Volume 3, Issue 11

Volume 3, Issue 11

November, 2018

Research Paper

1. AR/VR: Future trends

Augmented Reality (AR) may not be as exciting as a virtual reality roller coaster ride, however the technology is proving itself as a really great tool in our everyday lives. From social media filters, to surgical procedures, AR is apace growing in quality as a result of it brings parts of the virtual world, into our universe, therefore enhancing the items we tend to see, hear, and feel. compared to different reality technologies, increased reality lies within the middle of the mixed reality spectrum; between the real world and also the virtual world. You'll probably ne'er move to Mars, swim with dolphins, run AN Olympic one hundred meters, or sing onstage with the Rolling Stones. however if computer game ever lives up to its promise, you would possibly be able to do of these things—and several more—without even going away your home. Unlike real reality (the actual world in which we live), virtual reality means simulating bits of our world (or completely imaginary worlds) using high-performance computers and sensory equipment, like headsets and gloves. Apart from games and entertainment, it's long been used for training airline pilots and surgeons and for helping scientists to figure out complex problems such as the structure of protein molecules.

Published by: Keshav TiwariResearch Area: Augmented Reality/Virtual Reality

Organisation: Independent ResearcherKeywords: Augmented reality, Virtual reality, Mobile technology, AR, VR, Future

Research Paper

2. Mobile phone guide to study abroad

The transition from being a dependent student to an independent individual is not an easy one. Life can get extremely challenging when you move away from the comfort of your home to another country. A new country means a new life and a new approach to solving day to day problems. Putting the pieces of the puzzle together and starting from the scratch, the first three to four months will pass in a blink of an eye. Thus to reduce this difficulty of starting from a scratch we present an android application which will provide you with the list of universities most relevant to your profile.

Published by: Shweta BhaleraoResearch Area: Android application

Organisation: Datta Meghe College of Engineering, Navi Mumbai, MaharashtraKeywords: Studying abroad, Foreign universities, Android application

Research Paper

3. Strength characteristics of recycled concrete aggregate with addition of steel fibres

We know construction activities demand a significant amount of natural materials in order to produce cement and aggregate. Procurement of these natural materials significantly modifies the natural sources and creates major environmental problems. . Furthermore, sustainable waste management is another major issue faced by countries all over the world. In order to minimize the environmental impact and energy consistency of concrete used for construction facilities, reuse of construction and demolition wastes can be a beneficial way which leads to sustainable engineering approaches to concrete mix design. The recycled concrete aggregate have some properties like the natural aggregates but the strength is less than the natural aggregates. So the strength of concrete made, recycled concrete aggregates is enhanced by addition of some additives. In this study steel fibres are added in concrete with recycled concrete to increase the workability of the concrete at same water cement ratio, in addition to increase in compressive, tensile & flexural strength of the concrete. Keywords:- Recycle Concrete Aggregate, Steel Fibre, Compressive Strength, Split Tensile Strength, Flexural Strength.

Published by: Chander Bhan, Manjit KaurResearch Area: Structure Engineering

Organisation: Indo Global College of Engineering Abhipur, PunjabKeywords: Recycle concrete aggregate, Steel fibre, Compressive strength, Split tensile strength, Flexural strength

Research Paper

4. Ice-cream: Fantasy triggering industrialization: A boon or bane to hearing

Ice cream is defined as “a sweet frozen food that is made from cream or milk products or both and is generally aerated (Beeton, Isabella, 1911). Nowadays, Industrialization is at its peak to beat the fantasy of Ice-cream lovers which catalyzes the recruitment of employees for the Ice-cream factory where the workers are more exposed to low temperature. This study provides a review of latest evidence relating to the understanding of the middle ear infections with effusion, current treatment maneuvers, their constraints, new areas of research, and new strategies for prevention and treatment. 110 workers were interviewed and examined by Otoscopic examination, Pure Tone Audiometry (Air Conduction: 250 Hz – 8 KHz & Bone Conduction: 250 Hz – 4 kHz at Octave and Mid-Octave frequencies) and Immittance Audiometry in a sound-treated room by using the modified Hughson Westlake procedure (Carhart and Jerger, 1959). It was observed that the Severity of Hearing Loss (ranging from mild to moderately severe) increases with increasing years of working experience (5-15 years). Maximum Workers were having a Moderate Conductive Hearing loss from Candy Section and Cold room as the Candy section has High atmospheric pressure & Humid condition and the Cold room had very low temperature i.e.-0.55c (31 F). The workers work more than 15 hours revolving between these two units. The continuous fluctuating exposure of the cold room and the candy section creates an imbalance in the middle ear pressure resulting in frequent episodes of Otitis Media. The present study determines the need of administration of Hearing checkups, Pneumococcal vaccines for prevention for the development of Otitis media, Compulsion for using ear protection devices, and decreasing the working hours for lessening the exposure of temperature and pressure variance (within limits). Providing ear health guidelines to the workers before joining and Organizing Hearing conservation programs.

Published by: Subhasmita Sahoo, Pragnya Paramita Prusty, Gajanan MohapatraResearch Area: Audiology

Organisation: Institute of Health Sciences, Bhubaneswar, OdishaKeywords: Ice-cream, Otitis media, Frostbite, Conductive hearing loss, Hearing conservation program

Research Paper

5. Impact of HR practice on employee engagement in IT companies with special reference to Mysore

Human resources refer to the set of individuals who make up the workforce of organization, business sector, or economy. "Human capital" is sometimes used synonymously with human resources, HRM professionals also need to help and support employees achieve and sustain high levels of engagement and performance. Performance management is an ongoing organizational process involving a wide range of activities that include identifying, assessing, and promoting individual and team performance for the purpose of achieving organizational objectives the researcher aims to measure the impact of HR practices on the human resource management processes of recruiting, training and development and maintenance of employees in the organization. The research has designed the null hypothesis with regard to the objectives of the research and the same would be tested under statistical study using, random sampling methods, stratification techniques, and suitable statistical tests, , it emphasizes the current need to develop human resource management processes and policies keeping in mind three major dimensions of HR management – Recruitment, Development and Maintenance.

Published by: Muralidhara S V, Dr. B S SubramanyaResearch Area: Human Resource

Organisation: Bharathiar University, Coimbatore, Tamil NaduKeywords: Journal of Human resources practices, Employee engagement, Magazine e-articles

Research Paper

6. Chinggis Khan: The conqueror

Chinggis Khan loomed large in the nightmares of medieval Europe and his image haunts the conscience of European and American leaders today as they instigate the return of Mongol troops to the ruins of Baghdad in what some see as a re-run of history. The man who became the myth lives on through a legacy which is very much alive and thriving today in a multitude of conceptions throughout the lands where he and his immediate descendants first established their writ. Beyond his military accomplishments, Chinggis Khan also advanced the Mongol empire in many ways. He decreed the adoption of the Uyghur script as the Mongol empires writing system. He also practiced meritocracy and encouraged religious tolerance in the Mongol Empire, and unified the nomadic tribes of Northeast Asia. Present –day Mongolians regard him as the founding father of Mongolia. Although known for the brutality of his campaigns and considered by many to have been a genocidal ruler, Chinggis Khan is also credited with bringing the Silk Road under the cohesive political environment. This brought communication and trade from North East Asia into Muslim Southwest Asia and Christian Europe, thus expanding the horizons of all three cultural areas.

Published by: Dr. Suraya BasuResearch Area: Mongolia

Organisation: University of Kashmir, Srinagar, Jammu and KashmirKeywords: Mongols, Mongol empire, North East Asia, Eurasia, Medieval globalisation

Case Study

7. Cache performance improvement using software-based approach

Cache usage is a common mechanism for increasing the speed and performance of memory access and are widely used from simple microprocessors to the complex multi core-based designs. It is seen that the cache is not well designed for the embedded systems as the performance is based on probability and is not deterministic. It is difficult to guarantee the time a data will be present or absent in the cache memory. So, it becomes difficult for the embedded system to use the ability of cache to increase the performance. Normally, many real-time systems simply switch off the cache technique and use the scheduler algorithm based on the worst time memory access. There is various software stack that provides the advantage of cache time without the limitation that a hardware-based cache offers. The paper talks about the different organization and operations of cache techniques found in generally used processors, signal processing units and microcontrollers.

Published by: Adarsh Mittal, Srishti ChadhaResearch Area: Memory And Systems

Organisation: Nvidia Graphics Pvt Ltd, Bengaluru, KarnatakaKeywords: Memory access improvement, Efficiency, Hardware-based cache, Software-based cache, Virtual memory access, Translation, Page access

Research Paper

8. Robust and reliable clock tree synthesis

The paper discusses various clock tree synthesis problems related to the robustness in sub-micron design nodes. The topic discussed include the clock polarity assignment problem for addressing the noise in power/ground, clock mesh design and synthesis problem for addressing the variation in clock delays and adjustable buffer delay assignment in order to support multi-voltage mode designs and parameters. The paper talks about the clock tree synthesis and the issues and difficulties faced because of the requirement of clock balancing. There are various parameters to improve the quality of the clock tree. It is important to have a reduced pessimism in the work optimization problems and the proposed techniques with regard to the circuit reliability in deep submicron design technology. The following subsections cover 1) the clock polarity assignment problem for reducing peak current noise on the clock tree. 2) the adjustable delay buffer (ADB) allocation and assignment problem that is useful in the multiple voltage modes design environment.

Published by: Adarsh Mittal, Srishti ChadhaResearch Area: VLSI Domain And Computer System

Organisation: Nvidia Graphics Pvt Ltd, Bengaluru, KarnatakaKeywords: Clock tree improvement, Efficiency, Clock design, Clock tree constraints, Embedded systems and system on chip

Survey Report

9. Digital education in Africa: An approach towards success for a better and advanced future for adult and children

As a part of the Educational growth in various parts of the underdeveloped areas throughout the country it’s a challenge for an educator to face hurdles in the society through various sources. By understanding the hurdles through the process of transforming the poor background and illiteracy it’s the Education itself that has found a way to minimize the risk of illiteracy in both Adults and children with rural background with a flexibility to learn while you go by going through a proper study of conditions of the people and their economy.

Published by: Harsha Mario Akano, Wahab Akano, B. RavibabuResearch Area: Education

Organisation: Siddharth Institute of Engineering and Technology, Veerappareddi Palem, Andhra PradeshKeywords: Flexibility, Illiteracy, Rural, Transforming, Hurdles

Case Study

10. Dangerously leaking nose

Cerebrospinal fluid(CSF) rhinorrhea is a symptom caused by the leakage of CSF into the nasal septum, resulting from a defect in the skull base. Bacterial meningitis following CSF rhinorrhea is seen even in immunocompetent individuals. Meningeal infection with Mycobacterium tuberculosis is an example of a form of meningitis where difficulties in diagnosis and management regularly occur. However tubercular meningitis(TBM)is very rare and there is still no diagnostic method, which is both sufficiently rapid and sensitive.

Published by: Soham Mukherjee, Himanshu Bhagbole, Suraj Kumar, Krishna KumarResearch Area: Pharmacology, Medical Sciences

Organisation: Perm State Medical University, Perm, RussiaKeywords: Cerebrospinal fluid rhinorrhea, Tubercular meningitis, CT paranasal sinuses, Bone erosion, Anti tuberculous drugs

Review Paper

11. A review paper on Support Vector Machines for image retrieval

Image retrieval is an imperative zone of advanced image preparing. An image can be recovered from a huge database on the premise of content, shading, structure or content. Content-based image retrieval utilizes the visual contents of an image, for example, surface, shading, shape, and spatial format to speak to and list the image. In normal CBIR frameworks, the visual content of the images in the database is extricated and portrayed by multi-dimensional component vectors. The component vector of the images in the database frame an element database. To recover the images, clients give the retrieval framework precedent images. The framework at that point changes these precedents into its interior portrayal of highlight vectors. In this paper we present the audit on different content-based image retrieval strategies

Published by: Nasib Kaur, Sukhdeep KaurResearch Area: Digital Image Processing

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: CBIR, Content based image retrieval, Image retrieval, SVM

Research Paper

12. Modified Support Vector Machines approach for image retrieval

Content-based image retrieval uses portrayals of highlights that are naturally extracted from the images themselves. Almost the majority of the current CBIR frameworks take into account questioning by-precedent, a method wherein an image (or part of an image) is chosen by the client as the inquiry. The framework separates the component of the question image, scans the database for images with comparative highlights, and displays significant images to the client arranged by similitude to the inquiry. In this specific circumstance, content incorporates among different highlights, perceptual properties, for example, surface, shading, shape, and spatial connections. Numerous CBIR frameworks have been produced that think about, break down and recover images based on at least one of these highlights. A few frameworks have made different degrees of progress by joining both content-based and message based retrieval. In all cases, in any case, there has been no complete end with respect to what highlights give the best retrieval. In this paper, we present a changed SVM system to recover the images like the inquiry image.

Published by: Nasib Kaur, Sukhdeep KaurResearch Area: Digital Image Processing

Organisation: Adesh Institute of Engineering and Technology, Faridkot, PunjabKeywords: SVM, Modified SVM, Content based image retrieval, CBIR

Research Paper

13. IoT based border alert and secured system for fisherman

An embedded system which protects the fishermen by notifying the country border to them by using Global Positioning System (GPS) and Global system for mobile communication (GSM). Using GPS, we can find the current latitude and longitude values and is sent to the microcontroller unit. Then the controller unit finds the current location by comparing the present latitude and longitudinal values with the predefined value. Then from the result of the comparison, this system aware the fishermen that they are about to reach the nautical border. Looking at this operation from an IoT (Internet of Things) lens, and taking account of the latest technology, it seems necessary and desirable to integrate the data sources to make sure that the perspective that needs is based on a complete picture of the situation – not just whether the traveler or a vehicle is on the watch list. This paper looks at some of the issues and opportunities that appear to be worth considering. It is necessarily a cursory look presented in the hope that it will be of use as the thought process for such a project starts. These are strictly personal views of the authors who have no connection with any law-enforcement agency If the boat enters the zone nearer to the restricted zone the alarm will turn on and the speed of the boat engine automatically gets controlled by the concerned authority and once it touches the restricted zone and its pulled back to the non restricted area.

Published by: Uthayakumar Jothilingam, Liston Deva GlindisResearch Area: IoT

Organisation: Dhanalakshmi Srinivasan College of Engineering, Coimbatore, Tamil NaduKeywords: Global Positioning System (GPS), Global System for Mobile communication (GSM), Nautical border

Research Paper

14. Human rights violations in Myanmar: Rohingya case

Myanmar gained its independence in 1948 and faced a military coup in 1962. The country was ruled by a military dictatorship for two generations. During the period of military dictatorship, the economy, social order, cultural diversity, and political freedoms had been continuously decreased. In addition, there had been an increase in human rights violations. Today, Myanmar human rights violations are one of the worst countries in the world. In particular, human rights violations against ethnic minorities have increased dramatically. As a result of these human rights violations increasing, armed conflicts started between many ethnic minorities and army. This paper examines human rights violations against ethnic minorities in Myanmar. The human rights violations of the Myanmar regime against ethnic minorities have been analyzed in depth with the case of Rohingya.

Published by: Ahmet Yiğitalp TulgaResearch Area: Human Rights Violations

Organisation: National Sun Yat Sen University, Kaohsiung, TaiwanKeywords: Myanmar, Ethnic minorities, Army force, Human rights violations, Rohingya

Review Paper

15. Impact on learning and teaching with cloud computing

In today’s technology based world, using cloud based learning, teachers are improvising on teaching methodologies by integrating modern technologies such as blended learning and collaborative learning, thus creating an effective learning environment for students In a rapidly evolving technological world, cloud computing is an emerging trend that has firmly sunk its footprints in a surplus of industrial verticals. Importantly, the cloud is proving to be an important backbone in the modern education sector. Cloud computing is a very important low cost entry to education market for many small, medium and upcoming educational institutions, due to the pay as you use pricing framework, and delegation of resource and computing tasks to remote cloud data centers. Hence if today, I want to open a community college, if need not worry about buying strong supercomputers, databases, servers, and physical support staff for them, for my computing, record keeping and other cyber-dependent tasks etc. I can just delegate them to the cloud, which provide results back to cheap thin clients at your college. Thus there is reduced investment, hence I can charge my students less for their fees, if I want to keep my profits constant. During vacations, nothing is used, so no pay is required, during end semester you can have more traffic and then you pay more as you use. As you could see there is a tremendous benefit for students, colleges and university administration. Cloud Computing is a very low cost entry to accessing large scale infrastructure for imparting effective computer science education and experiments that need to test big data, massive parallel algorithms etc. The students could also benefit by lesser fees, because of reduced investment and maintenance of in house cyber infrastructure. This paper focuses on the impact on the learning and teaching with cloud computing and show the beneficial of the cloud computing in Educational sector.

Published by: Shartaj FatimaResearch Area: Cloud Computing

Organisation: King Saud University, Riyadh, Saudi ArabiaKeywords: Cloud computing, Educational sector, Learning, Teaching, Space-saving technology, Collaborate