Volume 2, Issue 6

Volume 2, Issue 6

June, 2017

1. Design and Analysis of Hot Rolls Using Finite Element Method

The main objective of this research work is to study the rolling process in steel manufacturing industry which has been in use to produce high quality steel products. The entire research work has been initially carried out by practical observation of the process in the steel manufacturing industry, along with the introduction of sophisticated technology having number of stands associated with rolls made of spheroidal cast iron and alloy cast steel. The hot billet is passed through different stands to get correct size with a defect free surface, At initial stage the billet ranging from 200-205mm can passed through roughing stands made of alloy cast steel, further it is passed through intermediate and continued to pass through finishing stands to get smooth finished product,The displacement at each stage is practically observed for thorough understanding of the valuable rolling design methods, In this thesis reverse engineering is done based on the practical conditions in order to achieve required finishing with minimal deformation in the stands while producing high quality rolled product. At next stage of the research , it is analyzed that the material used to manufacture the stands at initial stage has less Isotropic elastic properties when compared to spherodial cast iron. Thus the shape of the billet remains same, Also, the deformations at different stags are observed using finite element method using ANSYS 15.0 software after designing a 3D model in CATIA V5 software. Thus, the results obtained during post-processing, shows that spheroidal cast iron or SG iron is the best material than Alloy cast steel which was initially considered to overcome maximum twisting at the center of the rolls when billet is allowed to pass through the groves optimized with appropriated radiu, and spacing to balance various parameters such as roll separation force, torque, elongation, spread and draft. All the possible solutions have been discussed and the essential theoretical calculations are considered to successfully validate the results with the finite element analysis of hot rolled design.

Published by: L. Nalini, Dr. P. Vijay KumarResearch Area: Industry

Organisation: Raghu Institue Of Technology, Andhra PradeshKeywords: Modal, Design Assessment, Roll Separation Force, Torque, Elongation, Spread and Draft

2. Enabling the Structure from Its Packet Flow Disaster

Packet Flow control turns out to be essential in mostly operated and fused networks. It runs on precise applications. Here, packet flow control techniques for close networks are rendered. The proposal is to shift the flow of packets dodging trouble from the information fabric to an arranged network, that set aside flows using exact counters. The arranged network take in resultant power that allows data packets after holding back space for them in the buffer memories in pretense of fabric results. In detailed, a basic form give a picture of this outcome as synergy flanked by buffer uncertainties as well as fine-grained multipath routing. Two diverse schemes are at hand. The principal one keeps all the system in a fundamental organize component and in trouble-free. The subsequent one is further scalable by broadening the powers above the toggling components of the close network. It is finished by course-plotting the managed information to and from the endpoint adapters. Simulations of the entire scheme reveal promoted throughput and squat latency among the crammed amount produced. Weighted max-min reasonable portion of fabric resultant link bandwidth is also demonstrated. In addition, disturbance malfunctions illustrate that the instant that packets hang around in fabric as well as reordering buffers is diminished. At last, the promoted throughput potential of the structure is corroborated by a Markov chain scrutiny of final buffer responses.

Published by: D. R. Pavithra, E. MenakaResearch Area: Wireless Networks

Organisation: Vivekanandha Institute of Engineering & Technology for WomenKeywords: Fused Networks, Counters, HOL Blocking, Elevated Throughput, Squat Latency.

3. Protect Data Transfer Using Method of Generic Data Lineage Framework & Encryption Mechanism

Consider or Non ponder spillage of the mystery information data is a positively a standout amongst the most serious security issues in the association these days .Not just in the association, it ought to be extend to individual lives. The a lot of data are refreshed in PDAs and informal communities, this was the reason that oversights was occurred by people. This data is sideways exchanged to outsider and fourth gathering applications. For this present the Generic system demonstrate (i.e.) Data ancestry of LIME structure. By utilizing this model, it comprises of two parts: proprietor and purchaser information stream over numerous substances. And furthermore play out an extra part called reviewer. Construct and consolidate another technique for Accountable information exchange convention with the system. At long last applying the LIME structure and responsibility system to the information spillage situations

Published by: T. Sathya, R. Shamili, K. SudahDevi, J. JeyaramResearch Area: Network Security

Organisation: Vivekanandha Institute of Engineering and Technology for WomenKeywords: Lineage Framework, Accountability Data Transfer Method, Finger Printing, Robust Watermarking, Oblivious Transfer, Encryption Based Algorithm

4. Online Anomaly Detection Method Using Method of Support Vector Machine Algorithm

Conveyed registering is a trademark improvement of the no matter how you look at it gathering of the virtualization. It ensures more affordable IT, and additionally speedier, less requesting, more versatile, and more effective IT. In cloud conditions, a champion among the most unpreventable and urgent challenges for relationship in indicating security consistence is showing that the physical and virtual establishment of the cloud can be trusted – particularly when those system sections are asserted and supervised by outside organization providers. In ask for to remain adaptable to the external risks, a cloud needs the ability to react to alluded to perils, and to new troubles that target cloud establishments. In this paper we exhibit and look at an online cloud anomaly revelation approach, including conferred portions which are especially used for area in the cloud adaptability designing. We show that our peculiarity area plot i.e. Support Vector Machine (SVM) definition can accomplish a high revelation precision of over 90% while perceiving distinctive sorts of malware and DoS attacks. Moreover, we evaluate the upsides of considering both the structure level data and framework level data depending upon the attack sort.

Published by: V. Poomathy, R. RajagopalResearch Area: Network Security

Organisation: Vivekanandha Institute Of Engineering And Technology For WomenKeywords: Security, Resilience, Invasive Software, Multi-Agent Systems, Network-Level Security And Protection.

5. IOT Application in Education

“The Internet of Things allows people and objects to be connected Anytime, Anywhere, preferably by means of Any path/network and Any service.” In this article there is a brief overview of IoT areas and possible solutions of use in Education sector“. The article consists of three main parts: first, an overview of IoT applications, second, IoT in Education sector, and third, valued added things in education though IoT.

Published by: Shrinath S. Pai, Vikhyath, Shivani, Sanket, ShrutiResearch Area: Internet of Things in Education

Organisation: SGS BCA CollegeKeywords: Smart Education, Surveillance, BYOD, Security System, Alerts, IoT Applications

6. Prospective Study to Study the Effect of Routine Salpingectomy with Hysterectomy on Ovarian Reserve

Fallopian tube removal(salpingectomy) is being incorporated in routine hysterectomy procedures as there have been theories supporting less incidence of development of adenexal mass including ovarian tumour in post hysterectomy patients.Fallopian tube is also considered a reservoir of serous tubular intraepithelial carcinoma precursor cells, which are considered to be precursor of epithelial ovarian carcinoma, So studying the ovarian reserve before and after routine salpingectomy helps in deciding whether or not salpingectomy affects ovarian reserve in patients undergoing hysterectomy.As diminished ovarian reserve predisposes to onset of postmenopausal symptoms , one of the drawback of hysterectomy.

Published by: Nikita Mittal, Nisha Rani Agarwal, Ashish VermaResearch Area: Obstetrics & Gynaecology

Organisation: Banaras Hindu UniversityKeywords: Salpingectomy, Hysterectomy, Ovarian Reserve

7. A Pairwise Algorithm using Speech Separation and Pitch Estimation for the Deep Stacking Network

The Speech detachment and contribute estimation loud conditions are thought to be a "chicken-and-egg" issue. Pitch data is an one of the essential prompt for discourse partition. Also, discourse detachment makes pitch estimation simpler when foundation commotion is expelled. In this paper, we propose a directed learning design to take care of these two issues iteratively. The proposed calculation depends on the profound stacking system (DSN), which gives a technique to stacking straightforward preparing modules to manufacture profound structures. Every module is a classifier whose objective is the perfect paired veil (IBM), and the information vector incorporates otherworldly components, pitch based elements and the yield from the past module. Amid the testing stage, we gauge the pitch utilizing the partition results and refresh the pitch-based components to the following module. At the point when inserted into the DSN, pitch estimation and discourse detachment each run a few times. To examination technique demonstrate that the proposed framework result in both a top notch assessed twofold cover and precise pitch estimation and outflanks late frameworks in its speculation capacity.

Published by: Saranya .S, E. MenakaResearch Area: Wireless Network

Organisation: Vivekanandha Institute Of Engineering And Technology For WomenKeywords: Speech Separation, Pitch Estimation, Computational Auditory Scene Analysis, Supervised Learning, Ideal Binary Masking, Deep Stacking Network.

8. An IOT Integrated Gesture Recognition Using Image Processing For Speech Impaired People

Gesture is one of the most powerful and dramatic way of communications between human and computer. The method proposed here gives a real time gesture recognition system for speech impaired people to reduce the communication gap between the mute community and additionally the standard world. The proposed approach is capable of detecting gestures with good accuracy. The gestures shown in front of the system inbuilt camera is used for image processing. The Horn Schunck optical flow algorithm is used to track movements in the video frames. Gesture library is created by subdividing the data frames. Here hand movements are focused. For each gestures shown corresponding text and speech output is generated in MATLAB. The generated result is used for website updation in VB (Visual Basic).The python language is used for IoT integration, here the MATLAB and VB are connected via python. The VB provides text and speech output along with the website generated. The speech and the text output for the corresponding hand gestures shown can be accessed in any device by sharing the VB created and by providing the corresponding IP address of the source device. The matching score over multiple instances of training and testing is around 98%in MATLAB and VB gives 100% accuracy. This system is portable for the disabled to carry with them at their convenience. The basic objective of this project is to develop a computer based intelligent system that will enable speech impaired people significantly to communicate with all other people using their natural hand gestures.

Published by: Divya Sree .VResearch Area: Image Processing and IOT

Organisation: Jawaharlal College of Engineering and TechnologyKeywords: Horn–Schunck Method, HCI, Image Processing, Python, Visual Basic and Gestures

9. Palm Print Recognition Using Gabor Filter and Back Propagation Neural Network

Biometrics based person authentication methods are getting wide acceptance and they are replacing passwords because they are unique and secure. Palm print based person identification method is a technique which is more secure compared to other biometrics technique like finger print recognition, iris recognition and face recognition. Palm print recognition provides a unique identification of the people. Palm print identification method compares the input palm images with the images in the database. If the features of the sample palm images are matched with the features of the image of the palm in the database then it is considered as positive. In this proposed method, left and right palm print images of an individual is taken in six different orientations are taken. The orientation features are extracted using Gabor filter because it has multi resolution and multi orientation features. The orientation of the filter which gives the maximum filter response with the palm print is taken as the most dominant orientation of the palm print. Artificial neural network is used for classification because neural networks have the ability to learn complex input-output relationships. The learning process involve updating network architecture and connection weights so that the network can perform a specific classification efficiently. The back propagation neural network is used here. The back propagation is a multi-layer feed forward, learning network based on gradient descent learning rule. The back propagation neural network gives various performance analysis, error histogram, training state, confusion matrix and receiver operating characteristics graphs. This method provides better accuracy.

Published by: Shameem Fathima .M, Sethu RajResearch Area: Image Processing

Organisation: Jawaharlal College of Engineering and TechnologyKeywords: Gabor Filter, Back Propagation

10. Effect of online Admission Process on Students and Colleges in M.P

The University Grants Commission issued a directive to all Indian universities to conduct online admissions. One of the greatest advantages of the online application system is that applicants can choose to submit their applications at their convenience. Universities and educational institutions are also at a major advantage due to quick access to student’s records and databases, efficient systems for filtering out candidates. The online admission system is highly reliable and efficient and eliminates chances of errors, but there are some problems also. In India, though Internet penetration is rather high, internet connectivity and speed issues are major problems and unawareness of rural students prevent them to take admission timely.

Published by: Dr. Paras JainResearch Area: Education

Organisation: Silicobyte KDC Katni Degree College, Katni, M.PKeywords: Online Admission , Dynamic

11. Gesture Controlled Prosthetic Arm

This objective with design and implementation of an accelerometer based hand gesture controlled robot which is controlled wirelessly using a small low cost, 3- axis accelerometer. A novel algorithm for gesture identification has been developed to replace the approach of conventional controlling mechanism of Robots via buttons by an innovative hand gesture. In order to increase the use of robot in places where conditions are not certain like rescue operations, robots can be made to follow the instructions of human operator and perform the task accordingly.

Published by: Saifulla Khan, S. Selvaganapathy, V. Prasannakumar, Dr. T. S Udhaya Suriya, SolaimaniResearch Area: Biomedical Engineering

Organisation: Adhiyamaan College Of EngineeringKeywords: Prosthesis , Accelerometer

12. One Time Password Security Security System

One Time Password (OTP) is a security system which is used in these very broadly in every where thoses who work online. Mainly One time Password (OTP) is used for the Authentication of the real candidate, by this method we provide more security for the online system like wise online banking or online payment, railways, filling application form, education, etc. Generally OTP comes through mobile no or Email ID.

Published by: Devendra KumarResearch Area: OTP

Organisation: Kanpur Institute Of TechnologyKeywords: Time-synchronization, Hash Function, Inverse Function, EVM, RSA Security, 2FA, T-FA

13. Mobile Computing

A technology that allows transmission of data via a computer, without having to be connected to a fixed physical link. Mobile voice communication is widely spread throughout the world. And also it has a very rapid number of subscribers for different types of cellular networks. It also defines that a device which permits the flow of transmission of data from one computer to another by never been connected to the physical link. This technology has the ability to send and receive data through cellular network. This is the principle of mobile computing. The rapidly expanding technology of cellular communication, wireless LANs, and satellite services will make information accessible anywhere and at any time .It is human-computer interaction, by which human can communicate with computer. It allows normal usage like it allows for transmission of data, voice and video. In the near future, millions of people will carry a laptop computer. Now a days, most of the people also use this technologies. Some personal digital assistants, or personal communicators will run on AA batteries and it may have only a small memory; whereas larger ones and powerful will be a laptop computers with large memories and powerful processors. Mobility and portability will create an entire new class of applications and possibly new massive markets combining personal computer and consumer electronics. Mobile data communication has become very important and rapidly evolving technology .As it allows users to transmit and receive data from remote locations to other remote locations or fixed locations. This proves to be the biggest solution to the biggest problem of business people on the move or mobility.

Published by: Dipali KalantriResearch Area: Mobile Computing

Organisation: Ballarpur Institute of TechnologyKeywords: Existing cellular network architecture, Data Communications ,CDPD Technology: The Hot Cookie, CDPD Network Reliability, Principles of Mobile Computing, Devices, Mobile Data Communication, Applications of mobile computing, Limitations of mobile computing, Security issues involved in Mobile, Future, Conclusion, References.

14. Automatic and Effective Tracking of Hit & Run Misbehaviour Driver with Emergency Ambulance Support

The Instantaneous growth of technology has made our lives easier. The combination of communication technologies and vehicles provide assistance to people injured in traffic accidents and at the same time the person who caused such mishaps will also be adjudged. The rapid growth in the production of vehicles and also swift increase in human population have also increased the number of traffic hazards and the road accidents. This causes a huge loss of property and in most of the cases, the vehicle that caused the accident may escape and it becomes tedious to keep in track of these vehicles, especially during night time. If an accident has occurred at a particular location and it is assumed that two vehicles are involved, then the vibration sensor placed in front of these vehicles senses the vibration and gives the alert to the traffic police control server through the zigbee communication. Even if someone who caused the accident happens to escape without stopping, then the vibration sensors in vehicle send the corresponding GPS location to the Traffic Cops server via zigbee.

Published by: Prashanth .PResearch Area: Electronics and Communication

Organisation: S. A. Engineering CollegeKeywords: Arm Controller, Vibration Sensor, GPS, Zigbee

15. A Navel Approach for Monitoring Water Wastage with Motion Detection System Using Temperature and Moisture Sensor

Agriculture was the key development in the rise of sedentary human civilization, whereby farming of domesticated species created food surpluses that nurtured the development of civilization. In my project, temperature of environment can be calculated using Thermistor series which has precision integrated circuit temperature sensors from which output voltage is generated which is linearly proportional to the Celsius temperature. Thus, temperature of the surroundings can be calculated easily. This calculated information is end to the PIC microcontroller.

Published by: R. G. Gowrimanju, P. ManjulaResearch Area: Electrical and electronics

Organisation: Veltech Multi Tech Engineering CollegeKeywords: Water Wastage, Temperature Sensor, Moisture Sensor Float Meter, Mobile Android Application.

16. Comparison of Double Tube Cavity Receiver with Single Tube Cavity Receiver for Heat Loss

In the proposed research work the design of single tube cavity receiver is analyzed and a new design of double tube cavity receiver is proposed to reduce heat losses computationally using CFD software. A heat transfer and flow simulation are proposed for Single & double tube solar thermal cavity receiver at receiver inclination of 0° without the wind & 0.02kg/s mass flow rate of water at Inlet temperature of 90°C & ambient temperature of 30°. The Numerical study of convection losses in single & double tube cavity receiver of solar parabolic dish collector is proposed.Measurements of energy losses, temperature drops, wind speed, working fluid flow rate, and inlet-outlet temperatures of the working fluid are proposed to analyze the performance of Double Tube Cavity Receiver.

Published by: Sagar R. Pagar, Prof. J. H. Bhangale, Prof. V. G. BhamareResearch Area: Thermal Engineering

Organisation: MCOERC, Nashik, MaharashtraKeywords: Single Tube Cavity Receiver, Double Tube Cavity Receiver, Convection Losses etc

17. Modified Solar Thermal Cavity Receivers for Parabolic Concentrating Collector : Review

In India, we receive almost 80% of continuous solar radiation yearly. In order to make maximum use of this solar insolation, there are various solar thermal technologies of which one is concentrating solar power (CSP). Solar cavity receivers are more efficient technology as compared to solar trough technology. However, due to the complex design and losses in heat transfer in the form of convection, solar cavity systems have fallen behind in the world of alternative energy systems. In order to make cavity receiver technology more efficient various energy losses are to be considered and efforts should be made to minimize them. The parabolic concentrator reflects the direct incident solar radiation onto a receiver mounted above the dish at its focal point. The conversion of concentrated solar radiation to heat takes place in receiver. The heat transfer characteristics of the receiver changes during the rotation of the receiver which affects thermal performance. A heat transfer and flow simulation is performed for different solar cavity receiver’s viz.: cylindrical, cubical, conical, dome and spherical receivers at various receiver inclinations at constant temperature. The receivers are designed such that they have same surface area and aperture. It is observed that convective heat loss decreases as the inclination changes from 0° to 90°. Among these receivers, the convective heat loss for different geometries & different angle of inclinations are studied.

Published by: Sagar R. Pagar, Prof. J. H. Bhangale, Prof. V. G. BhamareResearch Area: Thermal Engineering

Organisation: MCOERC,Eklahre,NashikKeywords: Cavity Receivers, Heat Loss, Inclination Angles

18. Emerging Issues and Challenges in Banking and Financial Services on Indian Economy- Post Demonetization

The Government of India announced the demonetization of all Rs 500 and Rs 1,000 paper money of the Mahatma Gandhi Series On 8 November 2016,. The government claim that the action would stop the shadow (process of people making, selling, and buying things) and crack down on the use of illegal and (make fake money or goods) cash to fund illegal activity and terrorism. The sudden nature of the announcement and the lengthy cash shortages in the weeks that followed has created noteworthy disruption throughout the (process of people making, selling, and buying things), threatening money-based output. The move was heavily criticized as poorly planned and unfair, and was met with protests, lawsuits, and strikes. The purpose of this paper is to describe the changes that are happening in Indian Banking and related to managing money part/area as a hit/effect of demonetization. In trying to (ask lots of questions about/try to find the truth about) factors which may account for never-before-seen change, this study raises the pro's and con's of currency demonetization in different (related to managing money) Banking parts/areas. Data were collected through surveys that were mailed out to no. of people (who were part of a study, etc.) in Hyderabad. People (who were part of a study, etc.) in the study completed the survey (without revealing his/her name) and filled out a separate permission-related form. People who responded have appointments in a variety of departments, including Banking, Finance, Capital markets and Insurance parts/areas. People who responded were from variety of (related to managing money) Institutions from both private and public institutions, the majority being research oriented. To protect the (not knowing or telling someone's name) of the people who responded, we are not capable to list the institutions here or to further identify them. Secondary Data is collected from Internet and Newspapers. With the centre's decision to throw out/cancel old currency notes of Rs 500 and Rs 1,000 on November 8, 2016, the (related to managing money) part/area is now supporting structure itself to deal with the move's hit/effect. Experts say that it is a good move as it will bring more formal money in the (related to managing money) part/area.

Published by: V. KanakalathaResearch Area: Management

Organisation: St. John PG CollegeKeywords: Demonetization , Capital Markets ,Legal Tender.

19. Caste, Class and Migration

Caste, class, and Migration Dr.Om Prakash Manjhi PhD in sociology (IGNOU) Email:[email protected] Mobile No. 9911123484, 8800321680 Abstract India has the multicultural country. Diversity is the identity of this country, the social structure of Indian society different from other countries. Hindu, Muslim, Sikhs, Christian, Parsi community have lived there. Every society in India has classified into caste and class, both places rural and urban areas. The case of affirmative action for the untouchable or Dalits, in India, can be made both on account of historical deprivations as well as on grounds of persistent disparity and continuining discrimination . Affirmative action can be and is, viewed as a program of compensation for historical injustice and very few would argue with the contention that historically, Dalits suffered deep injustice, disparity, deprivation and discrimination .However, the case of affirmative action on grounds of contemporary disparities and discrimination is highly contentious. The case for caste based affirmative action in India caste based discrimination in labor, land, capital and consumer goods markets continued both urban and rural areas .Dr B. R. Ambedkar, an outstanding theoretician and one of the most important leaders of the Dalit movement drafted the constitution of India .Making affirmative for SC and ST as part of the constitution a move largely due to Ambedkar, ensured that it is mandatory and can not be questioned in theory. The recent upsurge in the cases of atrocities on scheduled castes and incidents of caste violence has per turned the entire socio-political ambience of the Indian society. The figure of atrocity on scheduled caste over the years has shown upward trend. They have suffered not only from economic exploitation but also from social discrimination. The situation has become worse than before because of the migration of population under economic pressure. This paper uses field study data from sample of migrants living area explore changes rural –urban continuum related to caste, class issue. Migration being an important contributory factor. It is also concern with issue raise from the caste and class conflicts. Caste and class violence in rural area. In addition to these causes, wide spread unemployment, underdevelopment, poverty the continuing feudal order and growing cases of corruption among local politicians and bureaucrats combined with socio-political and economic disparities among the upper, middle and scheduled caste have added new dimensions of the problem of naxal violence. The core question of this paper is that’’ Is government making affirmative action being implemented now and through this social changes has been seen in our society?’’ Key words: Affirmative action, Discrimination, Atrocity, Migration, Rural-urban continuum, Dalit movement,

Published by: Dr. Om Prakash ManjhiResearch Area: Socciology

Organisation: IGNOUKeywords: Affirmative action, Discrimination, Atrocity, Migration, Rural-urban continuum, Dalit movement,

20. A Conceptual View to Empower Medical Gadgets by Harvesting Energy using TEG

A 16-bit MSP430 controller version with an android app is uniquely intended for an incessant E-diagnosis system for remote patients, from their home to corresponding doctors and care takers. Existing framework running on GSM and wired link to exchange data between patients and doctor have its own particular confinement, for instance consistent upkeep, transportation, and dedicated care taker, which is costing more to the family members of the patient. It will be implemented by building up a framework which gets power from TEG module attached to patient and stores that same into battery banks with low bandwidth, which must play all the procedure without human interference and must carry out the work which current system is doing. Put away power will be utilized by controller to screen heart rate, temperature, and blood pressure and transmit SoS information utilizing Wi-Fi with CoAp architecture uncommonly intended for low bandwidth link. Essential block comprises of control unit, sensory, communication, power generation and conversion for adaptable and unending operation

Published by: Shwetha D M, Mrs. SumaResearch Area: IOT

Organisation: VVIETKeywords: Constrained Application Protocol; Internet of Things, Mixed Signal Processor, General Purpose Input Output, liquid Crystal Display.

21. Impact of School Environment on Achievement of Students

The school environment has important influence on student’s learning and development, including a significant aspect of their academic, social, emotional and ethical development. It helps students to prevent to deviate towards problematic behavior, school education time period is the time to broaden his horizon and to develop him into smart, confident and respectful adult. Schools responsibility is not limited up to academic but all aspects of life. Present study is focused on impact of school environment on academic, social, cultural and moral development of students.

Published by: Dr. Paras JainResearch Area: Education

Organisation: Silicobyte KDC Katni Degree College Katni, M.PKeywords: School Environment , Healthy , Academic Achievement

22. Association of Lower Extremity Biomechanical Factors with Pain Severity in Individuals with Patello-Femoral Pain Syndrome

There is a significant risk of pain when undertaking physical activities. Abnormal biomechanics of the lower limb has been implicated as a causative factor for pain. Although there have been a large number of studies in this field, many lack consistency of definitions and methodology. A large number of these studies have been retrospective, and it is often impossible to identify the baseline population. The evidence suggests that limitation of range of ankle dorsiflexion, limitation of range of hip eversion, excessive joint laxity, leg length discrepancy, an excessively supinated or pronated foot, excessively high or low arches of the foot and a large Q-angle are risk factors for pain. On the other hand, there is little convincing evidence that an abnormal range of ankle plantar flexion, genu varum or valgum or undue muscle tightness may be potential risk factors. All of these biomechanical abnormalities need further evaluation as potential risk factors for pain. Any trials undertaken must endeavour to define and describe their methods fully, and ensure that their results are reproducible.

Published by: Girish Lavjibhai BaldhaResearch Area: Femoral Pain Syndrome

Organisation: Madhav UniversityKeywords: Pattelar Femoral Pain Syndrome, Biomechanical Factors.

23. One Time Password Generation from Retinal Images

Authentication is process in which right user will be given access to resource. Authentication protects resource to access from unauthorised user. There various traditional techniques are available for authentication. But these techniques have disadvantages. To overcome this disadvantages multi-factor authentication is used for authentication. In multi-factor authentication more than one authentication method is combined to perform authentication. One form of authentication that is mostly used with other forms of authentication for multifactor authentication is one time password (OTP). One time password is valid for one login session. In this paper we conduct survey of existing one time password generation methods.

Published by: Devendra KumarResearch Area: OTP

Organisation: Kanpur Institute Of TechnologyKeywords: Authentication, One Time Password (OTP), Security, Multi-Factor Authentication, RGB, Sobel, Dendrogram, Ratinal Image

24. Evaluation of Peak Expiratory Flow Rate and Forced Expiratory Volume in Indian Children with Suspected Asthma

The study was aimed to compare FEV1 &PEFR measurements in suspected asthmatic patient, to determine whether PEFR is also sensitive enough for challenge test in children with suspected asthma, and to study FEV1 or PEFR or both will be helpful in diagnosing asthma. Study was performed on 50 suspected childhood asthmatic (H/o episodic cough & wheeze)referred from paedriatic OPD ; aged 5-14 yr both male and female through Simple Random sampling .Test procedure was explained ,consent taken, performance of FEV1 and PEFR through PFT and peak flow master recorded. Subjects with FEV1 >80% predicted with no increase in symptoms (n=50) directly underwent exercise challenge test in form of spot jogging double the pulse rate, FEV1<80% predicted with increased symptoms (n=0) were given salbutamol inhalation before exercise challenge test. Post test spirometry and peak flow master values recorded. Statistical Software EPI INFO, version 3.4.3, paired “t” test, unpaired “t” test were with 0.05 as level of significance used, there was a good correlation found between FEV1 Pretest vs. PEFR Pretest, FEV1 Post test vs. PEFR Post test, Pretest PEFR (master) vs. Pretest PEFR (PFT), Post test PEFR (master) vs. Post test PEFR (PFT).Comparing PEFR measurement obtained through spirometer and peak flow meter was 0.04 which is significant. Hence concluded that PEFR is sensitive to air flow, PEFR master can be a tool in measuring lung function. PEFR master could be alternatively used in place where spirometer cannot be carried

Published by: Akanksha KaushalResearch Area: Physiotherapy

Organisation: ,district early intervention centre,National Health Misson, Ambikapur,Chattisgarh,IndiaKeywords: Asthma, Children, Spirometer, Peakflow Master,PEFR,FEV1

25. Motivation in the Workplace To Improve The Employees Performance

Motivation plays an important and essential element In order to feel employees good about their jobs and make them perform optimally. Many employees find money as a good motivator whereas some feel personally motivated through recognition and rewards. Motivation is very important in the workplace. As it directly affects the productivity of the employees. Unmotivated employees aren't able to contribute many efforts towards their job as compare to motivated employees. The motivation of the employees has always a major problem for the managers and leaders. A lot of research has been done on motivation by many scholars. Employers need to know their employees very well and use different strategies to motivate them based on their personal wants and needs. In this paper, I like to emphasis on the relevance of motivation in the workplace to improve the employee performance and productivity.

Published by: Daisy RajResearch Area: Management

Organisation: Keywords: Employees, Workplace, Motivation

26. Workplace Issues with Women

The affluence of this paper is the workplace issues that the women are facing in their workplace. This paper is designed to bring the light on the issue the even in this modern era women are sill fighting for gender equality

Published by: Daisy RajResearch Area: Management

Organisation: Keywords: Woman, Gender, Workplace.

27. An Integrated Approach for the selection of software requirements using Fuzzy AHP and Fuzzy TOPSIS Method

Software requirements selection (SRS) is an important research issue of the software requirements elicitation process. Different methods have been developed for the selection of software requirements by using the ant colony optimization, teaching learning based optimization, analytic hierarchy process (AHP), technique for order preference by similarity to ideal solution (TOPSIS), etc. Based on our literature review, we identify that existing methods for SRS do not support the integrated approach based on fuzzy AHP and fuzzy TOPSIS for the selection of software requirements from the set of requirements. Therefore, to address this issue in this paper we propose an integrated fuzzy AHP and fuzzy TOPSIS method for the selection of software requirements. Finally, the explanation of the proposed method is demonstrated with the help of a case study.

Published by: Arashiya Afrin, Mohd. SadiqResearch Area: Software Engineering

Organisation: Al-Falah University, Dhauj, Faridabad, New DelhiKeywords: Software Requirements Selection, AHP, TOPSIS