No. |
Title and Author |
Area |
Country |
Page |
1 |
Development of Smart Grid Technology in India: An Overview
-Md. Imran ; Prof. Alka Thakur
India is lagging behind in meeting the electricity needs of a rapidly growing economy. Power system engineers face more challenges now than ever as a result of the restructuring of the energy industry. The proposed vision is to adopt advanced automation mechanisms to implement a functional Smart Grid (SG) at various levels in the Indian power system. Smart grids are introduced to improve grid operations. Smart grid operations when properly implemented have the potential to create new avenues and opportunities with major economic implications. This article discusses several smart grid initiatives and their implications in the context of India’s evolving electricity market. Some existing Indian automation frameworks are used as examples to support some of the ideas of this study. Furthermore, it examines the development and study of smart grid technology since its inception. The development of smart grid technology for future needs from an Indian perspective is being done with an effort to highlight current and future challenges. Read More...
|
Electrical Power System |
India |
1-7 |
2 |
Simulation and Analysis of Power Flow and Stability Control Using Stabilizer Multi-Band
-Jay Prakash ; Dr. Manju Khare
The solution of the power flow is one of the most critical problems in electrical power systems. The power demand increases drastically due to industrialization and the electric transportation system. It makes the power system complex which needs to be properly controlled and maintain quality to flow. The effective control and operation of power remain challenging due to the variation in the input and load demand energy and the significantly high peak-to-average power ratio. Therefore, the rated power control is essential for the operating time and power output. The present rated power control method is based on the instantaneous rotational speed of the turbine generator. However, due to practical infrastructure limitations, such as the valve operating time, a more refined rated power control method is required. Flexible ac transmission systems are extensively installed in power systems to maintain a quality power supply. The Stabilizer multi-band has a key role in the improvement and control at the turbine power generating station. This paper presents simulation results of a Synchronous machine, Turbine Excitation Regulator, and Stabilizer multi-band for a 735 kV power line with the help of MATLAB/simulation module. Read More...
|
Power Electronics |
India |
8-11 |
3 |
Insurance Cost Prediction and Forecasting Using Machine Learning
-Aditya Karle ; Payal Bhangre; Krishna Kharde; Abhishek Niphade; Prof. Harshal Agashe
People are exposed to different risk forms and the risk levels can vary. These dangers contain the risk of death, health and property loss or assets. But, risks cannot usually be avoided. Insurance is, therefore, a policy that decreases or removes loss costs incurred by various risks. Insurance provider they use different tools to calculate insurance premium. ML is beneficial here. These ML models can be learned by themselves, the model is trained on insurance data from the past. The requisite factors to measure the payments can then be defined as the model input, then the model can correctly anticipate insurance policy costs. The regression Is the best choice available to fulfill our needs. We use Multiple Linear Regression in this analysis since there are many independent variables used to calculate dependent(Target) variable. To make this predictions more visualize Forecasting can be useful in this case. The key reason for this study is to include a new way of estimating insurance costs. Read More...
|
Information Technology |
India |
12-14 |
4 |
Design of Three Stage Dynamic Comparator with Tail Transistor using 20nm FinFET Modified to Transmission Gate Based Clock Gating Technique
-Monalisa Chatterjee ; Ravish Gupta
According to this article, one of the key disadvantages is excessive power consumption and offset in CMOS based comparators. At scale down technology, CMOS suffers with short channel effect and leakage current. To address these challenges, FinFET technology is used in three stage dynamic comparators instead of traditional circuit designs. The energy efficiency of FinFET-based dynamic comparators is higher than that of CMOS, and the short channel effect and leakage current are decreased. Furthermore, a new design of FinFET-based three stage dynamic comparators with tail transistors was created and simulated using the cadence virtuoso environment. In this paper, A three stage comparator is presented in a novel architecture. The methodology used for this architecture is Clock Gating technique. In order to achieve fast performance, here the Clock Gating structure is designed based on Transmission Gate Configuration. In conventional three stage comparator, the technology used is FinFET. Here, considering the same technology to develop proposed three stage comparator and its modified architecture. The entire designs are simulated using H-spice software and the comparison of conventional and proposed architectures in terms of power and delay are also presented. According to simulation results, the modified three stage comparator decreases power consumption by 20% it has a 17% energy efficiency. Read More...
|
Electronics & Communication Engineering |
India |
15-21 |
5 |
Seismic Analysis of RC Framed Structures under the Effect of Sloping Ground with Setback Configurations
-Suyash Sharma ; Dr J N Vyas
From the past few decades the population of the world has been rising hastily, due to this there is scarcity of land. To overcome this drawback, structures of different configurations such as Step-back and Step back-set back has been adopted on hilly regions. Most of hilly regions in northern India where seismic activities are common, buildings are required to be constructed on sloping ground due to scarcity of plain land. Buildings situated in hilly areas are much more vulnerable to seismic environment. The buildings situated on hill slopes in earthquake prone areas are generally irregular, torsionally coupled and hence susceptible to severe damage when affected by earthquake ground motion. In this study, analysis of such building with step back and setback configurations under different ground conditions, i.e sloping ground and levelled ground, by using response spectrum method as per IS1893-2016 has been carried out. This study shows that for sloping and levelled ground, step back-setback building gives effective response when earthquake occurs. Read More...
|
Structural Engineering |
India |
22-27 |
6 |
Flexural Analysis of Thick C-Beam Using Fifth Order Shear Deformation Theory
-Tejeshwar Magar ; Vinesh Thorat; Ajay Dahake
As the elementary beam theory based on Euler-Bernoulli hypothesis which disregards the effect of shear deformation and stress concentration, and also this theory is not suitable for thick or deep beam. So in this paper a Fifth Order Shear Deformation Theory is considered for the analytical solution of thick C-section beams with simply supported boundary condition. The results obtained from Fifth Order Shear Deformation Theory are compared with different theories. This comparison shows that the present theory is more accurate than Euler-Bernoulli theory and also comparable with Timoshenko beam theory. Also, in this paper results obtained are discussed with other refined theories. Read More...
|
Structural Engineering |
India |
28-32 |
7 |
Performance of Self Compacted Concrete Using High Volume of Activated Fly Ash
-Ashish Sharma ; Dr J N Vyas
The self-compacting concrete is most important development in this concrete Era, This world needs sustainable development in the every aspect of resources utilization. The goal of this research is to replacement in concrete with activated fly ash. Activated fly ash enhances the strength and durability of concrete at an early age, as well as its corrosion resistance. The fly ash is activated using a variety of processes, including mechanical (physical), thermal, and chemical activation. Chemical activation of fly ash by alkaline activators (i.e. alkaline solutions of high alkaline concentration chemicals like gypsum, sodium silicate and calcium oxide, KOH, etc.) improves the effectiveness of fly ash by dissolving the glassy layer of fly ash particles in cement concrete, increasing corrosion resistance. Chemical treatment of fly ash using chemical activators is used in this study to increase its quality. Chemicals such as sodium silicate and calcium oxide are utilized to activate the fly ash at the ratio of 1:6 for this study. The previous results show very satisfactory that the fly ash can be used to improve the properties of self compaction concrete. In this work experiments were carried out for the effective replacement of cement activated fly ash at different proportions. The aim was to investigate the characteristics of concrete with the addition of activated fly ash and comparing it with the control mix, thereby determining the advantages and disadvantages of doing so. In this activated fly ash is added to a 50%, 60% & 75% by partial replacement of cement. The fresh concrete is tested for slump test and the compaction factor test, while the hardened concrete for compressive, tensile, flexural strength and durability. Read More...
|
Structural Engineering |
India |
33-39 |
8 |
Detect the Fake Faces from Images and Videos Using Convolutional Neural Network
-Shubham Dhamal ; Vaishnavi Adsul; Tushar Gavhane; Priyanka Lokhande
Nowadays, the development of technologies that can generate Deepfake videos is expanding rapidly. In fact, compressed videos are common in social networks, such as videos from Instagram, Facebook and Twitter. Therefore, learning how to spot compressed Deepfake videos becomes crucial. These videos can be easy to create but due to this it effects on Personal reputation, Business Reputation and aids to financial loss. Therefore, we proposed a detection system which identifies the real video and fake. Throughout this paper we will use real and fake videos data to train the Convolutional neural network and classify their categories into real and fake. CNN gives better accuracy on image and video dataset. In this paper, we will be building a web application that takes image or video as input and pre-process that with help of CNN model and gives the final classification as an output. Read More...
|
Information Technology |
India |
40-43 |
9 |
Experimental Study of Surface Water of Kodli Lake
-Manish Srivastava ; Revansiddaya; Prashanth; Akshata pawar; Aiswaraya Rani
Freshwater is required for sustenance of life on Earth. Freshwater can be found in surface water bodies such as lakes, rivers, ponds and canals. Potable or drinking water is defined as having a satisfactory quality in terms of its physical, chemical and bacteriological parameters so that it can be securely used for drinking and cooking. The most common and widespread health risks associated with drinking water in developing countries are of biological origin. The WHO Guidelines for Drinking-Water Quality recommend that Faecal Indicator Bacteria (FIB), preferably E. coli or alternatively Thermo-Tolerant Coliform (TTC), should not be detectable in any 100 ml drinking water sample. Water is essential to life on Planet Earth. Humans generally consume from 2 to 4 L water/day. The composition of drinking water has positive and negative effects on human health because it may contain microbiological, chemical, and radiological contaminants. When contaminated with human and animal wastes, water contributes to Waterborne diseases such infections with microbial pathogens which result in gastrointestinal problems e.g., Diarrhoea or in systemic illnesses e.g., hepatitis); kidney failure.Water-washed diseases linked to poor hygiene resulting from poor access to safe water. Water-based diseases such as schistosomiasis caused by parasitic worms that live inside snails, the parasite causes damages in several organs such as the intestines, skin, liver, and the brain. Water-related diseases caused by insect vectors that breed in water. Read More...
|
Engineering |
India |
44-48 |
10 |
A Study of Cyber Security Difficulties and the Rising Trends in Related to New Technologies
-Nadigottu Lavanya Lingaiah ; Patel Mahima Rambali
Cybersecurity is the practice of securing critical systems and sensitive data from digital attacks. Cybersecurity measures, also known as information technology (IT) security, are intended to combat threats to networked systems and applications, whether they originate within or outside of an organization. Cyber security refers to the technologies and processes that are designed to protect computers, networks, and data from unauthorized access and cybercriminal attacks delivered via the internet. Through, cyber security is the important for the network, data and application security. Cyber Security is critical in the field of information technology. Today, one of the most difficult challenges is securing information. When we think of cyber security, the first thing that comes to mind is 'cyber crimes' which are increasing at an alarming rate. With the increase in cyber-attacks, every organization requires a security analyst to ensure the security of their system. These security analysts face numerous cybersecurity challenges, such as protecting government organizations confidential data, securing private organization servers, and so on. We have some cyber security challenges like Ransomware Attacks: Ransomware is the biggest concern now in the digital world. IoT Attacks (Internet of Things): The Internet of Things or IoT is the most vulnerable to data security threats. Cloud Attacks, Phishing Attacks, Cryptocurrency and Blockchain Attacks. Cyber security is the prevention of cyber-attacks on internet-connected systems, including hardware, software, and data. We have some advantages of cyber security: 1) It will protect us from hackers and viruses. It enables us to navigate a secure website. 2) All incoming and outgoing traffic on our computer is processed. 3) The cyber security developers will update their database once a week, so new viruses will be detected. 4) Every week, we must update the cyber security application on our computer. Various governments and businesses are taking numerous steps to combat cybercrime. Aside from various measures, many people are still concerned about cyber security. The Central Government has taken steps to raise awareness about cybercrime, such as issuing alerts/advisories, building capacity/training for law enforcement personnel/prosecutors/judicial officers, and improving cyber forensic facilities. This paper focuses on the latest technological challenges in cyber security. It also focuses on the most recent cyber security techniques, ethics, and trends that are changing the face of cyber security. Read More...
|
M.SC.IT |
India |
49-54 |
11 |
Computational Simulation of Modeling Analysis and Its Performance and Design Parameters of V ARC Ribs Patterns Arrays Having on SAH Plates
-Yashwant Singh ; Ravindra Mohan
To analysis the design of V rib arrays pattern having on SAH plate for W/w=2 and e/w= and e/W= 0.013 and p/e=24, etc. These values have calculated and analyze by computationally with different phases and get new results to verify. To investigate numerically match with experimentally data to execute design parameter for arrays on duct as given dimension, mentioned in specification. We have to get high efficiency with compactable SAH as well their plate design arrays too, so V-type arrays pattern will be Vital role and with good performance to analyzed. The phases of computational analysis done with V-type with pick to these design values have verified. To check its design performances such as Temperature, pressure and turbulence contour, Density contour through which it's done. As acquire Reynolds no., its k-omega range of turbulence to compute data to design parameter to perform better thermal efficiency to get better performance. Analysis will have to achieve to better performance result to get better acquire experimental result. Read More...
|
Thermal Engineering |
India |
55-60 |
12 |
Identifying Potentially Radical Content through Semantic Analysis and Machine Learning for Social Media Applications
-Priyanka Ingle ; Mr. Jitendra Dangra
With the emergence of social media as a common platform for communication among different people and communities at large, the chances for malicious usage of social media platforms for malicious activities has also increased manifold. One such malicious activity is spreading radical content over social media platforms due to the ease of sharing among several individuals and groups. The challenging aspect though for social media agencies or security agencies is the screening of humongous amounts of data to detect radical content. With no clear boundary to demarcate radical and non-radical content, the classification problem becomes challenging as the data size increases.[1]The proposed work presents an artificial intelligence based technique for detection of radical content. The proposed approach uses the concept of dictionary learning to train a Bayesian Regularized artificial neural network. The performance evaluation parameters are the number of iterations, absolute time and the accuracy. It has been shown that while the proposed system attains a classification accuracy of 97% compared to 89% of previous work. Read More...
|
Computer Science and Engineering |
India |
60-65 |
13 |
Review of Solar Tracking Techniques
-Shubham Nikalje ; Akash Thote; Vikram Nage; Sakshi Mokashi; Prof. K.V.Chandan
Solar tracking drives can be broadly classified as active or passive. Passive drives are mechanical and active drives are electrical or electronics. In this paper, a review of the some recent published techniques for photovoltaic tracking drives is presented. Based on functionality, the published techniques are compared. Active drives are shown to be more efficient when compared with the passive drives but they required power. However, in terms of flexibility and cost, passive drives are more viable than active drives. The merits and demerits of each drives are concluded. Read More...
|
Mechanical Engineering |
India |
66-71 |
14 |
Automated Detection of Blood Leukemia Using Image Pre-Processing and Machine Learning
-Nishee Kushwah ; Prof. Jyotsana Goyal
The present work proposes a technique for blood cancer (leukemia) classification based on machine learning. Manual classification of blood cancer is very challenging and prone to errors and therefore machine learning approaches are employed to perform the task. Out of machine learning algorithms, deep learning has emerged as the suitable candidate for analyzing such large and complex datasets with enormous divergences. The proposed work presents a feature selection and training algorithm based on the RESNET-50 Deep Neural Network for image classification. The RESNET employs the skip connection among the hidden layers so as to reduce chances of overfitting and vanishing gradient. The performance of the proposed system has been evaluated in terms of the error and accuracy. It is found that the proposed technique achieves almost 97.9% classification accuracy which is better than previous work for same dataset (91.84%). Read More...
|
Computer Science and Engineering |
India |
72-77 |
15 |
Attention Tracking during Distracted Driving based on EEG
-Prof. Tambat V. V. ; Prof. Bhutekar N. E.; Prof. Takle V. B.
Driving is a skill that requires drivers to direct their full attention to control the cars. Distracted driving might lead to many catastrophic consequences. The operation of automotive electronic devices and mobile devices has been greatly augmented during driving. Some of these technological devices increase safety and reduce the drivers’ attention load. However, operating the in-vehicle systems sometimes impairs driver’s attention that is taken away from the primary driving tasks. In particular, conversing on the phone while driving is easily distracting, even with hands-free systems. Also drowsiness is becoming a severe issue in case of traffic accidents. Normally, Sleeping can be identified from several factors like eye blink level, yawning, gripping force on the wheel and so on. But all these measuring techniques will check only the physical activities of the human. In some cases, people will mentally sleep with eyes open for a few seconds. This will make very big accidents in driving. In our proposed project work we are analyzing the mental activities of brain using EEG signals based on Brain- Computer Interface (BCI) technology. Brain-computer interface (BCI), an actively progressing field in brain engineering, refers to a platform that measures the specific intent of the user and issues commands to the computer by using EEG. This kind of interface can be used on various applications. Read More...
|
Electrical and Electronics Engineering |
India |
78-80 |
16 |
A Study on MPPT for Utility Grid Connected Photovoltaic Systems with Self-Optimizing Method
-Mr Ankit Uikey ; Prof. Lovkesh Patidar
It is a well-known fact that the dependency of non-renewables sources needs to be reduce to deal with global warming. Solar energy is one such option which is in abundance in India. Solar PV cell are utilised to trap this energy and convert it to electrical energy. The PV cell has the ability to convert near about of 20 % of solar energy to electrical energy. The output of PV cell depends on solar irradiation and panel temperature and panel terminal voltage, based on which MPP can be attained. Hence work is to be done to achieve that point operation for MPPT. This work presents a comparative study between two maximum power point tracking (MPPT) methods in MATLAB/Simulink program that are incremental conductance method and genetic algorithm-based method. The study is performed with variable irradiation and temperature. On simulation, the results obtained are found to give boost converted output voltage of 502.13 V for GA MPPT method and 501.50 V for INC MPPT method. In addition, the output power of boost converter for variable irradiation is found out to be 92.26 KW for GA and 90.41 KW for INC respective only comparison results, GA has clear upper hand over INC method in terms of performance. Read More...
|
Electrical Engineering |
India |
81-88 |
17 |
Public Relations in Business and Its Impact on Buying Behaviour
-Dr. Twinkle
Public relation as a management function is the process of creating, interpreting and communicating suggestions, facts, thoughts and views about work efficiency, organizational effectiveness, and effectiveness and goal achievement within the organization. A supervisor should be a highly effective communicator because no group without effective communication skills is able to succeed or even go forward, to achieve status. The paper touches on the question of what impact the appropriate use of the language of advertising can have on individuals. In today's world, advertising has a great influence on the customer's decision. Read More...
|
Commerce |
India |
89-91 |
18 |
Design and Development of Hubless Wheel
-Panmiya Navinbhai Dalubhai ; Patel Chandresh V
The current innovation connects with a cycle or a motor driven vehicle which continues on direction surface and all the more especially on a street. In the case of a motorcycle, the front guiding wheel is fitted with a first crown-molded roller bearing being involved an external annular component which upholds the edge and an inside annular component which is to an arm. The arm carries at its front end a second crown-shaped roller bearing of which the internal element is made integral by way of a lug of the interior annular element of the roller bearing and of which the interior annular element of bearing is made integral with the arm. The device allows transmitting the steering forces at a point located as close as possible to the contact area between the tire and the road. In addition to that, the vehicle becomes more compact, Because of center mass, it is troublesome in guiding contrast with without center point, which can be effectively directed in manual. The power is sent with the guide of stuff drive system which is more proficient than the chain drive mechanism. Read More...
|
Mechanical Engineering |
India |
92-96 |
19 |
Load Frequency Control of Two Area System with the help of Intelligent Gain Optimizer
-Mr. Manish Patel ; Prof. Deepak Bhataniya; Prof. Lovkesh Patidar
Load Frequency Control (LFC) is used to regulate and control the output frequency signal of the electric generated power within an area in response to changes in system loads. The gain constants in the case of conventional controllers remain the same throughout, for changes in the load value. However, Load cannot be the same throughout, load deviates from time to time. To get rid of these disadvantages related to conventional controllers, a lot many schemes have been put forth in the literature. This work presents a new design of various types of load frequency controllers based on different types of Artificial Intelligent (AI) optimization techniques for a single-area power system. The performance of the controller understudy shows an enhancement in the frequency deviation signal as well as the peak overshoot and settling time for the frequency output signal. The performance of the proposed scheme is validated using MATLAB/ SIMULINK tools. Read More...
|
Electrical Engineering |
India |
97-101 |
20 |
Structural Design of Go-Kart Chassis
-Sonali Shukla ; Shreya Pandey; Divya Tiwari; Sumit Mishra
This research paper mainly focuses on Design Analysis and Forming modelling Analysis of Light Weight Structures in Circular Beam and Solid works. A Go-Kart is Driven by a child or adult and has a steering wheel, pedals, and a seat for driver. AISI1018, which is the best material used on go kart chassis, is a medium carbon steel with high tensile strength, high machinability and provides a good balance of rigidity and ductility. It is mainly designed on CatiaV5 software and we analysed in Ansys R21.0. To check the possible structural deformation stress is applied on the structure and actual impact test is carried out and efforts are made to reduce the deformation in the structure. The design analysis for the chess piece was made in Catia V5 and it has a weight of 1.8 ounces. The Design Build of a Go Kart Many People Are Trying to Build with One1 lakh cost and we also took up the challenge of making a Go-Kart in the budget of 70 thousand. it's a dream we are for Working with the hope of making this a reality.so it's sure the project will be in high demand in the industry. The design process follows all Rules set by the 10th Go-Kart Design Challenge (GKDC) rulebook. It is one of the main systems of the go kart on which other subsystems like engine, steering and transmission systems, seat are mounted. It is one of the main systems of the go kart on which sit other subsystems such as the engine, steering and transmission systems. The forces acting on the vehicle from different directions are responsible for wear and tear in the vehicle. Hence stress arises maximum combined stress direct stress etc. using 3D Modelling software Ansys we had designed a Cad model. Which help us to visualize our Go-kart design and reduces the errors in our fabrication. Our Design is b based on following Objective: 1) Safety Strength Service availability 2) Vehicle control 3) Ruggedness Accommodation, Ergonomics & Aesthetic Durability Cost 4) High performance 5) Light weight Read More...
|
Mechanical Engineering |
India |
102-108 |
21 |
Build-Up and Advancement of Bit coin
-Mitali Jain ; Nandini Mahapatra; Sneha Kumari; Nancy Verma; Akanksha Kulkarni
Bitcoin is greater than a cryptocurrency used for bills or as an investment. There are whole surroundings at paintings in the back of a cryptocurrency. In fact, many such ecosystems are at paintings at the net today, however due to the fact Bitcoin changed into the first, it is beneficial to apprehend the way it functions. While the wild volatility would possibly produce amazing headlines, it hardly ever makes Bitcoin the high- quality preference for newbie buyers or humans seeking out a solid save of fee. Understanding the fine details may be tricky— let’s take a more in-depth study how Bitcoin works. Every Bitcoin transaction that’s ever been made exists on a public ledger reachable to everyone, making transactions tough to opposite and tough to fake. That’s via way of means of design: Core to their decentralized nature, Bitcoins aren’t sponsored via way of means of the authorities or any issuing institution, and there’s not anything to assure their fee except the evidence baked withinside the coronary heart of the system.[1] Read More...
|
Data Mining |
India |
109-113 |
22 |
Affect of Varying the Similarity Threshold in Leader Similarity Based Community Detection
-Ridhi Bhatt ; Sunil Patel; Dr. Kumar Gaurav
In the present scenario community detection is significant for extracting the community structure of a given network. It is very important in understanding and evaluating the formation of large and complex networks. It provides us the competency to look into group-level. There are numerous algorithms that have been put forward to study the community structure in a network and had been applied to various domains. They help in classifying the nodes on the basis of their functions in account of their positions in the communities. In this paper our focus is to study the sensitivity of the similarity threshold extending the leader similarity based community detection algorithm i.e. first of all leader is selected from the network using Eigen vector centrality than on the basis of the similarity threshold the followers are selected and we get the community in the network. We also analyzed how the variation of the similarity threshold helps us to evaluate the size of the community. Read More...
|
Electronics & Telecommunications Engineering |
India |
114-117 |
23 |
Analysis over the Development of a Free Energy Derived Vehicles
-Jitendra kumar
Now a days and in future the free energy vehicle requirements will be increased sufficiently because the storage of combustible mineral oil is decreasing continuously. Here we use the effect of north - north poles of iron magnet effectively to rotate the disc or a wheel. This rotational movement of disc or wheel may be used to run the vehicle on roads. By using required gear ratios we can run the vehicle at required speeds effectively. Read More...
|
Mechanical Engineering |
India |
118-119 |
24 |
The Application of Block chain In Healthcare
-Anjali Saxena ; Dr. Manish Varshney
Blockchain is the cutting-edge technology that everyone is raving about, and it might completely change how we manage data in our systems. It aids in the development of decentralized and distributed systems and exhibits significant distinctions from conventional databases. We can create systems that prevent a single authority from controlling all the data. There has been ongoing research into the possibilities of its use for other non-financial applications, ever since Bitcoin introduced the Blockchain. One of the key sectors involving Blockchain is the healthcare sector. Various healthcare associations along with the doctors at various hospitals use blockchain applications for the exchanging and storing of patients' data. Blockchain applications have the ability to identify severe mistakes, some of which could be dangerous, within the medical field. Since the use of blockchain technology in healthcare, various aspects of sharing medical data such as transparency, performance, and most important of all security have been improved at an exponential level. It is a technological tool that contributes to the improvement of medical record analysis for medical institutions. The present study examines how blockchain can be applied to healthcare. Additionally, the field is experiencing rapid research growth. Various applications such as managing electronic medical records, remote or you can say virtual patient monitoring and drug supply management over all the health care departments, hospitals, pharmacy firms, etc. can be well managed and implemented using this growing technology. This paper covers a few unresolved problems and various functionalities that show potential. It also examines various methodologies under the study's constraints. Read More...
|
Computer Science And Engineering |
India |
120-123 |
25 |
IoT Applications: A Literature Review
-Ms.Sonali Balasaheb Anantkar ; Ms.Varsha Balasaheb Kharwade; Mr.Vikas Bhiku Takale
The likely benefits of Internet of Things (IoT) are unlimited and IoT applications are moving the way we work and live by saving time and properties and initial new prospects for evolution, modernisation and knowledge creation. The IoT allows private and public-sector organizations to manage assets, improve performance and develop innovative commercial models. The Internet of Things has excessive potential to improve the energy efficiency and to improve all categories of mobility and transport. The approaches like cloud technologies, big data, cyber-physical systems, and future networks like 5G are evidence of IoT. The success of IoT depends on environment development, where issues like identification, trust, privacy, security and semantic interoperability are crucial importance in relation to development. Read More...
|
Electronics and Telecommunication Engineering |
India |
124-128 |
26 |
A MIMO Antenna Based on Cooperative Diversity for Improved Envelope Correlation Coefficient
-Neha Ramesh Jadhav ; Vaishali S.Dabhade
Multiple-Input Multiple-Output systems are important for increasing the capacity in wireless channels. In MIMO system more than one antenna is used at both the transmitter and receiver sides. Compared to the usual wireless systems, the main advantages of the MIMO systems are thehigher system capacity, improved bit rates, more link reliability, and coverage area is wider. The emerging new services in wireless applications have created a great motivation to use the MIMO systems to complete the demands needed for these applications. The MIMO systems can be used with other new techniques to get the benefits by using a higher spectral efficiency. Co-operative diversity is a cooperative multiple antenna technique for increasing total network channel capacities for any given set of bandwidths In the proposed system modified 2x2 multi input multi output triangular microstrip patch antenna is designed and analyzed. Read More...
|
Electronics and Telecommunication Engineering |
India |
129-132 |
27 |
ANN for Prediction of Parkinsons Patients
-Prathamesh Anant Palvankar
Parkinson's Disease (PD) is a long-term degenerative disorder of the central nervous system that mainly affects the motor system. The symptoms generally come on slowly over time. Early in the disease, the most obvious are shaking, rigidity, slowness of movement, and difficulty with walking. Doctors do not know what causes it and finds difficulty in early diagnosing the presence of Parkinson's disease. Parkinson's Disease (PD) is a chronic neurodegenerative disorder that has been ranked second after Alzheimer's disease worldwide. Early diagnosis of PD is crucial to combat against PD to allow patients to deal with it properly. However, there is no medical test(s) available to diagnose PD conclusively. Therefore, computer-aided diagnosis (CAD) systems offered a better solution to make the necessary data-driven decisions and assist the physician. Numerous studies were conducted to propose CAD to diagnose PD in the early stages. No comprehensive reviews have been conducted to summarize the role of AI tools to combat PD. Read More...
|
M.SC.IT |
India |
133-137 |
28 |
Night Vision Security Patrolling Robot
-Pranjali Wavdhane ; Samadhan Thokal ; Ashwini Shete
The Night Robbery is now become a biggest challenge in front of the entire world. According to survey, India is the 3rd top most country where the night robbery rates are increasing every day hence it becomes essential for India to reduce the crime rate and to provide security to the people at night. Now a day’s robots are working for people in various sectors like industries, houses, and laboratories etc. hence we can use robot in security and surveillance field also. If the robot is going to be used for security purpose, then it will provide better security and perform its work more efficiently than human being. And as the robot is pre-programmed machine so it will reduce the chances of the errors which are generally happened by human being. Hence autonomous security robots are a new groundbreaking innovation in advanced security and surveillance technology. Patrolling robots are now widely used in various security and surveillance applications such as in household & business security purpose. Thus we are going to make a Night Vision Security Patrolling Robot which is provided with a night-vision-capable wide angle camera which is able to capture video & images at night i.e. in darker area. It is moving robot that can patrol surrounding places and capture pictures of suspicious activities, and if it finds any kind of suspicious/malicious activities, objects or person trying to enter in your compound then it sends alerts to owner via email or text message and also gives alarm through buzzer. Read More...
|
Electronics and Telecommunication Engineering |
India |
138-141 |
29 |
Review of Various IoT Based Irrigation Systems
-Om Shelke ; Snehal Wabale; Sonali Anantkar
From time immemorial, agriculture has been the key to sustaining civilization. Farming has come a long way from not-so-efficient manual methods of growing crops to automated large scale cultivation that combines the use of machinery with various soil treatment techniques and high yield seeds. IoT is ushering in a new era of smart farming to allow farmers to grow crops in a more controlled and productive manner, and facilitate better utilization of land thru proper crop selection and enhanced monitoring of soil, irrigation, temperature, plant health and other critical aspects that impact the yield. Read More...
|
Electronics and Telecommunication Engineering |
India |
142-143 |
30 |
MHD Unsteady Free Convection Flow Due To Moving Porous Plate with Surface Heat Flux
-Harshada Kalpesh Chavan ; Bhagwat Mohite
The current analysis presents the effect on unsteady free convection flow past a moving vertical porous plate with influence of the magnetic strength and constant heat flux. The governing equations (pde's) of flow situation model is remoulded into non-linear ordinary differential equations via similarity technique. Read More...
|
Master of Science (MSc) |
India |
144-146 |
31 |
An Approach to Magnetic Abrasive Finishing Process
-Harvir singh ; Dr. Lakhvir Singh; Dr. Arishu Kaushik
Magnetic abrasive finishing (MAF) process is an advance machining process that produces high quality surface by removing material from the work piece surfaces. The magnetic abrasive finishing process have been classified according to finishing profile of surface i.e. cylindrical surface finishing, inner surface finishing and plane surface finishing. This paper summarized better understanding about the experimental work that had been performed on process and response parameters. The surface roughness and material removal highly depend on machining gap and magnetic flux density. Read More...
|
Mechanical Engineering |
India |
147-150 |
32 |
The Corrosion Prevention through Plastic Coating on Steels
-Amulya Kumar Sahoo ; Protyush Kumar Mohanta; Soumya Kanta Sahu
Corrosion of pipelines coatings is one of the main problems in oil and gas industries for which a large amount of money is spent each year. Coating is the first defense line in front of a corrosive environment in which pipes have been buried. Good function of a coating depends on its adhesiveness rate to the metal surface. Initial adhesiveness and its durability in the contact conditions are same among those factors that enhance coating efficiency in a long term. The rate of initial adhesiveness has a high relationship with coating movement and surface wetness by this movement in the course of applying the coating and also with the cleanliness and preparedness of pipe surface. The durability and permanence of adhesiveness depends on coating properties including its resistance in front of moisture penetration. Applying coating on the pipelines has high cost so for this reason the selection and application of coating of high importance. Also for underground buried pipe it is not possible to change their coating in short duration unlike other structures. Therefore the coating must ben durable for 20 years. This process to investigate the reason for corrosion in steel pipes with three polythene layers. Read More...
|
Industrial Materials And Metallurgy |
India |
151-155 |
33 |
Development of Android App for Designing of Stepper Motor Using Kodular Software
-Adwait Malashe ; Rahul Abhyankar; Prathmesh Kubal; Affan Mukadam
A step motor or stepping motor is also known as a stepper motor, may be a brushless DC electric motor of a full rotation divided into a number of equal steps. During this project, we aim to propose GUI software specifically designed for this application. Implementing a system that has GUI for designing Stepper Motor dependent variables supported given parameters. Designing techniques were developed for both typologies of static magnet stepper motors, respectively bipolar stepper motor and unipolar stepper motor. Read More...
|
Electrical Engineering |
India |
156-157 |
34 |
Estimation of Land Surface Temperature of Pinder Watershed, Central Himalaya Using Landsat-7 Data
-N. C. Pant ; J.S. Rawat; Meenaxi ; Babita negi
Land Surface Temperature (LST) is one of the primary indices in the mechanics of land-surface processes on global and regional scales. It is the aggregation of the product of the terrain atmospheric interactions and energy fluctuation between the atmosphere and the terrain surface. Determining precisely the thermodynamics of LST is critical in huge range of applications such as climatology, hydrology, agriculture and biogeochemical and in change detection studies. The rapid advances in thermal remote sensing techniques have led to the measurement of LST from space borne applications in determining the impact of surface temperature dynamics at global, regional and local levels. The fundamental objective of the present paper is demonstration application of Remote Sensing techniques in determining of LST using one of the Great Himalaya watersheds of the Kumaun Himalaya, viz Pinder Watershed. For determining of the spatial distribution characteristics of surface temperature of Pinder watershed, the Landsat TM (Thermal Band) data of years 1990, 1999 and 2011 at a resolution of 30m are used. Mono-window and single channel algorithm were used to estimate land surface temperature for Pinder Watershed, and a correlation was made between LST, NDVI and Landuse/Land Cover (LU/LC) to analyses about land surface temperature and its distribution under different terrain categories by the application of GI Science techniques. The results reveals that the maximum, minimum and average temperature have increased from 21.65℃, -17.50℃, 2.07℃ to 26.07℃, -9.03℃, 8.52℃ respectively from 1990 to 2011. Read More...
|
Geography |
India |
158-162 |
35 |
Study of Alternative Low Cost Construction Materials and Techniques for Housing in India: A review
-Santosh Alwekar
This paper reviews the various low cost construction materials and techniques in construction of housing for low-income group (LIG), and below poverty level (BPL). It comprises the important study, analysis and results from the experiments and literature of many authors. India is facing a great housing shortage in LIG and BPL sectors. Building materials like bricks, concrete, steel, cement, wood etc and the technologies are proving unsuitable regarding their cost effectiveness. The houses constructed by using these materials and technologies are unaffordable to LIG and BPL. In this paper review of many researches is taken about low cost materials and techniques for housing. Low cost housing concept deals with use of materials, and techniques which help in reducing the overall cost of construction the materials and methods described in these researches are alternatives to conventional materials and methods of construction. The paper tried to briefly discuss the motives of the researchers, their suggestions and results. Read More...
|
Architecture & Planning |
India |
163-167 |
36 |
Modular Construction A New Construction Technique in India
-Rahul Gautam ; MD. Umar; Saumya Verma; Khushboo Tiwari
The article considers various & advanced method of modular construction which includes and emphasized that the use of modular construction to shorten the time, project design, less waste and more recycling of Materials, and more reliable thermal performance in comparison to more traditional construction, as well as improve productivity and also the main factor which is reduce the cost. The way of construction existing safe, cost efficient and Eco-friendly work. This research paper acknowledge us about the prospects and relevance of introducing modular prefabricated units is not only used in to low-rise but as well as into high-rise & multi-story building (construction) also. In recent decade there has seen a growing interest in applying modular construction, As well as the productivity in the factory is low and also the manufacturing of modular buildings remains slow in making technical progress. Read More...
|
Civil Engineering |
India |
168-170 |
37 |
Three Dimensional CFD Simulation on Two Row Plane Fin Heat Exchanger: A Review
-Brijesh Kumar Sen ; Prof. Amit Khare; Prof. Shamir Daniel
Three-dimensional CFD simulations are carried out to investigate heat transfer and fluid flow characteristics of a two-row plain fin-and-tube heat exchanger using ANSYS FLUENT. Heat transfer and pressure drop characteristics of the heat exchanger are investigated for Reynolds numbers ranging from 330 to 7200. Model geometry is created, meshed, calculated, and post-processed using ANSYS Workbench. Fluid flow and heat transfer are simulated and results compared using both laminar and turbulent flow models (k-epsilon, and SST k-omega), with steady-state solvers to calculate pressure drop, flow, and temperature fields. Model validation is carried out by comparing the simulated case friction factor f and Colburn j factor with experimental results from the literature. For friction factor determination, little difference is found between the flow models simulating laminar flow, while in transitional flow, the laminar flow model produced the most accurate results and the k-omega SST turbulence model was more accurate in turbulent flow regimes. The results of simulations for heat transfer in laminar flow using the laminar flow model are found to be in good agreement with the experimental results, while heat transfer in transitional flow is best represented with the SST k-omega turbulence model, and heat transfer in turbulent flow is more accurately simulated with the k-epsilon turbulence model. Reasonable agreement is found between the simulations and experimental data, and the ANSYS FLUENT software has been sufficient for simulating the flow fields in tube-fin heat exchangers. Read More...
|
Thermal Engineering |
India |
171-175 |
38 |
How Secured and Safe is Cloud?
-Jagruti Chaughule ; Shruti Pannati
Cloud Computing is the one of the hot and high value topic in the IT industry. Cloud computing provide a new method of delivering computing resources. Cloud computing resources includes data storage, processing to software, customer relationship management etc. The goal of cloud computing for private or public is to provide easy and scalable services to the IT industry. In simple words the delivery of software, storage, network, analytics and intelligence over the internet to provide faster, economic and flexible service to the client. Amazon rollout the first kind of cloud in 2006 after that many companies like Google, Oracle, Azure, IBM any many provide the cloud services. Services provided by cloud providers are Paas (Platform as a Service), Saas (Software as a Service), Iaas (Infrastructure as a Service). Virtualization is the one of the main keyword found in the cloud world. Virtualization is creation of virtual servers, infrastructure and computing. Virtualization is the one of the foundational element in the cloud computing. As all industries are moving into cloud the security is also as important and this research paper is going to check how safe is cloud? Read More...
|
M.SC.IT |
India |
176-178 |