Wi-Fi hotspot with captive portal on Raspberry Pi
The Internet is the biggest network of computers worldwide for communication. Internet or inter-network of these devices help make rapid progress in the technology making the world a better place to live in. Every day there is an innovation which leads to new methods of communication and thus, networking. In the proposed work, Wi-Fi hotspot is enabled on Raspberry Pi with a Captive portal technique implemented, where the user can connect to the hotspot with the help of a captive portal page. The required entries like username and password need to be entered in the portal page which authenticates the user. The entries are verified in the database, if the entries are valid the user gets the internet access for certain period of time. If the entries are invalid access gets denied. The message status is maintained in the database to check whether the message is sent to the user or not.
Published by: Annapurna B P, Vani V
Author: Annapurna B P
Paper ID: V4I3-1403
Paper Status: published
Published: May 15, 2018
Design of frame for a wall mounted indoor swing
All The back and forth motion of the swing is good for children under the age of five years as it teaches them how to get along with others. But nowadays, due to the shortage of time & also rush at the gardens, children are not able to play swings. Some indoor swings are available but they are having some drawbacks. This paper presents the design of a frame of a wall mounted swing. It consists of a cantilever beam, two support members, and other parts. The cantilever beam is designed considering the bending stresses developed in it. This beam will be used for hanging the chains of swing. The deflection of the beam in the horizontal plane during swinging action is restricted by two supporting members on each side of the beam. All welded joints in this frame are also designed.
Published by: Mallu Bhojappa Mane, Hemant D. Lagdive
Author: Mallu Bhojappa Mane
Paper ID: V4I3-1412
Paper Status: published
Published: May 15, 2018
A study on diversity of personality in a team and its effect on the team’s performance
Individuals differ in personality and social conduct. It is by and large acknowledged that some of this variety is because of contrasts in qualities and some to "condition"— that is, differences in individual’s experience. This study investigated the relationships between Personality differences in a team and its effect on the direct overall performance of the whole team. Particularly, this study has considered the MBTI, extensively used by professionals in relationships, spirituality, careers, education, workplace, and organization etc for investigating personality types. The MBTI personality test was conducted on Students based in Management College in Pune. A total of 79 students falling in the range of 21 to 23 years of age completed the personality test.
Published by: Sumit Yadav, Tanvi Malik, Naval Lawande
Author: Sumit Yadav
Paper ID: V4I3-1381
Paper Status: published
Published: May 15, 2018
International human resource management: Challenging to cultural strategic management by decentralization
A have a look at on the cultural strategic management of labor with the aid of worldwide operations through decentralized the organization. Undertaking to the effectiveness of an employer with the aid of using sources as according to monetary overall performance, obeying local regulations and policies, technology and managing the human useful resource. The statistics analyzed with CGS system in conduct science. Analyzing the cultural by way of places are planning, implementation and control of the method to directing workforce in a business enterprise by way of decentralization. Well executed as in keeping with cultural strategy control by using the decentralized organization are new orientations to the effectiveness of worldwide human useful resource control. Through the assisting multinational companies are the developed enterprise in addition to their existed nations.
Published by: Mannava Sumaja, M Kishore Babu
Author: Mannava Sumaja
Paper ID: V4I3-1170
Paper Status: published
Published: May 15, 2018
Comprehending depression in Youth!
Depression has well been foreseen as the major cause of death in some 5-6 years to come, surpassing cancer, stroke, accidents, you name it! A precarious malady, of which regrettably not much can be done on a preventive front. Well, everyone seems to go through depression - everyone, from the maniac laborer on highly low wages to someone you follow on Instagram or Twitter (though the intensity is manageable enough most of the times)! But can something really be done about it in the first place? Well, I would simply love to share my piece of experience with being an inexorable slave to the incessant mania, and helplessness. These won’t certainly be the words of a doctor. However, the primary inclination of whatever would go on further would always be towards helping you out with a few tools that I feel I have managed to gather down the road. I do feel that I have emerged victorious over such a bipolar disorder (fingers crossed - for at least I have been able to write on it!), and by now, I have fairly been able to acclimatize myself with a few poignant repercussions as well.
Published by: Mayank M. Bhandare
Author: Mayank M. Bhandare
Paper ID: V4I3-1349
Paper Status: published
Published: May 15, 2018
Performance evaluation and energy efficiency based on SROLSR in MANET
Mobile Ad Hoc Network (MANET) is formed by a set of wireless mobile hosts that dynamically configure themselves by exploiting their wireless network interfaces without relying on any fixed infrastructure. Mobile hosts used in MANET supports the roles that are ensured by the powerful fixed infrastructure in traditional networks. This is a challenging task for the mobile hosts that have limited resources such as processing power, storage, and energy. Malicious and selfish behaviors are a serious threat against routing in delay/disruption tolerant networks (DTNs). A probabilistic misbehavior detection scheme, for secure DTN routing toward Fine-grained analysis closely coupled with the concept of trust. Nodes may misbehave either because they are malicious or because they are selfish. The approach is used in parallel to generate the list of misbehaving nodes. For efficient Improvement of the scheme, we correlate detection probability with a node’s reputation. The analysis and simulation results demonstrate the Effectiveness and efficiency of the proposed scheme using SR-OLSR Protocol. Mobile ad hoc networks (MANET) rely on the cooperation of all the participating nodes. The SR-OLSR protocol itself incurs a low checking overhead, Every node computes the trust of the observed neighbors. These trust values are passed on to analyzer function which is mapped into different classes. The resulting classes show the trust levels of the observed nodes using per hop distance and measurement and also we achieve security to send the message from the source to destination.
Published by: Arunadevi. D
Author: Arunadevi. D
Paper ID: V4I3-1345
Paper Status: published
Published: May 15, 2018