Design and Development of Green Coconut Peeler Machine
Authors- Atishay Jain
Abstract- – This paper represents an approach for designing a perfect Coconut peeler machine. Coconut peelers nowadays are readily available at stores and also at many online shopping sites like amazon, flipkart etc. Most of them are very expensive and are bulky. They are generally not very efficient due to problems like having poorly manufactured component parts, wrong choice of materials, wrong choice of machining and joining process and so on. These problems have been mentioned by many consumers in the product reviews section. The current most popular coconut peeler consists of sharp edged blades which even though might seem fit for the job, can be dan gerous to use if performed carelessly. It can cause harm to small children if the blades are fidgeted with. Even the cleaning of the blades is a problem since sharp edge can tear through cloth or sponge which might be used for cleaning. Moreover the price of the product is itself high. Considering these points our product is a shape, efficient, compact and powerful machine which performs its operation without a lot of human effort as our peeler uses the simple 4 bar mechanism in which oscillatory motion is used to give the output whereas the current peelers use rotary blades which requires constant human engagement for its working. It has a lever which is connected to two connecting rods and as we press the lever two rods oscillate and perform a scissor like mechanism to remove the outer layer of coconut in only 3-4 repetitions.
Simulink simulation of solid fuel oxide cell based power generation with Efficiency Improvement
Authors-Dinesh Kumar Sahu, Asst. Prof. Durgesh Vishwakarma
Abstract- -Solid oxide fuel cells (SOFCs) have been considered as one of the most promising technologies for very high-efficiency electric energy generation from natural gas, both with simple fuel cell plants and with integrated gas turbine/steam turbine–fuel cell systems. The high temperature exhaust gas from SOFC can be utilized in other cycles i.e. Rankine, Brayton for additional power generation or for heating and cooling purpose (cogeneration/trigeneration). The analysis shows that the resulting maximum efficiency of this SOFC-combined system can be up to 95-98% depending upon the operating condition and configuration used. This paper reviews the application of SOFC technology in power generation sector. This paper also investigate the research work undertaken or going on in this field.
Study of Different Method Used for Single Image Defogging
Authors-M. Tech. Scholar Ashwini Bhadouria, Asst. Prof. Dr. Neetesh Raghuwanshi, HOD. Dr. Bharti Chourasia
Abstract- – As we know that Fog is caused by high concentration of very fine water droplets in the air. When light hits these droplets it scattered and this results in the dense white background, called the atmospheric veil. For further use of foggy image for another application at that time for removal is necessary for better result. In this paper we are discussing about color and contrast enhancement and visibility enhancement, For color and contrast enhancement two algorithms are proposed Multi scale Retinex (MSR) and Contrast limited adaptive histogram equalization (CLAHE) and for visibility enhancement five visibility enhancement algorithms are now presented: enhancement assuming a planar scene assumption (PA), enhancement with free-space segmentation (FSS), enhancement with the no-black-pixel constraint (NBPC) and enhancement with the dark channel prior (DCP), Combining the No-Black-Pixel Constraint and the Planar Assumption (NBPC +PA) A comparative study with several state-of-the-art algorithms is presented which produces better quality results, in particular case of a foggy input image.
A Review: Analysis of Cable Stay Bridge with A ,Y and H Pylon Configuration
Authors- PG Scholar Sourabh Gautam, Prof. Rashmi Sakalle (HOD)
Abstract- – Several cable-stayed bridges have been built with diverse forms of pylons in recent years, such as Diamond shaped, Inverted Y-shaped, and so on, resulting in a high demand to assess the impacts of different forms of pylon on cable-stayed bridges under dynamic load. The modeling of cable-stayed bridges with various pylon configurations is the subject of this research. The cable stayed bridge is a type of contemporary bridge that was designed for larger spans. The influence of pylon form on the dynamic response of cable-stayed bridges has to be studied. For this, the bridge span dimension and other parameters are maintained constant, and only the pylon form is changed. This study examines the performance of a Cable Stayed Bridge with four typical cable arrangements: fan type arrangement, star arrangement, radial arrangement, and harp arrangement, as well as various phylon “A” shape, “Y” shape, and “H” shape arrangements. In terms of shear force, bending moment, and displacement, comparisons are made for these arrangement types. STAAD Pro software will be used for all of the analysis.
Parametric Study of Seismic Behaviour of 3D G+10 Building Frame With L, Plus and Rectangular Arrangement of Shear Walls: A Literature Review
Authors-PG Scholar Ravikant Vishwakarma, Prof. Rashmi Sakalle
Abstract- – According to past earthquake reports, there is a rise in the market for earthquake-resistant buildings. So It is important to build and analyse systems with the seismic impact in mind. The current paper provides an outline of the various research projects that need to be completed in order to analyse multi-story RC frame structures with lateral load resisting systems such as shear walls and diagrid systems. The current research focuses on the seismic analysis of multi-story buildings with shear walls, as well as the analysis of multi-story structures with various shear wall positions and heights, and the correct placement of shear walls in multi-story buildings. The aim of this paper is to provide information on the seismic activity of structures using shear walls.
A Review Paper-An Elaboration on Fleshy Ancient Appetizers
Authors-Shirley. D, Durga Dharshini. D, Abinaya. M
Abstract- – The appetizers or probiotics is the major component of food that increases taste to the food, the probiotics or also commonly known as pickles, without which the platter would be emptier. The pickles undergo an act of brining which is preserved by oil for months together. The pickles are the taste makers that can make tasty even a pot of porridge! It is eaten by almost all class of people. In this paper a detailed description of all the fleshy(non-veg) probiotics which is consumed by almost most part of the country, the non-veggies almost love this pickles very much as it serves to be their day-today side dish. In this paper we are going to discuss about chicken pickle, prawn pickle, mutton pickle, mutton keema pickle, fish pickle, quail pickle, buffalo meat pickle. Let us discuss about this non-veg pickles in this following lines.
Implementation and Analysis of Hybrid Method to Single Image Visibility Enhancement of Foggy Image
Authors-M. Tech. Scholar Ashwini Bhadouria, Asst. Prof. Dr. Neetesh Raghuwanshi, HOD. Dr. Bharti Chourasia
Abstract- – Atmospheric phenomenon such as haze, fog, mist etc is originated by small particles in the air such as dust, smoke or moisture, which reduces the visibility of the outdoor scenes. In this paper, we instigate a single image dehazing approach which enhances the visibility of the hazy images. The phrase single image defogging is used to describe any method that removes atmospheric scattering (e.g., fog) from a single image. In general, the act of removing fog from an image increases the contrast. Thus, single image defogging is a special subset of contrast restoration techniques. The proposed method aim is to measure more accurately atmospheric scattering from digital images of images in order to estimate PM levels accurately in the atmosphere and to develop a process which takes digital images, analyzes the pixel data and measures the amount of atmospheric scattering in the image. The process will include radiometric calibration of the camera being used extracting haze from images using a white-balance algorithm; applying a temporary de-hazing technique and applying a statistical prior of out-door haze filled scenes. Another objective of the work is to produce a more accurate depth map computation method which produces a more accurate depth map of images by using temporal knowledge. The experimental results show that the method is capable to remove the haze competently and it take less time to defogging image.
Experimental Investigation on AA6061 by Using Tungsten INERT Gas
Authors-Asst. Prof. Attalique Rabbani, Syed Muzammil, Raiyan Baig, Shaik Ghouse
Abstract- – Tungsten Inert Gas Welding process is generally used for welding of Aluminum alloys. GTAW process is generally preferred because it produces a very high quality weld. Distortion is the major problem in welding of thin sections. This distortion is controlled in pulsed and magnetic arc oscillation GTAW process. The metallurgical advantages of pulsed TIG welding are grain refinement in fusion zone, reduced width of HAZ, less distortion, control of segregation, reduced hot sensitivity and residual stresses. It was observed that Pulsed TIG Welding produces finer grain structure of weld metal than conventional TIG welding (without arc pulsation). The mechanical properties and microstructure characteristic of weld metal depends upon the microstructure of the weld. The microstructure of the weld depends upon pulsed parameters peck current, base current, pulse frequency, pulse duration. The objective of present project is to achieve better mechanical properties. So, controlling of pulsed parameter is needed in this investigation. An increase in the pulse frequency has been found to refine the grain structure of weld metal especially when welding is done using short pulse duration. Long pulse duration lowers the pulse frequency up to which refinement of constituents in weld metal takes place. Effect of the pulse frequency on the grain structure was found to be determined by pulse duration. For a given pulse frequency, long pulse duration produced a coarser structure than short pulse duration. An increase in the peak current coarsened the grain structure.
Simulink simulation of solid fuel oxide cell based power generation with Efficiency Improvement
Authors-Dinesh Kumar Sahu, Asst. Prof. Durgesh Vishwakarma
Abstract- – Solid oxide fuel cells (SOFCs) have been considered as one of the most promising technologies for very high-efficiency electric energy generation from natural gas, both with simple fuel cell plants and with integrated gas turbine/steam turbine–fuel cell systems. The high temperature exhaust gas from SOFC can be utilized in other cycles i.e. Rankine, Brayton for additional power generation or for heating and cooling purpose (cogeneration/trigeneration). The analysis shows that the resulting maximum efficiency of this SOFC-combined system can be up to 95-98% depending upon the operating condition and configuration used. This paper reviews the application of SOFC technology in power generation sector. This paper also investigate the research work undertaken or going on in this field.
Smart Communication System for Human Life Safety System with Electrical Information
Authors-Asst. Prof. S. Saravanan, I. Govindharaj, V. Mohanaprasath, B.Prasanth, A.Uthiraprakash
Abstract- – A device providing for discharging and a grounded object to prevent unpleasant static shock to the person includes housing supporting a first contact arranged for manual engagement. A second contact for contacting the grounded object and a conductor of high resistance there between for allowing transmission of current at a rate which is sufficiently low to avoid shock. An electric shock preventer provides electrical shock protection for human, which consist of shock sensing element and transceiver module. An IOT based control system will introduce the early warning and control technique for the electrical shock.
Design of an Automatic Solar Tracking System used for Fish Farming and Irrigation
Authors-Asst. Prof. S. Hema Silivia Vinothini, K. Nandhini, R. Pavithra, C. Shobana Bharathi
Abstract- – This paper presents the hardware design and implementation of a system that ensures a perpendicular profile of the solar panel with the sun in order to extract maximum energy falling on it renewable energy is rapidly gaining importance as an energy resource as fossil fuel prices fluctuate. The unique feature of the proposed system is that instead of taking the earth as its reference, it takes the sun as a guiding source. Its active sensor constantly monitors the sunlight and rotates the panel towards the direction where the intensity of sunlight is maximum. The light dependent resistor’s do the job of sensing the change in the position of the sun which is dealt by the respective change in the solar panel’s position by switching on and off the geared motor the control circuit does the job of fetching the input from the sensor and gives command to the motor to run in order to tackle the change in the position of the sun. With the implementation the proposed system the additional energy generated is around 25% to 30% with very less consumption by the system itself. In this paper, an improvement in the hardware design of the existing solar energy collector system has been implemented in order to provide higher efficiency at lower cost.
A case study of Smart Grid-Need, Implementation & Challenges in India
Authors-Akshata Lolayekar
Abstract- – Electricity over the years has been a major contributor towards improving the standards of not only individuals, but the society, at large. The growth in economy resulted in a surging demand for energy. The electricity consumption per capita by India in 2018-2019 was 2049.337 TW-h. India’s electricity sector is dominated by fossil fuels, such as coal. During the 2018-19 year, about three-quarters of the country’s electricity was produced by coal itself. Increasing concerns over climate change have limited the liberal usage of available energy options. India faces a rather tough challenge to meet its energy needs and to also provide adequate energy of large quantities in various forms to users, in sustainable manner at reasonable costs. This resulted in installation of renewable sources of energy for electricity. Despite this, millions of households have little to no access to electricity. A large number of people from remote areas suffer from frequent blackouts. This paper studies an implementation of efficient energy technology that is the smart grid and its implementation by the government as well as the commoners.
Role of Kanban System in Construction
Authors- Damanellore Karthik, D.Chinni Krishna
Abstract- – Kan-ban is an system that is under the category of tool it is mainly used in the reduce the time period in the manufacturing and production processes the main objective and idea to introduce these system it will deliver the products on time I,e lead time with out any further delay occurrence.In terms of Japanese terminology the word kan means visual and ban means card. So combine we called these word as visual card. The main function of these visual cards they signal the system with in the process system to continue the production with out any intermediate in differences in between the stages of production.So the Kan-ban cards shows how the work is going on I.e information is displayed on the cards they include tasks they completed , need of materials, need of resources if any etc.So they should be standard texture, size, and shape with varying colour based on the sequence of works we carried .In these Kan-ban system they consider pull system process, in these system based on the customer requirements and quantity demand they can be produced the concept is idealized with the following description.It consists of one line with series of activities are carried out from start to finish so many activities are involved so in these process what is the product we produced that only can be produced at end.The products may processed in series line manufacturing is as follows the raw material insertion , partly semi finished product and finally we derive an finished product.So, In these paper we use these kanban system in case of construction and evaluate how it should be use full and how to deliver materials with in the construction site and how the processing will happen can be described.For these respective we consider an ‘n’ number of PCC slab construction as an example and describe the how these kanban system help full and what are the advantages and how it should be shown impact on entire process flow can be explained.
Vehicle Anti-Theft Face Recognition System Using Raspberry Pi
Authors-Viraj Parmar, Rushikesh Shinde, Mr. Shital Agrawal, Ms. Naina Meshram
Abstract- – This is an advanced system that can be utilized in many cars. Today, it is not difficult to make duplicates of vehicle keys and using such keys increases the risk of robbery. For such problems, we hereby propose an efficient and reliable solution. Our system uses a face recognition system to identify the authorized users of the vehicles and only authorized users are allowed to use the vehicle. This allows for a fast easy to use the authentication system. The system uses a Raspberry Pi circuit, it also consists of a camera. When we turn on the system authority provided by 3 options that are registration, start, and clear data, while registering, it first scans the owner’s face. After successful registration, the owner can start the vehicle. If an unauthorized user tries to use the car, the system scans the person’s face and checks whether face matches with the authorized face, if it does not match the system denies. In this way, the system helps to secure such intelligent vehicles.
Water Quality Index Assessment of Gopi Krishna Sagar Dam, Ruthiyai, Guna District (M.P.), India
Authors-Research Scholar Mallavika Bhagat, Dr. Manju Sharma
Abstract- – – The present investigation is on water quality index of a water body, Gopi Krishna Sagar Dam in Ruthiyai, Guna (M.P.). Ten parameters were selected; pH, TDS, DO, Alkalinity, Total Hardness, Calcium Hardness, Magnesium Hardness, BOD, Chloride, Fluoride. Water samples were collected from three sampling sites. Collected samples were analyzed in laboratory on same day. Observed values were compared with permissible limits as prescribed by Indian standards. WQI value of four seasons was calculated. The WQI results reveal “good” category and water is fit for various use.
Design & Implementation of A System Which Provide Safe Guard From Forest Fire
Authors-Mr. Juned H. Makandar, Mr. Siddique S. Kotwal, Mr. Swapnil L. Surve, Ms. Shefali V. Kamble
Abstract- – Electric vehicles are a new and upcoming technology in the transportation and power sector that have many benefits in terms of economic and environmental. In this project we will implement a charging station, which will charge the EV battery through solar system. The main aim to our project is to design the charger such that to charge EV battery quickly or fast. For fast charging of battery we will use CC/CV method. In charging process we utilize a microcontroller based dynamic charging algorithm.
Optimal Placement of PMU Considering Effect of Zero Injection Buses for Monitoring Advanced Grid
Authors-Research Scholar Ashu Priya Mishra, Asst. Prof. Sandeep Bhongade
Abstract- – With the goal of linear static state estimate of electrical grid networks, this study proposes three distinct deterministic algorithms for optimal placement of Phasor Measurement Units (PMU). The first method, called Depth First Search (DFS), finds various solutions with a small number of PMUs, whereas the second method, called Recursive Security N (RSN) is a modified depth first method, and the third one is Integer Linear Programming (ILP). These methods were used to determine the ideal location for all of the buses to be visible. The test has been performed on several IEEE test networks. The outcomes of heuristic based approaches are compared.
Enhancing the Properties of Soil Foundation by using Geo Synthetics
Authors- Asst. Prof. Amit Kumar Singh
Abstract- – The pull-out resistance of reinforcing parts is one among the most vital factors in increasing bearing capability. During this analysis a new reinforcing element that features attaching components to normal soil for increasing the resistance strength of reinforcements is introduced. The objective of the present work is to analyze performance of geogrid reinforcement placed below the footing on non- homogeneous soil and to investigate the behavior of geogrid- reinforced beds by analytical study. The work presented in the thesis will lead to a better understanding of the mechanism of foundation on geogrid reinforced soil beds. Based on results obtained from the current investigation it is said to be that the saving is created in subsoil depth for constant collapse settlement performance by victimization geogrid reinforced foundation system. A load settlement response was measured when geogrid reinforcement was provided. The stiffer response was determined at a comparatively a lot of reduction in settlement concerning 28.77% and 27% for foundation model to u equals to 0 and 150mm respectively. A load and stress response was measured when a geogrid reinforcement was provided and a response was determined that, comparatively a lot of reduction in stresses concerning 50.24% and 49.15% for foundation model comparable to u equals to 0 and 150mm respectively. It is determined that comparatively a lot of reduction in total elastic strain concerning 47.71% and 19.37% comparable to u equals to 0 and 150mm respectively. The results were obtained from the analysis indicates that a depth of placement of geogrid reinforcing layer is below the footing that is u=0mm and u=150mm for layered foundation conditions.
A Review on Future Technology Development on Solar Power of Agriculture, Residential and Industrial
Authors- Vikas Shrivastava
Abstract- – The objective is to address both technical and financial aspects of an industrial and agriculture, residential solar system The development of novel solar power technologies is considered to be one of many key solutions toward fulfilling a worldwide increasing demand for energy. Second, the effects of significant financial factors such as capital cost, utility rebates, federal tax incentives, state tax incentives, inflation rate, maintenance cost and feasible revenues on financial payback of a residential solar system are considered.
Designing the Future Communication Architecture for High Voltage Substation
Authors- Vikas Shrivastava
Abstract- – This paper presents the design of substation among new technology which increases the concert of substations. The effectiveness of this substation higher than in present substation. And also it reduces the maintenance cost as well as fault happening and also reduces the individual errors and labour cost. One of the important issues in a substation automation system is performance of the communication buses consist of station bus and process bus. The station bus provides communication between station level devices and bay level devices and the process bus provides communication between bay level devices and primary equipment as the substation communication world searches for the “Promised LAN”, it would be helpful to have a roadmap to give direction to the search. Such expectations must be tempered with the cost and complexity of achieving them .In this paper describe a methodology that identified a set of Smart Distribution Grid use cases and utilized them to define an architecture based on Future Internet technologies.
Restaurant Recommendation System Using Machine Learning Algorithms
Authors- Asst. Prof. Sathya Seelan K, Asst. Prof. K. Prabhu
Abstract- – The Recommendation system is the unavoidable thing for whatever we buy or go to the new place. Restaurants also need recommendation systems in terms of attracting more customers in the management side and tasting favorite, famous food in the restaurant in customers side. In reality finding the favorite food and famous food especially in new area is a challenging task. In this paper, we present the recommendation system for restaurants based on food rating distribution, service rating distribution by calculating the matrix density. With addition to that we build the popularity based recommender model for recommending restaurants to the customers. Ranking scheme can be employed based on scores. The output of the model may be recommending most popular restaurants and most popular food items served by the appropriate restaurant. For betterment of the model we accompany collaborative filtering with singular value decomposition. Evaluation of the model can be completed with RMSE. This experiment is executed on the Kaggle data set and we build a web based application is built using python’s Flask web frame work.
Design & Implementation of A System Which Provide Safe Geurd from Forest Fire
Authors-Mr. Juned H. Makandar, Mr. Siddique S. Kotwal, Mr. Swapnil L. Surve, Ms. Shefali V. Kamble
Abstract- – Electric vehicles are a new and upcoming technology in the transportation and power sector that have many benefits in terms of economic and environmental. In this project we will implement a charging station, which will charge the EV battery through solar system. The main aim to our project is to design the charger such that to charge EV battery quickly or fast. For fast charging of battery we will use CC/CV method. In charging process we utilize a microcontroller based dynamic charging algorithm.
Face-Mask-Detection
Authors- Ayush Maheshwari, Shreya Singh, Shubham Shandilya
Abstract- – Face detection has advanced as a famous trouble in photo processing and Computer Vision. Many new algorithms are advanced the usage of convolutional structures to make the set of rules as correct as possible. These convolutional systems have made it simpler to extract pixel details. We purpose to layout a binary face system which could stumble on any face gift withinside the body irrespective of its layout. We gift the way to make an correct face masks from any photo of improperly sized. From an RGB photo of any size, the approach makes use of Prede fi ned Training Weights VGG – sixteen Architecture rendering feature. The schooling turned into executed thru Fully Convolutional Networks to differentiate the faces which can be gift withinside the photo. Gradient Decline is used for schooling at the same time as Binomial Cross Entropy is used as a loss function. Progressively the output photo from FCN is processed to do away with undesirable noise and to keep away from fake hypothesis if gift and to create a binding container across the face. In addition, the proposed version additionally suggests fine outcomes on visible acuity. In line with this it’s also capable of get many face mask in a single body. Tests have been finished at the Multi Parsing Human Dataset to stumble on an envisioned pixel density of 93.884% on break up face mask.
Music Recommendation System
Authors-Mallika Srivastav, Dr. Dileep Kumar Yadav, Anushree Narain, Nasir Khan
Abstract- – Music recommendation systems provide a mechanism to assist users in classifying users with similar interests. This makes recommender systems essentially a central part of websites and e- commerce applications. This project focuses on the music recommendation systems whose primary objective is to suggest a recommended movie though a content-based recommendation system.This recommendation system will collect information about the user’s preferences of different music in two ways, either implicitly or explicitly. Implicit acquisition of user information typically involves observing the user’s behaviour, such as watched movies. On the other hand, explicit acquisition involves collecting the user’s previous ratings or history. Such recommendation systems are beneficial for organizations that collect data from large amounts of customers and wish to effectively provide the best suggestions possible.The systems can recommend music based on one or a combination of two or more attributes. In this project, the recommendation system has been built on the type of genres that the user might prefer to watch. The approach adopted to do so is content-based filtering using genre correlation. For the music recommendation problem, we want models that are good at predicting the next song a user will listen to given a small number of recommendations. In other words, we want a model to be able to predict as many relevant songs as possible in as few recommendations as possible. Bearing this in mind, we evaluated our models on two competing metrics: mean precision and mean recall.
Solar Power Plant Monitoring and Maintenance System using IoT
Authors- Asst. Prof. Keerthana. R, Geethanjali. T, Santhoss. M. R, Sharmila. M, Vishaga. GKhan
Abstract- – Monitoring of the solar power plant is needed to obtain the optimum output power. This efficient output power plants while monitoring for connections, the accumulation of dust or any other faults in solar panels affects the solar performance by lowering by the output IoT based the solar power monitoring system allows the solar monitoring and check whether there is the problem in the solar panel connection by lowering the output to find the problem occurs in the solar panel. The AT Mega controller used to monitors the parameters in the solar panel. They monitor the solar panel and transmit the output to the IoT Thingspeak transmits the solar power parameters in the Thingspeak server. The parameters are displayed by using GUI and when the output falls below the specific limit it alerts the user, there is the problem in solar panel connections or any dust particles on the solar panel. This makes the monitoring of the solar panel easier and ensure the best power. Blynk is a platform with an android app to control arduino. It’s a digital dashboard where by simply dragging and dropping widgets one can build a graphic interface for work.
Automatic Pest Monitoring and Fertilizer Healing by Sprayer for Enhancing Growth of Plants Using IoT
Authors- Asst. Prof. Gowthami. D, Bhavadharani. M, Indumathi. M, Logamoorthi. S, Vasanth Kumar. V
Abstract- – – Farming has extraordinary future for innovative propel, Agriculture field is utilized through internet of things (IOT). And Agricultural unwellness and bug pests square measure one among the foremost necessary factors that seriously threaten agricultural production. Early detection and identification of pests will effectively scale back the economic losses caused by pests. Normally, the plants ought to be water that is employed for general plant automotive as a part of caring or little and huge gardens. Automatic water system in light-weight of soil moister and temperature will accomplish by inserting Node MCU board with easy receptive soil sensors. And also, during this technology, the humidness and temperature of plants square measure exactly controlled. In advancement associate degree golem based mostly Blynk App interface are going to be organized to use mobile interface to form a far off measurement framework to be utilized as a district of the sector of agriculture. During this study , we tend to propose helpful, low value power economical for star based mostly by orientation of solar array within the direction of the sun for providing the required power supply in remote areas or within the field of agriculture wherever it’s unfeasible to provide(to produce)charge through a stable current supply. This method isn’t such a lot advanced however rather simpler with the good agriculture observation system. With the assistance of image process we are able to establish the pesticides what we’d like to produce the plant for a more robust growth. Additionally with the assistance nutrients detector we are able to verify the kind of nutrient what required and thus helps to counterpoint the expansion of the plant.
IOT Based Several Humanized Activities for
Health Observation
Authors- Associate Prof. P. Vinoth Kumar, J. J. Deepika, A. Hari Narayanan, V. Kavin, P. Kavipriya
Abstract- -The digitalizing world simplifies our everyday processes with the help of an exclusive technology of IoT. Our proposed work removes the need for allotting a separate slot for the observation of human activities by the automatic monitoring of daily activities and clinical variations of humans. An innovative Human Activity Recognition system, exploiting the potential of wearable devices integrated with the skills of deep learning techniques is presented with the aim of recognizing the most common daily activities of a person at home. It is basically a wearable device that easily identifies the variation of the parameter in the human body of elderly care and medical diagnosing people. The status of a person is regularly observed and can be monitored. The designed wearable sensor embeds with an Accelerometer, Gyroscope, and a Magnetometer which is conceived for daily activity monitor and a Wi-Fi section to send data on a cloud service. Through these nine different activities can be highlighted with great accuracy. Which helps to monitor the people at home from anywhere.
An Automated System for Regular Monitoring of People to Adopt Safety Guidelines to Avoid COVID19 using Deep Convolution Neural Network Model
Authors- Prof. Dr. R. Jayanthi, K. Keerthana, K. Jayameena, T. P. Karthikeyan, A. Karthikeyan
Abstract- -The Corona virus which is currently threatening in the world, originated in the province of Wuhan on the China continent. Covid-19 is a Corona Virus family that spreads very fast and easily. Although many countries have worked together to find a vaccine for the Covid-19, it has not been fully effective .So, we have to follow areaways to protect ourselves from the social distance, wearing mask, washing and sanitizing hand. In this paper helps to diagnose the symptoms of the most common Covid-19 in this world without being touched by technological advances i.e., fever, cough, sneezing. In deep Convolution Neural Network (CNN) are implemented to monitoring. This monitoring is spontaneously monitored and recorded in difference places and people to adopt safety guide lines to avoid Covid-19. Thus, helps to people fight against Covid-19 and protect them from it.
High Precision Emplacement Sensing Subsystem and Weed Removing Rover Using Arduino
Authors- Asst. Prof. Deepak. V, Elango. V, Mahalakshmi. S, Tharun Raj. S Karthikeyan
Abstract- -In this project, weeds are removed in a semi-structured cultivated field using Arduino microcontroller. The main objective is to cut the weeds precisely which is grown near to the cultivable plant and collect it separately. A static camera is mounted for taking the images of a segment of the field. Coordinates of the weeds present in that segment is detected by IR sensors. The IR sensor uses electromagnetic radiation and thermal radiation. It consists of IR photodiode and IT LED (Light Emitting Diode). The coordinates of the weeds obtained from camera are communicated to the robot finally for cutting the weeds. This rover uses line follower technology for navigation as it is an autonomous system. It is used as a substitute for human workers to perform the weed removal process. It uses line follower technology for moving in a particular order in the crop field. This system will be monitored by smartphone through Wi-Fi module.
Movie Recommendation System
Authors- K Jayesh Naidu, Hradesh Kumar, Tanmay Gangwar, Pulkit Gangwar
Abstract- -Movie proposal frameworks give a system to help clients in grouping clients with comparative interests. This makes recommender frameworks basically a focal piece of sites and web based business applications. This venture centers around the music proposal frameworks whose essential target is to recommend a suggested film however a substance based proposal system.This suggestion framework will gather data about the client’s inclinations of various film twoly, either certainly or expressly. Certain securing of client data commonly includes noticing the client’s conduct, like watched films. Then again, express securing includes gathering the client’s past appraisals or history. Such proposal frameworks are useful for associations that gather information from a lot of clients and wish to adequately give the best ideas possible.The frameworks can suggest music dependent on one or a blend of at least two ascribes. In this venture, the proposal framework has been based on the sort of kinds that the client may like to watch. The methodology embraced to do so is content-based sifting utilizing sort relationship. For the movie proposal issue, we need models that are acceptable at foreseeing the following tune a client will tune in to given few suggestions. All in all, we need a model to have the option to foresee whatever number important tunes as could reasonably be expected in as couple of suggestions as could be expected. Remembering this, we assessed our models on two contending measurements: mean accuracy and mean review.
An Effectual Technique for Smart Farming by Agbots using Embedded System
Authors- Associate Prof. D. Baskaran, V. Ajaykumar, S. Bharath Kumar, C. Govarthanan, E. Vinoth Kumar
Abstract- – Agriculture is the backbone of the Indian economy. It accounts for 26% of the gross domestic product. About half of the total population of our country has chosen agriculture as their chief occupation. As the centuries passed, certain modern techniques were invented in agriculture. These modern techniques include the use of tractors for plowing the field and using machinery which consumes more power and fuel. This agricultural project is proposed to improvise the technologies in agriculture. Here we focused on the environment, cost-effective. It is basically an embedded tool for furrowing, seed sowing, mud leveler, and a pesticide sprayer. In traditional, plowing machines are heavily based on fuel which may result in air pollution and produces co2 greenhouse gases. Solar energy is being used to charge the battery, which, acts as a power source to DC shunt motor, Arduino, and other components. The entire agriculture system is controlled by mobile using BLYNK. RF technology is used for controlling multiple operations simultaneously. It can cover a certain distance. It also contains a camera which is used to monitor the working progress. The multipurpose agriculture equipment is very simple and the various adjustments are made with ease.
Smart Computer Vision System for Vision Loss Person
Authors- Associate Prof. D. Baskaran, S. Aravind, S. V. Naveen Kumar, P. Sneka, S. Syndhiya
Abstract- -With the help of the image processing technique we designed an intelligent assistive system for the visually impaired. Project vision is to focus on the field of medical science, which paves a way to the next level of medical technology. It is a blind assistive device, the Gadget is engaged with microcontroller, camera module, speaker and spectacles. This device is way easier to handle. Therefore, it can be used by all kind of people. The device works by detecting the known person’s recognition, texts to speech, obstacles detections and distance measurement with signal identification. This helps to rectify the visual problem of blind people. This paper discusses about the design of such a system and the challenges involved in designing the device. The gadget works by distinguishing the known people acknowledgment, writings to discourse, impediments recognitions and distance estimation with signal ID. This assists with correcting the visual issue of visually impaired individuals. It helps in increment of fearlessness inside the visually impaired. This framework depends on raspberry pi, a solitary board process model and Tensor Flow light system. The calculation created is tried for recognizing objects like a table, a seat, a TV, a PC, a mouse, a phone, a jug and so forth .This framework is fit for distinguishing individuals just as items. The testing is done in shifting light, foundation, and distance in inside just as open air situations. This framework utilizes Google based example quantized SSDLite-MobileNet-v2 object identification model, which is prepared of the MSCOCO dataset and changed over to run on open CV. We propose a camera based visual help system for text pursuing, movement of articles and the sensations of people and so on It changes over into a voice yield to help daze people groups. Hence, we propose this frame work from a solitary camera-caught picture just as more number of casings and feature some example applications being worked on and possible thoughts for future turn of events.
Border Line Dispute Ship Border Security System for Fishermen using Wireless Communication
Authors- Asst. Prof. A. Palanisamy, C. Anuchandhar, M. Boobalan, P. Gokul, A. Mathiyarasan
Abstract- – The adoption of IoT system assures to be the best for various alert system and prevention purposes in risk factors. Our approach attempts to assist the fisherman in safety calls and avoidance of danger situations. To aid the fishermen in prevention of crossing the prohibited border in sea, we have designed an embedded system to notify sea border of our country by using IOT and RF Transceiver. The embedded unit control overall system performance and compare pre-defined and present value of fisherman position and inform to them about their current location whether they are in safety zone or restricted zone. IOT and RF communication units provides location of all zones of sea. The embedded unit interface with fisherman by LCD display. The system aims at providing a system that will alert the fishermen well in advance and ensure maximum safety and peace at the border and also notify the patrol system in emergency time by software. This will help and increase safety of fisherman life.
Movie Recommendation System
Authors- Harsh Mishra, Suraj Kumar, Yash Khare, Hradesh Kumar Singh
Abstract- – Recommender systems are systems based on Machine learning algorithms that help users discover new products and services. Recommender systems are very essential in this era of internet where services are mostly handled on web rather than on a person to person basis. Since the number of choices present are overwhelming, recommendation systems are there to filter and prioritize the choices so as to present a subset of data which is supposedly the taste of that particular user. This increases the chances of their involvement and hence creates an atmosphere for happy customers in general. Since the amount of information present on the net is humongous, Recommender systems search through huge volume of information to provide user with personalized products or services as recommendations.
A New Approach to Hotel Management System
Authors- Mr. Avneesh Pathak, Mr. Arun Snghal, Mr. Pushkar Kumar
Abstract- – With India’s rapid economic and tourism development, competition in the hotel industry has intensified. Only to improve their management methods and practices and to improve the quality of their work on a regular basis, they can also get enough healthy growth. Therefore, the operation of the hotel computer management has become a very important task. These articles give a brief introduction of a hotel management system, based on software engineering methods to perform performance analysis, needs analysis and design. The whole system is divided into separate modules and introduces the function, while providing a set of conditions and logical structure of data management database. These analyses and guidelines basically meet the structure hotel management requirements based on information technology, to improve the quality of service and efficiency of hotel managers.
A Review Paper For Urban Soild Waste Management Jhansi (A Framework for Sustainable Technology & Development)
Authors- Utkarsh Shukla, Asst. Prof. Tej Pratap Singh
Abstract- – Solid waste management is one of the most challenging issues, which are facing a serious pollution problem due to the huge quantities of solid waste. This paper presents a development work for solid waste monitoring and management system. This research developed a component monitoring system with the aim of achieving an effective waste management system. With this system we will able to monitor the collection and transportation system and manages the process. It provides real time information of solid waste from generation point to disposal site. The development consists of new technologies which may be beneficial to encourage the researchers to work towards further improvement of the present system. These technologies are good enough to ensure the practical and perfect for solid waste collection and transportation monitoring and management for greener environment. The development often application with identification and communication technologies such as RFID and GSMuses some software packages. Indian cities are often characterized by poorly rendered services including waste management—the most ignored of all basic services, on account of various reasons. The situation worsens with increasing population pressure in urban centers. Jhansi is one such metropolitan city of North India, having an inefficient, outdated and unscientific waste system. This paper attempts to assess the existing state of municipal solid waste management (MSWM) in Jhansi city with the aim of identifying the main obstacles to its efficiency and the prospects for improvisation of the solid waste management system in the city. The existing solid waste management system in the city is found to be highly inefficient. Primary and secondary collection, transportation and open dumping are the only activities practiced that too in a non-technical manner. This paper systematically assesses the obstacles in the existing solid waste management system in Jhansi city and also tries to assess the potentials for its improvisation.
Sanitizer Dispenser Using Face Vizard Detection
Authors- Pooja. D. Singh, Netra. D. Deng, Prof. Shailesh. S. Hajare, Prof. Snehal. M. Veer
Abstract- – – Face Mask Detection is being seen significant progress in the domains of Image processing and Computer vision, since the rise of the Covid-19 pandemic, many face detection models have been created using several algorithms and techniques. The proposed approach in this paper uses deep learning, Open-CV to detect face masks, many new algorithms are being invented using convolution architectures to make the algorithm as accurate as possible. This convolution architecture has made it possible to extract even the pixel details. We aim to design a binary phase classifier which detect any phase present in the frame irrespective of its alignment. We present a method to generate accurate face segmentation mask from any arbitrary size input image. It is more relevant today because it not only used on images but also in video applications like real time surveillance and face mask detection in videos. The proposed Raspberry Pi based automatic sanitizer dispenser mainly deals with solving the problem of unhygienic condition of the area. The automation system for everyone is turning very frequently in the present. Yet, common people are facing many issues in their treadmill. Providing the best solution to this issue is the main aim of our project. The enduring method involves manual cleaning done by human which is not at all easy task and it is may not even exist in all areas. Sanitation and hygiene is one of the largest problems faced by people in our country. The cleaning process is operated to be automated and simple. This facility helps the regular janitors as well as the users to work easily. On selecting Raspberry pi as a suitable interface, we aim to provide an easily compatible facility at an economically feasible rate.
Physiological and Environmental Parameter Healthcare Monitoring System using Internet of Things
Authors- Associate Prof.P.Vinothkumar, M.Indhumathi, A.Mathivanan, S.T.R.Mohanapriyan, T.Pavithra
Abstract- – This is to analyze the physiological and environmental monitoring of human health care. We develop flexible IoT gateway that can adopt different commercial product for measuring. In such a way different users/patients owing products can use this solution. Platform is not restricted to only specific vendors. In personalized healthcare monitoring, wearable are playing in important role in terms of data measurement collection. Hence we develop an innovative wrist-worn prototype for ambient monitoring and flexible IoT gateway .The prototype measures the most critical parameter from an ambient domain. Therefore depending on the target investigation, status of the patients, requirements and demands, medics can determine the setup parameter for measurements. Thus the application of this platform is not limited to specific groups but widely may be applied whether in daily routine or medical research investigation.
A Literature Review: A Study on the Various Factors Affecting Augmented Reality and its Implications
Authors- Asst. Prof. Pritam Chattopadhyay
Abstract- – The existence of augmented reality is somewhere at a midpoint between the digital and physical Worlds and it has emerged as one of the promising business opportunities for different companies. With the help of augmented reality based technologies and concepts marketers are able to superimpose digital imagery over the existing physical world and they are able to create an augmentation for any phenomenon. Augmented reality is able to specify the presence of two very important characteristics like interactivity in real time and registering in three dimensions. Due to all these factors, reflector or holographic sight would not be considered as augmented reality on the contrary it could be defined as a combination or amalgamation of digital and the physical Worlds which absolutely blends with three different dimensions. Various product or service designers have already worked with various designs, drawings and physical models to communicate their ideas with the target audience. It is observed that physical models are quite expensive to create and very time-consuming. That’s why it could be an additional burden on cost structure. It can provide an excellent idea to the marketer about the final result by capturing quite complex details about the product or service design. On the contrary, digital design tools would be able to make this entire process quite simpler with the help of required modifications and reengineering of different existing models in the market. So it is quite evident that instead of a physical model, marketers are using digital models which could be cost effective for any marketer and they will be able to implement their final strategy. However it is also a fact that the digital model is lacking behind creating the real essence of the product or service and touch motivation. Now it has become quite inevitable to bridge the gap between the physical and digital Worlds with the help of augmented reality and with the help of that marketers should try to enhance their efficiency. The researcher tried to find various factors those affect augmented reality. The implication of augmented reality is also explained in the research paper. The author had done extensive literature review to find the gap between the concept and the application of augmented reality.
Fake News Detection Using Machine Learning
Authors- Kunal V, Akarsh M, Sameera MS Harishta, Mansi, Asst. Prof. Prathima Mabel
Abstract- – Social media interaction especially the news spreading around the network is a great source of information nowadays and such fake news are used to gain financially, our social media will many times project false facts as completely true without checking the background of the information and also during the elections due to political reasons there will be a lot of fake news generated, so detecting the fake news has become a great challenge and importance. Now a days machine learning will play a key role in classification of the information using natural language processing techniques. The easy access and exponential growth of the information available in Social media network has made it inticate to distinguish between false and true information .
Marine Oil Spillage Recognition and Filterate Method using Internet of Things (IoT)
Authors- Prof. Dr.R. Jayanthi, K. Aarthidevi, S. Kavya, R. Pravin Kumar, S.P.Tharman
Abstract- – The researchers and oil companies are trying to take some precautions for the problem of oil spills in marines. A lot of steps can be taken to remove the oil from water by using the robot. This project presents a robot-based boat system that works on the surface of the water to separating an oil spill by using a cotton spinner as a collecting tool, this system aims to surround the oil spills to a certain limit and prevent it from spreading wider. The Concept of this project is to improve the identification of oil spills in marine by using Synthetic Aperture Radar (SAR) images from satellite and cleaning up oil spills in seashore and marine. The boat is used and controlled by a Wi-Fi module using IoT and the oil spills are clean up monitoring using a cotton-spinner. Oil spills are a very dangerous occurrence for the marine ecosystem. It affects the marine life-forms existence. It creates an unnecessary threat. The robot-based boat system can be controlled anywhere by the application, using Blynk. The oil can be isolated from marine water by using a cotton spinner which can be stored in a separate container. The advantages of this project are to avoid human labor, the cost is lower than the existing system Human beings are not affected by this work. This Project is eco-friendly.
Smart Surveillance and Alert Network using Deep CNNs for Preventing Animal Attacks
Authors- Asst. Prof. V. Deepak, B. Aswin Kumar, T. Bharath, P. Joyal Pious, M. Praveen Kumar
Abstract- – Efficient and reliable watching of untamed animals that are about to human home ground and their natural habitats is crucial to require precaution and management selections. Ways for animal detection are useful to understand regarding the moving activity of targeted animal and to forestall animal intrusion that result dangerous things in forest border space. machine-driven police investigation cameras are being a more and more widespread tool for life watching thanks to their effectiveness and responsible in assembling knowledge of life unobtrusively, endlessly and in massive volume. However, process such an outsized volume of pictures and videos captured from camera manually is very high-priced, long and conjointly monotonous. Investing on recent advances in deep learning techniques in laptop vision, we have a tendency to propose during this paper a framework to create machine-driven animal recognition close to the forest space, aiming at an automatic field watching system. Specifically, we have a tendency to use the state-of-the-art deep convolutional neural network architectures, to coach a process system capable of filtering animal pictures and distinguishing species mechanically. Our experimental results achieved an accuracy at ninetieth for the task of police investigation pictures containing animal, and ninety-two for distinguishing the 3 commonest species among the set of pictures of untamed animals taken in Asian country that always intrude in to the human home ground. This, in turn, will helps to forestall animal attacks, loss of life and avoid monetary losses by a straightforward alert network. We have a tendency to implement and take a look at this technique in real time and also the results are extremely encouraging compared to several existing systems.
Real Time Implementation of IoT Based on Automatic Irrigation Controller using Fuzzy Rule and Plant Protection
Authors- Associate Prof. D.Baskaran, S.K.Bragadheesh, B.Ranganathan, J.Sumathi
Abstract- – This paper proposes to the smart irrigation system which can be used to controlling the watering or irrigation of flowering plants. It controlling the irrigation of plant the automatically where needed the human intervention can be reduced. To continuously monitor the soil dry and wet condition. There are three type parameter can be monitor the moisture and its pH level protection of agriculture in animals attack to protect using shock. The main objective of this project to design smart irrigation and shock protection of chili plant using fuzzy logic. In this project, implementation of internet of things (IOT) also included where WI-FI node is used mean of connection medium. Fuzzy Logic was implemented control in this system to administrate the flow rate of water. The smart watering system consists of an irrigation controller a solenoid valve. The mobile phone remotely controls the automatic irrigation. It was save the time and labour cost. It suitable for small scale irrigation control in parks, courtyards, traditional irrigation controllers that operate on a present programmed schedule and timers, smart irrigation controllers monitor weather, soil conditions, evaporatio0n and plant water use to automatically adjust the watering schedule to actual conditions of the site.
An IoT Based Solution for Smart Maternal and Fetal Health Monitoring with One Dimensional CNN
Authors- Associate Prof. P. Vinoth Kumar, M.Balaji, M. Gopalakrishnan, A. Stephy, S. Subadharshini
Abstract- – The fast-modernizing medical field can be developed and utilized with the help of IoT. Our project work approaches to simplify the patients monitoring by our integrated system of IoT sensors, an emergency diagnostic subsystem a smart health analytic system approaches to secure the patients by automatic monitoring and recording of clinical parameters, and treat them if necessary. The maternal and fetal parameters such as blood pressure, temperature, oxygen level, heart rate are monitored and recorded for those who are hospitalized under high risk condition. The sensors assembled to sense specified parameters record them and the sensed information are recorded and saved in cloud environment. The specialized emergency subsystem developed is used to analyze the data with the threshold levels. The features of the parameters recorded are extracted using CNN. Using deep leaning the features are classified and studied for further consultations with the specialists. A quick and instant remedies can be sought out in case of emergencies.
A Wearable Lo-Ra Based Emergency System for the Remote Monitoring
Authors- Asst. Prof. A.Palanisamy, M.Hareesh Kumar, M.Keerthana, L.Sona, A.Tamilselvan
Abstract- – In this paper we are planning a wearable observing gadget, a security measure for underground mining laborers. In this venture, the framework is fabricated utilizing various sensors used to screen both encompassing and wellbeing boundaries and drives every one of the detected qualities to the ESP 32 module. The qualities at that point sent by utilizing Lo-Ra a spread range balance strategy. In the event that any basic circumstance is recognized an alarm will be given by the framework. The qualities recognized will be shown on the associated gadget which will be simpler for the control place to screen and make the momentary moves to forestall extreme harm.
Braille Typographer with Code Initiator and Conversationist for People with Visual Impairment
Authors- Asst. Prof. Rajkumar. T, Durka. S, Jagadeesh. P, Priya. M, Vivek. V
Abstract- – There are many Typographers are available to print the common language for common people. But these are character printer and not suitable for visually impaired. These problems are eradicated by the evaluation of some braille typographer. Although this type of typographer have some complication and snag. Then typist must know the braille language to access it. So we are brought some changes in the actual braille typographer to contribute the visually challenged persons. Like as text detection and communicator tool. Speech-to-Text Conversion (STT) systems have a lot of benefits for thevisually impaired people and find their applications in our daily lives. In the same way, the aim of the system is to convert the input speech signals into the text output for the visual impaired in the educational fields.an approach to extract features by using Mel Frequency Cepstral Coefficients (MFCC) from the speech signals of isolated spoken words. Hidden Markov Model (HMM) method is applied to train and test the audio files to get the recognized spoken word. We are converting the characters into braille codes by mean of voice recognizer process. So typist no need to know the braille codes and also time conception is very less. Another Purpose of this method is to teach the braille code and to create some e-books through this process. At last we are overcome this tactile application to reduce time complexity.
Surveillance in Post-Pandemic Life and Automated Health Monitoring for Covid-19 by IoT
Authors- Prof. Dr. R. Jayanthi, N. S. Bharath, V. Mahasri, C. R. Mythreyan, P. Premkumar
Abstract- – The IoT innovation is received for practically all distributive and keen investigation framework. The proposed work uses it for checking individuals for their wellbeing boundaries and if following the necessary safety measures to be taken for forestalling COVID-19 at line out in the open spots. The Corona-virus is a destructive illness with unidentified antibody and medicines compromising the world. Since the time its appearance, social separating, wearing of covers, check in time, isolating an individual with manifestations are the standard technique being followed. Positioning an individual 24*7 to screen individuals outside is troublesome. Thus, we endeavored to build up a robot comprising of 4-wheel plan framework used to drive the mechanical vehicle to screen them. It utilizes IR detecting to go alongside line and another ultrasonic sensor to recognize distance between two people in line. In the event that any infringement is identified moment signal is delivered to demonstrate it and furthermore sends an alarm alongside camera picture through Wi-Fi over IoT to educate the checking control. Through our proposed work the spread of Corona-virus is controlled and decreased steadily. The framework guarantees the information exactness, quick reaction and security.
Traffic Rerouting Based on Pollution Density in Highly Populated Area
Authors- Kannappagoud Shivagond, Akshita Shekar, Arpitha B K, Prof. Dr. Rama Mohan Babu K N
Abstract- – These days clog in rush hour gridlock is a difficult issue. The gridlock can likewise be brought about by enormous Red-light postponements, and so on the deferral of particular light is hard coded in the traffic signal and it isn’t reliant upon in traffic. Consequently, for reproducing and upgrading traffic light to all the more likely oblige this expanding request is emerges. In this paper the streamlining of traffic signal regulator in a City utilizing microcontroller is finished. The framework attempts to diminish potential outcomes of gridlocks, brought about by traffic signals, to a degree. The utilized microcontroller in the framework of PIC. The framework contains IR transmitter and IR collector which are mounted on the either sides of streets separately. The IR gets framework initiated at whatever point any vehicle passes on street between IR transmitter and IR receiver. Furthermore, checking the contamination and pollution using gas sensors.
Design of Single Precision Floating Point Arithmetic Unit
Authors- Devyani R. Kamale, Lecturer Mrs. Pradnya J. Suryavanshi, Lecturer Ms. Sharda G. Mungale
Abstract- – Most of the algorithms instigated in FPGAs used to be fixed-point. Floating-point operations are useful for calculations involving large dynamic range, but they require significantly more resources than integer operations. With the current trends in system necessities and available FPGAs, floating- point implementations are becoming more common and designers are increasingly taking benefit of FPGAs as a platform for floating-point implementations. The rapid development in Field- Programmable Gate Array (FPGA) technology makes such devices increasingly attractive for instigating floating-point arithmetic. Associated to Application Specific Integrated Circuits, FPGAs offer reduced development time and costs. Moreover, their suppleness enables field upgrade and variation of hardware to run-time conditions. A 32-bit floating-point arithmetic unit with IEEE 754 Standard has been premeditated using VHDL code and all operations of addition, subtraction, multiplication and division are verified on Xilinx.
A Survey on Machine Learning Features and Techniques
Authors- Asst. Prof. Manish Mishra, Professor Mahesh Motwani
Abstract- – Machine learning algorithm are help to generate unique pattern from raw dataset. Number of researcher has proposed different techniques for the processing of raw dataset to extract information. In these algorithms input is user data output is predicted result in form of pattern, cluster, class, etc. This paper introduce some algorithms developed by researcher to drive information from data. The paper throw light on implementation area of machine learning technique, type of features and there requirement in different dataset and evaluation parameter for the analysis of prediction, classification, clustering algorithm.
A Fuzzy Implementing Fragementation by SSA Algorithm
Authors- PG Scholar Aakansha Jha, HOD. Dr. Lal Ji Prasad
Abstract- – This is the world of digital technology and based on digital notes in spite of writing notes manually. Traditional thinking of student is preparing notes in single copy (rough pattern) for all subjects and finally writes that note in fragmented form into different subject’s copy. Now in the new advance age of technology students make prefers digital notes so it is well demanded to prepare their notes digitally and distribute them automatically in their respective subjects rather than prepare their notes manually. For better distribution process there is need a reliable and efficient distribution approach by which one note automatically distributed in their respective subjects. This paper introduce the essential research challenges of the data mining algorithm implementation, analyses the one subject note and bifurcate it into its respective subject on the basis of ‘keywords’. In our technology chart ‘keyword’ are those relative words of a prescribed subject that helps to distribute a single note into its respective folders. The basic architectural approach of the Data Defragmenter is to manipulate and rectify the data structure implementation on the basis of data mining and data warehouse concepts. Finally, the future of notes making approach will work terms like “Data Arranger”. Proposed approach is announced in different sectors like letter writing, student’s notes making, script managing, news reporting and different more criteria related to writing work and managing prepared notes. General Terms: Fragmenting Notes, Auto Separation, Notes Classification.
Covid-19 Employee Safety and Business Continuity Tracker
Authors- A. Nandhini, Asst. Prof. Mr. S. Sivaraman
Abstract- – As Coronavirus (COVID-19) spreads across the world, leading organizations need to ensure the health and safety of hundreds of thousands of employees, as well as millions of customers. This confusing, fast-changing situation demands scalable and flexible technology to ensure business continuity Tracker. In the year of 2020, pega worked with a major company – one with over 200,000 employees and care providers . This application enables the organization to track and manage the health, safety, and availability of its entire workforce. Inspired by this work and its meaningful impact for millions of clients and employees, Using pega we building the COVID-19 Employee Safety and Business Continuity Tracker helps to identify the employee risk status. Using Pega we developing COVID-19 Employee Safety and Business Continuity Tracker to be used by clients across any industry. Organizations can easily customize how the software reacts to different risk scenarios to meet the unique needs and policies of their own business. Along with that serving the IT service Request for all the employees who need electronic gadgets to ensure business deliverables on time. The Tracker is available in English, French, German, Italian and Spanish.
Structural and Crack Analysis of Different Materials of CNC Machine Tool Spindle
Authors- Amit Shinde, Pavan Jagtap, Saurabh Chalak, Abhishek Shaha, Dr. Rachaya Arakerimath
Abstract- – Machine tool spindle of CNC is most important component for removal of material during machining. Machine tool spindle plays important role in quality of final product and overall productivity. During the machining the spindle of machine tool experiences different forces and loads which creates instability and cracks in the spindle. Due to these loads on spindle structure the chances of formation of stress, strain, deflection and cracks increases on spindle. Many researchers have studied structural and crack analysis of spindle for only a specific material. This work presents statics structural and crack analysis of two different (60C4 and 20MnCr5) spindle materials. In static structural analysis both the materials are compared on basis of stress, deflection, safety factor and cost. While in crack analysis both materials compared on basis of fracture caused by semi elliptical crack produced. After obtained results from both the analysis selected the best suitable material for spindle of machine tool.
Design and Analysis of Corrugated Core Sandwich Panel
Authors- Asst. Prof. Mohd. Mohiuddin, Ahmed Azizuddin, Chenikala Ram Babu, Musunuri Harish
Abstract- – As Coronavirus (COVID-19) spreads across the world, leading organizations need to ensure the health and safety of hundreds of thousands of employees, as well as millions of customers. This confusing, fast-changing situation demands scalable and flexible technology to ensure business continuity Tracker. In the year of 2020, pega worked with a major company – one with over 200,000 employees and care providers . This application enables the organization to track and manage the health, safety, and availability of its entire workforce. Inspired by this work and its meaningful impact for millions of clients and employees, Using pega we building the COVID-19 Employee Safety and Business Continuity Tracker helps to identify the employee risk status. Using Pega we developing COVID-19 Employee Safety and Business Continuity Tracker to be used by clients across any industry. Organizations can easily customize how the software reacts to different risk scenarios to meet the unique needs and policies of their own business. Along with that serving the IT service Request for all the employees who need electronic gadgets to ensure business deliverables on time. The Tracker is available in English, French, German, Italian and Spanish.
Design and Development of an Ornithopter by Aerodynamic and Structural Analysis
Authors- Asst.Prof. Akshayraj N, Shreya M, Sujan D Silva, Vrishab S M, Shilpa N R.
Abstract- – Ornithopter is basically an aircraft that flies by flapping its wings, unlike the conventional fixed wing aircrafts. They have wide range of applications in several fields, especially in the military. To develop an ornithopter with the desirable performance, it is important to know what type of wings should be selected. Obviously, the type of wing has to be chosen by conducting aerodynamic tests for different wings and selecting the one with the desirable characteristics. In this project, Hawk wing is chosen as the best planform based on aerodynamic analysis. The Wing was further enhanced using optimization techniques where the maximum chamber thickness had been increased from 6.8% to 8%. The maximum lift coefficient had been improved by almost 75%. Further, the structural analysis of fuselage was carried out where 0.3197mm of deformation result was obtained.
Study On Ber Performance Of Ofdm System
Authors- M.Tech. Scholar Shubham Srivastava, Associate Prof.Dr. Bharti Chourasia
Abstract- – The paper deals with Single Source Methodology (SSM) using Meta modeling and Code generation framework. The construction of any logic such as digital hardware or network switch which has to be implemented at the chip level, is very hard to understand and implement. A direct high-level language can be used to implement logic using a framework which will automatically convert high level abstraction to chip level program. To enable automated traceability and debug features in software point tools and flows of SSM, a causal analysis (I/O model mapping) extraction between the Input (specification) and Output (hardware design model) is proposed. In this paper, the following ideas are intended to be explored: Implement a generic model to capture mapping information between input and output models, implementing causal analysis on generated output and input specification and establishing framework to introduce AI/ML concepts in generation frameworks. The designed generic mode stores mapping information between input specification and output. The methodology will be piloted by a model mapping framework for use cases specific to point tools and develop a graphical interface to visualize the Source-Target Mapping. This will enhance traceability and the debug mechanisms will result in reduction of effort from days to a few minutes. This project would introduce traceability in all point tools on successful implementation. The outcome will be the introduction of Model Traceability across all Applications, enhanced GUI based Debugging across all Applications.
Automated Extraction of Data Model Mapping for Backlinking
Authors- Bhaskar M, Asst. Prof.Geetha V
Abstract- – Multicarrier modulation is a form of signal transmission that utilizes multiple carrier. An advantage for multicarrier modulation includes the avoidance of intersymbol interference making it a key in 4G Technology [1]. Multicarrier modulation uses a modulator called the Orthogonal Frequency Division Multiplexing (OFDM) to generate subcarriers that are orthogonal to each other. Orthogonal Frequency Division Multiplexing (OFDM) and Multiple Input and Multiple Output (MIMO) are two main techniques employed in 4thGeneration Long Term Evolution (LTE). The Orthogonal Frequency Division Multiplexing (OFDM) is the popular modulation technique for the many wireless communication systems. In the wireless system, the signal transmitted into channel bounces off from the various surfaces resulting in the multiple delayed versions of the transmitted signal arriving to the receiver. The OFDM has trusted to be very effective in mitigating adverse multi-path effects of a broadband channel. In this paper we study different techniques which are used to enhance the performance of the OFDM system and discuss the author’s view for performance of ofdm system.
Image Segmentation with Machine Learning
Authors- Shubham Das, Nishant Gautam, Chitra Singh, Anu Tomar, Amar Pal Yadav
Abstract- – Image segmentation is an important image processing step, and it is used everywhere if we want to analyze what is inside the image. Image segmentation, basically provide the meaningful objects of the image. This paper represents the various image segmentation techniques that could be used in the segmentation. Whenever we work with the image in any application, initial step is to segment the image in order to solve its complexity. The segmentation of images is the basic thing for understanding the images. It is used in the Image processing applications, Computer vision, etc. In this paper, two categories are emphasized: Edge based and region based segmentation, which further includes their respective techniques.
Different Techniques for Non-Destructive Testing of Concrete
Authors- Asst. Prof. Amanulla Liyakatalli Mulla, Associate Prof. Dr. Mahesh Balasaheb Chougule
Abstract- – NDT on concrete determines how secure a particular structure is and whether future repairs or rebuilds are necessary. It is a method of testing existing concrete structures to assess the strength and durability of concrete structure. Testing of concrete serves a variety of purposes that pertain to the strength, durability, and estimated viability of the structure over time. These test results can be used to determine whether repairs should be made to a structure or if the integrity of the structure is sufficient as is. Although nondestructive tests are relatively simple to perform & instrument based, the analysis and interpretation of the test data are not easy, because concrete is a complex material. of the test data must always be carried out by trained specialists in NDT rather than by technicians performing the tests. In this study an effort is made to take review of some of popular methods of NDT.
Blockchain Based Database to Secure Patient Data and Ensure Privacy
Authors- Asst. Prof. Priyanka Sahu, Diksha Verma, Satyam Lachhwani, Vishwas Paikra
Abstract- – In the healthcare system, there is a lot of patient data that is stored and this data needs to be safe and private. With blockchain the data is visible to everyone and hence solves key issues like trust in a network with its ensured transparency of data in a blockchain network. Blockchain provides enhanced security where every transaction recorded needs to be agreed upon according to the consensus method. Blockchain networks are also immutable which means the data, once written, cannot be reverted by any means. All these features of blockchain guarantees the data to be secure and authentic but it also takes away the privacy any user would want in any network. Ability to provide limited access and the right to delete all information of the user is almost next to impossible in any blockchain network. Blockchain is a decentralised network but by using a centralised system along with the blockchain we can ensure true privacy while taking all the benefits of blockchain network by using the method of two way encryption. So this paper states a method to achieve privacy and securely store the data (patient data) in a blockchain network using a centralised system to provide privacy to its users while having all the features of a blockchain network such as transparency, security, data immutability and consensus.
Next Generation Satellite Design Challenges and Solutions
Authors- Associate Prof. Dr. Tarun Varma, Associate Prof. Dr. Laxminarayan Gahalod
Associate Prof. Dr. Shravan Kumar Sable
Abstract- – Remote observations of Earth from space serve an extraordinarily broad range of purposes, resulting in extraordinary demands on those at the different space centers like National Aeronautics and Space Administration (NASA),Indian space research organization (ISRO) ,National Oceanic and Atmospheric Administration (NOAA).Earth observations promise large volumes of data to a variety of disciplines with differing needs for measurement type, simultaneity, continuity, and long-term instrument stability. Operational needs, such as weather forecasting, add a distinct set of requirements for continual and highly reliable monitoring of global conditions. The Role of Small Satellites in NASA and NOAA Earth Observation Programs confronts these diverse requirements and assesses how they might be met by small satellites. The preferred architecture for space missions was a single large spacecraft platform containing a sophisticated suite of instruments. But the recognition in other areas of space research that cost-effectiveness, flexibilit.
Reliving the Big Bang
Authors- Rakesh Sharma,Kumar Shivam
Abstract- – Just a few moments after the Big bang, the universe might have found itself in an undiscovered state, today known as Quark-Gluon Plasma(QGP). Quantum Chromo Dynamics and theory of strong interactions predicts a transition of the strongly interacting matter to Quark- Gluon Plasma at high densities and/or temperatures. Several laboratories such as CERN, Geneva can re-create the environment for such transitions to occur. This review article aims to understand Quark-Gluon Plasma, its importance and methods of creating and studying it in a laboratory. We would need new theoretical tools to measure the strength of such interactions. QCD on a space-time lattice is the most reliable tool available to us. Both, the properties of QGP phase and lattice QCD can be predicted using supercomputers. Similar techniques also help in predicting a QCD critical point which experiments have begun actively to look for.
Attendance System Using Real Time Face Recognition
Authors- Vatte Sangameshwar, Kodgirwar Akanksha, Ubale Komal, Baile Swaranjali
Abstract- – Face is the representation of one’s identity. Hence, we have proposed an automated student attendance system based on face recognition. Face recognition system is very useful in life applications especially in security control systems. The airport protection system uses face recognition to identify suspects and CISF (Central Industrial Security Force) uses face recognition for criminal investigations. In our proposed approach, firstly, video framing is performed by activating the camera through a user- friendly interface. The face ROI is detected and segmented from the video frame by using Viola-Jones algorithm. In the pre-processing stage, scaling of the size of images is performed if necessary, in order to prevent loss of information. The median filtering is applied to remove noise followed by conversion of color images to grayscale images. After that, contrast-limited adaptive histogram equalization (CLAHE) is implemented on images to enhance the contrast of images. In face recognition stage, enhanced local binary pattern (LBP) and principal component analysis (PCA) is applied correspondingly in order to extract the features from facial images. In our proposed approach, the enhanced local binary pattern outperforms the original LBP by reducing the illumination effect and increasing the recognition rate. Next, the features extracted from the test images are compared with the features extracted from the training images. The facial images are then classified and recognized based on the best result obtained from the combination of algorithm, enhanced LBP and PCA. Finally, the attendance of the recognized student will be marked and saved in the excel file. The student who is not registered will also be able to register on the spot and notification will be given if students sign in more than once. The average accuracy of recognition is 100 % for good quality images, 94.12 % of low-quality images and 95.76 % for Yale face database when two images per person are trained.
A Literature Survey on Handwriting Recoginition Using Deep Convolutional Neural Networks
Authors- Nandhini V, Pandi Geetha, Thammineni Pavithra, Asst. Prof. Dr. L. Malathi
Abstract- – Handwritten character recognition is a translational problem of human writings into machine-editable text format. In this paper, Convolutional Neural Networks (CNN) is presented for handwritten character recognition. Handwritten character was transformed into graphs based on its underlying skeleton structure. Edges of the extracted graph were categorized into shape types and vertices were extracted from each of the edges and their layer wise evaluation using deep learning. Matching procedure of the graph was performed in Convolutional Neural Networks (CNN) approach. Performance evaluation of the proposed method was conducted using validated kaggle dataset which exclude ambiguous and unidentified writing samples. The use of neural network can improve the quality of recognition while achieving good performance and encouraging.
Twitter Data Analysis using Machine Learning Classification Technique
Authors- M.Tech. Scholar Mamta Gehlot, Asst. Prof. Vasudha Sharma
Abstract- – Nowadays, maximum people share information through social media around the world. For example, twitter platform where users post their opinions, read posts in form of tweets. such as daily live news, brand, product review, companies review, places and everything because this is a way of interacting with communities. Aim of this paper we are performing a sentiment analysis using collecting real data from twitter API and removing the fake news from kaggle twitter data sets. which are more difficult to analyze? Data will be preprocessed with tokenizations and stop words will be removed from twitter data set of given input data set. After then applied feature extraction algorithms of given input data and priority to each word is assigned to classify positive, negative. After that the noisy data into several models for training of data. For this sentiment analysis we are comparing different machine learning classifiers with twitter data in this paper. In the KFC and McDonal’s both are data sets which are more popular subjects and 14000 tweets for our research. we have used 10000 tweets for training purposes and 4000 tweets for testing purposes. Find the result from these models was tested using different parameters from our proposed method. Using this study, we can contribute to the field of sentiment analysis by analyzing performance.
The Effect of Change in Molarity of Sodium Hydroxide on Geopolymer Concrete
Authors – Asst. Prof. G. S. Patil, V. S. Sherekar
Abstract- – The objectives of the present research is to appreciate the effect of Fly ash based Geopolymer concrete. Collecting the low calcium fly ash from a thermal power plant and this Fly ash used are lignite coal based and falls under class F category. This fly ash reacts with alkaline solution Sodium hydroxide (e.g., NaOH) and Sodium Silicate (Na2SiO3) to form a gel which binds the fine and coarse aggregates. An attempt has been made to find out strength of the Geopolymer concrete at different molarity and temperature at 100 ℃. Concrete cubes of size 150 x 150 x 150 mm were prepared and cured under oven dry curing for 24 hours. The compressive strength was originate out at 7 days. The results are compared. The optimal mix is Fly ash: Fine aggregate: Coarse aggregate (1:1.5:3.3) with a solution (NaOH & Na2SiO3 combined together) to fly ash. High and Premature strength was obtained in the Geopolymer concrete mix. Strength of Geopolymer concrete which will be useful to the researchers and manufacturers.
A study on Awareness about Financial Planning among Individuals in Surat City
Authors – Nidhi Modi, Dr. Vijay Gondaliya (I/C Director)
Abstract- – In last two to three decade India has undergone many socioeconomic changes. Increase in per capita income, changing social structure from joint family to nuclear ones and lack of robust social systems; ask for a change in management of personal finance of an individual. According to the latest survey and recent researches suggest that Indians are good at saving, but then they save only in traditional investment avenues with minimum risk. Awareness and preferences for new age investment avenues are too less amongst Indians. The study has tried to assess the financial literacy awareness and attitude towards personal financial planning of the residents of Surat. Descriptive research is conducted to study the respondent’s awareness towards personal financial planning in the city of Surat. Primary data was collected with quota sampling technique. A 125 salaried employees from the city of Surat were selected as a sample for the study. Respondents are aware about all traditional investment avenues. Awareness related to traditional investment avenues like fixed deposit, saving bank account, equity share, government bond/ debenture, real estate, money market, gold, derivatives, mutual fund, public provident fund, national pension scheme, forex, other post office, non-conventional avenue is still very low among respondents.
Free Vibration Analysis of a Four Bar Mechanism
Authors – Asst. Prof. Mohammed Mohiuddin, Mohd Ali, Mir Nisar Uddin, Mohd. Abdul Wajid
Abstract- – For obtaining high speed operation and improved efficiency, weights of many components in industrial robots and several machines are reduced. When a robot or a machine operates at high speeds, significant accelerations and dynamic forces may be produced. These dynamic forces may cause large dynamic deformations in one or more flexible components, system operational difficulties, premature failure of the components and so on. This project includes the analysis of mechanism for finding the displacement, velocity, acceleration, strain. stress and natural frequency. The numerical simulation by using general-purpose finite element software ANSYS is performed for Crank-Rocker elastic linkage to find natural frequencies and displacements in coupler and follower throughout the crank rotation.
Secure VANET Using Trust Management System
Authors – M. Tech. Scholar Rakesh Mukati, HOD. Avinash Pal
Abstract- – Vehicular ad hoc networks (VANETs) bring those possibility on change those path people experience the preparation of a protected interoperable remote correspondences a that incorporates autos, transports, action signals, portable phones, furthermore distinctive gadgets. A chance to be that as it may, VANETs need aid defenseless against security dangers due to growing reliance ahead correspondence, processing, and control innovations. The remarkable security Also security tests postured by VANETs in-clued respectability (information place stock in), secrecy, no repudiation, get to control, continuous operational requirements/requests, accessibility, What’s more security certification. The unwavering quality for VANETs Might a chance to be improved Eventually Tom’s perusing tending on comprehensively those two majority of the data trust, which is portrayed Likewise those examination from claiming in any case for if Furthermore what exactly degree those nitty-gritty action data would dependable, Furthermore center trust, which is portrayed Likewise how trustworthy those hubs Previously, VANETs appear with make. In this paper, an attack safe trust organization contrive (ART) may be recommended for VANETs that could remember What’s more adjust to pernicious assaults and Besides survey those unwavering quality of the two data and versant hubs On VANETs. Extraordinarily, majority of the data trust may be evaluated done light of the data distinguished Also assembled starting with various vehicles; center trust is surveyed on two measurements, i. E., useful trust and suggestive trust, which show how liable a center cam wood fulfill its convenience what’s more entryway trustworthy those proposals starting with a center to separate hubs will be, independently. The sufficiency Also proficiency of the suggested symbolization plot may be sanction through expansive analyses. Those recommended trust organization subject may be pertinent with a broad assortment about VANET requisitions should upgrade movement wellbeing, versatility, and characteristic protection with moved forward unwavering quality.
An Efficient Search Scheme Over Encrypted
Data on Cloud
Authors – Siri Y S, Mandakini, Nikitha S, Prof. Shilpa Shree S.
Abstract- -Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the cloud trustingly. One way of enhancing privacy from data owner point of view is to encrypt the files before outsourcing them onto the cloud and decrypt the files after downloading them. However, data encryption is a heavy overhead for the mobile devices, and data retrieval process incurs a complicated communication between the data user and cloud. Normally with limited bandwidth capacity and limited battery life, these issues introduce heavy overhead to computing and communication as well as a higher power consumption for mobile device users, which makes the encrypted search over mobile cloud very challenging. In this paper, we propose traffic and energy saving encrypted search (TEES), a bandwidth and energy efficient encrypted search architecture over mobile cloud. The proposed architecture offloads the computation from mobile devices to the cloud, and we further optimize the communication between the mobile clients and the cloud. It is demonstrated that the data privacy does not degrade when the performance enhancement methods are applied. Our experiments show that TEES reduces the computation time by 23 to 46 percent and save the energy consumption by 35 to 55 percent per file retrieval; meanwhile the network traffics during the file retrievals are also significantly reduced.
Study and Characterization of Air Flows During Intermittent Drying
Authors – Allarassem Amine, Edoun Marcel, Kuitche Alexis, Tetang Fokone Abraham, Chesneau Xavier, Zeghmati Belkacem
Abstract- – This work presents the study and characterization of the airflows during the intermittent drying of a local variety of mango from the Adamawa Region. The experimental study was carried out in a modular electric forced convection dryer. Three air drying temperatures, an air velocity (1.37 m/s) and two initial masses of mango samples were the conditions selected of drying process. The duration of the drying cycle was set at 120 minutes and the intermittency α was taken as the ratio between the drying time at the drying air temperature and the total duration of a cycle. Analysis of the curves showed that during vacuum drying, for an operating time of the dryer of 210 minutes, the air relative humidity inside the drying chamber was 48.9; 40.6 and 19.7% respectively for α = ¼, ½ and ¾, at the respective temperatures of 40; 50 and 60°C. During the load tests, the airflow rate in the drying chamber was turbulent. Drying with α = ¾ allowed to have better drying performance for an initial mass of 500g, against a mass of 800g causes a rapid rise in the air drying relative humidity inside the drying chamber which prolongs the drying time comparatively.
Design and Analysis of Cryogenic Pressure Vessel Using Tori-Spherical Dish
Authors – M. Tech. Scholar Jagtap Aradhya Ashok, Prof. Dr. Rachayya. R. Arakerimath (HOD.)
Abstract- – In this paper we have designed a pressure vessel as per ASME section VIII and division I, of capacity 1 kl to store cryogenic liquid like nitrogen, oxygen and argon etc. The literature has indicated a growing interest in the field of stress concentration in the pressure vessels. These stresses are studied by using FEM and compared with theoretical value. In this paper we considered uniform thickness to the entire vessel which is having trori spherical dish end. Modeling of the particular vessel is carried out using solid works, meshing is carried out using hyper mesh 6.1 for different cases. Working pressure and operating pressure and maximum operating pressure, The analysis is carried out using ANSYS software. Finally, all the results are checked for the accuracy and operating conditions. This type of structure vessels are built up by enclosing a series of sheets over a main or core tube.
An Efficient Search Scheme Over Encrypted
Data on Cloud
Authors – Siri Y S, Mandakini, Nikitha S, Prof. Shilpa Shree S.
Abstract- – Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the cloud trustingly. One way of enhancing privacy from data owner point of view is to encrypt the files before outsourcing them onto the cloud and decrypt the files after downloading them. However, data encryption is a heavy overhead for the mobile devices, and data retrieval process incurs a complicated communication between the data user and cloud. Normally with limited bandwidth capacity and limited battery life, these issues introduce heavy overhead to computing and communication as well as a higher power consumption for mobile device users, which makes the encrypted search over mobile cloud very challenging. In this paper, we propose traffic and energy saving encrypted search (TEES), a bandwidth and energy efficient encrypted search architecture over mobile cloud. The proposed architecture offloads the computation from mobile devices to the cloud, and we further optimize the communication between the mobile clients and the cloud. It is demonstrated that the data privacy does not degrade when the performance enhancement methods are applied. Our experiments show that TEES reduces the computation time by 23 to 46 percent and save the energy consumption by 35 to 55 percent per file retrieval; meanwhile the network traffics during the file retrievals are also significantly reduced.
A Review on Digital Image Copy –Move Detection
Authors – M.Tech.Scholar Shailja Mansingh Choudhary, Abhishek Agwekar (HOD)
Abstract- – Digital images are used everywhere and it is easy to manipulate and edit because of availability of various image processing and editing software. In a copy-move image forgery, a part of an image is copied and then pasted on a different location within the same image. A copy-move image forgery is done either for hiding some image object, or adding more details resulting in at least some part being cloned. In both the case, image reliability is lost. In this paper an improved algorithm based on Discrete Wavelet Transform (DWT) is used to detect such cloning forgery. In this technique at first DWT (Discrete Wavelet Transform) is applied to the input image for a reduced dimensional representation. Then the compressed image is divided into overlapping blocks. After that Lexicographic sorting is performed, and duplicated blocks are identified. Due to DWT usage, detection is first carried out on lowest level image representation. This approach increases accuracy of detection process and reduces the time needed for the detection process.
Blood Bank Management System
Authors – Ammar Ahsan, Avi Srivastwa, Vibhav Pandey, Associate Prof. Dr. A. Suresh Kumar
Abstract- – Blood Donation Management System could be a management system web site that allows people United Nations agency wish to present blood to assist the necessitous. It conjointly permits hospitals to record and store the info for those who wish to speak with them, and it conjointly provides a centralized bank info. demand of blood for the National introduction Service or Emergency Services has augmented in last 3 years. therefore it’s essential to extend the amount of blood donors and maintain potency with updated economical services. this method is developed by victimization hypertext markup language, PHP, and MySQL as a info system to manage and store the info. The system targets 3 styles of user: the general public United Nations agency desires to present blood, the recipients United Nations agency want the given blood, and also the hospitals United Nations agency that employment as Associate in Nursing intermediator to manage the communication between the donors and recipients. the most objectives for developing the web site is to teach the community on the advantages of blood donation, develop a Web-Based bank System to manage the records of donors and recipients, and encourage voluntary blood donation, simply accessing any info concerning people and also the distribution of the blood in numerous hospitals and storing blood each regionally and nationwide in Asian nation, supported needs|the wants} and requirements.
Design and Optimization of a Scissor Car Jack for Improvement in Operation
Authors -Mr. Onkar Vade, Prof. Dr. Mr. Premendra Bansod
Abstract- – Scissor Car Jack available in the vehicle, are the basic needed equipment in the replacement of tire and relevant works. Jacks are defined as manually operated, hydraulic, pneumatic or motorized automated load lifting device. These available jacks are rarely used in the absence of mechanic or vehicle punctured in remote location, where nearby garages not available or in case of in-house maintenance. As it is completely mechanical and manually operated jack, it has some disadvantages too. Hence to reduce this defect some modifications are done and that are explained in this Paper. The Aim of this modification is, to achieve better results in terms of parameters like functionality, weight and optimistic Model. In this project with the help of some research papers and realistic experiences problems were defined and their resolving methodology is plotted.
Use of a Series Active Filter Applied to a Wind Turbine
Authors – Dianguina Diarisso, Ousmane Sow , Mamadou Sall, Cheikh Fall, Mamadou Wade
Abstract- – The use of fixed speed wind turbines in an electrical network leads to problems of power fluctuations during variations in wind speed through torque. The disturbances affect the quality of energy. The principle of the system proposed in this article concerns the association of a wind turbine and an active filter FAS series supplied by a DC bus. The objective is to filter the variations of the voltage of the network thus protecting the nonlinear loads sensitive to the disturbances generated by the asynchronous generator. The FAS control strategy is based on linear control which uses the PWM technique for the synthesis of the regulators of the different loops. The system was simulated with Matlab/ Simulink software. The simulation results are presented and commented on.
Air Quality Predictive Analysis Using Machine Learning
Authors – Naveen Kumar, Prathap, Aditya Madeva, Manoj Naik, Asst. Prof. Shilpashree
Abstract- – Examining and protecting the air quality has become one of the most essential activities for the government in many industrial and urban areas today. With the rapid development of various industries and motorized transportation, large amount so harmful substances such as sulfur dioxides, nitrogen oxides, carbon on oxides, and hydrocarbons are released into the atmosphere, lasting a long time and in concentration sex ceding tolerable environmental limits. As are sultof this,people’s respiratory and cardio vascular system will get affected. There fore,we need to develop the models that will record the information about the concentrations of air pollutants (SO2,NO2,COetc). In this paper,we are using two machine learning algorithms (Linear Regression and Decision Tree) are used to predict the concentration of air pollutants in the environment. The results are promising and implementation of these algorithms could be very efficient in predicting air pollutants.
Jackfruit Yield Estimation Using Image Processing Techniques
Authors – A.Sivaranjani, S.Senthilrani, P. Sri Gayathri Paaraa, V. Manikandan, S. Umamaheswari
Abstract- – The yield estimation of jackfruit is an important aspect for planning many tasks such as storing, packaging and exporting. To measure the quantity and predicting the yield of jackfruit manually is quite difficult and time consuming, so, in this paper we are going to predict the yield and count the number of jackfruit present in the image that have been taken from the orchard. This work involves the steps of image processing techniques. Image acquisition is finally made from the image produced and then pre-processing takes place by gray scale conversion and median filtering which is used to reduce noise of image. Then segmentation takes place using SLIC approach where super pixels were present. Classification for this work is done considering the features like color and shape of the fruit along with layered construction which results in producing the count and yield prediction of jackfruit.
Artificial Neural Network Based Social BOT Detection
Authors – M.Tech. Scholar Kritya Gorowara, Asst. Prof. Jayshree Boaddh , Asst. Prof. Jashwant Samar
Abstract- – Digital platform dependency of today era attract promoters to brand product services. So unwanted posting was done by some programs known as bot. Number of researchers have proposed different techniques to identify these bots which was post by bot programs. This paper has developed a model to identify bots from real user. User action were analyze as features for classification of bots and real user. Whole process adopt graph based clustering and teacher learning based optimization genetic algorithm. Graph based clustering classify user into two class and genetic algorithm find the class representative action sequence in form of features. Experiment was done on real twitter dataset and result shows that proposed model has increase the detection accuracy of work.
Comparing and Analyzing OpenCV with Matlab in Image Segmentation
Authors -Shubham Das, Chitra Singh, Nishant Gautam, Anu Tomar, Amar Pal Yadav
Abstract- – Image Segmentation is a field of study that helps to develop techniques to identify images and displays. It has various features like image recognition and object detection etc. Image detection is used for vehicle detection, web images, and safety systems. Its algorithms are Region-based Convolutional Neural Networks (RCNN), Faster-RCNN and Matlab that have shown state-of-the-art performance. But by introducing OpenCV in Machine Learning it has help to make work Easier. There are many scientific computing environments used to code such algorithms. Matlab is one of the most tremendously successful and widespread scientific computing environments that is rich of toolboxes, libraries, and data visualization tools. OpenCV is a (C++)-based library written primarily for Computer Vision and its related areas. This paper presents a comparative study using 20 different real datasets to compare the speed of Matlab and OpenCV for some Machine Learning algorithms. Although Matlab is more convenient in developing and data presentation, OpenCV is much faster in execution.
Hand Gestured Music Generator: A Survey
Authors – Khyati Chauhan, Advait Zambre, Tejas Karad, Arindham Saha, Prof. N. B. Chopade
Abstract- -In a world full of technological miracles, art is something that goes under the radar. Combining automation with music will lead to great advancements in both technology and the art sector. There are many who wish to learn musical instruments but are unable to do so due to the time and effort it requires. But with this device, they would be able to learn any musical instrument without possessing musical knowledge. This can be achieved by integrating an Arduino and X-motion sensor by Parallax. Then integrate MAX and Ableton software to convert the digital signal into a MIDI signal and to generate music notes based on that MIDI signal.
Anti Money Laundering
Authors – Naveen Kumar R.
Abstract- – Anti-MoneyLaundering (AML) includes arrangements, laws, and guidelines to forestall monetary wrongdoings. AML is an overall term to forestall tax evasion. Worldwide and nearby controllers are set up around the world to forestall monetary wrongdoings, and these controllers make AML approaches. Organizations need to agree with these AML guidelines, yet consistence can be a perplexing cycle for organizations. For this, organizations have AML consistence offices that guarantee AML consistence Anti Money Laundering (AML) tries to discourage lawbreakers by making it harder for them to shroud not well gotten money.Criminals use tax evasion to cover their wrongdoings and the cash got from them.AML guidelines require monetary establishments to screen clients’ exchanges and report on dubious monetary actiivity.
Emotion Based Music Player Using Support Vector Machine (SVM)
Authors – Sai Venkatesh Aravapalli
Abstract- – Music can have a tremendous impact on a person’s psychological behavior. The average Indian enjoys music for four hours a day. People love to listen to music to suit their mood and interest. This project helps us to play and listen to music by capturing facial expressions while reflecting on our mood. Facial expression is an unprepared meeting of communication. Computer vision helps the computer to transmit digital images or videos. In this system, computer vision components play an important role in determining the user’s emotions by reading their facial expressions. When the user’s emotion is detected, the system opens the playlist for the recorded expression. This saves the user a lot of time by selecting playlist songs and reducing the time taken to play. It monitors user details such as how often a song is played, plays songs based on their interests, and resets the playlist at all times. It tells the user that he is not using the song and suggests to edit or delete it.
Seaglider Strength Stability Due to Sea
Head Wave Using SeaFEM
Authors – Asyraf Syazwan Ahmad Tajuddin, Shaharudin Ahmad
Abstract- – A Seaglider can be described as an autonomous underwater glider (AUV) vehicle that has a pressure hull that is enclosed by a fairing made from fiberglass in which the wings, rudders and trailing antenna are combined to. Seagliders are commissioned to independently gather information on the encompassing water segment, which includes salinity levels, oxygen content and temperature. Then, the data gathered are delivered back to the satellite via antenna mast while it resurfaces at sea level which renders the Seaglider exposed to the head sea wave. The strength stability of Seaglider due to sea head wave is yet to be determined which is vital to ensure that the Seaglider is able to deliver its data safely without any malfunctions. The objectives of this thesis are to conduct the strength stability of Seaglider to head sea wave and to compare strength results with previous researcher. The method approach that is used for this thesis is by utilizing SeaFEM Compasis software in order to determine structural strength of Seaglider and also simulate sea waves acting upon the hull of Seaglider. Stress and displacement experienced by the Seaglider during structural analysis are to be compared with the dynamic pressure from the seakeeping analysis. This is to ensure that the Seaglider is able to withstand the pressures generated by sea head waves acting upon its hull. Based on the findings from structural and seakeeping analyses that has been carried out, the Seaglider has the required structural stability in order to withstand the pressure generated by the sea head waves while it is operating at sea. This is determined by comparing results from the structural analysis with the seakeeping analysis. The von misses stress and displacement experienced by the Seaglider at sea level was calculated and compared with the calculated dynamic pressure produced by sea head waves. The value of von mises stress was lower than the dynamic pressure generated by sea head waves which rendered the Seaglider an adequate strength stability due to sea head waves. Besides that, the values of von mises stress, displacement and dynamic pressure of sea head waves were compared with other researches and the values were in line with each other and still within the acceptable margin.
Design and Development of Pedal Operated Hacksaw Machine
Authors – Prof S.K. Aher, Vivek Vedaga, Aman Varma, Tate Vishal, Oham Pradhan
Abstract- – The pedal powered hacksaw has a very simple mechanism operated with pedal by pedaling the wheel rotary motion is converted into to and fro motion of the cutting tool. The aim of this paper is to cut materials like wood, plastic etc., with less effort and quickly. That is by connecting a hacksaw to the pedal of a cycle and pedaling the pedals the forces are transmitted and get the work done. The size and shape of the pedal power hacksaw setup is similar to the cycle. It is like a cycle added with a bed for the cutting tool. It can be used in the place where electricity is not available. As it required very low pedaling power it is operated at very low power. In this pedal powered hacksaw connected directly to the pedal .While pedaling directly rotary motion of the pedal is converted into to and fro motion of the cutting tool. The end of the cutting tool is placed on the workpiece. By the to and fro motion of the cutting tool action is done on the work piece .In this way by applying force on the pedal of the cycle the cutting tool undergoes to and fro motion and we get the required work done.
Road Ways Hot Spot Design Optimization with Calibration of Geographical Side
Authors – Monika Dawar, HOD Vinay Deulkar
Abstract- – In this a literature review is given of the methods and techniques that are used to analyse black spots and black zones. Although, no universally accepted definition of a black spot or black zone is given, these locations will in general be described as high risk accident locations. In this context, several statistical models are described in literature to model the accident frequency and accident severity.
Review Article of PV Connected Design of Micro Gird/Smart Grid with Power Compensation
Authors – Research Scholar Nitendra Thakur, Associate Prof. Dr. Dolly Thankanchan
Abstract- – In this work, a Microgrid (MG) test model based on the 14-busbar IEEE distribution system is proposed. This model can constitute an important research tool for the analysis of electrical grids in its transition to Smart Grids (SG). The benchmark is used as a base case for power flow analysis and quality variables related with SG and holds distributed resources. The proposed MG consists of DC and AC buses with different types of loads and distributed generation at two voltage levels. A complete model of this MG has been simulated using the MATLAB/Simulink environmental simulation platform. The proposed electrical system will provide a base case for other studies such as: reactive power compensation, stability and inertia analysis, reliability, demand response studies, hierarchical control, fault tolerant control, optimization and energy storage strategies.
Performance Analysis of C.I. Engine Using Different Shapes of Combustion Chamber
Authors – Sourabh Dongare, Pankaj Tompe, Amol Deshmukh, Rushikant Sanap, Dr. Rachhaya Arakerimath (HOD)
Abstract- – Nowadays, the number of vehicles are increasing due to the increasing population of the population. So, it needs to fulfill the fuel requirement for the country. A large number of vehicles use fossil- fuels which ultimately pollute the environment. To find a better solution to overcome this problem, research is going on all over the world to use renewable resources of energy more efficiently along with modifying the available resources which would be more efficient than previous, especially in the manufacturing & automobile sector. So in this paper, we analyze the combustion characteristics of a direct injection compression ignition (DICI) engine. Here we are going to use different piston geometries to compare the turbulent flow energy and eddy viscosity. So accordingly, a set of simulations were performed to examine the effect of the three different shapes of a piston crown on the performance behavior for comparison. These geometries are hemispherical surface, Toroidal surface, and shallow depth surface so that the engine combustion characteristics can be examined and the exhaust emissions can be reduced. Therefore, we can find through simulation that Shallow depth geometry has the highest turbulent kinetic energy (TKE) as we find in our result. We compared the velocity of the fuel and Eddy viscosity through different geometries. In these, we observed that the velocity in shallow depth surface is more as compared to other two shapes and the Eddy viscosity propagates more in case of shallow depth surface which will produce more turbulence inside the combustion chamber so that the air and fuel are mixed more thoroughly which will help in increased efficiency and reduce exhaust emissions.
Secure Application for Managing Records
Authors -Rahul Maurya, Ankit Singh, Abhishek Yadav
Abstract- – Patients face a lot of problems in keeping the physical medical records both safe and secure. In case of emergency, they are to be readily accessed but due to the nature of them so far, this has not been possible. Physical records are both difficult to carry and hard to maintain. It is also a time-consuming process, and most of the time requires manual intervention. On top of this, during the migration of a patient from one hospital to another, the records need to be both verified for authenticity, and be tampered with proof if they’re digitized. Due to the lack of HIPAA compliance in India, the information collected by the hospitals is prone to lose and may not be readily available when in need. We here propose a system that uses various cryptography techniques to address this issue and solve it using modern rather than conventional means. In specific, public-private cryptography is used in combination with digital signatures to create a system that does not rely on live-network, is tamper-proof, and can be quickly analyzed.
Review Paper of Assessment of Municipal Waste: An initiative to sustain our Biodiversity
Authors -Chalsi Gautam, Mansi Singh, Asst. Prof. Tej Pratap Singh
Abstract- – Municipal solid waste (MSW) management is one of the most serious concerns in India. In most of the Indian cities management of MSW is very poor and unscientific. This study illustrates the present scenario of MSW management in Agra city (India). It was observed that MSW management in Agra in improper and unsustainable. Population of city is more than 15 lakh and per capita waste generation is approximately 490 gm per capita per day. Door to door waste collection is being done by Agra municipal corporation. All collected waste is being dump on an open ground without segregation. There are many inadequacies in the current practices followed for the management of solid waste. Study recommends the use of modern technology, skilled manpower, design of sanitary landfill for proper management of MSW.
Valuable Products from Ananas Comosus Waste
Authors – M Kalyani, Ravi Teja Polamuri, Tharunesh Ponukanti
Abstract- – In recent times waste from fruits and vegetable processing industry is produced in large quantities around the world and it contains high levels of lignocellulose, fibre, sugar, bioactive and functional compounds and their utilization has become one of the important and challengeable aspects. Many researches have validated that the utilization of waste by discarded fruits as well as its waste materials could be utilized for further as novel, low-cost, economical and natural sources of enzymes, antioxidants, pectin, organic acids, food additives, essential oils, etc. through different methods of extractions, purifications and fermentations etc. Focusing on the Ananas comosus (Pineapple) fruit, scientific and technological studies have already highlighted and confirmed the potential of better and more profitable markets for Ananas comosus Waste. Researchers have focused on the utilization of Ananas Comosus waste primarily for extraction of bromelain enzyme and secondarily as low- cost raw material for the production of ethanol, phenolic anti-oxidants, organic acids, biogas and fibre production. This work is intended to present a comprehensive review of on-going research on utilization of Ananas Comosus Waste.
Experimental Investigation of Properties of
Structural Lightweight Aggregate Concrete
Authors – M. Tech. Scholar Raghvendra Kumar Prajapati, Asst. Prof. Sourabh Dashore
Abstract- – – Concrete is a family of different material like binding material (cement+ fly ash), fine aggregate, coarse aggregate and water. Today construction cost is very high with using conventional materials due to unavailability of natural materials. This problem can be solved by total replacement of concrete with different material which is not convenient in terms of required properties. Due to this limitation of unavailability of material which plays the vital role of concrete we have only choice of partial replacement of concrete ingredients by waste materials. Over 3.3 billion tons of cement was consumed globally in 2010 based on survey of world coal association and also cement production emits CO2 in to the atmosphere which is harmful to the nature. If we can partially replace the cement with the material with desirable properties then we can save natural material and reduce emission of CO2 in to the atmosphere. This industrial waste dumping to the nearest site which spoils the land and atmosphere as well as it also affects aesthetics of urban environment so use of this waste material in concrete is cost effective as well as environment friendly way to disposal of waste. The numerical demonstrating based conjecture, thusly, is performed with the dynamic help of the advancement strategy which can do successfully assessing the compressive strength, the split elasticity, and the flexural strength with the guide of the perceived information esteems. The nature of the paper is the strength of pumice lightweight cement. With fractional supplanting of the sand with the quarry dust, the time and cost are limited minimized.
Electoblock: A Secure Digital Voting System Based on Blockchain Technology
Authors – Rajat Tambare, Prajakta Dixit, Raghavendra Singh Gehlot
Abstract- – Voting is the fundamental right for every nation. An Electronic Voting (E-Voting) system is a voting system in which the election process is notated, saved, stored, and processed digitally, which makes the voting management task better than the traditional paper-based method. Blockchain is offering new opportunities to develop new types of digital services. While research on the topic is still emerging, It has mostly focused on the technical and legal issues instead of taking advantage of this novel concept and creating advanced digital services. Blockchain-enabled e-voting (BEV) could reduce voter fraud and increase voter access. Eligible voters cast a ballot anonymously using a computer or smart phone. BEV uses an encrypted key and tamper-proof personal IDs. Electronic credibility services have become an integral part of the information space. With the reliable implementation of basic services as an electronic signature and electronic authentication, it is possible to build more complex systems that rely on them, particularly the electronic voting system. This paper presents the concept of developing an electronic voting system using blockchain technology. The two-level architecture provides a secure voting process without redundancy of existing (not based on blockchain) systems. The blockchain-based voting system has two modules to make the whole process integrated and work along. One will be the Election Commission who will be responsible for creating elections, adding registered parties and candidates contesting for the election added under the smart contracts. The other end will be the voter’s module where each individual can cast a vote for their respective Assembly Constituency and the vote will be registered on the blockchain to make it tamper proof.
A Review Breast Cancer Classification using Transfer Learning
Authors – Anshul Jaswal, Kumari Archana
Abstract- – Breast cancer is a significant factor in female mortality. An early cancer diagnosis leads to a reduction in the breast cancer death rate. With the help of a computer-aided diagnosis
system, the efficiency increased, and the cost was reduced for the cancer diagnosis. Traditional breast cancer classification techniques are based on handcrafted features techniques, and their performance relies upon the chosen features. They also are very sensitive to different sizes and complex shapes. However, histopathological breast cancer images are very complex in shape.Currently, deep learning models have become an alternative solution for diagnosis, and have overcame the drawbacks of classical classification techniques. Although it still has some challenges, mainly challenge is the lack of training data. To address this challenge and optimize the performance, a new developed technique is transfer learning which is where the deep learning model strains on a task, and then fine-tunes the models for another task.
Removal of Gaussian and Impulse Noise using Median Filter: A Review
Authors – M.Tech. Scholar Anamika Shukla, Prof. Pankaj Sharma
Abstract- – Impulse noise often corrupts the images in the procedures of image acquisition and transmission. Denoising of image corrupted by impulse noise is a prominent research area in Image Processing. To carry out noise suppression many denoising schemes introduced which uses standard median filter or its modifications. However, these approaches might blur the image since both noisy and noise-free pixels are modified. An studied denoising scheme called threshold filter and its VLSI architecture introduced to avoid the damage on noise-free pixels and also for the removal of high density impulse noise. Decision Tree Based Denoising method is performed as two phase process—a detection phase and a filtering phase. Noisy pixels will be detected by decision-tree-based impulse noise detector followed by a direction oriented edge-preserving median filter. Based on the probability distribution function of noise and SNR information obtained from the image, the filter uses selection of filtering window of size 3X3 to perform de-noising. The filtering technique has been implemented on MRI images. The efficiency of the proposed filtering technique is verified with a study of the PSNR characteristic of the de-noised and noisy image with respect to the true image. The proposed de-noising technique shows an improvement in the contrast ratio and PSNR of the noisy image.
Performance Analysis of Wind Farm PID Controller Based STATCOM Device
Authors – M. Tech. Scholar Shubham Saxena, Asst. Prof. Dheeraj Gupta
Abstract- – In this paper interconnection of wind generating source in the electrical network affects the power quality and reliability. The influence of the wind turbine in the grid system concerning the power quality measurements are the active power, reactive power, variation of voltage, flicker, harmonics, and electrical behavior of switching operation and these are measured according to national international guidelines. The paper study demonstrates the power quality problem due to installation of wind turbine with the grid. The proposed control scheme to mitigate the power quality issues for power quality improvement in the grid connected wind energy generation is simulated using MATLAB/ SIMULINK in power system block set.
Maternal Nutrition and Other Factors Associated With Low Birth Weight (LBW) Among Indian Neonates
Authors – Emi Grace Mary Gowshika.R
Abstract- – Low Birth Weight (LBW) in neonates is one of the most compromised pregnancy outcomes in India. This was found to have an everlasting effect on the baby even during adulthood. Maternal nutrition and other associated risk factors were the major predisposing reasons for LBW or Small for Gestational Age (SGA) among neonates. This descriptive review was carried out to collect literature pertaining to the relationship between maternal nutritional status, maternal nutrient deficiencies, maternal anthropometric indices and other maternal risk factors on LBW in their babies, which included previously, executed studies between 2016 to 2020 in India. This study was found to be essential in identifying the potential risk factors and to prevent them with a view to reduce LBW in our country. The selected 12 articles were found to highlight maternal nutrition and other risk factors like: maternal age at pregnancy, maternal weight gain and prenatal weight, maternal height, socio-economic status, maternal knowledge and education on pregnancy outcomes, nutritional deficiencies in mothers and abstaining from antenatal clinical visits (ANC) to be directly linked to them delivering LBW neonates in India. The potential risk factors identified will further enable to plan effective interventions like awareness among reproductive age girls and women and also providing prenatal, antenatal and postnatal care for mothers and babies will aid in reducing LBW in neonates and help in facilitating healthier fetal growth and development in Indian population.
A Review Study of Piston Thermal Analysis Using Finite Element Method
Authors – Azeem Khan, Asst. Prof. Amit Sharma
Abstract- – The preceding literature research detailed the internal combustion engines components, such as the piston. The piston transfers mechanical energy into the burned gas. The piston moves down the cylindrical line or sleeve. The design of a piston gasoline engine is the subject of current study. Engineers may use computer-assisted engineering equipment to update and design residual stress, structural response, thermal impacts, pre-treatment, and fatigue processing on the vehicle problem. By examining the analytical implications, we may determine if our planned piston is safe or no longer loaded. In the area of thermal assessment, many authors studied thermal flow and thermal temperature distribution. Wind energy generation is simulated using MATLAB/ SIMULINK in power system block set.
Different Layers of Computing that’s Protect from Cyber Attack Data Using Machine Learning Algorithms
Authors – Ms. Snehal Devidas Wahane, Associate Prof. Dr. R. R. Keole (HOD)
Abstract- – Attack and Anomaly detection in Internet of Things (IoT) Instruction is raising concern in the domain of Internet of Things (IoT), The now days daily network traffic in a smart city via loT systems is increasing new cyber security challenges to connection IoT devices are being connected to the sensors or actuator that are directly connected to massive cloud servers. This paper gives a detail analysis of various applications based on Internet of Thing (IoTs). This explains about how internet of things evolved from mobile computing and ubiquitous computing. It emphasizes the fact that objects are connected over the internet rather than people. The properties of Internet of Things (IOT) are information, electronic tag, standard expressed and uploading information on to the could server. IOT applications are used in domains such as healthcare, supply chain management, defence and agriculture. Various research areas are there to make the cities, villages, and campuses IoT enabled and smart to provide a quality culture to address the loT cyber security threats, An Anomaly Detection loT (AD-IoT) system is used, which is intelligent anomaly detection based on machine learning algorithm.
Ban 100 % Atom Bomb, Hydrogen Bomb and Bio War and to Maintain the Peace in the World and Construction of Buildings, Houses Inside the Sea before 2749 Due to Environmental Pollution
Authors – Dr. P. Deivanayagam P.hD
Abstract- – In 21st century we are facing more problems in the modern world. There are two problems more number of atom bombs, hydrogen bombs in the world and environmental pollution By using Einstein formula the atom bomb was first discovered in 1945. Based on nuclear fission theory the process of heavier nuclei is bombarded with neutrons and two lighter nuclei is formed. This is known as nuclear fission. This is the principle of atom bomb. Based on nuclear fusion theory, the process of two simpler nuclei joined together heavier nuclei is formed. This is the principle of hydrogen bomb. Nowadays the world is terribly affected by corona virus this is the form of bio war. Virus, bacteria when it spread to the world this is another form of bio war, in future any spark in the arousal of atom bomb, hydrogen bomb and bio war the total world is terribly affected and arousal of third world war either it happens, 2050 or 3000 or 4000 etc. Our earth has only life in our solar system1 Based on 19th 20th century human being development is much enlarged we are living in a model life. Each and every country producing more number of atom bomb and hydrogen bomb in a largest manner. Millions of temperature and pressure released due to atom bomb and hydrogen bomb explosion This article mainly focuses to ban atom bomb, hydrogen bomb and bio war in the world and due to More number of environmental pollution we want to construction of buildings, houses inside the sea before 2749.
Review On Brain Tumor Classification By Machine Learning
Authors – M.Tech. Research Scholar Mayank Trivedi, Asst. Prof. Jyoti Agarwal (HOD)
Abstract- – The successful early diagnosis of brain tumors plays a major role in improving the treatment outcomes and thus improving patient survival. Manually evaluating the numerous magnetic resonance imaging (MRI) images produced routinely in the clinic is a difficult process. Thus, there is a crucial need for computer-aided methods with better accuracy for early tumor diagnosis. Computer-aided brain tumor diagnosis from MRI images consists of tumor detection, segmentation, and classification processes. Over the past few years, many studies have focused on traditional or classical machine learning techniques for brain tumor diagnosis. Recently, interest has developed in using deep learning techniques for diagnosing brain tumors with better accuracy and robustness. These detection and segmentation approaches are reviewed with an importance placed on enlightening the advantages and drawbacks of these methods for brain tumor detection and segmentation. The use of MRI image detection and segmentation in different procedures are also described. Here a brief review of different segmentation for detection of brain tumor from MRI of brain has been discussed.
Structural analysis of RCC building with shear wall design with load combinations using STAAD-Pro
Authors -M.Tech. Research Scholar Ahmed Raza Khan, Prof. Anuj Verma
Abstract- – Shear walls are structural walls designed to resist lateral stresses produced in the wall plane by wind, earthquakes, and flexural components in buildings. The wind behaviour of buildings with corded walls is examined and compared in this article using the STAA D pro and three types of load conditions, namely dead load, live load, and wind load. The purpose of this paper was to look at and analyse several research initiatives aimed at improving lateral load and shear wall behaviour. Given that shear walls can withstand large sections of the lower portion of the structure and the framework can withstand lateral loads in the higher parts of the structure, buildings that are similar in nature built in India. In India, base levels are used for car parks and garages, and officers, and top floors are used for residential use.
Differential Equations
Authors – Asst. Prof. Niranjan Panda
Abstract- – In this study, I discuss different types of differential equations i.e. ordinary differential equations, partial differential equations with order and degree. Also defined linear differential equation and Bernoulli’s equation.
A Review Based on Energy and Energy and exergy Analysis Refrigeration System
Authors – Research Scholar Farukh Khan, Asst. Prof. Prashant Kumar Sharma
Abstract- – In the field of HVAC engineering, electricity has been utilized to energize the air-conditioning and refrigeration systems since last decades. Normally one-third to half of the annual total electricity consumption is used forair-conditioning and refrigeration in the metropolis worldwide as reported. The most commercially developed solar cooling technology is the absorption systems. In an absorption cycle, a refrigerant and an absorbent are a pair of substances that work together. NH3-H20 andLiBr-H20 are the most common working pairs in refrigeration and air conditioning absorption refrigeration system. Although the NH3-H20 cycle is an older technology, it still remains essentially applied to large scale process plants, and LiBr-H20 absorption cycle concentrates most of the current research.
Lossy Image Compression using 2-D Wavelet Transform and Block Coding Technique
Authors – M.Tech. Scholar Amir Ahmad, Prof. Dr. Pankaj Sharma
Abstract- – In the field of HVAC engineering, electricity has been utilized to energize the air-conditioning and refrigeration systems since last decades. Normally one-third to half of the annual total electricity consumption is used forair-conditioning and refrigeration in the metropolis worldwide as reported. The most commercially developed solar cooling technology is the absorption systems. In an absorption cycle, a refrigerant and an absorbent are a pair of substances that work together. NH3-H20 andLiBr-H20 are the most common working pairs in refrigeration and air conditioning absorption refrigeration system. Although the NH3-H20 cycle is an older technology, it still remains essentially applied to large scale process plants, and LiBr-H20 absorption cycle concentrates most of the current research.
PV System Based on Fuzzy Controller and Bidirectional DC-DC Converter
Authors – M. Tech. Scholar Divya Prakash, Asst. Prof. Dheeraj Gupta
Abstract- – This Paper presents optimizes energy extraction in photovoltaic (PV) energy systems. The maximum power of the photovoltaic module will change due to changes in temperature, solar radiation and load. To maximize efficiency, the photovoltaic system uses a maximum power point tracker (MPPT) to continuously extract the most power that the solar panel can generate and then pass it on to the load. The overall structure of the MPPT system consists of a DC-DC converter (an electronic device that converts DC energy from one voltage level to another) and a controller. During changes in weather conditions, MPPT uses a tracking algorithm to find and maintain operation at the point of maximum power. Many different algorithms for MPPT have been proposed and discussed in the literature, but most of these methods have disadvantages in terms of efficiency, precision, and flexibility. Due to the non-linear behavior of the current voltage characteristics of the PV module and the non-linearity of the DC-DC converter due to switching, conventional controllers cannot provide an optimal response, especially when dealing with a wide range of shifting line parameters and transients. The purpose of this work is to design and implement a maximum power point tracker using fuzzy logic control algorithms. Fuzzy logic naturally provides an excellent controller for such nonlinear applications. This method also benefits from artificial intelligence methods that can overcome the complexity of modeling nonlinear systems. To make this work a success, Simulink designed and simulated an MPPT system consisting of photovoltaic modules, DC-DC converters, batteries, and fuzzy logic controllers. Perform the characterization of the buck, boost and buck-boost converter to find the most suitable topology for the PV system used. The integrated model of the PV module with the identified converter and battery was simulated in MATLAB to gain the necessary experience to formulate and adjust the fuzzy logic controller. The simulation results show that fuzzy logic.
A Review Of Edm Using Taguchi Method process Parameters On Mrr (Metal Removal Rate)
Authors – M.Tech. Scholar Mohit Kumar, Dr. Anil Kumar (Prof.)
Abstract- – Electrical discharge machining (EDM) is a non-traditional material removal process developed in late 1940s has now become the most important technology in manufacturing industries. Taguchi technique has been applied for design of experiments with three input factors and their trinity levels utilizing L9 orthogonal array. The nine specimens were machined with different electrodes material where AISI 304 stainless steel had been used as a workpiece with kerosene as dielectric fluid. The major aim of this study is the evaluation to choice the principle specifications of electrical discharge machining with the assist of Taguchi technique and utilizing Minitab program in condition of material removal rate and electrode wear rate. The variance conditions examined during production the research on electrical discharge machining would be the electrodes material, current and work piece thickness. The effect of each parameters and excellent performance variables will be achieve by means of ANOVA examination and conformed by investigation to enhance method.
A Implementation of Exergy Analysis for Industrial Applications Using Organic Rankine Cycle (ORC)
Authors -M. Tech. Scholar Archna Yadav, Prof. Dr. Anil Kumar, Er. Subhash Kumar
Abstract- – Solar energy is utilized in a combined ejector refrigeration system with an organic Rankine cycle (ORC) to produce a cooling effect and generate electrical power. This study aims at increasing the utilized share of the collected solar thermal energy by inserting an ORC into the system. As the ejector refrigeration cycle reaches its maximum coefficient of performance (COP), the ORC starts working and generating electrical power. This electricity is used to run the circulating pumps and the control system, which makes the system autonomous. For the ejector refrigeration system, R134a refrigerant is selected as the working fluid for its performance characteristics and environmentally friendly nature. The COP of 0.53 was obtained for the ejector refrigeration cycle. The combined cycle of the solar ejector refrigeration and ORC is modeled in EBSILON Professional. Different parameters like generator temperature and pressure, condenser temperature and pressure, and entrainment ratio are studied, and the effect of these parameters on the cycle COP is investigated. Exergy, economic, and exergoeconomic analyses of the hybrid system are carried out to identify the thermodynamic and cost inefficiencies present in various components of the system.
Parallelization of Local Sequence Alignment
Authors- Sai Venkatesh Aravapalli
Authors – Everybody would agree that serial computing is easy to implement and use, but simply not efficient enough for industry-level purposes. To solve this problem different types of approaches are being experimented on both hardware and software. One of the approaches among them is parallel computing. It is one of the successful approaches that enables the user to use the processor in such a way that no core remains idle. The allocation of the work depends on the processes. Due to this reason, day by day higher number of industries are providing and using cloud solutions which work on the basis on parallel and distributed computing. For instance, Amazon’s AWS or Google’s Google Cloud platform are becoming the center for development, may it be in the field of web development or in the field of data analytics. To cope up with the fast-paced improvement in technology, one must also become familiarized with this domain, and hence this work.
Performance Analysis of Mango Leaf Disease Using Machine Learning Technique
Authors – Research Scholar Purnima Batra, Asst. Prof. Sachin Jain
Abstract- – Plants have developed an imperative source of energy and an important problem in solving the problem of global warming. However, plant diseases threaten the livelihoods of this important source. Convolutional Neural Networks (CNN) has shown excellent performance (more than humans) in recognizing problems and image classification problems. This paper describes the possibility of classifying plant diseases with leaf images taken by CNN in the natural situation. The model is designed based on the Le-Net architecture for organization of soybean plant diseases, including healthy leaf images taken from the plant village database. Performance evaluations on several popular benchmark datasets prove that our method is better than the latest technology. This article proposes a method to improve the classification performance of classes with few training examples.
Morphometric Characterization of Chinnar River Basin-A Comparative Study Using Topographical Map and SRTM DEM
Authors -Research Scholar Veeranna B., Prof. Dr. H.C. Vajrappa
Abstract- – The study of drainage basin as an aerial unit is the fundamental concept of morphometric analysis. It is an open system defined by characteristics that can be measured quantitatively, thus providing an objective basis for analysis, comparison and classification. The present study is carried out to characterize and compare the morphometry of Chinnar River basin using geospatial techniques. The morphometric parameters were calculated and specialized through spatial analysis of GIS using Topographical Map and SRTM DEM. The Chinnar river basin is assigned to a 5th order basin having 405, 88,13,3 and 1 and Dem 452,88,16,3,1 number of streams in first, second, third, fourth, and fifth orders respectively. The Chinnar river basin having a drainage density of 1.057 km/km2and DEM 1.16 km/km2.The stream frequency of the basin is 1.06/ sqkm and DEM 1.17/sqkm. The length of overland flow of the basin is 0.47 km. The value of form factor is 0.40.The Rc of basin is 0.3541 which indicates that circular shape.
Litchi Toxicosis – A Review
Authors -Arpita Das, Sheli Paul
Abstract- – Litchi are subtropical evergreen fruits became famous in various part of the world for its aroma, flavor, taste as well as its high nutritive value. It contains various nutritional property but two main amino acid called MCPG and MCPA (known as neurotoxin) which are responsible for litchi toxicosis in malnourished children, reported first in 2011 in Bihar. Numerous studies have reported that litchi aril are rich in MCPA (12.4 to152.0 µg/g) and MCPG (44.9 to220 µg/g) and plays a major role in toxic outburst in form of hypoglycaemia and acute hypoglycaemic encephalopathy syndrome by interfering major alternative pathways of glucose production (B-oxidation, gluconeogenesis and ketogenesis) resulting hypoglycaemia along with accumulation aminoacidemia which leads to encephalopathy. As a result of that hypoglycaemic encephalopathy happened. An immediate treatment stared with dextrose infusion with 3% saline solution use to prevent edema of brain cells, 5% improves hypoglycaemia, 10% improves moderate to severe hypoglycaemia and 50% cures severe hypoglycaemia or glucose scarcity in blood .Therefore the main of this systematic review is to present an overview on causative agent, diagnostic measures and management of litchi toxicosis. Preventive measures comprise maintenance of poor health status and assurance of hepatic storage among malnourished children to avoid seasonal toxicosis.
An ANN Based Energy Efficient Clustering and Routing Algorithm for IOT Network Monitoring
Authors – Devanshi Vaidya, Er. Avni Sharma
Abstract- – Presently, Internet of Things (IoT) network enables new procedures of communication between persons and electronics things and between electronic things themselves. Each of the electronic things or devices in IoT networks communicates with the others and plays a defined role to improve the communication quality of services (QoS). To improve the communication quality in the IoT networks, routing protocol is an important step to generate a quality performance. It is a challenge to find the suitable characteristic of IoT network routing protocol which conforms to a certain network condition scenario. In the last ten years in IoT network, many researchers connected research to analyze the performance of routing protocol for the IoT network but still lots of problems are faces such as energy consumption, slow transmission, high drop rate and security concern. Basically, there three types of routing mechanism in the IoT network named as flat, hierarchical and geographical based routing. But most affective is hierarchical routing that includes the concept of the clustering-based routing mechanism. In this paper, an Artificial Neural Network (ANN) based energy efficient clustering and routing algorithm for IoT network monitoring purpose is designed where, K-means is used as a clustering approach that helps to select the cluster head based on the residual as well as coverage distribution concept. The designed clustering-based energy efficient routing (CEER) mechanism is work on the basis of five different communication scenario such as Node to Node (N2N), Node to Cluster Head (N2CH), Cluster Head to Cluster Head (CH2CH), Cluster Head to Node (CH2N) and Cluster Head to Base Station (CH2BS). After the simulation of the designed scenario, we compare with existing works to validate the proposed CEER mechanism and we achieve maximum throughput with higher rate of Packet Delivery Ratio (PDR) and energy consumption also reduced by the 28.87%.
Mathematical Computation Using
Triangulation For Both Palm Identification
Authors – B. Stefy, Dr.R.Kavitha Jaba Malar
Abstract- – Biometric is the science of identifying individuals by their unique biological characteristics. This technology has become a growing aspect of our daily life. Although biometrics has been used for decades, recent developments and usages have made the advancement more popular especially in the private sector. Authentication based on biometrics is being applied to control fake access to top-security resource. Recently, with the high raising of information system technologies, databases manipulation or business process systems have begun to use biometrics such as hand geometry, palm, iris, fingerprint etc. In the research, two palms are considered for implementation. The triangle based palm geometry based biometric system has proven to be the most acceptable trait for medium and low security application.
Energy Efficient Clustering Eliminating Duplicate Data (EECEDD)
Authors -Research Scholar V. Sneha, Dr. M. Nagarajan (Principal)
Abstract- – Wireless networks are used in a variety of fields of study, including medicine, agriculture, the military, geography, and so on. The primary concern of a network of wireless sensors is how to control energy consumption and extend the network’s life. This paper examines various challenges in WSN and has a brief discussion of how different literature results contribute to clustering and data aggregation. To reduce energy consumption and eliminate duplicate data during transmission, a new clustering algorithm called “Energy Efficient Clustering Eliminating Duplicate Data” has been proposed. The paper concludes with insights for researchers into energy efficiency and how the proposed algorithm works well in case of energy consumption, delay, and throughput and network lifetime.
Design, Modelling and FEM Analysis of Fly Ash Brick Making Machine
Authors – M.Tech. Scholar Ekale Sagmeshwar K., Prof. Dr. Anil R. Sahu
Abstract- – Production of Fly ash brick is another utilization of ash. The most important part of the ash Bricks plant is Pan Mixer, conveyor belt, and main fly ash brick molding machine. There are a unit number of strategies for molding of bricks, however here we have used bottom side hydraulic pressing methodology that is reduced repeated investment on fly ash brick machine. In fly ash, the brick machine has three sets of brick molds apart from 120o each other. In this process, one set of molds receive the fly ash mixture such as fly ash, sand or stone dust, cement, and water, then it’s compressed by downside Hydraulic press and at last nine bricks area unit created in one revolution of this machine This research also serves to determine the most vulnerable locations on the machine structure as a concern when the load capacity will be increased. The analysis was carried out using the finite element method by using the finite element software. The simulation results obtained are, this fly ash brick molding machine is safely operated for pressure loads of 100 bar (10MPa).
A Survey on Digital Image Forgery
Techniques and its Detection
Authors – Research Scholar Chavi Rana, Asst. Prof. Gyanendra Kumar Singh
Abstract- – The billions of digital images flooding the internet which are widely used and regards as the major information source in many fields in recent years with the high advance of technology, it may seem easy to fraud the image. In digital images, copy-move forgery is the most common image tampering, where some object(s) or region(s) duplicate in the digital image. The important research has attracted more attention in digital forensic is forgery detection and localization. Many techniques have been proposed and many papers have been published to detect image forgery. This paper introduced a review of research papers on copy-move image forgery published in reputed journals and focused on discussing various strategies related with fraud images to highlight on the latest tools used in the detection. This article will help the researchers to understand the current algorithms and techniques in this field and ultimately develop new and more efficient algorithms of detection copy-move image.
Search Engine for Healthcare Solutions
Authors -Gaurang Gupta, Shoumik Mukherjee, Ms. Indrakumari
Abstract- – Technology has infiltrated every aspect of life in today’s society, but it is heartbreaking to learn that millions of people die each year as a result of a lack of understanding about accessible medical treatments, rather than a lack of medical facilities. The right to good health is highly prized. India has the world’s most uneven healthcare system. On the one hand, our country is rapidly developing as a medical tourism destination, with people travelling from all over the world to receive high- quality medical care. Locals, on the other hand, appear to be unable to access the majority of these advantages. The people’s dire financial status is the reason behind this. Many government initiatives and non-governmental organizations (NGOs) assist such persons, yet public awareness remains a difficulty. A search system is one approach to make this search easier. A probe system is one of the methods for forming this search. A search system is a piece of software that searches the Internet for information. The project’s purpose is to develop a search system that can be used to conduct searches across a variety of medical fields, including disease- specific information, hospitals, and non- governmental organizations that provide therapy. The search system includes components such as a web crawler, an indexer, and a ranker. The amount of content available on the internet is constantly increasing, and search engines are used to locate it. Additionally, it is becoming a focal subject for academic inquiry. Any processing of web pages requires the use of computer programme. Web crawlers are used by various web search engines and specialized search tools to collect massive collections of pages for indexing and analysis.
Combustion Analysis of Pulsejet Engine Using CFD
Authors – M.Tech. Scholar Ganesh Motekar, Prof. G.R. Kesheorey (Supervisor & HOD), Dr. A.J. Siddiqui (Executive Director)
Abstract- – The performance of pulsejet engine is significantly affected by efficiency of combustion taking place. The efficiency of combustion depends on type of fuel inlet configuration and number of fuel inlets. The current research investigates the combustion characteristics of single fuel inlet, double fuel inlet type and three fuel inlet type designs in vertical configuration. The combustion analysis is conducted using Computational Fluid Dynamics and with eddy dissipation combustion model. The CAD model is developed in Creo design software and CFD analysis is conducted using ANSYS CFX software. The static enthalpy, pressure and thrust generated are evaluated for all the three designs. The CFD analysis has shown that three fuel inlet design configurations resulted in significant increase in thrust generation as compared to two fuel inlet design.
A Review on Early Detection of Cancer Using Machine Learning Techniques
Authors – M. Tech. Scholar Mr. Kamal Singh Baghel, Asst. Prof. Avinash Pal
Abstract- – Finding cancer disease in a beginning phase prompts an early treatment which brings down the danger of dreariness and mortality. The conclusion of oral malignancy stays a test to dental calling especially in the location, assessment and the board of beginning stage oral disease. Because of absence of ideal analysis utilizing regular techniques, AI approach is utilized for recognizing and grouping oral malignancy at a previous stage. AI procedures are utilized to demonstrate the movement and therapy of harmful location and can foresee future results of disease type adequately. Blend of proficient AI and highlight determination calculations gives better outcomes in early finding and forecast of oral malignancy. The fundamental objective and commitment of this audit paper is to sum up the utilization of AI strategies for precise expectation of oral malignant growth at a prior stage.
Review on Congestion Control Methods for Network Optimization in MANET
Authors -M.Tech. Scholar Vinita kashid, Asst Prof. Dr. Mukesh Patidar, HOD. Mr. K. K. Sharma
Abstract- – Ad hoc network is a multi-hop temporary self-organized network consisting of many mobile nodes without any infrastructure. When the packets arriving at a node cannot be forwarded, they are dropped. Congestion occurs in a network if the number of packets being sent through the network is greater than the capacity of the network. The main objective of congestion control is to minimize the delay and buffer overflow caused by network congestion and hence enable the network to perform better. In this paper, we analyze the major factors affecting performance in ad hoc networks and discuss several typical improved congestion control approaches. Network performance of these different approaches is discussed. The limitations of different approaches are also mentioned and the proposed method for congestion control using network coding is discussed.
Application of a New Graphical Fitting Approach for Data Analysis in Electrochemical Impedance Spectroscopy
Authors – Assistant Professor Sukhdev Singh
Abstract- – This paper proposes a unique equivalent circuit model of Lithium Bismuth Borate Glass containing 10mol% Nickel and Vanadium ions using LEVM engine by CNLS fitting. A lithium bismuth borate glass framework is processed by the traditional melt quenching method. In this paper considerable effort was put into the development of equivalent circuit model using Impedance Spectroscopy. The result of research revealed that a very good fit circuit is achieved with Admittance parameters.
Review and Analysis of Different Biometrics Techniques
Authors Shweta Chouksey, Sunil Phulre
Abstract:- – In order to protect, monitor any organization, industry, country, etc. some of security protocols are applied. Many of them are human being detection, some are malicious programs. This paper has review techniques adopt by the researcher to get biometric information for human being identification or authorization. Classification of these techniques was done in the paper for the clear understanding of benefits and limitation of work. In this paper as per eye Iris detection a detail survey was performed. Different image features were also list in the work that may improve the technique accuracy of detection and reduces the false alarm.
Automation Impact in Claims Processing
Praveen Kumar Rawat
Abstract:- – Better care at a cheaper price is not the result of more options. Large and small businesses in the United States are increasingly offering lower-priced, more flexible high-deductible plans with more options for narrow networks and greater out-of-pocket payments. Workers who are older and sicker would be more likely to enrol in conventional plans and pay higher premiums if the research shows that these are more appealing to younger, healthier consumers (Lave et al., 2011). On the other hand, switching to high deductible plans does make consumers more conscious of the expense of care and makes them think twice before getting treatment. On the other hand, this will cut down on both essential and superfluous medical treatment. When a loved one is ill or injured, people aren’t exactly clamouring for the “choice” to shop around for the cheapest price, even if cost awareness and more information are good things. The availability of alternatives to workers is ultimately decided by the employers. It would seem that the current variety of health plan alternatives does nothing to encourage maximum efficiency or customer happiness.Managed competition using standardised plans and customer data was a key component of the Affordable Care Act’s marketplaces’ design to promote efficiency. Whether or whether this will be successful is unknown. Although premium pricing have changed and marketplaces have drawn insurers, many of the essential components for a sustainable marketplace are still missing. There can be no fair comparisons as the federally-organized marketplace in Texas does not standardise plans, even when comparing plans in the same tier with respect to cost-sharing discrepancies. Although there is greater uniformity and it is simpler to compare in Massachusetts, the sheer volume of options is still overwhelming. In addition, data from California and other market exchanges suggests that customers tend to remain with the plan they are familiar with after the first pick, even when there are optimisation options. Still, the ACA’s subsidies and coverage expansion provide the uninsured a lot more alternatives.