PREVIOUS ISSUES » Volume 6 Issue 3 July-Sep 2018

Volume 6 Issue 3                          July – September 2018

A SIMPLIFIED WAY OF DATABASE MIGRATION FROM RELATIONAL DATABASE MYSQL TO NOSQL DATABASE MONGODB [pp 01-03]

Kuldeep Shukla, Praneet Khare

up more perplexing in the volume (terabyte to petabyte), assortment (organized, un-organized and mixture), and speed (rapid in development). Administration of database (Big Data, so terminology) has turned into the worldwide test. The information gathering is as of now oversaw and misused generally by utilizing regular information administration devices, for example, great social database administration frameworks (RDBMS) or customary ….

A REVIEW ON PRODUCTION DESIGN FOR BATCH PRODUCTION OF MANUAL GROUNDNUT DECORTICATOR [pp 04-07]

Amit Sharma, Dr. Yogesh Agrawal

Abstract- India is one of the largest producers of groundnut in the world. About 7.5 million hectares is put under it annually and the production is about 6 million tonnes. Groundnut kernels are used mostly for producing cooking oil in addition to using them in the form of snacks. The groundnut crop after drying has pods, which need to be shelled for taking the kernel out and it is the kernel of groundnut which is used for human consumption. Decortication involves breaking….

ANALYSIS OF POLYMER FLOW IN THE HOT RUNNERS OF INJECTION MOULD OF CAPS [15-21]

Prabhat Kumar, Arun Patel

Abstract- Injection molding is one of the very widely used manufacturing process for polymer materials due to its high production rate and low process cost. However, polymer parts manufactured through injection molding process are prone to various defects such as geometrical defect, shape related defect and visual defects. All designers work hard to minimize these defects and increase the quality of the molded part to satisfy the end application through the molding process parameters optimization with help of design of experiments (DOE). The main objective of this paper is to study the effect of various injection molding process parameters…

MOULD DESIGN AND MOLD FLOW SIMULATION ANALYSIS OF INJECTION MOLDING OF MEDICAL EQUIPMENT [22-29]

Prabhat Kumar, Arun Patel

Abstract- Optimal setting up of injection molding process variables plays a very important role in controlling the quality of the injection molded products. It is all the most important to control attribute defects like sink marks. Sink marks are basically a “designed in” problem and hence it is to be attended during designs stages. Owing to certain conditions and constraints, sometimes, it is rather ignored

ENSEMBLE PREDICTIVE MODEL FOR DETECTING CREDIT CARD FRAUD IN E-COMMERCE TRANSACTION [30-32]

Swati Patel, Anurag Srivastava, Anand Motwani

Abstract – The models or techniques to assist fraud investigators, for efficient Credit Card Fraud Detection (CCFD), rely on machine learning algorithms. Proposing a predictive model for Credit Card Fraud determination is however mainly exigent due to the highly distributed and imbalanced data and the availability of only few transactions labelled as fraud in overall transactions. To seek out whether the transaction is fraud on E-commerce websites, is role of prediction models. To find….

CHRONIC KIDNEY DISEASE RISK PREDICTION BASED ON MACHINE LEARNING TECHNIQUE USING CLOUD PLATFORM [33-35]

Sourav Ranjan, Vaibhav Patel, Anurag Srivastava

Abstract— In India and all over the world chronic kidney disease (CKD) is an increasing and serious disease impacting public health. The symptoms of CKD are often appearing too late and many patients inevitably face pain and expensive medical treatments. The ultimate treatment is frequent dialysis or Kidney transplant. Early detection of disease through ….

DYNAMIC ANALYSIS AND RUNTIME SECURITY MONITORING IN EMBEDDED ANDROID [35-39]

Venkat Nutalapati

Abstract— As Android increasingly finds its way into embedded systems—ranging from industrial equipment and automotive components to consumer electronics and IoT devices—ensuring robust security has become a pressing concern. This paper provides a thorough review of dynamic analysis and runtime security monitoring techniques specifically tailored for embedded Android environments. Dynamic analysis methods, such as Dynamic Binary Instrumentation (DBI), which allows for real-time monitoring of binary code execution, and sandboxing techniques, which isolate potentially risky operations, are scrutinized for their efficacy in identifying and mitigating vulnerabilities and anomalies during runtime