Volume-5, Issue-2

Volume-5, Issue-2

March-April, 2019

Research Paper

1. Fingerprint detection using enhanced minutiae singular point matching technique

Fingerprint matching is the procedure used to decide if two arrangements of unique finger impression edge detail originate from a similar finger. There exist numerous calculations that do unique mark coordinating from multiple points of view. A few techniques include coordinating details focuses between the two pictures, while others search for likenesses in the greater structure of the unique finger impression. In this proposed work, we propose a method for fingerprint matching based on singular point minutiae matching technique. The term "minutia" is used to refer to small ridge details found in fingerprints; most often, they are termed as main points described on ridge structures. Minutiae pi and qi are considered to coordinate if their traits are inside a certain Limit.

Published by: Rozi Kumari, Puneet JainResearch Area: Electronics And Communication Engineering

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: Fingerprint pattern matching, Minutiae, FRR, FAR, ROC, EER

Review Paper

2. Experimental study on waste foundry sand and steel slag concrete

Generation of waste foundry sand as by-product of metal casting industries causes environmental problems because of its improper disposal. Thus, its usage in building material, construction and in other fields is essential for reduction of environmental problems. Similarly, in foundries (where the ferrous and non-ferrous metals are melted.), the slag is produced after the completion of the melting process it can also be used as a building material, construction and in other fields. This research is carried out to produce low-cost and eco-friendly concrete. This paper demonstrates the use of waste foundry sand as a partial replacement by fine aggregate and slag is as coarse aggregate in concrete. An experimental investigation is carried out on concrete containing waste foundry sand in the range of 0%, 20 %, 40% by weight and slag is fully replaced (100%) for M-25 grade concrete (OPC). The material was produced, tested and compared with conventional concrete in terms of workability and strength. These tests were carried on a standard cube of size 150mm×150mm×150mm for 7, 14 and 28 days to determine the mechanical properties of concrete.

Published by: Chandrashekhar D. Sahare, Kishor T. Jadhao, Sohan R. Dudhe, Pallavi S. Godichore, Ashwin D. Parate, Nikeeta B. DetheResearch Area: Concrete Technology

Organisation: J D College of Engineering and Management, Nagpur, MaharashtraKeywords: Waste foundry sand, Steel slag, Cement (OPC), Low-cost concrete, Eco-friendly, Compressive strength, Split tensile strength

Research Paper

3. Design and implementation of agrobot by using IoT

Many advances in technology have made the agriculture business a much less labor-intensive industry. Farmers are looking for new ways to implement technology to cut costs and reduce labor hours. One of the ways that farmers are beginning to explore new technologies in farming come from the automatic machines. Internet of Things (IoT) technology has brought revolution to each and every field of common man’s life by making everything smart and intelligent. IoT refers to a network of things which make a self-configuring network. The Agriculture stick being proposed via this paper is integrated with Adriano Technology, Here we use two applications to show the working of a robot which is going to do crop harvesting and fertilizing in a real-time manner. Other accessories are slaves performing specific operations. The approach is now to develop smarter machines that are intelligent enough to work in an unmodified or semi-natural environment.

Published by: S. Mutharasu, Divya V., Dhivya Bharathi K., Elakkiya M. V., Janani E.Research Area: IoT

Organisation: Vivekanandha College of Engineering for Women (Autonomous), Tiruchengode, Tamil NaduKeywords: Arduino Uno, IoT

Research Paper

4. Hybrid electrical vehicle battery parameters monitoring system on smart phone through bluetooth

Through this project, we have tried to implement a battery management system for a hybrid electric vehicle. The idea of this project came from an electric vehicle safety system. In the electrical vehicle there is a possibility of battery explosion due to excessive temperature, high current or may be improper working due to high discharge current for monitoring these parameters on Smartphone we have designed circuit for same and also for efficient fuel consumption we introduce accelerometer based circuit for slope detection for fuel source change. By using reverse back emf of vehicle tires we can charge a battery. We have used ATmega328p, Bluetooth, accelerometer sensor, lead-acid battery as the hardware part and programming is done in Embedded C using Arduino tool and for Android App, we used MIT app inventor 2. This paper highlights the use of Bluetooth instead of ZigBee in communication.

Published by: Sachin Katmande, Pratik Kangane, Pravin Lokhande, Vishwalata LaksheResearch Area: Embedded Automation

Organisation: Dr. D. Y. Patil Institute of Technology, Pune, MaharashtraKeywords: Accelerometer sensor, Bluetooth, ATmega328, Lead acid battery

Research Paper

5. Advanced billing system for government departments

Making payments for electricity, water, a property is more of a routine job which needs to be done but often delayed mainly due to its tedious nature. Also getting access to various details of the same is also tedious. Earlier the existing system was manual payment methods where the user needed to visit the nearby payment center and pay their respective bills. The proposed system is more secure, error-free and easily incorporable to any further developments and changes to building an application program to reduce the manual work of managing amount of units consumed by the costumers and generating the bills for various departments like the municipality, electricity and water department.

Published by: Ranjitha H. T., Chethana M.Research Area: Billing System

Organisation: Bangalore Institute of Technology, Bengaluru, KarnatakaKeywords: Billing system, Bill payment, Bill generation

Review Paper

6. Recommendation of food tourism using Artificial Neural Network – A survey

According to “Global Report on Food Tourism” of the World Tourism Organization (UNWTO), food tourism is commented as a fast-growing segment of the tourism industry. Food tourism means traveling to seek enjoyment via eating and drinking experiences at the destination. movies. Such a system can suggest a set of recipes to users based on their interest, or the popularities of the dishes. For tourism services like"TripAdvisor" , the most successful online forum in the travel and tourism industry which recommends the food items based on the search history. Here, we using the ANN algorithm to predict that which algorithm is better to analyses the datasets of food recipes. Finally, it can make some recommendations for the tourist with better-personalized traveling experience and food services.

Published by: Suruthi P., Varsa Sukirthana S., Raguvaran S.Research Area: Data Analysis

Organisation: KPR Institute of Engineering and Technology, Coimbatore, Tamil NaduKeywords: Analysis, ANN Algorithm, Datasets, Neural Networks

Survey Report

7. Forward secure ID based ring signature for data sharing

Cloud computing provides services where one can access information from any place, from anywhere, at any time. So basically cloud computing is subscription based service where one can obtain network storage space and computer resources for data storage as well as data sharing. Due to high fame of cloud for data storage and sharing, a large number of participants gets attracted to it. The security is the biggest concern for the adoption of the cloud. The major issues in this regard are efficiency, data integrity, privacy, and authentication. In order to handle these issues concept of a ring, the signature has been introduced for data sharing amongst a large number of users. Ring signatures are used to provide user’s anonymity and signer’s privacy. But the expensive certificate verification within the ancient Public Key Infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. ID-based ring signature had been introduced which eliminates the process of certificate verification. Further enhancement of security with forwarding security concept has been introduced. According to this idea, if a secret key of any user has been compromised; all previously generated signatures that embrace this user still stay valid. This property is very vital to any giant scale knowledge sharing system because it is not possible to raise all knowledge data owners to re-authenticate their data whether or not a secret key of 1 single user has been compromised. Thus we propose a secure ID-based ring signature with forwarding security.

Published by: Swati Khatal, Tabassum MaktumResearch Area: Cloud Security

Organisation: Terna Engineering College, Navi Mumbai, MaharashtraKeywords: Authentication, Data sharing, Cloud computing, Forward security

Research Paper

8. Comparison of recovery profile of sevoflurane and propofol as induction agent in day care surgery

Daycare surgical procedure is those procedures which are performed in a hospital or an outpatient setting/surgeon’s office where the patient is discharged within 24 hours. 1% Propofol and 8% sevoflurane are commonly used induction agents for such procedures. It is of great importance to select a better induction agent with rapid onset and recovery with minimal side effects. Our study comprises of 60 cases undergoing various daycare surgical procedures that were admitted in National Institute of Medical Sciences and Research Hospital, Jaipur from January 2017-June 2018. This study was carried out to compare which out of propofol and sevoflurane is a better induction agent for day care procedures. In our study, we found that induction was faster and with fewer complications with propofol as compared to sevoflurane which was associated with a higher incidence of postoperative nausea and vomiting. We concluded that propofol is a better induction agent than sevoflurane for daycare surgical procedures.

Published by: Robin Lohia, Dr. Meenaxi SharmaResearch Area: Medical

Organisation: National Institute of Medical Sciences and Research, Jaipur, RajasthanKeywords: Propofol, Sevoflurane, Recovery, Daycare surgery

Research Paper

9. Content based Image Retrieval System using K-Means Clustering Algorithm and SVM Classifier Technique

The dramatic rise in the sizes of pictures databases has blended the advancement of powerful and productive recovery frameworks. The improvement of these frameworks began with recovering pictures utilizing printed implications however later presented picture recovery dependent on substance. This came to be known as Content Based Image Retrieval or CBIR. Frameworks utilizing CBIR recover pictures dependent on visual highlights, for example, surface, shading and shape, rather than relying upon picture depictions or printed ordering. In the proposed work we will use various types of image features like colour, texture, shape, energy, amplitude and cluster distance to classify the images according to the query image. We will use multi-SVM technique along with clustering technique to compare the features of the input image with the input dataset of images to extract the similar images as that of the query image.

Published by: Harleen Kaur Maur, Puneet JainResearch Area: Electronics and Communication Engineering

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: CBIR, SVM, Content Based Image Retrieval, Modified SVM, Clustering based SVM Technique.

Research Paper

10. Multi domain sentiment classification approach using supervised learning

Digital info out there on the net is increasing day by day. As a result of this, the demand for tools that facilitate individuals to find and analyzing of these resources also are growing in variety. Text Classification, particularly, has been terribly helpful in managing the information. Text Classification is that the method of assignment language text to 1 or a lot of classes supported the content. Its several necessary applications within the globe. As an example, finding the sentiment of the reviews, denote by people on restaurants, movies and different such things area unit all applications of Text Classification. During this project, the focus has been ordered on Sentiment Analysis that identifies the opinions expressed in a very piece of text. It involves categorizing opinions in text into classes like 'positive' or 'negative'. Existing works in Sentiment Analysis centered on decisive the polarity (Positive or negative) of a sentence. This comes below binary classification, which suggests classifying the given set of components into 2 teams. The aim of this analysis is to handle a unique approach for Sentiment Analysis known as Multi category Sentiment Classification. During this approach the sentences area unit classified below multiple sentiment categories like positive, negative, neutral then on. Classifiers area unit engineered on the prognostic Model, that consists of multiple phases. Analyses of various sets of options on the info set, like stemmers, n-grams, tf-idf then on, are thought of for classification of the info. Totally different classification models like Bayesian Classifier, Random Forest and SGD classifier area unit taken into thought for classifying the info and their results area unit compared. Frameworks like woodhen, Apache driver and sickest area unit used for building the classifiers

Published by: Parineeta Jha, Sajid KhanResearch Area: Machine Learning

Organisation: Technocrat Institute of Technology, Bhopal, Madhya PradeshKeywords: Sentiment, Positive, Negative, Sentiment analysis

Research Paper

11. Evaluating Alzheimer’s patients' assistance systems in HCI Domain

Nowadays, computer systems play a very important role in the health care context. However, many of these systems are also becoming increasingly complex. In particular, the design of these systems should be compatible with Alzheimer’s situation, as the condition of Alzheimer patients is growing worse, especially with the poor understanding of the disease, lack of support language difficulties, and memory loss. These systems should meet the various needs of such patients. In this paper, we are focusing on evaluating Alzheimer's assistance systems. Usually, in designing those systems, the human-computer interaction (HCI) is left behind. Thus, we demonstrate several aspects to improve Alzheimer’s patient ability to interact with these systems. Moreover, we discussed the key factors that affect the success or failure of those systems taking into consideration criterion such as bringing down health care costs, learnability, usability, dependability, readability, and facilitate automating. At the end, the paper illustrates using charts, and tables to show the impact of applying HCI when designing an interface to achieve user-friendly, intuitive interfaces, and higher usability of the systems.

Published by: Master Prince, Bashayer A. Alafri, Maram S. Alqueflie, Reem A. Almijmaj, Yassmeen A. AlnasserResearch Area: Computer Science

Organisation: Qassim University, Buraydah, Saudi ArabiaKeywords: Alzheimer patients, Human-Computer Interaction, Usability, Intuitive interfaces, User-friendly

Research Paper

12. Analysis of psychological variables between training under a coach and self training athletes

Sports Psychology addresses the interactions between psychology and sports performance, including the psychological aspects of optimal athletic performance, the psychological care and well-being of athletes, coaches, and sports organizations, and the connection between physical and psychological functioning. Sports psychologists can participate in various activities, mostly focused on working to understand what motivates athletes and how athletes can improve their performance. The purpose of the study is to find out Psychological variables between training under a coach and self-training athletes. Thirty athletes training under a coach (15) and self-training (15) was selected randomly from Virudhunagar district, their age group between 22 to 26 years. The subjects were divided into two groups as under a coach group and self-training group. As per the available works of literature, the standardized questioners were used to collect relevant data on the selected variables as stress, anxiety, achievement motivation, and happiness. The collected data were statistically analyzed by using an independent t-test. In all the cases 0.05 level of confidence was fixed as a level of confidence to test the hypothesis. The result shows that there was significantly different between training under a coach group and self-training group on stress, anxiety, achievement motivation, and happiness.

Published by: Dr. G. Peter Michael RajResearch Area: Physical Education

Organisation: Arul Anandar College, Karumathur, Tamil NaduKeywords: Coach, Self-training athletes, Data

Survey Report

13. A survey on motion picture prediction using data mining

In this study, a mathematical model used to predict an upcoming movie success class. This will help to suggest as your interest before release based on several attributes and It will take the suggestion from different linked social sites to determine the interest of the audience. It also shows the most interesting result on top of your list. Many film studios collectively produce several hundred movies every year; the budget of this movie is of the order of hundreds of millions, making their Box office success absolutely essential for the survival of the Industry. Knowing which movie is going to succeed and which are going to fail before the release could benefit the Industry. In this paper, we have enlisted some existing movie prediction using data mining for predicting success and failure by considering their advantages and disadvantages.

Published by: Abhishek More, Sharique Khan, Thabreez IzzudeenResearch Area: Data Mining

Organisation: K.C. College of Engineering, Mumbai, MaharashtraKeywords: Data mining, Predictive analysis, YouTube, Twitter, IMDb


14. Family impact on students’ motivation in Kanyakumari district

This study tries to identify the impact of some family important variable on students' Motivation. Several studies had stressed out the significance of study students' motivation as a move toward to improve their academic performance and develop the firm image. The families and society's changing values and cultures have a great impact on the students' motivation and their academic integration and recital. The questionnaire has consisted of some items. Results showed that students tend to attribute their academic success to internal factors such as hard working while they feature their failure to external factors such as family crisis.

Published by: T. Karthika DeviResearch Area: Kanyakumari District

Organisation: University of Jerusalem, Chennai, Tamil NaduKeywords: Family, Emotional impact, Peer group, Family situation impact

Review Paper

15. Multifunctional robots: A review

Robots replace humans in performing repetitive and dangerous tasks which are guided by a computer program or electronic circuitry. The goal of a robot is to reach remote areas and perform various tasks such as locomotion, sensing harmful gases, metal detection, sound sense, live video streaming and so on. Since these robots perform many functions, they are referred to as multifunctional robots. There are various types of robots. Robots which are used to keep an eye, supervisory control on intrusion thereby function as spy robots. Military robots are used to carry out many risky jobs that cannot be done by the soldiers, thereby saving human lives and reducing manual error in the field of defense. A wireless multipurpose robot can be navigated around the disaster areas to find the humans who need help and also to identify forest fire. Combat robot is designed to tackle cruel terror attacks which can be radio operated, self-powered and has all the controls like a combat vehicle. Soft spider robots are used to perform delicate surgical procedures in the human body which is too unpredictable to be performed by rigid robots. Camouflage robot is designed to duplicate the colors on which it moves on, hence being impersonated by the outside world. Rescue robots are a type of mobile robots which are used to complete search and rescue missions during natural disasters and other emergency situations. Therefore, robots play a very important role in making the tasks performed by humans easier, faster and efficient, thereby increasing speed and productivity.

Published by: S. B. Soumya, Seemab Sultana, S. M. Shivani, Vamaravelli Kavya, Pushpa Y.Research Area: Electronics and Communication Engineering

Organisation: Atria Institute of Technology, Bangalore, KarnatakaKeywords: Multifunctional, Supervisory control, Impersonated

Research Paper

16. Comparative analysis of ECC and Hessian Elliptic curve based message cryptosystem

Security is the major concern in nowadays in many applications, many algorithms were proposed majorly categorized into symmetric and asymmetric key cryptographic algorithms. The limitations with symmetric key cryptography are the scope of knowing the shared key between the communicators to intruders. Hence, asymmetric key cryptography algorithms were performed, among those ECC is one best mechanism. This paper is aiming at the analysis of time complexity, efficiency and security levels of Elliptic Curve Cryptography(ECC) and based upon the analysis, further extension to a strong encryption and decryption algorithm. In addition to that ECC will be extended to other ECC based derived algorithms include Hessian algorithm. Due to the many important properties making the model attractive in cryptography, a paper code is implemented in the Magma software to ensure the correctness of formulas in this work. A comparative analysis will be done among the ECC and Hessian algorithm.

Published by: Palaka Venkata Gangadhar Naveen, Nayana Rao, Dr. R. SivaranjaniResearch Area: Cryptography

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: ECC, Hessian curve, Encryption, Decryption, Security analysis

Research Paper

17. Intelligent model for predicting water quality

Over the decades, water pollution has been a real threat to the living species. The real-time monitoring of drinking water is nothing less than a challenging task. This paper aims to design and develop a low-cost system for the real-time monitoring of water quality using Internet of Things (IoT) and Machine Learning (ML). The physical and chemical parameters of the water such as temperature, level, moisture, humidity, and visibility are measured using respective sensors. ESP8266, the core controller is employed to process the measured values from the sensors. The data acquired from Sensors are sent to the Django server. Random Forest (RF) and K-Nearest Neighbours (KNN) algorithm are used in the analysis and prediction of water quality.

Published by: Ashwini K., J. Janice Vedha, D. Diviya, M. Deva PriyaResearch Area: Computer Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Water quality, Internet of Things (IoT), Machine Learning (ML), K-Nearest Neighbours (KNN), Random forest

Research Paper

18. Hear global on reality index base

As urban environments grow and become even more complex, businesses need highly accurate location intelligence technology to stay ahead. Building a scalable network that detects and identifies objects as fast as your brain starts with the vision of the vehicle. Forward-facing cameras and radar will soon be standard equipment in all cars. This project aims at every car learning from every car, car Parking place identification and continuing to enable an autonomous world with the help of tracking device (precise, end-to-end tracking and accurate, real-time, and historical locations for devices, people, and things). By combining open data with proprietary sources and technologies car sensor data and AI, the HEAR location platform offers a uniquely complete location data set along. The raw images captured by cameras may contain noises, the lighting of workspaces, a flickering of light sources. The preprocessing includes filtering out the noises, images conversions into different color spaces, blurring the image, edge detection, line detection, circle detection. The current project paper comprises of the development of image processing based parking space management. This project will implement based on the theories of Background subtraction algorithm. The usage of this algorithm will be used as a mapping method to reduce the error of detecting the vehicle. The explanation of algorithms such as Background subtraction algorithm and the implementation of Open CV as software to manipulate the image program will be used throughout the project

Published by: Pureti Anusha, Koncha Tejaswini, Mula Srilakshmi, Dhulipalla Sai kumar, Darla SrujanaResearch Area: Data Analytics

Organisation: QIS College of Engineering and Technology, Vegamukkapalem, Andhra PradeshKeywords: Photogrammetric, Image enhancement, Cascaded file, Background subtraction, Pixel transforms

Research Paper

19. Extraction of Neem (Azadirachta Indica) oil using blends of hexane, ethyl acetate and acetone by sonication

Neem oil is a very beneficial oil for human utility in various fields and is commonly extracted by a solvent like hexane and ethanol. This work stresses on investigating the usability of blends of pure solvents while adopting a new technology of sono assisted extraction for the extraction of oil from neem seeds. The prepared blends have been analyzed on the basis of total pressure, bubble point temperature, molecular weight for the different compositions solvents that is to be mixed to form the blends. In this work, it is proposed to use ethyl acetate + acetone, hexane + acetone and hexane + ethyl acetate binary blends with the comparison to unary pure solvents and also recording the solvent recovery in each case after distillation. The reusability of the solvents recovered after the first sets of extraction is also a topic of major concern.

Published by: Priyanuj Bhuyan, Saikat Sen, Vivek BihariResearch Area: Chemical Engineering

Organisation: Guru Ghasidas University, Bilaspur, ChhattisgarhKeywords: Neem Oil, Blends, Sono Assisted Extraction, Hexane, Ethyl Acetate, Acetone

Research Paper

20. Importance of healthcare dietitians’ communication skills

The nutritional professional competency and the communication competency together are very important for a dietitian to provide quality nutritional care to the patients. Dietitians provide nutrition counseling to patients and it is very important that Dietitians should master the art of communication. This article stresses the need and importance of possessing good communication skills by dietitians who are an integral part of the patients’ treatment care.

Published by: S. Ramesh, B. Manimegalai, Annie ValsanResearch Area: Management

Organisation: Christian Medical College and Hospital, Vellore, Tamil NaduKeywords: Communication skills, Healthcare dietitian, Nutrition

Research Paper

21. A non-intrusive approach for drowsy and drunk driving using computer vision techniques

This paper presents a holistic, non-intrusive approach for drunk and drowsy detection of the driver using computer vision techniques of facial landmark detection and motion detection. The driver's continuous real-time video feed is observed with the help of a smartphone camera. A single scalar quantity, Eye Aspect Ratio (EAR) which characterizes persistent eye blinks continuously analyses this feed. Simultaneously the system checks the body and the head movements using the differential imaging technique, which operates in real-time. A severity score indicating the fitness to drive is generated cumulatively using both methods. The driver is notified with the sound of an alarm if the results are positive based on a threshold value of the severity score.

Published by: Madhu, Khushboo Mishra, Shubham Karki, S. R. DhoreResearch Area: Computer Vision

Organisation: Army Institute of Technology, Pune, MaharashtraKeywords: Computer vision, Real-time processing, Motion detection, Facial landmark detection, Eye Aspect Ratio, Severity score

Review Paper

22. Open CV based border security surveillance robot

At present, the surveillance of International border areas is a headache for border guarding forces. The border guarding forces patrolling the border seriously, but it is not possible to monitor the border at each and every moment. Robot becomes an essential requirement of the surveillance when a trespasser enters the restricted area and it report’s nearby board security control unit. The use of robots in the border for surveillance reduces the risk factor of soldiers. The spy robot uses Raspbian operating system with remote monitoring and control algorithm through the Internet of Things (IoT) has been developed which reduces manual error and prevents the entry of unknown persons. The spy robot system comprises of Raspberry Pi (small single-board computer), Pi camera and sensors. PIR sensor detects the living objects and sends information regarding the detection of the living object is sent to the users through the web server and pi camera capture the moving object which gets transferred through mail simultaneously. The user controls the robot with wheel drive control buttons on the webpage. This surveillance system using a spy robot can be modified in different ways for the use in industries, banks, and shopping malls.

Published by: Jeevanantham R., Hemanth Thethan S, Akash K. P., S. PadmavathiResearch Area: Computer Science Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Border security, Raspbian OS, IoT, Spy Robot, Raspberry Pi, PIR sensor

Research Paper

23. Machine learning approach for flight delay prediction

In the cutting edge world, aircraft assume an essential job for transporting individuals and products on time. Any deferral in the timings of these flights can unfavorably influence the work, what's more, the business of thousands of individuals at any given minute. Estimating these postponements is essential amid the arranging procedure in business aircraft. A few procedures have just been proposed for outlining models to gauge the deferral in takeoff time of air ship. In our paper, a two-stage predictive model was developed employing supervised machine learning algorithms for the prediction of flights. The first stage of the model performs binary classification to predict the occurrence of flight delays and the second stage does the regression to predict the value of the delay in minutes. Then, each of the algorithms’ prediction accuracy and the receiver operating characteristic (ROC) curve were compared. Furthermore, an application was fabricated utilizing the model which uses highlights that are promptly accessible before the takeoff of a plane furthermore, can educate travelers and aircraft about flight delays in advance, To reduce the monetary losses.

Published by: Neelima SahuResearch Area: Machine Learning

Organisation: K. J. Somaiya College of Engineering, Mumbai, MaharashtraKeywords: Flight delay prediction, Classification, Regression, Machine learning, FDP application

Review Paper

24. Tooling Platform – Future of software forge

Tooling platform is an open-source software forge. Software forge is a web-based collaborative software platform which can be used for both developing and sharing software applications. Different independent projects can be stored and shared using the Tooling platform. It also acts as a place for maintaining the source code developed by the software development team. It also provides the way for version control of the stored source code. Documentation feature provided in the Tooling platform provides easy maintenance of the developed software application. For users, it can also act as a repository of computer applications. Software forges have gained a lot of popularity in recent years. Forging software is proven to be a successful software development model for many software projects. Tooling platform is used for managing source code repositories, bug reports, discussions, wiki pages, blogs for single or any number of individual projects.

Published by: Swathi NayakResearch Area: Software Engineering

Organisation: N.M.A.M. Institute of Technology, Nitte, KarnatakaKeywords: Software Forge, Software Engineering, Software Development

Research Paper

25. Importance of good nutrition during hospitalization

Good nutrition is deemed mandatory during hospitalization to prevent patients from vulnerable infections, enabling speedy recovery, fast wound healing and avoid frequent hospital readmissions. Clinical dietitian in a healthcare setup is the right person to ensure that patients are getting enough nutrition. Dietitians discuss and find out the nutritional status of the patient and provide support during the course of hospitalization as well as provide a nutritional plan to be followed at home at the time of discharge.

Published by: B. Manimegalai, S. RameshResearch Area: Clinical Dietetics

Organisation: Christian Medical College and Hospital, Vellore, Tamil NaduKeywords: Clinical dietitian, Nutrition screening, Nutrition tool, Nutrition assessment

Review Paper

26. Study on effect of rice husk ash (pozzolanic and green supplementary material) on concrete

Rice Husk Ash (RHA) is a highly reactive Pozzolanic material that can be used for replacement of cement at various percentages. The Rice milling industry generates a huge amount of rice husk during milling of paddy which comes from the agricultural field. This rice husk can be used as supplementary cementing material with Ordinary Portland cement. The main aim of this review paper is to show the modified properties of concrete made from the addition of RHA in different percentages. The effects of RHA on concrete properties such that compressive strength, workability, tensile strength shall be investigated.

Published by: Bhupendra Kumar, Pooja SemwalResearch Area: Civil Engineering

Organisation: Faculty of Technology, Suddhowala, Dehradun, UttarakhandKeywords: Rice husk ash, Compressive strength, Workability of concrete

Research Paper

27. A comparative analysis of IoT features between AWS and Azure

The technological advancements in the area of “Internet of Things” (IoT) have taken a big leap in the last few years. IoT has changed our surrounding in many ways, some of which is noticeable and some are unnoticeable. These days Organizations are investing huge funds in the field of IoT. Internet of Things (IoT) is basically the identification of objects in the LAN or WAN by providing the objects a unique IP address. Objects, pets or humans are equipped with embedded sensors, which helps them to routinely transfer data over the LAN/WAN without any human intervention. IoT is a swiftly growing technology which is making customers life more prolific and enjoyable. In this paper, we will try to compare the features of services offered by AWS and Azure with respect to the IoT Platform. Both Azure and AWS are market leaders in cloud-based IoT and offers numerous services for users to work on the IoT platform.

Published by: Prashant Dutta, Pranay DuttaResearch Area: Internet of Things

Organisation: Madhya Pradesh Poorv Kshetra Vidyut Vitaran Company Ltd., Jabalpur, Madhya PradeshKeywords: Internet of Things (IoT), Azure, Amazon Web Service (AWS), MQTT (Message Queuing Telemetry Transport)

Case Study

28. Challenging role of dietitian to improve oral food intake in a post bone marrow transplant patient – A case report

Bone Marrow Transplantation (BMT) involves the administration of high doses of chemotherapy, immunosuppressive medications, and infusion of marrow cells. During and after treatment, patients may develop a poor appetite, mucositis, anorexia and gastrointestinal failure which severely affect the food intake and leads to malnutrition (1, 2). It is important to follow dietary guidelines for post bone marrow transplant patient to improve or maintain nutritional intake. The dietary approach varies from patient to patient based on their condition. This case report explains the crucial role of a dietitian to improve the nutrient intake and nutritional status of the post bone marrow transplant patient.

Published by: K. Priya, K. Jayalakshmi, S. Ramesh, B. ManimegalaiResearch Area: Clinical Dietetics

Organisation: Christian Medical College and Hospital, Vellore, Tamil NaduKeywords: BMT, TPN, AML, Nutrition Support, ONS

Research Paper

29. IoT based interactive warehouse monitoring system integrated with Android application

An integrated warehouse management module is provided enabled by IoT (Internet of Things) The system and method are providing capacity and capability of remotely managing the warehouses consists, edible materials including food grains and providing of vital information like moisture contents, contamination levels if any to the warehouse managing team. The device is enabled with necessary facilities for storing of vital information in cloud-based utilities for enabling the team which manages the warehouse to take instantaneous decisions on the materials stacked. Fire alert mechanisms and providing information related to earthquakes in the vicinity of the warehouse to nearby police and other agencies are provided/incorporated in the device. Information on marked variations on a weight of the contents of the stacked materials inside the warehouse can be instantaneously shared to the warehouse management team with the help of cloud services and android application and steps to curb pilferage of the contents are incorporated in the system.

Published by: Hariharan P. R., Karthik Hariraj, kalpanasonika RResearch Area: Warehouse Management

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Internet of Things, Warehouse management, Cloud storage, Cloud services, Android application

Review Paper

30. History of dental implants, in memoriam: Dr. Per-Ingvar Branemark, the man who made people smile

Dr. Per-Ingvar Branemark, the father of modern implant dentistry died unexpectedly on December 20, 2014, in his birthplace Gothenburg, Sweden at the age of 85 by a heart attack. He was a Swedish professor of anatomy who accidentally discovered an intimate bone-to-implant contact with titanium, the phenomenon that he called it “osseointegration”. Few scholars and even fewer individuals in the world haven’t heard his name due to his valuable innovation and noteworthy favor to humanity. This article is written in order to appreciate his invention and asking God for forgiveness at his first death anniversary.

Published by: AliResearch Area: Dentistry

Organisation: Mashhad University of Medical Sciences, Mashhad, IranKeywords: Dental implants, Dr. Per-Ingvar Branemark

Review Paper

31. Design and analysis of hybrid fiber metal on street lamp post

Half and half materials of any class are basic for current requests. This paper manages the corrosion of composites made flax/E-Glass strands which are created by hand layup strategy utilizing LY556 Epoxy and HY951 hardener. The properties of this composite are dictated by testing like hardness and the corrosive quality which are assessed tentatively as per ASTM gauges. The consequence of the test demonstrates that half and a half composite of flax/E-glass fiber has obviously better properties than that of the metal components.

Published by: Rabin P., Mahesh S., Pranav PrakashResearch Area: Composite Material

Organisation: Dhanalakshmi College of Engineering, Chennai, Tamil NaduKeywords: Hybrid fiber metal, LY556 Epoxy and HY951 hardener

Research Paper

32. Application of machine learning techniques in estimation of crop yield

It is a process in which we can know what happened in the past. And we know that past is the best forecaster of the future. In this research paper we apply evocative analytics in the agriculture production domain for sugarcane crop to find efficient crop yield estimation. In this paper we have three datasets like as Soil dataset, Rainfall dataset, and Yield dataset. And we make a combined dataset and on this combined dataset we apply several supervised techniques to find the actual estimated cost and the accuracy of several techniques. In this paper three supervised techniques are used like as K-Nearest Neighbor, Support Vector Machine, and Least Squared Support Vector Machine. It is a comparative study which tells the accuracy of training proposed model and error rate. The accuracy of training model should be higher and error rate should be minimum. And the proposed model is able to give the actual cost of estimated crop yield and it is label like as LOW, MID, and HIGH.

Published by: Keerti Mulgund, Rupa S. G.Research Area: Machine Learning

Organisation: Smt Kamala and Sri Venkappa M. Agadi College of Engineering and Technology, Lakshmeshwar, KarnatakaKeywords: Crop yield estimation, Support Vectors, Least square Support Vector Machine, Data analytics, Agriculture analytics

Research Paper

33. Fusion of two and three colored and gray scale images using modified – Laplacian Pyramid Technique

Image fusion is a process of blending the complementary as well as the common features of a set of images, to generate a resultant image with superior information content in terms of subjective as well as objective analysis point of view. The goal of this exploration work is to build up some novel picture combination calculations and their applications in different fields, for example, split identification, multi-spectra sensor picture combination, restorative picture combination and edge location of multi-center pictures and so forth. The initial segment of this exploration work manages a novel break identification system dependent on Non-Destructive Testing (NDT) for splits in dividers smothering the assorted variety and multifaceted nature of divider pictures. It pursues diverse edge following calculations, for example, Hyperbolic Tangent (HBT) sifting and shrewd edge recognition calculation. The combination of locator reactions are performed utilizing Haar Discrete Wavelet Transform (HDWT) and most extreme guess with mean-detail picture combination calculation to get increasingly noticeable identification of split edges. In the proposed framework we have performed picture combination for two just as for three pictures. The proposed framework gives improved edge location in pictures with unrivaled edge confinement and higher PSNR.

Published by: Kajal, Puneet JainResearch Area: Image Processing

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: Image fusion, Laplacian Pyramid Technique, Discrete Wavelet Transform (DWT)

Research Paper

34. Graft materials in lateral window approach for maxillary sinus lift procedure before implant placement

Endosseous dental implants have been widely used in the past decades for rehabilitation of edentulous area as a successful and predictable treatment strategy. Achieving the adequate volume of bone is the prerequisite and a challenging issue for severely atrophic areas. Several reconstructive procedures have been used for vertical and horizontal bone augmentation before implant placement. Maxillary open sinus lift procedure is a conventional technique for elevating the sinus floor and placing the bone graft in the posterior atrophic maxilla before implant placement. This article represents the graft materials used for lateral approach sinus lift surgery.

Published by: AliResearch Area: Oral Surgery

Organisation: Mashhad University of Medical Sciences, Mashhad, IranKeywords: Graft material, Maxillary sinus lift

Research Paper

35. Intelligent model to identify the duplicate products in catalog management

Nowadays electronic catalog management provide more information about the products to the customers. Catalog management in the e­commerce system supports the definition, storage, retrieval, and management of product information in the e­commerce process. In which electronic catalog contains a duplicate of the product so it reduces the customer’s experiences and it should not provide much more relevant information about the products in the search recommendations. This paper presents the method to solve the duplicates of the product and increase the search recommendations with the help of the Relational Database Management System (RDMS) and (DBMS). So, it creates a systematic and impressive catalog that helps the customers to get all the product descriptions and images they need and reduces the duplicates to make a buying decision

Published by: M. Kavitha, Akilandeswari E., P. Tamije SelvyResearch Area: Computer Science Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Electronic commerce, Catalog, Merchant, Eliminate duplicate

Review Paper

36. The Future of Cyber Security

In the near future, cyber security will play a dominant role in personal and business applications. As society is becoming more and more digitized, there are more chances to win by exploiting this. As a result of the growing proliferation of digitization and connected devices, the demand for cyber security solutions is growing at a relatively high rate. The complexity and connectivity of digitized systems have a direct impact on their security. The goal of this review is to summarize the logical predictions of the future of cyber security.

Published by: Adharsh Krishnan, M. Deva PriyaResearch Area: Cyber Security

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Cyber security, Information security, Cloud systems, IoT systems, Digitization, Cyberspace, Cyber defense

Review Paper

37. ATM- Security using machine learning technique in IoT

The idea of designing and implementation of the real-time ATM security project came with the incidents of accessing the ATM by the unauthorized users instead of an authorized user. This project will give access to the user only after identifying the image of the user taken by the CCTV in the ATM and compare the identified image with the image of the user that was stored in the database created during the account creation which comes under the banking session of banks. In some cases the authorized user is not able to use the ATM for some emergency purposes, in such cases, the OTP is sent to the users registered mobile number and the person who came instead of the authorized user have to enter the OTP that the authorized user received. This method will reduce the risk of ATM usage by common people. The face detection and face recognition are done using deep learning techniques and machine learning. The IOT components like Camera, RFID reader, Tag, Relay, Motor were used. The Raspberry pi 3 (2015 version) is used as the main component. Here the open CV is used as the platform and the python language is used for the deep learning techniques and face detection Haar cascade is used for face detection. The face recognition module is done by Local Binary Patterns (LBP) algorithm. And an alert message is sent to the authorized user as a text message if the user is found to be the third party user.

Published by: Udhaya Kumar N., Sri Vasu R., Subash S., Sharmila Rani D.Research Area: IoT

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: ATM, Camera, RFID reader, Tag, Relay, Motor, Raspberry Pi 3 deep learning, Open CV, Python, Haar cascades, CCTV, Local binary patterns, Alert message

Research Paper

38. Accident detection system based on Internet of Things (IoT)- Smart helmet

The objective of our smart helmet is to provide the means for detecting and reporting accidents. The working of this smart helmet is very simple; vibration sensors are placed in different places of the helmet where the probability of hitting is more, which are connected to the microcontroller board. When the rider met with an accident and the helmet hits the ground, these sensors sense and gives to the microcontroller board, then controller extracts GPS location using the GPS module that is interfaced to it. When the data exceeds the minimum stress limit then the GSM module automatically sends a message to the registered emergency contacts and the link through which the location and the speed of the victim will be displayed in the mobile application and in the web application.

Published by: Kabilan M., Monish S., Dr. S. Siamala DeviResearch Area: Computer Science And Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Camera, Emergency contacts, GPS, Internet of Things, Raspberry Pi, Smart helmet


39. Restaurant management system Android application

The main target of this paper is to conduct a thorough and in-depth analysis of the vast field of Software engineering and at the same time explore the opportunities and the conditions that could lead into building a successful Android app. The simplicity and ease of access to a menu is the main component that facilitates ordering food in a restaurant. A user-friendly menu completely changes the patron’s dining experience. Existing programs provide an app that restaurants can use to enter their menus into Android-based tablets and make it easier for the diners to flip, swipe and tap through the menu. This system is used to provide the restaurants with a tablet menu that would recommend dishes based on a recommendation algorithm which has not been implemented elsewhere. This system uses a cloud-based server for storing the database.

Published by: Sucharita M. Samantaray, Karan Dhoke, Pranay Pawar, Rina MishraResearch Area: Computer Technology

Organisation: Bharati Vidyapeeth Institute of Technology, Navi Mumbai, MaharashtraKeywords: Restaurant management system, Android App, E-commerce, Food ordering system

Research Paper

40. Decentralized secure money transfer using blockchain

A blockchain is just a chain and a list of blocks. Each block, in the blockchain, will have its own digital signature. Each block doesn’t just contain the hash of the block, but its own hash in part, calculated from the previous hash Calculating and comparing the hashes allow us to see if a blockchain is invalid. We create a system that Allows users to create wallets and Provides wallets with public and private keys using Elliptic-Curve cryptography. Secures the transfer of funds, by using a digital signature algorithm to prove ownership and finally allow users to make transaction your blockchain

Published by: Suganya T., Vignesh A., Vignesh Kumar N., Vivin Kumar D.Research Area: Block Chain

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Blockchain, Netbeans, MySql

Research Paper

41. The association between Myopia and near work activities in young adults in Durgapur, West Bengal

Myopia is one of the most prevalent refractive error that can be defined as a state in which the eye fails to see distant objects properly. Most of the young adults are affected by myopia in the world due to many factors. A few researchers showed in their research articles that near work activities lead to the progression of myopia. The main objective of this paper is to identify all the main factors of myopia in young adults in the southern region of West Bengal, especially in Durgapur. To meet this objective a sample of 2500 young adults were selected using simple random sampling procedure and examined through Snellen’s Chart and retinoscope and found 575 young adults have been suffering from various grades of myopia. In the next phase, we have identified the relevant factors of near work activities such as types of light used, time spent on near work per day, uses of the cell phone. We have analyzed the data through SPSS 16.0 software and interestingly we found some significant associations among them.

Published by: Atanu Maulik, Dr. Kavita BhatnagarResearch Area: Optometry Science

Organisation: NIMS University Rajasthan, Jaipur, RajasthanKeywords: Myopia, Refractive error, Near work activities, Retinoscope, Snellen’s chart

Review Paper

42. Patient health monitoring system

Health is one of the primary capabilities that a human need to go on with his life. That is the main reason the healthcare provided to the human must be bestowed in ample means and effective ways to ensure his health based on health monitoring parameters and the medical assistance being provided directly. The new technological development and its implementation now involve the internet and the sensors often known as the Internet of Things (IoT), which enables the worldwide approach to the health care base system development. This steers to the health system management that in a real-time approach it supplies a set of particulars relevant to the patient being monitored. In all the countries the death rates are becoming high due to the absence of well-timed medical treatments. These can be shut out through standard health care. The paper puts forward an IoT approach for a superior health monitoring system, by involving the sensors where they sense the body temperature plus the heartbeat and tells the doctor or the attending staff of the patient about the state of the patient. The project uses the KNN algorithm to predict the shape and condition of the sufferer to prevent them from going into further bad state. When the bad condition of the patient is predicted and detected by the system, it sends mail to the doctor in the most emergency situation or else in other cases it keeps on updating the sensed values in the web page created. The system also includes a buzzer beeping situation, where the beeping occurs when the nurse has to be notified of the state of the patient. Whereas, the previous systems developed did not do the predicting part, which plays the most important role in taking care of the patient. Thus, the project results in taking the greatest possible measure in helping the patients improve their situation.

Published by: Siva Priya S., Shruthi M. G., Sruthi S.Research Area: Internet Of Things

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: IoT, Machine learning, KNN, Emergency


43. Drowsy driving warning and traffic collision information system using IoT

Driver lassitude induced drowsiness accounts for a major of road accidents. To avoid such accidents, a precautionary system is needed. The idea is to develop driver sleep detection, drunk and drive monitoring system. Digital Image Processing (DIP) technique is used to detect fatigue. Haar cascaded algorithm is used for eye detection. In this paper, a system is proposed to avoid road accidents using the alert system along with collision information system. IOT module is used to get location information and to send messages. Wi-Fi module is used to update location information in the server.

Published by: Madhan Kumar A., Kabilan M., Karthikeyan S. B., Sathiyapriya S.Research Area: Embedded System

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Haar cascade algorithm, DIP, IOT, Wi-Fi

Research Paper

44. Sensor design system and power adjustment of transmitter in FSO communication

The main problem related to FSO communication is atmospheric attenuation. To cope with such problem and maintain a dedicated connection, the transmitter power has to be adjusted continuously depending upon the weather condition of that particular time. Here we propose a design where we utilize the precipitation detection sensor and visibility sensor of ASOS. The weather conditions are detected using these sensors and some statistical data collected over time. Each condition provides some set of rules and equations which interlinks the power of receiver and transmitter. The transmitter if operated on such equation would yield the maximum efficiency. This results in power saving of the model. An automatic power device for FSO could be designed. In the below-discussed idea, we strictly restrict ourselves on atmospheric attenuation domain. Other factors like pointing Loss, Free space loss, Divergence loss are not taken into consideration. To take these issues into consideration, calculations have to be complex. While designing a real model, these factors would be taken as an important factor of attenuation too. Here Noise Equivalent Power and transmission power equation have been proposed which has visibility as a variable.

Published by: Diptangshu ChattopadhyayResearch Area: Communication Engineering

Organisation: Jalpaiguri Government Engineering College, Jalpaiguri, West BengalKeywords: Power, Attenuation, ASOS, FSO, Precipitation, Visibility, Atmosphere

Review Paper

45. Walking stick with heart attack detection

The Walking Stick with Heart Attack Detection is equipment that is used daily to indicate a heart condition, to detect heart attack and to call for emergency help. It was designed specially to help senior citizens and patients with heart disease. It consists of three basic sub-projects Circuit, Analysis Algorithm, and Bluetooth Communication. The first unit is worn on the user’s wrist captures abnormal heartbeat signal from the patient., and the rest two are installed in the stick. The microcontroller on the stick runs a heart attack algorithm. A warning is given out to the person about his heart condition. The Bluetooth emergency calling system calls for medical help at the moment of the heart attack. The effectiveness of the proposed method is confirmed by experiments on a commercially available walking stick. Each of the three subprojects responded positively.

Published by: Cheedella Sai TejaResearch Area: Electronics Engineering

Organisation: Sathyabama Institute of Science and Technology, Chennai, Tamil NaduKeywords: EGC, Heart beat, Heart attack, Bluetooth, Stick

Review Paper

46. License plate detection and string conversion using Haar-like cascade classifier

This paper presents a core module for intelligent transportation based on the method Haar-like cascade classifier for high accuracy license plate detection. Many real-time car license plate detection is reasonable and effective only under certain conditions and assumptions. Therefore a real-time method Haar-like cascade and Tesseract search for Optical Character Recognition (OCR) has been proposed. Using accurate prediction and fast analysis strategy our proposed system can constructively out pass the problems in real-time scenarios. After binge analyzing the system with various inputs to establish that the proposed system is superior to the existing systems in terms of accuracy and time consumption.

Published by: Ashwin B., T. Goutham, P. KalpanaResearch Area: Computer Science Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Haar-like feature, Optical character recognition, Convolutional neural network, Tesseract, Edge features, Adaboost, Cascading classifiers, Recurrent neural network, Long short term memory

Research Paper

47. Role of splenorrhaphy in selected cases of splenic trauma

The term splenorrhaphy actually represents a variety of “spleen sparing” techniques aimed at controlling the hemorrhage from a splenic injury while sparing the patient from the long-term immunologic consequences of splenectomy. This is a hospital-based observational interventional study done on 50 cases in Department of General Surgery NIMS University and Medical College and Hospital, Jaipur during January 2017- June 2018. The severity of the splenic injury can objectively be described with a grading system developed by the American Association for the Surgery of Trauma.

Published by: Dr. Gulrez Siddiqui, Dr. Ashok Kumar GuptaResearch Area: Medical

Organisation: National Institute of Medical Science and Research, Jaipur, RajasthanKeywords: Splenectomy vs. splenorrhaphy, Complication of splenectomy, Advantages of splenorrhaphy

Research Paper

48. Automatic speed control of a vehicle using RFID technology

Most of the road accidents occur due to traffic violation and over speeding. Running vehicle avoiding the traffic lights has become a major issue now a day. Observing traffic violation manually has become tedious and too complicated, on account of expanding the number of vehicles on the road. The number of a road accident is continually expanding and has turned into a noteworthy region of concern. To decrease the number of road accident we propose a system which controls the speed of vehicle consequently in any basic zone, without significant inconvenience to the driver. Here, we review a model dependent on RFID innovation. One RFID reader set inside the vehicle which reads the RFID tag set either at the traffic light or at speed limit board. A decision is taken by a controlling module in the vehicle and controls the speed appropriately.

Published by: D. Pavankumar, A. Selvarani, C. R. Vigneshkumar, Nimmalapalli Sri HarshaResearch Area: Elecronics

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: RFID (Radio Frequency Identification), ECU (Electronic/Engine Control Unit), Driver assistance systems


49. Analysis of object-oriented system quality model using soft computing techniques

Quality plays very important role in software industry because the objective of every software industry is to produce good quality software with in time and budget. Number of quality models have been proposed and used by various authors to build good quality software and these software quality models are also responsible for improving the performance, this improvement directly reflects the quality, increase users satisfaction and decrease the cost of quality. This report we have discussed and compared various quality models and soft computing techniques used for predicting the quality of software product and software system. It is found from the literature that there are lots of quality models and we measure quality based on their characteristics, so here, in this work we gives the characteristics definition and then comparison of quality models related to quality characteristics. In this study we exploring the information about soft computing technique for predicting the quality of a system or product and also develop a new quality model using soft computing (Fuzzy, Neural Network and Neuro-fuzzy) approach which is responsible to predict the software quality of an object-oriented system. In this report, we also identifies the most important factors of object-oriented system like Efficiency, Reliability, Reusability and Maintainability and also proposed a model based on these four factors that evaluating the quality of object-oriented system using soft computing technique i.e. Fuzzy Logic, Neural Network and Neuro-Fuzzy.

Published by: Anil KumarResearch Area: Software Quality

Organisation: Saroj Institute of Technology and Management, Lucknow, Uttar PradeshKeywords: Software quality model, Soft computing techniques, Neural Network, Fuzzy Logic

Review Paper

50. Weather adaptive traffic prediction and analysis of accidents using machine learning algorithms

Predicting traffic flow is one of the fundamental needs for comfortable travel, but this task is challenging in vehicular cyber-physical systems because of ever-increasing uncertain traffic big data. Although live data with outstanding performance recently have become popular, most existing models for traffic flow prediction are fully deterministic and shed no light on data uncertainty. Also, they are many inventories in automobile industries to design and build safety measures for automobiles, but traffic accidents are unavoidable. There is a huge number of accidents prevailing in all urban areas. In this study, a novel dynamic approach is proposed for predicting citywide traffic flow based on weather. The proposed system utilizes the neuro-wavelet algorithm to select the required features for traffic prediction. The system also proposes the K Nearest Neighbor algorithm to predict the accuracy of accidents occurred in urban regions.

Published by: S. Bharath, Dr. S. Siamala Devi, M. Guruswamy, M. AravindResearch Area: Data Analytics

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Traffic prediction, Feature selection, Classifier methods, Accident analysis

Review Paper

51. Exploring the relative predictive efficiencies of spatial regression models

Spatial regression models are standard tools for analyzing data with spatial correlation. These models are broadly used in the social sciences for predicting the socio-economic factors. In this paper, we discuss about various spatial regression models and explain the concepts based on real data to demonstrate how to obtain and interpret relevant results. We describe prediction efficiencies of various predictors relative to the efficient minimum mean square error predictor in spatial models containing spatial lags in both the dependent variable and the error term. We consider Multiple Linear Regression Model (MLRM), Spatial Autoregressive Models (SAR), Spatial Autoregressive in the Error-term Model (SEM) and Spatial Durbin Models (SDMs) to estimate the literacy progress in the districts in Odisha as a result of changing socio-economic factors over time. The goodness of fit of the different models are compared along series of hypotheses about the performance of the specifications considering spatial relationships among the observations. The spatial analysis proved the existence of positive spatial autocorrelation and persistence of disparities in literacy attainment level across the regions during the analyzed period. The results of econometric analysis confirmed the expected positive impact of economic growth on literacy progress level as well as the necessity to incorporate the spatial dimension into the model.

Published by: Bhabani Shankar Das Mohapatra, Dr. E. G. RajanResearch Area: Spatial Data Mining

Organisation: Jawaharlal Nehru Technological University, Hyderabad, TelanganaKeywords: Spatial regression, Spatial analysis, Exploratory spatial data analysis, ML method, Euclidean distance, Lagrange multiplier tests


52. Passenger service system

Increased competition in the commercial transportation industry has made service quality of every transportation agencies as one of the key competitive measures to attract passengers against their rivals in-flight services, particularly food delivery and waste collection, have a notable impact on perception of the overall airline’s service quality because they are directly and indirectly provided to passengers during flight. This is the scenario in every industry. This project consists of two sections, passenger section, they can request their needs by pressing a button in the keypad and it sends to the control room section and it is displayed on an LCD control room section. The requested needs may be food, water and if it is “any other help”, the air hostess directly goes to the requested person.

Published by: Abhiram P. S., Mohammed Aslam, Sreebal Anil V. A., Minnuja ShellyResearch Area: Computer Science

Organisation: Universal Engineering College, Thekkumkara, KeralaKeywords: Flight, Passengers, Airline, Services, Air hostess


53. A text reader for the visually impaired using Raspberry Pi

In this paper, an innovative, efficient and real-time beneficial technique that enables the user to hear the contents of text images instead of reading through them has been introduced. It uses the combination of Optical Character Recognition (OCR) i.e. Tesseract and Text to Speech Synthesizer (TTS) in Raspberry Pi. This kind of system helps visually impaired people to interact with computers and day-to-day text effectively through vocal and keyboard interface. Text-to-Speech is a device that scans and reads English alphabets and numbers that are in the image using the OCR technique and changing it to voices. We are including obstacle detection via ultrasonic sensor and color detection. This device consists of three modules, image processing module, voice processing module and an object detecting module. The device was developed based on Raspberry Pi 3 Model R, Clock Speed of 1.2 GHz.

Published by: C. Ebenezer Durai, A. Selvarani, S. Siva Suthan, M. Anwin KushalResearch Area: Embedded

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Raspberry Pi, OCR, Camera, Image processing, Tesseract, Voice processing, Obstacle detection, GPS detection

Research Paper

54. Survey on generative adversarial networks

GAN stands for Generative Adversarial Networks.GANs are the most interesting topics in Deep Learning. The concept of GAN is introduced by Ian Good Fellow and his colleagues at the University of Montreal. The main architecture of GAN contains two parts: one is a Generator and the other is Discriminator. The name Adversarial stands for conflict and here the conflict is present between Generator and Discriminator. And hence the name adversarial comes to this concept. In this paper, the author has investigated different ways GAN’s are used in real time applications and what are the different types of GAN’s present.GAN’s are mainly important for generating new data from existing ones. As a machine learning model cannot work properly if the size of the dataset is small GAN’s are here to help to increase the size by creating new fake things from original ones.GAN’s are also used in creating images from the given words that are text-to-image conversion.GANs are also applied in image resolution, image translation and in many other scenarios. From this survey on GAN author aim to know what are the different applications of GAN that are present and their scope. The author has also aimed at knowing the different types of GAN’s available at present. The author has also aimed at knowing the different applications of GAN and different proposed systems by various authors.

Published by: N. Yashwanth, P. Navya, Md. Rukhiya, K. S. V. Prasad, Dr. K. S. DeepthiResearch Area: Deep Learning

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Generative Adversarial networks, Generator, Discriminator, Neural network, Deep Learning

Survey Report

55. Answer script evaluator: A literature survey

Every college, university, school conduct exams and most important part of exams are the results. In order to get these results, the exam papers have to be evaluated one by one manually. This process of evaluating the exam papers is time-consuming and requires more manpower. To overcome this solution, we have come up with a thought that removes the manual evaluation process. Our project focuses on developing a system that evaluates an answer script against a pre-uploaded marking scheme. Initially, the answers are taken in digital format and those digital answers are processed using algorithms such as word2vec where the word’s similarity index is extracted and the words similar to it are noted. Using this we can also get the meaning of the paragraph and we can match it with the answer key and get the match percentage. Using this percentage, we can calculate the marks to be awarded.

Published by: Sachin B. S., Shivaprasad K., Somesh T., Sumanth Hegde, Radhika A. D.Research Area: Machine Learning

Organisation: Vidyavardhaka College of Engineering. Mysore, KarnatakaKeywords: word2vec, Deep Neural Networks, doc2vec

Research Paper

56. Smart helmet to detect and prevent accident

The impact when a motorcyclist involves in a high-speed accident without wearing a helmet is very dangerous and can cause the fatality. Wearing a helmet can reduce shock from the impact and may save a life. There are many countries enforcing a regulation that requires the motorcycle's rider to wear a helmet when riding on their motorcycle, Malaysia is an example. A smart helmet is a special idea which makes motorcycle driving safer than before. This is implemented using GSM and GPS technology. The working of this smart helmet in IoT is very simple, vibration sensors are placed in different places of the helmet where the probability of hitting is more which are connected to microcontroller board. So when the rider crashes and the helmet hit the ground, these sensors sense and gives to the microcontroller board, then controller extract GPS data using the GPS module that is interfaced to it. When the data exceeds minimum stress limit then GSM module automatically sends the message to ambulance or family members. It also has an alcohol detector sensor which detects whether the person is drunk and switches off the engine if the sensor output is high.

Published by: L. Sindhu, G. Swedha, G. Nandhini, S. J. Raffel, M. RashikaResearch Area: Internet of Things

Organisation: Dhirajlal Gandhi College of Technology, Salem, Tamil NaduKeywords: IoT, GPS, GSM, Sensors, Helmet

Review Paper

57. IoT based smart energy meter

In the recent digital era, technology starts to find new ways of improving and enhancing human lives, all the devices are getting smarter than we could expect it would be. In the same way, we have an idea of making the energy meters of Electricity Board highly smarter using the technology “Internet of Things (IoT)”. The smart energy meter is connected with Electricity Board, household appliances and the user through IoT and mobile application. We are focusing on making the smart energy meter too smartly connect with the household appliances through IoT and also to connect with the authorized persons through a mobile application to have control over it.

Published by: Ahin Shapiro R., Dr. A Balamurugan, D. Satheesh Kumar, G. SwaminathanResearch Area: Internet of Things

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Internet of Things, Smart systems, Energy meter, Electricity board

Review Paper

58. Study on bamboo reinforcement concrete structure

Bamboo is used as a construction material from earlier days of construction. It was used as reinforcement in a rural area and as formwork also. Concrete is a brittle material so it cannot be used as a single material in construction due to its low tensile strength. In this study, we tried to find out the properties of bamboos from past studies. and from the past study, we can find out the better way to improve the strengths of bamboo as a reinforcement in concrete structures.

Published by: Rajneesh Bhandari, Pooja SemwalResearch Area: Civil Engineering

Organisation: Uttarakhand Technical University, Dehradun, UttarakhandKeywords: Bamboo, Concrete, Reinforcement

Review Paper

59. Detailing aspects of the reinforcement in reinforced concrete structures retaining wall: A case study

This thesis studies the impact of reinforcement detailing on the behaviour of a reinforced concrete structure. Using a retaining wall as a case-study, the performance of two commonly used alternative reinforcement layouts (of which one is wrong) are studied and compared. Reinforcement Layout 1 had the main reinforcement (from the wall) bent towards the heel in the base slab. For Reinforcement Layout 2, the reinforcement was bent towards the toe. This study focused on the reinforcement details used in the D-region, and on how it impacts the capacity, joint efficiency and failure mode of the structure.

Published by: Vipin Singh, Pooja SemwalResearch Area: Civil Engineering

Organisation: Faculty of Technology, Suddhowala, Dehradun, UttarakhandKeywords: Modeling, Analyzing, Reinforced concrete structure, D-region

Research Paper

60. Removal of cardiac atherosclerosis

Atherosclerosis is a condition in which the plaque, made up of organic and inorganic substances such as fat, cholesterol, and calcium gets deposited in the inner walls of the arteries. This result in the narrowing of the arteries that prohibits the supply of the oxygen-rich blood to the heart and the other parts of the body. The stent is a miniaturized mesh-like tube structure that pushes the plaque depositions against the arterial walls and restores the normal blood flow in the artery. In this paper gives the study of the deformation of a coronary stent that is deployed in the coronary artery of the heart. The catheter inserted into the arteries of blood vessels. Using an ultrasonic sensor to predict the distance by applying an ultrasonic wave. The ability to use a laser that generates an intense beam of coherent monochromatic light will assist to breach the plaque. A Motor being used for a centrifugal fan to grind the broken plaque. GSM is proving for telecommunications. This proposed model can detect the plaque in arteries and remove the plaque by using devices. We have done this process in the prototype model by using a microcontroller.

Published by: Asif Farhan S., Niranjana E., Kaviyaa R., Prabavathi R.Research Area: Biomedical

Organisation: Rajiv Gandhi College of Engineering and Technology, PondicherryKeywords: Catheter, Laser, GSM, Prototype, Microcontroller

Review Paper

61. Share market analysis for share selection using data mining technique

The share market has been a field of vast interest both for those who wish to make money by trading shares in the share market. Generally, there is an opinion about share markets like high risk and high returns. Even though we have a huge number of potential investors, only very few of them are invested in the share market. The main purpose is they are not able to take risk of taking the skill of investors. Though get low returns they want to save their money. One important reason for this problem is that they don’t have proper guidance for making their portfolio. In this paper we focus the real-world problem; we had selected three indices such as SENSEX, NIFTY. The analysis is purely based on the data collected from the past three years. The Data mining technique, Time series interpretation is applied for the Data analysis to show the ups and downs of a particular index. The correlation and Beta are the tools which give the suggestion about the share and its risk. The correlation tool is used to identify the relationship between the index and the company individually. This Beta is used to identify the risk associated with the share.

Published by: Munaf Patel, Zahir AalamResearch Area: Data Analysis

Organisation: Thakur College of Engineering and Technology, Mumbai, MaharashtraKeywords: Linear regression, Data analysis, Correlation, Beta, Time series

Research Paper

62. IoT based accident detection and prevention system with android application

A system of accident detection and prevention powered by IoT((Internet of Things) The method helps in detecting and preventing vehicular accidents with immediate intimation and information like real-time tracking of the vehicle to closed ones, vehicular speed met. The device is connected over the cloud to use its basic functionalities of storage and perform historical analysis. Vital information’s that help over as an aid at the red-zone is passed over to the nearest police stations, hospitals, highway authorities, etc. Information is instantaneously notified and shared to the closed ones of the victim using the cloud services and mobile application at the time of the accident to avoid delay of information and aid and

Published by: Johnny Antony Puthur, Dr. S. Siamala DeviResearch Area: Computer Science and Engineering

Organisation: Sri Krishna College of Technology, Coimbatore, Tamil NaduKeywords: Internet of Things, Accident detection, Accident prevention, Bluetooth low energy, Cloud storage, Cloud services, Android application

Research Paper

63. An adaptive approach to prognosticate an individual’s capability for emolument through Machine Learning

One of the major integrant to be considered while granting a loan is the customer‟s ability to pay back the amount to the bank as per the bank's provided a schedule. Our work focuses on the analysis of all the attributes that might affect the customer‟s ability to pay the loan. It is basically a credit scoring mechanism used by the bank to make sure a customer's intentions to apply for a loan are legit using Ensemble Algorithms. Our work gives a probabilistic predictive model or a scorecard to estimate the probability of defaulters in the current global scenario. Our work is due diligence fulfilled by the investors involved with the bank. Our aim is to prognosticate correct credit worth which will cause a significant increment in the profits of commercial institutions.

Published by: Jujjuri Goutham, T. Anitha, S. Joshua Johnson, Routhu Dhanunjay, Vemuri Susmitha, Nagavarapu SravaniResearch Area: Machine Learning

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Random forest classifier, Defaulters, Mathew's correlation coefficient, Credit scoring


64. Use of housing society

Over the last few years, we have observed a focus on engineering science has been established whose products are likely to create a large market in the near future. It has been known ''Housing Society". First, a user must be registered in the system so that his password can be identified. This impression is securely stored in a central database or a smart card given to the user. The impression is fetched when an individual needs to be verified. Depending on the information, a software system can operate either in a verification (authentication) or a recognition mode.

Published by: Sanket Vikas Sagare, Zishan Usman Baig, Niranjan Bapuso kadam, Faique ShaikhResearch Area: Computer Engineering

Organisation: AISSMS Polytechnic, Pune, MaharashtraKeywords: Algorithms, Security, Authentication, Ridges, Valleys, Authorization, Database

Research Paper

65. Development of particle reinforced composite by plastic and e-waste

The main aim of this project is to develop Particle reinforced composites. Thermoplastic is taken as matrix material. Thermosetting plastics and E-Waste glass powder of 60µm is taken as particles. The formed structure exhibits high strength, low mass density and less weight compare to wood and steel. Due to its superior performance, the composite reinforced materials are mainly used indoors, frames, the automobile industry, especially for vehicle body applications. In this project particle reinforced Composite formed from Plastics and Electronic wastes. A formed specimen is subjected to tensile, hardness and bend test. It exhibits high tensile and bending strength.

Published by: A. Kanagaraj, C. Franciskennathamreth, M. Ajithkumar, V. Anandh, R. NagarajResearch Area: Material Science

Organisation: Akshaya College of Engineering and Technology, Coimbatore, Tamil NaduKeywords: MCC, Surface hardness, Fiber volume ratio

Research Paper

66. A novel prototype to secure network using malware detection framework against malware attack in wireless network

A new and novel proposed algorithm based on malware detection has been used that overcomes the disadvantages of the existing algorithms and helps to eliminate viruses and worms from entrusted environment. In the wireless networks suffers from various spyware programs that prevents access to legitimate users who obtains services from target web server. In our proposed prototype helps to authenticate the sender to make the dynamic rule set to avoid the formations of unavailable networks which any user who obtain web services. In our proposal architecture diagnose malware whether malware based data has been really being sent to the valid user or is it being morphed by the attacker in the middle. The proposed algorithm has been tested against various existing algorithms to study how effectively the algorithm is working, and how effectively it is overcoming the drawbacks of the present malware detection algorithms. The algorithm is projected to serve the purpose of prevention of being used malware based programs to drop it by the user and also to identify that the non-infectious message is reaching only to the valid user.

Published by: G. Jagadish, L. Jaswanth, K. Sowjanya, P. Sri Harsha, M. Nikhil KumarResearch Area: Security

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Virus and worms, Malware detection framework, Client, server, Wireless LAN

Review Paper

67. Enormous information for Internet of Things

With the quick advancement of the Internet of Things (IoT), Big Data innovations have risen as a basic information examination instrument to convey the learning inside IoT frameworks to all the more likely meet the reason of the IoT frameworks and bolster basic leadership. In spite of the fact that the point of Big Data investigation itself is widely examined, the dissimilarity between IoT areas, (for example, social insurance, vitality, transportation furthermore, others) has disconnected the advancement of Big Data approaches in each IoT area. Along these lines, the common understanding crosswise over IoT areas can propel the advancement of Big Data examine in IoT. In this work, we along these lines direct a study on Big Data innovations in various IoT areas to encourage and animate information sharing over the IoT spaces. In light of our audit, this paper talks about the likenesses and contrasts among Big Data advances utilized in various IoT spaces, proposes how certain Big Data innovation utilized in one IoT area can be re-utilized in another IoT space, furthermore, builds up a reasonable system to plot the basic Big Data advancements over all the audited IoT spaces.

Published by: P. Mounika, N. NaliniResearch Area: Internet of Things

Organisation: Saveetha School of Engineering, Kuthambakkam, Tamil NaduKeywords: Big data, Animate, Innovation, Bolster

Research Paper

68. Extended hybrid approach for detecting spammers on Twitter

One of the biggest social networks is Twitter for providing message posting and use direct message services via “tweets”.366 million currently active users on Twitter, Is the second largest space to share common news or message post. These features are also used by spammers on Twitter, spammers are not new on Twitter. spammers must be detected in improving the quality of Twitter message services. In this spammer detected by using metadata, content, interaction, and community-based features methods. Tweet meta information extracted and analyzed based on user-id, tweets,tweet-time and tweet-type. Content Features are extracted based on user posting content with URL, Mention-tags and hash-tags. Interaction and community-based features are analyzed by following and follower information. The proposed approach to introducing network-based features for spammer ratio detection by using unique IP address based user classification. Spammers can be detected by analyzing their tweets based on the extended hybrid approach by using the random forest, decision tree, and Bayesian network on the Twitter dataset that has benign users and spammers.

Published by: Subash G., S. Yuvalatha, V. Lenin Kumar, G. ManimegalaiResearch Area: Network Security

Organisation: Sree Sakthi Engineering College, Karamadai, Tamil NaduKeywords: Spammer detection, Spammer detection in Twitter, Network-based Twitter spammer detection, Extended hybrid approach

Research Paper

69. Bunch ensemble with averaged co-association matrix maximizing the expected margin

The problem considered is cluster analysis with the usage of the ensemble approach. The paper proposes a method for finding optimal weights for the averaged co-association matrix applied to the construction of the ensemble partition. The main idea is to find such weights for which the expectation of ensemble margin takes its maximum value. A latent variable pairwise classification model is used for determining margin characteristics dependent on cluster validity indices. To construct the ensemble partition, we apply a minimum spanning tree found on the averaged co-association matrix as an adjacency matrix. The efficiency of the method is confirmed by Monte-Carlo simulations with artificial data sets.

Published by: A. V. S. N. Kaushik, D. Harsha vardhan, Dr. M. Rama Krishna Murthy, B. Sai Chaitanya, G. Nikhil DasResearch Area: Data Mining

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Cluster ensemble, Weighted co-association matrix, Latent variable model, Cluster validity index, Margin expectation, Minimum spanning tree

Review Paper

70. Automatic opening and closing of railway gates and signaling in railways using IoT

The Internet of Things (IoT) is a group of devices which are connected together in the network. It is used in sound vibrator and ZigBee transceiver which will receive frequency of the vibration and the time from which the train reaches the sensor from the server. In this, we are using a sound vibrator which will detect vibrations from the track and the signal is transferred to the gear motor and the gate will get closed automatically. When the train passes the gate another sound vibration sensor is fixed at another end and it will transfer the signal to the gate and gate will open automatically. Here the additional features added are we can calculate the current speed of the train and we can also track the track damage. The main objective of this work is to provide automatic closing and the opening of gates and railway system. We can avoid careless mistakes done by the gatekeeper and we can reduce manpower in the railway system.

Published by: Dinesh Kumar S., Prem Kumar R., Venkatesan G., Vinston Raja R.Research Area: IoT

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: IoT, Zigbee, Sound vibration detecting sensor, Arduino

Research Paper

71. Child in safety with localization awareness

Aiming at a increasing security to children, this paper implements safety to the children by using a safety monitoring system using our android mobile phones. In particular a feeling of insecurity will be among the minds of the parents when the child is being alone. In fact nowadays, child kidnapping is happening frequently and that too it is too common among girl child. This system helps the children to be safe and monitors the child’s daily environment. This system allows to send the child location along the photos and videos to the parent mobile by means of GPS (Global Positioning System) and GSM module (Global Space for Mobile communication).

Published by: Dhinesh Kumar M., Devaram Gnanendra Reddy, Appadi Sumanth Teja, V. JeyaramyaResearch Area: Embedded

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: Safety monitoring of the child, Mobile communication, RFID module, GPS module, GSM module, Raspberry Pi, Raspbian Jessie, Python programming

Research Paper

72. A graphical password authentication approach for secure banking

Authentication is the process to provide sure information security and the graphical password authentication method is an accessible and easy process to provide authentication. The major problem of user registration, approximately text base password, is well known. If the login user is inclined to select a simple password which is frequently in his mind it becomes straightforward for attackers to guess. If the password is machine generated it is mostly over complex for the user to keep in mind. User authenticated password using cued click points graphical password scheme includes memo ability, usability and security evaluations. This paper is on enhanced user graphical password authentication with a usability and memo ability, so that users select more random or more difficult to guess passwords. In click-based graphical passwords, image or video frames provide the database to load the image and then give authenticated access to all information in the database.

Published by: Neha Prakash Patil, Shraddha Rajesh Patil, Dipali Vinayak Khadse, Priti Murlidhar Patil, Sudesh L. FarpatResearch Area: Malkapur

Organisation: Padm Dr VB Kolte College of Engineering and Polytechnic, Malkapur, MaharashtraKeywords: User Authentication, Cued Recall, Graphical Password Scheme, Security, Memorability

Research Paper

73. Simulation of grid connected photovoltaic system

Nowadays, we can see that the demand for energy increasing rapidly. To fulfill this demand we need to produce more and more energy. As compared to conventional energy sources we can use non-conventional energy sources which are a noiseless operation, easily available and pollution free for our environment. We can see the solar energy has a great potential to meet the energy demand acting as a standalone system or grid-connected mode, but the main problems with the solar system are irradiation level and temperature condition fluctuation and synchronization of AC power with the grid. In this project we can try to solve this problem by using MPPT for improving the efficiency, we should get maximum output under varying conditions which can be tracked continuously by a special technique called maximum power point tracking. In this project, we can make a MATLAB simulation of the solar PV system, along with i-v and p-v curves. Simulation of P&O algorithm with converters which is carried out with a grid-connected solar PV system and get maximum output under varying conditions.

Published by: Anjana PatelResearch Area: Renewable Energy

Organisation: Mahatma Gandhi Institute of Technical Education and Research Center, Navsari, GujaratKeywords: PV system, MPPT, Boost converter, Inverter

Research Paper

74. Modeling and simulation of D-STATCOM for reactive power compensation and voltage regulation

Flexible AC Transmission Systems (FACTS) technology opens up new opportunities for controlling power and enhancing the usable capacity of the present as well as new and upgraded lines. D-STATCOM is a FACTS device which can independently control the flow of reactive power in the distribution system. Most of the loads in this system, being inductive in nature consume more reactive power. As a result, the power factor of load deteriorates and this limits the active power flow in the line. So, developing a D-STATCOM, based on voltage source converter, which injects the reactive power in the distribution line. The output voltage of D-STATCOM is made leading to that of system voltage for the purpose of controlling VAR generation

Published by: Bijal Chandrakantbhai KansaraResearch Area: Power Quality

Organisation: Mahatma Gandhi Institute of Technical Education and Research Center, Navsari, GujaratKeywords: D-STATCOM, VSC, Reactive power, SRF theory

Research Paper

75. Face attendance

Educational institutions’ administrators in our country and the whole world are concerned about the regularity of student attendance. Student overall academic performance is affected by it. The conventional method of taking attendance by calling names or signing on paper is very time consuming, and hence inefficient. The system is made up of a camera which takes the photos of individuals and a computer unit which performs face detection (locating faces from the image removing the background information) and face recognition (identifying the persons) First, face images are acquired using a webcam to create the database. Face recognition system will detect the location of the face in the image and will extract the features from the detected faces.

Published by: Pankaj Phanse, Aditya Nitin Tilekar, Pranav Aminbhavi, Pooja Dherange, Snehal RokadeResearch Area: Pune

Organisation: AISSMS Polytechnic, Pune, MaharashtraKeywords: Algorithms, Security, Authentication, Ridges, Valleys, Authorization, Database

Research Paper

76. Design of semi-autonomous vehicle

A web-controlled and partially autonomous vehicle system is presented in this paper. It highlights the idea to develop a remote-controlled car which can be driven from anywhere using the Internet over a secured server. This car will also have automation features like obstacle avoidance system and lane detection system so that it can drive itself safely in case of connectivity failure. The main goal here is to minimize the risk of human life and ensure the highest safety during driving. At the same time, the car will assure comfort and convenience to the controller. A miniature car including the above features has been developed which showed optimum performance in a simulated environment.

Published by: Ajith Narayanan K., Monish V., Pavalan E., L. Ashok KumarResearch Area: Embedded

Organisation: Panimalar Institute of Technology, Chennai, Tamil NaduKeywords: ARM-LPC 2148, Semi-autonomous driving, Collision detection, Internet, Instruction, Web-server, Robotics, Embedded systems

Research Paper

77. Bio-medical texture characterization using DOST

We present a new efficient approach for detecting tumor of cancer in the human body based on a recently published discrete orthonormal space-frequency transform known as the DOST. We develop a frequency-domain implementation of the DOST in two dimensions for the case of dyadic frequency sampling. This manual detection may have chances of false detection. So a computerized method for cancer detection is needed. A feature selection algorithm based on statistical two-sample t-test method is used for the selection of significant coefficients from the high dimensional DOST(Discrete Orthonormal Stockwell Transform) coefficients. The selected significant coefficients are used as features for the classification of human body tumor as benign or malignant.

Published by: Sravani Palika, K. S. N. Sarat Chandra, K. Lavanya, S. A. BhavaniResearch Area: Image Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: DOST, Frequency domain, Spatial domain, Biomedical image processing

Research Paper

78. Digital image steganography using LSB and pseudo-random technique

This paper purposed an image based steganography that uses the Least Significant Bits (LSB) techniques and pseudo-random encoding technique on images to enhance the security of the communication. In the L-SB approach, the fundamental thought is to replace the Least Significant Bits (LSB) of the cover picture with the Bits of the messages to be covered up without pulverizing the property of the cover image significantly. The LSB-based method is the most difficult one as it is hard to separate between the cover-object and stego-object if few LSB bits of the cover are replaced. In Pseudo-Random technique, an arbitrary key is utilized as a seed for the Pseudo-Random Number Generator is required in the inserting procedure. Both the systems utilized a stego-key while installing messages inside the cover picture. By utilizing the key, the chance of getting attacked by the attacker is reduced.

Published by: Naveen Kalia, Manit Kapoor, Dr. Naveen DhillonResearch Area: Steganography

Organisation: Ramgarhia Institute of Engineering and Technology, Phagwara, PunjabKeywords: Steganography, LSB, Random-key, Image, Secret message, Stego-key, Cover image, Techniques


79. An arduino based intelligent shopping system-mechatronics approach

Internet of Things (IoT): Let devices and physical objects connect each other by their sensing, communicating and processing capabilities. This paper develops an intelligent shopping using the shopping cart system to provide IoT service in a hypermarket. The major instances are difficulty in finding the specified products and standing in a big queue in the billing section. This really takes a long time and creates customer un-satisfaction to the owner. Each cart is provided with an RFID based smart shopping system with an IoT enabled technology. It proposes the quick pathfinding schemes which help the customer to find the location of the product. The main facility that the proposed model provides the customer only needs to carry an RFID smart card. It also provides a centralized and automated billing system using RFID technology. The whole information will be sent to IoT cloud server through a GSM module. If the product is purchased the number of product availability is low. The IoT cloud server alerts the seller through SMS. The system facilitates faster billing and standing in a queue reduces the average time required for shopping.

Published by: Dr. J. Krishnakumar, A. Aruljothi, M. Pavadharani, A. SaraswathiResearch Area: Mechatronics

Organisation: Avvaiyar College of Engineering and Technology for Women, PuducherryKeywords: Shopping, RFID tag, RFID reader, GSM, IoT

Review Paper

80. Review – IoT used for health monitoring

The day-by-day development of the Internet of Things causes a revolution in modern technology, which makes our life easier and automated. Due to a busy schedule and irregular lifestyle, health hazard is not an age-dependent factor in the recent era. Under these circumstances, Internet of Things has provided a much easier solution for remote real-time health monitoring of patients from the hospital as well as home. One such healthcare application is to monitor the patient health status Internet of Things makes medical equipment more efficient by allowing real-time monitoring of patient health, in which sensor acquire data of patient's and reduces the human error. The significant challenges in the implementation of the Internet of Things for healthcare applications are monitoring all patient’s from various places. Thus Internet of Things in the medical field brings out the solution for effective patient monitoring at a reduced cost. The purposed work will explain the concept of monitoring of patients health using a microcontroller and different sensors and the reports are accessible through the mobile application.

Published by: Devyani Mashale, Dr. Rupali J. ShelkeResearch Area: Embedded System

Organisation: Walchand Institute of Technology, Solapur, MaharashtraKeywords: Heart rate, Blood pressure, Respiration rate, Body temperature

Research Paper

81. Semantic text analysis using machine learning

As the amount of information on the World Wide Web grows, it becomes increasingly burdensome to and just what we want. While general-purpose search engines such as Ask.com and Bing high coverage, they often provide only low precision compared to others, even for detailed and relative queries. When we know that we want information about a certain type, or on a certain topic, a domain-specific search engine can be a powerful tool. Like www.campsearch.com allows complex queries over summer camps by age-group, size, location, and cost. Domain-specific search engines are becoming increasingly popular because they increase accuracy not possible with general, Web-wide search engines. Unfortunately, they are also burdensome and time-consuming to maintain. In this paper, we use machine learning techniques to greatly automate the creation and maintenance of domain-specific search. It describes new research in semi-supervised learning, text classification, and information extraction. We have built a demonstration system using these technics like Web Scrapping, Fuzzy C-Means and Hierarchy Clustering for a search engine which gives accurate results which is a more advantage when compared to other Search engines. Searching with a traditional, general purpose search engine would be extremely tedious or impossible to perform search operations. For this basis, domain-specific search engines are becoming popular. This article mainly concentrated on Project an effort to automate many aspects of creating and maintaining domain-specific search engines by using machine learning techniques. These techniques permit search engines to be created quickly with less effort and are suited for re-use across many domains.

Published by: Bhargavi Joga, Sarath Sattiraju, Venkatesh Kandula, Narayana Murthy Kallempudi, Mandava Kranthi KiranResearch Area: Machine Lerning

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Machine learning, Web scrapping, Reference management software

Research Paper

82. An IoT based smart traffic control system

An automated Pi based traffic control system using webcams and sensors that help in reducing traffic density in busy traffic junctions. The design of this traffic infrastructure can help to avoid traffic congestions. This paper describes a system where webcams are integrated with the Raspberry Pi to operate the lanes of traffic junction based on the count of traffic and RFID Sensors for emergency vehicles to be prioritized for the safety of passengers. As a result, the improvement in the traffic system can be exponentially improved, which can lead to progressive in the overall traffic system.

Published by: Bevara Atchyuth, Irugatla Sarat Kumar, Swarna Datla, Ganta Ajay RahulResearch Area: IoT

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Internet of Things (IoT), Raspberry Pi, Web Cam, RFID, Traffic Control

Research Paper

83. Partial replacement of PPC with glass powder

Disposal problem of waste material is becoming critical day by day. A million tone of waste glass powder generated every year in the world. In this topic, an attempt has been made to utilize glass powder, which is a waste of glass industry. The research work is a determination of the effect of the use of Glass powder as a replacement of cement to assess the pozzolanic nature of fine glass powder when mixed in concrete and compare the difference in performance with other pozzolanic materials are mixed in concrete like silica fume and fly ash. The concrete in place of cement to some extent i.e., 10%, 20%, 30% and mechanical properties of M40 (Design Mix) are investigated. Cube specimen of 36 numbers were cast, cured and tested for 3, 7, and 28 days strength. Compression was conducted and the results were compared. The finding revealed an increase in compressive strength with the increase in the replacement of cement by Glass powder. To reduce the demand for cement, glass powder decreases the unit weight as well as the porosity as indicated by a decrease in water absorption. It reduces the quantity of cement to be used in concrete. Also, glass powder is proved to be economical and is considered an environmentally friendly construction material.

Published by: Shubham G. Keshattiwar, Vipul Rathod, Dhiraj Wankhede, Saurabh Kurrewar, Aishwarya H. MeshramResearch Area: Civil Engineering

Organisation: Jagadambha College of Engineering and Technology, Kinhi, MaharashtraKeywords: Glass powder, Replacement to PPC, Compressive and tensile strength, Cost effective material, M 40 (Design Mix)

Research Paper

84. Image enhancement by averaging histogram equalization

Image Processing is defined as the process of converting an image into digital form and perform operations on it, in order to get an enhanced image or to extract some useful information from it. Image Processing has various categories in which Image Enhancement is one of them. Image enhancement is defined as the process of adjusting digital images such that the results are more suitable for display or further image analysis. The fundamental requirements for any vision based application are contrast enhancement and brightness preservation. The existing systems don’t satisfy both the requirements simultaneously. In this paper, a system is proposed which consists of step by step processes like color stretching, histogram averaging and re-mapping. The proposed system employs a search process to find optimal algorithmic parameters, such that the mean brightness difference between the input and output images is minimized. The proposed system is tested against different images to test the working of the system.

Published by: Anurag Cherukuri, B. Ravi Kiran, Buela Rani Badugu, Ravali Sujatha Alamuri, Yashwanth AythaResearch Area: Image Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Color stretching, Histogram averaging, Remapping

Research Paper

85. Neuromarketing: Understanding why we buy what we buy

In recent times, there has been an emerging field of study called neuromarketing, it has taken the marketing world by storm.it makes use of neuroscience research in a marketing context. The purpose of this paper is to understand how neuromarketing is carried out and to evaluate the influence of neuromarketing tools on traditional marketing inputs in order to give a deeper understanding of consumer behavior. The job of any marketer has less to do with designing attractive ads and more to do with understanding consumer behavior. It is said that people buy with emotions and justify it with logic, but this has proven to be true by neuromarketing research. Neuromarketing seeks to replace the traditional type of market research. Every year, nearly 450 billion dollars is invested in various advertising campaigns. still, traditional ways for testing and predicting the success and efficiency of those advertising campaigns have usually failed because they depend on customers’ willingness and capacity to describe how they react or feel when they are exposed to an advertisement.

Published by: Yogesh Maniyar, Atif Ahmed, Yash TyagiResearch Area: Marketing

Organisation: Christ (Deemed to be University), Bengaluru, KarnatakaKeywords: Neuromarketing, Consumers, Packaging

Research Paper

86. Decentralized file sharing application in a global approach

Use of semantic technologies has been prevalent in sharing files and media over the internet. This project proposes a new cooperative file sharing and storage system that allows users to store, share and find files over a robust and scalable network. This system is based on peer-to-peer technologies and provides a self-managed, decentralized, efficient and distributed way to store and retrieve files on peer nodes. Each node donates storage space to the system. The system also provides its users with a global hierarchical directory structure to browse for files like a file-system maintaining RDF Graphs forming Ontology in individual systems with the implementation of peer to peer communication in global scenario overcoming the drawbacks of Network Address Translation using TCP Hole Punching technique.

Published by: K. Mohan Krishna, M. Kranthi Kiran, P. Kiran Kumar, M. Tejasmika, K. Ravi Teja Reddy, K. SandeepResearch Area: Semantic Desktop, Networking

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Resource description framework, TCP hole punching, Decentralized

Research Paper

87. Color detection and shade matching in dentistry

It is a challenge for every aesthetic dentist to determine and replicate the appearance of teeth, as it requires humility, patience and perseverance to mimic natural tooth to its closest sense and form. To provide the patient with an aesthetic restoration the dentist must consider the scientific basis of color as well as the artistic aspect. The shade matching using digital processing techniques gives accurate results by eliminating subjective errors. In this work, the captured image is processed through MATLAB in PC and the exact shade of tooth is determined.

Published by: Dr. S. Mangai, A. Mathi Vadhana, A. Arshiya, P. Gomathi, M. DiwakarResearch Area: Digital Image Processing

Organisation: Velalar College of Engineering and Technology, Erode, Tamil NaduKeywords: Tooth restoration, Shade detection, Image processing, Aesthetic

Research Paper

88. A rule based sentiment analysis in Telugu

Sentimental Analysis in the English language is a relatively easier task to perform as it has a predefined set of rules followed and accepted universally. But, when it comes to Indian languages, there isn’t a benchmark dataset. Moreover, if a dataset exists, it cannot be validated as a similar sentence may differ in the meaning as the regional languages are very unpredictable and have no proper rules. In this paper, we used a Rule-Based Approach for Telugu sentiment analysis using Telugu SentiWordNet. Here, we obtained the sentiment using SentiWordNet and validated the results using ACTSA which is an annotated corpus data set.

Published by: Pravarsha Jonnalagadda, Krishna Pratheek Hari, Sandeep Batha, Hashresh BoyinaResearch Area: Computer Science

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: SentiWordNet, SentiPhraseNet, PoS tagger

Review Paper

89. A review on three-dimensional performance analysis of wavy fin tube heat exchangers in laminar flow regime

In recent years, thousands of numerical and experimental studies have been performed on heat exchangers with different configurations. Mainly heat transfer and frictional characteristics have been studied in detail with respect to different geometrical parameters in various ranges of Reynolds number. Further, these studies have been cross-verified with researches already performed in this field. With the advent of new tools like CFD for the study of thermo-hydraulic characteristics, it has become easier to understand flow phenomena around the tubes for different rows and also in rest of flow regions. These studies also bring about some correlations so as to easily find the values of colburn and friction factor for various different geometrical parameters so as to suit the different industrial conditions and requirements. An overview of the work already done on plate-fin heat exchangers is presented in this paper.

Published by: Dhananjay Kumar Yadav, Amit KumarResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: Plate-and-fin heat exchangers, Wavy fins, CFD

Research Paper

90. Controlling game using head movements

The Project aim is to develop a game which replaces a computer mouse and keyboard for people who suffer from Acheiropody or Amputees. This application which can be stand-alone or web-based is based on tracking the head movements to control the actions in the game. This idea is an extension of a project from Tom Mitchell's “Machine Learning” book. We used neural networks to recognize the face and also to track the movements of the head, which requires us to have knowledge of the Tensor Flow framework which supports large computational power.

Published by: Bhavya Siripurapu, K. Rohini, P. Sumathi, A. Kranthi, Suresh KurmallaResearch Area: Neural Networks

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: TensorFlow, Mobile net, Depth wise separable convolution networks, Artificial Intelligence

Review Paper

91. A review on thermodynamic analysis of organic Rankine cycle with different working fluids

The development of the world today has largely been achieved through the increasingly efficient and extensive use of various forms of energy. Over the past decades, the growth in energy consumption around the world has shown that fossil fuel energy source alone will not be capable of meeting future energy demands. With the increase in fossil fuel consumptions, more and more industrial activities produce an increasing amount of waste heat. Energy generated as a result of industrial activities that are not practically utilized is referred to as industrial waste heat. Several studies have shown that the specific amount of industrial waste heat is poorly measured, it is estimated that 25 to 55% of the input energy in industries are actually used while the remaining are discharged as waste heat.

Published by: Sanjeev Kumar, Brijendra Kumar YadavResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: ORC, EES, Simulation model, Rankine cycle, First law efficiency, Second law efficiency, Turbine size factor

Survey Report

92. Secure data outsourcing in mobile cloud computing

With the popularity of mobile cloud computing, mobile devices are used to store/retrieve data to/from the cloud storage from anywhere at any time. Thus, cloud security issues become more severe. There are different studies conducted to solve cloud security problems. Due to the limited computing capabilities of mobile devices, most of the techniques are not applicable for a mobile cloud. Thus, a lightweight scheme is needed that can provide both confidentiality and integrity to the cloud data.

Published by: Vidhya Vijayan, Shandry K. K.Research Area: Computer Engineering

Organisation: College of Engineering, Kidangoor, KeralaKeywords: Mobile cloud computing, User revocation, Algebraic signature

Review Paper

93. Review paper on design and development of hybrid two wheeler

This work deals with the design and fabrication of hybrid two-wheeler system. In recent days availability of fuel is depleting day by day and also pollution is increasing globally with an increased number of vehicles. This leads to the evolution of various alternative fuels and concepts, in that HEV system (hybrid electric vehicle) is one of the effective systems. This paper involves the fabrication of two-wheeler which is driven by both fuel and electric energy with the help of engine and Electric motor. The electric motor is the hub motor which drives the front wheel which is driven by the battery and the engine drives the rear wheel. The goal of this paper is to implement the most efficient and less polluting vehicle. In our project, the hybrid vehicle model combines the internal combustion engine of a conventional vehicle with a battery and electric motor of an electric vehicle.

Published by: Ravikumar R., Chethan M., Neeloy Debnath, Ajay P. Kumar, Prajwal L SandyalResearch Area: Hybrid

Organisation: Acharya Institute of Technology, Bengaluru, KarnatakaKeywords: Hybrid vehicle, Fabrication, Two wheel hybrid vehicle

Research Paper

94. Optical wireless data transmission with Vigenere cipher encryption

The project is designed to share data with high frequency. And ultimately establish communication as secure as possible. For secure communication, the data is send using encoded form so the unauthorized user can’t access the data and if he receive data then data will be in the encoded format. So it’s of no use to an unauthorized user. This paper is based on the concept of Li-fi. Here, transmitted data are encrypted by a Vigenere cipher algorithm in order to ensure secured optical communication. Further, the encrypted data is decrypted on the receiver portion. In today's digitalized era, for the proper functioning of our daily professional life, we need effective communication. Whereas the limitations like low bandwidth and data rate in Wi-Fi, Microwave and RF along with EMI interference hampers the interactions. The Optical Wireless Data Transmission overcomes the above limitations. This innovative and new technology provides high-speed wireless access that offers significantly greater data capacity than Wi-Fi along with inherent security properties that eliminate unwanted external network intrusion. For security purpose, a secured encryption system has been designed based on the Vigenere Cipher technique which is impossible to break. The project consists of an LED at the transmitter section to transmit encrypted data which can be received at the receiver using the IR sensor by any angle with high reliability. In addition, the integration of wireless data transfer along with encryption generates a measurable reduction in both infrastructure complexity and energy consumption

Published by: Pooja Patil, Sayli Wangikar, Minakshi Patil, Rajendra MohiteResearch Area: Extc Engineering

Organisation: Bharati Vidyapeeth College of Engineering, Navi Mumbai, MaharashtraKeywords: Optical wireless transmission, LED, Data rate, Encryption, IR sensor

Research Paper

95. Three-dimensional performance analysis of wavy fin tube heat exchangers in laminar flow regime

The current study is focused on two fin configurations, the wavy-fin in-line and the wavy-fin staggered. These two fin configurations are numerically investigated in both staggered and in-lined tube layouts. Heat transfer and pressure drop characteristics of the heat exchanger are investigated for Reynolds numbers ranging from 200 to 2000. Model validation is carried out by comparing the simulated case friction factor (f) and Colburn factor (j) with the experimental data of Bhuiyan et al. [2013]. In this study the effect of geometrical parameters such as fin pitch, longitudinal pitch and transverse pitch of tube spacing are studied. Results are presented in the form of friction factor (f) and Colburn factor (j). This study reveals that the flow distinction between plain and wavy fin has a profound influence on the heat transfer and flow friction performance of these configurations when compared on the basis of tube layouts. For laminar flow conditions heat transfer and friction factor decrease with the increase of longitudinal and transverse pitches of tube spacing whereas they increase with fin pitches for both in-line and staggered configurations.

Published by: Dhananjay Kumar Yadav, Amit KumarResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: Heat transfer, Fluid flow, Laminar flow, Heat exchanger

Research Paper

96. Thermodynamic analysis of organic Rankine cycle with different working fluids

An ORC is a suitable means of carrying out this purpose. The ORC works with a high molecular mass organic working fluid with the characteristic of having a phase change of liquid to vapor occurring at a temperature which is lower than the phase change of water to steam for a given pressure. The recovery of low-grade heat can be achieved using organic fluids. These low-grade heat sources can be from biomass energy, solar energy, geothermal energy, and industrial waste. This work presents an analysis of the organic Rankine cycle (ORC) using R143a, R600a, R134a, and RC318 as working fluids under constant external conditions. An EES program has been developed to parametrically compare the first and second law efficiencies and turbine size factor with an increase in turbine entry temperature, heat source temperature, turbine efficiency and pinch point temperature difference.

Published by: Sanjeev Kumar, Brijendra Kumar YadavResearch Area: Mechanical Engineering

Organisation: Patel Institute of Engineering and Sciences, Bhopal, Madhya PradeshKeywords: ORC, EES, Simulation model, Rankine cycle, First law efficiency, Second law efficiency, Turbine size factor


97. Scan and drive: An Android-based application

Recently we have noticed that there is huge congestion that is escalating at the toll plaza on the expressways and highways. These toll plaza mostly uses the traditional way of issuing toll ticket which causes heavy traffic of vehicles on the road. In the traditional way of issuing ticket manual ways are used because of which a lot of time is wasted of the travelers. To avoid such problems we are developing the android application which will make easier for the travelers to get the toll ticket without wasting any time. This application which will display the toll price of the different toll plaza and if you are visiting through that toll plaza you just need to make a payment online. After your payment, a QR code will be given to you and while visiting at toll plaza you just need to scan the QR code. QR code generated will be unique for each transaction made by the traveler.

Published by: Rahul Sirisilla, Akshay Loke, Neel Dave, Aditya ShetyeResearch Area: Information Technology

Organisation: Vidyalankar Institute of Technology, Mumbai, MaharashtraKeywords: QR code, Toll plaza, Transaction, Android application

Research Paper

98. SentiPhraseNet: An extended SentiWordNet approach for Telugu sentiment analysis

Sentimental Analysis in English language is a relatively easier task to perform as it has a predefined set of rules followed and accepted universally. But, when it comes to Indian languages, there isn’t a benchmark dataset. Moreover, if a data set exists, it cannot be validated as a similar sentence may differ in the meaning as the regional languages are very unpredictable and have no proper rules. In this paper, we used a Rule-Based Approach to build SentiPhraseNet. Here, we obtained the sentiment using SentiPhraseNet and validated the results using ACTSA which is an annotated corpus data set.

Published by: Abhinav Garapati, Naveen Bora, Hanisha Balla, Mohan SaiResearch Area: Natural Language Processing

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: NLP, Sentiment analysis, POS tagging, Rule based, SentiWordNet, SentiPhraseNet

Research Paper

99. Artistic style transfer using deep learning

In this paper, we are implementing the style transfer using convolutional neural networks. The style transfer means to extract the style and texture of a style image and applying it to the extracted content of another image. Our work is based on the work proposed by LA Gatys. We use a pre-trained model, VGG 16 for our work. This work includes the content reconstruction and style reconstruction from the content image and style image respectively. Now the style and content are merged in a manner that the features of content and style are retained.

Published by: P. Mounica, A. Nagaratnam, Mohammad Farzana, K. MuralidharResearch Area: Neural Networks

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Style transfer, Artistic style, Content loss, Style loss, Gram matrix, VGG16, CNN, Texture transfer, Image synthesis, Imagenet

Research Paper

100. Finding rising stars in co-author networks

Finding rising stars is a challenging and interesting task which is being investigated recently in many organizations and Academic networks. This paper addresses the problem of finding rising stars in Co-author networks. Predicting future rising stars is to find talented researchers in Co-author Networks. An effort for finding rising stars named PubRank is proposed, which considers the mutual influence and static ranking of conferences or journals. In this work, modification of PubRank is proposed by considering attributes like mutual influence based on authors’ contribution, co-authors’ citations, the order of appearance and publication venues. This method can be effectively used for mining the Co-author networks to search for rising stars in the research communities and organizations.

Published by: Akil Reddy Gopavarapu, K. S. D. Sai Sowmya, B. Shanmuk Abhishek, P. Vinod BabuResearch Area: Computer Science Engineering

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Rising stars, Co-author networks, Citations, Author order, Publication venue score

Review Paper

101. Text mining methods and techniques- A survey

Text Mining is an area where the goal is to discover and extract information such as relations and patterns that are hidden in the Text. The main objective of this paper is to get a deeper knowledge of the text mining techniques and text classification methods used in text mining. This paper describes different methods and algorithms used in text mining like text preprocessing, vector-space model Information- Retrieval and TF-IDF

Published by: Shitanshu Jain, Dr. S. C. Jain, Dr. Santosh Kumar VishwakarmaResearch Area: Data Mining

Organisation: Amity University, Gwalior, Madhya PradeshKeywords: Knowledge discovery, Text mining techniques and methods

Research Paper

102. Effective width of cold-formed C-section by IS:801 and comparing it with AISI:2007

Buildings built with cold formed sections as primary members (frames) and secondary members (purlins) offers viable alternative solutions for wide range applications of social sectors like housing, education etc. Design of cold formed sections has obvious complexity in view of buckling of sections and stress in the compression element, especially in flexure. In this study, using IS: 801 equations, effective section properties of C section are calculated for a wide range of configurations with different b/t ratios for flange subjected to maximum allowable stress. The study also includes simple design tools and few standard colds formed sections having a similar configuration but for thickness to be used for residential or community shelters for different wind zones. A resource is made to compare the results with similar studies using AISI code.

Published by: Pratik Thakre, Pallavi P. Gawande, Ankur H. Akre, Sneha J. Rodke, Sachin D. Dadhey, Kushalkumar YadavResearch Area: Steel Structure

Organisation: J D College of Engineering and Management, Nagpur, MaharashtraKeywords: Cold formed section, Primary members, Buckling of section, B/T ratio, IS: 801, AISI

Review Paper

103. Review on the factors influencing tourist’s impulse buying behavior in luxury restaurants in Sri Lanka (reference to Kandy city)

Impulsive buying behavior is common and ordinary behavior that most people makes on purchasing from time to time. There are empirical studies that discussed the impulsive buying behavior of the customers. In Sri Lankan context as an emerging industry, most of the tourist follow impulsive buying behavior in the restaurants due to various reasons. Accordingly, paper investigates the concept of impulsive buying behavior and factors that influence to impulsive buying behavior in luxurious restaurants in Sri Lanka. Paper accomplishes research propositions in line with the empirical justifications encouraging future research priorities.

Published by: Jayasooriya S. S. W.Research Area: Tourism Marketing

Organisation: University of Kelaniya, Colombo, Sri LankaKeywords: Sri Lankan tourism industry, Impulsive buying behavior, Consumer buying behavior

Survey Report

104. Customer purchases in e-commerce by using big data – Literature survey

In the epoch of Bigdata, the customers view the surplus of the economy, while social commerce grows enormously. This paper started with the concept of providing the customers trustworthy product with reasonable discount and quality products in e-commerce websites. As well as, this determines the better product comparing some of the e-commerce websites. This is done by using the result of the dataset which comprises the details of distrust level, a range of discounts and the customer feedback that is analyzed using the Apriori algorithm in RStudio. The frequent quality product purchased is displayed to the customers in a user-friendly website.

Published by: Shobhanjaly P. Nair, Abhinayaa K. S., Arthi U., Harshini S.Research Area: Big Data

Organisation: Anand Institute of Higher Technology, Kazhipathur, Tamil NaduKeywords: Big Data, Apriori algorithm, E-commerce, Social commerce

Research Paper

105. Qualitative data analysis on contextual advertisements

The internet advertising market is growing day by day much faster than any other advertising platform. The technology and methods used for advertising online go more and more towards automated processes that analyze the content of the page and then matches the ads with these parameters. Advertisers in web pages like Facebook and LinkedIn have some preferred set of users they wish to reach by showing their ads. Some sites offer fine-grained sets of user characteristics – including their career, wealth, education information, etc — that advertisers can specify for targeting their audience, and each of these characteristics requires different amounts of money for targeting. Generating contextual advertisements for websites is a problem of growing interest. The recent $240 million investment by Microsoft in Facebook clearly reaffirms the opportunity in contextual advertising for online social networks. Content-contextual advertisement programs such as Google AdSense and Yahoo Contextual Match work by automatically spotting keywords in web pages and displaying ads based on the keywords. The displayed ads are also referred to as Contextual Advertisements. Contextual advertising allows advertisers to display ads relevant to the content of the website rather than using the data about the visitor. Contextual ads can complement the content. Contextual ads are very effective for particular kinds of content. Some studies indicate they can increase click-through rate by 63%. These ads are generally represented by a URL along with a textual description that is also used to match the ad with the target page. User activity on venues such as forums, marketplaces, and groups on social networking sites are excellent targets for monetization.

Published by: Bayyavarapu Kranthi Kumar, Dadi Sharmila, Buraga Srinivasa Rao, Gedda PoojithaResearch Area: Contextual Advertisements

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Content-based advertising, Contextual advertising, RAKE, Scrapy, Advertising

Research Paper

106. Developing an advanced smart parking system using IoT

Internet of Things (IoT) plays an important role in connecting the surrounding things of an environment to the network and provides easy access from the remote location. It is essential that the people should be update along with the growing technology. In a present world, there are numerous number of vehicles owned by the people. Due to this large number of vehicles, there will be a lot of discomfort for parking of a vehicle at public places such as shopping complexes, function halls, and cinema theatres. In such places it is very difficult to find an vacant place to park the vehicle, even though it is a paid facility along with the security guard. In this study we design an Advanced Smart Parking System (ASPS) which identifies the vehicle and displays an empty slot on the display at the entrance gate of the parking. So that the person will know whether there is any availability or not before entering into the parking place. This system of design also provides the shortest path from the entrance gate to the assigned parking slot by showing the directions through LED’s. This process of implementation does not involve human interaction except the payment collection.

Published by: Dharmana Satyanarayana, Mounika Dulla, Abhinav Andrews Giduturi, DVVR Sarat Chandra, S. PrathapResearch Area: Internet Of Things

Organisation: Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, Andhra PradeshKeywords: Automatic license plate recognition, Smart parking system, Available parking slots

Research Paper

107. Smart irrigation using IoT

Smart Irrigation can transform agricultural discipline from being manual and static to automatic and dynamic resulting in higher production with lesser human intervention. This model maintains the desired soil moisture level in the soil and sends the data to Arduino. The Arduino acts as a control unit. Based on the sensed values, water will be supplied to the plant which can help us to avoid over-irrigation and under irrigation. Water sensor is used to sense the amount of water still available in the tank. Information from the two soil moisture sensors will be regularly updated to the web page using WIFI module and message alert will be sent to the user. Sensor values are uploaded to the thingspeak channel to generate graphs for analysis, the same can be viewed in-app and motor can be controlled. Real-time data can be viewed in thingspeak cloud.

Published by: Himavamshi, Yamini R., Vishnu Chaithanya Reddy K.Research Area: Internet of Things

Organisation: SRM Institute of Science and Technology, Chennai, Tamil NaduKeywords: Automation, Two soil sensors, Wi-Fi, Real-time data