterite Hillock Paddy Field (MLHPF)

Research Paper

387. Identification of currency denomination using image processing

This paper aims to solve the problem of detecting a paper currency and output the result as speech. The developed model accepts an image from a webcam (RasPi Camera). The Raspberry Pi’s image processing algorithm then extracts certain features from this image and matches them against a set of training data. When an appropriate match of the acceptable threshold is found, the device outputs the denomination value through speech synthesis. Moreover, this paper also compares two methods of image processing namely, Brute Force Matcher Algorithm and Convolution Neural Network Algorithm. Finally, the pros and cons of both the methods are evaluated and the best algorithm is ascertained.

Published by: Gokul Ramasamy, Sakthi SubramanianResearch Area: Embedded Systems (Electronics and Computer Engineering)

Organisation: Amrita Vishwa Vidyapeetham, Coimbatore, Tamil NaduKeywords: Image processing, Brute force matcher, CNN algorithm, Raspberry Pi, Visually challenged, Currency denomination

Research Paper

388. Extensions of Kannan Fixed-Point theorem on complete metric spaces and on generalized metric spaces

In this paper we get sufficient conditions for the existence of unique fixed point of Kannan type mappings on complete metric spaces and on generalized complete metric spaces depended on another function.

Published by: Dharmendra Singh Rajput, Anil Rajput, Rucha AthaleyResearch Area: Mathematics

Organisation: Career Point University, Kota, RajasthanKeywords: Fixed point, Contractive mapping, Sequentially convergent, Subsequentlly convergent

Review Paper

389. Noise reduction in electrocardiogram using LMS algorithm based on adaptive filtering

This project tells about the algorithms of adaptive filters which is for reduction of noise in these heat waves. There are different types of algorithms like NLMS, LMS, and RLS. In those types there are only LMS is used mostly for noise reducing because it produces low MMSE than all of those algorithms so for the best accuracy the LMS algorithm is used. By using mat lab we calculate the performance. The measures we calculated in mat lab is in range of convergence value and MMSE value. When we decrease the step size of noise will also decrease. If it is increased convergence value to increases, then the rate of noise also will increase.

Published by: Jayaprakash A., Manikanta Sai G., Satya Praveen P., Vishnu Teja I., Mohammed Arif A.Research Area: Electronics And Communication Engineering

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Least Mean Square(LMS), Adaptive Filtering, Noise Cancellation.

Research Paper

390. A secure client side deduplication scheme in cloud storage environments

Freshly identified and endorsed the trend of holding cloud-based services for large scale content storage, processing, and distribution. Security is the top concerns for open cloud environments. Towards these security challenges, we propose and implement, on Open Stack Swift, a new client-side deduplication scheme for securely storing and sharing outsourced data via the public cloud. The originality of our proposal is twofold. First, it ensures better confidentiality towards unauthorized users. That is, every client computes a per data key to encrypt the data that he intends to store in the cloud. hence, data access is with the data owner. Second, by accessing rights in the metadata file, an authorized user can decipher an encrypted file only with his private key. It elaborates a computationally low-cost method for making all log entries generated prior to the logging machine's compromise impossible for the attacker to make an attempt and also impossible to undetectably modify or destroy.

Published by: Prateek Naharia, Eshan Pacheriwala, Soumyajyoti Dutta, M. VinodhiniResearch Area: Information Technology

Organisation: SRM Institute of Science and Technology Chennai, Tamil NaduKeywords: P-O-W - Proof of Ownership, AES - Advanced Encryption Standard, DES- Data Encryption Standard, SDFS - Serverless Distributed File System, CPU - Central Processing Unit, JAVA -> platform independence, DFD -> Data Flow Diagram, UML -> Unified Modelling Language, SRS -> Software Requirement Specification, SQL -> Structured Query Language, IDE -> Integrated Development Environment

Research Paper

391. An implementation framework for real-time spam detection in Twitter

With the expanded prominence of online informal community, spammers discover these stages effectively available to trap clients in noxious exercises by posting spam messages. In this work, we have taken the Twitter stage and performed spam tweets identification. To stop spammers, Google Safe Perusing and Twitter's BotMaker instruments identify and square spam tweets. These instruments can square noxious connections, anyway, they can't ensure the client continuously as ahead of schedule as could be expected under the circumstances. Along these lines, businesses and specialists have connected diverse ways to deal with make spam free informal community stage. Some of them are just founded on client-based highlights while others depend on tweet based highlights as it were. Nonetheless, there is no extensive arrangement that can solidify tweet's content data alongside the client based highlights. To illuminate this issue, we proposed a system which takes the client and tweet based highlights alongside the tweet content component to order the tweets. The advantage of utilizing tweet content element is that we can recognize the spam tweets regardless of whether the spammer makes another record which was unrealistic just with client and tweet based highlights. We have evaluated our solution with two different machine learning algorithms namely – Support Vector Machine and Random Forest. We are able to achieve an accuracy of 86.75% and surpassed the existing solution by approximately 17%.

Published by: Poornima N. C.Research Area: Data Scince

Organisation: Rajarajeswari College of Engineering, Bengaluru, KarnatakaKeywords: Spam detection, Twitter data, Spam, Non-spam

Research Paper

392. A novel approach for indoor-outdoor scene classification using transfer learning

Scene understanding and analysis has gained significant importance and widely used in computer vision and robotics field. Classification of complex scenes in a real-time environment is a difficult task to solve. Convolution Neural Networks (CNNs) is a widely used deep learning technique for the image classification. But the training of CNNs is not an easy task since it requires large scale datasets for training. Also, the construction of CNN architecture from the scratch is a complex work. The best solution for this problem is employing transfer learning which gives desired result with small scale datasets. A novel approach of Alexnet based transfer learning method for classifying images into their classes has been proposed in this paper. We selected 12 classes from publicly available SUN397 dataset out of which 6 are indoor classes and the remaining 6 are outdoor classes. The model is trained with indoor and outdoor classes separately and the results are compared. From the experimental results we found that the model exhibited the accuracy of 92% for indoor classes and 98% for outdoor classes.

Published by: A. Yashwanth, Shaik Shammer, R. Sairam, G. ChamundeeswariResearch Area: Deep Learning

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Indoor, Outdoor, Scene classification, Transfer learning, CNN, Alexnet

Research Paper

393. Fluidized bed with heat exchanger: An advance equipment for moisture removal from coal

In the rainy season, the coal from coal mines are totally wet and it takes lots of time (10 to 12 days) to get dry. Such type of coal cannot be used for the boiler. The Additional new equipment fluidized bed with heat exchanger for removal of coal moisture can be used. If CHP will work on such advanced equipment which is reliable and have less maintenance cost then the efficiency of the plant get an increase. In the present paper, the advance coal handling unit consists of a fluidized bed with heat exchanger. An integrated solution of coal handling plant is given to meet the increasing production needs.

Published by: Nilesh V. Pise, V. V. Dongaonkar, Shubham R. Lonkar, Akash A. KolheResearch Area: Mechanical Engineering

Organisation: Babasaheb Naik College of Engineering, Pusad, MaharashtraKeywords: Fluidized bed, Heat exchanger, Flue gases

Research Paper

394. The frequency of Vaginal Birth After Cesarian-section in pregnant women at Malalai and Shahr-Araa teaching hospitals

Vaginal Birth After Cesarean Section is one of the reasonable and practical methods to control and decrease the rate of unnecessary and elective Cesarean sections in women, which in turn decreases the potential risks resulting from C-section affecting mother and baby. Therefore, it is imperative to have a clear understanding of the context, factors, and goals of such interventions. Goal: The major goal of this research paper is to find the incidence of Vaginal Birth After Cesarean-section (VBAC) in pregnant women at Malalai and Shah-Araa Teaching Hospital. Method: This research uses the Descriptive Cross-Sectional method. The data is taken from patients’ documents who were admitted to the Malalai Maternity Hospital and Shahr-Araa Teaching Hospitals for VBAC during April and May of 2018. Results: The current study which took place for two months of April and May of 2018 in Malalai Maternity Hospital and Shah-Araa Teaching Hospital reveals that that 50 out of 120 women who had previous scars of Cesarean section (41.6%) received VBAC, who averagely aged 28±6 (±SD) years within the age interval of 20-40 years. The median of pregnancy counts was 2 and its range was 1-11, the median of birth spacing was 3 and its range was 1-12 and the median weight of baby was 3 Kilograms and it’s range was 1.5-4 Kgs and the average gestational age was 38±2 (±SD), It is seen with the highest incidence at 20-30 years of age, new-born with 2.5-3.5 kgs., gestational age of 39 weeks or higher, first parity, and a pregnancy gap of 2-4 years. Additionally, 4 of them had experienced premature rupture of the amniotic membrane. Final Result: The current study shows that by carefully selecting individuals, we can decrease unnecessary Cesarean sections through using VBAC, and performing this operation is directly dependent on the decision of obstetrics/gynecology professionals. Keywords: previous scar of Cesarean section, VBAC (Vaginal Birth After C-section), pregnancy.

Published by: Fahima AramResearch Area: Medical

Organisation: Kabul Medical University, Kabul, AfghanistanKeywords: Previous scar of cesarian-section, VBAC (Vaginal Birth After C-section), Pregnancy

Review Paper

395. Bone graft in a Crux

While the conventional periodontal therapies achieve management of periodontal diseases by repair, they are insufficient in reconstructing the lost structures. One major goal of periodontal surgical therapy includes regeneration of lost periodontal tissues including periodontal ligament, cementum and alveolar bone. The prerequisites for bone regeneration are cells, molecules, scaffold, and blood supply. Bone grafts provide the cells or may act as a scaffold for new bone formation. The search for an ideal bone graft perpetually continues. The following article presents an overview of the commonly used bone grafts in the management of periodontal affliction touching upon the topics of objectives and indications of bone grafts and their classification.

Published by: Dr. Manisha Mallik, Dr. Aaysha Tabinda Nabi, Dr. Rajat Sehgal, Dr. ToshiResearch Area: Review

Organisation: Buddha Institute of Dental Sciences and Hospital, Patna, BiharKeywords: Periodontal Diseases, Bone Graft , Regeneration

Research Paper

396. Automated road tolling system using RFID

In this endeavor we address the issues saw toll court and furthermore present ID structure for vehicles against which stolen and fiasco cases are chosen utilizing RFID. Right when vehicle encounters Toll Collection Unit it is named pilgrim or things passing on vehicle subject to its Unique Identification Number. A stock vehicle is weighed at TCU and in the event that it is over-load, by then accused for additional expense. UIN is passed to Central Server Unit where the correspondence gets deducted from record. Right when the night out is deducted at CSU it will show TCS to open the blockade and vehicle is permitted to pass. On the off chance that vehicle is perceived to be stolen at CSU it will display TSC not to open the blockade. Besides to vanquish the issue of endeavor at homicide cases crash territory part is acknowledged utilizing piezoelectric sensor in vehicle to perceive RFID of influenced vehicles. These subtleties can be utilized for further development.

Published by: Sai Sharan, Jagadeesh BabuResearch Area: Computer Science Engineering

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Web of vehicle, Offloading, Mist figuring, Traffic the board, Ongoing handling

Research Paper

397. City of things: Enabling resource provisioning in smart cities

This system is implemented in areas to find out the effect of global warming. The features humidity level of a certain area is necessary to find the exact status of how Global warming has been affected in certain areas. These details are calculated by sensors system had successfully accomplished the online auto-monitoring of the Humidity environment of a certain area. PH sensor, turbidity, conductivity sensor, flow sensor this sensor value, we calculate the continually and taking the data, analyze after any problem in the sensor value we will calculate to the water purity

Published by: Harsh Pandey, Arghyanil Das, Vinoth KumarResearch Area: Information Technology

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Auto-monitoring, PH sensor, Turbidity, Conductivity sensor

Research Paper

398. Department Application

The venture brings the whole manual procedure of a specific office online which is manufactured utilizing Android studio/java as a front end and MySQL Server as a backend. The fundamental reason for this task is to improve the way toward dealing with all the manual work by giving a web interface to HOD, Faculty, and Students. The HOD part comprises of various modules where Head of the office is mindful to enlist all the personnel of the specific office. The framework enables HOD to allot resources to the regarded subjects appropriately, likewise can see every one of the exercises done by the Faculty. The Faculty part has thought of enlisting the understudies of specific class relegated by the HOD. Educator performs a different errand, for example, taking the participation of the understudies utilizing QR code, transferring assignments and mark sheet for the specific class understudies as relegated. The Faculty can likewise have a balanced discussion over the application for clearing understudies questions. Understudy interface comprises of review the transferred data by the Faculty or HOD with the application and furthermore getting a warning via telephone for the equivalent. Understudies additionally need to examine the Faculty's QR code for participation.

Published by: Vrushali Kapse, Sachin Birhade, Janki Gupta, Manisha SonawaneResearch Area: Computer Engineering

Organisation: Shivajirao S Jondhale College of Engineering, Thane, MaharashtraKeywords: Faculty, HOD, Notification, QR code, Students

Review Paper

399. Image recognition system

Image recognition has been an active and challenging area of research. In recent years image recognition has received veritable attention from the research communities but it still remained very challenging in real applications. It plays a very important role in today’s world. Though we might have seen various applications and websites of text recognition, label detection and face detection they are all separate applications this review paper tells us how to combine them together so that user don’t need to download numerous software but just a simple image recognition system that uses Google cloud vision API. In image recognition, we have combined 3 things together that is text, label, and face. It should be noted that the combination of these three things together is nowhere found and might be difficult to evolve. This review paper will focus on scattering and separating the image by defining each element of the image by recognizing the text, detecting its label and detecting the face that can make the human work’s easy. By focusing on the history and evolution of the text, label and face recognition system we combine them together so that it can be used for security purposes, organization, computer software and it can also be used in the government field. This review paper will represent the limitations and superiorities of different techniques which are used for image recognition system.

Published by: Swati Dewangan, Sneha Dey, Megha Sahu, Seira TakResearch Area: AI and Machine Learning

Organisation: Bhilai Institute of Technology, Raipur, ChhattisgarhKeywords: Google cloud vision API, PHP, HTML, Text recognition, Label detection, Face recognition

Research Paper

400. Text and label reading using Raspberry Pi and Open CV

In this digital Age with the help of our cognitive abilities, we can see, hear and sense various new technologies and can communicate with them but this is not the case for visually impaired people In order for them to communicate with the world they need assistive technology and adaptive devices. The key idea of the project involves helping the sight challenged people. The Proposal of the project involves capturing an image with the help of a camera, recognizing it and extracting the content in the image using various data algorithmic techniques. With the help of this model people with blindness can be more independent with confidence. The major step in making this project a reality is to obtain images from the real world and recognize them with little to no latency and convert them into audio files that can be played. This can be executed out with the help of Open CV and Raspberry pi the main usage of the latter is its portability and compatibility which can be achieved with the use of battery backup functionality which can also be used for future endeavors. The size of the Raspberry pi soc permits the user to carry it anywhere and use it.

Published by: Shakthi Vel, W. Rohan, R. R. Raghavan, Somdeep ChoudhuryResearch Area: Computer Vision

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Optical Character Recognition (OCR) ,Open Computer Vision (Open Cv), Raspberry Pi, Image recognizing, Portability

Others

401. Credit card fraud detection using Random Forest Algorithm

This Project is focused on credit card fraud detection in real-world scenarios. Nowadays credit card frauds are drastically increasing in number as compared to earlier times. Criminals are using fake identity and various technologies to trap the users and get the money out of them. Therefore, it is very essential to find a solution to these types of frauds. In this proposed project we designed a model to detect the fraud activity in credit card transactions. This system can provide most of the important features required to detect illegal and illicit transactions. As technology changes constantly, it is becoming difficult to track the behavior and pattern of criminal transactions. To come up with the solution one can make use of technologies with the increase of machine learning, artificial intelligence and other relevant fields of information technology, it becomes feasible to automate this process and to save some of the intensive amounts of labor that is put into detecting credit card fraud. Initially, we will collect the credit card usage data-set by users and classify it as trained and testing dataset using a random forest algorithm and decision trees. Using this feasible algorithm, we can analyze the larger data-set and user provided current data-set. Then augment the accuracy of the result data. Proceeded with the application of processing of some of the attributes provided which can find affected fraud detection in viewing the graphical model of data visualization. The performance of the techniques is gauged based on accuracy, sensitivity, and specificity, precision. The results is indicated concerning the best accuracy for Random Forest are unit 98.6% respectively.

Published by: Vaishnave Jonnalagadda, Priya Gupta, Eesita SenResearch Area: Data Science

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Random forest algorithm, Criminal transactions, Credit card

Research Paper

402. Dynamic spectrum sharing among the operators using AODV

Dynamic spectrum sharing aims to produce flexible spectrum usage and improve spectrum utilization with time. we have a tendency to propose two optimization models exploitation random optimization algorithms during which the secondary operator: 1) spends the stripped price to realize the target Grade of Service (GoS) assuming unrestricted budget or 2) gains the highest profit to realize the target GoS assuming restricted budget. we have a tendency to assume that there are spectrum resources accessible for secondary operators to borrow under merchant mode. Results obtained from every model are then compared with results derived from algorithms during which spectrum borrowings are random. Comparisons showed that the gain within the results obtained from our projected stochastic-optimization framework is considerably beyond heuristic counterparts. Second post-optimization performance analysis of the operators in the form of blocking probability in various scenarios is investigated to work out the probable performance gain and degradation of the secondary and primary operators, respectively.

Published by: Julakanti Praveen Reddy, A Abhishek Reddy, G. VikramResearch Area: Mobile Communication

Organisation: Matrusri Engineering College, Hyderabad, TelanganaKeywords: Grade of service, Budget constraints, Blocking probability

Research Paper

403. Approach for improving data security in cloud computing

Multi-client framework for access control to datasets set away in an untrusted cloud condition. Appropriated storing like some other untrusted condition needs the capacity to check share data. Our framework gives a path of authority over the informational index away in the cloud without the supplier adventure. The fundamental instrument of access control structure is the figure content arrangement trademark based encryption plot with dynamic properties. Utilizing a blockchain based decentralized record, our framework gives the steady log of all vital security occasions, for example, key age, get the chance to strategy undertaking, change or refusal, get the chance to ask for. We propose a huge amount of cryptographic conventions guaranteeing the security of cryptographic endeavors requiring conundrum or private keys. Just ciphertexts of hash codes are exchanged through the blockchain record. The model of our structure is acknowledged utilizing sharp contracts and endeavored on square chain sort out. Here is proposed structure as a customer if they are going to enroll in that account director will give assorted keys to each customer it takes after a private key in the wake of selecting a customer they can log in and they can exchange all of the reports what they need while exchanging time the substance everything will be encoded and for that one open key will be produce these all will be secured in cloud database . As a customer they have an alternate privet key which was given by the manager so they can log in and they can get to that account if they have to exchange they can exchange else they have to get any record they can get that record by using of cloud they can see all the customer archives if they need any record they have to send sales to executive .if overseer to recognize that request they can get that interface if the customer need that record they have to click that record in case you clicked that archive, by then it will be asked first it will ask private key . obviously, it will ask with respect to whether two keys was composed then nobody however they can prepared to download else they can't prepared to down weight .

Published by: L. Venkat, Lakshman Babu K., Nikhith, Ethirajulu V.Research Area: Computer Science Engineering

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Cloud storage, Attribute-based access control, Cipher text-policy attribute-based encryption, Blockchain

Case Study

404. The impact of various child-centric NGOs in the city of Vellore

In this paper, we discuss the impact of various child-centric Non-Governmental Organizations present in our city. This will help volunteers to choose better organizations for their efforts and at the same time provide a platform for the organizations to improve their mistakes. Over the past decade, many NGOs and social change organizations have mushroomed in India, but very few have expanded on the basis of scale and community impact. After all, scraping through red tapestry in government is a herculean task to be able to set up an NGO in the first place.

Published by: Ansha Sondhi, Nehalika RamchandaniResearch Area: Social Work

Organisation: Vellore Institute of Technology, Vellore, Tamil NaduKeywords: NGOs, Child development, Ayuda, MAD, Fepsi, Volunteering, Impact of NGO

Review Paper

405. A review on geopolymer using fly ash and GGBS

If we talk about today’s era, Concrete is the most important aspect in the present scenario in terms of construction. All the construction is being done with the help of this building material. Use of cement is rising on the peak from the last few decades due to the enormous demand for construction of megastructures all around the globe. In addition to that cement is the only material whose demand is increasing day by day in order to meet the needs of mankind. Subsequently, the price of cement is also increasing as its demand is increasing profoundly and also it available limited only. Manufacturing of cement results in the emission of CO2 and other gases which contribute to global warming and which further contribute to climate change and thus it is one of the most complicated material. Its use cannot be stopped but can be limited by using various materials. In order to dilute the use of cement, various alternatives and substitutes have been manufactured which is contributing to less pollution as compared to cement. Since cement cannot be fully replaced, it has been partially replaced with geopolymer using fly ash and GGBS.

Published by: Baljot KaurResearch Area: Civil Engineering

Organisation: Chandigarh University, Mohali, PunjabKeywords: Fly ash, GGBS, Cement

Research Paper

406. Effect of demographic variables on emotional intelligence: A study on college students in Visakhapatnam

This study is aimed to examine the effect of demographic variables (age, qualification, and community, of gender and socio-economic status) impacts on emotional intelligence among early adulthoods. A sample of 116 graduate and post graduate college students both male and female at 18-25 years age group students participated in this study. Descriptive statistics and t test findings revealed thatthis emphasizes the role of financial status and community of a person on his/her which is directly influence on the areas of Adaptability and sensitivity which are domains of emotional intelligence.

Published by: Subhashini Akurathi, P. Swathi, G. Ravi KumarResearch Area: Psychology

Organisation: Andhra University, Visakhapatnam, Andhra PradeshKeywords: Emotional intelligence, Early adulthood, Demographic variables

Research Paper

407. An efficient approach for sarcasm detection in tweets using polarity flip

Sentiment analysis is the qualitative method that uses natural language processing, text analysis, and computational linguistics. The goal of sentiment analysis is to determine if a specific passage in the text shows positive, negative or neutral sentiment towards the subject. Social media platforms, like Twitter, offer a wide ability that allows users to express their thoughts by employing figurative language devices such as sarcasm to achieve different communication purposes. Dealing with such kind of content represents a big challenge for computational linguistics. Due to these difficulties and the inherently tricky nature of sarcasm, it is generally ignored during social network analysis. As a result, the outcome of such analysis is affected adversely. Also, nowadays, Customers use twitter as a platform to express their emotions and opinions about social issues, products or services. Lexicon based methods of text mining can at times fail to recognize sarcasm used by customers online. This has direct implications for companies using text mining on online content to identify new customers, address customer problems, and reduce customer turn rates or for any other CRM (Customer Relationship Management) activities. Thus, sarcasm detection poses to be one of the most critical problems which we need to overcome while trying to yield high accuracy insights from abundantly available data. This work considers sarcastic tweets (including those based on products) and proposes an effective approach to detect sarcasm. The system utilizes 21 features based on context, contrast, and emotions. The results show that sarcastic tweets inclined to have more polarity flips than Non-sarcastic tweets. Also, it is found that MLP and the Random Forest classifier tend to perform better than other classifiers with an accuracy of 94%.

Published by: Karthika K.Research Area: Computer Science Engineering

Organisation: Institute of Road and Transport Technology, Erode, Tamil NaduKeywords: Natural Language Processing, Machine learning, Twitter

Thesis

408. Suicide terrorism – Physical and mental destruction

Suicide terrorism is a troublesome phenomenon for all of us, the masses, to conceptualize and to entirely understand. Its very presence appears to straightforwardly negate quite a bit of what we think about fundamental human survival impulses, which obviously has consequences for the mannerisms by which we look to gauge such elusive factors as radicalization and ideological duty. Our comprehension of suicide psychological warfare can likewise shift contingent upon whether it depends on the subjective examination of specific contextual investigations, some other experimental strategy, or assaults executed by explicit gatherings or sorts of gatherings, groups, mental institutions. Terrorist activities and government responses to them portray a strong and dynamic transaction, with the moves of one side affecting those of the other. As one model, if any terrorist organization attacks and a state sends in their arms and army as the power to send a rebuffing message back, the terrorists may utilize that activity to negatively persuade the commoners or the mob, resulting in turning the mob against the state. This is seen happening on the grounds of communal bias, power trip, inhumane methods of segregation from the nation which would only conclude in angering the civilians as well. Therefore, the findings would only address the terrorist activities and neglect the other end as that is something subject to the less important part of humanity and our community. Terrorism isn't legitimately characterized in all locales; the rules that do exist, in any case, by and large offer some normal components. Terrorism or lethal acts, to be psychological or physical violence include the utilization or danger of viciousness and looks to make fear, inside the immediate exploited people as well as among a wide gathering of people. How much it depends on dread recognizes fear based oppression from both traditional and guerrilla fighting. No doubt, customary military powers perpetually participate in fighting against the foe, their key methods for triumph is quality of arms. With the end goal to draw in and keep up the exposure important to produce across the board fear, terrorists must participate in progressively emotional, vicious, and prominent assaults. These have included hijackings, hostage takings, kidnappings, vehicle bombings, and, habitually, suicide bombings. Albeit, clearly arbitrary, the people in question and areas of fear-based terrorist groups or organizations assaults frequently are precisely chosen for their stun esteem. Schools, malls, transport and train stations, and eateries and dance club have been focused on both on the grounds that they pull in substantial groups and in light of the fact that they are places with which individuals from the non-military personnel populace are commonplace and in which they feel calm. The objective of terrorism, by and large, is to obliterate general society's feeling that all is well with the world in the spots most commonplace to them. Real targets some of the time additionally incorporate structures or different areas that are vital monetary or political images, for example, government offices or army bases.

Published by: Pranshu KabraResearch Area: Terrorism, Psychology, Sociology, Religion, Economics

Organisation: Symbiosis School for Liberal Arts, Symbiosis International University, Pune, MaharashtraKeywords: Religious effect, Political gain, Direct control over a larger community, Strong but swayed ideologies, Societal understanding, Various groups and events inflicting societal harm and agony

Research Paper

409. Industrial monitoring system

In our project, we are trying to implement IoT in the manufacturing area for monitoring the industries and obtaining the crucial data that can be used to implement automated decisions using machine learning for the safety of the workers in an industry an increasing the productivity and efficiency of an Industry. Also, we will discuss some the current trends in the Industrial IoT or Industry 4.0 and see If there could be any improvement that can be done in this sector and discuss challenges we can face in implementing IoT and how can be these challenges be addressed. Industry4.0 is a name given to the current trend of automation and data exchange in manufacturing technologies. It includes cyber-physical systems, the Internet of things, cloud computing and cognitive computing. Industry 4.0 is considered as the fourth industrial revolution. All these, when implemented to a Manufacturing Industry, can improve the production system and Safety of an Industry.

Published by: Rishab Garg, Mrinal Anand, Abhishek Yadav, S. Babeetha MurugananthamResearch Area: Embedded Systems

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Industrial IoT, IoT, Industry 4.0, Embedded system

Research Paper

410. Study on shrinkage properties of concrete with and without mineral admixtures

Structures that complied with code requirements still fail due to excessive cracking. Shrinkage is primarily responsible for such failures. Concrete shrinkage is of increasing concern when focusing on maintaining durable structures. Shrinkage in concrete can be broadly classified into two different stages, namely early age and later age. At early ages, the concrete is still moist and there are difficulties in measuring the fluid material. These difficulties have hindered comprehensive physical testing of shrinkage in plastic concrete. This project aims in evaluating the plastic shrinkage of different concrete mixes. Over time, the shrinkage induces cracking which can severely decrease concrete life expectancy. Such cracks can be mitigated by inclusion of materials such as synthetic fibers, shrinkage reducing admixtures, expansive agents and superabsorbent polymers. And the corresponding variation of compressive strength of these mixes is also studied.

Published by: John Kurian, Amrutha Sivan, Liya Mary P. L., Leanda J. Payyappilly, Elson JohnResearch Area: Civil Engineering

Organisation: Mar Athanasius College of Engineering, Kothamangalam, KeralaKeywords: Concrete shrinkage, Superabsorbent polymers, Fly ash, Plastic shrinkage time

Research Paper

411. Estimation of Land Surface Temperature using LANDSAT DATA: A case study of Agra city, India

Land Surface Temperature (LST) is an important indicator for the study of climate change, urban environment, heat balance studies, hydrological and agricultural process, and urban land use and land cover as well as user input for climate models. LANDSAT data is utilized for the number of applications such as environment study, digester and resource management. This study has been made to estimate, LST using Arc GIS over Agra, India, using LANDSAT 8 and 5 satellite data. The LST has been estimated with respect to Normalized Difference Vegetation Index (NDVI) values determined from the Red and Near Infrared bands. The Land Surface Emissivity (LSE) is retrieved directly from the Thermal Infrared bands. The present study focuses on ArcGIS Raster functions and Raster calculation using the thermal band 10 and 11 of Landsat 8 satellite and thermal band 6 of Landsat 5 on the month of April. The results are feasible to calculate NDVI, LSE, and LST with appropriate accuracy. In the last drive out the temperature variance in different land use and land cover area of Agra city, India.

Published by: Dr. Vishwa Raj Sharma, Kamal BishtResearch Area: Remote Sensing

Organisation: Shaheed Bhagat Singh College, University of Delhi, New DelhiKeywords: Remote sensing, GIS, Land Surface Temperature (LST), Land Surface Emissivity (LSE), Normalized Difference Vegetation Index (NDVI)

Survey Report

412. Automated shopping trolley for billing system

The modern technology has increased the standard of living for humans. There has been an emerging demand for quick and easy payment of bills in supermarkets. Every one of us craves for quality in everything we use in our daily lives. This project describes how to build an automated and time-saving system for the world of retail which will make shopping experience impetuous, customer friendly and secure. So, this has resulted in large crowds at shopping malls which have to lead to long lines at the billing counter because the cashier has to scan every product item and then enter it into the billing record. The prevailing billing system is a bit time-consuming. So, we thought of inventing a remedial electronic product to catch-up with this problem. We call it “Automated shopping trolley for billing system”.

Published by: Bhumika R., Harshitha G. Bhat, Chandana K., Meghashree R. T., Dr. Sangappa S. B.Research Area: RaspberryPi,Python

Organisation: Kammavari Sangha Institute of Technology, Bengaluru, KarnatakaKeywords: Smart shopping trolley, Barcode scanner, Raspberry Pi, LCD display

Research Paper

413. Automated blind spot vehicle parking with improved safety feature

The ultimate aim of this paper is to eliminate the accidents occurring in the vehicle parking at the blind spot (not visible) of the vehicle at the parking area or in the basements/dark. In the existing Parking Assistance System (PAS) there is no automatic brake applying EHCU encoded is available in the market. Hence in this project, I have an idea to write coding in the EHCU for automatic braking with respect to the output from the PAS ECU to apply the brake automatically.

Published by: S. Rajkumar, S. GowthamResearch Area: Automobile Safety

Organisation: Sona College of Technology, Salem, Tamil NaduKeywords: EHCU- Electronic Hydraulic Control unit, EMS- Engine Management System, ECU- Electronic Control Unit, EPB- Electronic Parking Brake, PAS- Parking Assistance System

Review Paper

414. Online terrorist detection system

Data mining is the extraction of pattern and knowledge from a large amount of data. This concept can be utilized in various real-life applications. One such congenial application is the online terrorist detection system. With expanding terrorist activities, it has turned out to be essential to control and stop its spread before a specific time. Internet is a noteworthy wellspring of spreading fear based oppression through videos and speeches. They use websites to mentally program people that would move vulnerable individuals to join terrorist associations. So here we propose an effective software to recognize such web properties and ban them naturally for human survival. In present situation utilization of the web is in the blast. Be that as it may, each coin has opposite sides, moreover, the utilization of web is valuable just as hurtful to individual. Late days numerous fear assaults were there on the net. Such fear related exercises are risky for people groups, association, and nations. The fear-based oppressor is utilizing the web to spread dread and structure psychological militant gatherings. By utilizing web they effectively do likewise. To trade data Internet foundation is utilized by various Terrorist cells and they enlist new individuals and supporters. To deal with such circumstance we propose a framework called ATDS.

Published by: S. Aishwarya, A. Janani, Manepally AlekhyaResearch Area: Data Mining

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Data mining, Text mining, Web mining, Field extraction, Clustering, Word extraction, Terrorist trend detection, data mining, User modeling, Anomaly detection, Log mining, Vector generator, Threshold, Clustering, ATDS (Advanced Terror Detecting System)

Others

415. Sensor navigation for blind

The fundamental point of this paper is to grow the electronic travel help for the visually impaired and outwardly debilitated people on foot by rising into the ultrasonic innovation. The paper speaks to an inventive task plan and execution of an Ultrasonic Navigation framework so as to furnish completely programmed deterrent evasion with capable of being heard warning for visually impaired people on foot. This visually impaired direction framework is protected, dependable and practical.

Published by: Naveen C., Noor Alleema N., Priyadarshini K., Thiluzhika R., Umang SharmaResearch Area: Information Technology

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Ultrasonic, Visually impaired, Navigation

Research Paper

416. Supervised vehicular operation using WAN

The need for vehicular supervision system is of the utmost need due to the sheer number of vehicles plying every day on our roads. With the rise in numbers of vehicles, there is also an increase in the need to prevent potentially fatal on-road incidents. Drowsiness and fatigue are large contributors to most on-road accidents. Prevention of such accidents can be achieved using a drowsiness detection system and drivers emotion recognition. Such a system employs recognition of facial expressions to identify emotions using a camera. The feed from the camera is processed to obtain instances of drowsiness or stress. Accordingly, tasks can be triggered such as slowing down or stopping the vehicle.

Published by: Deepak Kathoria, Noor Alleema, Srijan Mandal, Prabhat KumarResearch Area: Information Technology

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Drowsiness, Fatigue, Emotion recognition, On-road incidents

Research Paper

417. Cost effective optical mark recognition software for educational institutions

Optical Mark Recognition (OMR) is a technology for effectively extracting data from filled-in fields or bubbles on printed forms. The current systems available for OMR are very expensive and they detect only a marking scheme. Moreover, the image processing techniques used for scanning the OMR sheet also consumes a lot of time and is quite complex, as it includes various restrictions related to the positioning of the sheet. In this paper, a solution to this problem is proposed, where an OMR system is developed using a scanner or a multifunctional printer as an input. The quality of the OMR sheet used in this system is low cost and easily available to any educational institution. The image processing techniques are implemented with the help of PyCharm IDE that not only helps to detect various marking schemes like bubble shape mark and tick mark but also verifies the answers in the sheet and displays the total marks obtained by the student, in a more efficient manner. In order to make the system user-friendly, the GUI of the system is improved and personalized by integrating an online website with the OMR software that displays the results of individual student.

Published by: Vidisha Ware, Nithya Menon, Prajakti Varute, Rachana DhannawatResearch Area: Computer Science

Organisation: Usha Mittal Institute of Technology, Mumbai, MaharashtraKeywords: GUI, Image processing, Low cost, Optical Mark Recognition (OMR), Personalized, PyCharm IDE, User-friendly

Research Paper

418. Fire detection and extinguisher robot

Fire detection and Extinguisher Robot is a Hardware-based model used to extinguish the fire during fire accidents. It works in two modes autonomous mode and manual mode. In manual mode, the robot can be operated by use of remote control and live streaming camera. In autonomous mode, Robot has been developed which features to move in the direction with respect to the fire intensity. The flame sensing capability of the robot is varied by the flame sensor, above which the robot starts responding to the fire. The temperature sensor provides a backup to the flame sensor if needed in vast circumstances. The most added advantage of this Robot is that it turns ON automatically as it detects the fire around its surroundings, using flame sensor and tries to extinguish it by moving in the direction with respect to the fire. The Robot shield is coated with aluminum boards that are capable of withstanding very high temperatures. The Robot finds its applications in Rescue operations during fire accidents, where the possibility for servicemen to enter the fire-prone areas is very less and also during wars to perform rescue functions.

Published by: Pruthvi R., Mohan Varma K., Vinayaka L. S., Veeresh M., Vani A.Research Area: Robotics

Organisation: Sapthagiri College of Engineering, Bengluru, KarnatakaKeywords: Fire Accidents, Robotics, Smart Sensors, Extinguisher Robot, Safety

Research Paper

419. Feature extraction in emotion recognition: An analysis of emotion using Praat

Machine learning is being used to help robots to detect human emotions. Speech is an important tool to recognize emotion. It has been observed after reading different research papers from different researchers that pitch and intensity are major features to detect the emotion of sound. Consequently, the present research study is oriented towards discussing aspects pertaining to emotion recognition using speech. This paper presents the illustration of emotions that can be recognized by the speech of a person. Future research will be focused on enhancing features like energy, frequency, and amplitude of a speech.

Published by: Kunal Kapoor, Lokesh Kumar, Kshitiz Sagar Verma, Kunal SehgalResearch Area: Computer Science Engineering

Organisation: Chitkara University Institute of Engineering and Technology, Patiala, PunjabKeywords: Artificial Intelligence, Machine learning, Speech recognition, Speech features, Speech intensity, Pitch

Dissertations

420. Kinetic study of growth for high biomass production using Chlorella Pyrenoidosa

In this paper, biomass production parameter optimization was performed using Chlorella medium by design of experiment (DOE) with the help of Qualitek-4 software with bigger is better as quality characteristics with four media components and they are studied at three levels in submerged culture condition. I have studied four parameters like pH, Na2CO3, NH4Cl, and NaNO3 with three levels. These factors are optimized based on their S/N ratios are obtained from Qualitek-4 software and their significant individual interactions, and interactions with each other have been studied. During experimental studies, I had worked on the optimization of several parameters. It has found that there was an enhancement of chlorella pyrenoidose by 6% in chlorella medium

Published by: Atul ChavanResearch Area: Algal Biomass

Organisation: Lovely Professional University, Phagwara, PunjabKeywords: DOE (Design of Experiment), Chlorella Pyrenoidosa, Anova, S/N ratio, Taguchi methodology

Research Paper

421. A study on HRD practices in small scale industries (with special reference to Davangere district)

A study of Human Resource made in SSIs located in Davangere district. India, The outcome of the study indicates that efficient management of human resource is crucial factor and determining the growth and development. This is particularly true in case of SSI where owners are forced to have a close and more personal association with their employees to develop a strategic plan for SSI located in Davangere district. In this study recommendation of activity elimination, activities reduction and sharing are suggested. Further move support from the Top executive management to create a special department for HRM and the resource to allocated to increase the efficient implementation of HR practices in small scale industries and along term success of new era of business.

Published by: Shwetha H. S., B. S. SubramanyaResearch Area: Commerce

Organisation: Bharathiar University, Coimbatore, Tamil NaduKeywords: Small scale industries, HR practices, Workforce, Strategic plan

Thesis

422. Power generation through forging press

In the present scenario, the fossil fuel sources are depleting and their combustion products are causing global environmental problems. So it is inevitable to shift towards the use of renewable energy sources which in turn will reduce pollution and fossil fuels. For meeting the regular demand for energy we need to design a system such that electricity can be produced without destroying nature. Our projects attempt to show how energy can be taped and used at a commonly used machine, press machine and forging machine. The number of machines used in industries is increasing day by day. There is a possibility of utilizing the linear motion of ram or press to generate power by making the press machine as a power generation unit. The generated power can be used to light up nearby lights and fans around the machine. In the present work, a working model of the power generation unit is made. A similar model of the system has also been modeled in Pro-E. Design of each component is carried using standard procedure. The components are fabricated and finally assembled. The linear motion of the component is converted into rotary motion using the rack and pinion mechanism. The speed obtained is in turned amplified using a set of gears. This amplified speed is used to run an alternator to produce power. Theoretical calculations of power & practical power are compared in order to find the efficiency of the power generation used. The utilization of energy is an indication of the growth of the nation. This work utilizes one of the best sources of energy we get in our day today life.

Published by: Shubham Mohan Bhagwat, Dnyaneshwar Satish Shinde, Chandan Mangilal Purohit, Shubham Rajendra NaikResearch Area: Mechanical Engineering

Organisation: Shree Ramchandra College of Engineering, Pune, MaharashtraKeywords: Power transmission, Mechanical drives, Mechanism rack and pinion, Chain and sprocket, Design of flywheel, Design of gearbox, Design of alternator and its manual testing

Survey Report

423. Exploring disaster environment using drone based wireless mesh network

This paper is based on the Mesh network. Meshcomm helps to create a mesh network in the desired area to establish on-demand communication and to avoid casualties. Here we are using a chip called NodeMcu to provide a temporary network. The basic ideology is to connect the NodeMcu’s with each other and create a mesh network. These nodes will be deployed in a way that they will provide emergency network covering the area these are deployed in. People in need will connect to this network using Wi-Fi on their mobiles. Once they are connected to the network they will receive a pop-up message, using that they can communicate to the rescue team or with each other.

Published by: Aravind Kumar, Swaroop K. M., Skanda R., Rizwan N. ShaikhResearch Area: Computer Science

Organisation: Shree Devi Institute of Technology, Mangaluru, KarnatakaKeywords: Drone, Arduino esp8266, Mesh network

Research Paper

424. Load balance in cloud on the basis of size of packet

Cloud computing helps to share data and also provide many resources to users so, the users can pay only for those resources as much they used. The aim of cloud computing is to stores the data and distributed resources in the open environment over the network, where the users can get data easily. The goals of cloud computing are to use the resources efficiently and gain maximum profit. Multiple users request for information at a time. Due to such a huge amount of data request from users, the problem of load balancing arises which becomes the main challenge in the field of cloud computing. To handle such requests efficiently and effectively, various load balancing approaches have been proposed in the past years. Scheduling of incoming users request is a critical problem in cloud computing because a cloud provider has to serve many users in cloud computing. A good scheduling technique is used to bits of help in proper and efficient utilization of the resources. This system designed a better scheduling technique. Here we also use the VMs for handling the user’s requests. Scheduling is performed on the basis of available disk space and file size to be processed.

Published by: Bhushan Dinkar Patil, R. B. WaghResearch Area: Cloud Computing

Organisation: R. C. Patel Institute of Technology, Shirpur, MaharashtraKeywords: Virtual Machines(VMs), Cloud computing, Load balancing

Research Paper

425. Group messaging solution

In every organization, in order to work collaboratively, we need people who come up together and communicate so that they can express their ideas and share best thoughts and have good teamwork. In organizations, employees working on the same project may be residing in different places of the world to communicate, they need channels which can hold their confidential messages and also protect the messages from networking security threats. Currently, we have a number of messaging applications like Slack, Gmail, WhatsApp, etc. Prominently organizations use Gmail for emailing or their own mail sending services for communication. But for mail reception, we have a condition that mail receptor should know who has sent him mail. But there can be a condition in which someone might spoof, pretending to be someone. For organizations which to segregate authorities as senior and junior and communicate among each other, this kind of platform could be vulnerable. In current systems, hackers could even attach viruses and other malware to emails. If you want to send messages, you have to manually add the desired recipients. The project implements an application which would provide a way for communicating amongst teams and senior members of the team without hesitating and by implementing this project, members will also be able to put forward their views and points easily in front of the whole group members and senior authorities. Also, this project will make the communication effective which will, in turn, benefit the team and their work. Also, threat agents won’t be able to send malicious files as this will be the only message based and hence more secure. Also, it will have a news feed section where the latest news about the company will occur which will keep everyone informed about the current scenario and everyone will be on the same page. The project also aims to identify confidential message sent using this messenger so that the confidentiality remains intact and admin can manage and see which user is using the confidential words also by implementing this, spam and rumor detection can also be implemented.

Published by: Gaurav Gupta, Nikisha Mukund Mistry, Abhijit Kushwaha, Dr. Zahir AalamResearch Area: Information Technology

Organisation: Thakur College of Engineering and Technology, Mumbai, MaharashtraKeywords: Security, Communication, Messaging, Group messaging solution

Review Paper

426. Automation of streetlight using Lora Technology

Increase in population and the corresponding increase of roads has increased the number of the street light, for the roads and people’s safety, which rises investment and energy. Lighting consumes an adequate amount of energy in both outdoor and indoor. However different approaches are being proposed for making systems energy efficient and upgraded with the latest technology. Internet of Things (IoT) has been growing over the last few years in multiple applications and due to a growing need for smart street light, an innovative opportunity arises. Proposed work is to develop a smart street light system. This research gives precise and the best control over energy efficient street lighting system. It gives practical implementation using Long Range (LoRa) and Arduino micro-controller using sensors to gather information. The communication part is realized with Low Power Wide Area Network (LP-WAN) LoRa technology that combine low power and long-range capabilities.

Published by: Rahul Panda, Asha Durafe, Trupti SutarResearch Area: IoT

Organisation: Shah and Anchor Kutchhi Engineering College, Mumbai, MaharashtraKeywords: LP-WAN, LoRa, Internet of Things, Arduino, Sensors

Research Paper

427. Romeo seahawk helicopter

These type of helicopter can do many operations in a few minutes and it will also help in the rescue operation.

Published by: Mohd Shahid, Monika BazzadResearch Area: Mechanical Engineering

Organisation: Mahavir Swami Institute of Technology, Jagdishpur, HaryanaKeywords: Helicopter, Seahawk helicopter, Heavy helicopter

Others

428. Solar based electric vehicle charging station

This project focuses on system electric vehicle charging station. We make use of solar power as it is totally green energy. Nowadays the petrol price has increased and fuels are costlier as they are high in demand, so it is good to go for solar power as green energy has no adverse effect on the environment. Electric energy can be created by solar energy or by using other options. Energy generated by solar and wind is green energy. Our proposed system is to design stations with independent grid-connected elements of solar power, EVSEs and external batteries. In our system, we provide smart billing in which card payment method can be used. Payment or charges totally depends on how much energy is used to charge a user’s vehicle. Charging is fully automatic.

Published by: Tejas Sonawane, Shambhavi Bade, Priyanka Kuldharan, Waseem TamboliResearch Area: Engineering

Organisation: Sinhgad Academy of Engineering, Kondhwa, Pune, MaharashtraKeywords: Batteries, Energy storage, Solar energy, Solar panel, Electric vehicle charging mechanism

Research Paper

429. Bitcoin financial forecasting

Bitcoin being a standout among the most unusual money had all the earmarks of being a decent point of the study. Our point is to prepare our model to foresee the estimation of Bitcoin in USD at some random time stamp. For these different methods and calculations of machine learning have been utilized. To prepare our model, an expansive arrangement of information in a legitimate organization was required. Different sites were investigated to gather the information in the ideal configuration. In spite of the fact that foreseeing the estimation of Bitcoin is practically unimaginable, yet we attempted to anticipate the incentive in the given political and monetary situation.

Published by: Amit Chauhan, Manish Kumar, Vinay Kumar SainiResearch Area: Machine Learning

Organisation: Maharaja Agrasen Institute of Technology, New Delhi, DelhiKeywords: Machine learning, Bitcoin, Linear regression, Neural network, Support Vector regression, Recurrent Neural Network, Convolutional Neural Network

Case Study

430. A rare case of von Hippel Lindau disease

Von Hippel Lindau disease is a rare disease characterized by the formation of tumors, which may be cancerous or non- cancerous and fluid-filled sacs in different parts of the body like kidney, pancreas, genital tract. The incidence of the disease is estimated to be 1 in 36,000 individuals. VHL is a tumor suppressor gene, mutations in this gene lead to abnormal growth of cells forming tumors, cysts that are characteristic of Von Hippel Landau disease. Non-cancerous tumors called hemangioblastomas, which are growth made up of abnormally formed blood vessels are characteristic of this disease, which if develop in the brain, spinal cord causes headache, vomiting, weakness, ataxia and in the retina causes retinal hemangioma. People are also at risk of developing renal cell carcinoma, pheochromocytoma, and tumors in the inner ear. Being a multisystem disease, diagnosis is made by doing genetic testing, ultrasound abdomen, radiological examination like CT, MRI of various organs and treatment is by doing surgery which can be minimally invasive and laser surgery, chemotherapy, immunotherapy. We report a case of Von Hippel Lindau Disease. A 27-year-old lady presented with headache, 3-4 episodes of vomiting which was non-bilious, non-projectile in nature. She had one episode of generalized tonic-clonic seizure which was associated with rolling of eyes and frothing of mouth. USG abdomen revealed asymmetric pancreatic cyst, mass lesion in the superior pole of left kidney suggestive of renal cell carcinoma, as her father also died due to renal cell carcinoma. Radiology reports showed a well defined cystic lesion in the left cerebellar hemisphere suggestive of cerebellar hemangioblastoma for which craniectomy was done. The patient was put on tablets Pan, Luperitin, Oxevion, Dexona and was advised to review to urology, neurosurgery department if any new onset deficits.

Published by: Kanika Deora, Dr. Girish MennonResearch Area: Neurosurgery

Organisation: Kasturba Medical College, Manipal, KarnatakaKeywords: Von Hippel Lindau disease, Hemangioblastoma

Technical Notes

431. Criminal face recognition using video surveillance

Due to a rise in criminal activities, the identification of the criminals takes a lot of time even if the person is a recidivist. To identify and track missing or trafficked people the time taken to identify and save them may very well be greater before the person disappears again. To overcome this we propose a system that is highly reliable to recognize these people using face recognition techniques to recognize them anywhere in real time using CCTV or other video provided device so that actions could be taken more quickly. We move the whole system to the cloud so that the pictures of these individuals can be uploaded to train the face recognition model and can be used by many law agencies. The pictures can be uploaded from a local computer that is connected to the model on cloud and the database will be updated by adding the uploaded pictures. The processing also takes place in the cloud hence reduces the load on the local computer and only the results are sent back. Our proposed system yields much better processing and response speed and results in centralizing the whole data which can be updated and used by anyone without lowering the local systems performance.

Published by: Prasad Laxman Salokhe, Ravi Raj, Sampreet U. Gaonkar, ShaliniResearch Area: Face Recognition

Organisation: Sai Vidya Institute of Technology, Bengaluru, KarnatakaKeywords: Face recognition, Machine learning model

Research Paper

432. OCR to read embossed text from Credit/Debit card

This paper is based on a real application in which the task was to recognize the digits and characters embossed on the credit/debit card i.e the card number and the expiry date. The problem was that the digit embossed are uneven. Using tesseract for OCR was not enough to recognize the digits accurately. The first problem was that to separate the digits and the second fact was that the separated characters or digits were distorted heavily. Challenge is to recognize the digits correctly. In this paper, we present an algorithm for credit/debit card number identification based on Optical Character Recognition using KNN. The algorithm is tested on five hundred credit and debit card images of different illumination of lights. When the images have captured the angle of view and distance were taken into consideration. The images were then preprocessed using an image processing algorithm. The resultant images were then fed to the OCR system. The achievement of this work was the correct identification of digits with 90% and zero false identification.

Published by: Pranav Raka, Sakshi Pravin AgrawalResearch Area: Image Processing

Organisation: MIT College of Engineering, Pune, MaharashtraKeywords: K-Nearest neighbours, Optical character recognition, Machine learning, Human computer interaction

Research Paper

433. Industrial noise pollution and its effects on workers in forging industry

Noise pollution is a major problem in cities around the world. Noise is defined as unwanted sound. Environmental noise consists of all the unwanted sounds in our communities except that which originates in the workplace. The present study has been carried out in the forging industry in Kolhapur, Maharashtra. Noise levels at various Mechanical press and drop hammer forge were measured. In the present research work, the minimum noise recorded was 92 dB (A) and maximum as 104 dB (A), which was compared with OSHA and WHO (World Health Organization) standards. Result of this study shows that due high intensity of noise generated by Mechanical press and drop hammer forge at workplaces, workers were facing the mental and physical problems.

Published by: M. B. Kumthekar, Anjali P. KshirsagarResearch Area: Architectural Project Management

Organisation: Govt. College of Engineering, Nagpur, MaharashtraKeywords: Industrial noise, Forging industry, Hearing loss

Research Paper

434. A study on awareness and perception towards online baking systems with special reference to Bank of India in Bilaspur city of Chhatisgarh

The study has been conducted in order to careful evolution and examines globalization in an online banking system. All the banking sector to be studied with great India reason for chosen online banking system satisfaction towards internet banking and to find out the problems encountered by the customers. This research will assist bank administrative to ascertain a better understanding of customer satisfaction towards online banking system offered by the bank of India in Bilaspur city of Chhattisgarh.

Published by: Vaishali Agrahari, Dr. Niket ShuklaResearch Area: Commerce

Organisation: Dr. C V Raman University, Kota, ChhattisgarhKeywords: Customer satisfaction, Online banking system Bank of India, Banking, Internet banking

Research Paper

435. Development of rural tourism through entrepreneurship – A study on Sadeibereni in Odisha

Entrepreneurship has been identified as an essential factor for creating job opportunities, generating income, increasing the standard of living and generally growing the economy. Rural development is increasingly associated with entrepreneurship, which is considered as a central force of economic one and can help to sustain and improve the quality of life in a rural area. Tourism involves mostly small enterprises, so the role of tourism entrepreneurs can be important for the development of rural tourism. Of all economic sectors, tourism is perhaps the one in which the greatest degree of involvement is needed by the entrepreneurial sector in formulating sustainable strategies. Especially in rural tourism, entrepreneurship has gained increasing importance as it is seen as a major driving force behind rural tourism. However, entrepreneurship demands an enabling environment in order to flourish. Entrepreneurial culture, climate, infrastructure, and support are important elements for such an environment. The creation of such an environment starts by the development of appropriate institutional support at the country level to address the supply of entrepreneurship, focusing on the number of people who have the motivation, financial means, and the skills to start a new business. The present paper emphasis on entrepreneurship opportunities available in Sadeibereni village of Dhenkanal district in orrisa, addressing the issue of entrepreneurship in rural tourism development. Tourism in general and rural tourism, in particular, is dominated by a small business where the spirit of initiative, desire to acheve and the ability to identify market opportunities and to fructify effectively are essential.

Published by: Nishi Priya, Dr. Bhavya KhamesraResearch Area: Hospitality and Tourism Management

Organisation: PAHER Pacific University, Udaipur, RajasthanKeywords: Rural touism, Entrepreeneruship, Local community, Development

Research Paper

436. Hand gesture to audio based communication system for blind people

The sensible adaption of interface solutions for visually impaired and blind folks is proscribed by simplicity and usefulness in practical situations. totally different solutions focus upon speech or keyboard interfaces, that don't seem to be economical or clear in every-day environments. As a straightforward and sensible thanks to bringing home the bacon human-computer- interaction, during this paper hand gesture recognition was accustomed to facilitate the reduction of hardware parts. in addition, a qualitative user study was performed to match the learning curves of various subjects with and while not previous data of gesture recognition devices, decoding the readings from a sensitive surface by machine learning algorithms. The user study was created victimization well-known machine learning algorithms applied to recognize symbols from the graffiti handwriting system and therefore the woodhen data processing computer code for scrutiny individual machine learning approaches.

Published by: Teja Priya, Pulla Chanukah, D. VanushaResearch Area: Natural Language Processing

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Hand gesture, Speech, Gesture recognition

Research Paper

437. Use of waste plastic and crumb rubber in construction of flexible pavement

Generation of plastic waste and rubber waste is increasing day by day and the necessity to dispose of this waste in a proper way is arising. Nowadays pavements are subjected to various kinds of loading which affects the pavement performance condition that causes various distresses. Use of plastic and rubber in pavement design as an innovative technology not only strengthened the road construction but also increase the road life. In this study, different tests were conducted on aggregates, bitumen, and bituminous mixes. The effect of the addition of waste polyethylene in the form of locally available carry bags had been checked on aggregates as well as on bitumen. As per visual inspection, 5%, 7.5% and 10% plastic coating was made on aggregates and sample were checked for crushing, impact and abrasion values. Effect of addition of waste plastic and crumb rubber on bitumen had been studied by varying concentrations of polyethylene from 0% to 15% i.e. 0%, 5%, 7.5%, 10%, 12.5% and 15% in bitumen. Various tests such as penetration, ductility, softening point, flash and fire point, viscosity and loss on heating were performed on the samples. The optimum percentage was taken from these tests which had shown satisfactory results for all the tests performed. Later, that optimum percentage value was used for preparing bituminous mixes for testing pavement properties such as Marshall Stability, compressive strength, and indirect tensile strength. As per the test results, about 10% plastic waste with crumb rubber replacement in bitumen shows better results than conventional bitumen as well as 10% plastic coating to aggregates also improve the load-bearing capacity. The strength is found to be increased by 62% as compared to conventional mixes. By using plastic waste in flexible pavement design, the problem of plastic and waste rubber disposal gets solved as well as the performance of roads gets improved. Investigations can also be made on using other grades of bitumen and other substituents. Generation of plastic waste and rubber waste is increasing day by day and the necessity to dispose of this waste in a proper way is arising. Nowadays pavements are subjected to various kinds of loading which affects the pavement performance condition that causes various distresses. Use of plastic and rubber in pavement design as an innovative technology not only strengthened the road construction but also increase the road life. In this study, different tests were conducted on aggregates, bitumen, and bituminous mixes. The effect of the addition of waste polyethylene in the form of locally available carry bags had been checked on aggregates as well as on bitumen. As per visual inspection, 5%, 7.5% and 10% plastic coating was made on aggregates and sample were checked for crushing, impact and abrasion values. Effect of addition of waste plastic and crumb rubber on bitumen had been studied by varying concentrations of polyethylene from 0% to 15% i.e. 0%, 5%, 7.5%, 10%, 12.5% and 15% in bitumen. Various tests such as penetration, ductility, softening point, flash and fire point, viscosity and loss on heating were performed on the samples. The optimum percentage was taken from these tests which had shown satisfactory results for all the tests performed. Later, that optimum percentage value was used for preparing bituminous mixes for testing pavement properties such as Marshall Stability, compressive strength, and indirect tensile strength. As per the test results, about 10% plastic waste with crumb rubber replacement in bitumen shows better results than conventional bitumen as well as 10% plastic coating to aggregates also improve the load-bearing capacity. The strength is found to be increased by 62% as compared to conventional mixes. By using plastic waste in flexible pavement design, the problem of plastic and waste rubber disposal gets solved as well as performance of roads gets improved. Investigations can also be made on using other grades of bitumen and other substituents.

Published by: Bhadane Rupesh UmraoResearch Area: Civil Engineering

Organisation: Bapusaheb Shivajirao Deore College of Engineering, Dhule, MaharashtraKeywords: Pavement, Bitumen, Waste plastic, Crumb rubber, Plastic coated aggregate

Research Paper

438. Lungs pattern classification for cancer detection

In this day and age ,picture handling system is all around wildly utilized in a few therapeutic fields for picture improvement which helps in early recognition and investigation of the treatment stages ,time factor additionally assumes a very pivtol job in finding the variation from the norm in the objective pictures likelung malignancy ,bosom disease and so forth this examination focusses upon picture quality and precision.picture quality evaluation just as progress are reliant upon upgrade organize where low pre-preparing methods are utilized dependent on gabor channel inside Gaussian standards; from that point the division standards are connected over the improved locale of the picture and the contribution for highlight extraction is acquired, further contingent on the general highlights, a typicality correlation is made .in the accompanying exploration the essential recognized highlights for exact picture examination are pixel rate and veiling naming. In this review, we have implemented a dependent system of counterfeit neural systems, which is more elegant than other current characterizations

Published by: Sushil Kumar, Suraj kumar, Najaf Haider, Ankit Kumar, D. SaranyaResearch Area: Lungs Cancer

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Lung cancer detection, Enhancement, Feature extraction, Segmentation, Neural network

Others

439. Our education system-Need of the hour is to Revamp

Students are the precious resources but without the commitment from the faculty members, nothing can be done. The academic programs in India are not consonance with the educational system of the western countries So the need of the hour is our curriculum must be reframed to suit the needs of the generation. This paper talks about the current education system of India and a need to change it.

Published by: Dr. A. Peer KhanResearch Area: HR

Organisation: Kamarajar Government Arts College, Surandai, Tamil NaduKeywords: Indian present Education system, Shortfalls, Students inattention, Suggestion to improve by policymakers

Review Paper

440. Virtual question answering

Question Answering (QA) system in information retrieval is a task of automatically answering a correct answer to the questions asked by the human in natural language using either a pre-structured database or a collection of natural language documents. It presents only the requested information instead of searching full documents like a search engine. As information in the day to day life is increasing, so to retrieve the exact fragment of information even for a simple query requires large and expensive resources. This is the paper which describes the different methodology and implementation details of question answering system for general language and also proposes the closed domain QA System for handling documents related to education acts sections to retrieve more precise answers using NLP techniques

Published by: Manda Swapna ReddyResearch Area: Natural Language Programming

Organisation: Matrusri Engineering College, Hyderabad, TelanganaKeywords: Virtual question answer, Natural language processing, Taggers, Sample stories, Rule based queries, Passage search

Research Paper

441. Virtual doctor

The healthcare environment is still ‘information rich’ But ‘knowledge poor’. There is a wealth of data available within the health care systems. However, there is a lack of effective analysis tools to discover hidden relationships in data. The aim of this work is to design a GUI based Interface to enter the patient symptoms and predict which disease the patient is having using various machine learning algorithms. The prediction is performed from mining the patient’s symptom data or data repository. This paper has analyzed prediction systems for disease using more number of input attributes. The system uses medical terms such as fever, pain, cholesterol-like attributes to predict the likelihood of a patient getting a particular disease. Until now, over 100 attributes are used for prediction. The data mining classification techniques, namely Decision Trees, Naive Bayes, and Random Forest are analyzed on disease database. The performance of these techniques is compared, based on accuracy.

Published by: Divyansh Tiwari, Arpit Kumar, Ayush TripathiResearch Area: Machine Learning

Organisation: IMS Engineering College, Ghaziabad, Uttar PradeshKeywords: Predictive analysis, Data mining Machine Learning

Research Paper

442. Make Search Easy

There is a tremendous increase in the number of files and their transaction within the mobiles across the world. One has to report and maintain all the work through documentation. It gets difficult for the peoples to maintain and search through these files. This paper presents an approach to design a file manager integrated with the power of advanced search enabling the user to go through multiple files within the android through filtering them. Make Search Easy is a simple application like a file manager but has a powerful search and filtering option. The main feature which makes this application stand out in many other applications is its advanced search option. The user can search for a required letter, word, line or a paragraph within a document without actually knowing the location of a document within a directory or entire phone memory. Making it easy for the user to attend the search within the multiple files at the same time and through the easy way.

Published by: Anirudh Polawar, S. V. Patil, Prajwal Kotalwar, Nikhil Ghodke, Prathamesh GindodiaResearch Area: File Management and Advance Search in Android

Organisation: Vishwakarma Institute of Technology, Pune, MaharashtraKeywords: File manager, Advanced search, File filtering, Stack algorithm

Technical Notes

443. Application for online booking of unreserved ticket for Indian Railways

The number of passengers traveling in Indian Railways is increasing very rapidly. Among those people, there are some set of persons who travel regularly in the General Compartment. IRCTC has created an online platform for booking tickets of Reserved Compartments. The customers who travel in General Compartment still face an issue because they are supposed to wait in Long Queues at Ticket Counters to purchase tickets. In this proposed system we aim to provide a solution where passengers traveling in the General Compartment have a facility to book their travel tickets online using an Android Application.

Published by: Singh Siddharthkumar Sanjaykumar, Sheikh Mannan Sohail, Ismail Badri, Mohammed Gadi, Deeksha Hegde B.Research Area: Native Android Application Development

Organisation: Sai Vidya Institute of Technology, Bengaluru, KarnatakaKeywords: IRCTC, General Compartment, Android Application, Firebase, XML, Java, NoSql, Google Map API.

Research Paper

444. Chitosan nanocarrier system for tumour targetting

The aim of this paper was to develop and characterize chitosan nanoparticle as a carrier for adriamycin delivery as chitosan nanoparticles are the potential delivery system for hydrophilic drugs due to its outstanding physicochemical and biological properties. Chitosan nanoparticles have gained more attention as drug delivery carriers because of their better stability, low toxicity, simple and mild preparation method, and providing versatile routes of administration. Chitosan nanoparticles containing the anticancer drug adriamycin was prepared by the ionic gelation technique and characterized by various techniques such as particle size analysis, FT-IR and Atomic Force Microscopy. Results showed that chitosan nanoparticles prepared are of uniform size with an average diameter of 90 nm and zeta potential 62.5mV with a high encapsulation efficiency of 91.9%. Adriamycin loading efficiencies were determined and release studies were performed in PBS at room temperature. The drug release rate of Adriamycin from the chitosan nanoparticles was approximately 60% showing the potential of chitosan nanoparticles as a sustained drug delivery system. Cytotoxicity tests showed that the Adriamycin-loaded chitosan had higher cell toxicity by delivering the drug to the tumour tissues than adriamycin alone.

Published by: Aarthye Pandian, K. Jeyasubramanian, M. SureshkumarResearch Area: Nanotechnology

Organisation: Vels Institute of Science, Technology and Advanced Studies, Chennai, Tamil NaduKeywords: Chitosan, Nanocarrier, Adriamycin, Drug delivery, Tumor therapy

Dissertations

445. A study to assess the effectiveness of information booklet on knowledge and knowledge of practice regarding role of nurse in corticosteroid therapy among staff nurses

Background and objectives Corticosteroid therapy are widely used therapy in every health setting to treat various disease conditions. The therapy has a lot of the adverse effects which can be prevented and monitored and also managed by the skill full nurse having competent knowledge and practice in the use of corticosteroid therapy. Many patients who receive corticosteroid therapy go home the same day or the other day, but nursing instruction is very necessary for improving the patient knowledge regarding the adverse effects of the therapy so to prevent the side effects of the therapy. Thus the nurses' knowledge and practice must be improved for the betterment of the care given to the patients. The objectives of this study were: 1. To assess the knowledge and practice score of subjects regarding the role of a nurse in corticosteroid therapy. 2. To administer information booklet 3. To determine the effectiveness of information booklet regarding the role of a nurse in corticosteroid therapy in terms of gain in knowledge and practice scores of subjects. 4. To find the association of pre-test scores of knowledge and practice of subjects with their selected socio-demographic variables. Method A quasi-experimental study with one group pre & post-test design was used to assess the effectiveness of Information Booklet on knowledge and practice regarding Role of Nurse in Corticosteroid Therapy. Simple random sampling technique (Probability) was used to collect data from 50subjects working at the selected health facility, Bengaluru. The data was collected and interpreted to assess the effectiveness of Information Booklet on knowledge and practice regarding Role of Nurse in Corticosteroid Therapy. Results The findings of the study with regard to pre-test knowledge assessment revealed that the mean percentage was 35.55% with a standard deviation of 7.64. In the pre-test knowledge level, 88% had inadequate knowledge. In the post-test, a significant increase in knowledge was found. However, in post-test, the mean percentage of knowledge was 86.55% with 6.46 standard deviation. In the post-test knowledge level, 94% had adequate knowledge. In pre-test knowledge of practice level, the mean percentage is 31.9% with a standard deviation of 4.56. There is a significant increase in practice level in post test with a mean percentage score of 80.7% with standard deviation 4.12 by the subjects. Interpretation and Conclusion The study proved that subjects had inadequate knowledge and knowledge of practice on Role of nurse in corticosteroid therapy. The finding of the study showed that the information booklet was highly effective in increasing knowledge and knowledge of practice on Role of nurse in corticosteroid therapy. In the post-test, a significant association was found with most of the variables of the subjects. The overall knowledge means a score of the pre-test was 35.55% with a standard deviation of 7.64 and an overall post-test score of knowledge was 86.55% with 6.46 standard deviation. The overall knowledge of practice means a score of the pre-test was 31.9% with standard deviation 4.56 and post test practice score was 80.7% with standard deviation 4.12. The ’t’ value of the knowledge is 16.32 %. It shows that there is a significant increase in knowledge after the administration of Information Booklet (IB). The enhancement in the subject’s knowledge is by 51 %. The statistical paired 't' test indicate that enhancement in the mean knowledge scores was found to be significant with “t” value 12.29 level for all aspects under study. The enhancement in the respondent’s practice is by 70.7%. The statistical paired 't' test indicate that enhancement in the mean knowledge scores was found to be significant with 14.21 level for all aspects under study.

Published by: Tariq Ahmad DevResearch Area: Nursing

Organisation: Rajiv Gandhi College of Nursing, Jammu, Jammu and KashmirKeywords: Role of nurse in corticosteroid therapy, Information Booklet (IB), Under staff nurses

Dissertations

446. High volume fly ash-based glass fibre reinforced concrete

My dissertation work has been divided into 8 chapters, Chapter 1: Introduction: In this chapter, a general introduction of my dissertation work has been given. The materials used in my projects such as coarse aggregate, fine aggregate, glass fibre, fly ash and other constituents of fly ash-based glass fibre reinforced concrete have been focused. The properties of the construction materials have also been stated in brief along with advantage and disadvantage of glass fibre concrete. Chapter 2: Objectives and Aims: In India, all old glass materials are considered as waste materials. It is disposed to the disposal ground just like other waste materials. The old glass materials can be recycled in factories. These recycled glass materials become an important ingredient for making GFRC. The primary aim of using glass fibre is to examine the strength of concrete made with glass fibre in comparison to plain concrete. The secondary aim is to examine the economy of GFRC for which an economic analysis provided in Chapter 7. Chapter 3: Literature Review: This chapter contains relevant information in regard to glass fiber reinforced based concrete. For this, I had to go for different websites to get knowledge of the above subject and put my opinions. All references which required to complete my dissertation work has been given in a separate page stating references as mentioned in the content of my thesis. Chapter 4: Desired characteristics for glass fibre reinforced concrete (GFRC): The characteristics of glass fibre have considerable influence on the design, efficiency, output and particularly the reliability and durability of the glass fiber-based concrete. The glass fibre characteristics play a vital role in the atmospheric pollution of concrete industries. Chapter 5: Methods and materials: In this chapter, the description of all the materials with the specifications which I used for my experiments have been elaborated. The apparatus and the instruments which were used for performing my experiment have also been mentioned. Chapter 6: Results and discussions: In this chapter, all the test results for all kind of specimen have been stated. The efficacy of the test results has also been discussed. Particulars in regards to design mix, especially its calculation have been annexed in Appendix – A and B after chapter 5 – Materials and Methods. Chapter 7: Economic analysis of Glass fibre reinforced concrete: Glass fibre reinforced concrete is considered to be a very useful item needed for the present concrete industries. The comparative cost of GFRC and conventional concrete has been stated in this chapter. It was found that the percentage of saving per cubic meter of fly ash-based glass fiber reinforced concrete is to the tune of 3% compared to conventional concrete. Chapter 8: Conclusion: The salient points of my dissertation thesis have been given in this chapter. It was highlighted in chapter 8 (Conclusion) that the service life of GFRC is higher than that of traditional concrete due to reasons indicated in the chapter. That’s why GFRC is widely used in architecture, building, other concerned engineering applications.

Published by: Somsubhra De, Dr. Sudhir Kumar DasResearch Area: Structural Engineering

Organisation: Techno India, Salt Lake, Kolkata, West BengalKeywords: Glass fibre reinforced concrete, GRC, Construction

Research Paper

447. Separation and quantification of Chloro Triazine based Atrazine and Terbuthylazine formulation by reverse phase high performance liquid chromatography

The Atrazine and Terbuthylazine molecules are being used alone and a combination as a special herbicide activity to control the broadband leaves in the agricultural industry. Atrazine and Terbuthylazine have a high capillary action in the roots of brad spectrum plants with respect to other herbicide molecules. The solubility of Atrazine and Terbuthylazine also very high solubility in water and this solubility enhanced the capillary action through the broad leaves plant roots. The persistence of this Atrazine and Terbuthylazine is very long period hence the residue levels in the used substrates are being existed in the used substrates. Even though the molecules Atrazine and Terbuthylazine are less toxic to humans and animals, the lowest detection levels have to be determined with a simple HPLC analytical method; which is very effective time and cost of analysis. Within 10 minutes of analysis time these two molecules to be determined by using acetonitrile and water as a mobile phase with a ration of 80:20 (volume/volume) with the help of Qualis BDS C18 (250 x 4.6, 5μ) HPLC column at 1 ml/min. flow rate. The detection wavelength is 220 nm by a Shimadzu LC2030 model HPLC. The results of the analysis deliver that the proposed RP-HPLC method is simple, rapid, precise and accurate, which is useful for the identification and quantifications of these molecules interims of validation parameters viz., separation, system suitability, System Precision and linearity in a simple HPLC analysis.

Published by: K. Ayyavoo, Dr. C. TamilselvanResearch Area: Analytical Method Development

Organisation: Bioscience Research Foundation, Kandamangalam, Tamil NaduKeywords: Atrazine and Terbuthylazine, HPLC analysis, Validated method, SANCO 3030/99 Rev.4, ICH guideline

Case Study

448. Improvement in design of gearbox housing (Code No: MFO225DR) through static analysis

Laxmi Hydraulics Pvt Ltd is a leading company in the manufacturing of pumps located at Solapur. A gear motor is manufactured by LHP for BHEL, Ranipeth. Input rpm for this gear motor is 1390 rpm with power 0.37 kW. It has a three-stage reduction gearbox output rpm of which is 17 rpm. The final output rpm is 1.1 rpm with torque 298 km. This is used in power plant for ESP – Electrostatic Precipitation. Since proper stress calculations are not done weight of housing is more. Stress calculation needs to be checked in ansys and material selection and design of gearbox housing need to be optimized. Gearbox housing of MFO225DR is designed as per the requirement of the gear box. But stress calculation of box has not done. In this paper improvement in the design of gearbox housing is done

Published by: Smita Pawar, Avinash LavnisResearch Area: Design

Organisation: Brahmdevdada Mane Institute of Technology, Solapur, MaharashtraKeywords: Gear box housing, MFO225DR, Gear box casing, ESP

Research Paper

449. Design and analysis of circular microstrip patch antenna with and without slot using HFSS

Recently, the field of wireless communication is the most widely researched area and the study of the communication system is incomplete without knowing the operation and the use of different types of antenna. The study of microstrip patch antennas has made great progress in recent years. Compared with conventional antennas, microstrip patch antennas have more advantages and better prospects. They are lighter in weight, low volume, low cost, low profile, smaller in dimension and ease of fabrication and conformity. Moreover, the microstrip patch antennas can provide dual and circular polarizations, dual-frequency operation, frequency agility, broad bandwidth, feed line flexibility, beam scanning Omni directional patterning. Hence a Comparative study of circular microstrip-fed patch antennas for blue tooth application is presented in this project. The resonance frequency is chosen at 2.45 GHz which is suitable for industrial scientific and medical (ISM) band applications. HFSS is used as the software environment to design and compare the performance of the antennas with and without slot.

Published by: K. Karuna KumariResearch Area: Antennas

Organisation: Gandhi Institute of Technology and Management, Visakhapatnam, Andhra PradeshKeywords: Circular microstrip antenna, HFSS

Review Paper

450. IoT based garbage monitoring system

A big challenge in the majority of cities all over India is that of waste management. The key issue in waste management is that the garbage bins at public places get overflowed well in advance before initiating the next cleaning process. Improper management of waste can be a major factor for environmental pollution resulting in several health issues. The traditional way of manually monitoring garbage bins is a cumbersome process and utilizes more human effort, time and cost which can easily be avoided with present technologies. In order to handle such issues, we propose an IOT based smart waste management system which checks the waste level over the dustbins by using sensors. The ultrasonic sensors are interfaced with Arduino Uno 3 Microcontroller to obtain and send the level of garbage to the server of concerned authority after waste is filled up to a particular level. Then authority can take required action by employing a worker to empty out the bins. So through this system, the real-time status of waste is monitored. Therefore one can ensure proper management of waste and this can be a step towards a quality environment which ultimately bodes well for human beings and other life-forms.

Published by: Praruj Bhajekar, Dhanush Singupalli, Piyush Dwivedi, Shivani Sumbha, Priyanka ShinganeResearch Area: Information Technology

Organisation: Ramrao Adik Institute of Technology, Navi Mumbai, MaharashtraKeywords: IoT (Internet of Things), Waste management, Sensors, Microcontroller, Smart garbage bins, Alerts

Review Paper

451. A review- Steel structures, pushover analysis

This paper represents the study of the assorted analysis papers on the all kind pushover analysis on a steel structure. The steel structure has a vital role in the industry in the last decades. To perform well underneath seismic masses it's necessary to style a structure. In step with the provisions of this Indian code (IS 800 -2007), the seismic performance of a multi-story steel structure building has designed. By introducing Steel bracings within the structural system the shear capacity of the structure are often enlarged to rearrange Steel bracings like D, K, and V kind eccentric bracings their square measure "n" numbers of solutions for numerous kinds of eccentric bracings as per the IS 800- 2007 a typical six-story steel structure building is generated. Within the gift study D, K, and V kinds of eccentric bracings square measure taken into thought. Through nonlinear static analysis performance of every structure is studied.

Published by: Bhavna Saini, Satish PariharResearch Area: Civil Engineering

Organisation: Rama University, Kanpur, Uttar PradeshKeywords: Pushover investigation, Steel outlines, Bracings, Behavior factor

Research Paper

452. IoT based bridge monitoring system

A bridge monitoring system is significant to the structural health monitoring of both old/new bridges and flyovers an infrastructure daily used by citizens of their respective countries. The following report is proposed and developed as architecture for bridge monitoring on a more secure level taking into consideration the various parameters that are involved in the structural health of bridges. A 3-level distributed structure is adopted in the monitoring system, which includes a central server, intelligent acquisition node, and local controller. Acquisition nodes are located across the bridge. One local controller manages all the acquisition nodes. Every acquisition node has 8 channels, which can easily and approximately sample the deviation of the line of sight, the vibration of the bridge due to a load of various transports and as well the water level which when cross a threshold lead to a flood. To get high precision data, a 10 bits A/D converter is being used. Compared to the traditional method, the proposed architecture has two features. The acquisition node is a smart device based on a powerful controller. Signals of field sensors are analyzed and real-time compressed in the acquisition node. Only the processing results are sent to the local controller through the IEEE 802.11 wireless network. This operation can relieve the load of a central server. The intelligent monitoring system has run on a large span bridge. Running results show that the proposed system is stable and effective.

Published by: Divya Muddala, Dhanashree Kamble, Pooja Nimbalkar, Ravina Patil, Sathish K. PenchalaResearch Area: Computer Engineering

Organisation: Dr. D. Y. Patil School of Engineering and Technology, Pune, MaharashtraKeywords: Sensors [A.I.], Input/output and data communications, Microcontroller – Node MCU, M-7053D, tGW-715. [Barrier Lifting]

Research Paper

453. Smart trash bin for waste management using odor sensor based on IoT technology

IoT is transforming cities in a tremendous way. Efforts are made for having smarter ways of city waste management. Waste management always finds difficulty in knowing when to collect waste. If the vehicle comes to collect too early it would lead to unnecessary trips. And when comes to collect too late will result in an overflow of waste. Even though the level is moderate the odor produced by the waste can cause air pollution. These problems stated can be resolved using IoT technology used by this project. An app is designed to monitor the levels which the user can view. The workers need not want to approach the bin to know whether a waste is ready to be removed. Also, it is used to monitor whether the bin is not full and if not checks the smell of waste and then the bin can be removed.

Published by: Steffy Thankam Wilson, Tophia K. Sebastine, Merin Daniel, Vineeth Martin, Neenu R.Research Area: Computer Science And Engineering

Organisation: Amal Jyothi College of Engineering, Kanjirappally, Kottayam, KeralaKeywords: Smart bin, Internet of Things (IoT), Ultrasonic sensor, MQ136 Gas sensor, Nodemcu

Case Study

454. Case study of factor affecting current transformer operation in saturation point of view using MATLAB

Current transformers form an integral part of protective systems. Ideal Current Transformers (CTs) are expected to reproduce the primary current faithfully on the secondary side. Under conditions the CT saturates, and hence it cannot reproduce the primary current faithfully. This paper deals with simulation methods for determining CT performance under different factor. A Simulink model has been developed to observe CT response under steady state w.r.t Burden, Turns ratio, Asymmetrical current, Hysteresis conditions. Thus, it is now possible to evaluate the CT performance under these factors

Published by: Pooja DudhalResearch Area: Electrical

Organisation: Veermata Jijabai Technological Institute, Mumbai, MaharashtraKeywords: DC offset, FFT, Hysteresis, Burden

Research Paper

455. Evaluation of three commercially available toothpaste/creams for resolution of white spot lesions – An in vitro study

White spot lesions are often seen on the teeth after orthodontic treatment, resulting in unpleasant esthetics. Despite many attempts at prevention of white spot lesions, its prevalence remains very high on debonding. The aim of the study was to evaluate the efficiency of 3 commercially available toothpaste/creams in the remineralization of white spot lesions. Materials and Methods: Hundred extracted premolars were selected as sample teeth. They were mounted into an acrylic resin block and randomly divided into four groups, consisting of 25 teeth each. Premolar brackets were bonded to facial surfaces. The specimens were color-coded with Yellow (Group-1), Red (Group-2), Green (Group-3) and Blue (Group-4). Sample teeth were exposed to demineralization solution for 14 days to produce white spot lesion. Visual verification of white spot lesions was done after 14 days on all sample teeth and brackets were debonded. The comparison between 4 groups: Artificial saliva (Group 1), Colgate PreviDent 5000 toothpaste (Group 2), GC Tooth mousse tooth crème (Group 3), Clinpro tooth crème (Group 4), were done at pre-treatment, 14-days after demineralization, 7-days after treatment, 14-days after treatment, 21-days after treatment and 28-days after treatment using Gloss meter and Surface Profilometer instrument. Results: The mean 28 days after treatment Gloss meter values for Group 1 (Artificial saliva) were 20.69±2.41 GU, for Group 2 (PreviDent 5000 toothpaste) were 21.70±2.06 GU, for Group 3 (Tooth mousse tooth crème) were 23.59±2.40 GU and for Group 4 (Clinpro tooth crème) were 22.56±2.98 GU respectively. And mean 28 days after treatment Profilometer values for Group 1 (Artificial saliva) were 1.84 ± 0.50µm, for Group 2 (PreviDent 5000 toothpaste) were 1.542 ± 0.33µm, for Group 3 (Tooth mousse tooth crème) were 1.254 ± 0.08µm and for Group 4 (Clinpro tooth crème) were 1.475 ± 0.20µm respectively. Conclusion: The result of the study indicated that Gc Tooth mousse tooth crème, PreviDent 5000 toothpaste, and Clinpro tooth crème have higher remineralization potential compared to Artificial saliva. Gc tooth mouse crème had the highest remineralization potential followed by Clinpro tooth crème and PreviDent 5000 in both Gloss meter test and Profilometer test. The increased efficiency of Tooth Mousse in remineralizing white spot lesion might be because of the combined effect of CPP –APP and fluoride which was not there in all other groups.

Published by: Dr. Ravi Shanthraj, Bijo Jose, Kiran JoshyResearch Area: Orthodontics

Organisation: JSS Academy of Higher Education and Research, Mysore, KarnatakaKeywords: White spot lesion, Remineralization, Fluorides, Casein phosphopeptides with amorphous calcium phosphate.

Research Paper

456. GeoFencing: Location based services

The geofence has come out to be the application which helps in the protection of the machine and the jobs that need to be carried out both inside the fence or backyard the fence. This surely helps the employer to hold music of the gadget and the jobs that are being carried out from the devices, which increases the effectivity in the experience that the system is utilized in a suitable manner. One of the features of the product is Fencing where all the units will be given sure jobs which can only be performed when interior the fence and some jobs which will be active only backyard the fence. These points were already present in the Android Application side, now it needs to be applied in the Linux side. The approach that we have used is the geofencing API in the android side, however getting the geolocation of the laptop alongside with the latitude and longitude differs with the precise location. Therefore, we are going to use location-based offerings in order to get a specific area of the device

Published by: Nilesh Prasad, Swetha S.Research Area: Department of Computer Science And Engineering

Organisation: RV College of Engineering, Bengaluru, KarnatakaKeywords: Geofencing, Location-based services, MVC architecture, Geofence, Geolocation

Research Paper

457. Designing a two-layer security algorithm for smart grid

Abstract Smart Grid (SG) is the next generation power grid which provides flexibility, reliability, and efficiency in generating, controlling, and distributing the electricity. The SG provides two-way communication between supplier and consumers and sensitive information is communicated on the network. The attackers try to steal this information to attack the grids and consumers for their benefits. Some of the most popular smart grid attacks are the key-based attack, data-based attack, impersonation-based attack, physical based attack. To overcome these issues, the cryptography algorithms and steganography algorithms are used. The cryptography algorithms are scrambled the message and transform into another form. The cryptography algorithms are categorized into two types. These are an asymmetric and asymmetric cipher. In the symmetric cipher same key is used for encryption/ decryption purposes. The symmetric cipher is further divided into types known as a block cipher and stream cipher. In the block cipher, the message is divided into fixed chucks and the same key, rounds are applied on each chuck. In the stream cipher, the plaintext and key bitwise XOR operation are performed. On the other hand, in asymmetric algorithms, two different keys are known as the public and the private key is used for encryption/ decryption purposes. In this thesis, a two-layer security algorithm is designed using lightweight cryptography and steganography algorithm which provide confidentiality as well as authentication. In which three algorithms are hybrid which includes PICO, Genetic Algorithm, and LSB algorithm. Initially, the secret data is encrypted using a lightweight PICO algorithm and initialization vector key is generated using a lightweight genetic algorithm. Further, the encrypted data is hidden in the image using the LSB algorithm. The proposed technique simulation results show that the proposed technique consume less memory, provide high avalanche effect and embedding capacity.

Published by: Gagandeep Sharma, Puneet Jain, Ravinder SinghResearch Area: Electrical

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: PICO, Lightweight algorithm, Steganography, RSA, LIZARD, CBC mode