Manuscripts

Recent Papers

Research Paper

Top-K associate secure pattern mining for mobile sensor data using level base utility pattern algorithm

This paper describes a secure top-k query processing scheme that is secure under the security model. The data privacy is guaranteed by encryption as well as a careful generation of data indexes. In this paper make to transform a top-k query, to a top-range query and adopt membership testing to test whether an associate pattern should be included in the query result or not. This transformation allows the storage node to find Top-k smallest or biggest data values without using numerical comparison operations, which is a key technique for the scheme to be secure under the security model. In the proposed system, it defines a new type of behavioral patterns for WSNs, termed as associated sensor patterns to capture the true correlation among sensor data. To discover such patterns, it uses to devise a highly compact tree structure, called weight associated sensor pattern tree (WASP-tree) and a mining algorithm that can efficiently discover patterns from sensor database (SD) with a single scan.

Published by: A. Sarathambigai, P. Gayathiri Devi, P. Balamurugan

Author: A. Sarathambigai

Paper ID: V4I6-1158

Paper Status: published

Published: November 12, 2018

Full Details
Research Paper

Improved selective encryption method for IOT-BSN using stream classification adaptive model

This paper describe a Stream Classification Adaptive Model (SCAM) technique for securing massive sensing information streams that meets multiple levels of confidentiality and integrity. This SCAM technique includes two vital concepts: common shared keys that area unit initialized and updated by D-SM while not requiring retransmission and a seam-less key stimulant method while not break off the data-stream encryption/decryption. Moreover, a replacement theme is planned to secure a big data sensor protocol through the employment of multiple unidirectional hash chains. The theme is shown to be lower in machine, power utilization. Also, communication prices area unit nevertheless still ready to secure Big Data Sensor communication model.

Published by: Meena J., P. Balamurugan, P. Gayathri Devi

Author: Meena J.

Paper ID: V4I6-1153

Paper Status: published

Published: November 5, 2018

Full Details
Review Paper

Role of mineral admixtures and chemical admixtures in concrete

This paper reviews the types admixtures used in concrete and their effect on workability, strength, and durability of concrete. A substance other than water, totals, or bond that is utilized as a component of cement or mortar to control setting and early solidify, workability, or to give extra establishing properties is called admixture. They are normal or produced chemicals which are added to the solid earlier or amid blending. The frequently utilized admixtures are air entraining specialists, water reducers, water lessening retarders, and quickening agents. Admixtures are utilized to give uncommon properties to crisp or solidified cement. The admixture is the operators that may higher standard solidness, workability and quality properties to concrete. Over decades, endeavors have been created to get concrete with certain coveted qualities, for example, elevated confining quality, high utility, and elite and sturdiness criteria to meet the prerequisite of multifaceted nature of present-day texture. The properties regularly altered are the warmth of hydration, quicken or hinder framing time, workability, water lessening, scattering and air-entrainment, durability and solidness aspect.

Published by: Sonal Banchhor, Meena Murmu, Shirish V Deo

Author: Sonal Banchhor

Paper ID: V4I6-1156

Paper Status: published

Published: November 5, 2018

Full Details
Research Paper

Virtual reality therapy upon cognition among schizophrenic clients

Schizophrenia is a chronic mental illness with the symptoms of disordered thought, behavior, and emotions. The illness affects approximately 1% of the world’s population and accounts for 1-2% of national health care costs in industrial countries. Cognition is impaired in most of the schizophrenic clients. This study was conducted to assess the effectiveness of virtual reality therapy upon cognition among schizophrenic clients. A study was conducted by using Pre Experimental research design at a selected private hospital, Chennai, South India with the Sample size of 35. Samples were chosen by using purposive sampling technique. Data were collected through an interview method by using Demographic Variable Proforma, Clinical Variable Proforma, Mini-mental status examination scale. Post-test cognition score of schizophrenic clients was higher (M=29.4, SD=1.76) than the pre-test cognition score (M=22.6, SD=1.48), which was statistically significant(*P<0.001). It can be attributed to the effectiveness of Virtual Reality Therapy on improving cognition. The above findings reveal that virtual reality therapy is effective in improving the cognition in schizophrenic clients.

Published by: Vanitha V., Dr. Vijayalakshmi K., Dr. Latha Venkatesan, Sujatha V.

Author: Vanitha V.

Paper ID: V4I6-1142

Paper Status: published

Published: November 5, 2018

Full Details
Research Paper

Strategies to eliminate foreign objects in hospital kitchen food

It is everybody’s right to receive safe food irrespective of the industries. Foreign objects in food are a never ending issue. This article emphasizes on the Strategies to Eliminate Foreign Objects in Hospital Kitchen Food. Patients trust and believe that the food served to them will be safe. It is the responsibility of the food service provider to ensure that safe and hygienic food is provided to the patients and foreign objects should never find a place in the patient food. +

Published by: S. Ramesh, B. Manimegalai

Author: S. Ramesh

Paper ID: V4I6-1154

Paper Status: published

Published: November 3, 2018

Full Details
Research Paper

Deep learning: An introduction to framework

Deep learning also called hierarchical learning is part of a broader family of machine learning method based on the learning data representation .learning can be supervised, unsupervised or reinforcement there are many deep learning libraries nowadays. Libraries contain direct function by which we can import the library and we can directly perform an algorithm on the data .now days number of such type libraries are available with their available feature and benefits .we have to select an appropriate tool for performing a particular task is difficult to decide. This research represents the comparative analysis of deep learning libraries .the main libraries which I will compare is sensor flow, pytorch, theano, and caffe the parameters for comparing the libraries are the adoption, dynamic and static graph definition, debugging, visualization and data parallelism.

Published by: Shivam Shah

Author: Shivam Shah

Paper ID: V4I6-1151

Paper Status: published

Published: November 3, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X