tejas n. athavale, sangram a. nalawade information technology 208-210 67 plight of rape victims with...
TRANSCRIPT
ISSN - 2250 - 1991Volume : 1 Issue : 5 May 2012` 200
www.paripex.inListed in International ISSN Directory, Paris.
Journal for All Subjects
INDEXSr. No. Title Author Subject Page No.
1 Convergence of India Gaap with International GAAP / IFRS
Prof. Kalola Rimaben A. Accountancy 1-3
2 Global Scenario of Business Ethics With Corporate Governance
Prof. Dr.Kishor V. Bhesaniya
Accountancy 4-6
3 VAT & ACCOUNTING Miss. Mira J. Bhanderi Accountancy 7-8
4 Carbon Trading: An Emerging Business Dr. Basanta Khamrui, Dilip Kumar Karak
Commerce 9-11
5 Developments in Indian Non Life Insurance Industry Ms.Kiran Sood, Ms.Supriya Tandon
Commerce 12-14
6 Parameters And Costs Influencing Transportation Decisions In Small Manufacturing Firms
Vipul Chalotra,Prof Neetu Andotra
Commerce 15-17
7 Foreign Trade Policy of India (2009-14) Dr. M. K. MARU Commerce 18-20
8 “A Comparative Analysis on Profitability of Selected Petroleum Industries”
Dr. Ramesh A. Dangar Commerce 21-23
9 An Empirical study on Consumer Awareness on Internet Banking in Gujarat
Dr. Vinod K. Ramani Commerce 24-26
10 Study of Factors Affecting HNIs’ Preferences for their Banks in South Mumbai Area
Shri. Arvind A. Dhond Commerce 27-31
11 Promotion mix straregy of jammu and kashmir co-operatives supply and marketing federation limited in jammu district of J&K state
Tarsem Lal Commerce 32-35
12 Intelligent Brain Tumor Tissue Segmentation from Magnetic Resonance Image using forward and backward anisotropic diffusion
S.Nithya Roopa,P. Vasanthi Kumari
Computer Science
36-38
13 Share of Women in Total Family Income – A Two Group Discriminant Analysis
Dr.A.Shyamala Economics 39-41
14 Socio-Economic Evaluation of Shg’s in Bidar District of Karnataka
Dr.Sangappa V. Mamanshetty
Economics 42-44
15 The Development of Chemical and Petrochemicals Industry in Gujarat
Dr.D.G.Ganvit Economics 45-46
16 How Can Primary Teachers Help To Assist The Development Of Positive Self-Esteem In Students Through Their Ordinary Teaching Practice?
Jigar L. Dave Education 47-48
17 Primary Mission Of Colleges Jigar L. Dave Education 49
18 Effectiveness of Readers Theatre on English Reading Comprehension
Ramesh B. Sakhiya Education 50-51
19 The Role of a Computerized Package on EFL Students' Writing Skills
Abdallah Ahmad, Baniabdelrahman, Abdulaziz A. Abanomey
Education 52-57
20 The Use of Team Teaching and its Effect on Saudi EFL Students' English Proficiency
Abdallah Ahmad, Baniabdelrahman, Abdulaziz A. Abanomey
Education 58-63
21 Study and Development of Road Traffic Noise Model Bhavna K. SutharV. R. Gor, A. K. Patel
Engineering 64-66
22 Weather Forecast Using Artificial Neural Network Laxmikant Raskar, Rohit Waghchaure, Md. Danish Raza,Mayuresh Lande
Engineering 67-68
23 Pavement Subgrade Stabilisation with Rice Husk Ash Patil N. L.,Dr. Sanjay Sharma,Dr. Hemant Sood
Engineering 69-71
24 Study of Precipitation and Stream Flow Data- A Case Study of Kim Basin
Prashant A. Ramani Engineering 72-76
25 “Estimation of Revised Capacity for Deo Reservoir of Gujarat, India”
Hiral Shah,N. N. Borad, R. K. Jain
Engineering 77-79
26 Nanotechnology in Cellular Lightweight Concrete Mr. Nakul Shah, Prof. Jayeshkumar Pitroda
Engineering 80-82
27 Plate Load (Model) Test for Bearing Capacity of Layered Deposite
Patel Ankit D., B.R. Dalwadi
Engineering 83-85
28 Effect of Service Bridge on natural frequency of structurally coupled multistory building
Upadhyay Nishith H., Prof. A.N. Desai
Engineering 86-88
29 “Controling the Soil & Land Pollution in Sabarkantha District by Using an App Lication of Remote Sensing and Geographical Information System”
Gaurang J Patel,R.B Khasiya
Engineering 89-91
30 Control The Soil Erosion & Land Pollution By Flood Reduction in The Tapi River,Surat District, Gujarat, India.
Harshad M.Rajgor,K B Khasiya
Engineering 92-95
31 Methodology for managing irrigation canal system with optimum irrigation scheduling for Meshwo irrigation Scheme
Jitendrasinh D. Raol, Roshani A.Patel,Prof S.A.Trivedi
Engineering 96-98
32 Analyis of regional water supply scheme in rural areas (Case Study: Kutch)
Niketa Patel Engineering 99-103
33 Security For Near Field Communication in Cell Phone Biren M Patel, Vijay B Ghadhvi,Mr Ashish Kumar
Engineering 104-106
34 Heterogeneous Traffic Flow Simulation at Urban Roundabout using ‘VISSIM’
Dipti S. Thanki, Asst. Prof. Ashutosh K. Patel
Engineering 107-109
35 Planning of Facilities for Pedestrian Movement in Urban Area: A Case Study of Vadaj Circle, Ahmedabad
Hitesh A. Patel,Pinak. S. Ramanuj
Engineering 110-113
36 Planning for Non-Motorized Transportation Jignesh C.Prajapati, Prof. N.G.Raval
Engineering 114-116
37 Intersection Design for Pedestrians and Cyclist Jignesh C.Prajapati, Prof. N.G.Raval
Engineering 117-120
38 Theoretical Consideration for optimum irrigation scheduling for irrigation Scheme
Jitendrasinh D. Raol, Prof S.A.Trivedi
Engineering 121-124
39 Overall Equipment Effectiveness Measurement and Review of Total Productive Maintenance
Kadiya Pinjal, Navinchandra
Engineering 125-128
40 To Study the Effect Of Stiffness on the Expansion Joint of a Building Subjected to Earthquake Forces
M.D.SHAH, P. G. Patel Engineering 129-132
41 Side Friction and Side Friction Factor (FARIC) In Ahmedabad Road Link
Parmar Dushyant J, Asst. Prof. Ashutosh K. Patel
Engineering 133-134
42 Fiber Reinforced Selfcompacting Concrete Patel Nikunj R,Elizabeth George
Engineering 135-137
43 Modal Analysis of Helical Gear Purusharth J. Patel,D.A. Patel
Engineering 138-140
44 Impact Strength of Ternary Blended Steel fiber Reinforced concrete
Samir M. Gami., D.A.Sinha
Engineering 141-143
45 Identify issues of traffic movement at landside area & remedial measures
Samir P. Mulani,Prof- Naurdin Hajiani
Engineering 144-147
46 Identification of Truck Transportation Issues at a Junction: a case study of Sarkhej Area
Himanshu. B. Shrimali, Prof- Naurdin Hajiani
Engineering 148-152
47 Assessment of Vehicular Carbon Footprint and its Reduction Measures
Chintan Patel,Prof. H.K.Dave
Engineering 153-155
48 Study of Solar Air Heaters with Different Operating Configurations
Ajaypalsinh Gangasinh Barad
Engineering 156-158
49 Traffic Flow Characteristics on Roads of Small Urban Centre
Axay S. Shah,Dr. L.B.Zala
Engineering 159-162
50 Failure in tensile testing on single lap multi-fastener joint with bolted connection
Jagdish N.Prajapati, Dr.Rajula.k.Gujjar, Prof.M.M.Pomal
Engineering 163-167
51 Study Of Infiltration Capacity At Anjar, Kutch Ravi C Ahir, Sagar D Patel
Engineering 168-169
52 Comparison of Temperature-Base Methods For Calculating Reference Evapotranspiration With Standard Penman-Monteith Method
M.R.Popat, S.N.Chavda, B.H.Pandit
Engineering 170-172
53 Electronic customer relationship management: benefits and trend
Tanuja Nair Engineering 173-174
54 VIRTUAL CLASS ROOM USING MOBILE AD-HOC NETWORK
Gaurav Katariya, Yogesh Parkhe, Devendra Patil,Pawan Pawar
Engineering 175-176
55 PARKING EVALUATION: A CASE STUDY OF AMUL DAIRY ROAD ANAND
Jaydipsinh P. Chudasama, Dr. L.B.Zala
Engineering 177-180
56 ENERGY ANALYSIS OF SOLAR AIR HEATER BY USING DIFFERENT TYPES OF ABSORBER PLATES
Vivek B. Patel,Dr. L.B.Zala
Engineering 181-183
57 Effect of Aspect Ratio W/L ,Body Bias ,and supply Voltage (vDD) for NMOS & PMOS transistor.
Rubina Siddiqui, Angeeta Hirwe, Rahul Parulkar
Engineering 184-186
58 Spider diversity of Wan Wild life Sanctuary, Vidharbha , India.
Taktode N.M. Environment 187-188
59 The Initial Human Behavioural Response to Rapid On set Natural Disaster: Earthquake
S.S. Patil, K.L. Karkare, I.B. Ghorade
Environmental Science
189-190
60 Spatio-temporal Distribution of Surface Water for Irrigation in Satara District of Maharashtra: An Analytical Study
Pawar D. H., Jadhav K.R.
Geography 191-193
61 Nagarcha wadh v kushi bhumi upyog badal nanded-vaghan ek abhyas pahani
Prof. Mane Deshmukh R. S., Dr. S. B Rathod
Geography 194-196
62 Socio-Economic and Nutritional Status of Children with Mental Retardation
Dr. S. S. Vijayanchali Home Science 197-199
63 Motivating Employees under Adverse Conditions Dr Alpesh B Joshi Human Resource
200-202
64 “Strategic Human Resource Management” Dr. M. Venkatasubba Reddy, B. Swetha,S. Jaya Krishna
Human Resource Management
203-204
65 Identifying Crosscutting Concerns for Software Requirement Engineering
Velayutham Pavanasam, Chandrasekaran Subramaniam
Information Technology
205-207
66 Gate pass Automation with Image,Barcode reading and Biometrics
Sumant C. Murke,Tejas N. Athavale, Sangram A. Nalawade
Information Technology
208-210
67 Plight of Rape Victims With Special Reference to India Dr. Monica Narang, Richa Sabharwal
Law 211-212
68 Libraries: An Essential Tool for the Advancement of Knowledge Resources & Research in Recent Era
Dr. Umesh Patel Library Science 213-215
69 An Analytic Study of BA/BSc/BCA/BCom Part I General English Syllabus Prescribed by the University of Jammu
Dr. Wajahat Hussain Literature 216-217
70 A Study on Quality of Work Life Dr.N.Thenpandian Management 218-219
71 Best HR Practices Kavita Trivedi Management 220-221
72 A Study on Employee Retention Practices of Automobile Industry in INDIA
Dr.K.Balanaga Gurunathan, Ms. V.Vijayalakshmi
Management 222-224
73 A Study on Innovation for Organizational Excellence in Health Care Industry in a Private Multi-Speciality Organization
Dr. C. Swarnalatha,T.S. Prasanna
Management 225-227
74 “Performance measurement of Top 10 Mutual Funds with the help of Sharpe, Treynor & Jenson Model”
Monal Patel, Dr. Deepak H. Tekwani
Management 228-230
75 Strategic Expansion for Growth A Case Study on Codescape Consultants Pvt Ltd. (Infinite Possibilities)
Akshay Arora,Abhilansh Bhargava, Preeti Sharma
Management 231-232
76 Role Of Education In Innovation For Economic Development - A Case Study
Dr. Ananthapadhmanabha Achar
Management 233-238
77 ROLE OF HR PROFESSIONAL IN DEALING DISCIPLINARY PROCEEDINGS CONSTRUCTIVELY - AN OVERVIEW
C Santhanamani, Dr. N. Panchanatham
Management 239-241
78 Power of Advertising Supriya Tandon Management 242-244
79 Enhancing Employee Engagement: A Need of The Hour Urmila Vikas Patil Management 245-247
80 Role of E-Learning to Enhance Qualities of Physical Education Teachers and Coaches
Gohil Rajendrasinh K. Physical Education
248-250
81 “Eco – Environmental Study on Nutrient Removal Potential of Eichhornia Crassipes from Domestic Wastewater”
D. K. Patel, V. K. Kanungo
Science 251-253
82 Aphasia – a loss of linguistic faculty Dr Alpesh B Joshi Social Sciences 254-256
83 Workaholism – A Modern Day Nuisance Dr Alpesh B Joshi Social Sciences 257-258
84 Vartman me Dalit Varg ki Samasya Dr. H. L. Chavda Sociology 259-260
Volume : 1 | Issue : 5 | May 2012 ISSN - 2250-1991
208 X PARIPEX - INDIAN JOURNAL OF RESEARCH
Research Paper
* Mahatma Society, Plot no. 359, Survey No.: 62+65, Kothrud, Pune:-411029, Maharashtra
** 1,Kaustubh, Shamsunder Soc., Dattawadi, Nr Mhatre Bridge, Pune 411030, Maharashtra
*** Mahatma Society, Plot no. 359, Survey No.: 62+65, Kothrud, Pune:-411029, Maharashtra,
Information Technology
Gate pass Automation with Image,Barcode reading and Biometrics
* Sumant C. Murke ** Tejas N. Athavale*** Sangram A. Nalawade
Keywords : Gate pass, Barcode, Image, Biometrics
An Enterprise Security Software for controlling, monitoring and authorizing visitors in the company. It allows visitor photograph capturing, communication between security and employees, visitor authentication by the visitor, auto forwarding of authorization request in absence of visitor, auto-login facility for the users, gate pass printing with barcode and visitors photograph, current visitors list, out-time posting, visitor history etc. SummaryOur system is proposed to use Bar code generation, Finger printing and Image processing in generation of a gate pass which eliminates the flaws in the existing security systems. These systems are frequently used to complement building or any organization security systems and access control systems. The application is developed successfully and implemented as mentioned above.This system seems to be working fine and successfully. This system can able to provide the proper training set of data and test input for security purposes. The face matched with initial image taken or not is given in the form of picture image if matched on the generated pass.The pass can be of two types one for temporary visitors and another for the permanent (regular) users.
ABSTRACT
1 What is Gate pass automation system?The purpose of this system is to automate and computerize the information and record in the institution or big enterprises. Now-a-days big ventures have number of people working un-der them, it becomes impossible to keep track on every work-er or contractor .Workers might be on daily basis so keeping track on them becomes a hectic problem.
First of all, one card is issued to the person whom you like to give the privilege to enter into your premises or to update the database. The card contains one program and a security code. The security code is generated randomly. This security code is compare with the database that we have and if the security code matches with the security code of the card then you can enter the premises. But, this card and the card reader have some problem and it may lead to the any of the penetra-tion of security.
a. First of all, if the person, to whom the card has been is-sued, can give his card to some other unauthorized per-son or it may be stolen. Before the reporting to higher authority and before blocking the access of that card one may misuse that card.
b. Card may damage or can cause malfunction and in meantime person can’t enter in to premises where there may be some urgency.
To avoid these stuffs we can use a new gadget called “Finger-print Reader” and”Image scanner”. Where the “finger print” and “image” of the authorize person will be taken and store into data storage. Then, at the time of entering the fingerprint of the person will be compared with the fingerprint save in the data storage. This are the more secure and more reliable and expert are thinking that these are the future security applica-tion which will replace the card reader. After which you can
generate a “Barcode” for the given information so as to keep the information more secured and to easily access in large enterprises and ventures.
2 BACKGROUND:To provide security and data inconsistency, data integ-rity, data reliability, one card is issued to the person whom you like to give the privilege to enter into your premises or to update the database. The card contains one program and a security code. The security code is generated ran-domly. This security code is compare with the database that we have and if the security code matches with the se-curity code of the card then you can enter the premises. But, this card and the card reader have some problem and it may lead to the any of the penetration of security. First of all, if the person, to whom the card has been issued, can give his card to some other unauthorized person or it may be stolen. Before the reporting to higher authority and before blocking the access of that card one may misuse that card.
Card may damage or can cause malfunction and in meantime person can’t enter in to premises where there may be some urgency.
To avoid these stuffs we can use a new gadget called “Finger-print Reader” and”Image scanner”. Where the “finger print” and “image” of the authorize person will be taken and store into data storage. Then, at the time of entering the fingerprint of the person will be compared with the fingerprint save in the data storage. This are the more secure and more reliable and expert are thinking that these are the future security applica-tion which will replace the card reader. After which you can generate a “Barcode” for the given information so as to keep the information more secured and to easily access in large enterprises and ventures.
Volume : 1 | Issue : 5 | May 2012 ISSN - 2250-1991
PARIPEX - INDIAN JOURNAL OF RESEARCH X 209
3 FINGERPRINT SCANNER:This device which is used for taking input data from visitors, contractors and employees. It’s not a difficult job for both ad-ministrator and user .User needs to keep his finger on device front glass panel and finger print scanner will take impres-sion of finger within fraction o seconds. It will help to reduce manual efforts of administrator and visitors time of filling the fields related to enquiry form or visitors log in form.
4 INBUILT CAMERA:The system will be loaded with inbuilt front camera. As and when user associated with the system will approach to it the camera will automatically start working on image of user. When system will get satisfactory inputs about user from user form then camera will capture the image of user which will be stored back to the database and associated information about user so retrieved as and when required.
5 Comparison with current working application:Now-a-days security has become a primary purpose for any institute, industries etc.With crime rates up, many residents, industrialist feel uneasy about relying solely on the protection of the law. With continued technological advancements, there is no reason not to look into additional security. A home secu-rity system is a great way to provide extra protection for you home or business. Hence it gave birth to biometrics. But still there is no guarantee of full security as many fake identifica-tion is done; even fake vehicle registration is seen.
So to overcome this problem ConSt softwares has taken the decision to make a gate pass software with kiosk machine ,so we can avoid the entries which is bluff, fake etc.
With the help of our company guide we surveyed with few major companies like secugen ,digital persona ,suprmo etc .We then decided to work with digital persona as their prod-uct was more secured. For our security software we studied few worldwide published papers and decided to refer NSTC papers.
Table of Description:
Table 1
2 System Architecture
Fig 2
The system architecture consists of the following compo-nents:
1. Multiple gates2. Some network connection like LAN, WAN3. Database server4. Terminals
Entry can be made through any gate as all gates will have security personnel to check the visitors and their id’s.
Database server is needed to store the data which is taken from the visitors and retrieve it whenever needed.
Also the terminals are used to transfer messages to adminis-tration or vice versa and for passing the messages some kind of network connection is needed depending on the terminals used.
Modules Used4.1 Bar code Generator
Fig 4
These are the main modules used in GATE PASS AUTOMA-TION.
The modules are stated below:
1. GUI:- In computing, a graphical user interface is a type of user in-terface that allows users to interact with electronic devices with images rather than text commands. GUIs can be used in computers, hand-held devices such as MP3 players, port-able media players or gaming devices, household appliances and office equipment.
A major advantage of GUIs is that they make computer op-eration more intuitive, and thus easier to learn and use. For example, it is much easier for a new user to move a file from one directory to another by dragging its icon with the mouse than by having to remember and type seemingly arcane com-mands to accomplish the same task.
Adding to this intuitiveness of operation is the fact that GUIs generally provide users with immediate, visual feedback about the effect of each action. For example, when a user
Volume : 1 | Issue : 5 | May 2012 ISSN - 2250-1991
210 X PARIPEX - INDIAN JOURNAL OF RESEARCH
deletes an icon representing a file, the icon immediately dis-appears, confirming that the file has been deleted (or at least sent to the trash can).This contrast with the situation for a CLI, in which the user types a delete command (inclusive of the name of the file to be deleted) but receives no automatic feedback indicating that the file has actually been removed.
In addition, GUIs allow users to take full advantage of the powerful multitasking (the ability for multiple programs and/or multiple instances of single programs to run simultane-ously) capabilities of modern operating system by allowing such multiple programs and/or instances to be displayed si-multaneously. The result is a large increase in the flexibility of computer use and a consequent rise in user productivity.
2. Bar code Generator:-Whenever new visitor comes across the system using bar code generator algorithm system creates one barcode to uniquely identify user whenever user log outs the system.
The mapping between visitor information and barcodes is called a symbology. The specification of a symbology in-cludes the encoding of the single digits/characters of the visi-tor name as well as the start and stop markers into bars and space, the size of the quiet zone required to be before and after the barcode as well as the computation of a checksum.
3. Database:This is the most important module. It contains all data regard-ing bar code generated by the system and particular visitor associated with that code. This can be retrieved as when re-quired for data processing and report making.
4 Fingerprint Processing
Fig 5
These are the main modules used in GATE PASS AUTOMA-TION.
AcknowledgementWe would like to thank all the researchers working in this field who in one way or another guided us in achieving on our goal.
ConclusionThe goal of this project has been to use bio-metrics and standard input technology in order to enhance the data re-cording experience. This has been proved to be possible from a technological viewpoint through the proof-of-concept imple-mentation of bio-metrics system. It basically showed that it is possible to create central location and report view of visitor, contractor and employee attendance record as a results of a verification of visitor , employee and contractor by fetching stored information from a DB regarding barcode generated by system, and image captured by inbuilt cameras provided by user machine.
In addition the application is implemented as a barcode gen-erator and repository system that helps admin to create report and navigate through employees, contractors and visitors re-ports and information. The application works on KIOSK ma-chine only since it relies on touch button panel. Future exten-sions may look at work from home options such as working from remote location and attendance will be added accord-ingly hour bases and other service or resources can be avail-able online for user.
REFERENCES
1] D. Maltoni, D. Maio, A. K. Jain, S. Prabhaker, “Handbook of Fingerprint Recognition”, Springer, New York, 2003. | [2] A.C. Weaver, “Biometric authentication”, Computer, 39(2), pp 96-97 (2006). | [3] J. Ortega-Garcia, J. Bigun, D. Reynolds and J.Gonzalez-Rodriguez, “Authentication gets personal with biometrics”, Signal Processing Magazine, IEEE, 21(2), pp 50-62 (2004). | [4] Anil K. Jain, Arun Ross and Salil Prabhakar,” An introduction to biometric recognition”, Circuits and Systems for Video Technology, IEEE Transactions on Volume 14, Issue 1, Jan. 2004 Page(s):4 – 20. | [5] Fakhreddine Karray, Jamil Abou Saleh, Mo Nours Arab and Milad Alemzadeh,, “Multi Modal Biometric Systems: A State of the Art Survey” , Pattern Analysis and Machine Intelligence Laboratory, University of Waterloo, Waterloo, Canada. | [6] Abdulmotaleb El Saddik, Mauricio Orozco, Yednek Asfaw, Shervin Shirmohammadi and Andy Adler “A Novel Biometric System for Identification and Verification of Haptic Users”, Multimedia Communications Research Laboratory (MCRLab) School of Information Technology and Engineering University of Ottawa, Ottawa, Canada. | [7] H. C. Lee and R. E. Gaensslen, “Advances in Fingerprint Technology”, Elsevier, New York. | [8] Sharath Pankanti, Salil Prabhakar, Anil K. Jain, “On the Individuality of Fingerprints”, IEEE transaction on pattern analysis and machine intelligence, vol.24, no.8, august 2002. | [9] Federal Bureau of Investigation, “The Science of Fingerprints: Classification and Uses”, U. S. Government Printing Office, Washington, D. C., 1984. | [10] H. C. Lee and R. E. Gaensslen (eds.), “Advances in Fingerprint Technology”, Second Edition, CRC Press, New York, 2001. [11] K.G.M.S.K. Jayawardana, T.N. Kadurugamuwa, R.G. Rage and S. Radhakrishnan”, Timesheet: An Attendance Tracking System”, Proceedings of the Peradeniya University Research Sessions, Sri Lanka, Vol.13, Part II, 18th December 2008. | [12] Yohei KAWAGUCHI, Tetsuo SHOJI , Weijane LIN ,Koh KAKUSHO , Michihiko MINOH ,“Face Recognition-based Lecture Attendance System”, Department of Intelligence Science and Technology, Graduate School of Informatics, Kyoto University. Academic Center for Computing and Media Studies, Kyoto University
Editor,PARIPEX - Indian Journal Of Research8-A, Banans, Opp. SLU Girls College,New Congres Bhavan, Paldi, Ahmedabad-380006.Contact.: +91-8866003636 E-mail : [email protected]
Printed at Unique Offset, Novatsing Rupam Estate, Opp. Abhay Estate, Tavdipura, Shahibaug, Ahmedabad
Sara Publishing AcademyPARIPEX - Indian Journal Of Research
Journal for All Subjects
International Index JournalFor English, Hindi, Gujarati,
Marathi, Sanskrit