VOLUME 03 ISSUE 10 by IJREAM EDITOR

MANET stands for Mobile ad hoc network and is an infrastructure-less network and it is having abi... more MANET stands for Mobile ad hoc network and is an infrastructure-less network and it is having ability to configure itself. The topology of network changes dynamically. It consists of wireless mobile nodes which communicate with each other without any centralized administration. In MANET different types of routing protocols are introduced. These protocols can be categorized into reactive, proactive and hybrid routing protocols. In this paper, AODV and DSDV protocols are analyzed in terms of routing overhead, packet delivery ratio, throughput and end to end delay. The performance of AODV is better than DSDV in terms of throughput, packet delivery ratio and routing overhead. As the DSDV is a proactive routing protocol, it is having a less end to end delay as compare to AODV. The performance of AODV gets affected by black hole attack. This paper gives the modification in AODV which helps to improve the performance of AODV in presence of black hole attack.
Finance is the system that includes the granting of money and credit, making of investments and p... more Finance is the system that includes the granting of money and credit, making of investments and provision of banking facilities. Behavioral finance is a new academic discipline which seeks to apply the insights of the psychologists to understand the behavior of both investors and financial markets. This study analyse the Investors behavior through 600 respondents using Factor analysis test. The results of the study show that the 16 variables selected for the study had been reduced to 5 factor models using the principle component analysis such as Market Dynamics, Logical Analysis , Herding Bias, Regret Aversion and Heuristic Bias. Thus, Behavioral finance is becoming a primary part of the decision making process, since it influences investors' behavior greatly.

Detection and tracking of moving objects is at the core of many applications dealing with image s... more Detection and tracking of moving objects is at the core of many applications dealing with image sequences. One of the main challenges in these applications is identifying shadows which objects cast and which move along with them in the scene. Shadows cause serious problems while segmenting and extracting moving objects due to the misclassification of shadow points as foreground. Shadows can cause object merging, object shape distortion, and even object losses (due to the shadow cast over another object). The difficulties associated with shadow detection arise since shadows and objects share two important visual features. First, shadow points are detectable as foreground points since they typically differ significantly from the background. Second, shadows have the same motion as the objects casting them. For this reason, the shadow identification is critical both for still images and for image sequences (video) and has become an active research area, especially in the recent past. It should be noted that, while the main concepts utilized for shadow analysis in still and video images are similar, typically, the purpose behind shadow extraction is somewhat different.

Brand image is all about present view of the customers about the brand. Customer's loyalty can be... more Brand image is all about present view of the customers about the brand. Customer's loyalty can be state of confusion with respect to purchase or consumption pattern of a product at a moment and leads to repeat purchase, intention of repurchase and world of mouth to others. This is possible to be achieved and measured through the effect of trust and satisfaction. The entire focus of this study is to find the relationship between the brand image, trust, satisfaction and customer's loyalty towards private label brands in Hubli-Dharwad city. This study consists of 413 valid questionnaires. The Baron and Kenny (1986) four step method of mediation is used to test the model which consists of trust and satisfaction as mediating between the brand image and customers loyalty and also to know effect of satisfaction on satisfaction. Liner regression method was used in measuring relationship between the dependent and independent variables. The result show that there exist a relationship between direct brand image and customer loyalty, between Brand image and satisfaction, between satisfaction and customers loyalty, between trust and customers loyalty and satisfaction mediates the relationship between the brand image and customers loyalty.

In this paper, we propose a fractional Fourier transformation (FrFT) to blindly assess the third-... more In this paper, we propose a fractional Fourier transformation (FrFT) to blindly assess the third-order dispersion in optical fiber communication system. By measuring the chromatic dispersion (CD) at different wavelengths, this technique can estimate the dispersion slope and further it can calculate the third-order dispersion. The Least mean square adaptive method is also utilized at last for the compensation of dispersion effectively. The simulation results exhibit that the estimation error is less than 2% in 28GBaud dual polarization quadrature phase-shift keying (DP-QPSK) and 28GBaud dual polarization 16 quadrature amplitude modulation (DP-16QAM) system. Through simulations, the proposed third-order dispersion estimation method is appeared to be powerful against nonlinear and amplified spontaneous emission (ASE) noise. Moreover, to decrease the computational complexity, searching step with coarse and fine granularity is looked to search optimal order of FrFT.

Sludge is an unavoidable product of wastewater treatment that creates problems of disposal. Incre... more Sludge is an unavoidable product of wastewater treatment that creates problems of disposal. Increasingly, strict environmental control regulations have resulted in limitations on sludge disposal options. Disposal by incineration has been found to be a good option. In this research, application of waste sludge were collected from sewage treatment plant (STP) Nashik was used as cement replacement in concrete mix. This study utilized replacement of 5%, 10 %, 15 % and 20% by weight of OPC with water binder (w/c) ratio of 0.50 and 0.45 for Grade 20 and Grade 30 respectively. The performance of sludge concrete in terms of its compressive strength, split tensile strength test, flexure strength test were investigated. All values of compressive strength for sludge concrete were lower compared to the OPC control, and the strength decreased as the percentage of replacement with sludge increased for Grade 20 and Grade 30, at replacement of 10 %. Meanwhile, water absorption and water permeability for the sludge concrete increased as the replacement increased. Overall, with further research in producing quality, the potential of using this waste as a cement replacement material is very promising. Keywords: Waste Sludge, F.A-Fine Aggregate, C.A.-Coarse Aggregate compressive strength, flexure strength test split tensile strength test Rapid chloride Ion penetration.
VOLUME 03 ISSUE 09 by IJREAM EDITOR

Water pollution caused by faecal contamination is a serious problem due to the potential for cont... more Water pollution caused by faecal contamination is a serious problem due to the potential for contracting diseases from pathogens (disease causing organisms). Many chemical substances are used as disinfectants to treat the water. These substances may produce a number of by products which have been reported to cause carcinogenic, mutagenic and teratogenic effects. Thus, some alternate cost effective method is prerequisite to eliminate the bacterial population. Many plants possess antimicrobial activities and are used for the treatment of different diseases. The use of plants as source of remedies for the treatment of many diseases dated back to prehistory and people of all continents have this old tradition. The plants under study were Acacia nilotica and Tamarindus indica, the different plant like the leaves and the seeds were used for the treatment against the coliforms group of organisms. The natural disinfectants used in this study are suitable for the water disinfection used in this study are suitable for water disinfection.

CRM is commonly recognized as an effective tool in B2B marketing. However, does CRM also work in ... more CRM is commonly recognized as an effective tool in B2B marketing. However, does CRM also work in B2C marketing in the FMCG industry? This has long been questioned because CRM is characterized by leveraging large customer base in order to offer customized one to one marketing, ideally at the individual level. It seems that there exists a paradox between the mass appeal branding (production driven) and one-on-one customer relationship of consumer goods. It is argued that consumers are too many and too scattered, products are purchased directly from retailers, and a particular brand is just one among the many products of the same category that the retailer sells. Therefore, the value of customers is more easily captured through the distribution channel. This is where CRM becomes critical. This is the reason why end-consumer relationship programs have been by and large disjointed in the FMCG industry, although customer relationship has always been an integral part of the philosophy of many FMCG manufacturers. Relationship building is a slow process, especially in a market where the consumers are highly heterogeneous. Although FMCG companies have realized that the objectives of consumer-end CRM is to provide a platform to consumers to get closer to the company and encouraging them to offer solutions, feedback and suggestions, there is far less agreement on the model with which a CRM program can be successfully launched.
The work is based on to check the quality of wine. The method is designed as to find the impurity... more The work is based on to check the quality of wine. The method is designed as to find the impurity in wine. The extended of ethyl glycol and ethyl phenol in wine and its quantity was founded by this method using GC-MS. Solid phase extraction is used for finding nature of the impurity and was founded on GC-MS. the ethyl phenol and ethyl glycol is produced by the spoilage of yeast brettanomyces which may affect the human health.
—The purpose of planned systems is to advocate the suitable appropriate things to the user using ... more —The purpose of planned systems is to advocate the suitable appropriate things to the user using data mining and clustering techniques. Throughout this paper we tend to clarify the recommendation system connected analysis so Introduces varied techniques and approaches utilized by the recommender system User-based approach, Item based approach, Hybrid recommendation approaches and connected analysis at intervals the recommender system. Recommender systems profit the user by creating him suggestions on things that he's doubtless to buy and therefore the business by increase of sales. During this paper we tend to conjointly planned a brand new technique that overcomes the data-sparsity drawback and improve the performance accuracy.

Multimedia data security is important for multimedia commerce. To maintain security and privacy, ... more Multimedia data security is important for multimedia commerce. To maintain security and privacy, digital video needs to be stored and processed in an encrypted format. Previous cryptography studies have focused on text data. The encryption algorithms developed to secure text data may not be suitable for multimedia applications because of the large data size and real time constraint. So in this paper, we focus and investigated on the confidentiality of multimedia big data under resources constraints. Firstly, the growth trend of data volume compared with computational resources is discussed and an analysis model for multimedia data encryption optimization is proposed. Secondly, a general-purpose lightweight speed tunable video encryption scheme is introduced. Thirdly, a series of intelligent selective encryption control models are proposed. Fourthly, we as a contribution provide auditing to big files by using hashing algorithm. The experimental results have demonstrated the feasibility and efficiency of the proposed scheme. Keywords — Internet of Things, multimedia sensing multimedia big data, video encryption, file auditing, MES.

Cloud computing is known as " Utility ". Cloud Computing enabling users to remotely store their d... more Cloud computing is known as " Utility ". Cloud Computing enabling users to remotely store their data in a server and provide services on-demand. Since this new computing technology requires user to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. We can increase security on access of the data in the cloud. However there are security concerns on outsourced data as the cloud servers are treated as untrusted. To overcome this problem many Attribute Based Encryption (ABE) techniques came into existence for secure access control. These techniques suffer from problems in implementing flexible access control mechanisms. A hierarchical attribute based solution which provides fine grained access control besides making it scalable. In this paper we implement this security scheme and build a prototype application that demonstrates the proof of concept. The empirical results revealed encouraging results.

The high knock resistant and low emission make the methanol a best suitable alternative for gasol... more The high knock resistant and low emission make the methanol a best suitable alternative for gasoline. High octane number and heat of vaporization allows to run at higher temperature. The effect of methanol and gasoline blends as well as neat methanol on engine performance and emission parameters have been experimentally investigated. A four stroke petrol engine with twin spark ignition engine is used for this experimental study. The work is carried out at different loads for the blends such as M0, M20, M40, M60, M80 and M100 on mass basis. The spark plugs are situated in the engine cylinder in opposite direction. The spark produced by two spark plugs at different intervals such as 32 o BTDC-28 o BTDC. The performance and emission parameters are determined at two different spark timings such as 32 o BTDC-28 o BTDC and 26 o BTDC-24 o BTDC at the fixed compression ratio 10:1 for all blends. The experimental results inferred that, better performance and emission characteristics can be obtained by adding methanol with gasoline since it is volatile and has higher octane number than gasoline. The experimental results also revealed that 28 o BTDC-26 o BTDC spark ignition combination increases the thermal efficiency with decreasing CO, UBHC, as well as NO x.

The nature, content and processes of work have changed over time. There has been adjustment, adva... more The nature, content and processes of work have changed over time. There has been adjustment, advancement, development, diversity and difference in work today. So has been a change in nature of employees. Employees today are exploring their own capacities and want to follow unique patterns for accomplishments. In such a course they need a motivating factor at workplace; motivation that would drive them and bring their foremost out. A motivated workforce brings forth innovation and creativity which enriches their performance standards. The study shows the feature of motivational factors in higher educational institutions of West Bengal where employee motivation is very important for the growth and development those institutions. Motivated employees are always productive and highly committed to their work. Motivation which increases employee performance indicates organization's attention towards employees. The paper delves deep into the facts that by motivational communication, by making employees feel better at work, by appreciating 'the power of inclusion' and by sharing a vision with employees would not only create a productive employee and a pleasant transaction but also would generate self confidence, self discipline, cooperation, improve efficiency and strengthen bonds in the long run. The purpose of the study is to determine the influences of motivational factors towards employee's performance in higher educational institutions of West Bengal.
Lack of standard framework for PPP projects in India necessitated introduction of Model Concessio... more Lack of standard framework for PPP projects in India necessitated introduction of Model Concession Agreement (MCA) for PPP Highway projects in mid-nineties, which outlines the policies and regulations for implementation of PPP projects. This paper covers the journey of development of the MCA since its inception. The core idea of development of MCA was to keep the balance of risk allocation and thereby making the bid attractive for bidders. Various forms of the MCA based contracts, depending upon the degree of project viability have been discussed and a comparative statement of the analysis is presented. Further, the criteria for adopting more appropriate form of MCA based contract is presented.

Handwritten character recognition is the ability of a computer to receive and interpret intelligi... more Handwritten character recognition is the ability of a computer to receive and interpret intelligible handwritten input from sources such as paper documents, photographs, touch-screens and other devices. Handwritten Marathi Characters are more complex for recognition than corresponding English characters due to many possible variations in order, number, direction and shape of the constituent strokes. The main purpose of this paper is to introduce a new method for recognition of offline handwritten characters using segmentation and Artificial neural networks. The whole process of recognition includes two phases-segmentation of characters into line, word and characters and then recognition through feed-forward neural network. This architecture allows us to easily transfer improvements between languages and scripts. This made it possible to build recognizers for languages that, to the best of our knowledge, are not handled by any other online handwriting recognition system. The approach also enabled us to use the same architecture both on very powerful machines for recognition in the cloud as well as on mobile devices with more limited computational power by changing some of the settings of the system.

Humans show universal consistency in recognizing emotions but also show a great deal of variabili... more Humans show universal consistency in recognizing emotions but also show a great deal of variability between individuals in their abilities. This paper introduces a human emotion according to face detection and voice. The interaction between human beings and computers will be more natural if computers are able to perceive and respond to human non-verbal communication such as emotions. Although several approaches have been proposed to recognize human emotions based on facial expressions or speech, relatively limited work has been done to fuse these two, and other, modalities to improve the accuracy and robustness of the emotion recognition system. Inter-personal human communication includes not only spoken language but also non-verbal cues such as hand gestures, facial recognisition. We express our emotion according to face and voice. It improves the overall human computer interaction. The work presents an approach toward the face emotion. And speech recognition. In This paper emotion can be detected according to Robot, give the proper result related to voice and face recognisition. Face detection is a very attractive research theme and it is also important both in theoretical research and in practical application. With the deepening of the research, face detection technology has achieved a lot of remarkable results. However, there are still many shortcomings, Feature extraction of image is necessary for face detection. However, these factors can tempestuously change the feature of a persons different Images.
This paper is the study of flexible employee scheduling with the multi skill training program of ... more This paper is the study of flexible employee scheduling with the multi skill training program of the employees in the manufacturing process. The paper starts with mathematical modeling by giving flexibility in choosing the shift types and days off assignment to the employees. An extra care is taken for not assigning night shift on the day before the day off. A robust Genetic algorithm is used to solve the mathematical model constructed. A 6hour shift for morning as well as afternoon and 12hour shift for night is assigned to the employees, which reduces the total cost function of the employees by 10.33% compared to normal 8hour shifts. And also a multi skill training program to the employees are adapted, which again reduces the total cost function of the employees by 20% compared to untrained employees.

For most of the people, web interaction is a very common phase to acquire information. It is poss... more For most of the people, web interaction is a very common phase to acquire information. It is possible that in a combined environment, more than one person may try to obtain similar information in one domain. One person may like to solve a problem using an unfamiliar Apache Tomcat which he had studied by another person before. Connecting and then sharing with that persons will be more beneficial to get there learned knowledge. Fine grained knowledge sharing is proposed for this combined environment. The system is proposed to classify the surfed data into clusters and summarize the details in fine grained details. For any system the efficiency depends upon the surfing. The framework includes: Data which is surfed, clustered into tasks. Then task is mined in fine grained output. To get proper result, the search method is applied to the output (mined results).The concept of Data Mining in fine grained knowledge is combined with the information gathering and classification to produce efficient data searching technique in agriculture system.

Transmission of data in mobile devices using QR code with increased data transfer capacity. Befor... more Transmission of data in mobile devices using QR code with increased data transfer capacity. Before that use of QR code having some of limitations. In present QR code is used to store text like only such as web address, but they can also store vCard details, Google Maps info and even Youtube video links.. So we are using QR code for the storing more than text like multimedia files such as images, DOC files, and so on. We are also providing security for QR code so no one can stole the any kind of information. QR code is generally used for embedding messages such that people can conveniently use mobile devices to capture the QR code and acquire information through a QR code reader. Generally, target on two kinds of variants to make the original QR code visually pleasant, i.e. changing the shape/color of modules and embedding a picture into the QR code. Embedding a picture into the QR code can easily convey the characteristics of the QR code owner and would impress the viewer more. The concept of QRCodes is great relevance for use in wireless data transmission between handheld electronic devices.
Uploads
VOLUME 03 ISSUE 10 by IJREAM EDITOR
VOLUME 03 ISSUE 09 by IJREAM EDITOR
To reduce the disadvantages of previous system lesser method has been implemented. In proposed system we are using particle filter to overcome problem of previous system like kalman filter for better result of image sequences and also object tracking.
not able to make full use of agricultural resources. The main reason is the lack of rains and scarifies of land reservoir
water and overused of fertilizers so we need to control these parameters. This system made wireless sensor network for
monitoring agricultural environments for various factors such as NPK, temperature and humidity along with other
factors can be of significance. By using pH sensors we get the information about the soil and analyze the acid level of the
soil. By which we can apply fertilizer to the place where it needs, also we can avoid over fertilization of the crops. We
used humidity sensor to sense the weather. By this the farmer can get idea about the climate. If there is any chance for
rainfall; the farmer need not irrigate the crop field. This Seminar reports the design and development of a smart
wireless sensor network (WSN) for an agricultural environment. Monitoring agricultural environments for various
factors such as Nitrates, Zink, Potassium, Phosphorus, Humidity and Temperature along with other factors can be of
significance. The ability to document and detail changes in parameters of interest has become increasingly valuable.
Investigations were performed for a remote monitoring system using WiFi, where the wireless sensor nodes are based
on WSN802G modules. These nodes send data wirelessly to a central server, which collects the data, stores it and allows
it to be analyzed and displayed as needed.
Keywords— Biometric, Eris Scan, Thumb Detection, Gesture Detection, Harr Cascade, Open CV
Keywords — Braille, Braille Code, Speech Recognition
Keywords —Online Exam, Aptitude, Generation, paper, examination.