Manuscripts

Recent Papers

Research Paper

A Novel Technique to Remove Duplicacy of Files and Encrypt the Data Files Symmetrically In Cloud Environment

With the help of cloud computing users are allowed to store, retrieve and share their data from anywhere. Cloud computing provides sharing of hardware, software and infrastructural storage to different users at a time. Encryption of cloud is a need of new technology because clouds have data of different clients so encryption on cloud is essential for data security but cloud computation is also important so to reduce duplicacy is one more parameter , which is reduce by digest in this paper and encryption with the help of AES and blowfish.

Published by: Sandeep Kaur

Author: Sandeep Kaur

Paper ID: V3I3-1353

Paper Status: published

Published: May 25, 2017

Full Details

Replace of Asphalt with Waste Polythene in Bitumen Road

In India consumption of Plastic is 15 million tons up to 2015 and is set to be the third largest consumer of plastics in the world. India is a top 20 number country that dump maximum plastic in the ocean. As per a survey conducted by Central Pollution Control Board (CPCB) in 60 cities of the country the quantum of plastic waste generation is estimated to be 15,342.6 tons per day. Plastic is a non-biodegradable material and researchers found that the material can remain on earth for 4500 years without degradation

Published by: Mr. Yakub Ansari, Prof. F. I Chavan, Prof. M. Husain, Prof. Vajed Shaikh

Author: Mr. Yakub Ansari

Paper ID: V3I3-1352

Paper Status: published

Published: May 25, 2017

Full Details

Effect of Plastic Grocery Bags on Environment and Its Reuse

Plastic, one of the most preferred materials in today's industrial world is posing serious threat to environment and consumer's health in many direct and indirect ways.

Published by: Mr. Yakub Ansari, Prof. F. I Chavan, Prof. M. Husain

Author: Mr. Yakub Ansari

Paper ID: V3I3-1351

Paper Status: published

Published: May 25, 2017

Full Details
Review Paper

Review on Detection of Hypoglycaemia by Machine Learning Approach

The doctor concluded related to an indication that someone has the potential against diabetes mellitus (DM) the architecture of the proposed method is designed. With the data obtained from the authorities in the laboratory, the model has been adjusted. Split points and using the Gina index the best split points are identified in this paper. By identifying false split points to minimize the calculation of Gini indices a method is proposed and Gaussian fuzzy function is used because the clinical data sets are not crisp,In this paper review the different method of diabetes classification

Published by: Sannia, Shehnaz, Abhishek Bhardwaj

Author: Sannia

Paper ID: V3I3-1346

Paper Status: published

Published: May 25, 2017

Full Details

Development of Speed- Flow Curve for Arterial Road

Increasing vehicular growth requires adequate transportation facilities. For designing any road facility speed-flow relation is essential to get required designing speed. As urban roads carries different types of vehicles having different dimensions, shape, speed etc. Two arterial roads of Jamnagar city are selected for data collection. Traffic composition affects traffic flow parameters. In this paper speed-flow curves are plotted using collected field data from peak and non-peak hour. Space mean speed and classified volume counts are used for speed-flow relation.

Published by: Mayank Kanani, R. G Motwani, H. K Dave

Author: Mayank Kanani

Paper ID: V3I3-1342

Paper Status: published

Published: May 25, 2017

Full Details

Online Secure Payment System Using Shared Images

As a quick growth in online shopping is seen in recent time throughout the world. By increase in online shopping, many type of frauds like phishing, credit or debit card fraud are takes place. For the security of customer this paper has presents a new approach for providing limited information only that is necessary for fund transfer during online shopping there by safeguarding users data and increasing users confidence and preventing identity theft. The method uses combined application of stegnography and visual cryptography for this purpose

Published by: Bhupendra Singh, Prof. Monali Deshmuk, Zawed Ansari, Akshit Pandita

Author: Bhupendra Singh

Paper ID: V3I3-1336

Paper Status: published

Published: May 25, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X