Manuscripts

Recent Papers

Survey Report

Fake currency detection using image processing

Currency duplication also is known as counterfeit currency is a vulnerable threat to Economy.it is now a common phenomenon due to advanced printing and scanning technology. Bangladesh has been facing the serious problem by increasing rate of fake note in the market.to get rid of this problem various fake not detection methods are available around the world and most of these are hardware based and costly.in the present paper an automated image-based technique is described for the detection of fake banknotes in Bangladesh. Security features of banknote such as the watermark, micro-printing, and hologram etc., are extracted from the banknote images and then detection is performed using “Mathlab tools”  

Published by: D. Swetha, M. Artheeshwari, J. Ishwarya, Kavitha

Author: D. Swetha

Paper ID: V4I2-1529

Paper Status: published

Published: April 3, 2018

Full Details
Research Paper

Blood bank venture framework

Blood Bank Venture Framework web application keeps up the Online library of blood donors in a city/state or region. There are times when Doctors and Blood bank venture need to confront the trouble in finding the blood among Donors at the appropriate time. Blood donation venture framework has endeavored to give the required response by taking upon itself the process of gathering Blood donors across the country for the cure of those who are in need. At any moment the patients who are in need can apply for a donation through the web application and connect with the right donor. Based on humanity, anybody can enlist as a blood donor. The donors are accepted only after their blood sample tests and also based on their medical history. The general population who are non-benefactors can likewise assume an essential part of the proposed framework. Simply by registering their blood type, they can help in identifying the proportion donor of blood types needed in an area. Blood Bank Venture Framework (BBVF) is a web application program that is intended to store, process, retrieve and analyze information concerned with the administrative and inventory management within a blood bank. This project aims at maintaining all the information pertaining to blood donors, different blood groups available in each blood bank and help them manage in a better way. The aim is to provide transparency in this field, make the process of obtaining blood from a blood bank hassle free and corruption free and make the system of blood bank management effective.

Published by: Vikrant Kumar Kaushik, Arjun Kumar Gupta, Ashish Kumar, Abhishek Prasad, Brindha

Author: Vikrant Kumar Kaushik

Paper ID: V4I2-1538

Paper Status: published

Published: April 3, 2018

Full Details
Research Paper

Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IOV paradigm

In this paper, we focus on the security and privacy-preserving by developing a dual authentication scheme for IoV according to its different scenarios. First, the OBU self-generates an anonymous identity and temporary encryption key to open an authentication session. Second, the legitimacy of the vehicle's real and anonymous identity can be verified by trust authority (TA). After that, the vehicle's reputation is evaluated according to its history interactive behavior and the session key for V2V can be finally established. There are three major advantages, including privacy-preserving and security enhancement without a burden of key management in the condition of acceptable time delay range, introducing trust evaluation into authentication protocol, as well as considering the vehicle behavior attributes in the new reputation evaluation method.

Published by: Aishwarya .R, Tanuja .A, Vineela .Y, Dhanlakshmi .R

Author: Aishwarya .R

Paper ID: V4I2-1543

Paper Status: published

Published: April 3, 2018

Full Details
Research Paper

Theatre environment management

The basis of this project was to take the entire environment of a theatre, taking all the individual parts and making online counterparts for it and thus converting the entire experience into a virtual one. The aesthetically pleasing yet quick response online website aims to replace the ticketing counters of the theatres. The project aims to reduce the bustle and rush that we obtain in the ticketing counters and the various facilities. The communication between the managers and employees will be converted into a formal one, which is absent in the present theatre environment. The ease of booking will add to the bonus for the customers. With the newly introduced digital economy in India using web services for one of the biggest upcoming industry is a great option for start-ups. The convenience and ease of booking the ticket from home will attract more customers to book the tickets. Overall the online booking is a boost to overall entertainment and service industry.  

Published by: Kartik Sindhu, Prathyaksh S Kaushik, Shubham Goel, Prabu S

Author: Kartik Sindhu

Paper ID: V4I2-1546

Paper Status: published

Published: April 3, 2018

Full Details
Research Paper

Fog computing: Mitigating insider data theft attacks in the cloud

Cloud computing guarantees to considerably amendment the manner we tend to use computers and access and store our personal and business data. With this new computing and communications, paradigms arise new information security challenges. Existing information protection mechanisms like secret writing have unsuccessful in preventing information larceny attacks, particularly those perpetrated by an associate degree business executive to the cloud supplier. we tend to propose a special approach for securing information within the cloud victimization offensive decoy technology. We tend to monitor information access within the cloud and observe abnormal information access patterns. once unauthorized access is suspected and so verified victimization challenge queries, we tend to launch a misinformation attack by returning giant amounts of decoy data to the assailant. This protects against the misuse of the user’s real information. Experiments conducted in a very native file setting offer proof that this approach might offer unprecedented levels of user information security in a very Cloud atmosphere.  

Published by: Ankit Choudhary, Tushar Nikam, Rajkumar Singh, Yogita Kawle, Abhijit Tambe

Author: Ankit Choudhary

Paper ID: V4I2-1562

Paper Status: published

Published: April 3, 2018

Full Details
Thesis

Study on random order testing

Software testing is very highly used and very expensive. The main function of the software testing is to find the defects. Not all software defects are caused by coding errors. One common source of expensive defects is requirement gaps, e.g. unrecognized requirements that result in errors of omission by the program designer. Requirement gaps can often be non-functional requirements such as testability, scalability, maintainability, usability, performance, and security. A programmer makes an error (mistake), which results in a defect (fault, bug) in the software source code. If this defect is executed, in certain situations the system will produce wrong results, causing a failure. So there are different test cycles in which a project can be tested. In this project I have taken a shopping cart website, the testing has been done to each test case multiple times to check the number of errors got in the testing. The duration of the testing is also noted. In totally random order texting all possible ways are also been tested and the successful testing output without any errors is performed. Normal testing for the same site is done simultaneously and comparing the difference and time consuming and the maximum number of errors obtained.  

Published by: M. Arjhun, John Bruce

Author: M. Arjhun

Paper ID: V4I2-1585

Paper Status: published

Published: April 3, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X