Volume 7 Issue 3
Author's Name: Kumar Chauhan, Mansilal Gupta, Ramaa Jasoriya
Abstract—InfoTech Connect is an initiative to provide a comprehensive environment to become a one-stop destination for colleges and students by providing a common platform for interactions. This project helps students stay updated about potential career opportunities and helps college admins by keeping track of all the student data online. The organization can maintain online records without redundant entries. Thus, it will help an organization in better utilization of resources. Some of the important features of this project include a job board, where College Admins can post information about available open job positions, a messaging system for communication, and a notification board about technical events (such as Hackathons, Job fairs, and coding contests). This project will be extremely useful for obtaining information about all technical activities in chronological order and subject areas to enable the students and faculty to access information and prepare well in advance and participate effectively and successfully. The determination is to allow communication between the alumni and current students and complete the task of recruitment quickly, also saving students from last-minute hassle. By providing a centralized platform for all the above needs, the project helps students stay informed about job opportunities and make the job search process more efficient. This project is dedicated to online information about recruiters as well as job seekers. An integrated platform where all the nearby universities/Colleges can share the resources for campus placement and the corporates can also access this database for recruiting students for the available vacancies. The InfoTech Connect is especially for college graduates who are more likely to search for jobs on the Internet
Author's Name: Ameed Salaman, Uttam Salanah
Abstract—One of the key advantages of a blockchain-based public distribution system is that it can be easily scaled to meet the needs of large populations. This is because the blockchain is a distributed ledger, which means that it can be replicated across multiple nodes. This makes it possible to handle a large number of transactions without putting undue strain on the system. Another advantage of a blockchain-based public distribution system is that it can be easily integrated with other systems, such as supply chain management systems and logistics systems. This can help to streamline the distribution of goods and services, and to make the system more efficient. Overall, a blockchain-based public distribution system has the potential to revolutionize the way that goods and services are distributed. By using the technology of blockchain, it can ensure that all transactions are secure, transparent, and fair. And by being easily scalable and integrable, it can help to streamline the distribution process, making it more efficient and effective.
Author's Name: Zainudin, Abdullah, Ramli
Abstract—The protection of children/person in difficult circumstances is a fundamental issue that must be addressed. The vulnerability of these individuals to abuse, neglect, exploitation, abandonment, and separation requires an effective system that can quickly and accurately identify them and provide the necessary support to ensure their well-being. To address this issue, we have developed a facial recognition application that uses a deep learning-based algorithm to identify missing children/person and prevent their further victimization. Our facial recognition application is designed to be user-friendly, enabling the public to upload a picture of a suspicious child/person to a common portal along with their details. The uploaded picture is automatically compared with the registered photos of missing children/person from the database, making it easier for the authorities to locate and rescue them. The use of facial recognition technology significantly improves the speed and accuracy of this process, allowing for more timely and efficient identification of missing children/person
Author's Name:K. Bhuvana, D. Akilandeswari, P. Rajkumaresh
Abstract— Workers in any organization need something to keep them working. Most times the salary of the employee is enough to keep him or her working for an organization. However, sometimes just working for salary is not enough for employees to stay at an organization. An employee must be motivated to work for a company or organization. If no motivation is present in an employee, then that employee's quality of work or all work in general will deteriorate. Keeping an employee working at full potential is the ultimate goal of employee motivation. There are many methods to help keep employees motivated. Some traditional way of motivating workers are placing them in competitions with each other. This paper examine employee motivations its impact on employee performance. During the research it was found that most of employee is satisfied with their motivational programs in Maihar Cement Sarla Nagar Satna (M.P.) the working condition and environment on workplace are too good. Data collection plays an important role in any study. Without data there is no means of study.
Author's Name: G. Mehalatha
Abstract—This paper presents the comparison of proposed double tail comparator with conventional double tail and existing double tail comparator. The low power and high-speed analog to digital converters used are of dynamic regenerative comparators to maximize speed. Presenting different architectures for calculating delay and power consumption in dynamic double tail comparator. The power gating technique is used to design the proposed comparator. By using this technique, delay and power consumption is reduced compared to the conventional double tail comparator and the existing double tail comparator. The important parameters are speed and power consumption. Cadence design tools used to simulate the comparator in the 90nm technology with the supply voltage of 0.6v.
Author's Name: R Vijendra Bhookya, Nilesh Hikwad
Abstract— : This paper deals with the design and implementation of Raspberry pi based IOT concept it means internet of things. In this present generation everything is going on internet itself. So in this project we concentrate totally on the present generation life how they can get security to their home or office and control the devices by using android app just by using internet in there smart phones. The main security is provided by camera module which captures the images and uploads into the internet and also stores the same images in Raspberry pi module SD card. Raspberry pi acts like a small minicomputer it is totally a Linux platform. By just connecting mouse and keyboard we can operate it as minicomputer where we can play games, play videos etc just like our personal laptop work. And also the WI-FI module is used in this project to control the devices from remote location also by getting the status of the devices into smart phone android app everything is going on internet itself our day to day life. Future generation will work on internet itself by sitting in one place we can do anything on internet.
Author's Name: C.N.Vidhya Lakshmi,R.Nandhini, S. R. Raja
Abstract— Artificial intelligence (AI) has gained considerable importance across various sectors of the economy, including higher education. Over the past few years, the field of "Artificial Intelligence in Education (AIED)" has witnessed significant advancements. This research endeavors to explore the application of artificial intelligence in teaching and learning within higher education and its impact. It investigates how evolving technologies, particularly AI, influence the methods and scope of both teaching and learning. AI presents opportunities for higher education services to be more readily accessible, not only within but also outside the classroom, at an unprecedented pace. This report seeks to elucidate how AI can become an integral component of universities and examines its immediate and future implications across various aspects of higher education. The challenges associated with implementing AI in these institutions are also examined. The findings of this study aim to provide educators with valuable insights and profound knowledge for developing educational models that can pave the way for future growth. To conduct this study, higher education institutes in Udaipur, Rajasthan, were selected as the focal point. Structured questionnaires were designed and utilized for data collection, with a focus on teachers' perceptions. Statistical tools such as frequency tables/graphs and one-way ANOVA were employed to analyze the collected data. The results of the study indicate that the integration of AI in higher education institutes significantly enhances students' learning capabilities, showcasing immense potential for AI in the future of the higher education sector.
Author's Name: R. krishnan, R. Mananda
Abstract— In this Project, we propose the design of two vectors testable sequential circuits based on conservative logic gates. logic gates outperform the sequential circuits implemented in classical gates in terms of testability. Any sequential circuit based on conservative logic gates can be tested for classical unidirectional stuck-at faults using only two test vectors. The two test vectors are all 1s, and all 0s. The designs of two vectors testable latches, master-slave flip-flops, double edge triggered (DET) flip-flops and 4x4 multiplier are presented. The importance of the proposed work lies in the fact that it provides the design of reversible sequential circuits completely testable for any stuck-at fault by only two test vectors, thereby eliminating the need for any type of scan-path access to internal memory cells.
Author's Name: G. Sruthi Rani, V. Hemalaxmi, B. Srikalanithi
Abstract—This manuscript intends to tell you about a downlink transmission scheme for femto cell networks grouping OFDMIDMA. We assign macro users and femto users to a separate sub carrier groups for transmission to eliminate cross tier interferences. We use IDMA with deterministic interleaver, basically to mitigate the cotier interferences within the same group of users. The system model and deterministic interleaver is explained clearly, the performance of the proposed scheme in terms of spectral efficiency and bit error rate (BER) is explained elaborately. Having analyzed the theoretical aspects and simulations demonstrates that with the combination of femto cell and grouping ,the proposed schemes levels better performance compared with usual OFDM-IDMA system and at the same time a lower complexity is exhibited than the later.
Author's Name: Mateesh, Prabhu Benakop
Abstract—Logic compatible gain cell (GC)-embedded DRAM (eDRAM) arrays are considered an alternative to SRAM because of their small size, non rationed operation, low static leakage, and two-port functionality. But traditional GC-eDRAM implementations require boosted control signals in order to write full voltage levels to the cell to reduce the refresh rate and shorten access times. The boosted levels require an extra power supply or on-chip charge pumps, as well as nontrivial level shifting and toleration of high voltage levels. In this paper, we present a novel, logic compatible, 3T GC-eDRAM bit cell that operates with a single-supply voltage and provides superior write capability to the conventional GC structures. The proposed circuit is demonstrated in 0.25μm CMOS process targeted at low power, energy efficient application.
Author's Name: Mohanlal Meen, Gethaa Menon
Abstract—The objective of this study was to examine the relationship between transactional leadership style and organizational commitment in private insurance companies of Ethiopia. The study sample has comprised of 8 insurance companies. These are selected among 16 private insurancecompanies through the procedure of simple random sampling technique. Therefore by using (Israel, 1992; Sekaran and Bougie, 2010) sample size determination formula 331 respondents were included. Although contingent reward had a statistical significant and positive relationship with organizational commitment (r=0.45, p<0.01), employees’ perception of their immediate supervisors’ active or passive management-by-exception leadership had a non-significant and negative relationship with organizational commitment (r = -0.08 and r = -0.04, p<0.01) respectively.Moreover, transactional leadership had a weak positive relationship with organizational commitment (r = 0.18, p < .01). On the bases of these findings the researcher has fairly to reject the alternative hypothesis (Ha2), since transactional leadership established positive but statistically non-significant relationship with organizational commitment. Therefore it indicated that there is a statistical non-significant positive relationship between transactional leadership and organizational commitment in private insurances. In general itimplies that respondents of the stated insurance companies are not comfortable with their leaders’ transactional leadership style to be more committed than ever.
Author's Name: Sagar Babu, Yakhoob. E. Laxman
Abstract—Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. We propose a novel architecture that integrates cloud database services with data confidentiality and the possibility of executing concurrent operations on encrypted data. This is the first solution supporting geographically distributed clients to connect directly to an encrypted cloud database, and to execute concurrent and independent operations including those modifying the database structure. The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability properties that are intrinsic in cloud-based solutions. The efficacy of the proposed architecture is evaluated through theoretical analyses and extensive experimental results based on a prototype implementation subject to the TPC-C standard benchmark for different numbers of clients and network latencies.
Author's Name: C.N.Vidhya Lakshmi, R.Nandhini, S. R. Raja
Abstract—The present study explored the potential impacts of artificial intelligence on higher education specifically within Hindustan Institute of Technology and Science. Employing a qualitative research approach, academics were presented with open-ended questions to delve into this subject. The analysis revealed a notable lack of awareness regarding the practical applications of artificial intelligence, highlighting the necessity for increased dissemination of knowledge within the Indian educational environment regarding the opportunities afforded by AI in education
Author's Name: Appannasamy, Chandana, Abdullah Subbi
Abstract—Conventional speech enhancement methods typically utilize the noisy phase spectrum for signal reconstruction. This letter presents a novel method to estimate the clean speech phase spectrum, given the noisy speech observation in single-channel speech enhancement. The proposed method relies on the phase decomposition of the instantaneous noisy phase spectrum followed by temporal smoothing in order to reduce the large variance of noisy phase, and consequently reconstructs an enhanced instantaneous phase spectrum for signal reconstruction. The effectiveness of the proposed method is evaluated in two ways: phase enhancement-only and by quantifying the additional improvement on top of the conventional amplitude enhancement scheme where noisy phase is often used in signal reconstruction. The instrumental metrics predict a consistent improvement in perceived speech quality and speech intelligibility when the noisy phase is enhanced using the proposed phase estimation method
Author's Name: Mehdi Lohar, Mohd.Hussain, Abdullah Hawaz
Abstract—Voice recognition is a process of identifying the identity of an unknown speaker on the basis of individual information that contain in the speech signal. Voice recognition is one of the biometric technologies used in a security system to reduce cases of fraud and traits. Voice biometric is an easy and cost effective biometric technique which requires minimalistic hardware and software complexity. General voice biometric needs a voice phrase by user which is processed with Mel Filter and Vector Quantized features are extracted. Vector quantization reduces the codebook size but decreases the accuracy of recognition. Therefore we propose a voice biometric system where voice file's non quantized code books are matched with spoken phrase. In order to ensure security to such direct voice sample we embed the voice file in a randomly selected image using DWT technique. Imposters are exposed to only images and are unaware of the voice files. We show that the technique produces better efficiency in comparison to VQ based technique.
Author's Name: Venkateswarulu Rao. B, S. Krishnaraj Rao
Abstract— The Cluster creation in MANET has paying attention in recent times and clustering as defined in Mobile ad hoc network partitioning of mobile nodes into different groups, and each group contains ordinary node, cluster head and getaway .The basic need to create cluster is to save the energy consumption, simplicity of routing, extending capability and to improve the network efficiency .In MANET the energy consumption of each node is key element, when the energy of node is drained, the node become fails to sense the data or forward the data, if the cluster head energy drained then not only fails cluster head it will leads entire cluster is collapse ,So after we can reconstruct new cluster with remaining nodes, called as Re-clustering, but Re-clustering needs high energy consumption, but nodes have limited resource constraints, In order to overcome clustering problems we need design new energy clustering protocol, in this work we are proposing Intra-balanced LEACH (IBLEACH) protocol to achieve life span of WSN.
Author's Name: Balanagar Samant, Utla Suresh Babu
Abstract— The Engine cylinder is one amongst the main automobile parts that is subjected to warmth variations and thermal stresses. So as to chill the cylinder, fins area unit provided on the surface of the cylinder to extend the speed of warmth transfer. By doing thermal analysis on the engine cylinder fins, it's useful to grasp the warmth dissipation within the cylinder. The principle enforced within the project is to extend the warmth dissipation rate by victimization the invisible operating fluid, nothing however air. we all know that, by increasing the extent we will increase the warmth dissipation rate, therefore planning such an oversized advanced engine is extremely tough. The most purpose of victimization these cooling fins are to chill the engine cylinder by air. The main aim of the project is to investigate the thermal properties by varied pure mathematics, material and thickness of cylinder fins. Transient thermal analysis determines temperatures and alternative thermal quantities that fluctuate over time. The variation of temperature distribution over time is of interest in several applications like in cooling. The correct thermal simulation might allow essential style parameters to be known for improved life. Presently Material used for producing cylinder fin body is atomic number 13 Alloy A6082 that has thermal conduction of 110- 150W/mk. we tend to area unit analyzing the cylinder fins victimization this material and conjointly victimization atomic number 13 alloy 6082 and Graycast iron that have higher thermal conductivities.
Author's Name: Aslam Khan, J. R. Arun Kumar
Abstract— This research presents a novel Hybrid Deep Learning Approach designed to advance object detection techniques. Leveraging the strengths of various deep learning algorithms, our method aims to enhance the precision and efficiency of object detection in diverse applications. The hybrid model integrates the capabilities of multiple deep learning architectures, combining their unique features to achieve superior performance in identifying and localizing objects within images. By fusing the strengths of convolutional neural networks (CNNs), recurrent neural networks (RNNs), and possibly other specialized architectures, our hybrid approach addresses the limitations of individual models. This synergistic combination facilitates more accurate and robust object detection across different scenarios, such as varying object scales, complex backgrounds, and occlusions. our proposed hybrid deep learning algorithm optimizes computational efficiency, making it suitable for real-time applications. We conduct comprehensive experiments to validate the effectiveness of our approach on benchmark datasets, demonstrating significant improvements in both detection accuracy and speed compared to traditional single-model methods.
Author's Name: Jeevendra Kumar Rai, Mankat Shukla
Abstract— Now a day researches are going on the different alternatives of electricity from Renewable sources such as sun, wind, water etc. Concentrated Solar Plant has became a very rapidly growing research subject. To convert solar energy into heat a medium is required and hence so many researches’ are going on the Heat Transfer Fluid (HTFs). HTFs are the way to store and transfer the heat from sun to the water. In this paper we are giving the properties which should be considered during selection of these HTFs, the problems associated with different types of fluid, and at the last but not the least the advantages of fluid over others.
Author's Name: Sakunthaka, Sumitha
Abstract— In this paper we discuss about monitoring vital parameter in automotive industry such as Temperature, Flaw detection, EMF detection & DC voltage measurements using a wearable glove which is both time and cost efficient. An Arduino board is interfaced with a temperature sensor to monitor the temperature inside the testing area and an ultrasonic sensor is used to find flaws in an object and the corresponding temperature and distance reading is displayed on 16*2 graphics LCD. A voltage divider circuit and an EMF detection circuit are also interfaced with the Arduino board to serve as a DC voltmeter and EMF detector respectively. The DC voltmeter consists of two probes which can be placed across any electronic circuit and corresponding reading is displayed on graphic LCD. All these units are compactly fitted in a glove in order to enable continuous monitoring of parameters in a time efficient and convenient way.