Manuscripts

Recent Papers

Research Paper

Biometric methods to speed up fingerprint processing using OCT: A survey

Fingerprint recognition is a crucial security technique with a steady growing usage for the identification and verification of people. However, current fingerprint acquisition systems have bound disadvantages, that embody the necessities of physical contact with the acquisition device, and also the presence of undesirable artifacts, like scars, on the surface of the fingerprint. There are various sectors or domains where Biometric authentication plays a vital role, these areas include Internet of Things (IoT), Smartphones, Healthcare, and many more. This paper evaluates the accuracy of a whole framework for the capturing of uninjured, undistorted fingerprints from underneath the skin's surface using Optical Coherence Tomography (OCT), the extraction and conversion of the submerged knowledge into a usable fingerprint and also the matching of such fingerprints. The main objective of this paper is to provide the study of the biometric algorithms, OCT based methods, and their relative comparisons.

Published by: Soonrutha Karothu, Vineeta Tiwari, Siddhant Verma, M. Sugadev

Author: Soonrutha Karothu

Paper ID: V5I1-1257

Paper Status: published

Published: February 4, 2019

Full Details
Survey Report

A survey on soil testing technique

Continuous cropping without the adequate measurement and provisioning of the soil nutrient may endanger the sustainability of the agriculture. Soil nutrient measurement s greatly required for proper plant growth and effective fertilization. A key in soil testing for formulated fertilization is to determine the number of soil nutrients, followed by recommendation of the nutrient needs and site-specific fertilization. Nitrogen, Phosphorus and Potassium are the three important nutrients required for plant growth.

Published by: Vaishnavi G., C. M. Manoj, Rakshitha M. P., Manu N, Nithin Kumar

Author: Vaishnavi G.

Paper ID: V5I1-1207

Paper Status: published

Published: February 1, 2019

Full Details
Research Paper

(Re)-mythifying the popular: Are some excavations too strenuous for ordinary readers

ABSTRACT Over the last decade, rectification and reinterpretation of Historical and Mythological facts had been one of the most popular themes in Indian English Literature. The demystifications portrayed in the works of Ashwin Sanghi, Christopher Doyle and Amish Tripathy were very much successful in indulging the element of mystery and thrill amongst the readers due to their adroit defamiliarization of the familiar tales. To attain such defamiliarization, many authors tend to adopt a number of interdisciplinary methodologies to excavate the alternate interpretations. These calculative discourses from the fields of Geography, Archaeology, Chemistry, Geography or Mathematics form the twists in the tale that leads to the conclusion. But, the problem is that what fraction of the Indian myth-loving culture is subjected to these bodies of knowledge. For example, Ashwin Sanghi’s The Krishna Key has an illustration of the Cartesian equation in an aquatic plain curve to obtain The Swastika symbol. Hence, the theme primarily associated with the cultural aspects, seem to take an applied dimension. Unfortunately, such methodologies of interpretation cannot be perfectly grasped by the Indians belonging to every exposure of the society. It needs sheer knowledge and scholastic prerequisites to fully enjoy the depth of such works. This paper tries to find the gravity and the extent of relatability of such depictions with the common readers of the country, the probable problems and as such, identify the authors’ objectives and the presumable target readers.

Published by: Poumita Paul

Author: Poumita Paul

Paper ID: V5I1-1209

Paper Status: published

Published: February 1, 2019

Full Details
Research Paper

Sensoid Robot using Android

Sensoid Robot which infers recognizing robot that can distinguish certain things, this robot is introduced with sensors like light, temperature, humidity and gas sensor all of these sensors convey diverse yields. The robot is created using Arduino microcontroller, which is contained diverse features like controlling the improvements and following the estimations of the sensors using an android application camera is embedded in the robot for better discernment, robots like this can be used for military and perception missions. In this proposed work, we have used Arduino microcontroller, light, stickiness, gas sensors, Bluetooth module, OLED demonstrate the customer can see the readings of the sensor and can take a firm decision by following the robot and its advancements through the android application. Gadgets used are Arduino IDE, MIT App Inventor, and Tiny DB database is used in order to achieve the general working arrangement of this endeavour. The essential arrangement of working up this endeavour is that robots like this can be used and sent on various missions where individuals can't reach, by separating the data which is given by the robot we would then have the capacity to touch base at a particular goal and avoid any risk that is required.

Published by: Vishaar G. N., Karthik K. P., Dr. Nagabhushan S. V.

Author: Vishaar G. N.

Paper ID: V5I1-1240

Paper Status: published

Published: February 1, 2019

Full Details
Research Paper

Sensor component proposed in a valuable approach for better power economy

This project presents a new methodology for an intelligent energy-saving system. The goal of real energy-saving is to be done from the viewpoint of system-orient strategy instead of materials. In this system design, temperature value, humidity value, CO density level, and power level are to be sensed. In addition, to design backend intelligent agent technology, the feedback control system through hybrid net-work of ZigBee technology has been added which would sensor the running parameters and environmental factors of the energy-saving system. The energy-saving system would collect all the running parameters in the energy-consumption system such as room, house, office, factory, community, or any space.

Published by: Dr. B. Gopinath, A. Karthikeyani, R. Banupriya, B. Dharani, T. Kaviya

Author: Dr. B. Gopinath

Paper ID: V5I1-1238

Paper Status: published

Published: February 1, 2019

Full Details
Research Paper

Authorization for secured cloud storage through SHA-256

Cloud computing has become one of the most influential paradigms in the IT industry in recent years. This emerging computing technology demands the user to believe their data is secure to cloud providers, there have been increasing security and privacy concerns on outsourced data. Many Schemes emphasis on Attribute-Based Encryption (ABE) have been made for access control of user’s data in cloud computing; however, they lack from some major security issues. In order to realize flexible, reliable, and fine grained access control of available data in cloud computing, A Secured Hashing Algorithm is proposed which is a one-way cryptography technique with no decryption. This online storage mechanism is an integrated cloud backup suite that gives end-to-end visibility and full control of your data storage resources at corresponding rates. Cloud offers high scalability for all your storage needs your scalable data demands met from highly scalable archival to storage, equip your enterprises with the comprehensive storage suites needs. Cloud storage allows you to store unlimited data in an always available, highly durable and fully secure environment with Enterprises-Grade System Management for your commercial and budgetary needs. The key benefits are scalability, durability, support and predictable pricing. The proposed scheme not only achieves security due to its Secured Hashing Algorithm (SHA), but also inherits scalability and efficient access control in supporting compound attributes of ASBE (Attribute Set Based Encryption).

Published by: M. R. Sundarakumar, Dr. G. Mahadevan

Author: M. R. Sundarakumar

Paper ID: V5I1-1245

Paper Status: published

Published: January 31, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X