VOLUME 8 Issue 5

12 Sep

Survey on Fake News Analysis using Twitter Dataset

Authors- Khushbu Tomar, Prof. Manoj Kumar Nagar

Abstract- Social networking sites like twitter have millions of people share their thoughts day by day as tweets. As tweet is characteristic short and basic way of expression. So, in this review paper we focused on sentiment analysis of Twitter data. The Sentiment Analysis sees as area of text data mining and NLP. The research of sentiment analysis of Twitter data can be performed in different aspects. This paper shows sentiment analysis types and techniques used to perform extraction of sentiment from tweets. In this survey paper, we have taken comparative study of different techniques and approaches of sentiment analysis having twitter as a data.

Survey on Sentiment Analysis of Twitter Data

Authors- M. Tech. Scholar Nisha Kumawat, Assistant Professor P. Kumar Choure

Abstract- Social networking sites like twitter have millions of people share their thoughts day by day as tweets. As tweet is characteristic short and basic way of expression. So, in this review paper we focused on sentiment analysis of Twitter data. The Sentiment Analysis sees as area of text data mining and NLP. The research of sentiment analysis of Twitter data can be performed in different aspects. This paper shows sentiment analysis types and techniques used to perform extraction of sentiment from tweets. In this survey paper, we have taken comparative study of different techniques and approaches of sentiment analysis having twitter as a data.

Analysis of Age Invariant Face Recognition using QSVM -PCA

Authors- M.Tech. Scholar Deepak Mittan

Abstract- With the progressing of age, both texture and shape of the face affected which is causing face recognition is most difficult task. Solution for this is to apply a model to shows the face with its identity and aging variable is probabilistic model. With condition of as the age is processed, few peoples are looking younger or may be older when compare to other person who is of the same age. Therefore, current datasets of face with the real age mark for age invariance face recognition (AIFR) will introduce new learning methods or algorithms. Experimental results suggest that our Quadratic Support Vector Machine- Principal Component Analysis (QSVM-PCA) achieved better results especially when the age range is large than other existing techniques of face-aging datasets of FGNET. The maximum accuracy achieved by demonstrated methodology is 98.87%.

Digital Signature Verification using Support Vector Machine

Authors- M.Tech. Scholar Chandan Kumar, Assistant Professor Gyanender Kumar

Abstract- Signature acts as a strong authentication feature of the signer to validate the identity of an individual and used to preserve their valuable assets such as banking, insurance, healthcare, ID security, document management. A person’s signature is never entirely the same. Orientation of signature may varies. The signature can vary substantially over an individual’s lifetime. An Off-line Signature Verification System (OSVS) with a novel feature extraction procedure has been described. Fusion of concentric squares having geometric features, zone-based slope as well as slope angle have been considered as input patterns. The strong feature set thus obtained makes the OSVS accurate. Verification was performed by using Support Vector Machine (SVM) technique with different kernels the developed SVM is successfully tested against 336 signature samples and the classification error rate is less than 9.7% and this is found to be convincing. The accuracy of proposed algorithm is achieved up to 90.30 %.

Comparative Structural Analysis of Cable Stayed Bridge with Different Cable Arrangements

Authors- Research scholar Azim Khan, Assistant Professor Sambhav Gangwal

Abstract- This work will deal with the design and analysis for different cables arrangement with the different shapes of pylon using STAAD Pro. There are many types of cable arrangements among these we chose fan type, radial type, star type and harp type arrangements. The pylons are of two laterals of stays i.e. “A” shape, “Y” shape, “H” shape and one axial layer of stays i.e. circular shape pylon. All the considered shapes of pylon have cross sectional area but are of circular shape. The most efficient arrangement will be proposed after analysis among these configurations. The comparison is made for shear force, bending moment, displacements for all the cases. The conclusion will make in respect to the efficiency of one of the arrangements. This can be useful in the modifying the drawbacks of others. This work will give directions to make other arrangements more efficient. Finally, among all these the circular H shape with harp and the fan shape configuration is the best configuration.

Collapse Behaviour Of RCC Building Using STAAD Pro

Authors- Research Scholar Vaibhav khede, Professor Sambhav Gangwal

Abstract- After several disastrous building collapses, concepts such as progressive collapse and robustness of structures have been reflected in many research papers and resulted in new codes and guidelines available in Europe and in the United States. The collapse of an entire structure or an essential part of it that is disproportionately large compared to the initiating local damage is considered a progressive collapse. In addition to the design guidelines, the mentioned standards provide provisions for the progressive collapse analysis of newly designed and existing structures. Therefor this study concerned with collapse behaviour of RCC building and various recent studies associated with it.

Design & Simulation of Rectangular Microstrip Patch Antenna for UWB Applications

Authors- Tahir Ul Islam Malik, Assistant Professor Gyanendra Kumar

Abstract- Over the past one decade, there is a rapid growth in development of wireless communication applications. The performance of all such wireless systems depends on the design of the antenna. Microstrip antennas are preferred for majority of their applications and advantages. This paper presents the design and simulation of circular rectangular patch microstrip antenna. The overall antenna is designed and simulated in microwave tool High Frequency Structure Simulator (HFSS). The substrate used in this configuration is Rogers RT/Duroid and substrate is used with ε_r = 2.33. The proposed antenna is used for various wireless communication applications. Gain, Return loss and bandwidth are the performance parameter of proposed antenna. The proposed antenna is analyzed at resonant frequency of 16.6 GHz & 18.3 GHz. The result calculated is return loss of patch is -35.7673 db & -29.2070 db and gain of patch is 5.6925 db & 12.44 db respectively.

Application of the Two-Dimensional Asymptotic Theory of the Three-Point Bending Behavior of Multi-Layered Beams on the Orthotropic Phase Sandwich Wood Beams Based on Guitard’s and Foudjet-Metangmo’s Models

Authors- Achille PAGUI Déblème, FOUDJET Amos Erick, FOADIENG Emmanuel, Njoh Ekoume T. R. S., TALLA Pierre Kisito

Abstract- The objective of this work is the application of the methodology for analyzing the behavior in bending of the structure of sandwich beams base on the second order of asymptotic method in a three-point structure. The development of this work is based on the application of two models, the model of Foudjet-Metangmo and the model of Guitard. This work includes the knowledge of all the physical elastic constant of the sandwich beams. The curves have been obtained by the software named python. The curve obtained presented to us a very small variation. This result confirms the fact that the second order of asymptotic method doesn’t bring a significative change in the behavior of the solution. This result was predictable because the asymptotic methods deal with small variation due to the presence of the epsilon parameter which is very small.

Preparation of Flavored Milk Powder by Using Mazafati Dates

Authors- V. Ragaventhira, K. S. Gokul Raj, M. Dhilip Kumar, J. Manikandan, V. Balasubrahmanyam, V. Balasubramani

Abstract- Dairy products are a type of food produced from or containing the milk of mammals. Dairy products, milk and any of the foods made from milk, including butter, cheese, ice cream, yogurt, condensed milk and dried milk. milk powder is considered as a complete food and most valuable protein contained food. It is frequently used in the manufacture of confectionery products, caramel candy and in receipes for baked foods. Mazafati dates are also called bam dates. It is a dark, soft, fleshy and sweet date of size about 2.5 to 4.5cm with a relatively high moisture contant. Mazafati date fruit composed with various nutrients, calcium, mg, potassium etc. The main present study was carried out with the objective to prepare flavored milk powder by using Mazafati date and shows a positive result in terms of taste, color and nutrient content.

Radio Frequency Identification Antenna for Wireless Antenna Designs

Authors- M.Tech. Scholar Khushboo Zulfi, Assistant Professor Gyanender Kumar

Abstract- The design & simulation of different shape of RFID antenna has been studied using CST software. The simulation work gives good result through patch calculator. Here accurate patching via resonant frequency has been done. The investigation has been completely done throughout simulation work. The RFID antenna has high gain & best resonant frequency i.e. 10.1 GHz as compared to other shapes of microstrip patch antennas. The RFID antenna with strip have minimum return loss i.e. -39.711 db at its resonant frequency 10.1 GHz Gain is also a factor improved by proposed RFID antenna & it obtained as to 5.7 dbi. Bandwidth of proposed RFID antenna is also improved up to 57.92 %.

Causes of Sleep Deprivation Among Aircraft Maintenance Personnel at Subang Airport

Authors- Mohd Harridon, Muhammad Firdaus Mohd Nizam

Abstract- Aircraft Maintenance Workers that were sleep deprived produced outputs that were below par and not up to the standard. This affected safety and endangered lives of passengers. Thus it was imperative to analyze the causes of sleep deprivation. We had parlayed six causes of sleep deprivation to Aircraft Maintenance Personnel at Subang Airport and we had gauged and measured their responses. The responses were mixed but prominent causes of sleep deprivation had been identified and counter measures could take place to mitigate the causes.

Recent Advances and Future Trends in Industrial Communication Networks: M2M, I-IoT, Wireless Technologies and Interoperability Issues

Authors- Hakki Soy, Sabri Koçer

Abstract- Machine-to-Machine (M2M) communication and Industrial Internet of Things (I-IoT) are key technologies to realizing the vision of smart factory. But, most of the field devices use vendor’s proprietary protocols, and hence interoperability is often not possible entirely. The OPC UA (Object Linking and Embedding for Process Control) standard provides interoperability in industrial automation systems by creating open specifications that allows the real-time communication between field devices of different vendors. This study reviews the relevant and contemporary literature on the industrial communication networks that are shaping current automation applications, as well as the future trends in wireless networking technologies.

A Revire on CUK-ZETA Multi-Input DC-DC Converter

Authors- M.Tech. Scholar Harshil shrivastava, Professor Dr. K.T Chaturvedi

Abstract- This project presents a new transformerless buck-boost converter based on the ZETA converter. The proposed converter has the advantages of ZETA converter, such as buck-boost capability, DC isolation from input to output and DC output current. The voltage gain of the proposed converter is greater than that of the conventional ZETA converter. In the proposed converter, only one main switch is used. The proposed converter can provide a lower AC voltage. Therefore, the low resistance of the main contact can be selected to reduce displacement loss. The proposed converter topology is simple; therefore, controlling the conversion is straightforward. The converter has a continuous output current. The mathematical analysis of the proposed converter is recalled. This project proposes a double input DC-DC converter based on the integration of CUK and Zeta converters, which performs a boost operation suitable for telecommunication supplies. In the proposed converter, the input DC voltage can be interrupted or increased, and the input DC power supply can also supply the load separately or at the same time. This combination causes the output voltage to be negative, but by introducing diodes and capacitors across the bridge the polarity is reversed to a positive voltage at the output. The converter can provide up and down conversion with reasonable duty cycle. The state of stability of the converter is analyzed and introduced in this recommendation.

A Review on Stability Analysis of DC Microgrid with Hybrid Energy Storage System

Authors- M.Tech. Scholar Shubham Sahu, Dr. K.T Chaturvedi

Abstract- The AC and DC power system structures need to be modernized to meet consumer demands. DC microgrids are suitably admired due to their high efficiency, consistency, reliability, and load sharing performance, when interconnected to DC renewable and storage sources. The main control objective for any DC microgrid is providing proper load–power balancing based on the Distributed Generator (DG) sources. Due to the intermittent nature of renewable energy sources, batteries play an important role in load–power balancing in a DC microgrid. The existing energy management strategy may be able to meet the load demand. However, that technique is not suitable for rural communities’ power system structure. This research offers an energy management strategy (EMS) for a DC microgrid to supply power to rural communities with solar, wind, super capacitor and batteries as input sources The conventional design method considers the rated super capacitor voltage in the modelling and design of controllers. The conventional method of controller design can potentially make the system unstable or introduce ringing in the DC link voltage at low super capacitor voltage. In this the sensitivity of DC micro grid stability with respect to super capacitor voltage variation is analyzed and a control design method is proposed to ensure the stability of DC micro grid in all operating modes. The design and stability analysis of a DC micro grid with battery-super capacitor energy storage system under variable super capacitor operating voltage.

Parametric and working fluid analysis of a combined organic Rankine-vapor compression refrigeration system activated by low-grade thermal energy

Authors- M.Tech. Scholar Prince Patel Professor Krishna Pal Singh Rajput

Abstract- Nowadays, there are numerous attempts in the utilization of renewable energies such as geothermal heat, wind energy, and solar energy as clean energy sources for electricity production or cooling processes. Also, waste heat can be considered as renewable and clean energy, since it is free energy and there is no direct carbon emission. Waste heat can be rejected at a wide range of temperatures depending on the industrial processes. In this study, the energy and exergy analysis of a combined cycle was carried out. This cycle consists of an organic Rankine cycle and a vapor compression refrigeration cycle for producing the cooling effect. Four organic fluids were used as working fluids such as R600a, R245fa, RC318 and R236fa. The parametric analysis allowed us to characterize the combined system and to study the effect of some parameters that will be used to estimate the thermal and exergy efficiency of the studied system. Due to environmental issues of R600a is recommended as a superior candidate for.

A Review on Thermodynamic Analysis of Triple Effect LiBr-H2O Vapour Absorption Refrigeration System

Authors- M.Tech. Scholar Gagan Pashine, Assistant Professor Roopanshi Tomar

Abstract- The absorption refrigeration system (ARS) is becoming more important because it can produce higher cooling capacity than vapor compression systems, and it can be powered by other sources of energy (like waste heat from gas and steam turbines, sun, geothermal, biomass) other than electricity. In the recent years, the interest in absorption refrigeration system is growing because these systems have environmentally friendly refrigerant and absorbent pairs. From the literature review it seems less work has been done on performance analysis of the reverse flow cycle. Also, optimization of the solution distribution ratio in the parallel flow cycle has not been well defined. None of paper show effect of using precooler on the COP in the vapour absorption system. Therefore Energy analysis of triple effect flow cycles has been done using precooler in the absorption system.

Micro Structure and Sliding Wear Property Evaluation of Si Cp Reinforced Aluminium Alloy Composites & Gunmetal: Effect of Solid Lubricants

Authors- M.Tech. Scholar Lokesh Bunkar, Dr. Pankaj Agarwal, Associate Prof. Shri Krishna Dhakad

Abstract- Aluminum casting alloys are used in fabrication of aircraft components where aluminum casting alloys give high strength. The requirement of light weight parts and high strength parts its constantly increasing. Aluminium matrix composites materials are considered to be new generation light weight materials for many mechanical engineering works. In the present observing, studies on mechanical properties and microstructure of Aluminium Matrix Composites (AMCs) reinforced with silicon carbide (SiCp) particles. A356 alloy is used as the matrix material with varying the reinforcement of SiCp. The composites were eracted by liquid metallurgy method. The ready composites were survey for micropattern to know the particle distribution in the matrix material. Tensile properties and hardness were studied and compared with the alloy.

A Review on Different Methods to Prevent Black Hole Attack in MANET

Authors- M. Tech. Student Nitiksha Sharma, Assistant Professor Mr. Sujeet Mishra

Abstract- Mobile ad hoc networks (MANET) are dynamic, decentralized and infrastructure less network, where at any given point of time nodes can join or leave the network. Due to the property of flexibility and simplicity MANET are widely used in military communication, mobile conferencing and emergency communication. As Ad-hoc networks are autonomous mobile nodes, they form a temporary based network which has no fixed infrastructure. Every node in the network is autonomous hence they act as host as well as router. Due to this nature of MANET, where any node can join or leave the network without any permission, security is the main challenge in such networks. One of the major security issues in MANET is Black hole attack. It occurs when a malicious node referred as black hole joins the network. during the process of discovering route this node acts as if it has the route to the destination and takes all the packets into it and does not forward to the desired destination, instead it drops all the packets. In this paper, we have survey on few of the techniques and methodologies for detecting and preventing black hole attack in MANET using AODV routing protocol.

Teachers and Students’ Perceptions on Online Teaching in the University of the Cordilleras

Authors- Adonis M. Cabungan, Alnora Joy A. Col-Iteng, Sheena T. Palaroan

Abstract- – Different online teaching platforms have been welcomed in the advancement of technology from the recent past years. This year, the first quarter of 2020 came as a shock with the global health crisis that drastically affected every country in the world. The pandemic did not only affect the health sector but also education. Through online teaching, the Department of Education assured that learning still continues while making sure that teachers and students are safe in the comfort of their homes. This study aims to present teachers and students’ experiences and responses to online teaching initiatives in Baguio City. Data were gathered through online survey questionnaires from students and teachers who experienced online teaching in the third semester of school year 2019-2020. From the analysis of data, three categories were drawn namely; teachers and students’ willingness to support online teaching, the perceived difficulties of online teaching, and online teaching platforms. Results indicate that teachers and students support online teaching as a preventive action against the spreading of the pandemic. With the shift from face-to-face classes into online teaching platforms, several concerns and challenges were encountered by teachers and students. Lastly, the most preferred online teaching platform is Canvas. This study will serve as a stepping stone for future studies regarding online teaching studies.

A Review of Friend Recommendation System Using Machine Learning Method

Authors- M.Tech. Student Shweta Soni, Assistant Professor Pratiksha Singhai

Abstract- Friend recommendation is one of the most popular characteristics of social network platforms, which recommends similar or familiar people to users. The concept of friend recommendation originates from social networks such as Twitter and Facebook, which uses friends-of-friends method to recommend people. We can say users do not make friends from random people but end up making friends with their friends’ friends. The existing methods have narrow scope of recommendation and are less efficient. We propose a new friend recommendation model to overcome the shortcomings of existing system. For better friend recommendation system with high accuracy, we will use collaborative filtering method to compare similar, dissimilar data of users and will make a recommendation system which gives user to user recommendation based on their similar choices, activities and preferences. Location based friend recommendation system are becoming popular because it brings physical world to digital platform and gives better insight of user’s preferences or interest This recommendation system will increase the scope of recommendation from one user to other with similar set of interest and their location.

Static, Buckling and Fatigue Failure Analysis of Dog Bone Shaped Specimen

Authors- PG Student Mr. Annamareddy Karthik, Assistant Professor Mr. Y Kesava Rao, Assistant Professor Mr.V Krishna Kanth, Professor Dr. P. Vijaya Kumar, Professor Dr. V. Nagabushana Rao

Abstract- Structures such as bridges, aircraft, and machine components can fail in many different ways. An overloaded structure may experience permanent deformation, which can lead to compromised function or failure of the entire structure. When subjected to millions of small repeated loads, a structure may have a slow growth of surface cracks that can cause material strength degradation and a sudden failure. In this work, conduct some of structural failure analysis on the specimen. A dog-bone shaped specimen is examined for static, fatigue, and buckling failures. The specimen is made of structural steel with ASTM standard geometric dimensions. The bottom face of the specimen is fixed, and the top face of the specimen is applied a static pressure load of 50 MPa, then determine whether or not the specimen undergoes plastic deformation under the given static pressure load.

Investigative Study on Carbon Epoxy Composite and S-Glass Epoxy Composite Structure for Energy Absorption Applications

Authors- PG Student Ch. Trinadha Reddy, Assistant Professor V Krishna Kanth, Assistant Professor Y Kesava Rao, Professor Dr. P Vijaya Kumar, Professor Dr. V Nagabushana Rao

Abstract- The significance of energy absorption in various industries, light shock absorbers such as honeycomb structure under in-plane and out of plane loads have been in the core of attention. Materials with good strength to weight ratio are developing to replace the regular metals and alloys in energy absorbing areas. Sandwich type composites are versatile due to their flexibility in solving various industrial needs. Epoxy-based composite materials are widely used in load-bearing applications, e.g., automotive and aerospace. For this reason, there is a need to investigate and predict the deformation behavior of epoxy-based composite materials under general loading conditions. Carbon epoxy and s-glass epoxy composites are being used in structural applications in automotive applications. Automotive crashes are increasing now a days and still lot of safety accepts need to be considered to safe guard the passengers inside an automotive. Especially in cars, Pole crash is a common accident that every where registers. Damages cannot be estimate when lives are lost. This will brings the advanced sandwich composite structures to be used in cars, for absorbing impact energy and to reduce the damage. This study investigates the energy absorption rate on carbon epoxy sandwich composite and s-glass epoxy sandwich composite for automobile application. The aim is to investigate a single cell of honeycomb structure with different material properties are tested, based on various design accepts. To carry out the study a single cell of honeycomb structure is designed and a sandwich composite is assembled with two aluminium Plates. FEM analysis is carried to observe total deformation and energy absorption rate with different design parameters and material properties.

Performance Study Comparison between Single-level and Multilevel Savonius Wind Turbine

Authors- Levin Halim, Bagus Arthaya, Marvin Trisakti

Abstract- This paper aims to analyze the performance of Savonius wind turbine through theoretical calculation, simulation, and measurement on the products of Savonius wind turbine. The parameters to test the performance of Savionus wind turbine including angular speed, torque, and the power. On this research there are 3 design of Savonius wind turbine to be tested such as unleveled Savonius wind turbine, leveled Savonius wind turbine with fixed rotational axis, and leveled Savonius wind turbine with independent rotational axis. The measurement of the reviewed Savonius wind turbine performed on wind speed with the range of 3m/s to 4.2m/s. Based on theoretical calculation, simulation, and the measurments leveled Savonius wind turbine with fixed rotational axis has the highest performance. On theoretical calculation, leveled Savonius wind turbine has the highest performance with the value of angular speed average 273.06rpm, torque average 0,423Nm, and power average 12.53Watt. On simulation, leveled Savonius wind turbine with fixed rotational axis has the value of angular speed average 269,11rpm, torque average 0,427Nm, and power average 12,37Watt. On the real measurments, leveled Savonius wind turbine with fixed rotational axis has the value of angular speed average 273,06rpm, torque average 0,434Nm, and power average 12,72 Watt.

Measurement of E-service Quality and its impact on E-Customer Satisfaction in Mobile Banking Industry

Authors- Mateen Yousuf

Abstract- E-service quality and its measurement in financial institutions is important because of an increased usage of the mobile internet as a preferred mode of availing and using financial services. Institutions that are not willing to devote their maximum resources in improving e-service quality of their online platforms are bound to lag behind competition. India occupies the third largest user base of e-banking end-users after the USA and China despite having the least internet penetration. This research has made an attempt to evaluate e-service quality dimensions to measure customer satisfaction among mobile banking users of private banks in Kashmir. Existing research has shown retaining customers in online space is very difficult. Cochran’s sampling technique was used to determine the number of respondents. Respondents were chosen from all the districts of Kashmir valley through online questionnaire. The survey consisted of 34 questions. Cronbach’s alpha technique was employed to crosscheck the reliability of the questionnaire. The questionnaire used 5 point Likert scale. The Sampling technique used was non-probability random sampling. Data of 175 respondents was found to be reliable after adjusting for incomplete, fictitious and redundant responses. SPSS was employed to examine the data. Result findings indicated the service uptime, security, aesthetics, trust, customer service, learning curve and reliability are the main determinants of e-SQ among m-pay users. There was a significant effect of quality of services satisfaction of customers and their loyalty among m-pay users of private banks in Kashmir. This study will help Private Sector Banks in improving their designing and delivery of e-service quality of mobile banking to attract more customers and retain the existing ones in view of intense competition from other banks and e-wallet applications.

Review on CFD Analysis of Finned Tube Heat Exchanger Using Nano Fluid

Authors- Bhagwan Khande, Assistant Prof. Aditya Singh Lodhi, Prof. Dr. Atul Thakkar

Abstract- The design of heat exchanger has significant effect on its heat transfer characteristics and pumping power requirement of heat exchanger. Similarly, the fluid used in heat exchanger also influences its heat transfer characteristics. In recent years, the researchers have shown keen interest in application of nanofluids in different types of heat exchangers. The nanofluids have good thermophysical properties which makes it suitable for various types of heat exchangers. The current paper reviews the existing design and new design of heat exchangers and type of fluids used in order to improve overall effectiveness of heat exchangers.

Comparative Thermodynamic Performance Analysis of a Cascade System using Different Refrigerant Couples

Authors- M.Tech. Scholar Sakshi Naga, Professor Krishna Pal Singh Rajput

Abstract- In present study the comparison of thermodynamic analysis of cascade refrigeration system has been done with refrigerant pairs such as CO2-HFE7000, CO2-R134a, CO2-R152a, CO2-R32, CO2-R1234yf, CO2-NH3, CO2-Propane and CO2-Propylene. In these systems, performance of two stage cascade compression system using above different refrigerant couples, have been studied and the effect of condenser temperature & evaporator temperature, has been done. Thermodynamic analysis is carried out by developing computational model in Engineering Equation solver (EES).

Ultra-low Power Small Size RF Transceiver Module for 5G/LTE Applications

Authors- M.Tech. Scholar Shiju Koshy, Dr. Uday Singh Panwar

Abstract- The signal processing is advancing day by day as its needs and in wireline/wireless communication technology from 2G to 4G cellular communication technology with CMOS scaling process. In this context the high-performance ADCs, analog to digital converters have snatched the attention in the field of digital signal processing. The primary emphasis is on low power approaches to circuits, algorithms and architectures that apply to wireless systems. Different techniques are used for reducing power consumption by using low power supply, Successive Approximation Register (SAR) ADCs are one of the most popular ADC architectures used nowadays. SAR ADCs are well suited to CMOS integration, as they use mostly digital components. They offer a good compromise between sampling rate, power, and dynamic range and area. Their performance is however limited by mismatch in their internal components, and their conversion speed is not very high among the different ADC architectures due to their iterative nature. A Proposed a technique to enhance the speed of low resolution SAR ADC. In capacitive DAC based SAR ADCs, the capacitance will be increases with resolution. As the settling time will be increases, the conversions speed decreases. The scheme is applied in a 14-bit SAR ADC to determine MSBs much faster before main DAC settles. The scheme is also applicable for improved resolution of 14-bits with unit capacitance 500fF. Thus speed of a SAR ADC can be improved without reducing the total capacitance in the circuit. Scheme is designed will be developed on LT Spice. To this end, we are proposing an improved time-efficient transceiver module which includes the 14-bit SAR ADC, The operating voltage of SAR-ADC is 1.2 V0.65nm CMOS technology will be used for the implementation of the proposed solution.

Optimal Visual Cryptography Scheme for Color Image

Authors- Assistant Professor Ancil John M., Assistant Professor Sujithra B.S.

Abstract- Visual cryptography is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that can be stacked together to approximately recover the original image. Unfortunately, it has not been used much primarily because the decryption process entails a severe degradation in image quality in terms of loss of resolution and contrast. In this project introduces the concept of optimal visual information pixel (VIP) synchronization using genetic algorithm and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality. VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes. For more efficient secret image extraction we use genetic algorithm along with contourlet image denoising method, feature preservation and noise suppression.

A Study of Structure and Properties of Black Hole

Authors- Neeraj Kumar Mishra, Priyanka Vaidya

Abstract- The structure of a black hole consists of Event horizon, Singularity, Photon sphere, Ergo sphere and ISCO. Event horizon is a boundary in spacetime through which matter and light can pass only inward towards the mass of the black hole. Gravitational singularity is a region where the spacetime curvature becomes infinite. The photon sphere is a spherical boundary of zero thickness in which photons that move on tangents to that sphere would be trapped in a circular orbit about the black hole. Rotating black holes are surrounded by a region of spacetime in which it is impossible to stand still, called the ergosphere. In general relativity there exist an innermost stable circular orbit (often called the ISCO) inside of which any infinitesimal perturbations to a circular orbit will lead to inspiral into the black hole. As far as properties of the black hole are concerned, a black hole has only three independent physical properties: mass, charge, and angular momentum, the black hole is otherwise featureless.

Electric Vehicle: An Approach towards Sustainability

Authors- Sagar Jaglan, Sahil Jaglan, Rahul Sharma, Nischal Thapa

Abstract- This report deals with the concept of electric cars, from the very first electric car and history of electric cars. The overview of the basic concept of electric vehicles, their parts and functions. Hybrid vehicles are also the solution that compromises a little bit with the environment. Advantages and disadvantages are also discussed here. Fuel powered vehicles are a threat to the future community and are the major contributors in increasing Global Warming. This report also tells about the near future of such electric vehicles.

A Study of Formation and Evolution of Black Hole

Authors- Neeraj Kumar Mishra, Priyanka Vaidya

Abstract- Objects whose gravitational fields are too strong for light to escape were first considered in the 18th century by John Michell and Pierre-Simon Laplace. The first modern solution of general relativity that would characterize a black hole was found by Karl Schwarzschild in 1916, although its interpretation as a region of space from which nothing can escape was first published by David Finkelstein in 1958. Black holes were long considered a mathematical curiosity; it was not until the 1960s that theoretical work showed they were a generic prediction of general relativity. The discovery of neutron stars by Jocelyn Bell Burnell in 1967 sparked interest in gravitationally collapsed compact objects as a possible astrophysical reality. A black hole can be formed by the death of a massive star. When such a star has exhausted the internal thermonuclear fuels in its core at the end of its life, the core becomes unstable and gravitationally collapses inward upon itself, and the star’s outer layers are blown away.

Rated Perceived Exertions of Selected Cabin Crews of a Malaysian Based Airline

Authors- Mohd. Harridon, Tuan Muhammad Dhiyaulfarhan

Abstract- The aviation field is vast where it consists of workers that actuate numerous tasks. For example, pilots fly the airplanes, maintenance crew fix or overhaul the aircraft, and cabin crews involve in flight services. We had investigated the physical exertions produced by selected cabin crews during flight services. The data of these exertions showed the level of their physical fitness where optimum physical fitness is vital as it involves safety and financial revenues.

Numerical Analysis of an Un-Orthodox Stiffened Double Hull Oil Tanker Upon Impact by a Rigid Bulbous Bow

Authors- Abdillahi Bakari, Professor Emeritus Moustafa El-Gammal

Abstract- This paper presents the design of hull structures with unorthodox light stiffeners as compared to the standard available steel sections with the aim of increasing the overall hull strength. The Y stiffeners as referred to as herein be designed, analyzed and compared to the standard Flat, L, Angle sections, Unequal angle sections and Offset bulb sections. The energy absorption capacity of the hulls strengthened by these light stiffening members and the extent of the damage on the hull plates with possible penetration and piercing of the bulbous bows are investigated. The amount of deformation on side shell plates, stringers, web frames are each studied as an indicator of the amount of distortion that can be induced as a result of the impact from the side collision. Six models of a double hull oil tanker mid-ship sections are modelled in Abaqus 6.144. They are then collided with rigid bulbous bows whose probabilistic dimensions are obtained from statistical formulas. Their results are compared to that of the Y stiffened hull. Outer hull plate rupture latest in the Y stiffened hull than all the other hulls, at a distortion of 0.2m, a total resistance force of 1518900N with a total energy dissipation of 152587J. The nearest in resistance of the other standard stiffened hulls, to the Y stiffened one are; the L and Unequal angle sections with 56% and 55% force, 45% and 44% energy of the Unequal and T3 sections to the Y hull. These results show that the Y stiffened hull possess the highest resistance to damage upon impact and the most energy absorption capacity than all the other standard stiffened hulls. The results of the FEA in Abaqus 6.144 are compared with an analytical method adopted from other researches with good agreement between the results.

Temperature and Periods of Annealing Effect on ZnTe Energy Gap

Authors- Iman Ahmed Younus, Anwar M. Alfaidhi, Mohammad M. Uonis

Abstract- The precursor material for preparing (ZnTe) layers on glass substrates was Tellurium dioxide (TeO2) and zinc chloride (ZnCl2). In order to image the layer that shows the formation of grain, the scanning electron microscope was used, and the FTIR spectrum presented proof of (ZnTe) compound formation. The effects on the energy gaps have been studied of annealing temperature (150,200,250,300 and 350 Co) and annealing periods (15,30,45 and 120 min.).

Review of Client Preservence for an Organisation

Authors- M. Tech. Student Kamal Singh Baghel, Assistant Professor Lokesh Parashar

Abstract- with the fastest growing competitive environment, a technique is required to manage the customer relationship management. The technique should govern customer as their central view point. One such technique is data mining. Data mining is a powerful tool which analyzes, predict and discover the hidden data that is required. Customer relationship management takes customer as their core value, since customer plays a main role in the business environment. This paper describes about management of customer based on data mining.

A People Counting Method Based on Machine Learning

Authors- M. Tech. Student Vinay Kaithwas, Assistant Professor Lokesh Parashar

Abstract- In this Paper proposes for a people counting method based on head detection and tracking, according to the People counting method based on head detection and tracking to evaluate the number of people who move under an over-head camera. There are four main parts in the proposed method: foreground extraction, head detection, head tracking, and crossing-line judgment. The proposed method first utilizes an effective foreground extraction method to obtain foreground regions of moving people, and some morphological operations are employed to optimize the foreground regions. Then it exploits an LBP feature based Adaboost classifier for head detection in the optimized foreground regions. After head detection is performed, the candidate head object is tracked by a local head tracking method based on Mean shift algorithm. Based on head tracking, the method finally uses crossing-line judgment to determine whether the candidate head object will be counted or not. Experiments show that our method can obtain promising people counting accuracy about 96% and acceptable computation speed under different circumstances.

Security Features of MANETs: A Review

Authors- M. Tech. Student Lalita Mandloi, Assistant Professor Lokesh Parashar

Abstract- The mobile ad hoc network is the type of network in which mobile nodes can join or leave the network when they want. Due to self configuring nature of the network malicious nodes enter which are responsible to trigger various types of active and passive attacks. The active attacks are those which reduce network performance in terms of certain parameters. In this review paper, various techniques are reviewed and analyzed in terms of certain parameters.

A Review of Vehicle Recognition and Tracing Systems

Authors- M. Tech. Student Aashish Meena, Assistant Professor Megha Jat

Abstract- Vehicle detection and tracking applications play an important role for civilian and military applications such as in highway traffic surveillance control, management and urban traffic planning. Vehicle detection process on road are used for vehicle tracking, counts, average speed of each individual vehicle, traffic analysis and vehicle categorizing objectives and may be implemented under different environments changes. In this review, we present a concise overview of image processing methods and analysis tools which used in building these previous mentioned applications that involved developing traffic surveillance systems. More precisely and in contrast with other reviews, we classified the processing methods under three categories for more clarification to explain the traffic systems.

Real Time Facial Expression Recognition using Deep Learning

Authors- M. Tech. Student Karishma Sunvaiya, Assistant Professor Megha Jat

Abstract- As we move towards a digital world, Human Computer Interaction becomes very important. A lot of research has been done in this field over the past decade. Face expressions are a key feature of non-verbal communication, and they play an important role in Human Computer Interaction. This paper presents an approach of Facial Expression Recognition (FER) using Convolutional Neural Networks (CNN). This model created using CNN can be used to detect facial expressions in real time. The system can be used for analysis of emotions while users watch movie trailers or video lectures.

Detection and Mitigation of DoS and DDoS Attacks in IOT-Based Stateful SDN: An Experimental Approach

Authors- M. Tech.Student Deepak Chouhan, Assistant Professor Lokesh Parashar

Abstract- The expected advent of the Internet of Things (IoT) has triggered a large demand of embedded devices, which envaisions the autonomous interaction of sensors and actuators while offering all sort of smart services. However, these IoT devices are limited in computation, storage, and network capacity, which makes them easy to hack and compromise. To achieve secure development of IoT, it is necessary to engineer scalable security solutions optimized for the IoT ecosystem. To this end, Software Defined Networking (SDN) is a promising paradigm that serves as a pillar in the fifth generation of mobile systems (5G) that could help to detect and mitigate Denial of Service (DoS) and Distributed DoS (DDoS) threats. In this work, we propose to experimentally evaluate an entropy-based solution to detect and mitigate DoS and DDoS attacks in IoT scenarios using a stateful SDN data plane. The obtained results demonstrate for the first time the effectiveness of this technique targeting real IoT data traffic.

A Survey on Social Site Spammer Detection Features and Techniques

Authors- Rahul Kumar, Dr. Avinash Sharma

Abstract- The expected advent of the Internet of Things (IoT) has triggered a large demand of embedded devices, which envaisions the autonomous interaction of sensors and actuators while offering all sort of smart services. However, these IoT devices are limited in computation, storage, and network capacity, which makes them easy to hack and compromise. To achieve secure development of IoT, it is necessary to engineer scalable security solutions optimized for the IoT ecosystem. To this end, Software Defined Networking (SDN) is a promising paradigm that serves as a pillar in the fifth generation of mobile systems (5G) that could help to detect and mitigate Denial of Service (DoS) and Distributed DoS (DDoS) threats. In this work, we propose to experimentally evaluate an entropy-based solution to detect and mitigate DoS and DDoS attacks in IoT scenarios using a stateful SDN data plane. The obtained results demonstrate for the first time the effectiveness of this technique targeting real IoT data traffic.

Fast Unsupervised Bayesian Image Segmentation with Adaptive Spatial Regularization

Authors- Ajit Kumar, Hod Vimal Kumar

Abstract- Image segmentation is a process of dividing the image in to some distinct regions. These region shave specially coherent in nature and have similar attributes. This technique is widely used for image analyses and to interpret the desired feature. In this present paper we will study about the hidden Markov random fields and find its expectation maximization algorithm. The main idea behind developing HMRF is to adjoin the “data faithfulness” and “model smoothness”, that show very similar nature with the active contours, GVF, graph cuts, and random walks. Here we also uses the HMRF-EM along with the Gaussian mixture models, and then we use it on color image segmentation process. These algorithms are implemented in MATLAB. In color image segmentation experiments, we observe that the result obtain from HMRF segmentation are much smoother then the direct k-means clustering. The segmented object is much closer to the original shape than clustering. The segmentation time for Bacteria 1, Bacteria 2, SAR & brain images are 0.35, 0.43, 0.12 and 0.12 respectively. The accuracy for Bacteria, Bacteria 2, SAR & brain images are 97.70 %, 98.06%, 98.89% and 97.35 % respectively.

Evaluation of Discomfort of Lecturers of Aviation Management of Universiti Kuala Lumpur Malaysian Institute of Aviation Technology

Authors- Mohd Harridon, Syafiq Subian

Abstract- – Aviation Institutes produced individuals that would work in the Aviation Industry. It’s imperative for these individuals to be well trained and well equipped with the necessary knowledge and understanding. It is the responsibilities of lecturers at these Aviation Institutes to produce well trained individuals. Hence these lecturers need to perform well. If these academicians or lecturers are in discomfort, they would not perform well. In this paper, we had evaluated the discomforts of lecturers that lectured in the Aviation Management Programme at Universiti Kuala Lumpur Malaysian Institute of Aviation Technology. Based upon the results that we had gained, we had recommended several measures to mitigate the discomforts.

Study of Various Wireless Sensor Network Image Compression Method

Authors- M.Tech.Scholar Akhil Ashok Patil, Asst.Prof. Neetesh Raghuwanshi
, Asst.Prof. Bharti Chourasia

Abstract- – The aim of data compression is to reduce the memory space or the transmission time, especially for wireless sensor networks (WSNs) because of the energy constraints. In the past, data compression and cryptography were kept separated because any data can be compressed if necessary and then encrypted. Anyway because of the rapid progress in computing technology, the encrypted data could be secure no longer in a few years. A way to increase security is joining compression and encryption, using one of the existing cryptography techniques. This scheme has been adopted especially for images. In this paper different approaches for image compression are discussed.

Efficient TСOFDM Approach to Enhance BER and PAPR in OFDM System

Authors- M.Tech.Scholar Aashish Murlidhar Bhangale, Dr. Asst. Prof. Neetesh Raghuwanshi ,Dr.Asst. Prof. Bharti Chourasia(HOD)

Abstract- – In this paper, various coding technique are discuss which are used to improve the performance of BER in OFDM system. Turbo coding is one of method which is giving better result. The use of turbo coding and power allocation in OFDM is useful to the desired performance at higher data rates. Simulation is done over additive white Gaussian noise (AWGN) and the effect of channel coding is reducing BER. In this paper comparison of different coding approaches was made. Performance of block code, convolution codes Turbo codes in OFDM systems is compared. The simulation result shows that turbo coding gives good result over other various coding.

Investigation of Crop Leaf Disease using Machine Learning and Image Processing Techniques

Authors- Asst. Prof.C.P. Patidar, Associate Prof. Ashish Kumar Jain, PG Student Alka Patidar, PG Student Ritubala Patidar

Abstract- – Agriculture is the world’s driving wellspring of the food thing. In India above 60% of the populace is subject to farming. The present is a time of Scientific Development. Where new ways and methods of tackling genuine issues are being developed each day. With the development of the number of inhabitants on the planet, the fundamental requirement for food is additionally expanded. It is important to build crop creation. One significant impact on low harvest creation is an illness brought about by microscopic organisms, parasites, and infections. It very well may be ensured by utilizing Investigation of Crop Leaf Disease Using Machine Learning and Image Processing Techniques. We will probably build the efficiency of harvests in the agriculture field. Henceforth in this paper, we have introduced the AI-based programmed plant leaf sickness recognition and classification of illness and performing expected therapy to that infection. In this methodology, we have utilized a few stages. For example, Image collection, Preprocessing, image segmentation, Feature Extraction and classification.

Plant Health Assessment and Analysis of Disease using Deep Learning Techniques

Authors- Associate Prof. Ashish Kumar Jain, Asst. Prof.C.P. Patidar, PG Student Alka Patidar, PG Student Ritubala Patidar

Abstract- – Agriculture is the primary type of revenue for a dominant part of people in India and the fundamental need of human existence. Agriculture plays an important role in many country’s growths. Because of different weather and local circumstances, the yields get contaminated by various types of disorders. The majority of disease can be noticed on plant leaf at the initial phase and gradually impact the entire plant can result in less crop cultivation. Identification of illness in plants is a significant factor to limit the loss in the agricultural sector and increasing the quality of agricultural products. As there are countless plants on the fields, it is quite challenging during natural eye observation to identify the illness and to identify individual plant breakdowns in agricultural areas. It is necessary to assess all crops to avoid the expansion of infection in a wide area. To guarantee great quality with high product output, it is important to have precise disease determination and control activities to prevent disease in the early stage. This suggested model will be an AI-based program for the crop leaf infection identification to make it fast and simple diagnosis and later analyzing this and producing predictable resolutions toward the prevention of huge crop cultivation loss. This system is aimed at improving the profitability of yields in farming. In this model, we need to follow some steps namely, image data set collection, pre-preparation, feature selection from leaf image, evaluation, and classification of diseases.

Designing Flexible IoT Frameworks Using Creational and Behavioral Design Patterns in Java

Authors- Dr. Rajesh S. Bansode, Professor

Abstract- – This paper explores the application of creational and behavioral design patterns to enhance the scalability and flexibility of Internet of Things (IoT) frameworks. Drawing from Ramakrishna Manchana’s 2019 research, the study demonstrates how these design patterns can be implemented in Java-based frameworks to address challenges in dynamic device configuration, efficient data handling, and system extensibility. Practical use cases are presented to showcase the effectiveness of these patterns in achieving modular and reusable software solutions for IoT systems. The proposed approach enables the development of IoT frameworks that are adaptable to the demands of large-scale deployments and evolving system requirements.

DOI: /10.61463/ijset.vol.8.issue5.327