Manuscripts

Recent Papers

Research Paper

Effect of textile mill waste water on growth of Maize (Zeamays.l)

Present investigation was carried out to assay the effects of effluents on seedling growth &plant growth of Maize (Zeamays. L).For that purpose textile effluent were chosen. Concentrations used for the effluents were 0, 25, 50, 75 & 100%.Minimum relative toxicity percentage was in 25% concentration and increases gradually as the concentration increases. Textile effluent has more relative toxicity. Number of seeds also decreases with the increase in concentration. irrigation with high TDS (Total Dissolved Solids) resulted in decrease in optimal crop production.

Published by: Mididoddi Nataraj, Dr. B. S. Krishna, Srinivasareddy Pulagam

Author: Mididoddi Nataraj

Paper ID: V4I4-1290

Paper Status: published

Published: July 25, 2018

Full Details
Research Paper

Improved LEACH routing protocol for wireless sensor networks

In wireless sensor networks (WSNs), the present bunch based information accumulation procedure expends more vitality. Additionally, the secured information transmissions are essential for upgrading the information confirmation and secrecy. Keeping in mind the end goal to conquer these issues, in this review, In this paper, we provide detailed analysis on the relations between clustering and routing, and then propose a Low-energy adaptive clustering hierarchy (LEACH) protocol for reliable and efficient data collection in a large-scale wireless sensor network. LEACH adopts the back off timer and gradient routing to generate connected and efficient inter-cluster topology with the constraint of maximum transmission range. The relations between clustering and routing in LEACH are further exploited by theoretical and numerical analysis. The results show that the multi-hop routing in LEACH may lead to the unbalanced cluster head selection. Then the solution is provided to optimize the network lifetime by considering the gradient of one-hop neighbor nodes in the setting of back off timer. Theoretical analysis and simulation results prove the connectivity and efficiency of the network topology generated by LEACH.

Published by: Parvin B. Shaikh, Sachin B. Takale

Author: Parvin B. Shaikh

Paper ID: V4I4-1333

Paper Status: published

Published: July 25, 2018

Full Details
Research Paper

Last mile load carrier

To develop a 1.5 Tonner last mile load carrier for the Indian market with a price range of 5-10 Lakhs.

Published by: Devtanu Bose

Author: Devtanu Bose

Paper ID: V4I4-1308

Paper Status: published

Published: July 24, 2018

Full Details
Research Paper

Cloud computing technology and legal challenges

Law influences society and society influence the lawmaking procedure. This symbiotic relationship is unavoidable. Any change in society has an impact on the legal process. Technology is no exception to it. Technology is today’s lifeline. Technology has become part and parcel of everyone’s daily life. Law and technology are becoming two balances of the scale by which human behavior is controlled. It is interesting to observe how these variants, law, and technology interact with each other and what effect is caused in society by such interaction. With the latest technological development in cloud computing, an opportunity has been created for researchers to investigate the action and reaction formula of law and technology on society. Cloud computing technology is very popular in the present days. It is the new technology that is looked upon by industries. Nowadays cloud computing is gaining popularity amongst business community because of its features like low cost, easy maintenance, scalability etc. Indian business is also adapting to cloud computing very rapidly. India is outsourcing in the field of cloud computing services. This increase in the adaptation of cloud computing technology is not without risks, the advantage of cloud computing technology comes with many disadvantages. As cloud computing technology transcends boundaries it has resulted in the spreading of legal problems like violation of privacy of cloud customers, access, and safety in online handling of data, copyright issues of the data stored in cloud and questions of jurisdiction. If regulatory framework with regard to the above-stated issues is not clear, the confidence of stakeholders will not be boosted. Additionally, any breach of privacy, data loss or data theft, on cloud causes catastrophic effects. The purpose of this research is to find out the necessity of regulating cloud computing, to inquire about the available methods of cloud regulation and also to find out suitable methods of cloud regulation for India.

Published by: Sreevidya KV

Author: Sreevidya KV

Paper ID: V4I4-1304

Paper Status: published

Published: July 24, 2018

Full Details
Thesis

Speech reconstruction using machine learning approach for speech impaired persons

The speech disordered persons are able to produce speech which sounds like they are whispering. The main objective of this work is to reconstruct the abnormal to normal sounding speech by using MFCC coefficients to extract the feature and use these to train cascaded Gaussian Mixture Model (GMM) and Objective measures are used to evaluate the performance of the work. The data used for the work are from WTIMIT online corpus and the speech signals recorded from speech impaired subjects. In this work STRAIGHT toolbox is not employed for its complexity and muffled voice. The obtained SNR is reduced

Published by: Kruthika R, Rajeswari P

Author: Kruthika R

Paper ID: V4I4-1307

Paper Status: published

Published: July 24, 2018

Full Details
Research Paper

Time based electricity and load shedding monitoring using embedded systems

Electricity is one of the most important requirements of modern civilization, without which various indispensable applications will bind to bring to a standstill. As we know that demand for electricity is increasing nowadays. So electric utilities prefer load shedding when the demand exceeds the supply. Thus in a distribution system, it needs to be precisely measured for the specific period of time. The Time Based Electricity and Load Shedding Monitoring Using Embedded Systems is a reliable & effective load shedding technique that takes over the manual task of switch ON/OFF the electrical supply with respect to time. It uses a software-based real-time clock (RTC) interfaced to the ARM processor. The paper on "Time Based Electricity and Load Shedding Monitoring Using Embedded Systems" will provide real & competent load shedding techniques such that distribution substation can be monitored & load shedding from one particular place for more than one cities.

Published by: Abhishek Pawar, Zainab Mizwan

Author: Abhishek Pawar

Paper ID: V4I4-1302

Paper Status: published

Published: July 24, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X