Manuscripts

Recent Papers

Research Paper

Enabling Technologies, Protocols, and Applications: A Detailed Survey on IoT

The Internet of things is used as a parasol catch word for combining and covering the major aspects related to the extension of the Internet and Web into the phenomenon, by means of vast positioning of spatially distributed devices that contains embedded identification, sensing and/or actuation capabilities. Internet of Things (IoT) consists of a large number of connected objects that are communicating with each other. To discuss the Internet of things in wider sense and precedence on protocols, technologies, and application along with related issues. The main factor IoT concept is the integration of different technologies. The IoT is empowered by the hottest developments in RFID, smart sensors, communication technologies, and Internet protocols. The primary hypothesis is to have smart sensor dealing directly to deliver a class of applications without any external or human participation. Recently development in the Internet and smartphone and machine-to-machine technologies can be considered first phase of the IoT. In the platinum should continue to raise IoT is expected to be one of the main hubs between various technologies by connecting smart physical objects together and allow different applications in support of smart decision making. In this paper, we discuss IoT architecture and the technical aspect that relate to IoT. Then, give overview about IoT technologies, protocols and applications and related issues with the comparison of other survey papers. The survey aims to help other researchers in delving into the details of such techniques by going through their classification and comparison. The classification has been done based on the inherent features of this authentication technique such as being distributed vs. centralized, flat vs. hierarchical, and more others.

Published by: Gururaj Kulkarni, S. H Manoor, P. V Mitragotri

Author: Gururaj Kulkarni

Paper ID: V3I2-1544

Paper Status: published

Published: April 26, 2017

Full Details

A Survey on Current Issues Prevailing in Public Transport System

Public Transport system (PTS) is an important and an essential part of urban and rural dwellers. PTS enables a smooth mobility of people and goods. Without PTS no city can improve the standard of living of the people and can make progress. As population continue to increase, many problems arise which make the PTS an unreliable and inefficient service provider. So, providing a good PTS is required in today’s world. There is a need to check and know the causes and solutions for effective transport system. Objective of the paper is to identify the major problems that make PTS an unreliable system and suggest possible solutions to overcome the issues.

Published by: Mohankumari K. V, Anitha L, Apsara S, Rashmi G A, Jyothi B

Author: Mohankumari K. V

Paper ID: V3I2-1541

Paper Status: published

Published: April 26, 2017

Full Details

Design, Analysis and Comparing for Different Cylinder Head of C.I. Engine

The main aim of this work is to predict the design performance based on stress/strain and Behaviour of cylinder head under various operating conditions. The effects of various engineering operating conditions such as combustion gas maximum internal pressure, thermal stress behaviour and fatigue stress of the cylinder head have been analysed. In any working engine, the piston and the cylinder head are the most vulnerable members due to increased mechanical and thermal loadings. The mechanical loading is mainly due to gas pressure in the gas chamber and its magnitude can be judged in terms of peak pressure. Thermal loading is due to temperature and heat transfer conditions in the piston surface cylinder liner and cylinder head. The geometry modeling was carried out using popular computer-aided engineering tools, CATIA V5R19 and the analysis was carried out using a finite element analysis (FEA) software package ANSYS. The result can be used to determine the quality of design as well as identify areas which require further improvement, and also the maximum stresses is found not exceeding material strength of cylinder head. In this work, we have also designed and compare two types of cylinder heads and formulated the importance of fins.The main aim of this work is to predict the design performance based on stress/strain and Behaviour of cylinder head under various operating conditions. The effects of various engineering operating conditions such as combustion gas maximum internal pressure, thermal stress behaviour and fatigue stress of the cylinder head have been analysed. In any working engine, the piston and the cylinder head are the most vulnerable members due to increased mechanical and thermal loadings. The mechanical loading is mainly due to gas pressure in the gas chamber and its magnitude can be judged in terms of peak pressure. Thermal loading is due to temperature and heat transfer conditions in the piston surface cylinder liner and cylinder head. The geometry modelling was carried out using popular computer-aided engineering tools, CATIA V5R19 and the analysis was carried out using a finite element analysis (FEA) software package ANSYS. The result can be used to determine the quality of design as well as identify areas which require further improvement, and also the maximum stresses is found not exceeding material strength of cylinder head. In this work, we have also designed and compare two types of cylinder heads and formulated the importance of fins.

Published by: Kunal S. Nagrik, Nawaz M. Merchant, Mukesh S. Rajpurohit, Swanand S. Pachpore

Author: Kunal S. Nagrik

Paper ID: V3I2-1539

Paper Status: published

Published: April 26, 2017

Full Details

A Novel Technique for Path Completion in Web Usage Mining

World Wide Web is a huge repository of web pages and links. The Web mining field encompasses a wide array of issues, primarily aimed at deriving actionable knowledge from the Web, and includes researchers from information retrieval, database technologies, and artificial intelligence. The growth of web is tremendous as approximately one million pages are added daily. Users’ accesses are recorded in web logs. Most data used for mining is collected from Web servers, clients, proxy servers, or server databases, all of which generate noisy data. Because Web mining is sensitive to noise, data cleaning methods are necessary. Web usage mining consists of three phases preprocessing, pattern discovery and pattern analysis. Web log data is usually noisy and ambiguous and data preprocessing system for web usage mining is an important process. A data processioning includes data cleaning, user identification, session identification and path completion. The inexact data in web access log are mainly caused by local caching and proxy servers which are used to improve performance and minimize network traffic. The proposed method uses path completion algorithm to preprocess the data. The proposed path completion algorithm efficiently appends the lost information and improves the consistency of access data for further web usage mining calculations.

Published by: Padmapriya .R, D. Maheswari

Author: Padmapriya .R

Paper ID: V3I2-1536

Paper Status: published

Published: April 26, 2017

Full Details

An Innovation in Palm Vein Authentication for Biometric Privacy Preservation

In real-time security applications, the image processing, and computer vision plays a major part in determining the whole operation. The main advantages of biometric privacy are, to keep the information safe and secure, and access the information from anywhere at any time. In some traditional cases, the security systems are processed by passwords, personal identification numbers, and identification cards. In these cases, several problems occur due to the card was stolen and password hacking. Hence, to avoid such limitations it is necessary to implement the digital biometric data units in terms of face, iris, palm, fingerprints and voice. Among these data, the palm is considered in this work to explore the possibility of cryptography. Initially, the palm images are selected and stored in the database to cross-check the identity of private images which is considered as input, then the enrollment is made by comparing the public host images. The image is authenticated with the help of database with images. Finally, the decision is taken by matching the originally targeted palm image.

Published by: M. Suganya, Dr. S. Suganya

Author: M. Suganya

Paper ID: V3I2-1530

Paper Status: published

Published: April 26, 2017

Full Details

Generalised Paranormal Operators

An operator T ∈B(H) is said to be generalized P-paranormal if ‖|T|^p U |T|^p x ‖‖x‖≥1/M^p ‖|T|^p x‖^2 for all x∈H, p > 0, and M > 0, where U is the partial isometry appeared in the polar decomposition T=U|T| of T. The aim of this note is to obtain some structure theorem for a class of generalized P-paranormal operators. Exactly we will give some conditions which are generalization of concepts of generalized paranormal operators.

Published by: N. Sivakumar, S. Angelin Abirani

Author: N. Sivakumar

Paper ID: V3I2-1528

Paper Status: published

Published: April 26, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X