Manuscripts

Recent Papers

Research Paper

Survey on network smartphone on disaster recovery

In the time of disaster, the information exchange between rescue helpers and survivors is difficult and the wired connection and cellular network are also collapsed during the disaster and it also not possible to reconstruct the network to communicate with the helpers and survivors. In this paper, we discussed various technologies to help trapped survivors to reach the rescue workers in the wireless network even in the absence of cellular network using the wireless ad-hoc network, opportunistic network and using smartphones which uses wifi interface to reach survivors and rescue workers. One is using directional antenna for ad-hoc networks using inter-vehicular communication for quick reconstruction of network, and the other is opportunistic network using ad-hoc communication presents HELPME a self levelling opnet application deployed in smartphones which uses ad-hoc network for communication over wifi in the time of disaster and it forms a dynamic matching of its neighboring nodes to transmit the information with the help of ad-hoc network. And the third one is using team phone a network application for disaster recovery. Team phone consists of two components The messaging system between rescue worker and trapped survivors integrate cellular networking, ad-hoc networking, and opportunistic networking, and enables proper communication.and the self-rescue system that groups the smartphones of trapped survivors together, energy-efficiently discovers nearby messaging nodes and sends out emergency messages including location and position information.  

Published by: Darshan Kumar S B, Dr. Sheela S V

Author: Darshan Kumar S B

Paper ID: V4I2-1354

Paper Status: published

Published: March 31, 2018

Full Details
Research Paper

A survey on the security of multimedia contents with dual level encryption

The cloud computing offers high quantifiability, confidentiality and therefore the simple accessibility of the knowledge over the net. tho' the traditional secret writing system provides security, the foremost involved issue is that the regular aspect channel attack for capturing ones sensitive and confidential image, audio and video. A malicious Virtual Machine (VM) besides a targeted VM will extract all info. Thus, this paper implements a double stage secret writing rule for the multimedia system content security exploitation random key generation approach. the primary stage encrypted multimedia system content into ciphertext -l employing a trigonal public key. The ciphertext-l is once more encrypted within the cloud exploitation a willy-nilly generated uneven non-public key. If anyone gets the ciphertext, he couldn't extract the secret writing key to recover the multimedia system contents. Low complexness and simple implementation create the planned rule wide applicable safeguard within the cloud computing.  

Published by: Swapnali Anil Balshankar, Harshada Pacharane, Vicky Bobade, Gauri Gherde, Ujwala Gaikwad

Author: Swapnali Anil Balshankar

Paper ID: V4I2-1443

Paper Status: published

Published: March 31, 2018

Full Details
Research Paper

Adaptive M-SVM classification model qualified indoor scene images with hybrid feature selection approach

The results of the proposed model have been obtained in the form of the various performance parameters of statistical errors, precision, recall, F1-measure and overall accuracy. The proposed model has clearly outperformed the existing models in the terms of the overall accuracy. The proposed model improvement has been recorded higher than ten percent for all of the evaluated parameters against the existing models based upon SURF, FREAK, etc.

Published by: Gagandeep Singh, Sonika Jindal

Author: Gagandeep Singh

Paper ID: V4I2-1526

Paper Status: published

Published: March 31, 2018

Full Details
Review Paper

A multiple object analysis for indoor scene recognition with scene adaptive classification

In proposed work, will be using an adaptive object analysis on the basis of its characteristics. These characteristics of the objects will help the computer vision based applications to differentiate between the objects of similar color and similar shape. This will empower the computer vision based applications to detect the objects with more accuracy, which will also help it to detect the type of the surroundings, whether it’s a home, office.  

Published by: Gagandeep Singh, Sonika Jindal

Author: Gagandeep Singh

Paper ID: V4I2-1524

Paper Status: published

Published: March 31, 2018

Full Details
Review Paper

Automation of exam hall seating arrangement

This paper is an android application is used to save time and allow numbers of students view their individual seating arrangement. The project keeps tracking various details such the Students details, Examination date, Subject details, hall and Seat details. Students can view their seating arrangement anywhere with their help of mobile phones. Admin login with his own id and password. The admin can able to update the information and files. Admin can check updated details if necessary. This android project to create an own database, which contains a data like overall student register numbers, number of halls available, number of desks available in a particular hall and subject code. Examination hall seating arrangement will be allocated automatically by using PHP and JAVA languages. To create a condition for fetching data from the database. If the condition is then allocated automatically. Each hall contains two different departments with different subject codes.  

Published by: Sowmiya .S, Sivakumar. V, Kalaimathi .M, Kavitha .S. V

Author: Sowmiya .S

Paper ID: V4I2-1468

Paper Status: published

Published: March 31, 2018

Full Details
Research Paper

A study of environmental degradation and its problems

The United Nations International strategy for disaster reduction defines environmental as the reductions of the capacity of the environment to meet social and ecological objectives and need environment degradation is of many types. When natural habitats are destroyed or natural resources are depleted, the environment is degraded. Environmental change and human health, a special section of world resources 1998-99 in this report describe how preventable illnesses and premature deaths are still occurring in very large number. If vast improvement is made in human health, millions of people will be living longer, healthier lives than ever before. In these poorest regions of the world an estimated 11 million children, or about one in five, will not live to see their fifty birthday, primarily because of environment-related diseases. Child mortality is larger than the combined populations of Norway and Switzerland, and mostly due to malaria, acute respiratory infections or diarrhea illnesses that are largely preventable.  

Published by: Dr. Neera Singh

Author: Dr. Neera Singh

Paper ID: V4I2-1452

Paper Status: published

Published: March 30, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X