Volume 8 Issue 3
Mobile Eye Disease Prediction and Diagnosis
Author's Name: B.V. Srikanth, M. Hitha Chowdary, M. Suvishal Sen Kasyap, K. Anjali Reddy.

Abstract— Vision related diseases like glaucoma, diabetic retinopathy, macular degeneration, and cataracts are becoming increasingly common, making early diagnosis essential to prevent blindness and improve quality of life. However, traditional diagnostic methods can be time-consuming, reliant on expert ophthalmologists, and sometimes subject to human error. In many resource-limited areas, access to quality eye care is even more restricted, contributing to the growing challenge of preventable blindness. This project explores an innovative solution leveraging machine learning, particularly deep learning techniques like Convolutional Neural Networks (CNNs), to automate eye disease diagnosis. The goal is to develop a reliable, efficient, and scalable system that can analyze retinal images to detect and classify various eye conditions. By enabling accurate early detection, this approach has the potential to significantly reduce the risk of permanent vision loss and expand access to quality eye care worldwide

PDA Enabling Scalable Location Aware Computing Using Operated Video Enhanced Receiver
Author's Name: Sathana yadav, Shakuntala devi

Abstract— This Rover stands for Remotely Operated Video Enhanced Receiver. Rover is next generation of Bluetooth, infrared & cellular services. Rover technology can be ranging from power full laptop to simple cellular phones. The technology which enables the scalable location aware computing. This involves automation availability of information & services based on current location of user. This user make avail location aware computing through his PDA.PDA is a hand held computer used as palmtop computer. PDA’s commonly have colour screen & audio capabilities to be used as mobile phone, web browsers. Many PDA’s can access the internet, intranet & extranet via Wi-Fi. Many PDA’s employ touch screen technology.

Blockchain Based Inter-Organizational Secure File Sharing System
Author's Name: Jayendra Kumar, Devulapally Yathish, Dasari Ragini, Chindam Sreeja

Abstract— A consortium of organizations collaborates and exchanges information to create synergies in their operations. Centralized systems of secure transferring of data cannot provide distributed trust and transparency. Blockchain technology can be used to transfer data securely and transparently. This paper proposes a blockchain based secure transferring of data. It can be used by a consortium of organizations to securely exchange files in a distributed fashion. Hyperledger Fabric, an enterprise blockchain framework, is used for blockchain network setup and the development of smart contracts. The Inter Planetary File System (IPFS) is used for storing files in a distributed way. The paper provides the workflow for identity management and file-sharing processes. The proposed system allows a consortium of organizations to share files with confidentiality, integrity, and availability using blockchain

3-Tier Distributed Fuzzy Logic based Protocol TTDFP Clustering and PSO Algorithms
Author's Name: M. Gokila Priya, R. Gowsalya

Abstract— In Wireless Sensor Networks thousands of nodes are deployed in environment where there is no access to replace batteries. So, designing an energy efficient routing algorithm is a major challenge. Numbers of clustering algorithms such as LEACH, GSA, FCM, and DRINA have been developed to improve the energy balance of the WSN's as energy is the main aspect of WSN's during data transmission. Heuristic algorithms can find best solution in less time. These algorithms are used with mathematical and AI problems to find optimal solution. In this paper combination of fuzzy clustering and PSO algorithm is used to create clusters and find optimal route. Then, the proposed method is implemented in net beans. The proposed method is compare with two tire distributed fuzzy logic based protocol TTDFP which is investigated by energy consumption, packet delivery ratio, events monitored by sink, and event loss ratio.

Energy Consumption Prediction using Machine Learning for an Organization
Author's Name: G. RAJASEKHAR, D. HEMASREE, U. VIVEK RAJ, D. SUMA RAVALI

Abstract— This paper presents the development of a forecasting application for India's energy consumption using machine learning techniques. Energy demand prediction plays a crucial role in ensuring efficient resource allocation and sustainability. This study employs XGBoost, a gradient boosting algorithm, to analyze historical energy consumption data along with meteorological factors. The forecasting system, implemented using Streamlit, provides users with an interactive interface for visualization and prediction. The methodology includes data preprocessing, feature engineering, model training, and evaluation. The model is assessed using Mean Squared Error (MSE) and feature importance analysis. The results demonstrate that the application provides reliable energy consumption forecasts, supporting informed decision-making for policymakers and energy providers.

Implementing High Availability Cost Efficient Hybrid Cloud Data Hosting Scheme
Author's Name: C.V.Ramasamy, M. Mohana Priya

Abstract— This Nowadays increasingly enterprises and organizations are hosting their information into the cloud, in order to decrease the IT maintenance cost and develop the data reliability. However, facing the numerous cloud vendors as well as their heterogeneous pricing policies. customers may well be at a loss with which cloud(s) are suitable for storing their information and what hosting policy is cheaper. The all-purpose status quo is that customers usually put their information into a single cloud (which is subject to the vendor lock-in risk) and then simply trust to chance. This paper proposes a novel information hosting scheme (named CHARM) which integrates two answer functions desired. The first is selecting several suitable clouds and an appropriate unemployment strategy to store information with minimized monetary costand definite availability. The second is triggering a transition process to re-distribute information according to the variations of information access pattern and pricing of clouds. We evaluate the performance of CHARM using both trace driven simulations and prototype experiments. The results show that compared with the major existing schemes; CHARM not only saves around 20% of monetary cost but also exhibits sound adaptability to information and price adjustments

Behavior Of Compound And Its Practical Viewpoints Shts Subsequent To Applying AFRP
Author's Name: Meenatchi Sundaram, M.Sabari nathan, N.Bala, M. Rafiq

Abstract— The improvement in the properties of SHTS subsequent to applying AFRP is talked about right now and its polymerization impact on reinforcing. To build up a correlation on the ongoing exploration pattern right now, extraordinary method for retrofication plot was engaged with this examination, by following an act of winding or helical wrapping of AFRP to accomplish proceeds with firmness with a uniform solidarity over the stature of the section. To examine the proposed reinforcing plan, a similar report has been finished as for the customary methodology. A progression of test examination was done to think of the outcome and later a concise conversation has been finished with respect to the use of AFRP in various fields of Designing. Absolutely 21 examples were casted both in even and winding jacketing and tried tentatively under hub compressive burden by supporting a few parameters to watch the variety in the difference in the properties of SHTS to check the pivotal burden conveying limit alongside the firmness and Young's modulus. The trial examination demonstrated that there is a surprising improvement in the properties of AFRP reinforced examples as for various parameters after the application AFRP and the impact of its polymerization with the holding specialist. Along these lines after the fortifying of segment examples with AFRP, the general augmentation in the heap ringing limit of the SHTS was 23.27% and furthermore the proposed plan of winding wrapping gave a better outcome as looked at than the conventional technique for level stripping.

Design and Expansion Of Classical Built Regulator for Incessant Stimulated Tank Device Process
Author's Name: R.Vivekanandan, S.M.Manoj kumar, S.Rajesh

Abstract— This A Model based Controller for the Continuous Stirred Tank Reactor (CSTR) is designed and developed using Proportional, Integral and Derivative (PID) Controller for the process of the biological system in the bioreactor. The model of the controller is based on the First principle method guided by experimental results. The mathematical model is a linearized representation of the state space at the point of operation and also the representation of the input output transfer function. The PID controller evaluation and simulation is simulated using process system MATLAB. The PID controller is the most versatile controller in the industry that provides the desired control action needed by adjusting those parameters to control a mechanism. To predict the plant restriction, the PID controller utilizes the control action and also the process model is explicated. The parameters of the reactor such as flow, tank level and temperature has to be controlled in the process of Continuous Stirred Tank Reactor (CSTR). In CSTR microorganism inoculated under different conditions. The processed control algorithm enhances the conditions for the growth of micro-organisms in the bioreactor by effectively regulating the tank level and temperature of the process.

Buffer Storage of Sensors In Wireless Sensor Networks
Author's Name: Nitin yadav, Shanmugadevi

Abstract— We propose an Energy-efficient location-aware clone detection protocol in densely deployed WSNs, which can guarantee successful clone attack detection and maintain satisfactory network lifetime. Specifically, we exploit the location information of sensors and randomly select witnesses located in a ring area to verify the legitimacy of sensors and to report detected clone attacks. The ring structure facilitates energy-efficient data forwarding along the path towards the witnesses and the sink. We theoretically prove that the proposed protocol can achieve 100 percent clone detection probability with trustful witnesses. We further extend the work by studying the clone detection performance with untrustful witnesses and show that the clone detection probability still approaches 98 percent when 10 percent of witnesses are compromised. Moreover, in most existing clone detection protocols with random witness selection scheme, the required buffer storage of sensors is usually dependent on the node density, while in our proposed protocol, the required buffer storage of sensors is independent of number of nodes but a function of the hop length of the network radius h. Extensive simulations demonstrate that our proposed protocol can achieve long network lifetime by effectively distributing the traffic load across the network

Customer Classification Based on The Historical Purchase Data
Author's Name: P. Swarajya Lakshmi, B. Akash Rao, N. Sidhartha, K. Kalyan Chary

Abstract— Customer segmentation plays a vital role in modern business strategies, especially in the competitive e-commerce landscape. Understanding customer needs and identifying potential buyers at the right time is crucial for businesses aiming to stay ahead. By categorizing customers into distinct segments, businesses can create targeted marketing strategies that enhance customer satisfaction and increase sales. This paper explores the application of clustering techniques, with particular emphasis on the K-Means algorithm. Known for its efficiency, simplicity, and proven effectiveness, K-Means offers businesses a powerful tool for achieving accurate and actionable customer segmentation results. The paper further investigates how K-Means can be applied to large-scale datasets, ensuring scalability and adaptability to various business needs. By examining case studies and real-world applications, it highlights how this algorithm contributes to informed decision-making and the development of personalized marketing campaigns. Ultimately, this approach not only improves customer engagement but also drives business growth through optimized resource allocation and targeted communication strategies.ers.

Image Enhancement of Various techniques of shape detection based on shape boundary or interior
Author's Name: Mangal Kalyani, Gupta Raju

Abstract— In this paper we are merely want to explore digital image processing which is a motivating field because it provides the higher image information for human understanding and process the image for storage, transmission, and illustration for machine perception. Image process could be a technique to reinforce raw pictures received from cameras/sensors placed on satellites, aircrafts or photos taken in traditional everyday life for varied applications. Pre-processing is the initial process applied on images which are at lowest level of abstraction. Also Shape analysis methods play an important role in systems for object recognition, matching, registration, analysis, accurate detection of image, Research in shape analysis has been motivated in part, for fast recognition of image from large data base. Accessing the desired and relevant image from large data base in an efficient manner is another motive for research. Various techniques of shape detection are based on shape boundary or interior.

Study Analysis of Pavement Block Factor Types in Pavement Construction
Author's Name: Raju Patel, Rishil Mayank

Abstract— The use of different types of pavement block has been increased in India a decade ago. The specific requirements of paver block has been increased in the areas of footpaths and parking areas. Port land Cement Concrete and Asphalt Concrete are the most common roadway and highway construction material used. It is very necessary to use the materials which is durable and have the high compressive strength and can absorb the water to greater extent to have the greater water absorption value. In this project we have given greater stress on about the use of materials and machinery involved for the manufacture of different types of paver block in construction Purposes. For design of paver block the tests is to be performed is used to find the compressive strength and water absorption. The blocks having greater compressive strength and of less cost and can be used for much more time have been studied out in this project.

Study Analysis of IoT based Agriculture
Author's Name: Gaurav Paniwal, Shruti Gupta

Abstract— This work explores the tools and technologies used in smart agriculture. Artificial Intelligence and Machine Learning techniques, including basic block models that are used to do smart agriculture. How can we use fuzzy logic and Artificial Neural Network, is also covered in this paper. We have explored some of the IOT based irrigation systems including crop prediction systems. The necessary hardware, software and sensors that can be used to make precision agriculture are also included. The main motto of this paper is to get a detailed literature review that is required for smart agriculture.

Design a Web application for Identifying Various Physical Exercises for physically challenges people
Author's Name: Aaditya Sharma, Aman Sharma, Punit Sharma, Punit Ekka

Abstract— Physically challenged people or the people with disabilities are those section of the society in which the society embarks no decision or gives any judgement about their physical abilities of the working body parts and the other requirements of them according to their physical fitness as well, the present generation has the awareness regarding keeping themselves fit and sportingly active but on the other hand the people who are physically challenged are unable to work on the same. The project hereby tries to implement the solution for the same by giving the various physical exercises that could be done by the physically challenges people according to their working body parts and according to their ability accordingly.

Plant Disease Detection Using Machine Learning Approaches
Author's Name: Santhosh, Sai Laxmi

Abstract— Identifying of the plant diseases is essential in prevention of yield and volume losses in agriculture Product. Studies of plant diseases mean studies of visually observable patterns on the plant. Health surveillance and detecting diseases in plants is essential for sustainable development agriculture. It is very difficult to monitor plant diseases manually. It requires a lot of experiences in work, expertise in these field plant diseases and also requires excessive processing time. Therefore; image processing is used to detect plant diseases. Disease detection includes steps such as acquisition, image Pre-processing, image segmentation, feature extraction and Classification. We describe these methods for the detection of plant diseases on the basis of their leaf images; automatic detection of plant disease is done by the image processing and machine learning. The different leaf images of plant disease are collected and feature extracted of the various machine learning methods

Climate change and Weather Forecast Analysis Model using Data Mining Techniques
Author's Name: Shubham Kumar, Kanchan Bhatt

Abstract— Weather Forecasting is the attempt to predict the weather conditions based on parameters such as temperature, wind, humidity and rainfall. These parameters will be considered for experimental analysis to give the desired results. Data used in this project has been collected from various government institution sites. The algorithm used to predict weather includes Neural Networks(NN), Random Forest, Classification and Regression tree (C &RT), Support Vector Machine, KNN Nearest neighbor. The correlation analysis of the parameters will help in predicting the future values. This web based application we will have its own chat bot where user can directly communicate about their query related to Weather Forecast and can have experience of two-way communication.

Deep Learning Model for Air Quality Prediction Based on Big Data
Author's Name: Rarishma Kaushik, Rahesh Parmar

Abstract— Air pollution and its harm to human health has become a serious problem in many cities around the world. In recent years, research interests in measuring and predicting the quality of air around people has spiked. Since the Internet of things has been widely used in different domains to improve the quality for people by connecting multiple sensors. In this work an IOT based air pollution monitoring with prediction system is proposed. The internet of Things is a action interrelated computing devices that are given unique identifiers and the capability of exchange information over a system without anticipating that human to human or human to machine communication. The deep learning algorithm approach is to evaluate the accuracy for the prediction of air pollution. The main objective of the project is used to predict the air Quality. The large dataset works with LSTM for better air quality prediction. The prediction accuracy of air quality with LSTM, the evaluation indicator Root means square error is chosen to measure performance.

Sentiment Analysis Based on Movie Reviews using Various Classification Techniques : A Review
Author's Name: P. Kavitha, S. Ramadevi

Abstract— Sentimental analysis is also called "opinion mining" analyses attitudes and classifies text views. It relates to the use of natural language processing, text, and linguistic processing. A huge amount of data is created with the rapid growth of web technologies. Social networking sites are now popular and normal places where feelings can be shared by short messages. These sentiments involve happiness, sadness, anxiety, fear, etc. The analysis of short texts tends to recognize the crowd's sentiment. Sentiment Analysis on IMDb moviereviews describes a reviewer's general feeling or impression of a movie. Since the perceptions of humans improve the effectiveness of products & since a movie'ssuccess or failure depending on its review, costs are rising, and a good sentiment analysis model needs to be developed, that classifies moviereviews. Machine learning methods use ML algorithms to carry out sentiment analysis as a standard classification problem using syntactic and language characteristics. There are some methods of machine learning used for sentiment analysis in this paper. Most of the sentiment analysis is performed using SVM, RF, ANN, and NB, Algorithms of DT, BN, & KNN.

Image Forgery Detection and Localization
Author's Name: Khaily Mohammed Shah, Sathyam Pandey

Abstract— A human brain responds at a much faster rate to images and the information it contains. An image is considered as proof of past events that have occurred, but in today's world where editing tools are made available so easily tampering of images and hiding the original content has become too mainstream. The identification of these tampered images is very important as images are considered as vital sources of information in crime investigation and in various other fields. The image forgery detection techniques check the credibility of the image. Various research has been carried out in dealing with image forgery and tampering detection techniques, this paper highlights various the type of forgery and how they can be detected using various techniques. The fusion of various algorithms so that a complete reliable type of algorithm can be developed to deal mainly with copy-move and image splicing forgery. The copy-move and image splicing method are main focus of this paper.

A Systematic Review of Blogging : Opportunities and Challenges
Author's Name: Aditya Swami, shish Kumar

Abstract— By this research, we want to display the key factors of how effective blogging as technology is. We collected information curated by several researchers on the same for understanding their point of view as well. By doing this we found out what makes blogging the best way of sharing information online. We also analyzed the technological aspect of modern-day blogging which includes modern technologies being used, privacy rules and control as well as data analytics. By these approaches, we showed how blogging is not only the best medium for sharing information but can also help in other fields as well like marketing, education, data analysis, community development. With this research, we also wanted to highlight the downsides of using blogging or microblogging.

A Review on Outfit Fashion Recommendation System
Author's Name: Tulshiram Bansod , Monali Shivram

Abstract— With the quick rise in living standards, people's shopping passion grew, and their desire for clothing grew as well. A growing number of people are interested in fashion these days. However, when confronted with a large number of garments, consumers are forced to try them on multiple times, which takes time and energy. As a result of the suggested Fashion Recommendation System, a variety of online fashion businesses and web applications allow buyers to view collages of stylish items that look nice together. Clients and sellers benefit from such recommendations. On the one hand, customers can make smarter shopping decisions and discover new articles of clothes that complement one other. Complex outfit recommendations, on the other hand, assist vendors in selling more products, which has an impact on their business. FashionNet is made up of two parts: a feature network for extracting features and a matching network for calculating compatibility. A deep convolutional network is used to achieve the former. For the latter, a multi-layer completely connected network topology is used. For FashionNet, you must create and compare three different architectures. To achieve individualised recommendations, a two-stage training technique was created.

College ERP Using MERN Stack
Author's Name: Shubham Patil, Saurav Daware, Ameya Bhagat

Abstract— This paper is aimed at developing an Online College Management System that is of importance to the educational institute or college. This system is named College ERP using MERN stack. This system may be used to monitor college students and their various activities. This application is being developed for an engineering college to maintain and facilitate ease of access to information. For this the users must be registered with the system. College ERP is an Internet based application that aims at providing information to all levels of management within an organization. This system is used as an information management system for the college. For a given student and staff (technical and nontechnical) can access the system to either upload and access some information from the database.

Air Pollution Evaluation by Combining Stationary, Smart Mobile Pollution Monitoring and Data-Driven Modelling
Author's Name: Aditi Shedge , Shaily Shah

Abstract— Air pollution has become a major issue in large cities because increasing traffic, industrialization and it becomes more difficult to manage due to its hazardous effects on the human health and many air pollution-triggering factors. This paper puts forth a machine learning approach to evaluate the accuracy and potential of such mobile generated information for prediction of air pollution. Temperature, wind, humidity play a vital role in influencing the pollution dispersion and accumulation, majorly influencing the prediction of pollution levels. Thus, this paper includes the atmospheric condition information registered throughout the study period in order to understand the influence of these factors on air pollution monitoring. Data driven modelling is an efficient way of extracting valuable information from generated data sets, however it is less efficient when the data is incomplete or contains inaccuracies. This modelling approach has true potential for real time operations because it can detect non-linear spatial relationships between sensing units and could aggregate results for regional investigation. Neural networks comparatively showed good capability in air quality prediction than support vector regression.