VOLUME 8 Issue 4

10 Jul

Audio Signal Classification System With Visual Analysis: A Survey

Authors- Krishna Kumar, Dr. Kapil Chaturvedi, Dr. Kalpana Rai

Abstract- Audio signal classification system analyzes the input audio signal and creates a label that describes the signal at the output. These are used to characterize both music and speech signals. The categorization can be done on the basis of pitch, music content, music tempo and rhythm. The signal classifier analyzes the content of the audio format thereby extracting information about the content from the audio data. This is also called audio content analysis, which extends to retrieval of content information from signals. In this report the implementation of the audio signal classification is presented. A number of features such as pitch, timbral, rhythmic features have been discussed with reference to their ability to distinguish the different audio formats. The selection of the important features as well as the common techniques used for classification has been explained.

Computational Modeling and FEA On Automobile Disc Brake Using Ansys

Authors- M.Tech. Scholar K. Sai Pradeep, Prof.& HOD P.Kumar Babu

Abstract- Braking is a process which converts the kinetic energy of the vehicle into mechanical energy which must be dissipated in the form of heat. The disc brake is a device for slowing or stopping the rotation of a wheel. The main objective of the project is to design and analysis of solid and ventilated disc brake using CATIA and Finite Element Analysis is going to perform by using ANSYS. As a part of the analysis static structural analysis and thermal analysis will conduct at various velocities by varying material properties such as Steel, Aluminum and Aluminum Metal Matrix Composite in pre-processing stage. Based on the results obtained from Coupled Analysis (Structural & Thermal analysis), a better performing material is identified based on stress distribution reduction percentage for the development of a disc brake which improves efficiency.

Experimental Investigation of The Performance and Effect of Silica Fume in Cement Concrete

Authors- M.Tech. Scholar Vaibhav Saxena, Assistant Professor Mr. Anuj Verma

Abstract- This paper work deals with the increased use of silica fume in a concrete material numerous effort are made to optimise the extent of replacement in the previous modules extensive work were done to find the optimised extent of replacement of cement with silica fume as 13%. Test of this optimum replacement were also done on beams and short columns to confirm the result. Production of silica fume concrete is done on case-to-case basis depending upon the specific requirement with regard to any parameter of importance or consideration. An attempt in made to define a comprehensive method of proportioning silica fume concrete. The method is also tested for only one parameter that is compressive strength.

Multifunctional Orbital Surgical Retractor for Visualizing Tension

Authors- Ma Mingshen, Zhao Haixia

Abstract- This study discloses a multifunctional orbital surgical retractor with visible pulling force, which can quantify the pulling force and realize intraoperative visibility. It provides a guiding role for doctors in surgical operations and prevents eyeballs and nerves from excessive tension. Muscle and surrounding tissue damage, further reduce the incidence of surgery-related complications, improve the efficiency of surgery and instrument portability, and reflect the device’s versatility.

Driver Drowsiness and Alcohol Detection System Using Arduino

Authors- Archana Jenis M.R M.E., Assistant Professor Soban Mathew. J., Priya Dharshini R., Binuja B.

Abstract- Drowsiness in driving causes the major road accidents. Now a day’s drowsiness due to drunken driving is increasing. If driver is found to be drowsiness in eyes more than 5 secs, then the eye blink sensor senses the blink rate. If the eyes are found to be closed, then the speed of the car slows down. In our proposed system, along with drowsiness,alcohol detection is also detected by using alcohol MQ3 sensor. If alcohol is detected in driver’s breathe, then the car slows down. These sensors are interfaced with Arduino UNO.LED glows in case of alcohol detection and buzzer rings in case of drowsiness detection and speed of the car varies on detection of both cases.

Review of Image Analysis Based on Aura Images

Authors- Research Scholar Manjula Poojay, Yarramalle Srinivas

Abstract- The human body consists of a lot of mysteries. The research in this direction helps to bring out various interesting issues and characteristics that can be further used towards the extension of research work in this direction on individual based on human bio-field. The research in this direction promises to understand about the individual state of mind, health conditions and other related factors. Several advancements in this direction have been coined with very intuition to understand and interpret the human bio-field to underline the human life more effectively. This article presents some of the interesting works that have been carried out by eminent researcher in this state-of -art to give a better insight for further development of works in this direction.

A Review on Block Chain in Cloud Computing Healthcare Data Security

Authors- Ashish Gupta, Akhilеsh Bansiya

Abstract- The main goal of the project is to safely store and maintain patient records in the health care area. Healthcare is a data-intensive domain where large amounts of data are created, distributed, stored and accessed every day. Blockchain technology is used to protect medical data hosted in the cloud. Health care data contains personal and sensitive information that may be attractive to cyber criminals. For example, cyber criminals seeking to gain financial benefits from the theft of such data may sell the data to a third party who can perform data analysis to identify individuals who cannot be insured due to their medical history or genetic illness. Some organizations or industries may be interested in such data. A block of medical data and a timestamp Cloud computing connects to various healthcare providers. It gives healthcare providers access to patient information more securely anywhere. It stores data from attackers. Before outsourcing to the cloud, the data is encrypted. Healthcare providers must decrypt data before downloading.

Classification of a Bank Data Set Using Various Machine Learning Approach

Authors- Vishakha Namdev

Abstract- In today’s business world, characteristic the shoppers and analysis of their behavior is vital for industry. client Relationship Management (CRM) is that the method of maintaining profitable client relationships by delivering client price and loyalty. Moreover, CRM helps to boost the business relationships with customers. The goal of CRM is to maximize the period of time price of a client to a corporation. client period of time price (CLV) will rank and classify customers supported their period of time price to spot valuable customers and retain them. There square measure many models for cardinal estimation exploitation the past information of shoppers. This subject helps organizations in their makes an attempt to retain valuable customers. The banks should use applicable data processing techniques to extract pattern from the present data to realize competitive advantage. Therefore, Machine Learning techniques have a vital role to extract the hidden data and knowledge and The goal of this study is to review data mining techniques used for analyzing bank customers in order to help the banks to better identify their customers and design more efficient marketing strategies. The literature covered in this paper is related to the past seventeen years (2001–2017) and these approaches are compared in terms of data sets, prediction accuracy, and so on. We also provide a list of data sets available for the scientific community to conduct research in this field. Finally, open issues and future works in each of these items are presented.

A Review on Heat Transfer Enhancement in Tubular
Heat Exchanger Using Twisted Tape

Authors- Siddharth Soni, Prof. Brijendra Kumar Yadav

Abstract- The twisted tape inserts have been used as a heat transfer enhancement device in last few
decades and particular most widely used in heat exchangers to reduce their size and cost. Twisted tapes
(TT) are also one of the well-known swirl generators due to their easy installation and low cost. In
addition, the existing studies almost focused on the effect of heat transfer enhancement in the tube side,
and there are limited studies about the heat transfer enhanced results on the shell side of the corrugated
tubes, especially the outward convex corrugated tube. Furthermore, there are few relevant articles on
comparing the heat transfer performance of the tube and shell side. In this paper, the studies done
related to twisted tape inserts are reviewed.

Wine Quality Prediction Using Different Machine Learning Techniques

Authors- Bhavya AG

Abstract- In recent years, most of the industries promoting their products supported the standard certification they received the products. The normal manner of assessing product quality is time overwhelming, but with the invention of machine learning techniques, the processes has become a lot of economical and consumed less time than before. In this paper we’ve explored, a number of machine learning techniques to assess the standard of wine supported the attributes of wine that depend on quality. We’ve used white wine and red wine quality dataset for this analysis. We’ve used a completely different feature choice technique like a genetic algorithmic rule (GA) based feature selection and simulated annealing (SA) based feature choice to envision the prediction performance. We’ve used completely different performance measure such as accuracy, sensitivity, specificity, positive predictive value, negative predictive value for comparison using different feature sets, and different supervised machine learning techniques. We’ve got used nonlinear, linear, and probabilistic classifiers. We’ve got found that feature selection-based feature sets able to provide better prediction than considering all the features for performance prediction.

Heat Transfer Enhancement in Tubular Heat Exchanger Using Twisted Tape

Authors- Siddharth Soni, Prof. Brijendra Kumar Yadav

Abstract- The twisted tape inserts have been used as a heat transfer enhancement device in last few decades and particular most widely used in heat exchangers to reduce their size and cost. Twisted tapes (TT) are also one of the well-known swirl generators due to their easy installation and low cost. In this study the effect of varying Reynolds number on the different parameters such as pressure drop(Δp), Heat transfer coefficient(h), Nusselt number(Nu), Friction factor (f) on heat exchanger with twisted pipe inserts is studied. Three twisted tapes in case 1 and four twisted tapes in case 2 are inserted inside the pipe of the heat exchanger to increase the heat transfer rate and the air (fluid) is entered having different Reynolds number. The source of heat is provided at wall of tube and the heat input is maintained around 10kW. For the numerical simulation, the Reynolds number for each case is varied from 15000 to 25000 in steps of 5000. It is found that the highest pressure drop and heat transfer is find for the Reynolds number 20000 in the heat exchanger with 3 twisted tapes, and also it has highest thermal enhancement factor.

Android Devices Safety Review

Authors- M. Tech. Scholar Rumana Nigar Ansari, Prof. Lakshita Landge

Abstract- Right now, Smart-telephones and other Mobile gadgets have ended up being amazingly fundamental in all aspects of our life. Since they have comparative capacities as contrasted and work area furthermore, they end up being amazing as far as CPU (Central handling Unit), Storage and introducing a few applications. Therefore, in remote correspondence advances, security is considered as a significant factor, dominatingly in remote specially appointed systems and portable working frameworks. Besides, in view of increasing the scope of versatile applications contained by assortment of stages, security is considered as one of the most important and generous discussion as far as issues, accuracy, trustees and re liabilities. This paper presents a consolidated report of flourishing security on versatile application dais and offering data of indispensable dangers to the clients and the ventures. In addition, this paper presents an assortment of strategies just as techniques for security estimations, the examination and prioritization inside the peak of portable stages. Moreover, it builds mindfulness and comprehension of security on versatile application stages so as to maintain a strategic distance from legal sciences, discovery and countermeasures which are utilized by the working frameworks. At last, this investigation additionally contends about the security wings for popular versatile stages and examination for an assessment inside a most recent exploration in the field of portable stage security.

A Study on Compressive Strength of Concrete Replacement of Course and Fine Aggregete by Steel Slag and Quarry Dust

Authors- M.Tech. Scholar A. Bhargav Kumar, Asst. Prof. T. Chandrashekar, Associate Prof. K. Anusha

Abstract- – With the passage of time to meet the demand, there was a continual search in human being for the development of high strength and durable concrete. The history of high strength concrete (HSC) is about 35 years old, in late 1960s the invention of water reducing admixtures lead to the high strength precast products and structural elements in beam were cast in situ using high strength concrete (HSC). After the technology has come to age and concrete of the order of M60 to M120 are commonly used. Concrete of the order of M200 and above are a possibility in the laboratory conditions. The definition of high strength concretes (HSC) is continually developing. In the 1950s 34 N⁄mm2 was considered high strength concrete, and in the 1960s compressive strengths of up to 52 N⁄mm2 were being used commercially. More recently, compressive strengths approaching 138N⁄mm2 have been used in cast-in-place buildings. The dawn of pre-stressed concrete technology has given incentive for making concrete of high strength. In India high strength concrete is used in pre-stressed concrete bridges of strength from 35N⁄mm2 to 45N⁄mm2. Presently Concrete strength of 75 N⁄mm2 is being used for the first time in one of the flyover at Mumbai. Also, in construction of containment dome at Kaiga power project used High Strength Concrete (HSC) of 60MPa with silica fume as one of the constituent. High strength concrete (HSC) is used extensively throughout the world like in the gas, oil, nuclear and power industries are among the major uses. The application of such concrete is increasing day by day due to their greater structural performance, environmental friendliness and energy conserving implications. Apart from the usual risk of fire, these concretes are exposed to high temperatures and pressures for considerable period of time. In the present study, the different admixtures were used to study their individual and combined effects on the resistance of concrete in addition to their effects on workability, durability and compressive strength by the replacement of admixtures by 10%, 15% of silica fume &10%, 20% and 30% of fly ash by the weight of cement with a constant amount of 0.5% steel hook fibers are added by volume of concrete, throughout the study.

An Comparative Study of OPC And PSC With Partial Replacement of Different Pozzulonic, Materials

Authors- M.Tech. Scholar P.Hemanth Kumar, Asst. Prof. T. Chandrashekar, Associate Prof. K. Anusha

Abstract- – In the present investigation an attempt is made to compare various compressive strengths of cement mortar cubes. Mathematical models were elaborated to predict the strength of mortar cubes with 10% partial replacement of cement by various types of mineral admixtures with and without super plasticizers. The strength of cubes with different types of cement (OPC, PSC) after 3,7,28 and 90 days with 28 days curing and also durability tests after 60 days, have been analysed to evaluate the effect of addition content, the time of curing and the type of cement on the changes in compressive strength. The test results of selected properties of binders and hardened mortar cubes with admixtures are also included. The analysis showed that mortar cubes with admixtures is characterized by advantageous applicable qualities. The investigation revealed that use of waste materials like fly ash, micro silica, rice husk ash and ground granulated blast furnace slag, which are otherwise hazardous to the environment may be used as a partial replacement of cement, leading to economy and in addition by utilizing the industrial wastes in a useful manner the environmental pollution is also reduced to a great extent.

Review Paper on Wormhole Attack

Authors- Aditya Bhawsar, HOD & Professor Dr. Yogadhar Pandey

Abstract- – A Wireless Networks are more available to various sorts of assault than wired Network. One such assault is Wormhole Attack, in which traffic is sent and replayed starting with one area then onto the next through the Wormhole burrow without haggling any cryptographic methods over the system. Along these lines, it is trying to shield against this assault. In this paper we audit WSN idea and Wormhole Attack. At that point we examine order of wormhole Attack and furthermore notice not many of the activities to identify the Wormhole Attack.

Triple Error Correction Using Orthogonal Latin Square (Ols) Codes

Authors- Assistant Professor D. Sathyakala, Assistant Professor Ms. K. Suganya

Abstract- There are several Error Correction Codes (ECCs) are used to protect SRAM memories. To keep error free SRAM memory, an ECC has to be decodable in parallel and with low latency. The proposed codes for memory protection are Orthogonal Latin Square (OLS) codes. That provides low latency decoding and a modular construction. Few applications such as multimedia and signal processing, the effect of errors on the memory bits can be very different depending on their location on the word. Therefore, in these cases, it is more effective to offer different degrees of error correction for the different bits. This is achieved by Unequal Error Protection (UEP) codes. In this paper, UEP codes are derived from Triple Error Correction (TEC) Orthogonal Latin Square (OLS) codes. The derived codes are realized for an FPGA platform to calculate the decoder complexity and latency. The results show that the new codes can be realized with lower decoding delay The Proposed encoder and decoder are done by Verilog HDL and Simulated by Modelsim and Synthesized by Xilinx tool.

Effect & Strength Characterstics of Concrete Using Lime Sludge and Flyash

Authors- M.Tech. Scholar P. Varsha, Asst. Prof. T. Chandrashekar, Associate Prof. K. Anusha

Abstract- Concrete is a composite construction material composed of aggregate, cement and water. There are many formulations that have varied properties. The aggregate is generally coarse gravel or crushed rocks such as lime stone or granite, along with a fine aggregate such as sand. The cement commonly Portland cement and other cementations materials such fly ash and slag cement, serve as a binder for the aggregate. Various chemical admixtures are also added to achieve varied properties. Water is then mixed with this dry composite which enables it to be shaped and then solidified and hardened into rock-hard strength through a chemical process called hydration. The water reacts with the cement which bonds the other components together, eventually creating a robust stone-like material. Lime sludge is generated from paper, acetylene, sugar, fertilizer, sodium chromate, soda ash industries, and water softening plants. Approximately 4.5 million tons of sludge in total is generated annually from these industries. Fly ash is a naturally-cementations coal combustion by-product. It is extracted by the precipitators in the smokestacks of coal-burning power plants to reduce pollution. About 120 coals based thermal power stations in India are producing about 112 million tone fly ash per year. In the present study, concrete cubes have been cast by replacing cement (0% and 5%) with fly ash and (0%, 5%, 10% and 15%) and lime sludge. The method adopted in this investigation is as per the IS code specifications.

Survey on Intrusion Detection System Techniques and Feature Reduction

Authors- M.Tech. Scholar Pakija Sehar, HOD CSE Dr. Avinash Sharma

Abstract- As number of service execution is done on digital networks, so security of those plays an important role. Hence intrusion detection system were developed by researcher to increase the reliability of internet network users. This paper has focus on the network intrusion detection techniques proposed by researcher of this field. Different types of attacks done by intruders on the system, network, cloud, etc. This paper has finds some feature reduction survey as well which increase the intrusion detection accuracy. Classification of IDS techniques was also performed. Various evaluation parameters were summarized for the comparison of methods.

Industry 4.0: Digital Twin and its Industrial Applications

Authors- Hitesh Hinduja, Smruti Chourasia, Hrishikesh Bharadwaj Chakrapani, Shreya Kekkar

Abstract- Digital Twin is a burgeoning technology aided with advancement in artificial intelligence (AI), internet of things (IoT) and availability of enormous amounts of data. In spite of this, it is yet to be accepted and adopted by majority of the industries. Digital replicas of physical objects and processes can be used in the decision-making process by the stakeholders in various industries to increase the efficiency and get the desired results at a faster pace. In this paper we aim to discuss the plethora of use cases that digital twin can ameliorate and optimize.

Survey of Energy‑Aware Cluster Head Selection Techniques in Wireless Sensor Network

Authors- Rajesh Rekwal , Assistant Professor Lokesh Parashar

Abstract- Recently, wireless sensor networks (WSNs) are becoming very famous as they are inexpensive and easy to maintain and manage. The network contains a group of sensor nodes, which are capable of sensing, computing, and transmitting. Energy efficiency is one of the most important challenging problems in WSN. Sensor nodes have inadequate energy and installed in remote areas. Hence, it is difficult to restore the batteries in WSN. Therefore, to maximize the network lifetime, appropriate clustering techniques and cluster head (CH) selection methods should be implemented. The main idea behind the cluster- ing technique is that it clusters the sensor nodes and reduces the composed data simultaneously and then, it broadcasts the data. In this process, CH selection is an essential part. Therefore, this survey paper provides an overview of the clustering techniques for reducing energy consumption by reviewing several CH selection techniques in WSN that provide high energy efficiency. Several techniques have been employed for CH selection based on partitional clustering, optimization, low-energy adaptive clustering hierarchy, hierarchical, distributed, and other classification methods. Finally, an analysis is done based on the implementation tools, metrics employed, accuracy, and achievements of the considered CH selection techniques.

Industry 4.0: Digital Twin and its Industrial Applications

Authors- Hitesh Hinduja, Smruti Chourasia, Hrishikesh Bharadwaj Chakrapani, Shreya Kekkar

Abstract- Digital Twin is a burgeoning technology aided with advancement in artificial intelligence (AI), internet of things (IoT) and availability of enormous amounts of data. In spite of this, it is yet to be accepted and adopted by majority of the industries. Digital replicas of physical objects and processes can be used in the decision-making process by the stakeholders in various industries to increase the efficiency and get the desired results at a faster pace. In this paper we aim to discuss the plethora of use cases that digital twin can ameliorate and optimize.

Safe Vehicular Ad hoc Network: A Survey

Authors- Rajendra Thakur ,Assistant Prof. Lokesh Parashar

Abstract- VANET is next generation vehicular network and its applications will be play key to safe human life while journey on highway. Security is one of the key prominent factors for implement VANET in real environment. Different researchers already provide different solutions to make it secure from attacker and attacks in network. In this survey paper, discuss in detail the various computing methods and illustrate the relationship with vehicular network. Using these computing methods to secure the vehicular network from attackers and attacks. Trusted computing and Cloud computing are some of the types of computing methods which are already discussed in VANET. But still some computing method need to discuss the relationship with VANET and its security like Quantum computing and Pervasive computing.

Design & Simulation of Metamaterial for Wi-Max Operation

Authors- M.Tech. Scholar Garima, Asst. Prof. Shrishti Khurana, Asst. Prof. Gyanender Kumar,

Abstract- A metamaterial-based novel compact microstrip antenna is presented for Wi-Max applications. The antenna consists of a layer of metamaterial made by etching a crossed-shaped slots, on the the ground plane, respectively. The shunt inductance developed due to the patterned ground plane lead to the left-handed behaviour of the metamaterial. The proposed antenna has a compact size of 45.4 × 31.6 × 1.6 〖mm〗^3 and is fed by a 50 Ω microstrip line. Radiating patch is fractal antenna of star shape with 6mm side length. The impedance bandwidth (−10 dB) is from 3 GHz to more than 14 GHz with maximum radiation in the horizontal plane and tends towards a directional pattern as the frequency increases. Maximum gain 15.8533 db obtained from fractal antenna.

Design & Simulation of Microstrip Patch Antenna for UWB Applications

Authors- M.Tech. Scholar Rahul Singh, Asst. Prof. Gyanender Kumar

Abstract- Over the past one decade, there is a rapid growth in development of wireless communication applications. The performance of all such wireless systems depends on the design of the antenna. Microstrip antennas are preferred for majority of their applications and advantages. This paper presents the design and simulation of circular rectangular patch microstrip antenna. The overall antenna is designed and simulated in microwave tool High Frequency Structure Simulator (HFSS). The substrate used in this configuration is FR4 and substrate is used with ε_r = 4.4. The proposed antenna is used for various wireless communication applications. Gain, Return loss and bandwidth are the performance parameter of proposed antenna. The proposed antenna is analyzed at resonant frequency of 4.4 GHz. The return loss is -30.2 db and gain of antenna is 8.34. Bandwidth is improved upto 165.88%.

Dielectric Resonator Antenna for MIMO Applications

Authors- M.Tech. Scholar Phuritshabam Zenita, HOD Ravi Malik, Asst.Prof. Gyanender Kumar

Abstract- Multiple inputs, multiple outputs (MIMO) is an antenna technology for wireless communications in which multiple antennas are used at both the source (transmitter) and the destination (receiver). The investigation has been completely done throughout simulation work. The U Shaped DRA has high gain &best resonant frequency i.e. 3.52 GHz as compared to other shapes of DRA. U Shaped DRA have minimum return loss i.e -23 db at its resonant frequency 3.52 GHz Gain is also a factor improved by proposed antenna & it obtained as to 5.74 db Impedance Bandwidth of proposed antenna is also improved up to 92.3 % . Frequency Bandwidth is achieved upto 8.2 GHz used for UWB applications.

Design & Simulation of UWB Antenna for Microwave Imaging

Authors- M.Tech. Scholar Inbisat, Asst. Prof. Kirti Hooda, HOD Sumit Dalal

Abstract- This paper presents the design and simulation of multiband microstrip patch antenna using High Frequency Structure Simulator (HFSS).The T-slot configuration of multiband microstrip patch antenna is analyzed. The performance of designed antennas is analyzed in terms of return loss, bandwidth and gain. The substrate used in the configuration is FR-4 having dielectric constant 4.4. After analyzing, the return losses and gain of antenna is calculated. The proposed antenna is analyzed at two frequency 29 GHz & 31.5 GHz .The calculated result for return loss of multiband patch antenna is -33.59 db& -26.2588 and gain of patch is 7.5705 db& 8.7085db respectively.

Signal Re-Design Through Irc and Webster’s Technology in Bangalore Metropolitan

Authors- Madhan Kumar V, Renuka Prasad M

Abstract- In present study traffic studies will be carried out at the “G. palya and Jakkur traffic signal” order to re-design traffic signal timings according to present vehicular volume count and suitable precautions are to be suggested. In this method, the total cycle of the signal timing is determined which forms a total least delay occurring at signal. Traffic volume studies are to be made to determine the number, movement and classification of vehicles at the given location. The design of traffic signal is done according to Indian Road Congress and Webster’s method of signal design by adopting maximum passenger car unit (P.C.U) in the intersection of each direction. In present study traffic studies will be carried out at the “G. palya and Jakkur traffic signal” in order to re-design traffic signal timings according to present vehicular count and suitable precautions are to be given. After re-designing the signal timings by using IRC and Webster’s method, adopt highest total cycle length among two methods. Rapid growth of vehicles has resulted in traffic congestion at the intersection where there is absence of certain assets like traffic signals, timings, shortage of lanes etc. About 16 people die and 58 are injured every hour in India due to road accidents. The worst accident hotspots are near flyovers and junctions without signals. According to manual count with 15 minutes interval could be used to obtain the traffic volume data. The collected data is converted into PCU units. IRC and Webster’s method is a rational approach for signal design. The design is simple and is totally based on formulae’s laid down by IRC and Webster.

Design & Simulation of Wearable UWB Antenna for Body Area Network

Authors- M.Tech. Scholar Farhana Mohi Ud Din, Asst. Prof. Neeru Jakhar, HOD Sumit Dalal

Abstract- A low profile novel compact microstrip antenna is presented for super-wideband (SWB) applications. The proposed antenna is used to air bone radar system. The proposed antenna consists of a octagonal radiating patch and a partial ground plane. The substrate of the proposed antenna is made of Dacron fabric with permittivity 3. The ground plane is slotted with author name initials. Super wide bandwidth is achieved by optimizing the geometry, introducing a square slot in the partial ground plane and introducing novel slot pattern on the radiating patch of the antenna. This novel slot represents the “wireless antenna” icon which gives range of an antenna. The dimension of the proposed antenna substrate is 40×34×1.7 〖mm〗^3 and the bandwidth 10.969 GHz starting from 38.965 GHz to 49.9333 GHz for return loss less than -10 dB. The gain variation is from 3.2 dB to 11.2147 dB and average total efficiency more than 83%. Maximum power of 19.39 mW may be set as input to the proposed antenna in order to guarantee compliance with the IEEE C95.1-1999 safety standard. The proposed antenna design details and simulated results are presented by.HFSS.

Efficient Energy Management in Wireless Sensor Network

Authors- M.Tech. Scholar Navreena Majid, Asst. Prof. Neeru Jakhar, HOD Sumit Dalal

Abstract- In our work, we have to study the impact of heterogeneity of nodes, in terms of their energy, in wireless sensor networks that are hierarchically clustered. In these networks some of the nodes become cluster heads, aggregate the data of their cluster members and transmit it to the sink. It is assumed that a percentage of the population of sensor nodes is equipped with additional energy resources this is a source of heterogeneity which may result from the initial setting or as the operation of the network evolves. In our LEACH MAC protocols applied to heterogeneous network. Efficiency is improved as compare to traditional leach process.

Efficient Energy Management in Wireless Sensor Network

Authors- M.Tech. Scholar Navreena Majid, Asst. Prof. Neeru Jakhar, HOD Sumit Dalal

Abstract- A low profile novel compact micro strip antenna is presented for super-wideband (SWB) applications. The proposed antenna is used to air bone radar system. The proposed antenna consists of a octagonal radiating patch and a partial ground plane. The substrate of the proposed antenna is made of Dacron fabric with permittivity 3. The ground plane is slotted with author name initials. Super wide bandwidth is achieved by optimizing the geometry, introducing a square slot in the partial ground plane and introducing novel slot pattern on the radiating patch of the antenna. This novel slot represents the “wireless antenna” icon which gives range of an antenna. The dimension of the proposed antenna substrate is 40×34×1.7 〖mm〗^3 and the bandwidth 10.969 GHz starting from 38.965 GHz to 49.9333 GHz for return loss less than -10 dB. The gain variation is from 3.2 dB to 11.2147 dB and average total efficiency more than 83%. Maximum power of 19.39 mW may be set as input to the proposed antenna in order to guarantee compliance with the IEEE C95.1-1999 safety standard. The proposed antenna design details and simulated results are presented by. HFSS.

Evaluation of BER in LTE System using Various Modulation Techniques over different Modulation Schemes

Authors- M.Tech. Scholar Mehnaz Khursheed, Asst. Prof. Kirti Hooda, HOD Sumit Dalal

Abstract- Wireless communication is one of the mainly active areas of tools progress and has become an ever-more essential and prominent part of everyday life. Simulation of wireless channels accurately is very important for the intend and performance evaluation of wireless communication systems and components. We evaluated the act of available transmission modes in LTE. However, performance analysis can be done straightforward using evaluation of LTE. The performance of transmission modes are evaluated by calculating probability of Bit Error Rate (BER) versus Signal Noise Ratio (SNR) under the frequently used three wireless channel models (AWGN, Rayleigh and Rician). We will consider the data modulation and data rate to analyze performance that is BER vs. SNR. A comparative analysis of QPSK and 16QAM, 32 QAM and 64 QAM will also provide knowledge base which helps for application development in real-world.

A Implentation Of Brain Tumor Detection Using Convolutional Neural Network Algorithm

Authors- Abhist Kumar, Dr. Annapurna Singh

Abstract- Brain tumor identification is really challenging task in early stages of life. But now it became advanced with various machine learning algorithms. Now a day’s issue of brain tumor automatic identification is of great interest. In Order to detect the brain tumor of a patient we consider the data of patients like MRI images of a patient’s brain. Here our problem is to identify whether tumor is present in patients brain or not. It is very important to detect the tumors at starting level for a healthy life of a patient. There are many literatures on detecting these kinds of brain tumors and improving the detection accuracies. In this paper, we Estimate the brain tumor severity using Convolutional Neural Network with Hybrid Deep Learning Algorithm, algorithm which gives us accurate results.

Experimental Investigation on (Ggbs) Using Concrete and Steel Fiber

Authors- M.Tech. Scholar Naincy Gupta, M.Tech. Scholar Mohd Rashid, Asst. Prof. Nitish jauhari

Abstract- In our work experimental investigation is carried out to study the different strength characteristics of concrete with partial replacement of cement with ground granulated blast furnace slag (GGBS) and addition of steel fibre. In this investigation of M30 grade of concrete, cement is replaced with GGBS ground granulated blast furnace slag (10%, 20% and 30%) by weight and addition of steel fibers with different aspect ratio of 79 & 55 in different percentage (0.5%, 1% and 1.5%) to the weight of concrete. Economical and technical analysis has been done on GGBS and steel fiber concrete. workability of concrete and Strength of concrete was determined by performing compression test (150mm x 150mm x 150mm) size cube, split tensile test (150 mm diameter and 300 mm length cylinders) and flexural strength (100 mm x 100mm x 500mm) size beam. Finally, the strength performance of slag blended fiber reinforced concrete is compared with the performance of conventional concrete.

A Review on the Hydrothermal Performance of a Double Pipe Heat Exchanger Using Helical Tape Insert

Authors- M.Tech. Scholar Arshad Kamal, Professor Rohit Kumar Choudhary

Abstract- Nowadays, heat exchangers with twisted-tape inserts have widely been applied for enhancing the convective heat transfer in various industries such as thermal power plants, chemical processing plants, air conditioning equipment, refrigerators, petrochemical, biomedical and food processing plants. In general, twisted tape insert introduces swirl into the bulk flow which consequently disrupts a thermal boundary layer on the tube surface. The thermal performance of heat exchangers can be increased by heat transfer enhancement methods. Tape insert is one of the passive heat transfer enhancement method and used in most heat transfer application, for example, air conditioning and refrigeration systems food processes.

A Review on Dynamic Analysis of Laminated Composite using ANSYS

Authors- M.Tech. Scholar Mukesh Kumar Mandal, Professor Nitesh Kushwaha

Abstract- A laminate composite material consists of several layers comprising a composite mixture of fibres and matrix. Laminated plates used in structures are often subjected to dynamic loads. This needs the study of vibrational characteristics of these plates. Composite structures may sometimes provide with holes for the purpose of assembling the components, for passing the cables, for inspection and maintenance etc. The presence of holes may alter the nature of vibration of the plates. It is, therefore, important to analyse the vibration of laminated composite plates with central holes of different shape. Also, the effect of various parameters, e.g. boundary condition, aspect ratio, hole-size, number of layers, fibre orientation etc. needs to be analysed for a safe and stable design of structures. In this investigation a review on free vibration analysis of a composite plate is presented.

A Review of Educational Data Mining in Education System

Authors- M. Tech. Scholar Nandini Sahu, Prof. Lakshita Landge

Abstract- The disclosure of shrouded designs in educational data is a promising exploration in Educational Data Mining. The understudy’s accomplishment rate were decreased persistently is the serious issue in advanced education. To build the achievement pace of understudies the early conjecture method will assist the administration with guiding the helpless understudies at perfect time. To find the new examples from different data the data mining approach is broadly utilized. Moreover, here the data mining is utilized in educational field to separate shrouded designs. Order is utilized to group the records dependent on the arrangement set and furthermore it utilizes the example to classify the new records. This paper plans to show the different strategies of Educational data mining that controls the administration to make better move on understudies in danger.

Healthcare Data Manage using Blockchain Technology

Authors- ME Scholar Shradha Paliwal, Assistant Professor Yunus Khan

Abstract- Cross-institutional healthcare predictive modeling can accelerate research and facilitate quality improvement initiatives, and thus is important for national healthcare delivery priorities. For example, a model that predicts risk of re-admission for a particular set of patients will be more generalizable if developed with data from multiple institutions. While privacy-protecting methods to build predictive models exist, most are based on a centralized architecture, which presents security and robustness vulnerabilities such as single-point-of-failure and single-point-of-breach and accidental or malicious modification of records. In this article, we describe a new framework, ModelChain, to adapt Blockchain technology for privacy-preserving machine learning. Each participating site contributes to model parameter estimation without revealing any patient health information (i.e., only model data, no observation-level data, are exchanged across institutions). We integrate privacy preserving online machine learning with a private Blockchain network, apply transaction metadata to disseminate partial models, and design a new proof-of-information algorithm to determine the order of the online learning process. We also discuss the benefits and potential issues of applying Blockchain technology to solve the privacy-preserving healthcare predictive modeling task and to increase interoperability between institutions, to support the Nationwide Interoperability Roadmap and national healthcare delivery priorities such as Patient-Centered Outcomes Research (PCOR).

Question Answering System using A TF-IDF Method

Authors- Ragini Patil, Asst. Prof. Shailendra Tiwari

Abstract- A Fully functional query answering system has been quite popular among researchers. In this paper the design and implementation of an automatic query answering system is presented. In the proposed framework, inquiries are given as contribution to the model and every related inquiry and potential answers identified with that question over a limit esteem is recovered. In this methodology the information inquiry given is first preprocessed for standardization and normalization of information. Each question and their answers are considered as individual reports with each question connected with comparing answer answers are not preprocessed. Tokenization is performed on information and TF-IDF (Term Frequency-Inverse Document Frequency) is utilized to produce portrayal vectors of records. Information inquiry is likewise changed over to its vector structure. In the proposed framework, cosine similitude is utilized to discover the comparability between the info inquiry with the reports found in the dataset. This data can be utilized to give immediate answer to questions. The framework tried and actualized effectively on kissan call focus information.

Optimal Scheduling of Charging and Discharging of Electrical Vehicle

Authors- M.Tech. Scholar Shyama Kant Shandilya, Assistant Professor Dr. Puneet Pahuja, Assistant Professor Ashwani Kumar

Abstract- Uncoordinated charging of EV may lead to disturbances in the voltage behaviour in the system. Thus charging has to be coordinated for appropriate functioning of the power system. The main objective of the dissertation is to flatten the load of the day by utilizing centralized charging of electric vehicle. This report compares the centralized and decentralized charging of electric vehicle. Firstly centralized charging is performed on the load profile of the day then decentralized charging for the comparison between them. After that comparison is carried out in the performances of both of the charging. It is concluded in this report that the efficiency of flattening the peak load is higher for centralized charging instead of decentralized charging. Moreover it is shown with associated data that the deviations during decentralized charging are higher instead of centralized charging.

ANFIS Based Load Frequency Control of Multi Source Interconnected Power System

Authors- M.Tech. Scholar Sanjeev Kumar, Assistant Professor Dr. Puneet Pahuja, Assistant Professor Ashwani Kumar

Abstract- The frequency of the power system is varied by the variation in the load of power system, thus it created a load frequency control difficulty (LFC). The frequency distinction is highly objectionable and maximum tolerable frequency distinction is ± 0.5Hz. In this paper load frequency control is done by PID controller, Fuzzy and ANFIS Controller. Our control goal has to normalize the area control error (ACE), frequency error and tie-line power error despite the presences of system uncertainties and exterior load disturbance. The behavior of the planned controller is checked by means of MATLAB/SIMULINK software. The outcome show that controller provides speedy response, less undershoot and small peak overshoots with having minute state transfer time to make the final steady state. Load frequency control (LFC) is required for reliable operation of a large interconnected power system. The main work of load frequency control is to regulate the power output of the generator within a specified area with respect to change in the system frequency and tie-line power; such as to maintain the scheduled system frequency and power interchange with other areas in a prescribe limits. In this paper, study of LFC system for single area and double area non-reheat thermal system is carried out. Fuzzy logic controller is used for controlling the frequency and tie-line power deviation. The robustness of the fuzzy logic controller is seen for different loading condition. Frequency and tie-line power response of the interconnected areas have been compared on the basis of peak-overshoot, peak-undershoot and settling time. The result of the fuzzy logic controller is compared to that of with classical controller such as proportional derivative plus integral (PID) controller, and it is found that the convention controller response is slow as compared to the intelligent controller. This paper for single area, two area the helpfulness of PID , Fuzzy and ANFIS controller is confirmed.

Smart Thermostat and Door lock

Authors- Trideep Raj, Abhinav Kumar

Abstract- With the advent of 5G technology the world is going to usher into a new era where everything is connected and works seamlessly to provide human being an experience which they have never imagined. Home Automation is one such space where a lot of multinational companies and start-ups are venturing into. This will in true sense utilize the full capacity of next generation networking technology. In doing so it will also contribute to the reduction of carbon footprint of a person in long run. IoT (Internet of Things) is a hot topic of today and will be in near future. They will generate huge amount of data. This data will be used for understanding the user’s nature and will help serve them better. In this paper we present how some aspects of home automation can be made more efficient specifically thermostat and door lock/Unlock mechanism, where various sensors will be connected to each other and sharing information among themselves. This connection will be on Wi-Fi, as compared to the wired connection it gives us much more flexibility such as, changing the setup later or modifying the equipment with ease without the overhead of getting new wiring done. We will also see how to learn user’s behavior by analyzing the massive amount of data produced by various sensors in modern day IoT devices, how can we leverage this thousands GB’s of data using various machine learning algorithm and provide the customer/end users a seamless and fluid experience along with high level of security.

Feasibility Analysis of Single Effect Vapour Absorption System in Milk Processing Plant

Authors- M.Tech. Student Rahul Kumar Mehra, Prof. Sujeet Kumar Singh

Abstract- Milk is one of the best food available due to its nutrition values. For production of processed milk and other dairy products, quality Milk processing plants are required. Milk processing includes pasteurization, homogenization, evaporation, drying etc. In this study, system of a milk pasteurization process assisted by VAR is thermodynamic ally modeled. The whole energy requirement of the pasteurization system was supplied from Single Stage Libr VAR was used for both heating and cooling purposes. The heat exchangers were modelled with energy balances, based on the streams inlet and outlet enthalpies and mass flow rates. The refrigeration unit was based on a simple vapour compression cycle using LiBr as a refrigerant. The energy analysis of the model was based on the 1st law of thermodynamics. An EES code has been developed using computer simulation program for simulating the cycle and validation of results with experimental one. . The effect of exit temperature of generator, condenser and evaporator on COP, and heat load, have been analysed and validated with the operating parameters as generator temperature (75°C), absorber temperature (30°C), condenser temperature (30°C) and evaporator temperature (5°). It was found that the COP of the system increases with increasing the generator exit temperature and evaporator exit temperature while it is decreasing with increasing condenser exit temperature.

Information Protection on Android Application Devices

Authors- M.E. Scholar Priyanka Patidar, Assistant Prof. Devendra Singh Kaushal

Abstract- Today, everybody fundamentally requires an advanced cell. There are enormous measure of conceivable outcomes and various degrees saw in various zones of the portable world. With this fast development in portable administrations the analysts are frightened about the security dangers and are working upon it by making sure about the foundations which bolster the online-interface and other conveyed administrations. In this paper, we examine about utilizing AES calculation for dealing with the information of Android cell phones. The goal is to offer such types of assistance which can make sure about clients’ information. This information security procedure of PDAs is very novel.

Review of Wormhole Attack on Mobile Ad-hoc Network

Authors- M.E. Scholar Rupanshi Patidar, Assistant Professor Mr. Sachin Mahajan

Abstract- The wireless nature of communication makes WSNs unreliable as any attacker with intent to steal the data can do so by deploying malicious nodes in the network. The attackers can do so by launching black hole attack, wormhole attack, flooding attack, gray hole attack etc. Normally, the routing protocols designed to find shortest path from source to destination node. The path length is determined using hop count as metric. Out of many attacks defined above, the wormhole attack is dangerous one as it creates a tunnel by skipping few nodes in between them. The tunnel automatically reduces the hop length thus creating a short path between source and destination node. This paper presents brief survey about the schemes or techniques related to the detection and prevention of the wormhole attacks.

Review paper of Load Balancing technique in Cloud Computing

Authors- M.E. Scholar Srushti Patidar, Assistant Professor Mr. Amit Saraf

Abstract- Cloud registering shares information and give numerous assets to clients. Clients pay just for those assets as much they utilized. Cloud computing stores the information and disseminated assets in the open condition. The measure of information stockpiling increments rapidly in open condition. Along these lines, stack adjusting is a primary test in cloud condition. Load adjusting is dispersed the dynamic workload over various hubs to guarantee that no single hub is over-burden. It helps in legitimate usage of assets . It additionally enhance the execution of the framework. Many existing calculations give stack adjusting and better asset use. There are different composes stack are conceivable in Cloud computing like memory, CPU and system stack. Load adjusting is the way toward finding over-burden hubs and after that exchanging the additional heap to different hubs.

Question Answering System using A TF-IDF Method

Authors- Ragini Patil, Asst. Prof. Shailendra Tiwari

Abstract- A Fully functional query answering system has been quite popular among researchers. In this paper the design and implementation of an automatic query answering system is presented. In the proposed framework, inquiries are given as contribution to the model and every related inquiry and potential answers identified with that question over a limit esteem is recovered. In this methodology the information inquiry given is first preprocessed for standardization and normalization of information. Each question and their answers are considered as individual reports with each question connected with comparing answer answers are not preprocessed. Tokenization is performed on information and TF-IDF (Term Frequency-Inverse Document Frequency) is utilized to produce portrayal vectors of records. Information inquiry is likewise changed over to its vector structure. In the proposed framework, cosine similitude is utilized to discover the comparability between the info inquiry with the reports found in the dataset. This data can be utilized to give immediate answer to questions. The framework tried and actualized effectively on kissan call focus information.

Question Answering Schemes using NLP

Authors- M. Tech. Scholar Mohini Malviya, Assistant Professor Mr. Manoj Soni

Abstract- Question Answering (QA) system in information retrieval is a task of automatically answering a correct answer to the questions asked by human in natural language using either a pre-structured database or a collection of natural language documents. It presents only the requested information instead of searching full documents like search engine. As information in day to day life is increasing, so to retrieve the exact fragment of information even for a simple query requires large and expensive resources. This is the paper which describes the different methodology and implementation details of question answering system for general language and also proposes the closed domain QA System for handling documents related to education acts sections to retrieve more precise answers using NLP techniques.