Main Menu
Home
About Us
Call For Paper
Chief Patron
Patron
Advisory Board
International Editorial Board
Technical Advisors
Associate Editor
Reviewers
Conference Organizers
Generate E-Certificate
Past Issue
Past Issue Other
Special Issue
Indexing and Listing
Authors Guidelines
Download Paper Template
Publication Fee
Online Payment
Review Process
Copyright Form
Publication Ethics
Contact Us
Admin
Disclaimer
Generate E-Certificate
Past Issue
Past Issue Other
Special Issue
Indexing and Listing
Authors Guidelines
Download Paper Template
Publication Fee
Online Payment
Review Process
Copyright Form
Publication Ethics
Contact Us
Admin
Disclaimer
Date/Time
News and Events
Create & Edit Pdf
Serene Docs
Published Books
Browse Books
Dates for Author
Call for PapersFebruary 2026
Volume 16, Issue 02
Send manuscripts to:
[email protected]
For UGC CARE, Scopus and Web of Science Publication:
Whatsapp: +1 469-844-0367
India Helpline
Indexing
ISSN: 2320-0294 |
Volume 7, Issue 4 (April 2018 )
| PARTICULAR | Page No. |
|
Dr.C.Sekar
Abstract: A graph with vertex set V is said to have a prime labeling if its vertices are labeled with distinct integers 1,2,…|V| such that for edge 𝒙𝒚 the labels assigned to x and y are relatively prime . A graph which admits prime labeling is called a prime graph. In this paper, we investigated prime labeling for Chavatal related graphs Download full Lenght Paper...... |
433-443 |
|
Tigilu Mitiku, Mukhdeep Singh Manshahia
Abstract: Energy consumption increases gradually due to the rapid advancement in the industrial sectors; increase in population and also due to fast growing of urbanization. The conventional energy sources which include power plants using fossil fuels are widely used as a source of energy all over the world so far. As these conventional energy sources used nowadays are coming to an end in a near future, the sustainability of power supplies is one of the most challenging issues that the world faces today. To overcome the increasing power demand and depletion of conventional energy sources around the world, the use of clean, non-polluting and renewable energy is very important. Global warming and environmental pollution are major challenges to the earth’s safety and security. Wind energy has become a best alternative of traditional fossil fuel power plants with the successful operation of multi-megawatt sized wind turbines. The fluctuating and unpredictable nature of wind is the major problem in harnessing wind energy. So, it is very important to improve the operation of wind turbine for its safety and better efficiency of wind energy harvesting system. Several methods have been used to improve the quality and efficiency of wind power system. An Adaptive Neuro-Fuzzy Inference System (ANFIS) model was used by many researchers to control factors affecting wind and predict the power output from wind to increase the efficiency of the WEHS. This review paper focuses on wind energy systems to develop a model to produce optimal energy components for a typical rural community for minimizing the total net present cost of the system through the life time of the project. Download full Lenght Paper...... |
444-467 |
|
P.K.Manjhi
Abstract: In this paper we forward a method of construction of conference matrices of orders 30 by suitable combination of adjacency matrices of suitable coherent configuration. Download full Lenght Paper...... |
468-474 |
|
Harjinder Singh,Mr.Ashwani Kumar
Abstract: Smartphones have increasingly become a part of our daily life. Further, in recent years, we have witnessed a rapid increase in the use of social networking applications as an online communication method on mobile devices. One of the most popular apps which everybody seems to be using is WhatsApp messenger. People share a huge amount of data, including their personal and sensitive information using this particular App. However, as with any other App, WhatsApp leaves a significant trail of artifacts on the mobile device on which it is used. This information is stored at many locations on the phone. The same can be used by any investigating forensic agency to reconstruct the event timeline of WhatsApp. This paper attempts to analyze the forensic artifacts left by WhatsApp in one of its key artifact file called “WhatsApp.log” Download full Lenght Paper...... |
475-486 |
|
N.Elumalai,R.Anuradha
Abstract: We define the double mersenne meet matrix and double mersenne join matrices separately.Also, we divide the double mersenne join matrices by the double mersenne meet matrices.We calculate the determinant,trace and inverse of double Mersenne Meet Matrices by using arithmetical functions. Download full Lenght Paper...... |
487-494 |
|
Pooja Rana
Abstract: Background/Objectives:Component-based software engineering (CBSE) is a process of reusing pre- built software components to built a new software. CBSE is based on good software engineering design principles. CBSE is based on black box technique, in which the implementation of components are hidden in nature and the communication between the components is through well-defined interfaces. Component platforms are shared and help in reducing the development costs. To determine the complexity of a software different software metrics are used. It is predetermined that for fineness in software complexity the cohesion should be high and coupling should be low. In our approach we are determining the reusable components of a software system and enhancing the accuracy of the methods for determining them. Method : an attempt has been made to present an analytical evaluation on cohesion metrics which was proposed by Rana and Chillar [1] against Weyuker‟s[2] properties and an attempt has also been made to present the results of empirical evaluation based on the case study. Java Beans has been used for validating the Metrics. Findings: The Result of the present study is quite satisfactory and may further help in estimation of the complexity of components. In our approach we have found the reusable components of a software system by not only finding the dependencies between the different elements of a single package but also the finding dependencies between the elements of different packages of an already existing project that makes our approach different from existing study. Download full Lenght Paper...... |
495-505 |
|
Singh Vandana,Kaur Amarjeet,Gupta N. C.
Abstract: Water crisis is a universal phenomenon now, though its severity varies from place to place. This has led to the substitution of the freshwater by alternate sources. Considering the ease of treatment and round the year supply of Greywater, it is one of the most promising alternatives. Therefore, in this paper an attempt has been made to present a case study for reuse of treated Greywater to encourage planners and researchers for optimal utilization of available resources. Paper suggests that though the probability of microbial contaminants in Greywater is low, however its presence must not only be investigated but should also the risk associated with it in reuse should be eliminated in planning reuse. In addition to this, paper gives a series of steps to popularize the reuse of Greywater in India. The authors understand the public sentiments associated with GW and thus advices to improve social acceptance of treated Greywater through awareness. Download full Lenght Paper...... |
506-512 |
|
Dhir Singh,Hemlata Sahay,Naresh Kumar
Abstract: In a competitive market, suppliers may offer different trade credit periods with different predetermined quantities to boost in their sales and to encourage retailers to order more quantities. In this article, we consider an inventory system with non-instantaneous deteriorating items, where the supplier provides the retailer with various trade credits linked to order quantity and the demand rate is considered to be deterministic depending on the selling price of the product. First, we develop a partial backlogged inventory model to identify the optimal pricing and ordering policies for retailer under various situations of trade credits. Numerical examples are presented to illustrate the proposed model. Finally, a sensitivity analysis is conducted to study the effects of main parameter values on the optimal solution and to draw managerial insights Download full Lenght Paper...... |
513-528 |
|
Kotagiri Srihari
Abstract: Effects of Soret, Dufour and Chemical reaction on unsteady free-convection flow of an electrically conducting viscous incompressible fluid along an infinite vertical porous plat subjected to a time dependant transpiration velocity with Hall Effect is analyzed. A magnetic field is applied perpendicular to the flow. The governing equations in non-dimensional form are solved using implicit finite difference method. Graphical results for velocity, temperature and concentration fields and tabular values of shearing stresses are presented and discussed. It is found that main and secondary velocity of the fluid and shearing stresses increase with the increasing values of Soret and Dufour. Soret and Dufour effects greatly influence the concentration and temperature profiles in the thermal and solutal boundary layers. Download full Lenght Paper...... |
529-548 |
|
Priti Bali
Abstract: Nowadays workplace mobility has improved productivity and collaboration but it has also exposed the confidential data of organizations to unknown risks called cyber attacks. In today’s connected world, the risk of cyber attacks is on the rise and it is becoming very difficult to ensure cyberspace security. Cyberspace is expanding day-by-day. Usage of smart phones, apps and tablets has expanded the surface of cyberspace for protection as well as attack. Cyber defenders have to protect this expanded surface and cyber attackers target this expanded surface. AI systems can process the huge amount of data generated through this expanded surface in an efficient and quick manner. Evolution of smart devices facilitates professional as well as personal activities. This evolution also leads to increase in cyber crimes. This situation sounds alarmist and should be handled properly because ubiquity and anonymity features of cyberspace make it highly vulnerable to intrusions and cyber attacks. Embedded intelligence is required in all the smart devices and computer networks to combat against evolving cyber attacks. Traditional tools such as sensors, detectors etc. are not sufficient for the protection of cyberspace. Advanced automated tools such as AI systems that are capable of monitoring normal behaviors and detecting abnormal ones must be used to strengthen cyberspace security. Hence, AI is a transformative technology for securing cyberspace. But each revolution has a bright as well as dark side, hence whether AI is a boon or threat in the field of cyberspace security is debatable as AI systems are being used by cyberspace defenders as well as cyberspace attackers. Download full Lenght Paper...... |
549-560 |
|
R.K.Pandey,N.R.Roy
Abstract: Non-linear optical properties in recent times has attracted a number of research workers as it developed new techniques novel methods to provide information‟s about electronic properties of atoms/molecules. New semiconducting properties are being explored. One of the observed non –linear processes of matter in interaction with radiation is two – photon absorption process. The superposition principle in quantum mechanics admits of a rotation of the Hilbert space for the system. Making use of this fact a geometrical representation of the schrodinger equation for two photon absorption process is by treating the Hamiltonian and the Density matrix of the system as vectors in aspace spanned by angular momentum matrices for J=1 as basis vectors. This description specializes the general three level problem into a problem of equi spaced levels with proper matrix elements between the two pairs of levels . Download full Lenght Paper...... |
561-572 |
|
R. V. Waghmare,S. B. Kiwne
Abstract: In this paper we have presented mathematical introduction of Sediment Oxygen Demand, Photosynthesis & Respiration and Solids Deposition process as a transformation process, these process are very important in the study of water quality, which are constituent-specific, which affect all water quality parameters. The major factors affecting SOD are temperature, oxygen concentration at the sediment water interface (available oxygen), makeup of the biological community, organic and physical characteristics of the sediment, current velocity over the sediments, and chemistry of the interstitial water. In Photosynthesis & Respiration, the net algal oxygen production minus consumption is simulated by QUAL-II, and in solid deposition process, settling is enhanced by flocculation and hindered by ambient turbulence. In rivers and coastal areas, turbulence is often sufficient to distribute the suspended-solids over the entire water depth. Download full Lenght Paper...... |
573-586 |
|
Satyaprakash Sahu
Abstract: Here we study about how to increase winning probability of n person dice game (Ludo) by using repetition. This paper shows that by using of repetition we can see a player can increase his winning probability. Download full Lenght Paper...... |
587-591 |
|
Jerlin Seles M,Mary U
Abstract: In this paper we study the Popped Fibonacci-sum set-graphs, its clique number and the chromatic number. The aforesaid graphs are an extension of the notion of Fibonacci-sum set-graphs to the notion of set-graphs. This paper is an attempt to solve the problem stated in [8]. Download full Lenght Paper...... |
592-596 |
|
PAYAL SAHU1,DEEPTI RAI
Abstract: OFDM is a digital modulation scheme in which a wideband signal is split into a number of narrowband signals. Because the symbol duration of a narrowband signal will be larger than that of a wideband signal, the amount of time dispersion caused by multipath delay spread is reduced. The proposed system consists of a novel FRAT (Finite Radon Transform) based model which enables the communication media to scrutiny the noise and also cater for Inter symbol interference also it has been shown that the said system showed good BER performance as compared to other systems, also as the result will show that the ISI reduction is more in our system also the zero padding pose to be a problem which could be rectified in the times to come Download full Lenght Paper...... |
597-606 |
|
K. Chitra Lekha
Abstract: Data mining technology is applied to fraud detection to ascertain the scam detection model, to depict the process of creating the scam detection model, and then to begin the data model with any classifier. As e-commerce transactions persist to develop, the allied online hoax remains an eye-catching resource of income for fraudsters. This counterfeit activity inflicts a significant financial hammering to merchants, making online fraud detection a prerequisite. The issue of scam detection is concerned with not only confining the fraudulent activities, but also detaining them as rapidly as possible. This relevance is decisive to shrink financial losses. Cyber crimes are a communal pest and rate our society greatly in numerous ways. The investigation of cyber crime cases has very significant role in police enforcement system in any country. This paper presents a comprehensive study on data mining techniques and its responsibility on detection of cyber crimes in real time applications. Data mining robotically sieves through massive quantity of data to uncover known/unknown patterns that fetches out valuable, innovative perceptions and formulate predictions. Data mining which is alienated into two learning skills viz., supervised and unsupervised is engaged to detect fraudulent asserts. Basically these techniques are used for fraud detection in many sectors such as health , insurance, E-commerce and it goes on Download full Lenght Paper...... |
607-613 |
|
Chanchal,Divya Puri,Lakhvinder Kaur
Abstract: The objective of present study was to develop namkeen incorporated with composite papaya seed flour (PSF). The idea behind using papaya seeds was to re-utilize the waste, which is generally discarded. Papaya seeds being rich in protein can be explored as an ingredient in making protein enriched products. The namkeen prepared from composite PSF was baked, keeping in mind the ill effects of fried foods and the rising concern of people over lifestyle disorders. Two namkeen samples (i.e. test sample and control sample) were prepared. The test namkeen sample contained PSF and gram flour while the control sample contained buckwheat flour and gram flour. The namkeen was standardized using different formulations. On collating the sensory evaluation test results, it was observed that the taste, texture and the overall acceptability mean scores differed significantly (p<0.05). The mean acceptability scores for Sample-A (namkeen sample with PSF) was more acceptable than control sample (namkeen without PSF). Namkeen prepared from composite PSF could be a boon to savoury industry by adding variety to the shelf. More research could be done so as to mask the dark colour of PSF in the product by processes like frying etc. Download full Lenght Paper...... |
614-623 |
|
vaishali suryavanshi,Deepti Rai
Abstract: Digital Image Processing is a promising area of research in the fields of electronics and communication engineering, consumer and entertainment electronics, control and instrumentation, biomedical instrumentation, remote sensing, robotics and computer vision and computer aided manufacturing (CAM). For a meaningful and useful processing such as image segmentation and object recognition, and to have very good visual display in applications like television, photo-phone, etc., the acquired image signal must be deblurred and made noise free. The deblurring and noise suppression (filtering) come under a common class of image processing tasks known as image restoration. Download full Lenght Paper...... |
624-631 |
|
Thangaraj Beaula1,Beulah Maiya
Abstract: In this paper the fuzzy ward continuity with some other kinds of continuities are investigated in 2- fuzzy 2-anti normed linear space. Further some theorems are developed. It turns out that uniform limit of fuzzy ward continuous functions is again fuzzy ward continuous. Download full Lenght Paper...... |
634-639 |
|
A.J. Chaudhari,R.B. Waghulade
Abstract: Generally, three terminal fixed voltage regulators are designed to provide fixed value of regulated voltages such as 5V,9V,12V etc. They are significant parts in most of the solid-state power supplies. In this paper we tried to simulate very thought-provoking applications other than regular ones. Mainly we emphasised on clipping and clamping applications using these regulators. For simulation and analyses of the circuits 5Spice software is used. Download full Lenght Paper...... |
640-647 |
|
Dr. Anshu Murarka1,Dr. Deepankar Sharma
Abstract: In this study, the authors have considered a summer air conditioning system for a place in hot and dry weather. The authors have computed the availability and profit function for this system. Since the system under consideration is of Non-Markovian nature, the author has been used supplementary variables to convert this into Markovian. Probability considerations and limiting procedure have been used for mathematical formulations of the system. This mathematical model has been solved by using Laplace transform, to obtain probabilities of various transition states depicted in fig-1(b). Reliability, availability and M.T.T.F. for considered system have been obtained. Graphical illustration followed by a numerical computation has also been appended at last to highlight important results of this study. Download full Lenght Paper...... |
648-657 |
|
Vikas Kumar,Dr. Rajeev Jha
Abstract: This paperdiscus theMarkov’s inequality and zero set polynomial factors mappings application. Markov's inequality is a sure indicator of the subordinate standard of a polynomial in terms of the degree and standard of this polynomial. It has numerous interesting applications in estimation theory, value theory theory and examination (for example, Sobolev's inequalities or Whitney-type expansion problems). One of the reasons for this research is to give an answer to an old problem, among which Baran and Plesniak, and the invariance of Markov inequality under polynomial mappings (polynomial images). We also address the issue of protecting Markov's inequality when we take polynomial pre-images. In conclusion, we give an appropriate condition for a subset of a Markov set to be a Markov set.. Download full Lenght Paper...... |
658-664 |
|
T.D.N.S.S.Sarveswara Rao
Abstract: Optical multiplexing is the art of combining multiple optical signals into one to make full use of the immense bandwidth potential of an optical channel. It can perform additional roles like providing redundancy, supporting advanced topologies, reducing hardware and cost, etc. The idea is to divide the huge bandwidth of optical fiber into individual channels of lower bandwidth, so that multiple access with lower-speed electronics is achieved. This chapter focuses on one of the most common and important optical multiplexing techniques, wavelength division multiplexing (WDM). The chapter begins with a quick historical account of the origin of optical communication and its exponential growth following the invention of erbium-doped fiber amplifier (EDFA) leading to the widespread adoption of WDM. Alternate multiplexing schemes are also briefly discussed, including time-division multiplexing (TDM), space-division multiplexing (SDM), etc. A typical WDM link and its components are then discussed with special focus on WDM Mux/demultiplexer (DeMux). Further, certain challenges in this field are addressed along with some potential solutions. The paper highlighting some features and Advancement of Bandwidth Optimization and Wavelength Division Multiplexing Of Plastic Optical Fiber in LANs Download full Lenght Paper...... |
665-672 |
|
Mukesh Kumar Pathak
Abstract: It is possible to find the derivative of a function by constraining a line in such a way that the line is allowed to move as a tangent to that function. Then the equation of the slope of that tangent line gives the derivative equation of the function Download full Lenght Paper...... |
673-677 |
|
Prem Prakash,Praveen Joshi
Abstract: Paeonia emodiWall.exRoyle (family paeoniaceae) is commonly known as Himalayan Peony, or Chandra in Garhwal regions of Western Himalaya. The species is used to treat diarrhea, fever, stomach ache, backbone ache, colic and also maintaining the diabetic level the Himalayan region. The present study was conducted to find the germination percentage with respect to appropriate chemical treatment and understand the nature of seed dormancy in the laboratory conditions.Thiourea and Gibberellic acid (GA3)with different concentration viz. 50 ppm, 100 ppm, 250 ppm, 500 ppm and 1000 ppm were used for breaking dormancy. In each treatment three replicates with 25 seeds were used.Maximum (81.33±1.33%) seed germination was found in seeds treated with Thiourea concentration of 50 ppm, followed by 100 ppm (76.00±2.31%), 250 ppm (61.33±3.53%), 500 ppm (58.67±4.81%) and 1000 ppm (44.00±4.62%).Minimum Mean Germination Time (29.89±0.43 days) were obtained for the seeds treated with Thiourea concentration of 50 ppm, followed by 100 ppm (31.33±0.65 days), 250 ppm (32.97±0.52 days), 500 ppm (33.89±0.26 days), while 1000 ppm concentration revealed the maximum (35.08±0.72 days) MGT for Thiourea treatment. Therefore, study revealed that Thiourea impact was more effective in the stimulating seed germination and reducing Mean Germination Time. The outcomes of the present study would be helpful to the local people, plant nursery growers and scientists to identify and propagation of P. emodi in large scale. Download full Lenght Paper...... |
678-688 |
|
Education system
Abstract: The Education system in India is full of distinctions and appears in poor condition. It doesn’t provide the development of moral and artistic perfection, and the overall growth of children in Bihar and north India. Both private and government education system has less function in this regard. Overall social structure plays a huge role in moral development of children. In some districts of Bihar social structure is dominated by the market economy. Private schools and coaching centers have become more market-oriented and commercial places, in other way it has become big business hubs and factories to find certain unachieved future goals through competition, ignoring the ancient wisdom of Gurukul traditions. Government school systems are also very less practical in this regard. Contemporary India has seen enormous changes in the field of political economy. Advancement of science and technology has made it possible to some extend but many other factors are responsible for the change of economy that reflects in society and culture as well. Such change clearly reflects in the markets of districts of Bhojpur and Buxar in Bihar, where old roads have been repaired, new malls, supermarket, and shops has opened up, flyovers have made and hospitals and new restaurants are visible in local markets. In this process of urbanization, the population has boomed and new markets and businesses have taken place.Society in Bihar is considered backward according to economic indicators. Poverty, unemployment and corruption, and similar social issues raid the social structure. However, very rich culture and tradition are deeply rooted in the Bihar regions. Its glorious past also had given the rise of great thinkers, intellectuals, and spiritual leaders such as Buddha and Mahavira. But recently, certain economic development reflects and shows transition among middle classes. Education and morality is one very significant example of change in the society. The state government has also implemented some policies and laws which has been less practical. Jal, Jangal, Hariyali and Beti Bacho-Beti Padhyo and many others policies are very less practical at ground levels. These policies of development have done very little changes in peoples’s life though certain social awareness is created and propagated. Download full Lenght Paper...... |
689-694 |
|
PROF. JAY PRAKASH TIWARI
Abstract: Many early college mathematics students have acquired abilities before developing a fundamental knowledge of the topic, which was identified as a source of worry. Despite the fact that the concept of function is heavily emphasized in intermediate mathematics, a trial study conducted at a prestigious Academic institution discovered that a significant percentage of students with excellent university entry scores have a poor knowledge of it. Despite the fact that most pupils were familiar with functional families, many have yet to provide a requires effective or decide whether a certain graph or rule reflected a function; and many were just unable to establish proper connections among function graphs and tables of values. Download full Lenght Paper...... |
695-705 |
|
DR. RENU SINGHAL
Abstract: L-Histidine forms 1:2 complex with Zn (II) and has been isolated in the solid state from aqueous solution. Thermogravimetry supports the probable formula of the complex, assigned on the basis of elemental analysis. Various kinetic parameters such as activation energy, order of decomposition, frequency factor and activation entropy have been evaluated. The values of activation energy and order of decomposition calculated by two methods2,3are in reasonable agreement with each other. Download full Lenght Paper...... |
706-709 |
|
Dr. Anjula Jain
Abstract: Snails are known to serve as an intermediate host for several species of larval trematodes. Snails were studied to understand the reduction of fecundity of the hosts which is a characteristic commonly exhibited in parasitic infections. Snails were collected during the monsoon period of July, August and September from various water bodies like ponds, pools, ditches, lake reservoirs, rivers (Garh Ganga) and crop fields in and around the Meerut region. They were collected in laboratory containers and beakers and maintained in aquariums and fed ad libitum with hydrilla. Approximately 150 snails were collected with different species like Bellamya bengalensis, Lymnaea luteola and Lymnaea acuminata in the Meerut region. The occurrence of the larval trematode parasite was found. The effect of parasitism on reproductive system of snails under study revealed that the gonadial tissue was invaded by cercariae. The damage to the gonadial tissue resulted in the lower fecundity rate of the host. The larval trematodes affect the reproductive system, the egg laying capacity, i.e., the fecundity of the host will also be affected. Download full Lenght Paper...... |
689-697 |
|
Ravneet Kaur
Abstract: Use of Computers in education and research has completely changed the way of things were made before. For example, a lecture to the students or the presentation of a paper to a congress are completely different with respect to those only a few decades ago, when blackboard, transparencies or photographic slides were used. There are many positive aspects of using computers, for example making a talk very attractive. In this paper an analysis is presented of advantages and disadvantages I experienced and of consequences of using computers Download full Lenght Paper...... |
698-702 |
|
Dipti Malhotra,Kamal Upreti
Abstract: Cloud computing has got a lot of scope in educational institutions, a service model suitable for an educational institution is a key to make cloud computing successful and acceptable in a broader manner by educational establishments. There is certainly a research gap which needs to be filled i.e. a clear understanding of the features of a typical educational establishment (especially a higher education institute, University, or a professional college) and then using this knowledge to device and design a service model that would be more appropriate and beneficial to educational establishments. Cloud implementations have gradually increased in higher education institutions during the past several years where a good number of educational institutions are availing of one or other cloud service. In a few of the higher education institutions, the deployment of private cloud is also seen in the past few years. The cloud implementation however needs to be appropriate concerning the requirements of educational institutions especially in context to the above facts and developments and considering the future requirements of higher education institutions. This research study intends to achieve the satisfaction level of teachers and students of higher education institutes Download full Lenght Paper...... |
703-710 |

