Volume 3, Issue 4


Research Paper

1. Training an autonomous car

This paper aims to simulate an autonomous car which is rewarded according to the actions it takes. The car learns from the actions it does and the rewards it receives for them. The project consists of an Artificial Intelligence system, i.e. an agent acts upon the environment in a virtually simulated environment. A simulator is designed which consists of multiple roads and their intersections. At each intersection, there is a traffic light. Random traffic is also generated on random roads. The agent, i.e. the car, responds to the environment (Traffic lights, Traffic). The agent is rewarded accordingly to whatever decision it makes. Using the results discussed in this paper, any vehicle will be able to cruise through traffic based on real-time environment. Furthermore, thanks to the multiple research papers, studies, and forum that helped us complete this.

Published by: Udit Jaitly, Abhishek Gupta, Shallu Bashambu

Research Area: Artificial Intelligence

Research Paper

2. Advanced IoT based combined remote health monitoring and alarm system

The world is changed nowadays by automation and internet of things. Our lives are also made easier and automated day by day with the development and revolution in modern technology caused by the Internet of Things. In the recent era, health hazard is not an age-dependent factor due to irregular lifestyles and busy schedule. Patients’ health is acquired by various sensors and then the data which is stored on the Internet of Things is displayed through the website that helps to access the remote monitoring. Thus, with the use of sensors, we can reduce human errors as well as the occupied space in the room is also reduced due to the size of the system. The alarm generation is used in such a manner that the patient is not devoid of taking medicines in time. In case the health parameters cross the threshold value, a notification is sent through email or SMS alert. An optimum surrounding is also created as per the patients’ health requirement. The discussion of heart rate, blood pressure, respiration rate, body temperature, body movement and saline levels is done in this paper.

Published by: Aishwarya Misra, Piyush Agnihotri, JK Dwivedi

Research Area: Engineering

Research Paper

3. Suspicious human activity detection

Human activity detection for video surveillance system is an automated way of processing video sequences and making an intelligent decision about the actions in the video. It is one of the growing areas of Computer vision and artificial intelligence. Suspicious Human Activity Detection is the process of detecting unwanted human activities in a crowded place and alerting the concerned authority about the activity. This is done by converting video into frames and analyzing the persons and their activities from the processed frames. This paper gives an overall idea of the development of the system that detects suspicious human activities.

Published by: Nandini. G, Dr. B. Mathivanan, Nantha Bala. R. S, Poornima. P

Research Area: Digital Image Processing

Research Paper

4. Exploring the relation between talent management strategies and organizational success

The goal of this research is to examine and explore how the talent management strategies including evaluate and understand the organizational business model, select people and evaluate system help to achieve organizational success, it depends on the theoretical basis. the research was based on a descriptive and analytical method, relying on the questionnaire in data collection, and analyzing the data using linear regression , as a result of this work research findings emphasis that the impact of talent management strategies on organizational success is a positive, as it enables the organization to achieve its goals and objectives.

Published by: Hamad Karem Hadrawi

Research Area: Management

Research Paper

5. The reflection of human resources management in building learning organization field research in Iraqi ministry of health

This research aims to study the reflection of the availability of human resources management in the construction of learning organization. The instrument to collect data was questionnaire and interviews, the questionnaire was distributed to a sample of (53) physicians working in Baghdad teaching hospital. The main findings of this research are "there are relation and impact between strategies of human resources management and most of the aspects of the learning organization. the main conclusion of that research was the weakness of using performance assessment results in constructing learning organization, in addition, the lack of availability of strategy of job analysis in the mentioned hospital and the dependence on hierarchical in the division of work.

Published by: Ali Hasson Fandy, Ali Sami Abdulzahra, Zayad Ali Abbas

Research Area: Management

Research Paper

6. Use of Health Information Technology (HIT) to improve urban health services: an innovative approach to augment and revitalize urban health centers of Dehradun

Urbanization has risen exponentially in Dehradun after the creation of Uttarakhand state on 9th November 2000 and Dehradun city was declared the interim capital of the state. Rapid urbanization has led to the sudden surge of migrants, expansion of the city boundaries, vast rise in slum populations and urban poverty, which have correspondingly thrown multiple challenges for managing health services and its determinants, comprising water, sanitation, waste disposal, Communicable and Non-communicable diseases, Trauma, Drugs & Alcohol abuse, Domestic violence, etc. Despite the immediacy of urban poor to urban health facilities, their access to facilities is badly confined and the urban poor are more vulnerable and worse off than their rural counterpart because of inadequacy in the urban health delivery system, ineffective outreach, and weak referral system, which are multiplied further by lack of standards and norms for the urban health facilities. Raised catastrophic out of pocket expenses has evaporated the earnings of the poor people, residing in the outskirt and slums of the city. Recognizing the seriousness of the problem, National Urban Health Mission (NUHM) was launched as a separate mission in years 2013 with an objective of improving the health status of the urban poor particularly slum dwellers and other marginalized sections. In line with the objective, Uttarakhand Health & Family Welfare Department is running 39 UHC (Urban Health Centers) in four districts of the state. This paper briefly outlines an action plan for revitalized, revamp existing urban health services in District Dehradun with use of Health Information Technology.

Published by: Girish Khanduri

Research Area: Computer Science

Research Paper

7. Impact of tourism on energy consumption in India

Tourism has been a rapidly growing industry in the recent years but it comes not only with the increased revenues but also with a quite lot of negative impacts on the environment. In order to curb the increasing pressure on the natural resources, the concept of Sustainable Tourism and Ecotourism has been introduced across the globe. India has been receiving an increasing footfall of tourists in the recent years including domestic and international. The government has realized this fact and has decided to take up adequate measures in order to raise awareness not only amongst the tourists but also the local people to conserve the natural habitat and environment sensitive areas, natural resources and the heritage and culture of the tourist destinations. Energy is an important component of the economies to develop but extreme exploitation of energy resources do have repercussions on the growth of an emerging economy. Hence this paper aims to study the impact of tourists (domestic and international), population and steel industry on the energy consumption.

Published by: Subhalakshmi Akkinapalli

Research Area: Sustainable Development

Research Paper

8. Study on eating habits among different age group in south India

Junk food is the one which is attracting people irrespective of age and gender and designation, in order to find who is getting more attracted to junk food comparatively with the different age group of people in south India. A sample survey had been made by us in south India to get the conclusion who are attracting to junk food over different age groups. An online survey was conducted among the different age group of people with the self-made questionnaire which had been filled by 220 people. Chi-square test has been carried out to get the output. According to this survey and the output, conclusion that found was people of age between 16-30 are consuming more junk food than other age groups of people and people of age (>75) are consuming less Junk food. This also gave us information that students are major among all who are attracting more to consume irrespective of the gender. This may lead to many health issues to them at smaller ages. People of age (>60) are more aware of the consuming healthy food than students. This survey is made irrespective of gender, education level, and location that they were present.

Published by: Manideep K, Mythili G Y, Pratap Kumar R, Gowtham K, Gowtham V, Sri Vatsa CH, Yeshwanth S

Research Area: Engineering

Research Paper

9. A study to assess the knowledge and attitude of staff nurses regarding quality assurance of national accreditation board for hospitals and healthcare providers (NABH) at the selected hospital of Mysuru city

India is growing in the medical world and patients from different parts of the world are coming to India for treatment. This is possible only when the hospitals are maintaining the standards. In the past few years, there has been great pressure to improve the quality of nursing care in India. Because nurses are integral part of the hospital and play a great role in patient care, a need is always felt to make improvement in nursing practice. To provide safe, competent care nurse needs to have clinical judgment, the right attitude, good communication skills, and knowledge regarding care. Through following the standards of accreditation, a nurse can ensure cost-effective care to clients as well as hospital value in the market also will be enhanced. METHODOLOGY A descriptive study to assess the knowledge and attitude of staff nurses regarding Quality Assurance of NABH was conducted 300 staff nurses were selected trough non-probability convenience sampling method to participate in this study. The tools used for data collection were proforma for personal variables to assess the sample characteristics, structured knowledge questionnaire to assess the level of knowledge and attitude scale to assess the level of attitude. All tools were validated by experts and reliability was established using split-half method for structured knowledge questionnaire and test-retest method for attitude scale and the tool was reliable. The pilot study was conducted and study is found to be feasible. RESULTS The analysis of the data was based on the objectives and hypothesis. Both descriptive and inferential statistics were used for data analysis. Findings of the personal variables showed that majority 198 (66%) staff nurses were in the age group of 22-30years, majority 225 (75%) staff nurses were females, majority 261 (87%) staff nurses have their qualification as GNM, majority 124 (43%) staff nurses were working in wards, majority 140 (47%) staff nurses have 1-5 years of working experience, majority 146 (47%) staff nurses were working as junior staff nurse, majority 169 (56%) staff nurses not attended workshop or conference regarding NABH. The study result shows that majority of the subjects 214(71%) have an average knowledge and majority of the subjects 175(58%) have the positive attitude regarding Quality Assurance of NABH. The study revealed that significant correlation between knowledge and attitude scores [r= 0.130, r (298) = 0.095 p>0.05]. Chi-square was computed and there is an association between the level of knowledge (χ2 (2) = 5.59, p>0.05*) and attitude (χ2 (1) = 3.84, p>0.05*) with their selected personal variables like educational qualification. DISCUSSION Sound knowledge and a positive attitude regarding Quality Assurance of NABH among the staff nurses is very important for improvement of quality patient care.

Published by: Indra Mani. T, Anitha Victoria Noronha, Sheela Williams

Research Area: Nursing

Research Paper

10. Developing islanding detection arrangement for the grid on sensing voltage or frequency variation

As the power grid failure problems continue to persist in the country, need arises to make it more efficient and effective. This is a demonstration devised to provide such kind of a system that could detect the failure in the synchronous working of the power grid in case any external supply source that is supplying to the grid is encountering any kind of abnormalities may be in current levels, voltage levels, temperature, and oil level. There are various generation units that usually supply power to the grids such as thermal plants, solar plants, hydroelectric plants etc. All the generation units that connect to the grid have to obey the rules or standards laid down for the operation of a grid. These rules involve maintaining of voltage variation, current variation, oil-level variation and temperature variation within these specified limits. If there are any kind of abnormalities or deviations from the acceptable limits laid down by the grid, it then gets crucial that the particular feeding source should get automatically disconnected from the entire grid temporarily, this process is widely termed islanding. This would prevent large-scale occurrences of events of blackouts. Hence it would be beneficial and wise if we could have a system that would be so efficient that it could issue intimations about the potential variations in the arrangements and in addition provide the exact distance of the fault location on a feeder line from the base grid and keep the particular source temporarily on a standby basis while this process takes place. Variation of the system voltage should be around +-5% as per central electricity authority of India Regulations, 2010. This paper is an approach to devising out a system that helps the grid resolve problems related to black out situations hence making it a smart grid.

Published by: Ujjwal Mishra, Sawan Kumar Sharma

Research Area: Electrical and Electronics Engineering

Case Study

11. Marginal zone lymphoma – A rare finding on peripheral blood smear

Splenic marginal zone lymphoma is a rare low-grade B cell lymphoma arising from post-germinal center marginal zone B cells.comprising less than 2% of the lymphoid neoplasm; affects mainly middle-aged and elderly patients. We report a case of 58 years old female with the history of fever, malaise, and abdominal discomfort.Laboratory evaluation revealed lymphocytosis with the presence of atypical lymphocytes having villous cytoplasmic projections and basophilic cytoplasm.Immunophenotyping analysis revealed IgM positive, CD 5 negative, CD10 negative. CD23 negative and cyclin D negative.

Published by: Menka Kapil, Rateesh Sareen, Vanita Govil, Gajendra Gupta

Research Area: Oncology

Research Paper

12. Fabrication of automatic screw jack

The lead screw is used to convert rotary motion into translation motion. The screw jack is a device used for lifting the load with the application of small force. The mechanical advantage of screw jack is the ratio of the load applied to the effort applied. The screw jack is operated by turning a lead screw of jack. The effort required to operate the screw is eliminated by using 12 V DC Motor. The motor operates by 12V DC power supply which is drawn from the vehicle battery itself. The rotary motion transfer from the motor to lead screw through worm gear drive. The driver gear (pinion) located on the motor shaft and the driven gear located on the lead screw causes to transfer rotary motion.

Published by: Abhishek Madhukar Barewar, Abhishek Ashok Padole, Yugal Dhanpal Nagpure, Pranav Shivraj Gaupale, Sagar Bhimraoji Nagmote, Chandan Kumar Ram, Rupali Suresh Raut

Research Area: Automobile

Research Paper

13. The study of brand consciousness and brand loyalty of consumers with reference to soaps in Nagpur city

The lifestyle of common person has been changed such that the soap in daily life has become one of the essential components. With advancement in the lifestyle, different types of soaps are manufactured by the various industries based on fragrance, prize, quality etc. In order to assess the level of brand awareness of different consumers in Nagpur city, a survey is carried out. Nagpur city is selected for survey due to a huge market potential and being the second capital in Maharashtra. Customer satisfaction has been widely accepted as an important issue for many marketing surveys and is commonly used as a marketing standard for a company's performance especially for FMCG like bath soaps. The observations show that the satisfied customer is more likely to display loyalty behavior with the brand of the product. The customer rarely diverts from the brands which they use unless and until product quality and prize remain unchanged. The survey data is exclusively analyzed to gather information about various brand features, consumers’ loyalty, and awareness level. On the basis of previous years’ data, five soap brands are considered for this analysis. The convenience sampling method is used by taking the sample of 100 users. The analysis results show that the people are aware of the brand of the product on the basis of quality and most of them are dedicated to their preferred brand.

Published by: Radhika Bajaj

Research Area: Marketing

Case Study

14. Indoor positioning using beacons

Nowadays every smartphone is Bluetooth enabled, making the use of this technology more flexible. Satellite-based positioning doesn’t work indoors, but other technological standards have emerged that make indoor positioning possible. Since Satellite-based positioning GPS does not work, Bluetooth is a good alternative for indoor positioning and indoor navigation. From the RSSI, we can obtain the distances from the individual beacons, we describe and analyze a system for indoor positioning, which enables a person with a smartphone to find his or her location within an enclosed space, with an accuracy of up to 2 meters.

Published by: Rajeshwari Vijayakumar Sakharkar, Manjita Paigwar, Pranali Dandekar

Research Area: Survey Paper

Research Paper

15. Production of hydrogen from industrial and domestic wastewater

This project offers an overview of the technologies for hydrogen production from wastewater. Electrolysis is a promising option for hydrogen production from renewable resources. An electrolysis cell was designed to produce a useful hydrogen gas, from the wastewater treatment process. The electrical energy efficiency of commercial water electrolyzers is normally limited by internal energy losses; heat generated at economic current density levels exceeds the heat required to maintain the temperature of the electrolyte, and cooling must be used. Development of activated electrode systems and of improved electrode geometries promises to reduce these losses to the point where efficiency will be limited instead by the requirement that sufficient heat is generated internally to maintain the electrolyte temperature. The limitation on electrical energy efficiency then becomes thermodynamic. Options indicated for development of advanced technology are considered. These are then related to the approaches being taken in major worldwide programs which are working to reduce the cost of hydrogen production from wastewater.

Published by: Saravanan, Amarnath R, Naveenraj K S, Dhamodiran B, Sarangabani N

Research Area: Civil Engineering

Review Article

16. Location-based services using geofencing

Geo-fencing (geofencing) is a great feature in a software program that uses Global Positioning System (GPS) or radio frequency identification (RFID) to define the geographical boundaries feature. Actually, the geofence is a virtual barrier. Geofencing is an innovative technology, an online marketplace for proactive contextual services that allows users to easily find interesting services can easily subscribe to it and to allow providers offer their services for a variety of applications such as electronic toll collection, contextual advertising or tourist information systems, even without additional infrastructure. The main objective of this research was to understand how the use of spatial data can improve advertising performance for customers. Tracking systems and monitoring, based on global navigation services by satellite, and include geofencing function, could also contribute to the exact location of an institution or company and increase sales and business perspective efficiently. Instead of large billboards, they can now advertise on smartphones which are economically and accurately tested.

Published by: Abhishek Singh, Ankit Pal, Divyansh Garg, Dolly Yadav

Research Area: Geofences

Technical Notes

17. Study about the analysis of grinding machine operations

The Process of analyzing the grinding machining operation for determining the course in the machining operation, surface, finish, power consumption, temperature induces and tool life on the machining. When machining is in working condition effect on workpiece and tools.

Published by: Ravi Prakash Sharma

Research Area: Engineering

Review Article

18. The response-oriented mechanism for delay tolerant network

Broadcasting is a method of transferring data to all receiver devices simultaneously. In the proposed system utilizes multi-server to store streaming data in which the video content is encoded using trapdoor hash algorithm and it generates a key for video content. After encoding it is fragmented by content distribution algorithm. The video content is fragmented into several blocks. When the user request the video content the Content Distribution Manager (CDM) send the fragmented data along with the digital signature to the user. The sender sends digitally signed data to receiver and receiver verify the data using the hash of the message. The packet can be sent without losses and delay.

Published by: Banumathi P, Suriya Priya N, S. Yuvalatha

Research Area: Network Security

Review Article

19. Improving security and performance by implementing FS Algorithm in distributed cloud

The distributed file system is used to store a large number of files. The availability of the file is considered as the main factor for the availability of the system. The availability of the system is based on the retrieval time of the file. Metadata servers are separated from the data server and the replication of metadata is being implemented in the distributed file system to increase the availability. But there is a security issue in replication of metadata in a single server. When whole data is in sequential order if a single server gets hacked or failure occurs the entire data will be lost from the server. To overcome this problem, apply FS Algorithm. The scope of the paper is to Detach and reproduce methodology: divide a file into fragments, and replicate the fragmented data over the cloud node in a shuffling order.

Published by: Omana M U, Nandhini S, Priyadharshini R

Research Area: Computer Science

Research Paper

20. Query optimization in web search engines using dynamic frequency modulation

Query processing nodes are core part of web search engines which process user queries, these units devour a notable amount of power, which is mostly liable to their cpu’s to ensure lower levels of latency (ruling out heat factor).Where mainstream users are likely to look for split-second reaction times. In any circumstance, clients can scarcely see reaction times that are quicker than their expectation. Hence, we use pesos algorithm to assign the most relatable processor clock-rate to course the query on per core basis using the inputs from YDS algorithm which calculates the query process volume, then processing the input query to the cost-based query optimizer (gporca) which replaces the stock reverse index of a query processing node with sub-query unnesting method, which uses the dvfs to regulate the wattage by increasing the efficiency. Thus reducing the factors affecting cpu’s longivety.

Published by: G U Bharath Chandra, S Niveditha, Gompa Vamsikrishna, P Nithin Reddy

Research Area: Knowledge Engineering and Data Mining

Case Study

21. Emergency response automation in life emergency management

Traffic has become the major problem in the present situation, therefore management of life Emergency situations at the time of accidents on road, reaching the hospital on time has become a major constraint for ambulances because of traffic was considered as the highlighting in theoretical form of the main aspects of the life Emergency management. The project will also bring the solution and technologies that are used by western countries in life Emergency management using Emergency Response Automation

Published by: K. Chaitanya, Y. S. Aashritha

Research Area: Emergency Management

Research Paper

22. Study and prototype of the thermoacoustic refrigerator

A thermoacoustic refrigeration device (TAR) includes an acoustic wave generation device arranged directed to the channel of a hollow tube, and a stack provided at a predetermined position in the channel of the tube. A temperature difference is obtained across the stack by an acoustic wave emitted from the acoustic wave generation device. The working fluid used is air. This work examined the performance of thermoacoustic refrigeration, which is the theory of using sound waves to cool the air. The main aim of this work is to design and construct a small thermoacoustic refrigerator from inexpensive and readily available parts and analyzed the results. The design includes the dimension of the stack, selection of acoustic driver, an acoustic resonator. The experiments showed that while thermoacoustic cooling was possible, high efficiency was beyond our reach due to materials restrictions. We obtained the temperature difference of 7°C for constructing this simple device. However, from these limitations devised several proposals for increasing the performance of thermoacoustic refrigerators.Experiments show the performance can improve by using a better material such as high heat carrying capacity materials and the working fluids like inert gases.

Published by: Vipul Kumar Mishra, Vikrant Kumar, Sachin Kushwaha, Hitesh Sharma, O. P. Umrao

Research Area: Refrigeration

Research Paper

23. Climatology lab for airports

The task of the Air Traffic Control (ATC) is to optimize the use of airspace and to avoid collision among aerial vehicles. Airspace can be defined as a set of the infinite number of planes, direction, routes etc. In last few decades, there have been many problems related the safe landing of Airplane and their accidents due to various reasons like the bursting of a tier, poor visibility, lack of synchronization between the plane and the base station. These result in the accident of airplanes. We have developed a “Climatology Lab for Airports” to solve the above-mentioned problems and ensure the safety of passengers. The main objective of our project is to avoid these type of accidents by proper synchronization between the base station and Airplane. Our project is also used to increase the air quality traffic and to reduce the downtime of activities i.e. the time required for identifying each and every climatological condition like pressure, humidity, temperature etc. is reduced since a single device gathers all the necessary information at a time using sensors. Using this system various collision and problems related to air traffic control has been minimized. The system uses internet of things (IoT) technology and will prevent the malfunctioning or damage of the equipment used to the risk factor that the sensor might stop working is minimized. Here we would like to provide an economic and affordable solution for the perfect takeoff and landing system for airports with physical ambient conditions of the atmosphere with an audio-visual networking.

Published by: V. S. Harinee, Sushma Manivannan, Swikruti Nayak, C. Deepika, E. Poovannan

Research Area: Electronics and Communication

Research Paper

24. Anonymous attribute-based encryption using privacy-preserving, shoulder surfing

Cloud services is a great opportunity for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. Several schemes have been proposed for access control of outsourced data in cloud computing. Security is the primary obstacle that prevents the wide adoption of this promising computing model. Identity-based encryption (IBE) is the sender of a message can specify an identity such that only a receiver with matching identity can decrypt it. In the KP-ABE, a ciphertext is associated with a set of attributes, and a private key is associated with a monotonic tree, which describes this user’s identity. A user can decrypt the ciphertext if and only if the access tree in his private key is satisfied by the attributes in the ciphertext. However, the encrypter does not have entire control over the encryption policy. Furthermore, when a re-encryption occurs, all of the users in the same system must have their private keys re-issued so as to gain access to the re-encrypted files, and this process causes considerable problems in implementation. All problems and overhead are solved in the CP-ABE. In this, ciphertexts are created with an access structure, which specifies the encryption policy, and private keys are generated according to users’ attributes. A user can decrypt the ciphertext if and only if his attributes in the private key satisfy the access tree specified in the ciphertext. Hence the encrypter holds the encryption policy. Also, issued private keys will not be modified till the whole system reboots.

Published by: Shital S. Salokhe, Nishita N. Patil

Research Area: Computer Science

Case Study

25. Glaucoma detection for optic disc medical image processing

Glaucoma is an eye disease that usually occurs with the increased Intra-Ocular Pressure (IOP), which damages the vision of eyes. So, detecting and classifying Glaucoma is an important and demanding task in recent days. For this purpose, some of the clustering and segmentation techniques are proposed in the existing works. But, it has some drawbacks include inefficient, not accurate and estimates only the affected area. In order to solve these issues, a Neighboring. Differential Clustering (NDC) – Intensity Variation Masking (IVM) are proposed in this paper. The main intention of this work is to extract and diagnose the abnormal retinal image by identifying the optical disc. This work includes three stages such as, preprocessing, clustering and segmentation.

Published by: Baskar. S, Uma Rani, Suresh Kumar

Research Area: Digital Image Processing

Research Paper

26. Mobile communication using fountain code technology

Mobile communication devices are growing in the field of multi-function and intelligent, and files in mobile phones need to be transferred at high speed in many fields. However, the conventional TCP-IP based transmission protocol need more time in transmitting files over the network with high latencies or high loss rates. This paper presents the application of fountain codes technology in multimedia file transfer system on Android platform. In many fields, we have compared the upload performance of the system that uses Fountain Codes Technology to FTP client. The test in practical execution has been done and we found that the multimedia file transfer system tend to utilize the available bandwidth and complete the file transfer but with a reduced file transfer time whereas, In the same propagation field, FTP client was likely to get slow when propagation is poor.

Published by: Charul Soni, Priyal Ghattuwar, Pranali Dandekar

Research Area: Multimedia File Transfer System

Research Paper

27. Bird strike analysis on jet engine fan blade

Bird strike otherwise called as avian ingestion is the collision between the bird and the aircraft. It is a very dangerous situation in the field of aviation. Bird strike usually occurs at low altitude during take-off and landing of the aircraft. The bird strike in the jet engine is very dangerous because when a bird hits the fan blade the fan blade is displaced into other fan blade causing the cascading failure. The main objective of this project is to analyze bird strike on the aircraft jet engine Fan blade. Hemispherical Model is used to design the Bird Model. The Canadian goose and GE-NX 2B engine Fan Blade is taken to perform the analysis. The Calculation of the dimensions of the bird model is done. The fan Blade and Bird Model is designed and then assembled using CATIA V5R20. The material Properties is defined for both Bird Model and Fan Blade. The analysis is done and an attempt is made to discuss Deformation, Stress, and Strain on the Fan Blade depending on the Relative Velocity. ANSYS- Explicit Dynamics was used to analyze the Model.

Published by: Mohankumar M, Krishna Gupta K, Tamizharasan T, Venkatesh N

Research Area: Aeronautical

Research Paper

28. Wireless multimedia sensor network

In recent year wireless multimedia sensor network has developed so far that it has attracted various researchers focus toward itself. In wireless multimedia sensor network there are various interconnected devices such as low-cost CMOS cameras, microphone helps to retrieve the multimedia content such as video streams, audio streams and scalar sensor data from the environment so in this paper we have brings out various aspects of wireless sensor network, there protocols for wireless multimedia sensor network , challenges. And their future scope. And we also hope also that it will help new research to clear their ideas among its researchers.

Published by: Shashi Baith, Ankita Ganvir, Neha Yadav, Pranali R. Dandekar

Research Area: Computer Science

Review Article

29. Heating of air with the help of the solar evacuated tube

A solar-powered air heating system using one ended evacuated tubes. A solar air heater containing evacuated tubes is used for heating purpose. With the increased attention the efficiency of solar heating facilities and the performance of additional equipment are becoming increasingly important. In the present study, thinking is giving on the heat transfer characteristics of solar air heater with some modifications in design to increase air travel length. Performance of solar air dryer would be checked with and without air heater. Effect of climate conditions would also be studied on its performance

Published by: Varun S Panchal, Ankit A Pandey, Sopan Kharche, Firoj Pathan

Research Area: Thermal Engineering

Research Paper

30. Study the role of different infective factors associated with ectopic pregnancies in patients attending a tertiary care hospital in Tripura

Ectopic pregnancy refers to implantation of a fertilized ovum outside the normal uterine cavity. Ectopic pregnancy presents a major health problem for women of childbearing age. Without timely diagnosis and treatment, it becomes a life-threatening situation. The numbers of patients with ectopic pregnancy attending this tertiary care hospital were very high, hence this study is carried out. This hospital-based case control study was undertaken to provide a better understanding of Ectopic pregnancy, its clinical presentation and find out various risk factors associated with this condition.50 cases and 50 controls were studied during 1.5 years of the study period and the incidence of Ectopic pregnancy in this institute during the study period was 1.69%.Major associated risk factors observed in this study groups are past history of the Pelvic inflammatory disease (32%  cases), Bacterial vaginosis (52% cases) and Chlamydia infection(2% cases).These conditions are easily preventable and treatable. It is therefore paramount important to take action in early detection and treatment of these conditions.

Published by: Bijoy Kar, Dr. Jayanta Ray, Dr. Tapan Majumder, Ashish Kumar Rakshit

Research Area: Medical

Research Paper

31. Automatic water level controller

A range of level control systems and methods are used in Industries. Systems may be based on the use of floats or sensors. Level control is one of the continuous processes that can be treated as an integrating process. This controller can be applying for temperature control, pressure control, and water control. The level controller is used with electrical probes or sensors. The electrical probes are used with power supply and motor. The main objective of this paper is to design and develop an automatic water level controller to maintain the outlet process of the water level at its desired level. The paper also focuses on the need of the people to install automatic water level controller to avoid wastage of water.

Published by: Prajnasmita Samantaray, Rama Prashanara Dalai

Research Area: Engineering

Research Paper

32. Power system stability improvement using FACTS devices

Due to limited resources and environmental restrictions, the power generation and transmission have been severely limited even though the power demand has increased substantially in the last two decades. The consequence being some of the transmission lines are heavily loaded and the system stability becomes a power transfer limiting factor. To solve various power system steady state control problems, FACTS(Flexible ac transmission system) controllers have been used. Flexible and dynamic control of power systems is allowed through Flexible AC transmission system or FACTS. The investigation of FACTS devices for the enhancement of system stability has been done. To improve the operation of an electrical power system by utilizing FACTS devices is the main aim of this paper. This paper also discussed the performance comparison of different FACTS controllers. Reviews and summaries of some of the utility experience and semiconductor technology development have also been taken into consideration.in this paper, the discussion of applications of FACTS to power system studies has also been done.

Published by: Naveen Singh, Piyush Agnihotri

Research Area: Facts Devices

Research Paper

33. Face detection and recognition in smartphones

In this paper, various algorithms have been referred for face detection and recognition for security purpose in smartphones. Different types of algorithms such as template matching, color code segmentation using the K-mean clustering algorithm, etc. for face detection and KLT for face recognition have been used. In any of the face recognition system, the first step is face detection. The mentioned algorithms have first been constructed in MATLAB and then later it is implemented in SMARTPHONES phones. After the implementation of the mentioned algorithms, we have recognized certain pros and cons while implementing the face recognition system on a mobile phone with limited hardware capabilities.

Published by: Haritha H. Nair, Gauri S. Amte, Nisha B. Todase, Pranali R. Dandekar

Research Area: Computer Science

Research Paper

34. Smart parking system

Now a day the number of personal vehicles usage is increasing on a large scale. People prefer personal vehicles than public transportation. It is very difficult and frustrating as well to find parking space in most metropolitan areas, especially during the rush hours. It is often costly in almost every major city in the world to find proper and secure parking space. Due to this, there is a need to provide sufficient parking places providing plenty of slots to help the user park his vehicle safely. The aim of this paper is to propose a design of Android-based smart Parking System that regulates the number of cars to be parked in the designated parking area. This is done by automating the parking and unparking of the car with the help of an Android Application.

Published by: Pranav Kamble, Sujit Chandgude, Ketki Deshpande, Chetna Kumari, K. M. Gaikwad

Research Area: Electronics and Communication Engineering

Research Paper

35. Preventing distributed denial of service attacks and data security

In recent years, Path identifiers(PID)are used as inter-domain routing objects in the network. However, the PIDs used in existing approaches are static, which makes it easy for attackers to launch distributed denial-of-service (DDoS) flooding attacks. To address this issue, introduce a D-PID, framework that uses PIDs negotiated between neighboring domains as inter-domain routing objects. In DPID, the PID of an inter-domain path connecting two domains is kept secret and changes dynamically. Security of data which shared in the network can be ensured with cryptographic techniques also.DPID mechanism with data secure provides more chance to prevent DDoS attacks in the network.

Published by: Shabna. M, Aswathi. T

Research Area: Information and Forensics Security

Research Paper

36. A lightweight secure data sharing scheme

The ubiquity of distributed computing, cell phones can stock and recover sensitive data from cloud whenever. Therefore, the information security issue in versatile cloud tries out to be increasingly extreme and forestalls advance improvement of the portable cloud. There are generous examinations that have been run to enhance the cloud security. Be that as it can, a big slice of them are not relevant for versatile cloud since cell phones just have constrained registering assets and power. Arrangements with low computational upstairs are in the awesome requirement for versatile cloud applications. In this project, we suggest a lightweight information sharing plan (LDSS) for portable distributed computing. It embraces CP-ABE, an entrance control innovation utilized as a part of typical cloud condition, yet changes the construction of access regulator tree to make it reasonable for portable cloud conditions.LDSS moves an extensive section ofthecomputationalgenuineaccesscontroltreechangeinCP-ABEfrommobilestooutsidego-between servers.Moreover, to decrease the client repudiation cost, it acquaints quality portrayal fields with executing lethargic disavowal, which is a prickly issue program based CP-ABE substructure. The exploratory outcomes demonstrate that LDSS can successfully lessen the overhead on the cell phone side when clients are sharing information in portable cloud conditions.

Published by: Achyuth Ranjan V, K. Karthikayani, P. Jaswanth, Vivekananthan GR, Shankara Lingam

Research Area: Cloud Computing

Research Paper

37. Smart energy management

Smart Energy Management (SEM) is a new emerging technology that will be mandatory for the future electrical network to generate, transmit, distribute, manage and monitor electrical energy and its usage. The major contribution will be from the communication technologies specifically wireless technologies enabling two-way communications. So far, the interface of smart devices is limited to the transmission and distribution side of the power grid, while its interface with the consumer as well as consumer energy consumption is not given major significance [1]. Based on the case study conducted in our university, this paper proposes a Smart Energy Management System (SEMs), that will make use of Internet Of Things (IoT) along with more than one type of wireless communication techniques based on the requirement, to collect energy information from the users and communicate it to the central server. An intelligent sensor node is deployed in the building in order to use the energy, based on the environmental conditions (temperature, humidity, etc). We have proposed decision algorithms which make use of the sensor values for optimization of energy consumption.

Published by: Arpit Mishra, Devendra Pandey

Research Area: Power Management

Research Paper

38. Design and development of All Terrain vehicle

The Study named “Design and Development of Steering System of an All Terrain Vehicle” is to find out the most efficient steering system for an all-terrain vehicle. For this selection, various parameters are considered. The geometry for steering is selected to be Anti- Ackerman geometry. The system selected to convert the rotational motion into translational motion is Rack and Pinion. The steering column used is a one specifically used for steering of Tata Nano. The steering wheel is self-designed so as to optimize its size and reduce its weight. During the design of steering wheel, ergonomics are not compromised. The motion is transferred to the wheels with the help of a pair of tie rods. The tie rods and wheel hub are connected with self-designed steering arms.

Published by: Anuj Kesarwani, Abhinav Mishra, Gopal Kharwar, V. K. Saini, Sunil Kumar

Research Area: Engineering and Technology

Technical Notes

39. Technology challenge white paper: Coping with spool space challenge in Teradata

Teradata is a high-performance database system. It uses spool space to perform queries on the database. It writes the result from each step in the query execution plan to disk to a spool file and subsequently reading these results. Hence it is important to plan spool space utilization in an optimized way, else we will end up with spool space error. Spool space and capacity planning are mutually dependent concepts. It is important to increase the system's performance without making any hardware changes. It is the challenge as data is continuously increasing and most systems will respond to increased load with some degree of decreasing performance. Considering the importance a lot of work has been done all over the world on DWH performance tuning, it is critical to understand multiple facts to be considered to ensure optimal utilization of Teradata Spool Space. If we are using the Spool Space in an optimal way then we are increasing the system performance without causing any additional cost to an organization. Poor planning will result out of spool space memory and hence can lead to failure of the Teradata based application. Understanding of spool space, its allocation, causes of spool space error, mitigation plan are detailed in this white paper.

Published by: Rajneesh Shukla

Research Area: Database : Teradata

Review Article

40. An automated method for characterization of facial expression

This paper presents a new facial expression technique, locality directional ternary pattern (LDTP), for facial emotion recognition. LDTP efficiently encode various information of expression-related features (ı.e., eyes, eyebrows, nose, mouth and lips) by using the directional information and advanced pattern in order to take advantage of the robust of advanced patterns in the edge region while overcoming the weakness of other methods in smooth regions. Our proposal, unlike existing face description methods that divide the face into multiple regions and sample the codes uniformly, uses a two-level grid to construct the face descriptor while sampling emotion information at different scales. We use a grid for stable codes (highly related to non-expression), and another one for active codes (highly related to expression). This multi-level approach enables us to do a finer description of facial motions while still characterizing the other features of the expression. Moreover, we learn the active pattern codes from the expression-related facial regions. We tested our method by using person-dependent and independent cross-validation schemes to evaluate the performance. We show that our approaches improve the overall accuracy of facial expression recognition on six data sets.

Published by: Rashmika. R, Sudha Mercy, Sangeetha Kamatchi. C , Preethi. R

Research Area: Image Processing

Research Paper

41. LPG refrigeration

The climatic change and global warming demand accessible and affordable cooling systems in the form of refrigerators and air conditioners. The energy crisis persists all across the globe. We think of recovering the energy which is already spent but not being utilized further, to overcome this crisis with no huge investment. To address this problem we designed and analyzed a refrigerator which uses the energy spent in pressurizing and liquefying the LPG. LPG is extracted at high pressure in the liquefied state from the storage device. Its pressure and the flow rate is controlled by a valve connects it to the evaporator at the requisite pressure in requisite quantity. An evaporator is housed through which LPG flows. It gets converted from liquefied state to gaseous state and expands. So it absorbs heat in the form of latent heat. Due to this process, heat from surrounding is absorbed so cooling effect is produced. This effect is magnified by an evaporator. A network of pipes containing gas is covered by thin and closely spaced fins which help in effective and fast cooling. The insulating material helps in storing the cooling effect for a longer period of time. The LPG leaves the evaporator in gaseous form; it is then directed towards the burner where it is to be used. Thus, no LPG is consumed for cooling purpose.

Published by: Piyush Raj, Amit Kumar Verma, Anand Sagar, Ajay Kumar, Prasoon Choudhary

Research Area: Mechanical

Research Paper

42. An innovative approach based on VLSI to bring yoga under electro automation

This Project Belongs to a very important domain and having widespread applications across the Globe. The level of stress and tension is increasing day by day, particularly in the Metropolis and people are running after solutions in a different way. The quantum of Traditional Yoga studios is being opened up on a fantastic scale in most of the cities in Europe, Asia, and America. It is a subject to note the level of practicing accuracy blended with quick recovery portfolio is very much needed. In order to manage this challenging problem- Teacher free fully automated Yoga Platform with extraordinary electronic set up would be a novel idea and I have just selected this as my Project to serve people all over the world and also to open up new vistas of further research on it. This project to be based on totally Advanced VLSI Technology with customized software.  

Published by: Bulty Chakrabarty

Research Area: Vlsi and Microelectronics

Research Paper

43. Coordination of SVC and PSS for stability enhancement of DFIG-based offshore wind farm connected to a multi-machine system

This paper presents an implementation of Static Var Compensator (SVC) & a Power System Stabilizer (PSS) to improve the transient stability of a DFIG-based offshore wind farm (OWF) connected to a multi-machine system. In wind farm connected grids, maintain the stability of grid and wind farm during transient disturbances is a serious issue. Due to grid faults wind DFIG trip and synchronous machines start oscillation due to insufficient damping. To check out the stability of proposed system a three-phase to ground (LLLG) fault has been taken at bus number six of three machine nine bus system. The test system is modelled and simulated in MATLAB/Simulink platform. In absence of SVC during three phase to ground fault DFIG trip due to the reduction in its terminal voltage below a critical value. But in presence of SVC wind farm protection system does not trip DFIG due reactive power support. And in presence of both SVC & PSS synchronous machine oscillations are also damped, hence settling time and overshoot of a system also reduced.

Published by: Vipin Patel, Varun Kumar, Dilip Kumar

Research Area: Renewable Energy