Manuscripts

Recent Papers

Real Time Sign Language Recognition Systems: A Review

Alerts give a good watching, handy to fully grasp contrasting option to utilising a product unit like a console, mouse, and joystick brutal computer collaboration (HCI).Accordingly, the major factor of movement acknowledgment logical experiences are to fabricate a framework that can admire and have an understanding of targeted human motions naturally and make use of them to move on data (i.E., for informative use as in verbal exchange by way of gestures) or to control gadgets (at the finish of the day., manipulative utilize like in controlling robots without a physical contact). Possibly a standout amongst probably the most important standards for signal dialect acknowledgment is that normal signaling be bolstered by using the acknowledgment motor in order that a person can interface with the framework with none barriers. Considering a grouping of indicators is most likely mixed with co enunciation and inadvertent tendencies, these non-gestural developments must be disposed of from an information video before the recognizable proof of every motion in the association.

Published by: Sumit Sandhu, Sonia khatri

Author: Sumit Sandhu

Paper ID: V2I5-1182

Paper Status: published

Published: October 22, 2016

Full Details

Review on Encrypt the Text by MD5 and RSA in Client Cloud Approach

Cloud computing is one of the emerging technology which is showing continuous advancement in the field of networking. Cloud computing is defined by National Institute of Standards and Technology (NIST)[1] as a model for enabling ubiquitous, on demand network access to a shared pool of configuration computing resources (e.g. computer networks, servers, storage, applications and services) ,which can be rapidly provisioned and release with minimal management effort. It is gaining popularity in all the areas. But still by far cloud computing sharing is behind one expected because of the security concerns (unauthorized access, modification or denial of services, etc). In this research paper, the proposed work plan is to eliminate security concerns using cryptographic algorithm and hashing algorithm.

Published by: Adviti Chauhan, Jyoti Gupta

Author: Adviti Chauhan

Paper ID: V2I5-1181

Paper Status: published

Published: October 22, 2016

Full Details

Review on Detection of Gray Hole Attack in MANET

Mobile ad-hoc network(MANET) is a wireless network which has robust infrastructure. Mobile nodes can be used to form MANET. Arbitrary topology can be formed by connecting nodes with each other randomly. When source want to transfer packets to destination, a path being discovered for transmission. Sometime packet get dropped in path due to malicious node. Attack by malicious node is called gray hole attack. In this paper we detect the gray hole attack in the MANET. The detection and removal of the malicious node depends on the calculated probability of each node.

Published by: Geetanjali, Anupama Kumari

Author: Geetanjali

Paper ID: V2I5-1180

Paper Status: published

Published: October 22, 2016

Full Details

Hazards Reporting based on Real-Time Field Data Collection using Personal Mobile Phone.

Hazard is a situation or thing that has the potential to harm people's, property or the environment. Hazardous area cause many people health. So we must to prevent from it. We are develop hazard reporting system to prevent from hazard prob- lem. Important task of the Reporting is Data Collection.The Geo-spatial Data is used to Indicate the Data along with the geographic component.This means that the data set have loca- tion information tied to them such as geographical data in the form of coordinates,address,city,or ZIP code.User report to the organization by using the same data and organization solve that problem.

Published by: Jayanti Khutwad, Bindu Konde, Ashvini Deokate, Prof A.A.Kadam

Author: Jayanti Khutwad

Paper ID: V2I5-1179

Paper Status: published

Published: October 22, 2016

Full Details

Efficient Fingerprint Recognition using Wavelet Transforms

Fingerprints have long been used as a reliable biometric feature for private identification. Fingerprint classification refers to the matter of assignment fingerprints to 1 of many prespecified categories. Automatic classification may be used as a pre-processing step for fingerprint matching, reducing matching time and complexness by narrowing the search area to a set of a usually large info. Automatic fingerprint identification is one among the foremost vital biometric technologies. so as to expeditiously match fingerprints during a massive info, Associate in Nursing classification theme is critical. Fingerprint classification, that refers to assignment a fingerprint image into variety of pre-specified categories, provides a possible classification mechanism. In observe, but massive intra-class and tiny interclass variations in world pattern configuration and poor quality of fingerprint pictures build the classification drawback terribly tough. A fingerprint classification algorithmic program needs a sturdy feature extractor that ought to be ready to reliable extract salient options from input pictures

Published by: Jaspreet Kaur, Navleen Kaur

Author: Jaspreet Kaur

Paper ID: V2I5-1178

Paper Status: published

Published: October 21, 2016

Full Details

Performance Comparison of Ad-hoc Routing Protocols

Specially appointed systems are known by heaps of details like multi-jump remote availability, much of the time change system topology and the requirement for productive element steering conventions that assumes an essential part. This paper introduces an execution examination among two responsive steering conventions for versatile specially appointed systems: Dynamic Source Routing (DSR), Ad Hoc On interest separation Vector (AODV).Both conventions were recreated utilizing the apparatus ns-2 and were look at as far as parcel misfortune proportion, end to end delay, with portable hubs changing number of hubs and velocity. Reproduction uncovered that in spite of the fact that DSR splendidly scales to little systems among low hub speeds, AODV is favored because of its more productive utilization of data transfer capacity.

Published by: Sheetal

Author: Sheetal

Paper ID: V2I5-1176

Paper Status: published

Published: October 20, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X