Manuscripts

Recent Papers

Implementation of an Efficient and Robotically Operated Home Automation System Using the Robustness of IOT

With the advancement of Automation technology, life is obtaining less complicated and easier in all aspects. In today’s world, Automatic systems are being most well-liked over the manual system. With the speedy increase within the variety of users of the web over the past decade has created the web a region and parcel of life, and IoT is that the latest and rising web technology. Internet of things may be a growing network of the everyday object-from industrial machine to the commodity which will share data and complete tasks whereas you're busy with alternative activities. Wireless Home Automation system (WHAS) victimization IoT may be a system that uses computers or mobile devices to regulate basic home functions and options mechanically through the web from anyplace round the world, an automatic house is generally referred to as a sensible home. It’s meant to avoid wasting the electrical power and human energy. The house automation system differs from the alternative system by permitting the user to work the system from anyplace round the world through web affiliation. In this paper, we have a tendency to gift a Home Automation system (HAS) victimization raspberry pi that employs the combination of cloud networking, wireless communication, to produce the user with remote of varied lights, fans, and appliances within their home and storing the info within the cloud. The systems can mechanically amendment on the premise of sensors’ information. This technique is meant to be low value and expandable permitting a spread of devices to be controlled.

Published by: Muthubharathi .R, Vigneshkumar .B, Durgalakshmi .K

Author: Muthubharathi .R

Paper ID: V3I3-1317

Paper Status: published

Published: May 18, 2017

Full Details

Cryptography- A Fundamental Tool for Directions of Research Process-An Overview

In Today’s, Digital communications Era sharing of information is increasing significantly. The Information being transmitted is vulnerable to various passive and active attacks. Therefore the information security is one of the most challenging aspects of communication. Cryptography plays an integral role in secure communication and it provides an excellent solution to offer the necessary protection against the Data Intruders. Over a period of time, Data encryption techniques took a massive leap from simple methods too complicated mathematical circulations. In order to achieve secure communications, however still with its complexity erypgraphic algorithms are prone to one or many attacks. Therefore this paper presents a detailed study about the Directions of safety, protection that leads to the Research process. The various symmetric key encryption techniques, its comparison, and the attacks to which they are vulnerable to.

Published by: Dr. V. Venkateswara Rao

Author: Dr. V. Venkateswara Rao

Paper ID: V3I3-1302

Paper Status: published

Published: May 18, 2017

Full Details

Campus Connect : Advanced QR based Identity Card

Educational institution in developing countries is a vast sector and it is expanding rapidly. With the rapid growth of technologies, educational institutions are still lagging behind. For identification of students they still lie on manual handwritten ID card and files. If proper ID card system is introduced then it would be much easier to identify a student and can track his/her progress. Therefore, in this research we implemented advanced using of QR code and student ID generation. We tried level best to make right implementation of QR code with student ID card. Automated student ID had image capturing facility and requirements of an ID and there is no need of hand written ID card. QR code is attached into ID card and student personal details can be found by scanning the QR code with smart phones (downloaded & installed QR reader software). QR code is said to be the next generation of bar code and using QR code with ID card brought positive outcomes. While using software tools, identity cards works fine and suitable for an educational institution as it is free. Thus, ID card will be a perfect use of modern technology in developing countries.

Published by: Muthuraj, Nagashayan, Thejaswi G. N, Rahulkumar Solanki

Author: Muthuraj

Paper ID: V3I3-1295

Paper Status: published

Published: May 18, 2017

Full Details

Effect of BG-II Cotton Hybrids and Non Bt Cotton on Weight of Different Instars of Spodoptera Litura (Fab.)

Laboratory evaluation of eleven Bt cotton cultivars expressing both Cry1Ac and Cry2Ab endotoxins (BT-II) and non Bt cotton on weight of first, second, third and fourth instar larvae of Spodoptera litura. Different plant parts were used i.e. leaves, squares and bolls at 60, 75, 90 and 125 days after sowing of the crop for bioassay. First instar larvae fed on leaves and bolls shows hundred per cent mortality. The final weight of the each instar was reduced at seven days after feeding when compared to non Bt cotton. Reduced in weight was more in case of first, second and third instar than fourth instar larvae. Among leaves, squares and bolls reduction in weight of all four instars was more on leaves followed by squares and bolls

Published by: Ramanjali Thirri, T. V. K Singh

Author: Ramanjali Thirri

Paper ID: V3I3-1273

Paper Status: published

Published: May 18, 2017

Full Details

Prediction of Movie Success for Real World Movie Data Sets

Predicting the success of a movie before its release has far been a huge point of concern for directors and producers alike, especially after they factor in real world data and the occurrence of unforeseen circumstances. Since these entities invest massively in movies, they need some kind of reassurance that the movie will be successful and reap in massive profit in terms of financial returns and credibility. In this paper, we talk about a prediction engine we have implemented that uses classification and fuzzy logic to categorize a movie as successful or not as well as used our own algorithm to calculate a target variable which is the IMDB score of a movie based on various parameters. Our engine has proved to be successful from the technical unit testing performed on it with the use of multiple iterations of input values.

Published by: Abhisht Joshi, Sanjai Pramod, Geetha Mary .A

Author: Abhisht Joshi

Paper ID: V3I3-1228

Paper Status: published

Published: May 18, 2017

Full Details

Performance Comparison of AODV and DYMO Routing Protocols, for Congestion Detection in VANET

Vehicular Ad Hoc Networks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). VANET’s provide communication between vehicles moving on the roads. Congestion detection and control in VANET is essential and necessary for smart ITS in order to avert an accident. Special considerations are required to develop more sophisticated techniques to avoid and detect congestion. The constrained resources of the Wireless Sensor Networks (WSN) must be considered while devising such technique to achieve the maximum throughput. In this paper we have implemented congestion detection in a collision avoidance scenario in two routing protocols, AODV and DYMO, on the basis of sent and received beacons and packets dropped while nodes communicate with each other or the Base Stations. This paper also discusses and compares the advantages/disadvantages of AODV and DYMO based on battery usage, energy used in transmit mode, throughput, message received and sent. The various ways of congestion control are further discussed.

Published by: Rajashree Dutta, Ranjana Thalore

Author: Rajashree Dutta

Paper ID: V3I3-1319

Paper Status: published

Published: May 18, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X