Manuscripts

Recent Papers

Research Paper

Real time security surveillance using machine learning

As we know security has become a major concern in modern society. It is achieved by surveillance which is capable of taking brisk actions. This paper presents a new system architecture which provides real-time surveillance where unauthenticated people are differentiated and provides the data flow and storage path. Recognition errors are narrowed as much as possible to make the system work efficiently. The proposed approach exploits the Viola-Jones method for face detection, the LBPH (Local Binary Pattern Histogram) algorithm as feature tracker. This combination of algorithms gives more accuracy and less processing time in the proposed design. User data is stored separately from the trained file to make the system more reliable. The proposed design can be integrated into any place which is concerned about security and prevents the security breaches before they occur.

Published by: G. Sumith Reddy, Devasani Aravind, Vanama Mohith, A. Sivajayaprakash

Author: G. Sumith Reddy

Paper ID: V5I3-1322

Paper Status: published

Published: May 10, 2019

Full Details
Dissertations

Literature Review: Semantic Web tools and technologies for creating and effective searching method based on the data available in social networking sites

This paper is a literature review on Semantic Web tools and technologies for creating and effective searching method based on the data available in Social Networking sites. We discuss the requirements of ontologies in the context of the Semantic Web. We survey tools for managing and applying ontologies. Advantages of using ontologies in both knowledge-base-style and database-style applications are compared. We explore the current state of the Semantic Web with a major focus on search based on Social Networking profiles. The paper includes a review of several papers on semantics and ontology based search, sections on query languages and knowledge base systems that enable Semantic Web search. Finally, we discuss the growth of Social Networking.

Published by: Aamir Junaid Ahmad, Sabina Priyadarshini

Author: Aamir Junaid Ahmad

Paper ID: V5I3-1182

Paper Status: published

Published: May 10, 2019

Full Details
Review Paper

Hyperledger based electronic voting system

In many countries, the elections are carried out by a single administration and have complete control over the database and system. The administration has to manage the entire election process which occurs for a long period of time. Generic elections still use a centralized system; some of the problems that can occur in conventional electoral systems are that it is possible to tamper with the database of considerable opportunities. The aspect of security and transparency is a threat from a still widespread election with the conventional system (offline). Unlike the electoral system, there are many conventional uses of paper in its implementation. The best way to overcome the difficulty faced is by decentralizing the system used for elections. This can be achieved by making use of Blockchain technology, the entire database is owned by many users in a blockchain. Blockchain itself has been used in the Bitcoin system known as the decentralized Bank system. By adopting blockchain in the distribution of databases on e-voting systems can reduce one of the cheating sources of database manipulation. Unlike Bitcoin with its Proof of Work, this paper proposes a method based on a hyperledger to enable voting.

Published by: K. H. Sudershan, P. Eshwar Reddy, Kishore Nadiger, Sharat Kumar S.

Author: K. H. Sudershan

Paper ID: V5I3-1247

Paper Status: published

Published: May 10, 2019

Full Details
Research Paper

Division and replication of data for cloud security

Re-appropriating data to a pariah legitimate control performed in conveyed figuring offers ascend to security concerns. The information bargain can happen because of cloud-based assaults by malignant clients. Raised security frameworks are in this way required to ensure the information in the cloud. It's the commitment of a focal information distributor to gather delicate information from numerous gatherings and after that before distributing for information mining, make it mysterious. In such occasions, information clients may have a solid interest to quantify the utility of distributed information as most awry encryption systems effectively affect the estimation of data. This assignment is nontrivial, be that as it may, as estimating the utility, as a rule, requires amassed crude information, which isn't uncovered to information clients because of concerns with respect to secrecy. Or then again more terrible, information distributors may even undermine the crude information since no one, including the individual providers, knows the full data-set. This venture proposes a security protecting utility confirmation instrument dependent on different parts of cryptographic methodology, a differentially private procedure intended for set-assessed information. This proposition can gauge the information utility dependent on the collected crude information's encoded frequencies rather than the plain qualities, denying rupture of secrecy. Related, the accuracy of the encoded frequencies given by the distributor could be subtly confirmed, which recognizes noxious distributors. This method is additionally stretched out to DiffGen, another system made for social information which is differentially private revealing. The security and productivity of the proposed framework is exhibited by our hypothetical and exploratory appraisals.

Published by: G. Raghunathan, Mohideen Yazir

Author: G. Raghunathan

Paper ID: V5I3-1296

Paper Status: published

Published: May 10, 2019

Full Details
Research Paper

Cost optimization of highway, urban and rural facility using sustainable material

In this paper, an experiment of replacement of sand with quarry dust for compressive strength, workability of concrete and cost comparison is done for cost-effectiveness in construction. In this study, there are three basic mix design considered (M20, M30, M40) and partially replacement with 20,50,80 and 100 percentage of quarry dust. It is very beneficial and economical for the replacement of natural sand with quarry dust. In this study, it was observed that when Sand is replaced by Dust the compressive strength was found to be increased. The cost of construction is also reduced by a reasonable percentage.

Published by: Ravindra Pandey, Akshay A. Gulghane, Dr. B. V. Khode

Author: Ravindra Pandey

Paper ID: V5I3-1303

Paper Status: published

Published: May 9, 2019

Full Details
Research Paper

Awareness level of beneficiaries with respect to the concepts and services of Sanjeevini – A study of Mysuru District

The National Rural Livelihoods Mission (NRLM - Sanjeevini) – Aajeevika was launched on 3rd June 2011. The Mission has the mandate to reach out about 100 million rural poor households in 2.5 lakh Gram Panchayats across the country. The program is being implemented in Karnataka state and Mysore district is one of the five National Rural Livelihood Project areas. Facilitating sustainable livelihood opportunities and encouraging them to come out of poverty is the focus. The study based on primary data collected from four blocks of Mysore district. The multistage sampling frame used to gather the data from beneficiaries. The study consists of 400 beneficiaries, data collected during 2017-18. It was found in the study that out of 400 respondents only 116 respondents were aware of all the benefits available in Sanjeveni programme. The other findings have also inferred that the National Rural Livelihood Mission (Sanjeevini) has not succeeded in generating awareness about the scheme and its benefits among its own Self Help Group members completely. The author further found that Majority of them have been part of the groups for accessing the credit facilities. Making NRLM as the livelihood mission in Karnataka is still a distant dream as the current results highlight only credit and thrift activities. Livelihood promotional activities have required to be paced up.

Published by: Basavaraju R., T. M. Mahesh

Author: Basavaraju R.

Paper ID: V5I3-1256

Paper Status: published

Published: May 9, 2019

Full Details