Volume 7 Issue 11
Comparative Design and Analysis of Motor Control System using IOT Application
Author's Name: Suresh Shyamkumar, Sivanandan P, Vebin Selvam

Abstract—Nowadays, Dc motor is being used in many applications such as robotics, lifts, conveyors, and industrial application. Usually, Dc motor drives are being controlled and operated manually by the workers due to which lots of accidents occur, and it also generates more faults in the system and requires regular maintenance. Due to this, there is a vast increase in the mass of the workers, which means higher worker charge and requires a skillful worker who has knowledge of dc drives the system. So, this project focuses on minimizing the risk of accidents and mass numbers of the workers by using the Internet of Things (I.O.T), which can be monitored and operate the drives with apps. This project controls the speed of the motor and temperature by using the Speed sensor and temperature sensor. This provides flexibility in operation and gives higher efficiency.

Comparitive Study on Behaviour of GGBS Incorporated with Sisal Fiber Reinforced Concrete Beam Approach
Author's Name: Prakash Kumar, Dheeraj Kumar

Abstract—The Concrete structures are the most substantial structures which is traditionally used in the Building Technology. The main aspiration of this study is to evaluate compressive strength and Flexural strength of GGBS along with Sisal fiber Concrete encased with Geocomposite and compared with conventional concrete on the M25 Concrete mix. Sisal fiber is an agricultural product used to intensify the strength of concrete as a result of proficiency to incarcerate cracks and the fibers grips the grid together even after extensive cracking. An attempt has been made to strengthen the concrete by using Geocomposite, it increases Tensile strength, Tear resistance, Puncture resistance, Interface shear strength, Cracking etc. The cement in concrete replaced accordingly with the percentage of 0%, 10%, 20%, 30%, 40% and 50% by weight of GGBS and the sisal fiber added in 1% by weight of cement in M25 grade concrete. For the empirical work of Concrete the Concrete cubes cylinders and beams are casted and tested at 7, 14, and 28 days of curing. Finally, the strength performance of concrete is correlated with the performance of conventional concrete. From the experimental analysis, it has been observed that, the optimum replacement of GGBS to cement is 40 % for M25 grade. The ultimate load has been increased by 1.75 times for GSC, 1.62 times for CGC and 2.6 times for GSGC when compared to CC. GGBS with inclusion of sisal fibre improved compressive strength, flexural strength and shear strength of concrete.

Identifying Unverified Texts from Social Media using MRC Techniques
Author's Name:Srinivasa Rajan, Mathumitha

Abstract—The evolution of Social Media has led to a new approach that views brands as social processes involving multiple stakeholders. Where as brand equity continues to be one of the critical areas for marketing. The brand management give confidence and enables the brands to create its own identity in the market.oth these methodologies have a similar target of purchasing at lower cost and selling at a more expensive rate to increase great rate of return. It tends to be said that the true objective of these two strategies are one and the equivalent. Be that as it may, there exists tremendous distinction between the major ideas of these two techniques. In major investigation the expert would be worried about the key elements. He would be keen on deciding the genuine worth or characteristic estimation of an offer dependent on its present and future winning limit. They would purchase the offer when its market cost is underneath its characteristic worth. The expression "Specialized Analysis" is a general heading for bunch of exchanging strategies. The fundamental target is to display the review of Indian Stock Market.

Dual-Layered Security Using cryptography and Image Steganography
Author's Name: M.SASIKALA,N.SHYAMSUNDHAR,M.VISWA,P.SEVUGAMOORTHY,V.RAJAPRABHAKARAN

Abstract— This paper proposes a dual encryption technique for maximizing message secrecy in practice using combination of cryptography with steganography. First, we encrypt our secrets using Advanced Encryption Standard (AES), which is a strong public key cryptosystem, and then we hide the data in image files using image steganography. In this way, embedded messages encrypted by AES were placed in the least significant bits (LSB) of pixel which are difficult to detect using Conditional LSB Substitution technique. This two-layer protection makes it impossible to decrypt whatever is not authorized, and the chances of casual discovery are greatly reduced. Through a set of performance tests, the effectiveness of the strategy is validated with the resulting parameters: security and covert communication. It has been proved that combination of AES and LSB steganography provides a quite efficient and comprehensive means of secure communication and can be employed in scenarios that require a high level of confidentiality.

Calculation of Load Metric Techniques of School Building and Green Innovations in INDIA
Author's Name: Pattur veditha, Ch.Shiva Ranjani

Abstract—The continuous increase in the cost and demand for energy has led to more research and development to utilize available energy resources efficiently by minimizing waste energy. Air conditioning plays a very important role in HVAC and thus in this case study, school building is designed with minimum utilization of energy needed for the air conditioners to make the school more sustainable. The main objective of this case study is to provide a proper design for the school in terms of its energy usage by calculating the maximum possible accurate load which can be referred by reader for understanding and/or designing other building loads and to make building a green and sustainable one. Also reader will be able to know about impacts of building directions, material of constructions and related co-efficient on the calculation of load. First of all a site survey is provided which covers the entire school. Then after certain assumptions have been made in respect of number of students, load area etc. After that the actual load is being evaluated. And in the end what are the different new effective things that can be introduced in the school are also listed to make it green and sustainable.

Enhancing Privacy in Spam Filtering: The PCSF System Employing Support Vector Machine
Author's Name: K.S. Suganyadevi, M. Velmathi, S. Vedapriya, S. Venkata Lakshmi

Abstract— The goal of privacy-preserving spam filtering is to inspect emails while ensuring that both the detection rules and email content remain confidential. Existing solutions face several challenges, including: (1) inadequate privacy measures that may expose email content or detection rules to third parties; (2) vulnerability to exhaustive word search attacks due to improper encryption techniques, which can compromise email confidentiality; (3) potential privacy risks when outsourcing spam filtering to third parties without robust protection measures; (4) delayed spam detection, where spam is only identified after it reaches the receiver,potentially exposing the user to harmful content such as phishing attacks embedded within emails; and (5) computational inefficiencydue to the high cost of privacy-preserving mechanisms. Traditionalspam filtering techniques often compromise user privacy by analyzing raw email content. This paper presents the Privacy- Preserving Content-Based Spam Filtering (PCSF) system, whichutilizes Support Vector Machines (SVMs) and homomorphic encryption to detect spam while preserving the confidentiality of email content. The proposed system maintains high accuracy in spam detection without exposing sensitive data, making it a viable solution for modern privacy concerns. Experimental results demonstrate that the PCSF system achieves an accuracy of 95.2%, with precision and recall values of 94.5% and 96.0%, respectively.

Implementation of Feature Selection and Random Forest Machine Learning Classification Algorithm on a Medical Based Datas
Author's Name:Swanti Jodhi, Prof. S.K Dubey, Prof. Shasi kant Shrivastava

Abstract—For a given medical data set, there is a huge possibility that the data includes hundreds of features, each representing a symptom or a parameter based on which diagnosis can be carried out. While a lot of these features contribute towards the results, it is often the case that quite a few of these features turn out to be either irrelevant or have very little bearing in terms of their overall impact on the results and only end up crowding the data set. Feature selection provides a solution to this problem as the features that provide the highest contribution while predicting an output are retained and the irrelevant features are identified and subsequently eliminated. This helps in the model being trained faster and leads to a better interpretation of the model further allowing better diagnosis of the disease. Apart from feature selection, random forest classifier is being used as a means to predict the outcomes. Since random forest is made up of decision trees, it helps in better classification for a given problem.

Safety Equipment Detection Based on Improved YOLO V8
Author's Name: M.Arul Selvan, PM.Vasanth Raj,S. Sankarapandi, S.Seeni Barith Ali, M.Santhosh Kumar

Abstract— Wearing safety equipment is vital for reducing injury risks on construction sites, especially during high-altitude falls. Injuries related to safety equipment often occur due to improper use, poor maintenance, or the absence of essential protective gear, which significantly increases the risk of harm in hazardous environments. However, accurately detecting equipment in complex environments remains a challenge, particularly when the equipment is small or distant. To address this, a new method called YOLOv8n-SLIM-CA has been developed, building upon the YOLOv8 algorithm. This improved method utilizes advanced techniques to enhance equipment detection accuracy. One key enhancement is the use of mosaic data augmentation, which generates additional training examples, helping the model better detect equipment in crowded or cluttered scenes. The integration of a coordinate attention (CA) mechanism into the YOLOv8n-SLIM-CA model significantly enhances its ability to focus on equipment regions within complex and cluttered backgrounds, effectively reducing distractions from irrelevant features. Experimental results consistently demonstrate that YOLOv8n-SLIM-CA outperforms the standard YOLOv8n across various scenarios, achieving higher precision, recall, and mean Average Precision (mAP) scores. This advancement represents a substantial improvement in equipment detection technology, providing a more robust and reliable solution for ensuring worker safety in the often challenging and hazardous environments found on construction sites. By addressing the limitations of previous models, YOLOv8n-SLIM-CA sets a new standard for equipment detection accuracy.

MODIFICATION OF CONVOLUTIONAL NEURAL NETWORK BASED FINGER PRINT VERIFICATION
Author's Name: Mangali Swapna, C.Mallesha

Abstract— Fingerprint verification systems are widely used in personal identification and verification systems. In the early twentieth century, fingerprint recognition has been accepted officially for personal identification. The fingerprints left on suitable surfaces has been used by the security departments to identify the criminals and also special fingerprint reader systems are used to verify the identity of the persons at security checks such as in airports and critical building access points. There are many methods proposed for fingerprint recognition in the literatures. After the introduction of the first paradigm of the Cellular Neural Networks (CNN) by Chua and Yang, many papers have been published about the CNN and its application in image processing. The parallel and simple structure of CNN makes it very suitable for image processing. Experiments on forgery localization provide support to this statement, but many more forensic applications can be envisioned, which certainly deserve thorough investigation. Despite the promising results, one must keep in mind that no tool can solve all forensic tasks by itself. As an example, noise prints will probably allow excellent camera model identification, but cannot help for device identification.

Examine and Study the recent trends and present scenario of bancasssurance business in India.
Author's Name: Balaji VishnuRao

Abstract— The concept of bancassurance originated from France in 1980’s in response to certain changes like direct access to corporate funding market and the regulation of credit market in 1986. Bancassurance has been prevalent in Europe as it inculcates the vision of “one-stop-shop” Thus the bank in today’s era have border horizons along with enlarge operations. Therefore, A bank acquiring a concept of bancassurance is a natural repercussion and is fully rational too as insurance is among one of the services needed by the bank customers. Bancassurance as a supporter are all related with it viz. Banking sector, insurance area customers or the clients as well. It gives a pathway to banks following which they could expand the scope of items and administrations rendered by them and as wellspring of extra pay which is totally chance free. The insurance agencies exploit the certainty and trust that the bank has effectively earned through its customers and hence go into wide running partnerships as to augment their purview. The insurance agencies and banks in this way combination together to give undeniable bundle of money related administrations not exclusively to benefits clients yet in addition to maximize their benefits.

Cloud Security Control Entity of Data Security for CloudOS Architecture
Author's Name:Prasant Singh, Devendra Panikar

Abstract— In this venture we significantly offering constant information security in distributed computing. Giving security to petabytes of information is imperative. A current study on cloud security States that the security of clients' information has the most astounding need and also concern. In this manner, to give secure cloud structure I have proposed a framework named secure distributed computing system (SCCF). To upgrade security, we proposed to include programmed interruption recognition and aversion strategy for Brute compel and SQL infusion assaults. At last the information proprietor records are encoded utilizing RC5 encryption calculation and put away out in the open distributed storage named cloudMe.

Performance Measures of Speed Control for a DC Motor using LCMQR Controller Identification
Author's Name:Pawan Kumar, Shefali Kanwar

Abstract— This paper contains, performance of fuzzy controllers which evaluated and compared. It also describes the speed control based on Linear Quadratic Regulator (LQR) technique. The comparison is based on their ability of controlling the speed of DC motor, which merely focuses on performance of the controllers, and also time domain specifications such as rise time, settling time and peak overshoot. The controller is designed using MATLAB software, the results shows that the fuzzy controllers are the good but it as higher overshoot in comparison with optimal LQR. Thus, the comparative study recommends LQR controller gives better performance than the other controllers.

REAL-TIME SPEECH TRANSLATION APPLICATION USING GOOGLE APIs
Author's Name:R. Karthick, M.H. Ksheerabdhinath, N.K. Kumaresh Babu, R.R. Rohith, K.J. Risikesan

Abstract— The Real Time Speech Translation Application is designed to bridge language barriers through seamless, two-way communication. The app captures voice input, converts it into text via Google’s STT API, and translates it using a custom model. The translated text is then synthesized back into audio through TTS, allowing users to communicate across languages effortlessly. Using Firebase for real-time data exchange, the application supports efficient communication between devices, accommodating diverse language preferences and providing a user-friendly interface. This solution demonstrates the potential of machine learning and cloud technologies to foster inclusive communication, addressing multilingual needs dynamically.

Analysis Study of Aerated Concrete Incorporating Fly Ash and PVC Granules
Author's Name:Sakthivel.C, Sakthivel.R, Selvakumar.D, Vignesh.S, Vikram.B

Abstract— This paper A considerable growth in the consumption of plastic is observed all over the world in recent years, which has led to huge quantities of plastic-related waste. Reprocessing of plastic waste to produce new materials like concrete or mortar appears as one of the best solution for disposing of plastic waste, due to its economic and environmental advantages. The use of plastic granules as fine aggregate seems to be a feasible option. This study deals with replacement of sand with plastic granules made by recycling plastic wastes sourced from scraped PVC pipes, PET bottles, plastic carry bags and then finding out an optimum ratio so as to have a target strength around 10 MPa.

Network Intrusion Detection System Using Hybrid Deep Learning
Author's Name:R. Karthick, J. Mohammed Zayed Rahman, S. Abisheik, A. Nambi Raja, L. Arun Prasath

Abstract— This Network Intrusion Detection System (NIDS) are essential for safeguarding computer networks, analyzing traffic to detect malicious activities. With increasing network traffic and sophisticated cyber-attacks, traditional rule- and signature-based IDS struggle with scalability and adaptability. This research examines the use of hybrid deep learning techniques—like Convolutional Neural Networks (CNNs) combined with Bidirectional Long Short-Term Memory (BiLSTM)—to enhance NIDS capabilities in detecting both known and unknown attacks. Recent advancements demonstrate that deep learning-based NIDS improve detection accuracy and reduce false positives, offering a robust and scalable solution for network security.

INTELLIGENT ENERGY MANAGEMENT SYSTEM FOR HOME POWER CONSUMPTION BASED ON IOT
Author's Name:. P. Premkumar, P. Harish Kumar, K. Eswar, S. Kathiravan

Abstract— To use Internet of Things (IOT) technologies to design and create an energy management system for smart homes. to optimize energy use and minimize waste for the system by tracking and managing energy usage in real-time. to create a web browser that can access the home system web portal and determine each device's current energy usage. Reduced energy consumption and cost savings are anticipated when using IOT protocols to construct a web browser. to aid in the advancement of environmentally friendly household energy use. Real-time energy optimization is achieved via the system's monitoring and control of household appliances. A central control unit, a network of sensors, and an intuitive user interface make up this system. The technology gathers energy usage data, looks for irregularities, and offers customized.

Experimental Investigation On Utilization Of Fraud Detection System Using HMM model
Author's Name:Nikitha Reddy, Rajatha, Rakshitha

Abstract— This paper presents In light of recent events, including the Coronavirus pandemic, the most accepted mode of shopping and purchasing goods and services is online through credit card. It provides cashless shopping at every possible shop in all countries and will be the most easy way to do online shopping, paying bills, requesting services etc. for years to come. With that said, credit card frauds are increasing day by day as well, regardless of the various techniques developed for its detection. Fraudsters are so expert that they engineer new ways for committing fraudulent transactions everyday which demands for constant innovation for its detection techniques also. Many techniques based on Artificial Intelligence, Data mining, Fuzzy logic, Machine learning, Sequence Alignment, decision tree, neural network, logistic regression, naïve Bayesian, Bayesian network, meta-learning, Genetic Programming etc., has evolved in detecting various credit card fraudulent transactions. In this paper, Hidden Markov Model (HMM) is employed to model the sequence of operation in credit card transaction operations. It helps to get a high fraud coverage combined with an exceptionally low false alarm rate.`

Modeling and Performance Approach of Load Balance Optimization based on Task Scheduling in Cloud Computing Environment
Author's Name: Anoop Kulkarni, Ashutosh Singh, Saumya Mathur

Abstract— This paper presents Cloud Computing (CC) is a type of technology which integrates distributed computing, parallel computing, virtualization technology & web services technology. Due to excess traffic & service requests in the cloud datacenter, load balancing is a serious challenge in cloud environments owing to failure in energy consumption, node failure & machine failure. So policy is needed for load balancing between datacenters, & researchers have proposed different solutions for load balancing (LB). Load distribution is a mechanism for distributing load amongst different nodes depend on definite parameters e.g.under loaded (node) & overloaded (node). There are two main tasks of resource allocation, second is scheduling tasks in a cloud environment. Mainly attention is given to task scheduling (TS). Cloud computing is a widespread stage for performing tasks using virtual machines (VMs) as processing components. In this paper, we are introduced Load Balancing Optimization Improved Genetic Algo (GA) with Simulated Annealing (LBIGASA)algo based on task scheduling in CC environments to decrease performance time, as well as cost of performing autonomous tasks on cloud resources, has reduced. The simulating parameters on which we have performed simulation are execution time, memory usage, fitness function (or cost), load balance and finishing time of VMs. Simulation has performed on the Cloud Sim tool, which shows the efficiency of the proposed job in relation to execution time & efficient resource allocation but variations in memory usage. The overall execution time and finishing time of VMs take minimal time in compare of an existing method

Identifying Main Imapct of Learning Attitudes about Science in Diploma Engineering Institutes of Sikkim using CLASS
Author's Name: Aditya Renke, Omkar Sahadev Gore, Aditya Mali, Zaif Zakirhusen

Abstract— This paper Science education researchers have studied students' preconceptions about science and learning science and have provided a measure as to how these views change over time with relation to their reception to classroom instruction in science. Myriads of instruments have been deliberated to examine the students' changing attitudes, beliefs and expectations. Deploying the Colorado Learning Attitudes about Science Survey (CLASS) – we report results from survey of 233 students studying in 1st Year at Centre for Computers and Communication Technology (CCCT) and Advanced Technical Training Centre (ATTC) located at South and East Districts of Sikkim respectively.

To Mitigate Total Harmonic Distortion (THD)Active Filters for Power Quality Improvement
Author's Name: Mangesh Gosavi, Pooja.N, Prakruti.N.C, Manjushree, B.S, Kavyashree.P

Abstract— The growing interest in power quality has led to variety of devices are designed for mitigating power disturbances such as harmonics caused due to different problems. By minimizing Total Harmonic Distortion (THD) the Harmonic Pollution will be reduced and Power Quality will be increased. Different types of load draw non - sinusoidal current from mains. This non - linear load appears to be the main source of harmonic distortion. Thus the main aim of shunt active filter that comprises of PI Controller, filter hysteresis current control loop and DC link capacitor is used to mitigate Total Harmonic Distortion (THD). Thus, in order to overcome these harmonic problems it is verified using MATLAB/SIMULINK package. Active filters are used to eliminate current harmonics near non – linear loads. Here the two methods are compared Instantaneous reactive power theory and sinusoidal theory. The results of both the methods are shown on the basis of the MATLAB/SIMULINK. Thus, following thesis gives the overview of the harmonic problems and its impact on power system and how shunt active filters mitigate these harmonics using MATLAB.