Manuscripts

Recent Papers

Thesis

Wireless transmission of electricity through EM waves

Modern problems require modern solutions. The most important thing in power engineering is the transmission of electricity from place to place. No.of disturbance can be produced form the wireless transmission as like the conventional transmission lines. This paper is going to present brief information about one possible way of wireless transmission of electricity which could be useful for the near future. The true potential of wireless transmission has never witnessed. The potential of wireless transmission can change the perception of what we see in the field of electricity. Transmission of power from the source to load could be easy through the air without any interconnecting wires. In this particular paper using EM waves from magnetron as transmitter and using carbon nanotubes placed in the solar panel as receiver for the conversion of EM waves into electrical energy can be explained. By this proposed constructional we can transmit electricity where the world has never seen.

Published by: Voggu Sai Teja Sagar, G. Madhu Murali Siran, Shaik Haaris Saad

Author: Voggu Sai Teja Sagar

Paper ID: V6I5-1160

Paper Status: published

Published: September 14, 2020

Full Details
Review Paper

Towards Singularity: Implications to Intelligent UI with Explainable AI approach to HCI

This paper has the aim of incorporating and prototyping the realms and the possibilities of future UI designs. It collectively analyses recent AI techniques and signifies the need for Intelligent User Interfaces (IUIs) that might shape future inventions and act beneficially for understanding the technological impacts it can produce. The architecture of HCI is prone to undergo a drastic transformation where multimodal interaction through cyborg automation will play a major role in singularity. For solving current issues in UI designs such as gender, disability, and color issues, Explainable AI (XAI) is further improving interpretability and explainability of Machine Learning (ML) algorithms. This paper furthermore explains the convergence of Engineering and Life sciences with its association to improving the outlines of future UIs on a process of gaining collective intelligence.

Published by: Sushrut Ghimire

Author: Sushrut Ghimire

Paper ID: V6I5-1158

Paper Status: published

Published: September 14, 2020

Full Details
Research Paper

Evolution of the Indian Telecom Industry and its impact on consumer

The purpose of this paper is to profile the Indian telecom industry (2015 – 2020) from an economic and game theoretic perspective. The Indian Telecom industry has undergone massive change over the last few years, and the paper investigates the long run impact of these changes on consumer welfare. The paper uses literature and books on different oligopoly models and pricing strategies to explain the workings of the telecom industry. These models are verified using empirical data. The first section of the paper explains the entry of new firms in an oligopoly, and the second section explains how present and future equilibrium models, pricing strategies and collusion in the telecom industry impact consumer welfare. The study uses the models discussed to predict the future of the telecom industry and identifies the role of the government in order to increase long run consumer welfare.

Published by: Sahil Koita

Author: Sahil Koita

Paper ID: V6I5-1153

Paper Status: published

Published: September 14, 2020

Full Details
Case Study

Predicting Diabetes using Machine Learning Technique

Diabetes is a chronic illness with the potential to induce a worldwide health care crisis. As per the International Diabetes Federation, 382 million people exist with diabetes in the world currently. By 2035, the number is expected to be doubled as 592 million. Diabetes mellitus or diabetes is a disease generally induced due to the grown level of glucose in the blood. Physical and chemical tests are different traditional methods for diagnosing diabetes. However, diabetes prediction in advance is pretty challenging for medical practitioners due to complicated interdependence on multiple factors as diabetes influences individual organs such as eye, heart, kidney, eye, nerves, foot, etc. Data science techniques have the potential to help the medical field by answering some of the general questions. One such task is to facilitate predictions on medical data. Machine learning is the most useful technology for the medical field in data science. Machine learning is helpful because of the way machines learn from experience. This project aims to propose a valuable technique for earlier detection of the diabetes disease for a patient with higher efficiency by combining the outcomes of different machine learning techniques, the supervised machine learning methods including Decision Tree, Logistic Regression, Random Forest, Neural Network, XGBoost, and Support Vector Machine

Published by: A. K. Aravind Kumar

Author: A. K. Aravind Kumar

Paper ID: V6I5-1152

Paper Status: published

Published: September 11, 2020

Full Details
Research Paper

Development and biochemical analysis of Amla-Betel leaf extract impregnated jelly

The objective of this research work is about developing a herbal jelly by incorporating Amla and betel leaf extract. Amla is a green colour translucent fruit which is loaded with more nutritional benefits. Amla is an excellent source of vitamin c and this vitamin c helps in building our immunity. Next is the betel leaf extract which is also enriched with more health benefits. These betel leaves are full of vitamin c,niacin and riboflavin and it has an Excellent healing properties. These betel leaf treat colds and also aids in digestion. So our idea is to develop a jelly by combining all these products. Our jelly is completely free of artificial colouring and flavouring agents. After preparation,the jelly was filled in sterilized bottles and stored under both ambient and refrigeration temperature for about 60 days and the biochemical parameters such as moisture content, TSS, pH, Titratable acidity were analysed. Under ambient temperature, moisture content decreased from 26.80% to 24.90 %and pH increased from 3.6 to 4.3 and Tss increased from 65 degree brix to 72 degree brix and Titratable acidity increased from 0.48 % to 0.67%.Under refrigeration temperature, the moisture content decreased from 26.80% to 25.83%, ph increased from 3.6 to 4.2,Tss increased from 65degree brix to 69degree brix and titratable acidity increased 0.48% to 0.54%. Sensory evaluation was also performed and the developed jelly obtained an excellent sensory score.

Published by: M. Akshara, Mohana Priya R., K. Pooja

Author: M. Akshara

Paper ID: V6I5-1146

Paper Status: published

Published: September 11, 2020

Full Details
Research Paper

An introduction to context-aware security and User Entity Behavior Analytics

A context aware system is recognized as a "system which uses any context information previous to, or in the duration of, service stipulations", whereas the main goal of this system is to identify any suspicious activity done by the users. The mobility feature of most computing and personal devices have made the 'context of the user' an important aspect of the system. Nowadays with the ever-increasing digitization of the workplace, employees are using their personal devices along with the organization resources provided to them. Context Aware security systems vary from conventional systems, as they provide unique characteristics such as name, geolocation, time of day or type of endpoint system to boost information security decisions. Combine this with a model that notifies and alienates any abnormal activity by the user, we have a strong security measure against harmful cyber activities such as unauthorized end users accessing confidential data, preventing users to download sensitive data onto external devices, and so on. Context-aware security systems address the usability challenge of accessibility and authentication, i.e., to use inferential information such as geolocation, identity, type of endpoint device, or time of day to enhance information security decisions. The use and importance of this system is increasing and therefore plays a huge role in prospective pervasive systems. The goal of this paper is to introduce the reader to the concept of context aware security and lay the groundwork that one needs to get accustomed to the topic, by extracting various topics from different research papers.

Published by: Yash Arohan, Ashwin Yadav, Aakash Pandey, Shardul Churi, Manvi Saxena, Akshit Vaghani

Author: Yash Arohan

Paper ID: V6I5-1137

Paper Status: published

Published: September 11, 2020

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X