Manuscripts

Recent Papers

Lexicon Analysis based Automatic News Classification Approach

The news classification approach is the primary approach for the online news portals with the news data sourced from the various portals. The various types of data is received and accepted over the news classification portals. The lexicon analysis plays the key role in the categorization of the news automatically using the automatic news category recognition by analyzing the keyword data extracted from the input image data. The N-gram news analysis approach will be utilized for the purpose of the keyword extraction, which will further undergo the support vector classification. The support vector machine based classification engine analyzes the extracted keywords against the training keyword data and then returns the final decision upon the detected category. The proposed model is aimed at improving the overall performance of the existing models , which will be measured on the basis of precision, recall, etc.

Published by: Kamaldeep Kaur, Maninder Kaur

Author: Kamaldeep Kaur

Paper ID: V2I4-1175

Paper Status: published

Published: August 1, 2016

Full Details

A Survey over the Critical Performance Analytical Study of the MANET Routing Protocols (AODV & TORA)

The mobile ad-hoc network (MANET) is the ad-hoc technology for the automatic connectivity of the nodes in the network cluster. The MANETs are considered as the infrastructure less technology, which uses the peer-to-peer connectivity mechanism for the establishment of the inter-links between the network nodes. The MANET data is propagated over the paths established through the routing algorithms. There are several routing algorithms, which are primarily segmented in the two major groups, reactive and proactive. The reactive networks are designed to query the path when its required, whereas the proactive routing protocol constructs the pre-computed route based routing table, which is utilized to propagate the data over the pre-derived links/routes. In this paper, the major routing protocols have been evaluated for their performance under the distributed denial of service (DDoS) attacks. The advance on-demand distance vector (AODV) and temporally ordered routing algorithm (TORA) protocols, which are considered as one of the best protocols. This paper focuses upon the assessment of the best routing protocol under the DDoS attack over the MANETs. The security and vulnerability analysis of the routing protocols plays the vital role in the security enhancement of the aimed routing protocols. The security evaluation has been based upon the targeted protocols based upon the various factors.

Published by: Manju, Mrs Maninder kaur

Author: Manju

Paper ID: V2I4-1174

Paper Status: published

Published: August 1, 2016

Full Details

Review of Brain Tumour Segmentation Approaches

Brain image segmentation is one of the most important parts of clinical diagnostic tools. Brain images mostly contain noise, in homogeneity and sometimes deviation. Therefore, accurate segmentation of brain images is a very difficult task. However, the process of accurate segmentation of these images is very important and crucial for a correct diagnosis by clinical tools. We presented a review of the methods used in brain segmentation. Reproducible segmentation and characterization of abnormalities are not straightforward. In the past, many researchers in the field of medical imaging and soft computing have made significant survey in the field of brain tumour segmentation

Published by: Nagampreet Kaur, Natasha Sharma

Author: Nagampreet Kaur

Paper ID: V2I4-1173

Paper Status: published

Published: July 30, 2016

Full Details

Ethanol: A Clean Fuel

Curiosity in producing ethanol from biomass is an incentive attempt for sustainable transportation. Ethanol is a colorless, slightly odoured and a nontoxic liquid produced from plants, and is formed by the fermentation of carbohydrates in the presence of yeast. It is also prepared from sorghum, corns, potato wastes, rice straw, corn fiber and wheat. A biofuel forms low green house gases, when burned compared to other conventional fuels. It is a substitute to fossil fuel which allows for fuel safety and security for many countries where there is less oil reserves. It is made from plants and other agricultural products through biological process rather than the geological process, which is involved in the formation of coal and petroleum. Biofuel is widely used as transportation fuels. Ethanol is considered a biofuel, and is widely used in some countries like U.S and Brazil. In this study, we studied the rising temperature of ethanol, diesel, and kerosene at a fixed point of time and found that ethanol as highest rising temperature compared to kerosene and diesel. It was also observed that the ethanol doesn’t produce any smoke while burning compared to diesel and kerosene which makes it an excellent alternative and clean fuel.

Published by: Samarth Bhardwaj

Author: Samarth Bhardwaj

Paper ID: V2I4-1172

Paper Status: published

Published: July 30, 2016

Full Details

Review of Different Approaches in Mammography

Breast cancer screening remains a subject of intense and, at times, passionate debate. Mammography has long been the mainstay of breast cancer detection and is the only screening test proven to reduce mortality. Although it remains the gold standard of breast cancer screening, there is increasing awareness of subpopulations of women for whom mammography has reduced sensitivity. Mammography has also undergone increased scrutiny for false positives and excessive biopsies, which increase radiation dose, cost and patient anxiety. In response to these challenges, new technologies for breast cancer screening have been developed, including; low dose mammography.

Published by: Prabhjot Kaur, Amardeep Kaur

Author: Prabhjot Kaur

Paper ID: V2I4-1171

Paper Status: published

Published: July 29, 2016

Full Details

Robustness against Sharp and Blur Attack in Proposed Visual Cryptography Scheme

The fundamental reason of watermarking invention was to protect originality of image message in the first place from outside attack. The quality of image depends on its ability to survive against various kinds of attacks that try to remove or destroy the originality. However, attempting to remove or destroy the message meaning should produce a noticeable debility in image quality. The robustness is a factor that plays an important role to test and verify the algorithm whether it will withstands against these attacks or not. In this paper the robustness of the proposed algorithm [15] for secret image share in Visual Cryptography Scheme is identified. The robustness of the image against various attacks, specifically image blur attack and image sharp attack are tested. The study of calculated PSNR value signifies the proposed algorithm withstands successfully on these attacks.

Published by: Dhirendra Bagri, R. K. Kapoor

Author: Dhirendra Bagri

Paper ID: V2I4-1170

Paper Status: published

Published: July 28, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X