No. |
Title and Author |
Area |
Country |
Page |
201 |
Design and Fabrication of Slotting Attachment Drilling Machine
-M. Ganesh ; B. Prasanth; S. Rajamohan; V. Thirumaran; G. S. Mollyirine
Slotting attachment drilling machine is nothing but one of the Lifting system in automobile at the time of emergency. In this Lifting system pneumatically operated one. Here the additional pneumatic cylinder and Control Valve is provided in the automobile itself. In this project, the Control Valve is used to activate/deactivate the Air input. The Valve is ‘ON’ at the time of emergency; the compressed air goes to the pneumatic cylinder. Then the compressed air passes through the tube, and then pushes the pneumatic cylinder, so that the Lifting is applied at the time of Valve in “ON†position (i.e.-Emergency time). The speed of the pneumatic cylinder is varied by using flow control valve. This is the way of controlling Lifting speed of the Trailer at the time of emergency. In our project, we have to apply this Pneumatic Modern Trailer Mechanism in Load Lifting Vehicles. Read More...
|
Mechanical Engineering |
India |
768-771 |
202 |
Advanced Surveillance and Locking System
-A. Siva ; S. Shalom Ragland; U. Prashanth; G. Someshwaran
Generally most of the surveillance systems provide only live feed, so in order to find any suspicious activity one needs to go through the entire feed. So, to overcome this, we have created a surveillance system using raspberry pi which identifies humans using image processing and sends it to our e-mail using SMTP protocol. We find this opulent technology particularly to be useful in safe lockers or in restricted area entrances. So we have included a locking mechanism which can be controlled only by the authorized person from anywhere in the world. When the raspi-camera identifies a human it takes a picture and sends it to the e-mail, then once we see the picture we can act accordingly. E-speak (a python library) is used to convey the message via a speaker. The whole setup needs only 10Watts of power supply from a power bank thus making it portable. Most of the biometric security devices can be easily manipulated thus making them unreliable. Our novel project can overcome this heist, since we have the full control on whom to allow and whom to restrict. Read More...
|
Internet of things (IoT) |
India |
772-775 |
203 |
Securing KYC Documents by using Blockchain Technology
-K Prudhviraj ; Dr. K Venkataramana
In the future most of market deals with the Blockchain Technology, because this technology has decentralized database that records the data such as finance contracts, physical assets, and supply chain information. It has achievement over the time and is currently dominated and used by Bitcoin. It is not a new technology but it shown up with the bitcoin, now a days some of the transactions are done with the crypto currency. It gives innovative solutions for FinTech Industry. This technology has energized the financial services industry globally. This concept already brought a disruption in the financial industry. Coming the some of the Industries, which already implementing this technology are, Deutsche Bank, DBS Bank, EBA (Euro Banking Association), US Federal Reserve are some of Financial Sector Banks are going to use this Technology in as like Digital Payments, Assets. This technology is Transparent Business way. So this is very secured and transparent. It is like as distributed ledger. In this paper we have the securing the KYC Documents by using Blockchain Technology. Through by using this Technology we can immutable the data of KYC. If the data is immutable then automatically it will be secured without tampering the data. Read More...
|
Computer Applications |
India |
776-779 |
204 |
Vector Quantization (VQ) Based Data Hiding Technique in Images
-Nandkishor Jilhedar ; Yogesh M Kamble
In the proposed work the theme is separable data hiding into encrypted compressed image without any error and without degrading the quality of natural image. In the first phase, the original image is encrypted using standard image encryption technique. Then, a data-hider uses vector quantization algorithm to embed secrete data. In the second phase, with an encrypted image containing embedded data, if a receiver has the data-hiding key, he can extract the only embedded data though he does not know the image content. If the receiver has encryption key, he can decrypt the received encrypted image to obtain an original image, but cannot extract the embedded data. If the receiver has both the data-hiding key and the encryption key, he can extract the embedded data as well as recover the original image without any error. Read More...
|
Computer Science and Engineering |
India |
780-783 |
205 |
TrailBlazing for Transit
-Princy Catharine L ; Rakhul M; Lakshmisri R; Rakesh Kavi Prawin T; Ramesh A
The search of being smart is overwhelming all over the nation. If the requirement is high, why not the automobiles being smart? The main motto of our paper towards vehicles being smart is due to, lack in people. The major cause for collision between automobiles were unqualified drivers (license less), drunken drive and, sudden medical issues. To overcome this, we are here with a wonderful solution were to Update the vehicle and groom its smartness. Traditional and ancient methods of igniting the engine will be by just the insertion of a key. Here, we integrated our ideas where starting a vehicle with the help of key, RF license card (which holds the license number, user details and their finger print). On the handlebars or steering wheels, we place sensor to measure the pulse rate and his/her thumb print by which we can approximately detect the person is drunk and match the finger print with the license respectively. With the use of controller, we check that all the condition satisfies and then allow the vehicle to ignite. GPS facility can be installed for personal vehicles for tracking in case of theft. For public transit we employ IOT to update the information about the driver along with the time of departure which can be used for the authorities to monitor them at ease. The implementation of this will set the roads free from tasting bloods. Women security stands as a big threat, for emergency purpose a person can access any vehicle by ignoring these conditions, use of a button but once it is used GPS starts tracking the vehicle and intimation will be sent to the police. Read More...
|
Electronics & Communication Engineering |
India |
784-786 |
206 |
Identifying Indian Stock Market for Monthly Based by using Apriori Algorithm
-Shaik Shukur Saheb ; S. Anthony Mariya Kumari
Market analysis is an important component of analytical system in retail organizations to improve determine the placement of goods, designing sales promotions for different segments of customers satisfaction to improve customer satisfaction and hence the profit of the supermarket. These issues for a leading supermarket are addressed here using frequent itemset data mining. The frequent itemsets are mined from the market basket database using the efficient K-Apriori algorithm and then the association rules are generated. The stock market is a non-linear, unpredictable system that is extremely difficult to improve these model with any reasonable accuracy. Investors have been trying to find a currect way to predict stock prices and to find the right stocks and right timing to buy or sell. To achieve this goal, the techniques of fundamental analysis as well as technical analysis are used. Fundamental Analysis is based on the study of factors external to the trading markets which affect the supply and demand of a stock market. It mainly focuses on factors like technological invention, growth of the company, PE ratio, weather, government strategies, financial and political events and prospects of business. It strongly believes that by monitoring such factors for a stock market a state of potential disequilibrium of stock market conditions may be recognized before the state has been reflected in the share price of the company. Technical analysts strongly believe that the current price of company share completely replicates all fundamental information. As all the fundamental information is already replicated in the price, technical analysts consider the current price as the fair value and strongly believe that current price should form the basis for the research. It refers to the various techniques that aim to predict future price movements using past stock prices and volume information. Read More...
|
Software Engineering |
India |
787-791 |
207 |
Suitability of Vallarpadam Dredged Soil in Pavement Construction
-Sreelekshmi V R ; Twinkle Vinu Mohandas
Large amount of sediments are dredged from harbours and seaports for construction of the marine structures and for maintenance of the shipping channels. The dredged soil requires large area for disposal. Offshore dumping causes disruption in the aquatic environment. This soil cannot be used directly in construction processes directly since it exhibits properties such as low shear strength, high natural water content and high compressibility. Attempts were made to stabilize the soil for embankment construction and for landfill. This paper describes the suitability of dredged soil from Vallarpadam in pavement construction by stabilising it with flyash based geopolymer. Read More...
|
Civil Engineering |
India |
792-793 |
208 |
Analysis of Vehicle Accidents on Road by using K-means Clustering Technique
-A Leena ; G Ananthnath
Examining of site visitors information count on a significant job in distinguishing the variables that influencing the rehashed accidents and making an attempt to scale back them. Accident frequencies and their explanations aren’t rather the same as one discipline to one more and additionally differ once in a while in a similar area. Information mining systems, for instance, bunching and arrangement are quite often utilized in the investigation of avenue accident know-how. Alongside these lines this investigation proposes a structure to discrete times of accident frequencies for expressway areas. The proposition structure comprises of grouping procedure and characterization trees. The okay-implies calculation is attached to a lot of frequencies of parkway areas accidents inside 24 hours to detect when and where accidents happen as a rule as viable. These frequencies were separated from 358,448 accident records in Britain somewhere within the variety of 2013 and 2015. The relationship between fatal rate and other attributes including collision manner, weather, surface condition, light condition, and drunk driver were investigated. Based on statistics, Association rules, Classification model and clusters obtain here made certain driving suggestions. Read More...
|
Computer Applications |
India |
794-797 |
209 |
Service Rating Prediction of Social Mobile Users using LBRP
-Dondeti Jagadeesh ; J. S. Ananda Kumar
Recently, progresses in keen cellular devices and situating approaches have in a popular experience upgraded casual communities, which enables customers to proportion their surveys, evaluations, snap shots, registration, and so forth. The geological information situated through PDA (public Display of Affection) overcomes any problems amongst bodily and superior universes. Area records works because the association between customer s physical practices and virtual interpersonal companies organized by using the superior cellular or net administrations. We seek advice from those interpersonal corporations which includes geological certainties as region based sincerely informal groups (LBSNs). Such facts Brings openings and difficulties for recommender structures to look the fresh start, sparsity hassle of datasets and score need. In this paper, we make end usage of the adaptable customers place volatile highlights to do score predication. We mine: 1.The significance amongst customer s critiques and individual element topographical area separations, known as person item geological association, 2. the pertinence between customer s rating contrasts and client individual location separations, alluded to as customer client geological affiliation. It is determined that humans s rating practices are stimulated by geographical location significantly. Additionally, 3 components: person object topographical association, consumer geological affiliation, and relational facet hobby likeness, are melded right into a certain together evaluating expectation adaptation. We direct a chain of analyses on a authentic social rating system dataset Yelp. Trial consequences show that the proposed approach beats contemporary designs. Read More...
|
Software Engineering |
India |
798-800 |
210 |
Detection of Cyberbullying in Social Media
-Pushplata Pradhan ; Pranali Sarode; Neha Mandlik; Komal Ghodeswar; Krupali Ambade
While social media offer great communication opportunities, they also increase the vulnerability of young people to threatening situations online. Recent studies report that cyberbullying constitutes a growing problem among youngsters. Successful prevention depends on the adequate detection of potentially harmful messages and the information overload on the Web requires intelligent systems to identify potential risks automatically. The focus of this paper is on automatic cyberbullying detection in social media text by modelling posts written by bullies, victims, and bystanders of online bullying. We have presented comprehensive reviews on Natural Language (NLP) based approach to enhance the sentiment classiï¬cation by adding semantics in feature vectors and thereby using ensemble methods for classiï¬cation. Adding semantically similar words and context-sense identities to the feature vectors will increase the accuracy of prediction. In addition, SHA-1 authentication mechanism will use to strengthen the authentication. Read More...
|
Information Technology |
India |
801-803 |
211 |
Intrusion Detection Model using Machine Learning Algorithm on Big Data Environment
-K. Ashok ; S. Anthony Mariya Kumari
Recently, the huge amounts of data and its incremental increase have changed the importance of information security and the data analysis systems for a Big Data. Intrusion detection system (IDS) is a system that monitors and also analyzes of the data to detect any intrusion in the system or the network. High volume, variety and also high speed of the data generated in the network have made the data analysis process to detect attacks by traditional techniques very difficult. Big Data techniques are to be used in IDS to deal with the Big Data foraccurate and efficient data analysis process. This paper introduced Spark‑Chi‑SVM model for a intrusion detection. In this model, we have to be used ChiSq Selector for feature selection, and built an intrusion detection model by using support vector machine (SVM) classifier on Apache Spark Big Data platform. We used KDD99 to train and test the model. Read More...
|
Software Engineering |
India |
804-807 |
212 |
Automatic Wastage Collection using Robotic System
-Harshvardhan Sanjay Jadhav ; Ajit Uttam Shinde; Rohit Rajaram Shinde; Akshay Uday Jadhav; Vrushali Rajaram Patil
The world today faces major garbage crisis- the product of rapid economic growth, overcrowding, poor urban planning, corrosive corruption and political dysfunction. The present tried and tested methods of garbage collection have so far been proven ineffective. And the world today is looking at smarter ways of overcoming the garbage collection problem. This project of Automatic wastage collection using Robotic system. The robot is built on a metallic base of size 50x40 cm which is powered by battery of 12V, 7.5Ah. The robot movement is controlled by programming the ARDUINO and MATLAB Image Processing System. The robot is designed to collect Garbage at foot path, public places (parks, schools and colleges), mostly cemented paths and beach. The robot is built in such a way that, when it is started it will move on the path defined in the program. When Camera encounters the obstacle, depending on the conditions applied in the program the Robot proceeds with further motion and then robot picks up the garbage. Read More...
|
Electronics and Telecommunication Engineering |
India |
808-810 |
213 |
Zero Energy Building
-Mrs. Prof. Thorat Nilam Pramod ; Mr. Pramod S Katkar; Mr Amol B Sawant; Mr Aniket T. Jadhav; Mr. Shubham K. Salunkhe
The acute problem of carbon dioxide emissions reduction into the atmosphere becomes more important due to the fact of the global climate change. Housing stock consumes 30 to 40% of all energy resources, according to various estimates. As the result, it is possible to get carbon dioxide atmosphere emissions reduction due to energy consumption reduction. The problem of housing stock energy efficiency improvement becomes very important. Transition to low energy consumption buildings construction becomes a trend which in the nearest future will transform to the task of Applied Research in the field of design and construction. Such exploration object is to design buildings with zero energy consumption or close, which is planned construct on the site of the Polytechnic University. The novelty of the project consists in an integrated approach of the house design, which will be entirely autonomous and independent from the urban networks. Read More...
|
Civil Engineering |
India |
811-813 |
214 |
Quality of Work Life in Hospital
-Dr. V. M Anitha Rajathi ; M. Sivasakthi
Quality of work life is mainly concentrate on improving working circumstances, work content and its safety, security, wages and benefits and etc. It is concern not only for improving the work life but also personal life. Health care industry is one of the most complex activities and it is a service organization. This article mainly focuses on doctors and nurses of their quality of work life because they should regularly stay and work overnight, their job is very critical & complicated because they face a variety of difficulties such as sleep deprivation, stress and work load. So we finally suggest some techniques to improve their quality of work life. Read More...
|
MANAGEMENT |
India |
814-817 |
215 |
Improve Performances and Efficiency in Clustering by using Single Pass Seed Selection Algorithm
-Shaik Asif Ali ; Dr. K. Venkataramana
We widely use k-means method for clustering technique for various applications. However, the k -means often converges to nearby superior and the end result depends on the initial seeds. Inappropriate desire of initial seeds may also yield terrible outcomes. K means++ is a manner of initializing k-means by way of choosing preliminary seeds with particular possibilities. Due to the random selection of first seed and the minimal likely distance, the k-means++ additionally outcomes different clusters in special runs in extraordinary range of iterations. In this examine we proposed a technique referred to as Single Pass Seed Selection (SPSS) algorithm as modification to k-means++ to initialize first seed and probable distance for k-means++ based at the point which became near extra wide variety of other factors within the statistics set. We evaluated its overall performance by making use of on various datasets and compare with k-means++. The SPSS set of rules turned into a single skip set of rules yielding particular solution in much less variety of iterations whilst in comparison to ok-means++. Experimental effects on real information sets from UCI established the effectiveness of the SPSS in generating regular clustering effects. Conclusion: SPSS performed well on high dimensional facts units. Its performance improved with features in the data set; specifically while range of capabilities we recommended the proposed method. Read More...
|
Software Engineering |
India |
818-821 |
216 |
Employee Performance Prediction Analysis using Random Tree Classification Technique
-Gunturu Santhipriya ; G. Ananthnath
Almost every corporation has a performance management system or conduct a performance analysis of its employees. Though there is little evidence that this existing system is able for evaluating the performance of the worker in a big company. The intend of this paper is set references and guidelines for performance analysis of employees for a typical sales company. Our system takes in employee data such as the attendance, pay rate, revenue, expense, gender, and remark to evaluate the performance of the employees of the corporation. Our system would be using Random tree Classification algorithm for evaluate the performance of the employees. Read More...
|
Computer Applications |
India |
822-824 |
217 |
Automated Phrase Mining and Phrasal Segmentation from Massive Corpora
-Saranya U ; Uma E. S
As one of the fundamental tasks in text analysis, phrase mining aims at extracting quality phrases from a text corpus. Compared to the state-of- the-art methods, the new method has shown significant improvements on effectiveness on five real-world datasets in different domains recently, a few data-driven methods have been developed successfully for extraction of phrases from massive domain-specific text. However, none of the state-of-the-art models is fully automated because they require human experts for designing rules or labeling phrases. In this paper, we propose a novel framework for automated phrase mining, AutoPhrase, which can achieve high performance with minimal human effort. In addition, we develop a POS-guided phrasal segmentation model, which incorporates the shallow syntactic information in part-of-speech (POS) tags to further enhance the performance, when a POS tagger is available. Note that, AutoPhrase can support any language as long as a general knowledge base (e.g., Wikipedia) in that language is available, while beneï¬ting from, but not requiring, a POS tagger. Read More...
|
M.Tech in Computer Science And Engineering |
India |
825-828 |
218 |
A Technical Review on Tribological Behavior of Multilayer Physical Vapour Deposition Coatings of Piston Ring
-Omkar Hariba Bhise ; Akshay Dattatray Bhosale; Vitthal Baliram Bachipale; Shubham Chandrakant Bhoite
Thin film coating is one of the best techniques to reduce the frictional forces and improve the mechanical properties of engine components. The physical vapor deposition (PVD) technology in the recent use to deposit thin film coating on engine components. PVD coating is significantly effective on wear resistance, scuffling resistance, surface roughness, and friction of the components in IC engine. This paper presents studies related to piston ring surface treatment, piston cylinder surface and related theoretical and experimental works. This paper covering many references, aims to shed new light on the surface modification related to the piston ring. Read More...
|
Mechanical Engineering |
India |
829-832 |
219 |
Experimental Investigation on Strength Characteristics of Concrete Incorporating Mineral and Chemical Admixture and Bamboo Fibbers as Partial Replacement of Coarse Aggregate
-Mathan Kumar .S ; Abi .T .S; Divya .J .V; Manibharathi .V; Shyam Kumar .P .D
The main objective of this experimental project is to investigate and find out the strength characteristics of concrete after the replacement of cement with fly ash along with rice husk ash which are the mineral admixture and bamboo fibre as a replacement of coarse aggregate. In addition to this master rheobuild 918 which is the chemical admixture used as a super plasticizer. This paper has been made an attempt to study the influence of fly ash and rice husk ash each on replacement ratios of 0%, 5%, 10%, 15%.The coarse aggregate is made with 0%, 1%, 2%, 3% of bamboo fibres. The tests considered for our study are compressive strength test, split tensile strength test, flexural strength test and these test results are compared with strength results of conventional concrete. Read More...
|
Civil Engineering |
India |
833-835 |
220 |
IoT Based Audit Meter and Theft Detection
-Saalem Khan ; Sameer Khan; Safwan Mirza; Keyur Kalwar; Anil Ahir
The Existing domestic Energy meter reading systems universally exist many problems, such as difficulty in construction, too narrow bandwidth, poor real time, not two-way communications quickly etc. To solve above problems, this paper uses the wireless technology for Automatic Meter Reading system. A proposed method provides the communication between the Electricity Board section and the consumer section using Internet of things (IOT) for transmitting the customer’s electricity consumption and bill information that is calculated using PIC microcontroller. The power fluctuations are monitored using the voltage sensor and current sensor is fed to the microcontroller which indicates it to the Electricity Board. Depending on the power generation, the house hold devices are controlled automatically. From Electricity Board section the information regarding the bill amount and payment are communicated to the consumer via Global System for Mobile communication. The power and billing information is continuously transmitted by the use of Internet of Things and monitored by the Electricity Board section. Whenever there is power theft identified can be sent from the Electricity Board section to cut the supply to the customer. Read More...
|
Computer Engineering |
India |
836-839 |
221 |
A Novel Approach for Transaction Management in Heterogeneous Distributed Real Time Replicated Database Systems
-Mr. Dheeraj Bhimrao Lokhande ; Prof. Dhainje Prakash B.
Today, Cloud computing is most widely used system due to number of benefits to end users. In IT (Information Technology) organizations, cloud computing is most vital domain to work. There are different types of services such as SaaS, IaaS and PaaS provided by cloud computing based on the end users needs. Rather than using own resources for data storage and Management, organizations started to utilize cloud computing data storage systems. Cloud storage (eg. Amazon S3) is emerging as a popular service and most of the enterprises shifts their data workloads to the cloud. The popularity of Cloud computing system increased dramatically because it rent computing resources, bill on a pay-as-you-go basis and multiplex many users on same physical infrastructure. Cloud users are provided an illusion of infinite computing resources so that on demand resource consumption rate can be increased or decreased. Cloud computing offers the vision of a virtually infinite pool of computing, storage and networking resources where applications can be deployed. It is the popular solution for on-demand and dynamic resource provisioning. The provisioning & maintenance of cloud resources are done with the help of resource management techniques (RM). The RM techniques are responsible to keep the track of free resources and assign the resources from free pool to incoming tasks. Along with the growing demands of modern applications and workloads, cloud computing has gained prominence throughout the IT industry. Modern applications are growing along various dimensions such as the number of users, complexity, data size and many people are connecting to the internet through various devices. Web Applications which deals with the cloud storage systems contain heterogeneous workload to deploy on the cloud. This heterogeneous workload needs to be handled carefully otherwise problems like long scheduling delay, starvation for low priority tasks may occur which can hurt the performance of the application significantly. To handle this workload characterization is much more important. In workload characterization, heterogeneous workload is divided into multiple task classes with similar characteristics in terms of resource and performance objectives. It is important to consider heterogeneity of workload. The workload typically consists of diverse applications with different priorities and resource requirements. Failure to consider heterogeneous workload, it will lead to long scheduling delay, starvation by affecting performance of the application. Modern applications faces challenges such as workload characterization, resource allocation and security. To meet these needs we propose a new framework which interacts with the heterogeneous database systems and provides workload characterization by using K-means clustering algorithm, resource allocation by providing virtual machines through requesting to the cloud and security by using AES algorithm for encryption and decryption. In this research work, transactions are taken in form of heterogeneous files from users as input and deploy the files efficiently at cloud storage system as output. Transactional operation like insert, update, delete are performed on users data at cloud storage systems. Here, we are attempting to design novel approach for secure, energy efficiency, scalable transaction management system based on terminologies and methods of resource scheduling in heterogeneous distributed database systems. We address “the transaction management problem", which is to interact with the heterogeneous database systems and to allocate and schedule computing resources with workload characterization by providing security to user’s data. Performance Evaluation of the proposed system is done based on fluctuating workloads and in terms of Throughput, Energy Efficiency, CPU Utilization, Scheduling Time, Response Time. The performance of the system is measured and compared with Container Based Scheduling (CBS), Dynamic Power–Saving Resource allocation (DPRA) mechanism and SLA-Aware Energy resource management (SLA) technique. The Experimental results of the proposed system shows effective performance of the system. Results shows that proposed system outperforms existing techniques. The implemented environment is easy to use and the input to the system are given for execution in a normal way without changing or restructuring the code. Read More...
|
Computer Science and Engineering |
India |
840-844 |
222 |
Artificial Neural Network in Construction Project Management Effectiveness - A Review
-Pooja Dudhe ; Prof. Rahul Wankhade
Construction trade is very large and multifaceted industry which plays a vital role in the progress of any nation. Every construction projects requires diverse teams to plan, design, construct and uphold the project. It is commonly agreed that for a construction project to be fruitful it has to be completed on time within budget and according to the specification. Artificial Neural Networks has gained considerable application in construction engineering and management in recent time. ANNs have been successfully applied to many construction engineering areas like cost estimation, construction scheduling, predicting tender prices, risk analysis, decision-making, resources optimization, classification, and selection etc. for effective project management. This paper reviews applications of neural network in construction engineering articles published in various journals. Read More...
|
MASTER OF ENGINEERING IN CIVIL ENGINEERING (CONSTRUCTION ENGINEERING AND MANAGEMENT) |
India |
845-847 |
223 |
Soil Stabilization using Industrial Waste Fly Ash
-Miss Shikalgar Sana R ; Ms. Rupali T Gadekar; Mr. Pankaj S Vedpathak; Ms .Shubhangi S Zarekar
The project deals with stabilization of soil using industrial waste. Unsuitable highway sub grade soil requires stabilization to improve its properties. Fly ash is used as raw materials when the sand can no longer be reused in the industry, it is removed from the industry and is removed from the industry and is termed as industrial waste sand. Fly ash was bought from locally available industries fly ash is used with variable percentage i.e., (10%, 20%, and 30%). For optimum percentage of fly ash within this that percentage of fly ash is used in sub base for stabilization. The project are planned to conduct various experiment like Specific gravity, sieve analysis, proctor compaction test, unconfined compressive strength and direct shear test to increase strength properties and behavior of sub base. Then the results and graphs of various mixes are compared to see their effects in sub base stabilization. The stabilization technique has an additional benefit of providing an environment friendly way to deal with fly ash. Read More...
|
Civil Engineering |
India |
848-850 |
224 |
Generation of Power by using Soil Cell
-Uttara P Dudhpachare ; Prof. Rashmi Singh
In this paper a wireless environment monitoring system using renewable and cost-efficient soil energy. The D-size (55.8 cm3) soil energy cell with carbon and zinc electrodes can produce electricity depending on the water contents and microbial reactions in the soil. The soil cell is used for understanding the electrical characteristics of the cell. The wireless sensing system, including temperature and air moisture sensors, a custom low-power capacitive sensor readout silicon chip, a microcontroller, and a ZigBee transmitter, is to be demonstrated for long-term environmental monitoring solely by the fabricated D-size soil cell. The capacitive sensor readout chip is to be fabricated in a 0.18-μm CMOS process. The total power consumption of the wireless temperature and air moisture monitoring system in the sleep mode and the active wireless data communication operations, should be within the acceptable values. The new technology can enable remote field environment monitoring with less labour-intensive work and battery replacement. Read More...
|
M.tech EE(Power System) |
India |
851-853 |
225 |
A Review Paper on Pervious Concrete
-Juhi Bagade ; Neha Pakhale; Mayuri Moon
Pervious concrete pavement is sustainable type of concrete pavement that can protect and restore natural ecosystem. Pervious concrete is emerging as an alternative material for paving to help curtail non-point source pollution problem. It is one of the most effective pavement material to address a no. of important environmental issue, such as recharging groundwater and reducing storm water runoff. In this experimental investigation on properties of pervious concrete are reported and discussed. The amount of general Portland cement has been reduced by introducing fly ash as cementitious agent in pervious concrete sample. The properties of pervious concrete samples including density, porosity, compressive strength, etc. According to the result, high porosity samples indicated higher permeability, whereas compressive strength was reduced. There was no significant difference between properties of pervious concrete samples containing fly ash and those samples only comprises only cement as cementitious agents. Read More...
|
Civil Engineering |
India |
854-856 |
226 |
Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
-B Nareshkumar ; Mr. G. Ananthanath
Distributed computing is an emanate worldview to present dependable and bendy framework empowering the clients (records owners) to store their facts and the statistics consumers (clients) can get to the information from cloud servers. This worldview diminishes capacity and support value of the information owner. In the meantime, the information owner loses the physical manipulate and ownership of information which activates sever a safety risks. Along these strains, inspecting management to test data respectability inside the cloud is fundamental. This issue has turned into a take a look at as the possession of information ought to be confirmed whilst keeping up the privacy. To address those troubles this work proposes at ease and efficient privacy preserving provable information possession (SEPDP). Further, we stretch out SEPDP to assist diverse owners, information elements and cluster affirmation. The maximum appealing component of this plan is that the evaluator can verify the ownership of facts with low computational overhead. Read More...
|
Software Engineering |
India |
857-861 |
227 |
The Application of Apriori Algorithm in Analysis Usage of Medical Diseases
-P. Murendra ; Dr. K Venkataramana
The data mining is a process of analyzing a huge data from different perspectives and summarizing it into useful information. The information can be converted into knowledge about historical patterns and future trends. Data mining plays a significant role in the field of information technology. Health care industry today generates large amounts of complex data about patients, hospitals resources, diseases, diagnosis methods, electronic patients records, etc. The data mining techniques are very useful to make medicinal decisions in curing diseases. The healthcare industry collects huge amount of healthcare data which, unfortunately, are not "mined" to discover hidden information for effective decision making. The discovered knowledge can be used by the healthcare administrators to improve the quality of service. In this paper, authors developed a method to identify frequency of diseases in particular geographical area at given time period with the aid of association rule based Apriori data mining technique. Read More...
|
Software Engineering |
India |
862-865 |
228 |
Study on Replacement of Fine Aggregate with Plastic in Fiber Reinforced Concrete
-K. Srimukha ; M. Bhargavi; R. Prudhvi; CH. G. D. Prasad; M. Sharma
Modern activities lead to use of plastic bags in excess. Disposal of plastic is one of the major problems faced in the present era of the world. Plastic begin non-biodegradable material. It takes years to decompose. The non-biodegradability of plastic makes it very harmful to the environment. In this work, partial replacement of fine aggregate is replaced by the plastic (5%, 10%, 15%, 20%, 25%) in M30 grade of concrete containing steel fibers .The steel fibers were added at 0.5%,1%,1.5% by volume of concrete and optimum percentage is determined and that optimum percentage was used in replacement of fine aggregate . The compressive and split tensile strength are determined after 7 days and 28 days of water curing. Read More...
|
Civil Engineering |
India |
866-868 |
229 |
Online Marketing Frequent Item set Prediction using Eclat Algorithm
-S Mahaboob Basha ; Ms. S. Anthony Mariya Kumari
Frequent itemset mining is a major field in data mining techniques. This is because it deals with usual and normal occurrences of the set of items in a database transaction. Originated from market basket analysis, frequent itemset generation may lead to the formulation of association rule to derive correlation or patterns. Association rule mining still remains as one of the most prominent areas in data mining that aims to extract interesting correlations, frequent patterns, association or causal structures among a set of items in the transaction databases. The underlying structure of association rules mining algorithms are based upon horizontal or vertical data formats. These two data formats have been widely discussed by showing a few examples of the algorithm of each data formats. The works on horizontal approaches suffer in many candidate generations and multiple database scans that contribute to higher memory consumptions. In response to improving on the horizontal approach, the works on vertical approaches are established. Eclat algorithm is one example of an algorithm in vertical approach database format. Motivated to its "fast intersection", in this paper, we review and analyze the fundamental Eclat and Eclat-variants such as mindset, diffset, and sort different. In response to vertical data format and as continuity to Eclat extension, we propose a post diffuser algorithm as a new member in Eclat variants that use mindset format in the first looping and diffset in the later looping. Read More...
|
Master of Computer Application |
India |
869-872 |
230 |
A Review on Full Wave Zero Voltage Switching Boost Converter using Sliding Mode Control
-Faiza Hasan ; Almas
This paper is a study about zero voltage switching boost converter and there control mode. DC–DC converters are nonlinear systems, they represent a big challenge for control design. Since classical control methods are designed at one nominal operating point, they are not able to respond satisfactorily to operating point variations and load disturbance. The difficulties in the control of boost converters are due to the non-minimum phase structure since, the control input appears both in voltage and current equations. The result of both converters with and without SMC are compared and the increased efficiency of the proposed converter is confirmed. The ZVS Boost Converter with sliding mode controller shows acceptable performance than the conventional. Using the sliding mode controller, the non-linearity and un-stability have improved. Read More...
|
POWER ELECTRONICS |
India |
873-875 |
231 |
Pi Assistant with Artificial Intelligence
-Atul Kamble ; Snehal Shelke; Javeriya Pyare; Poonam Salgar; Asfiya Shaikh
The purpose of this paper is to illustrate the implementation of a PAAI as an Intelligent Personal Assistant (IPA) that can perform numerous tasks or services for an individual. These tasks or services are based on user input, location awareness, and the ability to access information from a variety of online sources (such as weather or traffic conditions, news, stock prices, user schedules, retail prices, telling time, local traffic, travel assistant, events, notification from social applications plus one can ask questions to the system, invoke its machine learning otherwise get it from Wikipedia… etc…..). Using Raspberry Pi as a main hardware to implement this model which works on the primary input of a user’s voice. The voice hence produced was used for query processing and fetching relevant information. When the information was fetched, it then be search s for the input command and the relevant output to the user was given. Additionally, some extra modules were also implemented which worked on the concept of keyword matching. It can help the visually impaired to connect with the world by giving them access to Wikipedia, Calculator, Email and Music all through their voice. This model can also keep people secure as it can be used as a surveillance system which captures the voice of the person standing at the door and similarity checking. Also it can be a source of entertainment and information for blind/visually impaired. Read More...
|
Computer Science and Engineering |
India |
876-879 |
232 |
Power Generation through Gravity and Kinetic Energy
-Mamta R. Runge ; Prof. Rashmi Singh
In the new design is used for converting unutilized mechanical energy into electrical energy and it is compactly system. This new design is specific to the regenerate the electrical energy from mechanical energy of the lift which is stored in battery and it will use whenever the light is off, this design is easily compile with the existing system. This design content two rolling part and a reciprocating part which is used to convert circular motion into reciprocating motion and vice versa. When lift is in motion, the mechanical energy converts that’s specific system into electrical energy. Read More...
|
M.tech EE(Power System) |
India |
880-881 |
233 |
Implementing Data Mining Algorithms for Record Normalization using Mining Abbreviation Definition Pairs
-M. Thej Kumar ; Mr. S. Muni Kumar
Data association is a trying issue in data coordination. The comfort of data increases when it is associated and joined with other data from different (Web) sources. The assurance of Big Data turns subsequent to keeping an eye on a couple of real data blend troubles, for instance, record linkage at scale, ceaseless data mix, and organizing Deep Web. Though much work has been driven on these issues, there is compelled take a shot at making a uniform, standard record from a social affair of records identifying with a comparative genuine component. We insinuate this errand as record institutionalization. Such a record depiction, conceived institutionalized record, is basic for both front-end and back-end applications. In this paper, we formalize the record institutionalization issue, present start to finish examination of institutionalization granularity levels (e.g., record, field, and regard portion) and of institutionalization shapes (e.g., typical versus complete). Read More...
|
Software Engineering |
India |
882-885 |
234 |
Implementation of Association Rule with Modified Genetic Algorithm for Loan Approval in Banking
-Kuchi Sekhar ; I. Madhavi Latha
In the banking sector one of the crucial task is approval of loan. Depending on the customer’s credit card score and report, employment status, EMI income ration, payment history and lot of activities are involved in the approval process of the loan. For detecting who is genuine or who is not correct person to get the loan is not a simple tasks for bank peoples. In this process it consumes lot of time and money to verify for the genunity of the loan seekers. In this paper it provides the solution for the problems in loan approval processing. By applying association rule along with genetic algorithm, it gives high accurate data about the loan seeker. It reduce the consuming of time and in the short time bank peoples can approve the loan. By implementing genetic algorithm in association rule, it gives high accuracy of data about the loan seeker. So that it reduce effort of the bank peoples as a result loan can approved with in the stipulated time. Read More...
|
Computer Science and Information Technology |
India |
886-889 |
235 |
Data Analysis using Hadoop
-Durga Nandan MIshra ; Bhawna Makhija; Chhaya Amrute; Rashmi Tembhurne; Vijay V. Chakole
The rapid growth of Internet and WWW has increases to vast amounts of information available online. Big data is an evolving term that describes an voluminous amount of structured, semistructured and understructed data that has the potential to be mined for information. For this nowadays various Data intensive technologies (Map Reduce) are used which uses computer applications, which requires large volumes of data and most of their processing time to I/O and manipulation of data .In order to store, manage, access, and process vast amount of data available online and the data that is created in structured and unstructured form, Data intensive computing is needed which satisfies the need to search, analyze, mine, and visualize the large amount of data and information. We will analysis already available Data intensive technologies with Hadoop Data intensive to provide high performance, should be fault resilient over hardware failures, communications errors, and software bugs and executing a variety of data intensive analysis benchmarks. Read More...
|
Electronics Engineering |
India |
890-893 |
236 |
Comparison of Paver Block Made from Various Wastage Materials
-K. Manikandan ; K. Sasitharan; M. Liyandar; M. Deepika
This project study involves the use of wood waste, iron waste and PVC crushed pieces and recycled paver block materials in production of concrete paver block. It aim to study possibility of using PVC waste, recycled paver block materials in making of paver block. In this investigation is analyze the compressive strength of paver block to compare the strength of paver block with various wastes to the conventional concrete. Aggregate which passes through 10 mm IS sieve and retain on 4.75 mm IS sieve is used for making of paver block. These paver blocks are used for footpath or parking areas and also those paver block are made up of recycled material to preserve environment. Read More...
|
Civil Engineering |
India |
894-896 |
237 |
Low Cost Anytime Automated Medicine Vending Machine
-Dr. M. Sivachitra ; E. Prasanna; Preethi .K; S. Karthick
Anytime Automated Medicine Vending Machine is although not a newconcept in its totality, it could prove to be useful and hence important in developing countries like India where healthcare is almost life-threatening. Health plays the role of a strong societal component connecting it to education and access to information. On other scale of health, poverty involves low income, low education, social prohibition and environmental decay. Most of the countries are trapped in a cycle inwhich poverty breeds ill health. We have proposed an automated medicine vending machine that dispenses medicine as per the user s choice. Our system is cost efficient when compared to the other existing vending machine owing to the use of actuators. In section II, description is given for medicine vending machine. Section III discusses about the vending machine performance. The conclusion part of the paper and the future work are discussed in section IV. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
897-899 |
238 |
Wireless DOL: An Open System Low Cost Wireless DOL Module for Industrial Environment
-Pooja Gudibandla ; Amarajyothi Gade; Harshitha Buddula; Prathyusha Arumandla
In existing industries the communication between control feeders and automation controllers is through hard wires. Large industries with hundreds of feeders need lot of wiring and thus huge cost and complexity. In this paper we propose an open system low cost wireless control feeder scheme. We specify this technique taking a DOL feeder and communicating it to the controller. We are using nodeMCU which is having built-in Wi-Fi moduleESP8266to establish the wireless communication. Read More...
|
Electronics & Communication Engineering |
India |
900-902 |
239 |
Experimental Treatment of Tannery Effluent by using Phytoremediation and Electrocoagulation
-M. Saravanan ; B. Pooventhan; G. Pradeep; S. Logeshwaran; R. Wilson
In India there are huge leather products producing industries are developed. . Through waste water of tannery industry produces high inclusion of toxic content, which is more dangerous in environment without treatment. The drawback of conventional technologies for waste water treatment have led to serious thinking on alternate, low cost, natural and energy saving technologies on water and wastewater treatment. Methods like Phytoremediation which employs floating plants, constructed wetlands, etc., for treatment of wastewater will be a better alternative to the conventional technologies. Floating plants such as seaweed has a remarkable ability in treating the polluted water. Hence the current study is focused on the treatment of industrial effluent using marine algae. The objective of the study is to determine the phytoremediation potential of seaweed on industrial effluent treatment. Batch study has been employed to find the pollutant reduction efficiency of seaweed. Thus this process becomes more economical and effective. Read More...
|
Civil Engineering |
India |
902-904 |
240 |
Implementation of Fusion using MATLAB
-J. Ravi ; M. Gowri Sri Durga; MD. Shabeena Begum; Y. D. R. C. Kartheek; T. Raju
In the present of technological development, medical imaging plays an important role in many applications of medical diagnosis and therapy. This requires more accurate images with much more details and information for correct medical diagnosis and therapy. Medical image fusion is one of the solutions for obtaining both high spatial and high spectral information in a single image. Multimodal medical image fusion provides a remarkable improvement in the fused image quality. This paper covers the following items, the basic definition of the image fusion process, applications, advantages, and disadvantages of fusion procedures. Through this, a hybrid imaging combinations are suggested for better Image visualization for different human organs. This paper ends with some novel trends in the medical image fusion topic. Read More...
|
Electronics & Communication Engineering |
India |
905-908 |
241 |
Virtualization in Cloud Computing
-Sangeeta Singh ; Swati Atri
Cloud computing is a framework that provides everything as a service on demand by use of high speed internet. Any IT company or a single user may take benefit of cloud computing by pay per use strategy. A user who pays for a service on cloud computing need not to care about the maintenance and storage of his personal information. In this way an IT company or a user can use the resources via cloud computing, which they were not able to purchase. Virtualization is the central part of cloud computing which enables a physical resource to behave as a logical one. It exists in various forms such as Hardware virtualization, Network virtualization, Storage virtualization, Desktop virtualization, Data virtualization, Software virtualization, Memory virtualization etc. This paper reviews the concept of virtualization in cloud computing, its types, benefits and drawbacks of virtualization. Read More...
|
Computer Science and Information Technology |
India |
909-911 |
242 |
3D Solar Tracking and Monitoring over IoT
-Shaikh Ejaj Shabbir ; Patel Zakriya Nazeerahmad ; Marathe Ratna; Sayyed Zoheb; Patel Bilal
The hybrid strength device is a clever-self regenerative power era machine through lamp illumination- sun strength primarily based hybrid model. This hybrid energy era gadget is possible via lamp illumination and solar energy; it is an opportunity supply of electrical energy, wherein ever the traditional power generation is not feasible to put in in exercise. In this model consists of lamp illumination-solar strength primarily based hybrid power generating system and storage battery device is blended together. This hybrid electricity generation system is a simple and price-effective control, and Maximum Power Point Tracking (MPPT) manipulate has to extract more electricity. also, this hybrid system is evolved thru an experimental version. Read More...
|
Electrical Engineering |
India |
912-915 |
243 |
Analysis of NACA 4412 and NACA 0018 Airfoil: A Review
-Yash Dhaduk ; Ankitkumar Patel; Karnailsingh Saini
This report is aimed to obtain the velocity and pressure profile, production of Lift and Drag by Airfoil at particular AOA, separation of flow over an Airfoil, the graph of variation in coefficient of lift with AOA (cl-α) and coefficient of Drag with AOA (cd-α) is plotted by using the Ansys Software for an NACA 4412 and NACA 0018 Airfoil. We use fluent module in Ansys for Analysis. CFD plays an important role in design and optimization process. In this project we are comparing the Computational result with the standard result. Read More...
|
Aeronautical Engineering |
India |
916-920 |
244 |
Chromosome Aberrations and Sister Chromatid Exchange after in Vitro Exposure of Human Lymphocyte to Methyl Isocyanate (MIC)
-Meonis Pithawala ; Krishna Mistry; Niyati Desai; Sumitra Chakraborty
Methyl isocyanate is an intermediate chemical in the production of carbamate pesticides. It is reactive and hazardous to human health. The toxic effect of the compound was apparent in the Bhopal disaster, where methyl isocyanate and other gases were released from the underground reservoirs of Union Carbide India Limited (UCIL) factory, over a populated area on December 3, 1984. In this present study CA and SCE have been measured. Positive implications about clastogenic effects by MIC induced cytogenic alteration in the form of chromosomal aberration in in vitro human lymphocyte culture was recorded. In chromosomal aberration, mainly centromeric breaks were high after addition of MIC as compared to control. So this indicates that MIC specifically acts on centromeric region of human chromosome. Centromeric region mainly composed of heterochromatin. Hence, it can be concluded that MIC mainly affects heterochromatin region of chromosomes. Even Dicentric, Ring, Premature Separation of Centromere were also observed. While there was no change in the SCE frequency in the exposed group compared to controlled one. But the rate of cell division was little decreased in the exposed individuals. And therefore to further justify, additional in vitro and in vivo studies need to be performed so as to confirm these data and to discover the mechanism of the possible protective effects. Read More...
|
SCIENCE |
India |
921-925 |
245 |
An Application of Apriori Algorithms for Finding Frequent Itemsets in Pharmacy Database to Find Frequent Medicine Itemsets
-V. Pusphalatha ; Mr. J. S Ananda Kumar
Apriori algorithm has been successfully used for finding the persistent item sets in huge databases. In this paper study about finding associations between item sets contains data about diagnosis and treatment. It has shown that the algorithm is equally beneficent for finding the large item sets and thus generating the association rules in transactional databases. Healthcare is a data rich domain so we have applied Apriori algorithm for medical practices, insurance companies and other health related organizations that have collected huge volumes of data, thus attracting data mining researchers to explore it and find something beneficent from it. Read More...
|
Software Engineering |
India |
926-928 |
246 |
Smart Entrance QR System
-Satish Raysane ; Dhammadeep Dahiwale; Gitesh Khobragade; Shubham Malve; Swapnil Manwar
In this era of technology smartphones play a significant role in our day to day life. Nowadays smartphones can solve most of the problem very quickly and easily. It has made life of every person simple and easier with different social app, commercial app, problem solving app, app for education and marketing etc. Followed by the technology the paper purposed a system that will handle a problem for recording the attendance. The proposed system is a couple of two applications, one for generating the QR Code by entering the student details and second application for taking the attendance and generating the attendance in CSV or XLS format. The teacher will need to scan the QR code of the particular student in order to confirm their attendance. The paper discusses how the system verifies student identity to eliminate false registrations. The system deals with the management and evaluation of attendance of all students. The student QR code will be provided to professor for taking their attendance. The professor handling the subjects is responsible to mark the attendance for all students of the group or class. The attendance will be marked as 0 and 1, 0 for absent and 1 for present in the database of the particular student row in the table. The student attendance reports will be generated in CSV and XLS sheet for further use. Read More...
|
Computer Engineering |
India |
929-930 |
247 |
E-Gadgets in the Era of Globalisation & International Economic Integration
-B. V. S. S. Subba Rao ; Dr. M. Veerabhadra Rao
Gadgets have made life pleasurable ranging from a washing machine, chimney, electric hub, the churner, the television set, A.C., Room heater, Fans, dryers, hair straighteners, dish washers, sewing machine, air purifiers are all also gadgets. Yet from linking remote villages via increasingly ubiquitous mobile-phone messaging to improved water safety and cooking tools, technological innovations are changing the lives of women and their families for the better, around the world. The world has become so advanced that we have computers and laptops in almost every household today. Internet facility is also a great invention. Mobiles help us to talk to anyone, anywhere at any time. Man has come a long way from the invention of the wheel. There are serious disadvantages of such a fast pace of progress, like global warming and pollution but scientists are working on that too. All electronic gadgets have improved our life a lot. So in the coming centuries we can imagine how our life might be. In this backdrop the present study has made an attempt to identify the role, uses, enhancements and issues concerned with e-gadgets. The e-gadgets actually have increased human productivity in terms of work and made the world a better place to live in. Though gadgets bring joy to the family there are few challenging issues which are to be considered. In order to make the e-revolution a successful one, certain steps should be considered by the Government of India. There are many innovative gadgets ranging from home to organizations are being developed through the initiatives by several companies. Read More...
|
MANAGEMENT |
India |
931-933 |
248 |
Infotainment Helmet with Integrated Bluetooth System and Customized Application using Database Services
-Revathy C ; Shree Hariharan B; Vasundhara T S
In India, 4, 80,652 accidents occur in a year and nearly 1, 50,785 people die. Most of the accidents occur because of answering the calls for long time while driving and sometimes hearing music in a high volume which could affect the environment sound. Also people find it difficult to use Google map as it always require an eye on it to check if they are moving as directed. Also, at the time of any accident, it would be very useful to help the victim by knowing his/her blood group, age and his/her emergency contact number by scanning the QR code available on the helmet via cloud data services. So, we have developed an application interfaced with the IoT that can be installed in android mobile phones and we can also respond to the call over for a minute through Bluetooth speaker provided in the helmet. Read More...
|
Application based system |
India |
934-937 |
249 |
Root Mapping for Transporting Vehicle by using Genetic Algorithm
-C. Narasimhulu ; S. Muni Kumar
There is a need to match the emission and estimations accuracy with the outputs of transport models. The overall an error rate in long-term traffic forecasts results from strategic transport models is likely to be significant. The Micro simulation models, whilst high-resolution in nature, they have similar measurement errors if they use the outputs of strategic models to obtain traffic demand predictions. At the micro level, this paper discusses the limitations of existing emissions estimation approaches. The Emission models for predicting emission pollutants other than are proposed. The genetic algorithm approach is adopted to select a predicting variables for the black box model. This approach is capable to solving combinatorial optimization problems. Overall, an emission prediction of results reveal that a proposed new models outperform conventional equations in terms of accuracy and robustness. Read More...
|
Software Engineering |
India |
938-940 |
250 |
Micro Finance a Financial Inclusion - Insights into Indian Condition
-Mrs. R. Saranya
Building financially inclusive system is, therefore, an integral and core pillar of financial sector reforms. India has made steady progress towards financial inclusion. However, large numbers of the population are still excluded from the formal banking system. Furthermore, the financially included people may not get all or right kind of the products which they require. While there is no “one-size-fits-all†financial inclusion strategy or approach, it is important to recognize few core or necessary and sufficient conditions that are needed to maximize the benefits derived from such a strategy. In a nutshell, evidence suggests that poverty reduction strategies are successful in countries which adopt inclusive policies. In the Indian context, Reserve Bank has always sought to balance the risk of partnerships and product innovations with the ability to achieve greater penetration in a safe, secured and prudentially sound manner. Financial Services for the poor people like primarily credit, Insurance services, and Small savings are termed as Microfinance. This Microfinance can help in put resources and power into the hands of low-income peoples, but they cannot solve all the problems caused by poverty. The underlying belief is that only sound and strong institutions can promote financial inclusion in a sustainable manner and, towards this end, prudent regulations have to be in place to achieve inclusion while protecting financial stability and consumer interest. The institutional vehicles help to improve the efficiency and productivity of all credit institution. Microfinance institutions are taking various efforts to economic development. They mainly contribute to solve the problem in inadequate housing and urban services as part of rural development. The main challenge is to find the credit level which matches their requirements. If the solution for the multipurpose credit has identified there will be the success of rural development by alleviating poverty. This paper offers insights about importance of financial inclusion, causes of financial exclusion; its implications and adoption of remedial strategic initiatives to ensure basic banking facilities to the underprivileged Indians. Read More...
|
Banking and Finance - Business Management |
India |
941-948 |