Volume 2, Issue 5

Volume 2, Issue 5

May, 2017

1. LCD Overdrive Frame Memory Compression Using Adaptive Block Truncation Coding

In order to reduce the frame memory usage in LCD overdrive, there is basic technique called block truncation coding (BTC) is commonly used due to its efficient coding and low implementation cost. However, there are some limitation of BTC that causes severe perceptual artifacts and degrades overdrive performance. To overcome the problem of BTC here we propose an adaptive multi-level BTC (AM-BTC) in this paper. The AM-BTC as suggested firstly overcomes the limitation by adaptively selection of 2-level or 4-level BTC according to the edge property of the coding block. Then, to reduce the bit rate of AM-BTC we improve the 2-level and 4-level BTCs by using only luminance bit-map to represent three color bit-maps, depending upon the color bit-maps advancement can be done . Moreover, as a result of this paper different types of images are compared for different PSNR values.

Published by: Gagan Gupta, Mr. S. SugumaranResearch Area: Digital Image Processing

Organisation: Galgotias UniversityKeywords: BTC, Overdrive, AM-BTC etc….

2. Car Pooling Using Global Position System

The Carpooling is not a new concept in the field of car sharing. Decades ago, when there were oil crises in Europe, people were encouraged to share their vehicles. The carpooling application will try to reduce the cost of the journey for travelers who commute to work daily which will not only save their money but this will also reduce the usage of most important non-renewable resource we have i.e. fuel, which is declining at a rapid pace. Our application will have two kinds of users, Firstly, the travelers (drivers) who use their own vehicle (car only for now) to go to work daily and in need of some fellow passengers on their way to accompany them. Some owners might want someone to accompany them for the entire journey ie from source to destination. These drivers can use our application to create their profiles as driver under “offer a ride” section and mention their route to work  they are expecting from passengers, car they have (hatchback, sedan, SUV), number of fellow passengers they need and details of their time when leave from home for work as well as when they leave from office.

Published by: Justin K Williams, A. Benazir BegumResearch Area: Computer Science

Organisation: Akshaya College of Engineering & Technology,Coimbatore.Keywords: Car Pooling Using Global Position System

3. Use of Plastic Waste in Road Construction

Plastic waste is one such resource, a major component of solid waste which is abundantly available and disposed of without proper treatment. There has been an exponential growth in municipal plastic waste disposal especially in urban areas which deteriorates the beauty of the landscape. Plastic was found to be an effective binder for bitumen mixes used in flexible pavements.

Published by: Azmat Shaikh, Nabeel Khan, Faisal Shah, Gaurav Kale, Devendra ShuklaResearch Area: Transportation Engineering

Organisation: Dr. D.Y. Patil School of Engineering & TechnologyKeywords: Plastic Wastes, Bitumen, Aggregates, Plastic Roads, Plastic-Bitumen-Aggregate Mix.

4. Costing and Estimation

Estimating is the technique of calculating or knowing the various quantities and the expected Expenditure to be experienced on a particular work or project. In case the funds present are less than the calculated cost the work is done in part or by deducting it or specifications are altered, the following requirement are worth essential for preparing an estimate. Drawings like plan, elevation and sections of important points. Detailed specifications about work men ship & properties of materials etc. A cost estimate is the approximation of the cost of a program, project, or operation. The cost estimate is the product of the cost estimating process. The cost estimate has a single total value and may have identifiable component values. A problem with a cost overrun can be avoided with a credible, reliable, and accurate cost estimate. A cost estimator is the professional who prepares cost estimates. There are different types of cost estimators, whose title may be preceded by a modifier, such as building estimator, or electrical estimator, or chief estimator. Other professional titles may also prepare cost estimates or contribute to cost estimates, such as quantity surveyors, cost engineers, etc Standard of construction can be achieved by careful supervision and selecting proper specifications whereas for Economy, planning is a must. The total quantity of various materials used in construction, if known before hand, can help the planning towards economy. .

Published by: Maaz Allah Khan, Tejasvi Raj Barrister, Yusuf HaiderResearch Area: Civil Engineering.

Organisation: Azad Institute of Engineering & Technology, LucknowKeywords: Cost Estimate, Project Planning, Planning and Economical Component Value.

5. Project Sustainable A.I Robot

Since Robotics is the field concerned with the connection of perception to action, Artificial Intelligence must have a central role in Robotics if the connection is to be intelligent.

Published by: Abhishek Anand LalResearch Area: Design of robot

Organisation: University of Petroleum and Energy Studies, DehradunKeywords: Artificial Intelligence-A.I, Research Trends.

6. Challenges in PVD Technique (Thin film Formation by Thermal Evaporation)

Among the outstanding achievements of Science and Technology in the 21st century, thin films occupy by right a major position. The earliest first Thin Film was made by Faraday paved the way for the development of Thin film Technology. Today, Thin Film and Thin Film Systems find wide use in many fields of Science and Technology. They are employed in Electronic Systems, Communication Systems, Computer Technology, Navigation Equipment’s, Robotics, Instrumentation and Controlling Systems and in Complicated Technological Process etc., due to the specific properties of the low dimensional materials.

Published by: Dr. Pelluri RahiResearch Area: Thinfilms

Organisation: Andhra UniversityKeywords: VLSI, GSI, PVD, Thermal Evaporation, Point Source, Knudsen’s Assumption, etc.,

7. A Survey on Software Component Restructuring

Component based software development is the reuse of the existing software. By reusing the component have cheaper cost, better quality, improved performance. The reusable component performs better than existing software. It provides a standardized system. But finding components for efficient software reuse is one of the important problems identified by researchers as well as artefacts which constitute a software system. Many researches have also been done in improving cohesion and reducing coupling for source code and to recover software architecture in reverse engineering process, grouping of component is done. The objective of our paper is to improve design and to examine numerical clustering techniques and implement these techniques for different software applications. Different clustering techniques for component reuse and program restructuring are hierarchical clustering, density based clustering,SOM.

Published by: Shreya Jaiswal, Ms. Satya VermaResearch Area: Software Component

Organisation: MATS UniversityKeywords: Software Component Clustering, Density based clustering, Hierarchical clustering.

8. Monitoring Control Delay And Cost Implication Using Threshold Feature Of Primavera

Tracking & monitoring is a regular process for any construction project to evaluate planned v/s actual progress deviation. Where the baselines are used as a reference to check the above. In this project the delay is primarily taken as the main focus of study and the corresponding cost implication is evaluated. Threshold features in Primavera is used for around 5 parameters in the project (Start Date Variance (Days), Finish Date Variance (Days), Schedule Variance (SV) , Cost Variance (CV) and Accounting Variance (AV) ) which will govern the progress, as well as cost .The threshold feature in Primavera helps the project manager to monitor the tracking parameters precisely by giving range of input values. This feature most widely used in large projects with different tracking units. The benefit of threshold feature in this project helps in controlling the delay with respect to a review date so as to prevent the stretching of project duration.

Published by: Sowmyashree A, Dr. S Rajendra, Swetha K SResearch Area: Primavera

Organisation: Nagarjuna College of Engineering and TechnologyKeywords: Monitoring, Tracking, Threshold Parameters, Input Values.

9. Removing Blurness in Picode using Enhanced Modulation

The appearance of a conventional 2D barcode pattern is often too obtrusive for integrating into an aesthetically designed advertisement. This is because of the fact that they didn’t provide perceptual quality and decoding robustness of the encoded images. Besides, no human readable information is provided before the barcode is successfully decoded. There proposes a new picture-embedding 2D barcode, called PiCode, which mitigates these two limitations by equipping a scannable 2D barcode with a picturesque appearance. PiCode is designed with careful considerations on both the perceptual quality of the embedded image and the decoding robustness of the encoded message. Comparisons with existing beautified 2D barcodes show that PiCode achieves one of the best perceptual quality for the embedded image, and maintains a better trade-off between image quality and decoding robustness in various application conditions. The generation of PiCode thus enhances the customers to scan the code using their mobile phones inorder to retrieve the data that carries behind them.

Published by: Greeshma G. S, Dr. Noble Mary Juliet .AResearch Area: Image processing

Organisation: Jawaharlal College of Engineering and TechnologyKeywords: 2D barcode, PiCode, Perceptual Quality, Decoding Robustness.

10. Bigdata : A survey on RDBMS and various NoSQL Databases on Storing Medical Images

Bigdata is a term that describes a large volume of data, which is gaining high importance in the medical IT industry. With the increased volume of medical data in due course, effort of storing large medical data shoots up. According to the survey, about 70% of medical data consists of medical images. Every patient likes to know their medical history and storing that is a costly operation. Traditionally the medical industry stores their medical images in a system called Picture Archiving and Communication System (PACS) which uses the Relational database management system (RDBMS). With the advent of NoSQL databases, one can also look into this for storing and archiving their medical images. In this view, a survey on RDBMS and various NoSQL databases for storing the medical images is being documented by us in this paper.

Published by: Divya S, N ShivaprasadResearch Area: Bigdata

Organisation: Sri Jayachamarajendra College of Engineering, JSS Science and Technology University, MysuruKeywords: Bigdata, Picture Archiving and Communication System (PACS) , Relational database management system (RDBMS) , NoSQL, Digital Imaging and Communication in Medicine(DICOM).

11. The Necessity and Best Trending Approach for Porting a Desktop Application to A RESTful Web Service

A desktop application is one that typically runs as a standalone application in laptop or on a desktop computer. It does not require internet connection availability or a web browser. They must be installed on your computer to access it. Though these desktop application provides high security, they have various disadvantages such as the same user cannot access his software from a different place, collaboration of the data between the users is difficult since the data is not centralized etc. To overcome these drawbacks, an approach is explained in the paper which builds a RESTful web service considering the already available desktop application and its basic structure. Thus, eradicating the limitations of the desktop application. REST is an acronym for “REpresentational State Transfer”. They are used to build service of the web that are lightweight, maintainable and scalable in their nature. The built service on REST architecture is known as the RESTful service and the underlying protocol for this REST is the HTTP, the basic web protocol. The approach may be followed by the developer to build a RESTful web service from scratch. The best available software are mentioned for the storing of the backend database, testing the developed methodologies, the use of following the models such as waterfall model and agile model, the architecture that the framework follows, the servers used, the hardware and software requirements for the development of the software and brief idea about the development and accessing of the front-end using the most suitable technologies.

Published by: Aishwarya N. KumarResearch Area: Networking, Computer Science

Organisation: National Institute of Engineering, Mysore,KarnatakaKeywords: Desktop Application, Restful Web Service, Http, Standalone Application, Waterfall Model, Agile Model.

12. Climate Status of Tripura: A Tight-Rope Walking

The climate change impacts variously and viciously our earth-rising average sea level around the world, rising global temperature relative to pre industrial age, melting of polar ice, rising of CO2 level, lowering the ocean pH, changing ecosystems, reduced food security, reduced fertility of land, torrential downpours and more powerful storms, droughts and prolonged heat waves etc. Our little state of Tripura lying in the North-East part of India is also no exception from this global phenomenon. The aim of the present study is to find out the status of Tripura with special reference to temperature change, trend of average rainfall, trend of Land use and Land cover pattern, trend of ground water level of a particular area, trend of water quality of the river Howrah. The result analysis of different parameters shows that the temperatures, contamination of water are increasing day by day in Tripura. On the other hand, ground water level is in decreasing order. Such way of decreasing trend will ultimately lead to a hard forthcoming situation. The main causes of misbalance of different parameters are deforestation, urbanization, indiscriminate use of hydrocarbons, etc. This paper strongly urges each student to plant at least one plant for passing their board and university examination under the guidance of a teacher. It also invites every citizen to plant a more number of trees at river source as well as in a river bank, to stop filling of the pond, to produce more numbers of lakes, and to use bicycles instead of motor bikes.

Published by: Bilash Ch. Roy, Debaleena Pal, Avisek Chaudhuri, Dr. Sudhan DebnathResearch Area: Chemistry

Organisation: Maharaja Bir Bikram College, AgartalaKeywords: Climate change, temperature, rainfall, ground-water level, Tripura

13. A Study on the Profile of Organic Cotton Farmers in Telangana

The paper mainly focuses on studying various profile characteristics of the organic cotton practicing farmers of Karimnagar district of Telangana region of Andhra Pradesh state. The variables selected to study the profile of the farmers were their personal profile (age, education, farming experience, decision-making behavior), economic status (farm size, herd size, organic inputs utilization pattern, annual income) and exposure to extension activities (training received, extension contact). The results revealed that majority of them had primary school education and fell under medium category in terms of age, farming experience, annual income, herd size, training received, decision-making behavior and extension contact. The majority of them had small farm size and high organic inputs utilization pattern. Majority (53.33%) of the organic cotton farmers belonged to middle age group, were educated up to primary school level (41.66%), had medium level of decision making behaviour (48.33%), farming experience (45.00%), small farm size (28.33%) and herd size (40.00%), used high level of organic inputs (48.33%), had medium annual income (48.33%), received medium level of trainings (50.00 %) and had medium level of extension contact (43.33%).

Published by: J V D PrasadResearch Area: Organic Cotton

Organisation: Himalayan UniversityKeywords: Organic Cotton

14. Basic Drilling Problems and Optimization by General Intensive Knowledge

Oil well drilling is a highly complex process that leads to routine drilling operational problems. A drilling problem is any occurrence or condition that stands in the way of well objectives. It could involve anything from weather to transportation delays to blowouts. This paper concentrate on problems that occur as part of the drilling process itself and possible way to reduce such problems. A comprehensive, thoroughly researched well plan is our best defense against drilling problems. In order to minimise some of these problems, an extensive study was carried out on different drilling problems cases. An important problem in drilling is hole cleaning, in which a high number of observed parameters and other features are involved. This paper aimed to determine the basic problem associated with the drilling process of poor hole cleaning and create a simplified way based on drilling literature to optimize the drilling process acording to the total drilling costs for a set of given conditions and moreover, to identify the optimal controlled variables for the drilling process. Drilling optimization involves using available resources to minimize overall cost, subject to safety and well completion requirements. Part of this, of course, entails preventing or successfully solving hole problems. Conclusively, after an extensive literature search was performed, covering the drilling process and the challenges involved. The optimization of the drilling process was analyzed separately for the active drilling operations and pipe connections and drilling trips. The result shows that many parameters are involved in the drilling process, and deviation of one factor may lead to hole cleaning issues and other problematic situations, the time spent during pipe connection- and drilling trip procedures is identified as an important factor in the optimization of the drilling process. The constraints on the bottom hole pressure and mud circulation rate were active at the optimum but removed from further analysis when the bottom hole pressure was controlled by the choke pressure, while the main mud pump flow rate was kept constant. For single measurement controlled variables, the results show that it is optimal to control the topdrive power by manipulating the drill string rotational speed, and keep the weight on bit (WOB) constant. Combination of several measurements will give a minimum loss, with an increase in the complexity of the control structure.

Published by: Jamaluddeen Hashim, Usman Abdulkadir, Mubarak Alkali, Ajay KumarResearch Area: Petroleum Engineering ( Drilling )

Organisation: NIMS University Jaipur Rajasthan India.Keywords: Drilling Problem, Optimisation, Hole Cleaning Problems, Factors Affecting Penetration Rate, Drilling Parameters Optimisation.

15. Application Of Thermal Methods For Heavy Oil Recovery: Phase One

In this study, an integrated research review is conducted to figure out the possibility of applying thermal methods for heavy oil recovery since plentiful heavy oil reserves and increasing demands for energy have encouraged more and more interest in the exploitation of heavy oil mostly found within thin pay zones (less than 10 m) in the world, often found in fractured carbonate reservoirs. The whole recovery of heavy oil is demanding due to its high viscosity, different Enhanced Oil Recovery (EOR) methods should be considered and implemented appropriately. The conventional thermal recovery process widely used to reduce the viscosity and increase the mobility of heavy oil includes but not limited to Cyclical Steam Stimulation (CSS) or Huff-and-Puff, in situ combustion (ISC), Steam Solvent Hybrid Steam drive process, steam-assisted gravity drainage (SAGD), Expanding Solvent-Steam Assisted Gravity Drainage (ES-SAGD), Steam injection(Steam Flood) and Vapor Extraction (VAPEX) used with the intention of reducing the high oil viscosity and, as a consequence, improving phase mobility in porous media so as to obtain a more efficient drainage up to the producing well. Vapor extraction (VAPEX) has gained considerable attention because it is energy effective and environmentally friendly. Other emerging Recovery Technologies (Non-Steam) VAPEX (Vapor Extraction) inclusive are JIVE (Joint Implementation of Vapor Extraction), N-Solvent, THAI (Toe to Heel Air Injection), ET-DSP (Electro-Thermal Dynamic Stripping Process) and ESEIEH (Enhanced Solvent Extraction Incorporating Electromagnetic Heating). Thermal Recovery Technology for Heavy Oil has been successfully applied in many parts of the world like Shengli, Henan and Jilin and other heavy oil producing areas of China, and also in heavy oil producing countries of Sudan, Kazakhstan and Venezuela. Conventional thermal recovery techniques are not cost-effective for many heavy oil reservoirs, due to unnecessary heat loss through the overburden which can be reduced through non-conventional thermal methods of either; controlled heating of the pay zone by introducing heat to the reservoir in a controlled manner or Hybrid SAGD and warm VAPEX studied combining the effects of heat conduction and solvent dissolution to be discussed in the next phase of this study.

Published by: Usman Abdulkadir, Jamaludden Hashim, Mubarak Alkali, Ajay KumarResearch Area: Petroleum Engineering (EOR)

Organisation: NIMS University, RajasthanKeywords: Heavy oil; Thermal EOR; SAGD; VAPEX ; Steam Flooding; In-situ combustion; Cyclical Steam Stimulation; JIVE ; N-Solv; THAI; ET-DSP ;ESEIEH.

16. European Union's Eastern Enlargement

European Union’s Eastward Expansion Is a Matter of Great International Business Scheme. The Enlargement of the European Union Can Shape the World Economy

Published by: Akash KunduResearch Area: International Business Management

Organisation: VIT UniversityKeywords: European Union, Enlargement, Regional Integrity, Free flow of trade.

17. Preponderating Against Un-Validation Utilizing Hybrid Labyrinth Era Calculation

Uncover of countersign documents or dead bonafide security issues that have impacted incalculable. The customer name and watchword see a key part in a security structure. So shield that from untouchable authentication. This proposition begins the examination of online security based astound enter reinforce in passed on structure. Nectar words based watchword support is one of the sensational security instruments to anchor the countersign. The critical overwhelm key which speaks to the nectar words a robotized assailant who takes a watchword can’t ensure the way and co-ordinate motivation driving the relating watchword. So the request gives a Hybrid Labyrinth Era Calculation (HLEC).

Published by: Shamili .R, T. Sathya, J. Jeyaram, K. Sudha DeviResearch Area: Network Security

Organisation: Vivekanandha Institute Of Engineering & Technology For Women, TamilNaduKeywords: Honeyword, Hybrid Legacy UI, Honeypot, Password cracking, Tweaking Digits, Hybrid- Labyrinth Era Calculation

18. Employee Functions and regulations act in TirumalaTirupati Devasthanams

In organization functions and regulations act of employee is very important role. The fact there is no clear deterred papers of employee function and regulations act of T.T.D in the past. The Present paper given the clear information employee related functions and regulation in the T.T.D. The employee related functions and regulation in the T.T.D. The employees who render service to the pilgrims are expected to be well informed about all aspects of administration and details of various Sri Vari Seva. Accommodating etc. They must be able to serve the pilgrims with devotion and maintain moral and Spiritual values. So, here the pilgrims should know the employees functions in T.T.D.

Published by: S.B Sowjanya Kumar, Sardar GuglothhResearch Area: Managment

Organisation: Sri Venateswara UniversityKeywords: G PF Funds, Employee Loans, Auditing

19. Corporate Governance Mechanisms in India

This paper is about making good mechanism for company’s corporate governance. This article further helps in examining the relationship between the two parts of mechanism i.e. internal and external mechanisms of corporate governance. The need for proper governance is to create a culture of transparency, awareness and clearness in the working and operations of corporation. Having a healthy corporate governance, it ensures a company in achieving long term goals and maximising long term company value as well as goodwill. In this paper we further put focus on how to keep the stakeholders interest safe and assist in reducing agency costs and clear by providing statutory provisions created by different regulatory bodies for the company. Regulatory framework assist the firm in improving their practices as well helps in creating better output and performance.

Published by: Nidhi SharmaResearch Area: Finance

Organisation: Maharishi Dayanand UniversityKeywords: Corporate Governance; Corporate Governance Mechanisms, Statutory Framework, Shareholders Rights and Interest, Information Transparency and Disclosure, Accountability

20. Prevention of MANETs from Malicious Nodes Performing FNA using OLSR

In MANETs, it is effective for mobile nodes to retrieve data items using top-k queries, in which data items are ordered according to a particular attribute score, and the query-issuing node acquires the data items with the k highest scores. However, accurate results may not be acquired in environments where malicious nodes are present. In top-k queries, it is important to neutralize the Data Replacement Attack (DRA). The DRA is defined as the malicious nodes attempt to replace necessary data items with unnecessary ones. The proposed method addresses top-k query processing and malicious node identification against data replacement attack in MANETs. In the top-k query processing method, in order to maintain accuracy of the query result, nodes reply with data items with the k highest scores, along multiple routes. Moreover, to enable detection of data replacement attacks, reply messages include information on the route along which reply messages are forwarded, and thus the query-issuing node can know the data items that properly belong to the message. In the malicious node identification method, the query-issuing node first narrows down the malicious node candidates, using the received message information, and then requests information on the data items sent by these candidates. In this way, the query-issuing node can identify the malicious node. When multiple malicious nodes are present, the query-issuing node may not be able to identify all malicious nodes at a single query. It is effective for a node to share information about the identified malicious nodes with other nodes. In the proposed method, each node divides all nodes into groups by using the similarity of the information about the identified malicious nodes. Then, it identifies malicious nodes based on the information on the groups. In this case, however, a malicious node may declare fake information that claims normal nodes as the malicious nodes. This type of attack is called as false notification attack (FNA) and the node who is performing FNA only called as Liar Nodes (LN). Identification of the LN is also based on the information on the groups itself. By using Optimized Link State Routing Protocol (OLSR) designing a message authentication method to prevent malicious nodes from performing FNA.

Published by: Jayasudha k, Mr. Scaria AlexResearch Area: Mobile Computing

Organisation: Jawaharlal College of Engineering and Technology, LakkidiKeywords: MANETs, Top-K Query Processing, DRA, FNA, Grouping, OLSR

21. A Quick Re-Route Procedure

We approach to find an redundant route, after having a web page link failure, from source node to a destination node, prior to Interior Entrance Method (Open Shortest Path First) has had to be able to re-converge throughout a reaction to your failure. The markup is usually a modest (up in order to tens of nodes) regional accessibility sub network of a support provider’s multilevel, the usual accessibility level found in practice. We underscore the process along with verify it can get a route when just one prevails.

Published by: P. Shyam Kumar, A. SwathiResearch Area: Computer Science and Engineering

Organisation: Gonna Institute Of Technology And SciencesKeywords: Routing protocols, Substitute routing, Network endurance.

22. Towards A Healthier Nation: Organic Farming and Government Policies in India

In the words of shri Bankim Chand Chatterji, we have nature’s bounties in form of “vandematram ! Sujalam, suphalm, malayaja shitalam, Shasyashyalam mataram !” In the rapid pace of development we have inflicted serious damage to the natural resources and consequently we are now faced the question as where is that sujalam (clean water); where is that suphlam (health crop) and where is that malayaj shitalam (refreshing air). These questions have given rise to a procedure of serious thinking to safe guard the environment and natural resources for sustainability. As a result more and more emphasis being given towards returning to nature and adoption of organic agriculture. This paper discusses the concept, aims and scope of organic farming in the context of Indian subcontinent. Government policies to encourage the task of practicing organic farming on a wider scale have also been discussed in wider context. A number of books, journals, newspapers etc have been extensively studied for this purpose.

Published by: Dr. Manju YadavResearch Area: Agriculture

Organisation: B.S.R. Govt Arts CollegeKeywords: Organic; Farming; Green Revolution; Agriculture; Policies

23. E commerce

Over the last two decades, rising internet and mobile phone penetration has changed the way we communicate and do business. E-commerce is relatively a novel concept. It is, at present, heavily leaning on the internet and mobile phone revolution to fundamentally alter the way businesses reach their customersThis paper deals the conceptual knowledge of ecommerce, literature review, current and future aspects of e-commerce in Indian context. The present development would be a valuable addition to researcher and academicians; and useful theory for practitioners, advertisers, and entrepreneurs.

Published by: Vineeta, Akanksha BhartiResearch Area: Marketing

Organisation: Delhi UniversityKeywords: E-commerce, B2B,C2C,B2E,G2C, G2G, P2P.

24. Equity Analysis of Automobile Industry in Indian Stock Market

Every individual always wishes to get a decent return on his/her investments because investor makes the investment from the hard earned savings. Among the various schemes of investment, equity market is considered to be one of the most rewarding avenues even though it involves more risk. Since the risk is very high in equity investment, the investors need to make equity analysis that helps them to know about the risk return characteristics of those equity shares and those industries in which he/she wishes to park the savings. In this outlook a study has been undertaken to analyse the equity shares of companies in automobile industry of Indian stock market. Indian automobile industry is one of the largest in the world and considered to be one of the fastest growing sectors. In order to maintain the growing demand many auto makers have started to invest in this industry. So the study on equity analysis of this industry will help the potential investors in taking informed and rational investment decision. This study is conducted for a period of 5 years, covering from 2012 to 2017. It takes only 50% of the total companies forming NIFTY Auto index as on 21st April 2017. That is 8 companies. From the analysis, it is found that among all other companies Mahindra & Mahindra Ltd is the best company to invest because its beta value is less than one (0.9082) and it has a positive alpha value (0.0073).

Published by: Akarsh P. K, Dr. M. Muthu GopalakrishnanResearch Area: Finance

Organisation: Achary Bangalore B- SchoolKeywords: Risk and Return Analysis

25. Strategies in Research

A plan or scheme by which the activity of searching for and assessing information found is carried out is called a research strategy. A research strategy usually involves a number of steps. Firstly, the analysis of the major concepts of the topic. Secondly, defining relevant keywords and their synonyms. Thirdly, searching appropriate information sources (e.g. databases), and fourthly, assessing the quantity and quality (relevance) of the information found. The research strategy, a subset of research design, includes elements of data collection and interpretation and emerges from both the research purpose and question. These strategies differ in their Ontological assumptions, Starting points, Steps or logic use of concepts and theory, Styles of explanation and understanding and the status of their products. Each strategy has connections with particular philosophical and theoretical traditions, i.e. research paradigms (Blaikie 2007).The paper has been analyzed in view of the research strategies which are done in carrying out the research activity. They provide a ladder which helps in carrying out the research. The strategies Inductive, Deductive, Retroductive & Abductive have been explained in the paper with their epsitelmogical assumptions. The paper analyses their importance & also brings out its applications that have come over the years.

Published by: Garima MalhotraResearch Area: Economics

Organisation: Sri Guru Nanak Dev Khalsa College, Dev Nagar, Delhi UniversityKeywords: Research Strategies, Ontological Assumptions, Inductive, Deductive, Retroductive and Abductive Strategy

26. Evaluation of Hepatoprotective Activity Of Arithirathi Chooranam In Ccl4 Induced Liver Damage In Rats

Though symptoms of Liver disorders are challenging, Siddha system of medicine ameliorates them in a very effective way. This research aimed to evaluate the Hepatoprotective activity of Siddha herbo mineral preparation Arithiraadhi chooranam by CCl4 induced hepatotoxicity in albino rats. Administration of Arithiraadhi chooranam significantly reduced the impact of CCl4 toxicity. Protection of hepatocytes was evaluated by estimating the level of ALT, AST, ALP, serum bilirubin, and total protein. The results strongly indicates that Arithiraadhi chooranam has appreciable hepatoprotective potential.

Published by: Kavitha .P, Velpandian .V, Kumar .AResearch Area: Siddha

Organisation: PrivateKeywords: Siddha, Arithiraadhi Chooranam, Ccl4, Hepatoprotective Activity.

27. Public Auditing For Shared Data with Efficient User Revocation in the Cloud

With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy re-signatures, we allow the cloud to resign blocks on behalf of existing users during user revocation so that existing users do not need to download and re-sign blocks by themselves. In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the cloud, even if some part of shared data has been re-signed by the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing tasks simultaneously. Experimental results show that our mechanism can significantly improve the efficiency of user revocation.

Published by: R. Ramesh, Dr. N. RevathyResearch Area: Cloud Computing

Organisation: Hindusthan College of Arts and Science, CoimbatoreKeywords: Key Words: Cloud computing, Scalability, TPA (Third Party Auditor)

28. Private and Demonstrable Interdomain Routing Decisions without Covering any Additional Data

Existing secured interdomain directing conventions can verify the legitimacy properties about particular courses, for instance, paying little respect to whether they accord to a genuine system way. It is every now and again accommodating to affirm more refined properties partner to the course choice strategy – for example, regardless of whether the picked course was the best one accessible, or whether it was steady with the system's peering simultaneousness. In any case, this is troublesome to manage without seeing a system's coordinating methodology and full directing state, which are not ordinarily unveiling .In this paper, we show a framework can enables sidekicks to substantiate arranged nontrivial properties of its interdomain controlling decisions without uncovering any extra data. In the event that every one of the properties hold, the associates pick up nothing past what the interdomain directing convention as of now uncovers; if a property does not hold, no less than one companion can see this and verify the infringement. We demonstrate SPIDeR, a practical structure that applies along these lines to manage the Border Gateway Protocol, and we report comes to fruition due to an exploratory evaluation to display that SPIDeR has a sensible overhead.

Published by: Kanchana .C, Shri Janani .P, Sandhiya .V, Srinivasan .T .RResearch Area: Wireless Network

Organisation: Vivekanandha Institute Of Engineering And Technology For WomenKeywords: Direction-Finding, Privacy, Security, Accountability, Unveiling , Fault Detection.

29. Usage of Personal-localite Channels for Acquiring the Agriculture Information by the Tribal Farmers

Thus agricultural information management becomes vital, indispensable for the most important partners of agricultural development, i.e tribal farmers. The concept of Agricultural Information Management Behaviour (AIMB) of tribal farmers is gaining significance as they are emerging as a strong force in increasing the agricultural production in the country. Among various sources of acquiring agricultural Information, the personal-cosmopolite channels play a great role in giving valid, reliable and useful information to the tribal farmers. This calls for the study on ‘usage of personal – locality channels for acquiring the agriculture information by the tribal farmers. The methodology adopted was Ex-post facto research design was followed to conduct the study. The state of Andhra Pradesh and the Telangana Region were selected purposefully. The Adilabad district was selected randomly. Out of fifty-two mandals of the district, four mandals were selected randomly. Four villages were selected randomly by selecting one village from each selected mandal. Thirty tribal farmers were selected randomly from each selected village thus total sample constituted One hundred and twenty tribal farmers for the study. The personal localite channels selected for the study are Discussions with family members, Friends, and relatives, Neighbours/fellow farmers, Progressive and experienced farmers of the same village, Local fertilizer dealers. The regularity of contact with these channels was measured on four point continuum i.e regularly, occasionally, rarely and never in terms of frequency and percentages. With regard to the distribution of respondents according to their Information Acquisition Behaviour, the majority of the respondents (48.33 %) were grouped under medium category followed by high (30.83 %) and low (20.83 %) categories. An equal percentage (59.16 %) of family members and progressive/experienced farmers of the same village were the popular personal-localite channels of acquiring information regularly. The majority of respondents (34.16%) occasionally meet local fertilizer dealers where as 31.66% of them acquire information occasionally from progressive and experienced farmers of the same village. Fifteen point eight three percent of farmers rarely contact private friends and relatives followed by local fertilizer dealers. Twelve point five percent of respondents never contacts local fertilizer dealers followed by 5.83 per cent also never contact neighbours / fellow farmers.

Published by: J. V. D PrasadResearch Area: Agriculture imformation

Organisation: Himalayan UniversityKeywords: Usage of Personal-localite Channels for Acquiring the Agriculture Information by the Tribal Farmers