Manuscripts

Recent Papers

Research Paper

Anomaly Detection Using Machine Learning

In this day and age of a plethora of information, the importance of information security cannot be emphasized enough. Any threat to confidentiality, integrity or availability of information must be taken seriously. Ignoring such threats can have serious consequences, like misappropriation, modification or encryption of data. Vulnerabilities in information security are a tempting target for malware. Malware are malicious scripts or software, including computer viruses, worms, Trojan-horses, ransomware, spyware, adware, etc. The traditional way of detecting an advanced malware or threat compromise uses a signature-based antivirus. This approach, however, is not foolproof and can be bypassed. The signature-based approach relies on a known list of signatures. The list of signatures is not perfect and also does not contain previously unseen malware signatures. The proposed system uses operational intelligence tools and machine learning to monitor usual user behavior. This is done by collecting system activities like event logs, sysinternal, etc. Once the system learns normal behavior patterns, it can detect anomalies that may be caused by malware. Thus, unlike signature-based approach, the proposed system can detect previously unseen malware as well.

Published by: Yash Shahani, Vedant Yadav, Aditya Subramanian, Karan Chhabria, Vidya Zope

Author: Yash Shahani

Paper ID: V4I1-1392

Paper Status: published

Published: February 23, 2018

Full Details
Review Paper

Conversion of Demolished Construction Waste into Recycled Aggregates

Urbanization and industrialization go hand in hand affecting the change in lifestyle of an individual. Demolition of old and non-economical structures and construction of new is the basic cycle humans are following.  This is affecting the environment at an adverse rate due to wastage of recyclable materials and production of new raw materials. The construction industry is one of the key producers of non-recyclable waste so it is our duty to find ways and methods to use the demolished waste from the construction industry and convert it into a usable form. Demolished concrete is one of the key ingredients of this waste industry but with some mechanical procedures and alterations, this can be converted into a usable form sufficient to be used in the construction process. This paper provides an overview of the mechanical process used for converting the demolished concrete into usable concrete and admixtures used for making this concrete more efficient.

Published by: Akash M Shukla, Ankit Pedawal, Gaurav Pandey, Sooraj Regunta

Author: Akash M Shukla

Paper ID: V4I1-1371

Paper Status: published

Published: February 21, 2018

Full Details
Survey Report

Survey on Location Tracker for Fishermen using GPS

There are many risks that can occur for fishermen as sea border and location cannot be easily identifiable. To ensure the safety of the fishermen, the location should be tracked. It is also better when the border crossing intimation is also given to the fisherman and coastal guards for tracking even if any problem happens to fishermen the data sent to coastal guards can take the necessary actions can taken. The better indication is when the boat nearer to the restricted zone the location information should be sent to fishermen. The system should contain the better accuracy in determination of location, easily replaceable and the maintenance cost should be low.

Published by: Spoorthi T Shetty, Swetha M, Vishnupriya S, Niranjana A

Author: Spoorthi T Shetty

Paper ID: V4I1-1384

Paper Status: published

Published: February 21, 2018

Full Details
Research Paper

Design and Validation of a Mass Tuned Dynamic Vibration Absorber

This paper presents the effectiveness of a new cantilever dynamic vibration absorber in reducing the vibrations of a primary system at resonance. The designed absorber is tested for cantilever and simply supported conditions of the beam with motor/rotor assembly to create harmonic excitations. The setup is tested numerically using modal and harmonic response analyses of ANSYS and further validated by building a prototype and conducting experiments using vibration analyzer. The proposed system was found to considerably reduce the vibrations in the primary system when the vibration absorber was tuned to the operating frequency.

Published by: Vaibhav Jairam Ghodge, A. P. Bhattu, S. B. Patil

Author: Vaibhav Jairam Ghodge

Paper ID: V4I1-1403

Paper Status: published

Published: February 21, 2018

Full Details
Project Report

Privacy and Security on Twitter: A Semantic Network Analysis

As the technologies advance rapidly, the privacy and the security have become one of top concern in the digital communication in this age. Thus, we are trying to understand and drawing a conceptual view depend on how is the people view privacy and security in this era which has been changed and still changing and expanding as the technology developed. In order to analyze and see what it the person's apprehension regarding the view of the privacy and security, we have used one of the widespread social media which is Twitter. Based on the Twitter’s users view we have constructed our project and draw our conclusions. We have collected more than 125000 tweets to analysis them based on different aspects. This project mainly focused on privacy and security then it takes into account the Health Information Portability and Accountability Act (HIPAA), Facebook, and online keywords. After collecting the tweets, we have analyzed them using AutoMap tool. In the initial analysis, AutoMap extracts all of the words which have been occurring in the tweets along with each word frequency. As a second step of the analysis, we have filtered out all about numbers, symbols, and non-relative wording. Then, we took the most frequent work and did discourse analysis to see how these words are emerging. Based on discourse analysis, we have wiped out some of the words that appear in different context. From that point, we have drawn our discussion and conclusions. Based on our analysis, the privacy is beyond the information control and access. The people have changed their view regarding the privacy with the advancement of the technology. The Twitter’s users get concerned about their Facebook and Google personal data privacy. Particularly, when the Facebook has posted the new term and privacy policy, the users become more worried about their privacy. In addition, Twitter users’ were discussing the privacy and security of the mobile device to further assist the people who plan to buy in the near further. Moreover, they have anxiety regarding different acts and lows that are developed, and whether these laws will protect them or the laws will work against them.

Published by: Mansour A. Alshaikhsaleh, Dr. Abdullah, Faisal, Prof. Mohamed Zohdy, Ahmad Alshammari

Author: Mansour A. Alshaikhsaleh

Paper ID: V4I1-1385

Paper Status: published

Published: February 21, 2018

Full Details
Research Paper

Use of Surf and Genetic Algorithm for Content Based Image Retrieval System

Content-based image retrieval (CBIR) has most important research area in the last couple of years. Image retrieval is the system used for searching out the desired features of a query image. The main purpose of CBIR method is to obtain the accurate and fast results. In this paper, an Query image is retrieved from the database with high accuracy. This going through various steps namely, Pre-processing, feature extraction, Optimization and matching. In pre-processing noise is removed by using filtering and color conversion is performed on the query image. For extracting features SURF (Speedup Robust Feature) descriptor is used. It is the enhanced form of SIFT (Scale Invariant Feature transform) and more speedy than it. For optimization Genetic algorithm (GA) is used which improves the features of the extracted image. For matching Euclidian formula is used. It measures the similarity between the extracted feature and the database image. The simulation is carried out in MATLAB simulator tool with an accuracy of approximately 98 %.

Published by: Sumit Sharma, Kavita

Author: Sumit Sharma

Paper ID: V4I1-1342

Paper Status: published

Published: February 21, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X