Manuscripts

Recent Papers

Research Paper

Experimental investigation on mechanical properties of aluminium based composites

Hybrid metal matrix composites are used in many industries due to its strength. Composites can be prepared using stir casting method. In this paper, an Al 7075 alloy is used as the matrix with varying weight percentage of Silicon carbide and Boron Carbide particles as the reinforcement material. In this study tensile strength, compression strength and hardness of the composite specimen were discussed. Results showed that there is a considerable increase in hardness and tensile strength of the fabricated composites than the base metal

Published by: G Ramesh, C Poovendran, N Vasudevan, B Gopinath, V C Uvaraja

Author: G Ramesh

Paper ID: V4I3-2026

Paper Status: published

Published: June 29, 2018

Full Details
Research Paper

Digitalised fuel monitoring device using IoT

Today’s world is running towards digitalization in order to make life comfortable and easy. Generally, in fuel refilling stations we refill fuel to our automobiles daily. Here we are not having any digitalized meters to our automobile’s to show whether we are receiving the correct amount of fuel refilled or not. Many media people caught refilling stations on their manipulation in refilling the fuel using some circuits and remote. So we came up with a digital solution to indicate the correct amount of fuel refilled into the fuel tank instantly. And intimating the vehicle owner regarding the fuel refilling through an SMS using GSM MODULE.

Published by: Karthik Nama, Sai Kumar Kale

Author: Karthik Nama

Paper ID: V4I3-2006

Paper Status: published

Published: June 29, 2018

Full Details
Review Paper

A review on tree traversal techniques

A tree is a non-linear data structure for fast storing and retrieval of data in primary memory. It represents data in the form of hierarchical form. Data are stored in a tree i.e. called as a node, in which topmost node is called root and each node has one or more nodes lying on the left or right side of a tree. Except for root node each node has a parent node. The information can be extracted from a tree through various traversal algorithms. Tree traversal means visiting the nodes of a tree at once. In this paper, we are studying different algorithms for tree traversal

Published by: Raj Bala, Sakshi Dhingra

Author: Raj Bala

Paper ID: V4I3-2015

Paper Status: published

Published: June 29, 2018

Full Details
Others

GIF – Get IT Filled

GIF - Get It Filled is an intelligent system that automatically generates the deposit and withdrawal forms required in a bank. In the current scenario, the old-aged & illiterate customers require the help of literate people to fill a deposit or withdrawal form in a bank. To help improve such scenarios, we are introducing a system that takes fingerprint ID and speech as input from the customer and produces the required deposit or withdrawal form at the counter. It is an auto-trigger system with proximity sensors to detect the presence of customers. The customers could either use the fingerprint module for auto-filling the account details or they can speak to the system in their own regional language. In the latter case, the system takes both the account and amount details, whereas in the former case, the customer needs to provide the amount details only. The entire process is done through voice communication between the system and the customer. The system uses speech recognition modules to recognize the customer requirements and performs them. The generated form is then directly sent to the counter and a token is provided to the customer according to which he/she can appear at the counter for further operations.

Published by: Aiswarya ManojKumar, Anagha Pallen Pavithran, Bagya Girish, Sneha C K

Author: Aiswarya ManojKumar

Paper ID: V4I3-1906

Paper Status: published

Published: June 29, 2018

Full Details
Research Paper

Detecting man in the middle attack

With Cyber-attacks and cyber-threats are increasing, network security needs to be seen in a new dimension. WLANs (Wireless Local Area Networks) are acquiring their hold in all the verticals of life. As technology is growing, a data breach at any scale, whether at the industry level or private can be menacing to distinct. Man-in-the-Middle is one of the most ruinous attacks in the WLAN. In this work, I propose a solution to detect Man-in-the-Middle attack in public or home WLANs. The objective of the work is to present a solution which allows individual to keep watch on WLAN based on data packets collected over the network and evaluating its behavior. The proposed detection system is simulated with the help of Kali Linux where the attacker is trying to get a WPA Handshake over the network, a packet sniffer tool which captures the changes over the network during the simulation and one capture analyzing tool which analyze the capture.

Published by: Sahil Dambee, Nikhita Mangaonkar

Author: Sahil Dambee

Paper ID: V4I3-2016

Paper Status: published

Published: June 29, 2018

Full Details
Research Paper

Wear analysis of aluminium metal matrix composites

In this study, the effect of sliding distance on the wear rate is studied on the hybrid metal matrix composites. SiC and B4C with varying weight percentage used. Composites are produced using liquid metallurgy route. Using pin on disc apparatus the wear analysis experiment. As the volume fraction of SiC and B4C reinforcement increases, the wear rate decreases.

Published by: G. Ramesh, C. Poovendran, N. Vasudevan, B. Gopinath, V. C. Uvaraja

Author: G. Ramesh

Paper ID: V4I3-2018

Paper Status: published

Published: June 29, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X