Manuscripts

Recent Papers

Research Paper

A graphical password authentication approach for secure banking

Authentication is the process to provide sure information security and the graphical password authentication method is an accessible and easy process to provide authentication. The major problem of user registration, approximately text base password, is well known. If the login user is inclined to select a simple password which is frequently in his mind it becomes straightforward for attackers to guess. If the password is machine generated it is mostly over complex for the user to keep in mind. User authenticated password using cued click points graphical password scheme includes memo ability, usability and security evaluations. This paper is on enhanced user graphical password authentication with a usability and memo ability, so that users select more random or more difficult to guess passwords. In click-based graphical passwords, image or video frames provide the database to load the image and then give authenticated access to all information in the database.

Published by: Neha Prakash Patil, Shraddha Rajesh Patil, Dipali Vinayak Khadse, Priti Murlidhar Patil, Sudesh L. Farpat

Author: Neha Prakash Patil

Paper ID: V5I2-1316

Paper Status: published

Published: March 16, 2019

Full Details
Research Paper

Child in safety with localization awareness

Aiming at a increasing security to children, this paper implements safety to the children by using a safety monitoring system using our android mobile phones. In particular a feeling of insecurity will be among the minds of the parents when the child is being alone. In fact nowadays, child kidnapping is happening frequently and that too it is too common among girl child. This system helps the children to be safe and monitors the child’s daily environment. This system allows to send the child location along the photos and videos to the parent mobile by means of GPS (Global Positioning System) and GSM module (Global Space for Mobile communication).

Published by: Dhinesh Kumar M., Devaram Gnanendra Reddy, Appadi Sumanth Teja, V. Jeyaramya

Author: Dhinesh Kumar M.

Paper ID: V5I2-1314

Paper Status: published

Published: March 16, 2019

Full Details
Review Paper

Automatic opening and closing of railway gates and signaling in railways using IoT

The Internet of Things (IoT) is a group of devices which are connected together in the network. It is used in sound vibrator and ZigBee transceiver which will receive frequency of the vibration and the time from which the train reaches the sensor from the server. In this, we are using a sound vibrator which will detect vibrations from the track and the signal is transferred to the gear motor and the gate will get closed automatically. When the train passes the gate another sound vibration sensor is fixed at another end and it will transfer the signal to the gate and gate will open automatically. Here the additional features added are we can calculate the current speed of the train and we can also track the track damage. The main objective of this work is to provide automatic closing and the opening of gates and railway system. We can avoid careless mistakes done by the gatekeeper and we can reduce manpower in the railway system.

Published by: Dinesh Kumar S., Prem Kumar R., Venkatesan G., Vinston Raja R.

Author: Dinesh Kumar S.

Paper ID: V5I2-1304

Paper Status: published

Published: March 16, 2019

Full Details
Research Paper

Bunch ensemble with averaged co-association matrix maximizing the expected margin

The problem considered is cluster analysis with the usage of the ensemble approach. The paper proposes a method for finding optimal weights for the averaged co-association matrix applied to the construction of the ensemble partition. The main idea is to find such weights for which the expectation of ensemble margin takes its maximum value. A latent variable pairwise classification model is used for determining margin characteristics dependent on cluster validity indices. To construct the ensemble partition, we apply a minimum spanning tree found on the averaged co-association matrix as an adjacency matrix. The efficiency of the method is confirmed by Monte-Carlo simulations with artificial data sets.

Published by: A. V. S. N. Kaushik, D. Harsha vardhan, Dr. M. Rama Krishna Murthy, B. Sai Chaitanya, G. Nikhil Das

Author: A. V. S. N. Kaushik

Paper ID: V5I2-1303

Paper Status: published

Published: March 16, 2019

Full Details
Research Paper

Extended hybrid approach for detecting spammers on Twitter

One of the biggest social networks is Twitter for providing message posting and use direct message services via “tweets”.366 million currently active users on Twitter, Is the second largest space to share common news or message post. These features are also used by spammers on Twitter, spammers are not new on Twitter. spammers must be detected in improving the quality of Twitter message services. In this spammer detected by using metadata, content, interaction, and community-based features methods. Tweet meta information extracted and analyzed based on user-id, tweets,tweet-time and tweet-type. Content Features are extracted based on user posting content with URL, Mention-tags and hash-tags. Interaction and community-based features are analyzed by following and follower information. The proposed approach to introducing network-based features for spammer ratio detection by using unique IP address based user classification. Spammers can be detected by analyzing their tweets based on the extended hybrid approach by using the random forest, decision tree, and Bayesian network on the Twitter dataset that has benign users and spammers.

Published by: Subash G., S. Yuvalatha, V. Lenin Kumar, G. Manimegalai

Author: Subash G.

Paper ID: V5I2-1295

Paper Status: published

Published: March 16, 2019

Full Details
Review Paper

Enormous information for Internet of Things

With the quick advancement of the Internet of Things (IoT), Big Data innovations have risen as a basic information examination instrument to convey the learning inside IoT frameworks to all the more likely meet the reason of the IoT frameworks and bolster basic leadership. In spite of the fact that the point of Big Data investigation itself is widely examined, the dissimilarity between IoT areas, (for example, social insurance, vitality, transportation furthermore, others) has disconnected the advancement of Big Data approaches in each IoT area. Along these lines, the common understanding crosswise over IoT areas can propel the advancement of Big Data examine in IoT. In this work, we along these lines direct a study on Big Data innovations in various IoT areas to encourage and animate information sharing over the IoT spaces. In light of our audit, this paper talks about the likenesses and contrasts among Big Data advances utilized in various IoT spaces, proposes how certain Big Data innovation utilized in one IoT area can be re-utilized in another IoT space, furthermore, builds up a reasonable system to plot the basic Big Data advancements over all the audited IoT spaces.

Published by: P. Mounika, N. Nalini

Author: P. Mounika

Paper ID: V5I2-1292

Paper Status: published

Published: March 16, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X