Manuscripts

Recent Papers

Research Paper

An efficient approach for sarcasm detection in tweets using polarity flip

Sentiment analysis is the qualitative method that uses natural language processing, text analysis, and computational linguistics. The goal of sentiment analysis is to determine if a specific passage in the text shows positive, negative or neutral sentiment towards the subject. Social media platforms, like Twitter, offer a wide ability that allows users to express their thoughts by employing figurative language devices such as sarcasm to achieve different communication purposes. Dealing with such kind of content represents a big challenge for computational linguistics. Due to these difficulties and the inherently tricky nature of sarcasm, it is generally ignored during social network analysis. As a result, the outcome of such analysis is affected adversely. Also, nowadays, Customers use twitter as a platform to express their emotions and opinions about social issues, products or services. Lexicon based methods of text mining can at times fail to recognize sarcasm used by customers online. This has direct implications for companies using text mining on online content to identify new customers, address customer problems, and reduce customer turn rates or for any other CRM (Customer Relationship Management) activities. Thus, sarcasm detection poses to be one of the most critical problems which we need to overcome while trying to yield high accuracy insights from abundantly available data. This work considers sarcastic tweets (including those based on products) and proposes an effective approach to detect sarcasm. The system utilizes 21 features based on context, contrast, and emotions. The results show that sarcastic tweets inclined to have more polarity flips than Non-sarcastic tweets. Also, it is found that MLP and the Random Forest classifier tend to perform better than other classifiers with an accuracy of 94%.

Published by: Karthika K.

Author: Karthika K.

Paper ID: V5I2-2114

Paper Status: published

Published: April 26, 2019

Full Details
Research Paper

Effect of demographic variables on emotional intelligence: A study on college students in Visakhapatnam

This study is aimed to examine the effect of demographic variables (age, qualification, and community, of gender and socio-economic status) impacts on emotional intelligence among early adulthoods. A sample of 116 graduate and post graduate college students both male and female at 18-25 years age group students participated in this study. Descriptive statistics and t test findings revealed thatthis emphasizes the role of financial status and community of a person on his/her which is directly influence on the areas of Adaptability and sensitivity which are domains of emotional intelligence.

Published by: Subhashini Akurathi, P. Swathi, G. Ravi Kumar

Author: Subhashini Akurathi

Paper ID: V5I2-2107

Paper Status: published

Published: April 26, 2019

Full Details
Review Paper

A review on geopolymer using fly ash and GGBS

If we talk about today’s era, Concrete is the most important aspect in the present scenario in terms of construction. All the construction is being done with the help of this building material. Use of cement is rising on the peak from the last few decades due to the enormous demand for construction of megastructures all around the globe. In addition to that cement is the only material whose demand is increasing day by day in order to meet the needs of mankind. Subsequently, the price of cement is also increasing as its demand is increasing profoundly and also it available limited only. Manufacturing of cement results in the emission of CO2 and other gases which contribute to global warming and which further contribute to climate change and thus it is one of the most complicated material. Its use cannot be stopped but can be limited by using various materials. In order to dilute the use of cement, various alternatives and substitutes have been manufactured which is contributing to less pollution as compared to cement. Since cement cannot be fully replaced, it has been partially replaced with geopolymer using fly ash and GGBS.

Published by: Baljot Kaur

Author: Baljot Kaur

Paper ID: V5I2-2072

Paper Status: published

Published: April 25, 2019

Full Details
Case Study

The impact of various child-centric NGOs in the city of Vellore

In this paper, we discuss the impact of various child-centric Non-Governmental Organizations present in our city. This will help volunteers to choose better organizations for their efforts and at the same time provide a platform for the organizations to improve their mistakes. Over the past decade, many NGOs and social change organizations have mushroomed in India, but very few have expanded on the basis of scale and community impact. After all, scraping through red tapestry in government is a herculean task to be able to set up an NGO in the first place.

Published by: Ansha Sondhi, Nehalika Ramchandani

Author: Ansha Sondhi

Paper ID: V5I2-1858

Paper Status: published

Published: April 25, 2019

Full Details
Research Paper

Approach for improving data security in cloud computing

Multi-client framework for access control to datasets set away in an untrusted cloud condition. Appropriated storing like some other untrusted condition needs the capacity to check share data. Our framework gives a path of authority over the informational index away in the cloud without the supplier adventure. The fundamental instrument of access control structure is the figure content arrangement trademark based encryption plot with dynamic properties. Utilizing a blockchain based decentralized record, our framework gives the steady log of all vital security occasions, for example, key age, get the chance to strategy undertaking, change or refusal, get the chance to ask for. We propose a huge amount of cryptographic conventions guaranteeing the security of cryptographic endeavors requiring conundrum or private keys. Just ciphertexts of hash codes are exchanged through the blockchain record. The model of our structure is acknowledged utilizing sharp contracts and endeavored on square chain sort out. Here is proposed structure as a customer if they are going to enroll in that account director will give assorted keys to each customer it takes after a private key in the wake of selecting a customer they can log in and they can exchange all of the reports what they need while exchanging time the substance everything will be encoded and for that one open key will be produce these all will be secured in cloud database . As a customer they have an alternate privet key which was given by the manager so they can log in and they can get to that account if they have to exchange they can exchange else they have to get any record they can get that record by using of cloud they can see all the customer archives if they need any record they have to send sales to executive .if overseer to recognize that request they can get that interface if the customer need that record they have to click that record in case you clicked that archive, by then it will be asked first it will ask private key . obviously, it will ask with respect to whether two keys was composed then nobody however they can prepared to download else they can't prepared to down weight .

Published by: L. Venkat, Lakshman Babu K., Nikhith, Ethirajulu V.

Author: L. Venkat

Paper ID: V5I2-2091

Paper Status: published

Published: April 25, 2019

Full Details
Research Paper

Dynamic spectrum sharing among the operators using AODV

Dynamic spectrum sharing aims to produce flexible spectrum usage and improve spectrum utilization with time. we have a tendency to propose two optimization models exploitation random optimization algorithms during which the secondary operator: 1) spends the stripped price to realize the target Grade of Service (GoS) assuming unrestricted budget or 2) gains the highest profit to realize the target GoS assuming restricted budget. we have a tendency to assume that there are spectrum resources accessible for secondary operators to borrow under merchant mode. Results obtained from every model are then compared with results derived from algorithms during which spectrum borrowings are random. Comparisons showed that the gain within the results obtained from our projected stochastic-optimization framework is considerably beyond heuristic counterparts. Second post-optimization performance analysis of the operators in the form of blocking probability in various scenarios is investigated to work out the probable performance gain and degradation of the secondary and primary operators, respectively.

Published by: Julakanti Praveen Reddy, A Abhishek Reddy, G. Vikram

Author: Julakanti Praveen Reddy

Paper ID: V5I2-2086

Paper Status: published

Published: April 25, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X