ICRTES2020 · 2020. 10. 21. · convolutional neural network 14 04 15 santosh kumar singh dr. p. k....

78

Transcript of ICRTES2020 · 2020. 10. 21. · convolutional neural network 14 04 15 santosh kumar singh dr. p. k....

  • 1

    ICRTES2020

    Reschedule on 23rd August 2020

    ISBN - 978-81-937313-2-1

  • 2

    Dear Readers,

    It is my great pleasure to welcome you to the International Conference on Recent Trends in

    Engineering and Science on 9 th and 10th August 2020. The conference is all about the recent

    trends in Engineering and science domain like, Robotics, Mechatronics, Data Science,

    Internet of Things etc. This provides a forum for the presentations of new inventions,

    advances and research in the fields of all Engineering and Science domains.

    It is really praiseworthy that many eminent scholars have consented to join the conference

    online. I hope there will be very fruitful and innovative discussion on recent development in

    the field of Engineering and Science that may lead to some substantial finding in this field

    such that the new technology will help our society.

    The Conference would not have been possible without the enthusiastic efforts and hard work

    of both members of International Associations of Professionals & Technical Teachers and

    Members of Jagadambha College of Engineering & Technology, Yavatmal, India, especially ,

    Prof. Ram Kumar Solanki.

    We would like to express our appreciation to the Technical Program Chairs, for their valuable

    contribution in assembling the high-quality conference program.

    Warm regards

    Dr. Rajesh Kumar Tiwari

    Professor and Dean of Academic Affairs

    R.V.S. College of Engg. & Technology, Jharkhand

  • 3

    Dear Readers,

    It is a well-established fact that the difference between the educated and uneducated person is as great

    as that between living and the dead. So, organizing International Conferences is an addition of new

    feather to the crown of Higher Education.

    I must congratulate the entire team of this conference. This is a great initiative taken with systematic

    planning and united efforts for arranging a conference on the theme “ International Conference on

    Recent Trends in Engineering and Science”.

    I convey, warm greeting and best wishes to the participants, Speakers and Paper Presenters. I also

    wish the conference a grand success.

    Warm regards,

    Dr. M.H. Rahmani Doust

    Department of Mathematics, University of Neyshabur, Adib Blvd. Neyshabur, IRAN

  • 4

    Dear Researchers,

    The role of shaping the modern world that is being played by engineers can

    hardly be exaggerated. Hence the ultimate aim of our institute is to promote a

    multifaceted development of the students. Then only they would be competent enough to

    fulfil the ensuing demand of the society. The other aim of our institute is to play a

    protective role in the fulfilment of aims by imparting relevant theoretical and practical

    knowledge and adequate facilities in research and development." I would like to

    introduce you to one of the best educational institutions, Jagadambha College of

    Engineering & Technology, imparting quality education to the young people of the

    region & around.

    The theme of the conference is appropriate to the needs of the hour. I am sure the

    deliberations and technical presentations will be of use to the students, engineers, and

    faculty participating in the event. As secretary, I would like to wish 'Best of Luck' to the

    organizer, participants, and the entire faculty for their noble attempt and hard work

    towards making this International E-Conference a successful in this critical situation of

    lockdown period due to Covid-19. I wish the conference a grand success.

    Warm regards,

    Secretary

    Dr. Shittal A Watile

    J.B.G.V.S.,Yavatmal.

    Email:[email protected]

    mailto:[email protected]

  • 5

    Dear Readers,

    The current scenario is of intense competition with equal opportunity to all. The

    world has grown phenomenally in the last few years than ever before. Education plays an

    important role in the life because it is not only what you have but how much you know

    which determines your success today. The number of Research publications made by

    faculty members and students has increased day by day. Our college is committed to

    maintaining a great position in our f ield and professionally competent environment by

    encouraging the enterprising skills of our students. Our faculty members play a most

    important role in the overall development of our students and the institute. Today,

    JCOET is one of the fast growing colleges in SGBAU. We believe that we shall be

    counted amongst the best at the global level in the upcoming years.

    It is heartening to know that we have chosen right subject on the right time,i.e.

    lockdown period due to Covid-19 for the deliberations. I am confident that the

    conference will throw light on new areas of Engineering & Science technology. It will be

    fruitful to everyone. I wish the International E-Conference all success.

    Warm regards,

    Principal

    Dr. Hemant M. Baradkar

    Jagadambha College of Engineering & Technology

    ,Yavatmal.

  • 6

    Dear Readers,

    It is my great pleasure to welcome you to the First International E Conference on

    “International Conference on Recent Trends in Engineering and Science” (ICRTES-2020), as

    on date 9th & 10th Aug 2020, At your own Premises, on Video Conference, organized

    Jointly organized by IAPATT, Bengaluru and Jagadambha College of Engineering and

    Technology, Yavatmal, Maharashtra, India . It has been a real honor and privilege to serve as

    the organizer of the conference. During this lockdown period ICRTES-2020 has provided a

    cross-disciplinary venue for researchers and practitioners to address the rich space of

    Engineering & Science Technology. We organized International interdisciplinary E-

    conference which spans for two days. It includes Keynote presentations, & paper presentation

    events which will provide ample opportunities for discussions, debate, and exchange of ideas

    and information among conference participants. The conference would not have been

    possible without the enthusiastic and hard work of a number of colleagues. We are also

    grateful to all the authors who trusted the conference with their work. I am very happy that

    this conference got huge response from all over the country.

    We convey our sincere thanks to all session chairs, authors, co-authors of contributed

    papers and extend my heartiest good wishes and grand success for this conference and all

    participating delegates

    Warm regards,

    Prof. Ram Kumar Solanki

    Department of Computer Engineering

    Jagadambha College of Engineering & Technology, Yavatmal , Maharshtra ( India)

  • 7

    INDEX

    Sl.

    No. AUTHOR’S NAME TITLE OF PAPER

    Page

    No.

    01 SK. ABDUL PASHA,

    N. PREMA KUMAR

    VOLTAGE REGULATION IMPROVEMENT IN

    33-BUS OPEN LOOP DISTRIBUTION MODEL USING DISTRIBUTED-UNIFIED POWER

    QUALITY CONDITIONER

    12

    02 SUNANDA PANDITA DATA MINING IN STUDY OF

    BIOMOLECULES 13

    03 SUJAY V NAIR, NITIN NAGORI,

    DR. AMEYA NAIK

    SEGMENTATION OF IRREGULAR TISSUE GROWTH IN THE BRAIN USING

    CONVOLUTIONAL NEURAL NETWORK 14

    04

    SANTOSH KUMAR SINGH

    DR. P. K. MANJHI

    DR. R. K. TIWARI

    UCON BASED DATA PROTECTION PROTOCOL FOR CLOUD ENVIRONMENT 15

    05

    ARBIND TIWARY

    DR A K GUPTA

    DR R K TIWARI

    AN INNOVATIVE APPROACH IN HINDI TEXT STEGANOGRAPHY 16

    06

    ARBIND TIWARY

    DR A K GUPTA

    DR R K TIWARI

    A MODERN APPROACH OF TEXT

    STEGANOGRAPHY WITH ASCII VALUES 17

    07 SAHANA S

    DR. SHAKARAIAH

    DEVELOPMENT AND IMPLEMENTATION OF OVERLOAD HANDLING MECHANISM IN 5G

    REGISTERS 18

    08 IMMACULATE PRIYA C

    DR. GEETA KESAVARAJ

    SOCIAL MEDIA – AN AXIS TOOL FOR JOB

    HUNTERS 19

    09

    SREELAKSHMI SIVADASAN,

    SUBATHRA M,

    DEEPTHI PADMANABHAN,

    AMUDHA.P

    AN OVERVIEW OF PHYTOCHEMICAL AND

    PHARMACOLOGICAL POTENTIAL OF

    BACCAUREA SPECIES

    20

    10

    SANTOSH S. BANSODE

    NACHIKET S. DIGHE

    A REVIEW ON PHARMACOGNOSTIC, PHYTOCHEMICAL AND

    PHARMACOLOGICAL INVESTIGATION OF

    MARTYNIA ANNUA.

    21

    11 SACHIN ARJUN KADAM

    POST COVID-19 OPPORTUNITIES AND

    CHALLENGES FOR MICRO SMALL

    MEDIUM ENTERPRISES (MSMES)

    DEVELOPMENT IN INDIA

    22

    12

    KIRAN K. SHINDE

    NACHIKET S. DIGHE

    A REVIEW ON ESTIMATION OF VOGLIBOSE,

    GLIMEPIRIDE AND METFORMIN

    HYDROCHLORIDE IN BULK AND TABLET

    DOSAGE FORM

    23

  • 8

    13

    MOHD TARIK, MD SAIF MALIK PINKIYADAV

    HUSSAIN MUZZAFFAR, GAURAV NAGAR

    SMART WATER QUALITY MONITORING SYSTEM BASED ON IOT

    24

    14

    MOHAMMED ZAKIR HUSSAIN

    DR. PVS VARA PRASAD

    DR. YAMINI S VERMA

    ASSESSMENT OF WATER QUALITY INDEX

    MUSI RIVER COMMAND AREA 25

    15 MR. ABHISHEK D MEHER

    MR. NACHIKET S. DIGHE

    DEVELOPMENT AND EVALUATION OF

    TASTE MASKED FAST DISSOLVING ORAL

    FILM 26

    16

    MOHD SHAFI DAR

    ABU TAHIR

    DEEPAK KUMAR MITTAL

    PROTECTIVE EFFECT OF POLYGONUM

    PERSICARIA LINN EXTRACT ON CCL4

    INDUCED HEPATOTOXICITY IN ALBINO

    RATS

    27

    17 AKSHAY PATIL

    DR. GIRISH KOTWAL

    PLANT LAYOUT MODIFICATION USING

    SYSTEMATIC LAYOUT PLANNING 28

    18

    DR. SACHIN RAJENDRARAO

    DESHMUKH, PROF. MANISHA

    RAMRAO JADHAO

    EFFECT OF TIME ON DETERIORATION OF

    NUTRIENT INGREDIENTS PRESENT IN

    FRESHLY PREPARED FOOD 29

    19

    SUCHITA M. YADAV

    DR. YOGESH KUMAR SHARMA

    SATISH R TODMAL

    REVIEW OF SECURITY APPROACHES IN

    WIRELESS SENSOR NETWORK AGAINST

    SYBIL ATTACK 30

    20

    MEGHA V KADAM

    VINOD M VAZE

    SATISH R TODMAL

    COMPARATIVE ANALYSIS OF TRUST BASED AND CRYPTOGRAPHY BASED

    ROUTING SOLUTIONS FOR VEHICULAR AD HOC NETWORKS

    31

    21

    S. P. DHABALIA, H.N WATANE

    S. R. SAWAI, H. A. JOSHI

    D. A. DESHMUKH

    KIDS PROTECTION SYSTEM IN SCHOOL BUS

    USING IOT 32

    22 KAPIL SHARMA

    VIJAY KUMAR GARG

    DEMAND SIDE MANAGEMENT IN MICRO

    GRID: A REVIEW 33

    23 MS. SHILPA OSWAL

    PADMAJA JOSHI

    RECENT TRENDS IN AUTOMATION:

    ROBOTIC PROCESS AUTOMATION 34

    24

    SARITA PATIL

    DR. VINOD VAZE

    DR. PANKAJ M. AGARKAR

    RECOMMENDATION TECHNIQUES FOR

    B2B RECOMMENDATION 35

    25 RAVIRAJ S. GAIKWAD,

    DHANANJAY S. PATIL THE ECONOMICS OF LANDFILL MINING 36

    26 VIKRANT GANDOLE

    PROF. AKHIL GOTMARE

    ANALYSIS OF DIVERGENCE DETECTION

    IN TRANSPORT SYSTEM USING IMAGE

    PROCESSING

    37

    27

    SHREERAM V KULKARNI SANTOSH V, NANDAN R

    KIRANA KN

    SHASHIKIRAN R

    DETECT AND LOCATE THE POINT OF

    FAULT IN THE POWER DISTRIBUTION

    NETWORK EMPLOYING THE GSM

    TECHNOLOGY

    38

  • 9

    28 SWATI GANESH SWAMI,

    KALYANI NANDKUMAR DHULE

    REVIEW ON DEGRADATION OF

    CELLULOSIC WASTE: THE STEPS

    TOWARDS PROGRESSIVE RESEARCH

    39

    29

    KALYANI NANDKUMAR DHULE

    VISHAKHA SAKHARAM KAMBLE

    ANTIMICROBIAL ACTIVITY OF SPICES IN

    ORGANIC SOLVENT AGAINST

    PATHOGENIC BACTERIA

    40

    30 SHOHEB. S. SHAIKH

    DR. N. S. DIGHE

    A REVIEW ON ESTIMATION OF

    GLIMEPIRIDE, PIOGLITAZONE AND

    METFORMIN HCL IN BULK AND IN

    PHARMACEUTICAL DOSAGE FORM

    41

    31 MAMATHA A G

    DR. P. M. HADALGI

    EFFECT OF SLOT LENGTH ON MICROSTRIP

    ANTENNA FOR TRIPPLE BAND

    APPLICATION 42

    32 NANDITHA N VARMA

    SENTHIL MURUGAN

    HARDWARE IMPLEMENTATION OF SIMPLE

    LINEAR REGRESSION AND ITS MODELLING

    IN PYTHON AND MATLAB 43

    33

    VIPIN Y. BOROLE

    SONALI B. KULKARNI

    PRATIBHA R. BHISE.

    SOIL PROPERTIES ASSESSMENT IN SURFACE AND SUBSURFACE USING

    SPECTRORADIOMETER FOR RAVER TEHSIL

    OF JALGAON DISTRICT

    44

    34 ANKUSH GUPTA

    SANTOSH KUMAR

    BRAND LIST BASED HYBRID ANTI-

    PHISHING DETECTION APPROACH 45

    35 PRATIDNYA HEGDE PATIL,

    KIRAN DAVULURI

    SPEECH TO TEXT TRANSCRIPTOR AND

    SUMMARIZER: A MARKETING STRATEGY

    TOOL USING BUSINESS INTELLIGENCE

    AND DATA ANALYTICS

    46

    36 SUBHRANIL DAS A BRIEF REVIEW ON MATHEMATICAL

    MODELLING ON PARKINSON DISEASE 47

    37 MR. PRAKASH J MR. VIMAL E

    DR. VINOTH KUMAR B

    IMPACT ANALYSIS AND COMBATING OF

    COVID-19 AROUND THE WORLD

    48

    38

    VIVEK KUMAR VARMA

    NADIMPALLI, GOPICHAND

    AGNIHOTRAM PANDURANG

    NAIK

    AI BASED REMOTE EXPERT SYSTEM FOR

    GUIDING THE USERS ON MACHINE

    ACTIVITIES 49

    39 SUNITA SWAIN, DR. RAJESH

    KUMAR TIWARI

    CLOUD SECURITY RESEARCH-A

    COMPREHENSIVE SURVEY 50

    40 ANSHU SINGLA

    PARUL GANDHI

    A COMPARATIVE STUDY OF FREQUENT

    ITEMSET MINING ALGORITHMS 51

    41 ARUNA SUDAPALLI

    WET CHEMICAL SYNTHESIS,

    CHARACTERIZATION AND

    PHOTOCATALYTIC APPLICATIONS OF

    TETRAGONAL BATIO3 NANOPARTICLES

    52

  • 10

    42 RITESH KUMAR THAKUR, DR.

    PROF. RAJESH KUMAR TIWARI SECURITY ON IOT 53

    43 GAYATHRI NAIR

    DO TOURISTS BEHAVE IN AN

    ENVIRONMENTAL-FRIENDLY WAY? A

    CONFIRMATORY FACTORIAL VALIDITY

    BASED ON GOA

    54

    44

    ERIC U. OTI, FRANKLIN L. SORGBARA, BETHEL E.

    OKPOMU AND WARIEBI K.

    ALVAN

    A MODIFIED K-MEANS CLUSTERING METHOD FOR EFFECTIVE UPDATING OF

    CLUSTER CENTROID

    55

    45

    ERIC U. OTI, BETHEL E. OKPOMU, WARIEBI K. ALVAN AND FRANKLIN L. SORGBARA

    AN ENHANCED K-MEANS CLUSTERING METHOD

    USING MINKOWSKI’S DISTANCE AS ITS METRI 56

    46 ERIC UCHENNA OTI , RUTH ABIOBARAGHA SLINK AND REBECCA BEKESUOYEIBO

    NEW K-MEANS CLUSTERING METHODS THAT

    MINIMIZES THE TOTAL INTRA-CLUSTER

    VARIANCE 57

    47 CHIGOZIE E. NWANKPA ADVANCES IN OPTIMISATION ALGORITHMS

    AND TECHNIQUES FOR DEEP LEARNING 58

    48 MR. K.D. JAGTAP*, DR. R.V.

    BARDE, DR. S.A. WAGHULEY, DR. K.R. NEMADE

    A REVIEW ON METAL OXIDES AND NANO

    COMPOSITES OF METAL OXIDES AS

    ELECTRODE MATERIALS FOR THE ENERGY

    STORAGE MECHANISM

    59

    49 ANJU NEELAM BHAGAT

    ANALYSIS OF RIVEST CIPHER 4 (RC4) AND ITS

    VARIANTS WITH RESPECT TO ENERGY

    CONSUMPTION 60

    50 DEEPTI JOON

    DR. KHYATI CHOPRA

    GAME THEORY FOR NETWORK SECURITY-

    A LITERATURE SURVEY 61

    51 VELAGAPUDI SREENIVAS, DR.

    VARSHA NAMDEO

    PANAROMIC VIEW OF HYBRID

    OPTIMIZATION ON RECURRENT FUZZY

    NEURAL NETWORK IN GROUP BASED

    EMOTION REGONITION VIDEO SYSTEM

    62

    52

    SAKSHI SINGH

    GAURAV NARAYAN SINGH

    SARTHAK SINGH

    RECENT PROGRESSIONS AND TECHNICAL

    ISSUES IN DATA WAREHOUSING 63

    53 DINESH K R NAVADA

    NAGASHRI H J ARCHANA MANJULA N M, PRABODH C P

    A NOVEL APPROACH FOR PLANT DISEASE DETECTION AND SOLUTIONS

    64

  • 11

    54 M.H. RAHMANI DOUST1, A.

    GHASEMABADIB, M.

    SHAMSABADI

    A NONLINEAR MATHEMATICAL MODELING AND APPLICATION TO CRIMINAL ACTIVITY

    65

    55 PROF. K. PHANI SRINIVAS

    DR. P. S. AITHAL

    PRACTICAL ORIENTED ANALYSIS ON THE

    SIGNAL PROCESSING USING FFT

    ALGORITHM

    66

    56

    DR. K. SAI MANOJ, MS. K.

    MRUDULA, MRS G.MAANASA

    AND PROF. K. PHANI SRINIVAS

    INTERNET OF THINGS: MONITORING AND

    CONTROL OF AGRICULTURAL ACTIVITIES

    67

    57 BHAVANA AGRAWAL

    ANKIT GUPTA

    AN EFFICIENT APPROACH USING KNN

    CLASSIFIER FOR THE PLANT DISEASE

    DETECTION 68

    58

    DR. JAKEER HUSAIN, DR.

    REHANA ANJUM, GAVISIDDAYYA.M, DEEPA

    PATHAR AND DR. SHIVARAJ.G

    AC CONDUCTIVITY AND LPG SENSING

    BEHAVIOR OF PANI/In2O3 NANO

    COMPOSITES THIN FILMS 69

    59 ANCY JOSE

    S. V. ANNLIN JEBA

    A NOVEL MISSING DATA IMPUTATION

    ALGORITHM FOR DEEP LEARNING BASED

    ANOMALY DETECTION SYSTEM 70

    60 A. GHASEMABADIB

    M.H. RAHMANI DOUST

    HOPF BIFURCATION IN A GENERALIZED

    FOOD CHAIN MODEL WITH HARVESTED ON

    PREY, PREDATOR OR TOP PREDATOR

    POPULATION

    71

    61 M.H. RAHMANI DOUST, A.

    GHASEMABADIB

    M. SHAMSABADI

    DELAYED MODELS OF SINGLE SPECIES AND

    APPLICATIONS IN ECOLOGY, BIOLOGY AND

    EPIDEMIOLOGY 72

    62

    TANMAY N. GAWANDE, SAYALI S. SURYAWANSHI, OMKAR M.

    JOSHI, BHUSHAN N. PATIL, DR. N. D. CHAUDHARI

    PROF. A. R. PENDHARI

    DESIGN AND ANALYSIS OF IN-LINE

    TURBINE FOR MICRO-HYDRO POWER

    PLANT 73

    63 ANKUSH PENDHARI, DR. PRASHANT NAGARNAIK

    PARTIAL USED OF FOUNDRY SAND AS

    REPLACEMENT OF SAND IN CONCRETE

    PRODUCTION 74

    64

    MR. A. R. PENDHARI,

    MR.KRUSHNA B. KAPSE, MR.VED.C.APTE,

    MR.RUSHIKESH S. DERLE, MR. OJAS R RASANE

    EFFECT OF RECYCLED COARSE

    AGGREGATE AND FOUNDRY SAND IN

    CONCRETE PROPERTIES 75

    65 RAJEEV RANJAN KUMAR1 AND

    S. P. SINGH2

    VARIATION OF CAPACITIVE REACTANCE OF

    COUPLED MICROSTRIP LINE STRUCTURE

    WITH WIDTH OF THE SIMILAR METAL

    STRIPS

    76

  • 12

    VOLTAGE REGULATION IMPROVEMENT IN 33-BUS OPEN LOOP DISTRIBUTION MODEL USING DISTRIBUTED-UNIFIED POWER

    QUALITY CONDITIONER

    N. Prema Kumar 1

    1 Professor, Department of Electrical Engineering, AndhraUniversity College of Engineering (A),

    Vishakhapatnam, India. Email:[email protected]

    SK. Abdul Pasha 2 2 Research scholar, Department of Electrical Engineering, Andhra University College of Engineering

    (A), Vishakhapatnam, India. Email:[email protected]

    ABSTRACT:

    Power quality manage an important part in ensuring the established process of distribution-

    systems on the occasion of increase in load. The 33-bus was recently captivated a vast trade

    by emphasis and owns ideally the preculiarity of austerity through confronting sophisticated

    models over evasion and equivocality.The work recommends a open loop 33 bus system with

    a Distributed Unified Power Quality Conditioner (D.U.P.Q.C.) to diminish voltage-sag and

    THD in distribution network subsequently for improving power quality. In this research, the

    33-bus is utilized for the power quality using the D.U.P.Q.C.. A radical study of simulation

    utilising the MATLAB/Simulink be designed for investigating and demonstrating the

    effectiveness of the recommended 33 bus system in open loop system with and without

    D.U.P.Q.C.. The outcomes are compared in tems of voltage, real power and reactive power.

    Keywords- .U.P.Q.C. (Distributed-Unified Power Quality Conditioner), VAR (Volt Ampere

    Reactive) DVR (Dynamic Voltage Regulator), AF (Active-Filter), THD (Total-Harmonic-

    Distortion).

  • 13

    DATA MINING IN STUDY OF BIOMOLECULES

    Sunanda Pandita

    Department of BMS, KET’s V.G. Vaze College of Arts, Science and Commerce.

    Mulund East, Mumbai, Email: [email protected]

    ABSTRACT:

    The capability of statistics era has accelerated immensely during the last century, after the

    invention of information technology. Here, data mining has a critical role to play. Data

    mining is a superset of many distinct regions like statistical algorithms, machine learning,

    data analytics, time series analysis and so forth used to extract insights from data. It applies

    numerous techniques from specific areas to identify formerly unknown patterns of records.

    Data mining also includes the observationsand exercise of records and their manipulation.

    Keywords: Clustering, association, bioinformatics, protein prediction

    mailto:[email protected]

  • 14

    SEGMENTATION OF IRREGULAR TISSUE GROWTH IN THE BRAIN USING CONVOLUTIONAL NEURAL NETWORK

    Sujay V Nair, Nitin Nagori, Dr.Ameya Naik

    Department of EXTC, KJ Somaiya college of engineering, Mumbai,India

    [email protected], [email protected], [email protected]

    ABSTRACT:

    Brain tumor is basically the growth of unwanted cells in the brain. They generally show the

    growth towards the inner portion of the brain. In order to overcome such diseases we basically

    provide efficient treatments to the patients, which basically includes a procedure called

    Magnetic Resonance Imaging (MRI) which is used for detection of tumor, manually

    segmenting various images usually takes certain time, since huge data generated by MRI have

    to be processed therefore for providing accuracy in segmentation process we use a reliable

    segmentation techniques called convolutional neural network (CNN). Meaning of

    segmentation is to divide a digital image into several regions or boundaries. It is also

    differentiating different objects which generate smoothing in images and are simple to

    estimate. CNN is applied in this work which is basically a deep learning method. For various

    surgical options it is very much important to have correct edges of the tumor. This work

    mentions edge detection with image enhancement parameter in order to provide a pathway for

    a variety of surgical applications.

    Keywords—brain tumour, Segmentation process, MRI, Deep Learning

    mailto:[email protected]:[email protected]

  • 15

    UCON BASED DATA PROTECTION PROTOCOL FOR CLOUD

    ENVIRONMENT

    Santosh Kumar Singh1, Dr. P.K.Manjhi2, Dr. R.K.Tiwari3

    Research Scholar, Department of Computer Applications, Vinoba Bhave University,

    Hazaribag, India 1

    Assistant Professor, University Department of mathematics, Vinoba Bhave University, Hazaribag, India 2

    Professor, H.O.D CSE, R.V.S College of Engg & Tech., Jamshedpur, India 3

    ABSTRACT:

    Today modern computing systems influence distributed models for instance cloud, grid, etc.

    One of the barriers of broad dissemination of these computing models is security challenges

    which include access control difficulty. These models providing features like on-demand

    service, ever-present network access, quick flexibility, and expandable, having the vibrant

    infrastructure and contributing measured facility, require an influential and nonstop control

    above access and user session. Cloud service depends on Web Services, and it will face every

    kind of security issue including what Web Services face. In the cloud environment, the

    meaning of data and its safety are steadily varied when contents shifting from one virtual

    machine to another; in this scenario, the multi-tenancy model has been chosen as the main

    attribute. Usage control (UCON) model with features like attribute mutability and continuity

    of control appears to face several setbacks of traditional access control models. In this paper, a

    new usage control protocol model i.e. multi-UCON (MUCON) based on usage control, jointly

    with the digital watermarking technology and encryption technology is proposed with the

    features of off-line controlling, feature binding, and flexible accrediting. The proposed

    protocol model is reliable, secured, and easy to implement, which can be deployed f or data

    protection in cloud computing.

    Keywords: Cloud computing, UCON, MUCON, Rights transfer, Data protection, Access control.

  • 16

    AN INNOVATIVE APPROACH IN HINDI TEXT

    STEGANOGRAPHY 1.Arbind Tiwary,

    Dept. of MCA, Vinoba Bhave University, Hazaribagh,India

    [email protected]

    2.Dr A K Gupta

    Dept. of Physics, Vinoba Bhave University, Hazaribagh,India

    [email protected]

    3.Dr. (Prof.) Rajesh kr. Tiwari

    Dean of Academic Affairs, R.V.S. College of Engg. and Tech. Jamshedpur, India

    [email protected]

    ABSTRACT:

    The electronic information uprising has brought significant changes in our society and life.

    Nowadays, a massive amount of data issent over the network. If the data that is being sent is

    essential, one should use secure method like steganography to send it. Steganography is a

    method of conceal a secret message in a cover media such as image, text, audio, video etc in

    such a way that conceals the existence of the secret data. This paper proposed three new ideas

    for Hindi text steganography which is depends on the use of directory/dictionary arrangement.

    Keywords: Data Hiding, Steganography, Hindi, Sanskrit, Synonymous, Punctuation Marks

  • 17

    A MODERN APPROACH OF TEXT STEGANOGRAPHY WITH ASCII

    VALUES

    1Arbind Tiwary, 2Dr. A. K. Gupta and 3Dr. (Prof) Rajesh Kr. Tiwari

    1Research Scholar, Department of Computer Application, Vinoba Bhave University,

    Hazaribag, India, [email protected]

    2Associate Professor, Department of Physics, Vinoba Bhave University, Hazaribag, India,

    [email protected]

    3 Dean of Academic Affairs, R.V.S. College of Engg.& Tech., Jamshedpur, India,

    [email protected]

    ABSTRACT:

    Steganography is the skill of obscuring text inside other carriers (i.e. text, image, video or

    audio) in order to provide data security and confidentiality without any suspicion. In this

    paper, the execution of an innovative text steganography method is proposed . The

    methodology based on merging the character’s ASCII value with the RGB values of a pixel,

    so that an individual character can be stored into a single pixel. The main purpose of this

    method is to provide maximum payload, capacity, an image can ever have that is the total

    number of pixels it contains.

    Keywords: Steganography, Image Processing, ASCII Value, Information Hiding

  • 18

    DEVELOPMENT AND IMPLEMENTATION OF OVERLOAD

    HANDLING MECHANISM IN 5G REGISTERS

    Sahana S

    Department of Electronics and Communication JSS Science and Technology Mysore,India

    [email protected]

    Dr. Shakaraiah

    Department of Electronics and Communication JSS Science and Technology Mysore,India

    [email protected]

    ABSTRACT:

    Congestion in the servers is a very common problem as the number of systems that are

    connecting to the server is humungous and we can’t have a control on it. Hence having a

    feature in the particular server which will comprise of smart decisioning of how many

    systems can be connected and how effectively the congestion can be avoided and in which

    priority the systems can be connected can easily be taken care of .Henceforth this paper

    mainly depicts the how this feature is developed and deployed.

    Keywords—Throttling, UDM, TCP remoting, LoadLevel, Network

    mailto:[email protected]:[email protected]

  • 19

    SOCIAL MEDIA – AN AXIS TOOL FOR JOB HUNTERS

    Immaculate Priya C

    (Research Scholar at Vel Tech College Chennai)

    Dr. Geeta Kesavaraj

    (Associate Professor at Vel Tech College Chennai)

    ABSTRACT:

    Social Media is a vibrant tool that is popular among all nowadays, irrespective of ages, level

    of education, languages, etc. People have become upbeat to discover new roles and challenges

    in their career, even for the employers they expect a mixed group of professionals in order to

    deliver the perfect traditional products/services in an innovative way to their customers.

    Hence in this quick stepping phase both employer and job hunters wanted to do right the f irst

    time in the first instance. Hence to meet this demand, Social Media has to provide a platform

    for both the groups (Employer and job hunters) to pick up and browse information before they

    could make a step in to their career front .The overview of both employer and calibre of Job

    Candidates is scanned in the hub of social media. Hence this research study is performed with

    a purpose to identify the user level and necessity of social media engagement, variables that

    triggers the users to utilise social media sites as their job portal and the benefits achieved by

    job seekers. Findings suggest that Demographic profile such as Age, Gender, Education

    qualification and Occupation has an effect on social media engagement and factors that would

    trigger to use social media sites as job portal are flexibility, advertisement and brand

    recognition and it appears beneficial to budding job Hunters.

    Key Words: User Engagement, Flexible, Advertisement, perception, Brand recognition

  • 20

    AN OVERVIEW OF PHYTOCHEMICAL AND PHARMACOLOGICAL

    POTENTIAL OF Baccaurea SPECIES

    Sreelakshmi Sivadasan, Subathra M, Deepthi Padmanabhan, Amudha.P*

    ABSTRACT:

    Herbal plants and plant products have been used for treatment of many diseases from ancient

    times in the folklore medicine globally. Plants are used in medicine, providing many drugs

    and also as the feedstock for many industrial products including timber and paper as well as a

    wide range of chemicals. Traditionally, humans have used crude extracts of different parts of

    plants as curative agents. One such plant is Baccaurea. Among the genus Baccaurea, some

    species are taken for the review because of their phytochemical and pharmacological

    properties which includes Baccaurea angulata, Baccaurea sapida, Baccaurea ramiflora,

    Bacccaurea racemosa, Baccaurea macrocarpa, Baccaurea courtallensis, Baccaurea motleyana,

    Baccaurea parviflora. The species are considered to be good source of vitamins, minerals,

    fibres as well as have many pharmacological activities. This review describes the

    phytochemicals and detailed pharmacological properties of selected Baccaurea species.

    Keywords: Baccaurea, Phytochemicals, Pharmacological Properties, Medicinal Plants

  • 21

    REVIEW ON PHARMACOGNOSTIC, PHYTOCHEMICAL AND

    PHARMACOLOGICAL INVESTIGATION OF MARTYNIA ANNUA.

    Santosh S.Bansode*1, Nachiket S. Dighe2

    1Department of Pharmaceutical Sciences, Bhagwant University, Ajmer Rajasthan (India)

    2Department of Pharmaceutical Chemistry, Pravara Rural College of Pharmacy, Pravaranagar

    ABSTRACT:

    Martynia annua Linn (Martyniaceae) is an important herbaceous annual medicative herb

    found as a wild plant throughout India. Martynia annua (Martyniaceae) is commonly known

    as kakanasika in Ayurveda. Leaves, fruits, seeds and roots are the most vital parts which are

    utilized therapeutically. Phytochemicals are generally referred to have a significant role as

    essential nutrients and highly potential to cure many diseases. The review shows that large

    numbers of phytochemical constituents have been isolated from the Martynia annua Linn

    plant which possesses actions like Antioxidant, Anthelmintic, Analgesic and Antipyretic,

    Antibacterial, Anti-convulsant, Antinociceptive and, Antifertility, Central Nervous System

    (CNS) depressant, Wound Healing, Antidiabetic, Gastroprotective, Antifungal, Cytotoxic

    Activity and various other significant medicinal properties. In folk medicine, Decoction of

    whole plant is used in cold fever and pneumonia. Leaves are eaten in times of scarcity and

    also given in epilepsy and its juice is gargled for sore throat. The seeds are also applied

    locally for itching and eczema and fruits are used for the treatment of asthma. The Roots are

    boiled with milk and taken as a tonic and roots made into a poultice and applied in snake bite.

    For the last few years or so, extensive research work has been done to show its biological

    activities and pharmacology of its extracts. All these pharmacognostic and phytochemical

    studies are often used as a diagnostic tool for the right identification of the plant and

    additionally to check adulteration if any.

    Keywords: Martynia annua, Pharmacognosy, Phytochemistry, Anti-Convulsant.

  • 22

    POST COVID-19 OPPORTUNITIES AND CHALLENGES FOR

    MICRO SMALL MEDIUM ENTERPRISES (MSMEs) DEVELOPMENT

    IN INDIA

    SACHIN ARJUN KADAM

    Assistant Professor, Department of COMMERCE

    VIVA College of Arts, Science and Commerce. Virar

    Email ID :sachinnk3@gmail. com

    ABSTRACT:

    Micro small medium enterprises (MSME) are considered to be the backbone of the Indian

    economy. Its contribution to the Indian economy's GDP has been significant in the past

    decade. They have an important role in the development of rural and backward areas, thus

    reducing regional imbalances, Ensure a fairer distribution of national income and wealth.

    The unprecedented outbreak of COVID-19 in Wuhan province - China during December

    2019 turned out to be pandemic that affects the whole world and paralyzes economic

    activities. The impact of this has It has seriously affected the MSME sector. This a rticle

    examines the current MSME scenario. based on Above the background, the researcher tried

    to analyze the challenges and development forward for the post COVID 19 MSME sector

    Keywords: micro small medium enterprises, challenges, MSME development

  • 23

    A REVIEW ON ESTIMATION OF VOGLIBOSE, GLIMEPIRIDE AND METFORMIN HYDROCHLORIDE IN BULK AND TABLET DOSAGE

    FORM

    Kiran K. Shinde*1 Nachiket S. Dighe2

    1 Department of Pharmaceutical Sciences. Bhagwant University. Ajmer Rajasthan (India)

    2 Department of Pharmaceutical Chemistry. Pravara Rural College of Pharmacy.

    Pravaranagar

    ABSTRACT:

    Diabetic mellitus is a chronic, progressive, incompletely understood metabolic condition

    chiefly characterize by hyperglycemia.Voglibose,a new potent glucosidase inhibitorused f or

    type 2diabetes, has shown anti-obesityand antidiabetic activity. It is indicated for treatment of

    diabetes mellitus type 2, either alone or in combination with Glimepiride and Metformin

    hydrochloride.The aim of this review is to focus on update of determination of Voglibose,

    Glimepiride and Metformin hydrochloride in bulk and in pharmaceutical preparation using

    RP-HPLC,and UV spectroscopic method. This review provides detailed information on

    separation for Voglibose alone and in combination with Glimepiride and Metformin

    hydrochloride.

    Keywords: Voglibose, Glimepiride and Metformin Hydrochloride, RP-HPLC, UV-Spectroscopy

  • 24

    SMART WATER QUALITY MONITORING SYSTEM BASED ON IOT

    Mohd Tarik1, Md Saif Malik

    2,Pinki Yadav3, Hussain Muzzaffar

    4, Gaurav Nagar5

    12345Department of Electrical Engineering, Galgotia College of Engineering of Technology, Greater Noida (U.P.), India-201306

    ABSTRACT:

    Water, the foremost crucial contingents of lifeforms. Pollution isthe most important fears f o r

    the green globalization. Therefore, the safe supply of beverage and use water for various

    purposes like agriculture, the water should be monitored. The system is meant so as to watch

    the standard of water usinginternet of things(IoT) to see its containment and confirm to

    eradicate its impurities. This article presents low costs system for time monitoring of water

    quality system. we've used several sensors during this system for monitoring. The sensors are

    Temperature, pH, Turbidity, etc. The temperature sensor detects the degree of hotness and

    coldness of the water. The Arduino Uno model is often used as a controller. The measured

    value of the sensor is processed by the controller. Finally, the sensor data are often shown on

    IoT based system. The information then received is employed within the purification of

    impure water through IoT functioning.

    Keywords: Internet of Things, Température Sensor,TurbiditySensor, Flow Sensor, pH Sensor,

    Arduino Uno Model, UltrasonicSensor, Real-timeSystems

    https://ieeexplore.ieee.org/search/searchresult.jsp?matchBoolean=true&queryText=%22Index%20Terms%22%3ATemperature%20sensors&newsearch=truehttps://ieeexplore.ieee.org/search/searchresult.jsp?matchBoolean=true&queryText=%22Index%20Terms%22%3ACloud%20computing&newsearch=truehttps://ieeexplore.ieee.org/search/searchresult.jsp?matchBoolean=true&queryText=%22Index%20Terms%22%3AReal-time%20systems&newsearch=truehttps://ieeexplore.ieee.org/search/searchresult.jsp?matchBoolean=true&queryText=%22Index%20Terms%22%3AReal-time%20systems&newsearch=true

  • 25

    ASSESSMENT OF WATER QUALITY INDEX MUSI RIVER

    COMMAND AREA

    1Mohammed Zakir Hussain

    Research Scholar, Shri JJT Uiveristy, Rajasthan

    2Dr. PVS Vara Prasad

    Principal, GIET ENG CLG,RAJAMANDRI

    3Dr. Yamini S Verma

    Assistant Professor, Shri JJT University, Jhunjunu, Rajasthan

    ABSTRACT:

    The objective of the study is to do the assessment of the Musi river command area of Aroor

    village, Valigonda Mandal, Nalgonda District, Telangana;by analyzing physico-chemical

    characteristics and evaluating the Water Quality Index. The composite sampling technique

    was adopted while collecting the samples; all samples were preserved in the icebox before

    analysis. There were total eleven number of physico-chemical parameters were analyzed viz.,

    pH, Electrical Conductivity, Total Dissolved Solids, Total Hardness, Total Alkalinity,

    Calcium, Chloride, Sulfate, Nitrates, Fluoride and Iron all in samples are compiled the WHO

    and BIS Standards.The WQI value is 65, Based on the WQI standard the water is ‘B’ class

    and quality falls under “GOOD” quality as it is in the range of GOOD quality that is 51 -100.

    Keywords: WQI, Musi river, Physico-chemical, Composite sampling technique

  • 26

    DEVELOPMENT AND EVALUATION OF TASTE MASKED FAST

    DISSOLVING ORAL FILM

    Mr. Abhishek D Meher1* 1Department of Pharmaceutical Science, Bhagwant Univercity ,Ajmer,Rajsthan.

    Email Id: - [email protected] Mr. Nachiket S. Dighe2

    2 Departments of Pharmaceutical Chemistry, Pravara Rural College of Pharmacy, Loni,

    413736

    ABSTRACT:

    Taste-masking techniques are applied to mask or overcome the bitter or unpleasant taste of

    active pharmaceutical ingredients/drugs to achieve patient acceptability and compliance. Oral

    administration of bitter or unpleasant tasting drugs is often the biggest barrier for patient

    groups, such as pediatrics and geriatrics [1, 2]. Unless the active ingredient is tasteless or does

    not have any unpleasant taste, taste-masking plays a key role in the success of a final solid

    oral dosage form. The efficiency of taste-masking is often a key determinant for the success

    of specialized dosage forms like orally disintegrating tablets and films, and chewable tablets

    [2]. The mechanisms of taste-masking techniques often rely on two major approaches: the first

    is to add sweeteners, flavors, and effervescent agents to mask the unpleasant taste, and the

    second is to avoid the contact of bitter/unpleasant drugs with taste buds. In the past few years,

    significant progress has been made in the area of taste-masking by applying novel strategies

    and techniques, such as hot-melt extrusion and microencapsulation.[1,3] The following presents

    an overview and current Status of the industrial approaches and platforms used for taste-

    masking in oral dosage forms. [1, 2, 4] Many pharmaceutical companies are switching their

    products from tablets to fast dissolving oral thin films (OTFs). [6,7] Films have all the

    advantages of tablets (precise dosage, easy administration) and those of liquid dosage f orms

    (easy swallowing, rapid bioavailability). Statistics have shown that four out of f ive patients

    prefer orally disintegrating dosage forms over conventional solid oral dosages forms.

    Pediatric, geriatric, bedridden, emetic patients and those with Central Nervous System

    disorders, have difficulty in swallowing or chewing solid dosage forms. [7,8] Many of these

    patients are non-compliant in administering solid dosage forms due to fear of choking. [9]

    OTFs when placed on the tip or the floor of the tongue are instantly wet by saliva. This

    technology provides a good platform for patent non- infringing product development and f or

    increasing the patent life-cycle of the existing products. [10, 11]

    Keywords- Pediratics, OTF, Emetic Patient, Solid Dosage

  • 27

    PROTECTIVE EFFECT OF POLYGONUM PERSICARIA LINN

    EXTRACT ON CCL4 INDUCED HEPATOTOXICITY IN ALBINO RATS

    Mohd Shafi Dar1 , Abu Tahir2 and Deepak kumar mittal1

    1Sri SatyaSai University of Technology and Medical Science Sehore Madhya Pradesh India 2Rajiv Gandhi Proudyogiki Vishwavidhyalay Madhya Pradesh India.

    Correspondence Email id: [email protected]

    ABSTRACT:

    Aqueous extract of Polygonum persicaria (P.P) Linn was evaluated for hepatoprotective and

    antioxidant activities in rats. The plant extract (400mg/kg day) showed a remarkable

    hepatoprotective and antioxidant activity against Carbon tetrachloride (CCl41.5mg/kg i.p)-

    induced hepatotoxicity as judged from the serum marker enzymes and antioxidant levels in

    liver tissues. CCl4 induced a significant rise in AST, ALT, ALP, TB. Treatment of rats with

    plant extract (400 mg/kg) significantly (P

  • 28

    PLANT LAYOUT MODIFICATION USING SYSTEMATIC LAYOUT

    PLANNING

    Akshay Patil

    Department of Industrial and Production Engineering Vishwakarma Institute of Technology

    Pune , [email protected]

    Prof. Dr. Girish Kotwal

    Department of Industrial and Production Engineering Vishwakarma Institute of Technology

    Pune, [email protected]

    ABSTRACT:

    Every industry is striving for excellence in operations as it is needed to remain competitive in

    the global marketplace. To fulfill customers’ needs at a lower price, the companies need to

    improve productivity through effective and efficient utilization of resources like manpower,

    machines, money, material, methods. In many industries, material handling across a plant is

    one of the major problems which restrict productivity. Layout modification using Systematic

    layout planning can help to improve not only performance across the plant but also the space

    utilization. The present study attempts to apply the Systematic Layout Planning approach for

    layout modification. In this case study, details of plant layout are study conducted using

    various tools like Flow process chart, Spaghetti diagram, from-to Chart. Using SLP

    philosophy, various layout alternatives are prepared and compared on criteria like material

    handling distance, Material Work Flow Efficiency, Cost, etc. The application of SLP has

    resulted in a reduction in overall material handling distance and improved space utilization.

    Keywords – Plant layout, Systematic Layout Planning, productivity, material flow analysis,

    spaghetti diagram, process flow chart, relationship diagram, material flow efficiency, space

    utilization, layout evaluation.

    mailto:[email protected]:[email protected]

  • 29

    EFFECT OF TIME ON DETERIORATION OF NUTRIENT

    INGREDIENTS PRESENT IN FRESHLY PREPARED FOOD

    Dr. Sachin Rajendrarao Deshmukh

    Shri Samarth vidyalaya & Jr college, Amravati

    [email protected]

    Prof. Manisha Ramrao Jadhao

    Sipna college of Engineering, Amravati &Technology,

    [email protected]

    ABSTRACT:

    Food in synergy with physical exercise acts as medicine in almost all diseases like COVID-19

    to improve immunity of our body. Freshly prepared food has maximum nutrient ingredients.

    As the time passes the ingredients of food may go on decaying. Here we have divided food in

    to four categories depending on their average quality time ‘τ’. The quality of food may go on

    deteriorating in accordance with physics equation Q = Q0 e-t/τ We have taken Four values of

    ‘τ’& studied the quality of food as function of time. The percentage deterioration of

    ingredient of food is obtained. It is found that for generating similar amount of energy the

    food to be taken increases as the time passes.

    Keywords; – Average quality deterioration time, Q – Quality of food value at any time t, nutrient

    ingredients, e, nutrient value, N-useful & 1/N useful.

    mailto:[email protected]

  • 30

    REVIEW OF SECURITY APPROACHES IN WIRELESS SENSOR

    NETWORK AGAINST SYBIL ATTACK

    chita M. Yadav

    Research Scholar, Shri.JJT University, Churella, Jhunjhunu(Rajasthan)

    [email protected]

    Dr. Yogesh Kumar Sharma

    Professor and Ph.D guide Shri.JJT University, Churella, Jhunjhunu(Rajasthan)

    Satish R Todmal

    Dean Academics, Ph.D(Comp.Engg)

    JSPM Imperial College of Engineering & Research., Wagholi, Pune,India.

    [email protected]

    ABSTRACT:

    Network Security is an active undertaking recently to protect the integrity, confidentiality and

    accessibility of computer in addition to wireless sensor networks (WSN) and data. It involves

    each software program and hardware technologies. Wireless sensor networks leads

    significance of Network Security. Security in WSNs is an extremely and now not an easy

    problem. There are several attacks and threats investigated in WSN like Sybil Attack, Denial

    of Service (DoS) Attack, Man in the Middle Attack, Selective Forwarding Attack. In this

    paper we're proposing several Sybil attack detection techniques and attack counter techniques

    for Wireless Sensor Networks increase network protection. For Sybil attack detection we are

    proposing received Signal Strength Indicator (RSSI) and Random Password Comparison

    Method (RPC), Light-weight Sybil Attack Detection Framework, Trust Based Sybil Detection

    (TBSD), etc. It has also done the comparison of many Sybil attack recognition way of doing

    things based different guidelines which screen and well-timed detects Sybil attacks in large -

    scale WSNs. Also another comparison has been completed on the basis of the limits used in

    each way of doing things.

    Keywords: Wireless Sensor Network, Security, Sybil attack detection techniques and Parameters.

    mailto:[email protected]

  • 31

    COMPARATIVE ANALYSIS OF TRUST BASED AND CRYPTOGRAPHY BASED ROUTING SOLUTIONS FOR VEHICULAR

    AD HOC NETWORKS

    Megha V Kadam

    Research Scholar, Shri.JJT University,Churella,Jhunjhunu(Rajasthan)

    [email protected]

    Vinod M Vaze

    Professor and Ph.D guide, Shri.JJT University, Churella, Jhunjhunu(Rajasthan)

    [email protected]

    Satish R Todmal

    Dean Academics, Ph.D(Comp.Engg)

    JSPM Imperial College of Engineering & Research.,Wagholi, Pune,India.

    [email protected]

    ABSTRACT:

    In wireless network which is now widely deployed in urban areas for intelligent transport

    system (ITS) called Vehicular Ad Hoc Networks (VANETs). Due to the open nature of

    VANETs, they are vulnerable to various security threats as such networks are mainly depends

    on control, communication and computing technologies. The fault or malicious vehicles in

    VANET may lead to serious accidents and public assets lost due to miscommunications based

    on vehicle sensor data. Therefore, if the detection of such sensor da ta is not effectively

    handled then it may lead to traffic jams, road accidents, etc as most of the vehicles wrongly

    redirected by face traffic alerts. Thus providing reliable communications among the V2V or

    V2I is the first research problem.There are different security solutions presented to achieve

    the efficient an reliable VANET communications under the domain of cryptography, trust-

    based, and hybrid. The aim of this paper is to take the review such recent works for network

    security. The outcome of this paper claims the various research gaps identified from the

    literature review.

    Keywords- Cryptography, Trust based, Routing, Vehicular Ad Hoc Networks, Security, Reliability

  • 32

    KIDS PROTECTION SYSTEM IN SCHOOL BUS USING IOT

    S. P. Dhabalia, H. N Watane, S. R. Sawai, H. A. Joshi, D. A. Deshmukh

    Information Technology, Sipna College of Engineering and Technology, Amravati,

    Maharashtra.

    ABSTRACT:

    Millions of children require school bus for pick up and drop to the school on an everyday

    basis. A safe transport for these children is one of the main concerns that need to be taken care

    of by the school management. Hence, the need for a reliable management system in today 's

    world has increased to a greater extent. We propose a Smart tracking system for School buses,

    which is an android based application designed and implemented to provide remote tracking

    and SMS mode of alert mechanism. The application is user friendly, interactive and secure,

    which uses Google API to fetch the current location and GPS to track the school bus in real

    time. In order to show the feasibility and effectiveness of the system, this paper presents the

    methods and workflow of different modules used in the application.

    Keywords— Alcohol sensor, Bus tracking, Fuel detection, GPS, Mobile detection, RFID.

  • 33

    DEMAND SIDE MANAGEMENT IN MICRO GRID: A REVIEW

    Kapil Sharma

    Electrical Engg. Dept., UIET, KurukshetraUniversity Kurukshetra Haryana, 136119, India

    [email protected].

    Vijay Kumar Garg

    Electrical Engg. Dept., UIET, Kurukshetra University Kurukshetra Haryana, 136119, India

    [email protected]

    ABSTRACT:

    Energy can be produced from the renewable and non-renewable sources. Due to the increase

    of generating resources, the power system is divided into three parts (generation, transmission

    and distribution). Now a days, with the help of using micro grid and smart grid the power

    system has become digital. In this paper, we will discuss the concept of micro grid and its

    types. Here we will also read about the distributed generation concept. Due to the increasing

    power demand day by day, energy management is compulsory. Demand Side Management

    (DSM) is the main part of the micro grid. DSM helps the consumers to do the more effective

    use of power system. In this review paper, we will discuss about that what is DSM and

    various types of DSM techniques and methods to implement it. Here we will also discuss

    about the various benefits and challenges of DSM. The DSM enables a secure and stable

    power system.

    Keywords: Micro grids, Distributed Generation, Demand side management, optimization

    techniques, Energy management, direct load control, energy consumption, smart grid

    mailto:[email protected]

  • 34

    RECENT TRENDS IN AUTOMATION: ROBOTIC PROCESS AUTOMATION

    Ms.Shilpa Oswal

    Centre for Development of Advanced Computing Mumbai [email protected]

    Padmaja Joshi

    Centre for Development of Advanced Computing

    Mumbai

    [email protected]

    ABSTRACT:

    Robotic Process Automation (RPA) is the method of automating business operations or

    processes with the help of robots to reduce human intervention. This paper talks about

    Robotic Process Automation, its core components, its benefits and applications, available

    development tools and compares their features.

    Keywords—Automation, RPA, RPA tools, RPA types, RPA Components, Unassisted RPA, RPA

    Benefits, RPA Applications, Software bots, Process automation, RPA Market

    mailto:[email protected]:[email protected]

  • 35

    RECOMMENDATION TECHNIQUES FOR B2B RECOMMENDATION

    Sarita Patil1

    PhD Scholar, Computer Science, JJTU, Rajsthan, India 1

    [email protected],

    Dr. Vinod Vaze2

    Professor, JJTU, Rajsthan, India 2

    [email protected],

    Dr. Pankaj M. Agarkar3

    HOD, Computer Engineering, DYPSCOE, Pune, India3

    [email protected]

    ABSTRACT:

    Nowadays, there is a rapid development in online purchasing and number of applications

    and websites like Amazon, Flip cart are available for doing online shopping. Due to this

    facility, user saves their prestigious time. Recommender System is developed to the user

    which provides the information to the user about product features, rates, size, ranking etc.

    There are various types of recommender system for Business to Business which is based

    on the user’s like or item ranking. By utilizing these collaborative filtering i.e. user based

    RS suggested the customer to choose right product. Also content based filtering is based

    on the items rank. This B2B Recommender system is used to recommend the ranked and

    limited product from availability of product category without communicating to the end

    user or without taking input from the user. In this paper, Various B2B marketing

    campaign recommendation techniques based on fuzzy preferences is presented to address

    the various challenges of complex and dynamic nature of business buying process.

    Utilization of fuzzy approach is helpful in solving challenges of vague or fuzzy online

    user preference problem. The comparative studies and investigation related to B2B RS is

    considered in this literature. This literature review identifies the various research gaps in

    investigation.

    Keywords: - B2B recommender system, Collaborative Filtering, Clustering

  • 36

    THE ECONOMICS OF LANDFILL MINING

    Raviraj S. Gaikwad1, Dhananjay S. Patil2

    M. Tech. Student, Department of Civil-Construction Management Engineering, RIT,

    Maharashtra, India1

    Professor, Department of Civil-Construction Management Engineering, RIT, Maharashtra,

    India2

    ABSTRACT:

    Landfill mining of municipal solid waste is a technology that combines the concepts of

    material recycling and sustainable waste management.In this research work, an economic

    feasibility was assessed for landfill mining scenario.Initially the cost-benefit framework was

    prepared which has included seven indicators of costs and seven indicators of benefits of

    landfill mining scenario.The cost-benefit framework was applied to a selected case study and

    the cost-benefit analysis was performed for assessing an economic feasibility of landfill

    mining scenario for the same.

    Keywords: Municipal Solid Waste, Economic Feasibility,Landfill Mining,Cost-Benefit

    Framework,Cost-Benefit Analysis.

  • 37

    ANALYSIS OF DIVERGENCE DETECTION IN TRANSPORT SYSTEM

    USING IMAGE PROCESSING

    Vikrant Gandole, Prof. Akhil Gotmare

    Department of Computer Engineering B.D.C.E Wardha

    ABSTRACT:

    Anomaly detection is an important part of an Intelligent Transportation System. In this

    study, image processing and machine learning techniques are used to detect anomalies in

    vehicle movements. These anomalies include standing and traveling in reverse direction.

    Images are captured using CCTV cameras from front and rear side of the vehicle. This

    capability makes the results robust to the variations in operational and environmental

    conditions. Multiple consecutive frames are acquired for motion detection. Features such

    as edges and license plate corner locations are extracted for tracking purposes. Direction of

    the traffic flow is obtained from the trained classifier. K-nearest neighbor is chosen as the

    classifier model. The proposed method is evaluated on a public highway and promising

    detection results are achieved.

    Keywords- CCTV, Transportation System, K-nearest.

  • 38

    DETECT AND LOCATE THE POINT OF FAULT IN THE POWER

    DISTRIBUTION NETWORK EMPLOYING THE GSM TECHNOLOGY

    Shreeram V Kulkarni1,Santosh V2, Nandan R3, Kirana KN4 and Shashikiran R5

    1,2,3,4,5Nitte Meenakshi Institute of Technology, Bengaluru [email protected]

    ABSTRACT:

    The electrical lines are distributed as a system of the network for power distribution. There

    will be feeders in the system between the power station and region where the power is being

    transferred. If there is a break down due to some issues in the power transmission line

    between the area and primary base station, then there will be a huge loss if it is an Industrial

    area. So, to avoid this kind of loss in the industrial areas we should maintain power without

    any break. And in the present scenario the mainline, we cannot detect the power theft done by

    any intruder by which Karnataka Electricity Board (KEB) is suffering from a huge loss. To

    solve this above issue, we are going to detect and spot the fault and the power theft in the

    power distribution network. In this article, we have used two sections, one is substation and

    another one is the lineman part. For power transmission, the substation is placed at the

    transformer pole. The lineman will be having a mobile by which he receives the information

    sent by the substation using Global System for Mobile (GSM) modem in case of any fault that

    happened in the particular area, and the same information will be displayed on LCD provided

    at the substation. In the substation, we are also going to detect the power theft which will be

    in the power lines. And also, we are going to make automatic feeder switching by using

    microcontroller and Relays.

    Keywords: Power Distribution Network,Power Theft, Microcontroller, Global System for Mobile

    Communication.

  • 39

    REVIEW ON DEGRADATION OF CELLULOSIC WASTE: THE STEPS

    TOWARDS PROGRESSIVE RESEARCH

    Swati Ganesh Swami, Kalyani Nandkumar Dhule

    Department of Biotechnology, Rajarshi Shahu Mahavidyalaya (Autonomous) Latur 413512

    Maharashtra.

    E –Mail: [email protected],[email protected]

    ABSTRACT:

    In recent years, the improper waste disposal of polymeric substance has enlarged due to

    industrial evolution and increase of population utilization. This problem may be reduced by

    using biodegradable chemicals, enzymes and microbes. This present review explores the

    different cellulosic waste degradation methods their analysis and the present status of

    converting them into value-added products such as the bio compost production and ethanol

    from municipal cellulosic waste, biogas production from textile cotton waste with the help of

    different types of enzymes and microbes. Cellulose is the most abundant biopolymer in the

    world. Cellulose is an enormous product due to its abundance and predictable structural

    properties. The major textile and cotton industrial source of cellulose is vascular plants. Their

    reuse is crucial for the carbon cycle and each polymer is degraded by a variety of

    microorganisms. In the near future we are focusing on processing by the use of cellulolytic

    enzymes based on microbes that could lead to new, eco-friendly technologies.

    Keywords: Cellulose, Degradation, Agricultural Waste, Municipal waste, Forest and Biomedical

    waste.

    https://mail.google.com/mail/u/0/h/19m93wn2q8u8d/?&cs=wh&v=b&[email protected]://mail.google.com/mail/u/0/h/19m93wn2q8u8d/?&cs=wh&v=b&[email protected]

  • 40

    ANTIMICROBIAL ACTIVITY OF SPICES IN ORGANIC SOLVENT

    AGAINST PATHOGENIC BACTERIA

    Kalyani Nandkumar Dhule , Vishakha Sakharam Kamble

    Department of Biotechnology, Rajarshi Shahu Mahavidyalaya (Autonomous)Latur 413512

    Maharashtra.

    E –Mail: [email protected],[email protected]

    ABSTRACT:

    Spices are group of common food adjuncts that have been in use f or thousands of years to

    enhance the sensory quality of food, the quantity & variety of spices consumed in tropical

    countries is particularly variable. These spices ingredients in part characteristic flavor, aroma

    & color to the food, not only spices have this characteristic but also, many of the spices have

    antimicrobial activity. In our project we had studied the effect of spices such as clove

    (Syzygium aromaticum), cumin (Cuminium cyminium), cinnamon (Cinnamon verum), black

    pepper (Piper nigrum), ginger (zingiber officinale) antimicrobial activity against pathogenic

    bacteria like Staphylococcus aureus, Pseudomonas aeruginosa, Escherichia coli, Klebsiella ,

    and Proteus vulgaris. Spices might have a great potential as anantimicrobial agent when used

    with organic solvent, so in our study we used the organic solvents like methanol and benzene.

    Pathogenic bacteria were used as tests strain to validate antimicrobial property of spices. In

    this study Agar well-diffusion method was used to access the antibacterial activity. Result of

    the essential components of spices showed comparable effect against pathogenic bacteria . The

    inhibition zone was observed as a result of their antimicrobial activity. The study confirmed

    the potential of selected extracts of spices against the pathogenic bacteria with

    organicsolvents.

    Keywords: Spices, Antibacterial, Pathogenic bacteria, organic solvents.

    https://mail.google.com/mail/u/0/h/19m93wn2q8u8d/?&cs=wh&v=b&[email protected]:///C:/Users/pc/Downloads/[email protected]

  • 41

    A REVIEW ON ESTIMATION OF GLIMEPIRIDE, PIOGLITAZONE

    AND METFORMIN HCL IN BULK AND IN PHARMACEUTICAL

    DOSAGE FORM

    Shoheb. S. Shaikh*1, Dr. N. S. Dighe1,

    1Pravara Rural College of Pharmacy, Pravaranagar, Tal-Rahata, Dist-Ahmednagar Department of Pharmaceutical Chemistry.

    ABSTRACT:

    Diabetes mellitus is a constant, progressive, partly understood metabolic state primarily set

    apart by hyperglycemia. Pioglitazone is alternatively selects & stimulates the nuclear receptor

    peroxisome proliferator-activated receptor gamma (PPAR- γ). It modulates the dictation of

    the genes occupied in organize of glucose & lipid metabolisms in muscle, adipose tissue &

    liver. Glimepiride acts as an insulin secretagogue. Their blood sugar inferior by inspiring the

    free of insulin by pancreatic β cells and remind augmented movement of intracellular insulin

    receptor. It is indicate for treatment of Diabetes mellitus type 2, also unaccompanied or in

    combination with Metformin hydrochloride. The aim of this review is to focus on update of

    resolve of Glimepiride, Pioglitazone and Metformin hydrochloride in bulkiness and in

    pharmaceutical preparation using RP-HPLC and UV spectrophotometric method. This review

    provides information on separation, identification and purif ication for Glimepiride,

    Pioglitazone alone and in combination with Metformin hydrochloride.

    Keyword: Glimepiride, Pioglitazone, Metformin hydrochloride, RP-HPLC, UV- Spectroscopy.

  • 42

    EFFECT OF SLOT LENGTH ON MICROSTRIP ANTENNA FOR TRIPPLE BAND APPLICATION

    Mamatha A G and Dr. P. M. Hadalgi

    Microwave Laboratory, Department of P.G. Studies & Research in Applied Electronics, Gulbarga University, Gulbarga-585106. Karnataka, INDIA, mobile:7760046541 and

    9845002606

    Email: [email protected], [email protected]

    ABSTRACT:

    A rectangular slot loaded microstrip antenna is designed to analyze the performance of

    antenna by varying length of the slot. The designed antenna has FR4 as a substrate with the

    height of 0.16 cms at 6 GHz frequency is simulated using HFSS software. The antenna shows

    the single, double and triple bands in nature for different slot dimensions and it is observed

    that as the length of the slot increases the virtual size of the antenna decreases. For slot length

    0.05 cms peak gain is 2.91 dB with -18.68 dB return loss and the virtual size reduction of 15

    % is obtained. The length of rectangular slot is increased by 0.05 cms in each step and for slot

    length 0.5 cms the antenna exhibits 30 % virtual size reduction with good return loss,

    radiation pattern and VSWR.

    Key words: Rectangular slot, FR4 substrate, HFSS and Triple Band.

  • 43

    HARDWARE IMPLEMENTATION OF SIMPLE LINEAR REGRESSION AND ITS MODELLING IN PYTHON AND MATLAB

    Nanditha N Varma

    Dept. of Electronics and Communication Engineering Amrita Vishwa Vidyapeetham,

    Amritapuri, India, [email protected]

    Senthil Murugan

    Dept. of Electronics and Communication Engineering Amrita Vishwa Vidyapeetham,

    Amritapuri, India, [email protected]

    Senthil Murugan, Nanditha N Varma with Department of Electron- ics and Communication, Amrita Vishwa Vidyapeetham, Amritapuri, India

    (email:[email protected], [email protected]).

    ABSTRACT:

    In this paper,one of the machine learning algo- rithm namely Linear Regression is

    implemented in Field Pro- grammable Gate Array(FPGA).Combination of programmabil-

    ity,performance and flexibility can be achieved using FPGA and that is the reason for

    preferring FPGA as the hardware architecture for machine learning purposes.It also provides

    low latency.In this work, the dataset was given to the hardware and trained using the method

    of Least Square Approximation.The design was successful in synthesising and

    implementing with a total on-chip power of 137mW.The model has been verified,

    simulated and synthesised in Artix-7 FPGA Board using Verilog HDL. The simulations were

    also presented in Matlab and Python.

    Keywords: Artificial Intelligence, Simple Linear Regres- sion,Least Square

    Approximation,FPGA, Matlab.

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]

  • 44

    SOIL PROPERTIES ASSESSMENT IN SURFACE AND SUBSURFACE

    USING SPECTRORADIOMETER FOR RAVER TEHSIL OF JALGAON

    DISTRICT

    Vipin Y. Borole, Pratibha R. Bhise.

    Research Scholar, Dept. of Computer Science & IT, Dr. BAM University,

    Aurangabad, Maharashtra, India, [email protected], [email protected]

    Sonali B. Kulkarni

    Assistant Professor, Dept. of Computer Science & IT. Dr. BAM University

    Aurangabad. Maharashtra, India, [email protected]

    ABSTRACT:

    Soil nutrient identification is most significant in soil fertility management system. Fertilizers

    play an important role for enhancing soil fertility in agriculture field since last decades, but

    accurately use of fertilizers based on the required amount for a certain site or type of crop and

    soil has always remained a challenge. Moreover, regular laboratory evaluates are very

    timewasting and expensive. In this work, we use spectroscopy technique using remote

    sensing. Spectral signature obtaining the diffused reflectance from spectroradiometer. Based

    on this reflectance data obtained from the spectroradiometer system, unique soil spectral

    signatures were obtained and analysed statistically for surface and subsurface soil samples

    collected from different fertilizers treatment were applied for dissimilar banana and cotton

    main crops in raver tehsil. The spectral data is used for fast non-destructive estimation of

    chemical properties nitrogen, phosphorous, potash, carbon, pH as well as physical pro perties

    sand, silt, clay, soil organic matter (SOM), moisture based on diffuse reflectance spectroscopy

    using Visible, NIR, SWIR (350-700, 700-1100, 1100-2500) spectral range respectively. The

    availability of physical and chemical properties are analysed in surface and subsurface soil.

    Correlation- coefficient were analysed for surface and subsurface soil based on the statistical

    parameters R2. The R2 values obtained almost near to 1 it means the positive correlation is

    detected in two different surface and subsurface soil.

    Keywords: Soil, Fertilizers, physical properties, chemical properties, Surface, Subsurface,

    Spectroradiometer

    mailto:[email protected]:[email protected]:[email protected]

  • 45

    BRAND LIST BASED HYBRID ANTI-PHISHING DETECTION APPROACH

    Ankush Gupta and Santosh Kuma

    National Institute of Technology, Kurukshetra

    ABSTRACT:

    Internet technology makes people’s life easy and comfortable. Due to the growth of reliable

    internet technology, there is an increase in internet threats. Phishing is an internet security

    threat that uses website spoofing or social engineering to fool the internet users into disclosing

    their sensitive and credential information like social network credentials, Social Security

    Number, bank account information. In this paper, we propose a hybrid anti-phishing approach

    capable of detecting newly created phishing webpages and phishing webpages hosted on

    hijacked servers. The proposed method is the combination of brand name whitelist approach

    and search engine based approach. Brand name whitelist detects phishing webpages as well as

    phishing webpages hosted on a hijacked server. The search engine based approach identif ies

    newly created webpages. First, our approach checks the presence of any brand name from the

    brand name list in title or subdomain but not in second-level-domain. If any brand name is

    present in title or subdomain, it announces as phishing otherwise requested URL pass to

    search engine based approach. If requested URL domain match with the top 10 search results

    domain, then it announces as legitimate otherwise phishing. Our proposed method is

    adaptable for detecting newly created phishing webpages and phishing webpages hosted on a

    hijacked server.

    Keywords: Phishing, Search Engine, Hijacked Serve.

  • 46

    SPEECH TO TEXT TRANSCRIPTOR AND SUMMARIZER: A

    MARKETING STRATEGY TOOL USING BUSINESS INTELLIGENCE AND DATA ANALYTICS

    Pratidnya HegdePatil

    Dept. of Information Technology MPSTME, NMIMS University Mumbai, India [email protected]

    Kiran Davuluri

    Dept. of Information Technology MPSTME, NMIMS University Mumbai, India

    [email protected]

    ABSTRACT:

    The project deals with development of an android application which is a speech to text

    converter, with textsummarization and sentiment analysis. The mobile application will

    generate textual transcripts of conversation using mobile telephony. These transcripts will be

    saved in a database and the user will have access to these with the help of their login

    credentials. Applying business intelligence and data analytics, the summary of textual

    transcripts can be used for generating customer strategy and classification. Each user’s

    transcripts and other app-data are read-exclusive to them alone. Data and advanced mining

    queries from the application statistics may be used for applying customer behaviour and

    influence of product or service. The paper highlights the process involved in analysis and

    study of the project formulation along with proposed UI design.

    Keywords—Marketing; sales; speech to text; customer; summary,mobile.

    mailto:[email protected]

  • 47

    A BRIEF REVIEW ON MATHEMATICAL MODELLING ON

    PARKINSON DISEASE

    1Rashmi Kumari, 2Subhranil Das

    1,Department of Computer Science Engineering,

    2Department of Electrical and Electronics Engineering,

    Birla Institute of Technology, Mesra, Ranchi, Jharkhand-835215,

    [email protected], [email protected]

    ABSTRACT:

    Parkinson Disease (PD) is a common chronic and progressive degenerative condition that

    degrades the quality of life which has now millions of people still affected worldwide. In this paper, we have reviewed some mathematical models of Parkinsonian disease model. Also,

    there are some mathematical models which are related to rats are being presented that were allied by different researchers from different angles for identifying Parkinsonian patients.

    Here, advantages and shortcomings of these models made by different researchers are being presented. This review paper will be propelled towards a new direction of mathematical

    models where new algorithms such as Artificial Intelligence, Machine Learning will be inducted in order to insight the other views while studying the symptoms of Parkinsonian

    Patients.

    Keywords— Parkinson disease, Basal ganglia, Hill Functions, Sine Circle Map, PDP, DBS, CPG,

    mailto:[email protected]:[email protected]

  • 48

    IMPACT ANALYSIS AND COMBATING OF COVID-19 AROUND THE WORLD

    Mr.Prakash J Department of Computer Science and Engineering PSG College of Technology

    Coimbatore, TamilNadu-641004. [email protected]

    Mr.Vimal E Department of Instrumentation and Control Systems Engineering PSG College

    of Technology Coimbatore, TamilNadu-641004. [email protected]

    Ms.Priyadharshini S Department of Computer Science and Engineering PSG College of

    Technology Coimbatore, TamilNadu-641004. [email protected]

    Dr.Vinoth Kumar B Department of Information and Technology PSG College of Technology Coimbatore, TamilNadu-641004. [email protected]

    ABSTRACT:

    Peoples are more concerned towards their health more than anything else in their lif e. Even the governments highest priority is given to healthcare. With the prevailing and varying

    pandemic globally since the human era, it is the responsibility of an individual human to be safe and combat them form those pandemics. Corona Virus 2019 is the current prevailing global pandemic which is causing an incredible disaster worldwide by causing thousands of deaths. Around 200 countries are fighting against this pandemic. In this paper the impact of

    coronavirus all over world based on the continents is explored by considering the information obtained on the corona virus positive, death and recovered case. It also reviews on how the countries are combating the global pandemic.

    Keywords—Corona Virus, Global pandemic, COVID-19, Combat, Epidemic, Intelligence,

    Continent, Monitoring, Heatmap.

    mailto:[email protected]

  • 49

    AI BASED REMOTE EXPERT SYSTEM FOR GUIDING THE USERS

    ON MACHINE ACTIVITIES

    Vivek Kumar Varma Nadimpalli, Gopichand Agnihotram

    Wipro Technology Limited, Wipro CTO Office, Electronic City, Bangalore – 560100, India

    e-mail: [email protected] [email protected]

    Pandurang Naik

    Wipro Technology Limited, Wipro CTO Office, Electronic City, Bangalore – 560100, India

    e-mail: [email protected]

    ABSTRACT:

    Creating trained models that semantically represent the corpus and summarizing relevant

    portions according to the user query remains a challenging task. We propose a semantic

    matcher based approach for identifying the relevant sentences in the corpus pertaining to the

    prominent entities in the corpus and their relationships in the user query. Trained models are

    created from the corpus by leveraging word-embeddings and are semantically searched to

    retrieve top results of the user query. Top matched sentences are analyzed for coherence based

    on semantic chains leveraging Semantic Role Labeler and are summarized, where entity

    relationships are exploited. The approach is applied and tested on user query based Ticketing

    System where policy documents in IT industry are used as corpus and specific summaries in

    the form of steps to be followed are created according to the user query.

    Keywords— Semantic Matcher, Summarization, word-embeddings, Coherence Measures, Ticketing

    System.

    mailto:[email protected]

  • 50

    CLOUD SECURITY RESEARCH-A COMPREHENSIVE SURVEY

    Sunita Swain1, Dr. Rajesh Kumar Tiwari2

    Dept. of CSE, RVSCET, Jamshedpur1,2

    ABSTRACT:

    Cloud computing is a new computing paradigm that delivers computing resources as a set

    of reliable and scalable internet based services allowing customers to remotely run and

    manage the services. It is a model for enabling ubiquitous, convenient, on -demand

    network access to a shared pool of configurable computing resources (e.g. networks,

    servers, storage, applications, and services) that can be rapidly provisioned and released

    with minimal management effort or service provider interaction. Cloud Computing is an

    abstraction based on the idea of pooling physical resources and presenting them as virtual

    resources. It is indeed a novel model for provisioning resources, staging applications, and

    platform independent consumer access to services. The major concern of the use of Cloud

    services is security because many attackers constantly try to take advantage of

    vulnerabilities in mobile networks to access data stored in the remote cloud servers.

    Certifying the security of cloud computing is a major task in the cloud computing

    environment. This paper summarizes a number of peer-reviewed articles on security

    threats in cloud computing and the preventive methods. The objective of our research is

    to understand the cloud components, security issues, and risks, along with emerging

    solutions that may potentially mitigate the vulnerabilities in the cloud.

    Keywords:- Cloud Computing , Cloud Security , Security Threats, Virtualization, Service Level

    Agreement, Cloud Provider, Cloud Carrier

  • 51

    A COMPARATIVE STUDY OF FREQUENT ITEMSET MINING

    ALGORITHMS

    Anshu Singla,

    [email protected] ,Manav Rachna International Institute Of Research and Studies

    Parul Gandhi,

    [email protected] , Manav Rachna International Institute Of Research and Studies

    ABSTRACT:

    Data mining has a great role for making market revenue by its decisive quality. Frequent

    Itemsets Mining (FIM) is very focused and emerging field of research of data mining. .FIM is

    used in association rule mining and other data analytic tasks. Frequent itemsets are patterns

    those occur very frequently in dataset. This paper provides efficacious and in -depth study of

    FIM algorithms. A comparative study of existing FIM algorithms and their variations are

    analyzed to find the limitations of these algorithms. Apriori ,Fp Growth, Eclat are basic

    methodologies for Frequent itemset mining. But there is issue for efficiency and memory

    consumption. Initially FIM was started in 1990’s and first algorithm, Apriori has drawback of

    scanning database multiple time, so complexity and memory consumption was high. Then Fp-

    Growth algorithm required scanning of dataset twice to form Fp-tree so huge memory

    consumption was required to hold the fp tree for Frequent Itemset Mining. After it Parallel

    frequent mining (shared and non-shared memory) overcome the drawback of FP-Growth

    algorithms by balancing the workload of single node to achieve efficiency. Now in present era

    of big dataset with voluminous and growing data at every moment, more prominent, efficient

    and scalable algorithm is required as complexity of these algorithms exponentially increases

    with the growth of rapid data .So objective of the study is in -depth literature review of

    Frequent Itemsets Mining algorithms to develop an efficient FIM algorithm.

    Keywords: Frequent Itemset Mining (FIM), Fp-growth, Fp-tree, Association, Pruning, Hadoop,

    Parallelization, Big datasets, data mining

    mailto:[email protected]:[email protected]

  • 52

    WET CHEMICAL SYNTHESIS, CHARACTERIZATION AND PHOTOCATALYTIC APPLICATIONS OF TETRAGONAL BATIO3

    NANOPARTICLES

    Aruna M. Sudapalli

    Department of Chemistry,University of Mumbai, Mumbai, India [email protected]

    Navinchandra G. Shimpi*

    Department of Chemistry, University of Mumbai Mumbai, India [email protected]

    ABSTRACT:

    BaTiO3 nanoparticles of tetragonal morphology have been synthesized using wet-chemical

    technique and subjected to various characterizations (X-ray diffraction (XRD), Fourier

    transform infrared spectroscopy (FTIR), UV-Vis diffuse reflectance spectrophotometry (UV-

    DRS), zeta potential, Raman spectra, field emission scanning electron microscopy (FESEM),

    energy dispersive X-rays analysis (EDAX) and high-resolution transmission electron

    microscopy(HRTEM). BaTiO3 showed tetragonal morphology and was due to annealing at

    1100 OC, which might show agglomeration few places. This agglomeration due to two

    reasons a) Temperature of annealing was very high, i.e., 1100 OC. b) The dominance of

    electrostatic forces over the surface of BaTiO3 nanoparticles. The particle size of BaTiO 3 has

    obtained in the range between ~ 34-39 nm. The optical band gap considerably decreases as

    the annealing temperature increases from 900-1100 OC. Overall, it was observed that

    annealing of BaTiO3 shows significant improvements in its optical, structural, and

    morphological properties. Moreover, the reduced particle size of BaTiO3 was also due to

    control over experimental conditions. This investigation revealed that the tetragonal BaTiO 3

    nanoparticles demonstrated substantial photocatalytic activity towards "the complete

    degradation of Methylene blue (MB) dye (99.8%, 200 min) under UV-Vis light irradiation.

    This important photocatalytic activity of BaTiO3 nanoparticles is mainly attributed to the

    special morphology and formation of Ti3+defects."[1].

    Keywords:- Wet chemical technique, tetragonal BaTiO3 nanoparticles, Photocatalytic activity,

    Methylene blue

    mailto:[email protected]:[email protected]

  • 53

    SECURITY ON IOT

    Ritesh Kumar Thakur

    Assistant Professor,Department of BCA , Jamshedpur Women’s College, India [email protected]

    Dr. Prof. Rajesh Kumar Tiwary

    Dean of Academic Affairs R.V.S college of Enggineering And Technology, Jamshedpur India

    [email protected]

    ABSTRACT:

    Now a days, we see that the Things are connected with internet by using Internet of Things

    (IoT) and became very useful in different area like Health, Homes, Agriculture ,Transporting

    and so on .The internet of things (IoT) refers to the interconnection via the internet of

    computing devices embedded in everyday object enabling them to send and receive data.

    Security and Privacy are the key issue for the IoT application and still face some huge

    challenges. The data collected from the lot sensors contain the large amount of private

    information which needs to be preserved.

    Keywords - internet of things; security; privacy; confidentiality; challenges; sensor

    mailto:[email protected]

  • 54

    DO TOURISTS BEHAVE IN AN ENVIRONMENTAL-FRIENDLY WAY? A CONFIRMATORY FACTORIAL VALIDITY BASED ON GOA

    Gayathri Nair

    Master of Business Administration Amrita School of Business, Amrita Vishwa Vidyapeetham,

    Coimbatore, India.

    [email protected]

    ABSTRACT:

    The issue sustainable tourism has long been debatable. However, limited empirical evidence is

    available to validate tourist’s sustainable behavior at well-known destinations. To this end, the

    current study evaluates the potential dimensions of sustainable tourist behavior through an

    extensive literature review followed by empirical validation. Around 241 valid responses were

    btained from tourists that have visited Goa. Subsequently a confirmatory factor analysis,

    factorial validity and measurement invariance were conducted to confirm the five

    factor/dimensions of sustainable tourist behavior. The study therefore has implications for

    managers and tour companies.

    Keywords—sustainability, tourism, behavior, confirmatory analysis, measurement invariance

  • 55

    A MODIFIED K-MEANS CLUSTERING METHOD FOR EFFECTIVE UPDATING OF CLUSTER CENTROID

    Eric U. Oti1, Franklin L. Sorgbara2, Bethel E. Okpomu3 and Wariebi K. Alvan

    1Department of Statistics, Federal Polytechnic, Ekowe Bayelsa State

    2Department of Mechanical Engineering, Federal Polytechnic, Ekowe Bayelsa State

    3Department of Computer Science, Federal Polytechnic, Ekowe Bayelsa State

    4Department of Physics with Electronics, Federal Polytechnic, Ekowe Bayelsa State

    1Corresponding Author: [email protected] (+2348037979262)

    ABSTRACT:

    Clustering is an unsupervised classification technique where a set of data, usually

    multidimensional is classified into clusters (groups) such that members of one cluster are

    similar to one another with respect to some predefined criterion. The k -means clustering

    methods are well known widely used partitioning-based clustering algorithms which minimize

    a given criterion by relocating points between clusters until a locally optimal partition is

    attained. We proposed a new k-means clustering