Manuscripts

Recent Papers

Research Paper

Implementing a security policy for M-learning exam management system

M-learning has improved the e-learning by influencing the figuring out how to process student focused. In any case, upholding exam security in open situations where every understudy has his/her own particular portable/tablet gadget associated with a Wi-Fi arrange through which it is additionally associated with the Internet can be a standout amongst the most difficult errands. In such conditions, understudies can without much of a stretch trade data over the system amid exam time. This paper plans to distinguish different vulnerabilities that may abuse exam security in m-learning conditions and to outline the fitting security administrations and countermeasures that can be set up to guarantee exam security. It additionally expects to coordinate the subsequent secure exam framework with a current, open-source, and broadly acknowledged Learning Management System (LMS) and its administration expansion to the m-learning condition, to be specific "the Mood bile Project".

Published by: Shaik Ashrafunnisa, V Muthu Priya

Author: Shaik Ashrafunnisa

Paper ID: V4I3-1745

Paper Status: published

Published: June 4, 2018

Full Details
Research Paper

FTPal: Natural language interface assistant for PC file and task management

FTPal is a natural language interface PC application that can be used to do certain file and task management related computer operations efficiently and conveniently. It is possible to perform these operations by using scripting languages such as Windows PowerShell, but it is a somewhat difficult task for ordinary computer users if it is possible to perform these computer operations by using simple English language commands it would solve most of these issues. Therefore, FTPal was developed using natural language techniques to address these issues and reduce the effort needed to write certain shell scripts. After commanding the FTPal application in simple English, FTPal is able to interpret and execute all the requested commands. The FTPal application is useful for businesses organizations to manage files and tasks efficiently which may lead to increase of revenue by reducing the time needed to do certain file management related tasks. As well as it is useful for people with less technical knowledge to perform file management tasks. It is possible to use this same concept to reduce the effort needed for other programming languages as well. The ultimate goal of this application is to provide an easy environment to perform file and task management related tasks efficiently and conveniently without using any programming languages.

Published by: T.R. Chamara Denipitiya, E.A.I Udayakantha

Author: T.R. Chamara Denipitiya

Paper ID: V4I3-1720

Paper Status: published

Published: June 4, 2018

Full Details
Review Paper

Optimal power allocation using particle swarm optimization in cooperative wireless sensor networks

This paper presents a brief survey on jamming attacks and measures to be taken for avoiding such attacks. The wireless networks are vulnerable to jamming and eavesdropping attacks. Presently, the lot of attacks are already there which challenge the network security. Jamming attacks can be viewed as unauthorized access of intruders in the transmission network. To defeat jamming attacks, optimal power allocation strategies are discussed in this paper which can be used as an anti-jamming mechanism for strengthening wireless network against various intrusion actions.

Published by: Nikita N Bharadwaj, Jaya Dipti Lal, S.V. Charhate

Author: Nikita N Bharadwaj

Paper ID: V4I3-1692

Paper Status: published

Published: June 4, 2018

Full Details
Research Paper

E-noticeboard

A Notice Board is a place where university or college management can place the message officially about exams, classes or any other important news. Notice boards are often made of a material such as cork to facilitate the addition and removal of paper messages or it can be done using digital devices such as computers, phones or mobile devices. The main aim of this paper is to make information dissemination much easier in a paperless community as the world tends to graduate into that line of interaction to develop the Notice Board facility as an application, for use in college administration. This paper is about the implementation of ENB to the college administration system. This work generally intends to act as a support system for the existing method by which notices are being posted in the ENB web application.

Published by: Rishabh Khandelwal, Vibhuti Thakur

Author: Rishabh Khandelwal

Paper ID: V4I3-1714

Paper Status: published

Published: June 4, 2018

Full Details
Research Paper

Object identification using picture for blind peoples

From 1970, object identification technologies have matured to a point at which many applications are becoming possible for visual substitution. Human vision is one of the very essential part and it plays the most important role in free movement of blind peoples in surrounding environment. Hence, over thousands of techniques have been founded on these subjects that propose a variety of object recognition products and services by developing new electronic devices for the blind. Visually impaired peoples need is to perform most navigational tasks, so visually impaired people are at disadvantage because necessary information about the surrounding environment is not available. The system aims to introduce a proposed system that restores a central function of the visual system which is the identification of surrounding objects. The object detection method is based on the local grayscale conversion concept. The simulation results using feature extraction algorithm and key-points matching showed good accuracy for recognizing objects. Thus, the contribution is to present the idea of a visual substitution system based on gray-scale conversation, features extractions and matching to recognize and provide audio output of objects in images.

Published by: Nandini Jalandar Patil, Lokesh Manoj Bhavsar, Lokesh Shriram Chaudhari, Kalpesh Ramlal Patil

Author: Nandini Jalandar Patil

Paper ID: V4I3-1726

Paper Status: published

Published: June 4, 2018

Full Details
Research Paper

Robust security approach using hybrid steganography

Information security is one of the major problem faced nowadays since the number of internet users is increasing and secret information is getting shared every second. This has also hiked the cyber-crime and threat of malicious access. The two main techniques that are used for information security are steganography and cryptography. Cryptography can be basically considered as secret writing; on the other hand, Steganography can be considered as data hiding. In this project, a hybrid technique for data security is proposed by combining the cryptography and steganography properties. The proposed image steganography algorithm works on improvement of data embedding capacity. Implementation of image processing is implemented using modified LSB approach which showed improved results in terms of image quality and data hiding capacity. The aim of this work is to implement a system for data security as well as improve the data hiding capacity. The results show increased image quality and fewer distortions. Also proposed key exchange protocol will aid in security.

Published by: Pranay Kapgate, Surendra Demgunde, Nikhil Tulankar

Author: Pranay Kapgate

Paper ID: V4I3-1703

Paper Status: published

Published: June 4, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X