International Journal of Students' Research in Technology & Management, Vol 3 (1) January 2015
1. COMPARISON OF VARIOUS FILTERING TECHNIQUES USED FOR REMOVING HIGH FREQUENCY NOISE IN ECG SIGNAL
Priya Krishnamurthy, N.Swethaanjali and M.Arthi Bala Lakshmi
Abstract: About 8.8 million males and 6.6 million females alive today have been affected by Coronary Heart Disease (CHD). Of these 5.0 million males and 2.6 million females have been diagnosed with Myocardial Infarction (MI), according to the statistics updated by the American Heart Association (AHA) in 2013 . Early diagnosis and appropriate treatment of CHD is essential to minify the mortality rate due to CHD. This accentuates the need for an accurate and reliable equipment for monitoring the health conditions of hearts of human beings to treat the disease in advance before it brings about an irrevocable change in their body. One of the equipment’s used for this purpose is an Electrocardiograph, and the acquired signal is called an ECG signal. The acquisition process of this signal is hindered by a number of artifacts and removal of these artifacts is of paramount importance before the ECG signal could be used for disease diagnosis purpose.
Keywords: Phishing, Vishing, SMSishing, Social Engineering, ZeKo
2. PHISHING: AN EVOLVING THREAT
Keyur Shah, Tanushree Shenvi, Karan Desai, Reshad Asrani, and Varun Jain
Abstract: Phishing is one of the most common attacks used to extract sensitive information for malicious use. It is one of the easiest ways to extract confidential data on a large-scale. A fraudulent website/e-mail which looks very similar to the original is setup to trap the victim to give away confidential information. A large population of internet users still lacks knowledge to avoid phishing. When the phishing attacks are complimented with social engineering skills, the success rate is increased. Along with the progress of technology, phishing techniques have evolved encroaching upon newer communication mediums like voice and text messages giving rise to newer specialized forms of Phishing called - Vishing and SMSishing. In this paper, we also cover how to avoid being a victim of these attacks. One of the best promising methods to avoid Phishing is Zero Knowledge Authentication -ZeKo which immunes the user from phishing attacks.
Keywords: Phishing, Vishing, SMSishing, Social Engineering, ZeKo
3. DESIGN AND FABRICATION OF WEIGHT SENSING SYSTEM FOR PRODUCTION LINE
Abdulrahman Al Siyabi, Dinesh keloth Kaithari
Abstract: Most of industries in our area are still using old techniques to measure the quality of their products. These old ways of measuring the quality are not applicable for every product and the checking is only by random samples. This method may affect the company if more products are out of production tolerance. So, this project is to design and fabricate weight sensing system that can be used in a production line in which the system can accept a specific weight to go in production line and reject others. The idea of this project comes after seeing the effects of going out of weight tolerance for some products that require quality. So, this report will screen the previous works and technologies which are related to the topic in literature review chapter to get benefits from them and avoid mistakes. No specific literature was identified with complete design of automatic weight sensing system. Personal interaction with the Reem batteries and power appliances results in the generation of the idea for designing and developing light weight sensing system. This project has faced some challenges which are: To identify a sensor that is having more sensitivity for the light weight and the method to amplify its low signal. These challenges have been solved by searching from different sources to get the best weight sensor and the suitable amplifier.
Keywords: Weight sensor; amplifier; Microcontroller; light weight; production line.
4. DUST GENERATION AND ITS SEPARATION METHOD
Hitesh Kumar, Karan Bhatia, Vaibhav Purswani
Abstract: Dust control in underground as well as open pit mines has been an area of intense research and study. Dust controlling by dust capturing or dust consolidation and using appropriate method for different causes of dust generation has been the concern of this paper. Dust is generated mainly in every activity of mine from drilling to transportation to using any modern mechanization for ore extraction. Dust generation can cause less visibility more accidents, breathing problem, affects agriculture and vegetation. Various methods deployed for its control and separation does not impact its originator rather reduces its percentage in mine air. Wet drilling, water spraying, ventilation, dust collector and air flow to control the generation of dust have proven profound impact to control dust. This paper embeds the detailed causes of dust, how dust can be reduced in mine air and what can be done to prevent it, if possible.
5. THE COAL CHALLENGE IN INDIA
Asish Kumar Sahu, Vikash Kumar Saxena
Abstract: Coal contributes over half of India’s primary commercial energy and is likely to remain India’s most important source of energy for the coming decade or two. However, extraction and usage of coal leads to severe environmental problems within India and also contributes to climate change inducing green-house gas emissions. But the challenges of coal in India go beyond this, as the sector is plagued with governance challenges, inefficiency and allegations of corruption. This article takes a holistic view of the Indian coal sector. It summarizes the challenges produced by coal as well as the challenges that affect the sector. Furthermore, the article provides a glimpse into the perspectives of an energy future for the country with a reduced role for coal.
6. TEACHER’S PROFESSIONAL DEVELOPMENT THROUGH ICT RESOURCES & GADGETS
Sushma Rani and Ajay Surana
Abstract: Today there are many global investments in ICT to improve teaching-learning process in various educational institutions that has been initiated by many governments. Still we are lagging behind somewhat in ICT adoption or integration in teaching-learning rather than the investments in ICT infrastructure, equipments and resources. As the teaching without innovations and technology is meaningless, thus in order to facilitate teaching-learning process adoption of technology is must. And that adoption is possible by enriching the teacher education with latest technology and innovations, strengthening the pre-service and in-service teacher education programs and by the professional development of teacher incorporating technological based-gadgets in educational system.
Keywords: Professional Development (PD), ICT, Resources and Gadgets.