| No. |
Title and Author |
Area |
Country |
Page |
| 101 |
Effect of Inclination on the Performance of Solar Water Heater
-Anand Patel
The energy crisis and shortage of fuel influence the worldwide economy and environment too and to overcome such difficulty alternative energy sources are best option and out of that the solar energy is available in abundant amount having wide application in the area of heating, cooking and power generation. The solar energy having one typical heating application in case of solar water heater and the thermal performance of solar water heater is highly influence by its material, water flow rate and orientation of solar water heater. Additionally inclination of solar water heater also affect the thermal performance solar water heater with respect to ground on which it is placed. The aim of present work is to study the performance of solar water heater corresponding to various angles with respect to ground. Read More...
|
Agricultural Engineering |
India |
413-416 |
| 102 |
Accident Detection and Vehicle Tracking System Using GSM, GPS, and Arduino
-Gauri Gunjal ; Yash Shah; Sneha Kadale
Our lives are now easier thanks to structure and technology development. The preface of technology has also increased business troubles and the frequency of road accidents, which results in significant loss of life and property owing to shy exigency coffers. This design involves a small number of systems that are created automatically to identify an accident and notify the near exigency services. This system might pinpoint the scene of the accident, directing exigency medical backing there right down. The system includes an accelerometer, GPS, and a GSM Module for communication transmission. The auto's axis suddenly changing is detected by the accelerometer. and the GSM module sends a mobile alert communication with the accident's circumstances. The accident's position is indicated inside a Google Map link of that sort, as determined by the GPS module's latitude and longitude. After the situation has been vindicated, the essential way will be done. This can help to expedite the deliverance trouble and save a priceless mortal life. Read More...
|
Electronics and Telecommunication Engineering |
India |
417-421 |
| 103 |
Credit Card Fraud Detection Using Lightgbm Machine Learning Algorithm
-Avinash Vinod Maindre ; Tejas Uttam Jadhav; Akash Dattu Nikale; Ganesh Manjabapu Kale; Abhishek Avinash Shelar
Credit card fraud has become a significant concern for financial institutions and cardholders worldwide. Traditional rule-based fraud detection systems are limited in their ability to adapt to evolving fraud patterns. In recent years, machine learning algorithms have shown promising results in detecting fraudulent transactions by analysing large volumes of transactional data. In this paper we aim to develop a credit card fraud detection system using machine learning algorithms. The proposed system utilizes historical transactional data, including features such as transaction amount, merchant category code, time of transaction, and cardholder information, to train a model capable of identifying fraudulent transactions. This paper follows a supervised learning approach, where a dataset consisting of labelled transactions (fraudulent and non-fraudulent) is used to train the machine learning model. Various algorithms such as logistic regression, random forest, and Light GBM are evaluated to determine the most effective approach for fraud detection. Read More...
|
Computer Science |
India |
422-424 |
| 104 |
Review on Brain Tumor Detection
-Akshada Borhade ; Nikita Verma; Sulaxan Jadhav ; Dr. Maheshwari Biradar
Brain tumor detection is an important task in medical imaging since it can have a major impact on patient outcomes. There has been a surge in interest in developing automated systems to aid in the detection and diagnosis of brain tumors utilizing multiple imaging modalities in recent years. The major purpose is to highlight the proposed strategies and limitations of these approaches, as well as to examine their benefits for enhancing the accuracy and efficiency of brain tumor identification. Overall, the advancement of automated brain tumor detection systems has the potential to enhance patient outcomes by allowing for earlier identification, more accurate diagnosis, and more prompt treatment. Read More...
|
Computer Science and Engineering |
India |
425-428 |
| 105 |
A Machine Learning and OMR -Based Authenticated Coverless Image Steganography
-Linnet Elsa John ; Giri SM
Schools and universities use the Optical Mark Recognition (OMR) system frequently to scan multiple-choice tests. In this procedure, we provided an automated method based on digital image processing that is utilised to correct Multiple Choice Questions (MCQ). The steganography method involves hiding sensitive information within carriers like digital images, text, and other types of media. Current image steganography techniques, producing the steno-image as a result. These adjustments enable stegno analysis algorithms to recognise the hidden message that is embedded. In order to address this issue, a coverless data concealing idea is suggested. This is an innovative and quick technology that enables the processing of hundreds or thousands of OMR answer sheets. The technique relies on a key points detection algorithm and the development of a template answer sheet. The suggested solution uses thresholds, vertical and horizontal projections, and ways to automatically calculate the number of right answers. The suggested strategy can identify multiple choices or none at all. The study's findings include 100% accuracy on five different MCQ paper formats and less than one second processing time for each exam. The effectiveness of the suggested system will also be evaluated against various scholarly studies. Read More...
|
Computer Science and Engineering |
India |
429-434 |
| 106 |
Design and Development of Step Lift
-Shrushti Vijay Lade ; Dr.S.P.Trikal
Today's world, elderly people are facing problem like mobility going from one level to another to is this situation of them a prototype is design of step left which is easy to use cheap and fast and safe for moving from one place to another and it can be installed easily without any civil constructions. This paper discuss the design calculation consideration of length, speed capacity, roller diameter, motor, timing belt, and timing pulley and how much weight the platform can hand. It also gives the idea of the angle and axis of rotation how the transmitter and receiver is used even the sensors which are being used to detect the objects. Read More...
|
Mechanical Engineering |
India |
435-437 |
| 107 |
Implementation of CLINIFIE
-Sankalp Jagannath Deore ; Prof. M. S. Khan; Aniket Dilip Dalal; Rohit Purushottam Amrutkar; Sarvesh Rajendra Dhawale
This project aims to streamline the car washing services industry by leveraging modern technologies such as Google Maps, REST API, and Firebase Geo-Fire. The project provides a platform for customers to easily find and hire cleaners based on their location and distance. The system works by using the latitude and longitude of both the customers and cleaners to determine their proximity, which in turn helps customers find the nearest and most suitable cleaners. To access the services, customers are required to subscribe to a plan that suits their needs, and cleaners are then bound to provide car cleaning services until the customer's plan expires. Overall, this project simplifies the process of finding and hiring cleaners for car washing services, and provides a convenient and efficient solution for both customers and cleaners. Read More...
|
Information Technology |
India |
438-441 |
| 108 |
Seismic Performance Assessment of Existing Bridge (Cross-Sectional Behavior)
-Sainath Govind Limbapure ; Vishwajeet Kadlag
The present study only focuses on the performance evaluation of the pier and its foundation. All other bridge components have been assumed to be safe throughout the analysis. The analysis results of the study show that the pier section has insufficient shear strength to resist earthquake forces. It shows unwanted brittle failure mechanism of the bridge. Therefore, the performance of most of the exiting bridges (designed prior to introduction of capacity design philosophy for bridge design) under seismic excitation is questionable. Piers of the existing bridge has been retrofitted with steel plates to make it strong in shear. The performance of the retrofitted structure has been assessed by performing non-linear time history analysis. Further, analysis results of the retrofitted bridge conclude that bridge piers are safe for shear and bending action due to earthquakes. Hence, it is essential to evaluate the performance of all existing conventional bridges and retrofit it by any suitable method. Read More...
|
Structural Engineering |
India |
442-444 |
| 109 |
IT Policies And Business Management
-Ansari Mariya Asghar Ali ; Ansari Kaniz Amina Murtuza
India's population is expected to increase by about 0.81% every day from today through 2022, and business is expected to expand significantly as well. According to the economic report, India has an unexplored market. IT technology is used in the digital era of the globe for growth, security, high proficiency, etc. This article will address the importance of developing information technology (IT) policies and strategies in general, as well as how they affect organizational competitiveness. Information technology, a key instrument for more effective and efficient communication, is developing quickly and poses a serious danger to businesses and their employees' right to privacy. One of the greatest methods to ensure efficient IT standards, processes that protects organizational IT resources and regulates information sharing to meet its defined objectives through policies that manage mission-critical activities is through the design of IT policies. The field of information technology (IT) is developing quickly. The organization and enterprises are greatly threatened by this development. Technology-based information exchange is essential to the organization's goal. This is due to the fact that every firm or organization's ability to survive depends on the technology used for information exchange and the controls implemented. Therefore, information technology policies with strategic goals must govern how information technology is used. The goal of IT policy is to safeguard an organization's valuable, dynamic resources. In order to achieve this, suitable policies, strategies, processes, standards, and guidelines must be developed. According to the study, in order to achieve predetermined goals, IT policies and strategies must be in line with the organization's vision and mission-critical operations. It was advised that in order to get a competitive edge, each successful organization should first establish visions, adopt IT plans, and create IT policies. Read More...
|
M.SC.IT |
India |
445-447 |
| 110 |
Fragility Analysis of RCC Frame Structure
-Aditya Kate ; Prof. Nagesh Shelke ; Prof. Sameer Chambulwar
In recent years, number of studies have been carried out for the evaluation of vulnerability of structure during seismic events. Fragility analysis is one of the important probabilistic approach to estimate the damage data at different damage state during seismic events. The G+10 Reinforced Concrete frame structure is considered for analysis. The structure is analysed in ETABS by Incremental Dynamic Analysis. Fragility curve developed for Incremental Dynamic Analysis for different damage states by considering set of 3 real ground motions. The fragility curves are derived from analytical method. The fragility points for different damage states are derived from analytical formula. From Incremental Dynamic Analysis fragility curve plotted for probability in Y-axis and peak ground acceleration in X-axis for five different damage state. The behaviour of fragility curve after achieving the 100% probability for different damage state is constant. Read More...
|
Structural Engineering |
India |
448-450 |
| 111 |
Blockchain in Healthcare
-Nadigottu Lavanya Lingaiah ; Nadigottu Lavanya Lingaiah; Patel Mahima Rambali; Tahereen Momin
The technology that underpins bitcoin and other cryptocurrencies has led to a lot of locations accepting Bitcoin payments. To handle patient and doctor databases while a surgery is performed, the article intends to develop a diagrammatic conceptual model of a medical app utilising Blockchain technology. This study will continue to suggest simulation space conceptual models in current research, particularly in the context of the few models that have implemented blockchain in healthcare. This research describes the blockchain, its features, and the function it serves in the healthcare sector. It provides claim adjudication, application, interoperability, and blockchain management. It also considers the difficulties and possible outcomes, as well as how they may be used in other healthcare fields. The purpose of this article is to demonstrate how Blockchain technologies may be used in the healthcare industry, potential problems with this technology in the future, and what the Blockchain's future may hold. Read More...
|
M.SC.IT |
India |
451-453 |
| 112 |
Cloud Security Enhancement using BGV Fully Homomorphic Encryption
-Dipti Gautam ; Rakesh Shivhare
Cloud computing empowers enterprises to efficiently manage big data and discovery of useful information which are the most fundamental challenges for big data enabled applications. The cloud offered unlimited resources that can store, manage and analyze massive and heterogeneous data to improve the quality assurance of application services. Nevertheless, cloud computing is exposed to enormous external and internal privacy breaches and leakage threats. Fully Homomorphic Encryption (FHE) is used as an emerging and powerful cryptosystem that can carry out analysis tasks on encrypted data. This research work proposes an approach for securing cloud data transmission using the Brakerski-Gentry-Vaikuntanathan (BGV) algorithm and self-key mutation technique. The proposed model is synchronized with the user role to generate tokens and keys for securing data on the cloud, and the algorithm used for key and token generation depends on the type of user or tenant. The proposed method is tested and compared with an existing method for key generation time, encryption time, and decryption time across different plain text sizes. The results show that the proposed method outperforms the existing method in all aspects. Read More...
|
Computer Science and Engineering |
India |
454-460 |
| 113 |
Forest Fire Detection in Satellite Images Using Conventional Neural Network
-Rishabh kumar ; Prof. Rohini Bhosale; Vaibhav More; Yamunesh Mandaviya; Anirudh Bihani
The number of forest fires is increasing significantly. According to the NFS, 75% of forest fires are human-caused and the remaining 25% are caused by natural phenomena. The reason for the growing number of forest fires is hunting, which interferes with forests, especially in underdeveloped countries. A forest fire has a significant effect on the atmosphere and wildlife. This study used Landsat satellite images on the Google Earth Engine, to present a model that can identify the presence of fire in an image data. The data used here are images from Google Earth Engine. We use a machine learning model called deep Convolutional Neural Network to solve the forest fire problem. CNN is a supervised type of machine learning, most advantageously used in image recognition and computer vision. Using the dataset, the features of both types of images, i.e., fire and non-fire images, will be extracted. And then, based on the training data set, a forest fire can be detected. Read More...
|
Information Technology |
India |
461-465 |
| 114 |
Performance Analysis of Grid Connected Solar Photovoltaic System with Perturb & Observe Based MPPT
-Praful Dange ; Vivek Kumar Kostha
The requirement of renewable energy has become a critical topic in modern days, due to increasing problem like global warming & other environmental issues. The generation of electricity from photovoltaic [PV] arrays has been increasingly considered as a prominent option to fossil fuels. With greater research, alternative renewable sources like wind, water, geothermal &solar energy have become increasingly important for electric power generation. Although PV cells are not new, but their use is becoming more common, also practical, & useful for all the people worldwide. In this paper Solar PV cell system is modeled; and Perturb & observe based MPPT techniques are used, so as to keep the output of Solar PV system constant, so that energy can be harnessed for various application. The performance of proposed system is judged under varying solar insolation and with impacts of loads. Read More...
|
Electrical Engineering |
India |
466-473 |
| 115 |
To Enhance the Durability of Black Cotton Soil Using Terrasil
-Rudresh A N ; Likith K Gowda; Manu Prasad C; Sindhu S; Bhanupriya M
The swelling and shrinkage phenomenon in Black Cotton soil is one of the major issues that damages the civil engineering structures. Black Cotton soil has montmorillonite as primary mineral composition, which exhibits high volume change when subjected to moisture variations. In this study, experimental tests were conducted on different expensive soil to investigate the effect of nanotechnology-based material, Terrasil (Developed and manufactured by Zydex industries). Soil samples were collected from Chamarajanagar. Liquid limit, plasticity index and swelling potential of treated soil were found to be reduced significantly by adding Terrasil. The addition of Terrasil increases dry density while decreasing the optimum moisture content. The optimum dosage of Terrasil is found to be approximately 2-3% by weight of dry. Test results are compared to study the changes occurred after the mixing of Terrasil in soil. Terrasil altered the properties of Black Cotton soil significantly and can give the solution for swelling and shrinkage behavior of soil. The test findings indicates that, due to the inclusion of Terrasil, the swelling characteristics decreased along with its cohesive behavior. Apparently the UCS value of the treated soil declines with an increase in Terrasil dosage. Read More...
|
Civil Engineering |
India |
474-476 |