Manuscripts

Recent Papers

Survey Report

Neural Network Ensemble Model with Back Propagation for Classifying Melanoma on Dermoscopy Images-A Survey

Dermoscopy is the examination of the skin using skin surface microscopy. We develop a novel method for classifying melanocytic tumors as benign or malignant by the analysis of digital dermoscopy images. In this paper before classification pre-processing and segmentation, feature extraction is to be carried out. Then introduce the classifier based on neural network ensemble is used to classify the melanocytic tumors as benign or malignant. To improve the neural network's generalization performance proposes an effective neural network ensemble approach with an idea. One is to apply neural network's output sensitivity as a measure to evaluate neural network's output diversity at the input near training samples so as to able to select a diverse individual from a pool of well-trained neural network. Lesions are extracted using SGNN. Lesions are classified using a classifier based on neural network ensemble model.  

Published by: Jeena Johnson, Asha Vijayan

Author: Jeena Johnson

Paper ID: V4I1-1183

Paper Status: published

Published: January 11, 2018

Full Details
Technical Notes

BContri- An Algorithm for Monitoring Construction Site using RFID, GPS and GSM

Construction is recognized internationally as one of the information-intensive industry and subject to harsh conditions (e.g., rain and dust) and is often criticized for delivering projects late and over budget. Collection of detailed, accurate and a sufficient volume of information and timely delivery of them are vital to operating a well-managed and cost-efficient construction project. This paper investigates the fully automated data collection using integrated applications of Radio Frequency Identification (RFID), Global Positioning System (GPS) and Global System for Mobile Communication (GSM) technologies in the construction industry which focused on the real-time exchange of information between the construction site and off-site office, how this technology could change current practice. Therefore, the main objective of this study is to propose a system to improve efficiency and cost-effectiveness, practical communication and control among participants, and increase flexibility in terms of information delivery and response time on and off construction sites. Most of the used technologies in this research are commercially available and are inexpensive (RFID, GPS, GSM). Some application of advanced tracking and data storage technologies used in construction information management are discussed briefly.

Published by: Afiya V N

Author: Afiya V N

Paper ID: V4I1-1180

Paper Status: published

Published: January 11, 2018

Full Details
Survey Report

Pollution Human Rights and Environmental Protection

In terms of international awareness, the connection between human rights and Environmental protection is steadily grown significantly, given that environmental protection became an important issue on the international agenda. Over the years, environmental legislation has evolved being involved in human rights and recognizing the fundamental rights in relation to the environment. A considerable number of legal instruments at international, regional and national levels have been approved and established specialized bodies to respond to problems identified in human rights and environmental protection. Environmental instruments increasingly include protection of human rights and principles, including the specific procedural rights such as access to information and access to justice and the principles of implementation. At the same time, the development of environmental norms has affected human rights. This paper highlights some of the developments that have occurred at the international, regional and national levels in recognition of the link between the protection of the natural environment and human rights and the impact that they have in achieving the aims of each other.

Published by: Vishal Bhardwaj

Author: Vishal Bhardwaj

Paper ID: V4I1-1166

Paper Status: published

Published: January 11, 2018

Full Details
Research Article

Resolving Multi-party Privacy Conflicts in Social Media

Information shared through Social Media may affect more than one user’s privacy e.g., Information that depicts different users, comments that mention different users, events in which different users are invited, etc. Many types of privacy management support in present mainstream Social Media foundation makes users unable to appropriately control the sender and receiver. Computational mechanisms that are able to merge the privacy preferences of different users into a single policy for an item can help solve this problem. Merging different user’s personal preferences is difficult hence conflicts occur in privacy preferences, so methods to resolve conflicts are needed. Moreover, these techniques need to consider how users’ would actually reach an engagement about a solution to the conflict in order to propose solutions that can be acceptable by all of the users affected by the information to be shared. present approaches are either too demanding or only consider fixed ways of aggregating privacy preferences. Here, we introduce the basic computational procedure to overcome problems in Social Media that is able to adapt to different situations by modeling the concessions that users make to reach answers to the conflicts. The present results of a user study in which our introduced mechanism outperformed other present approaches in terms of how many times each approach matched users’ action. Computational mechanisms that are able to merge the privacy preferences of multiple users into a single policy for an item can help solve this problem. However, merging multiple users’ privacy preferences is not an easy task, because privacy preferences may conflict, so methods to resolve conflicts are needed. Moreover, these methods need to consider how users’ would actually reach an agreement about a solution to the conflict in order to propose solutions that can be acceptable by all of the users affected by the item to be shared. Current approaches are either too demanding or only consider fixed ways of aggregating privacy preferences. In this project, we propose the first computational mechanism to resolve conflicts for multi-party privacy management in Social Media that is able to adapt to different situations by modeling the concessions that users make to reach a solution to the conflicts. We also present results of a user study in which our proposed mechanism outperformed other existing approaches in terms of how many times each approach matched users’ behavior.

Published by: M. Premkumar, Dr. Selvaraj

Author: M. Premkumar

Paper ID: V4I1-1193

Paper Status: published

Published: January 10, 2018

Full Details
Review Paper

An Approach to Multi-Cloud Securities

The use of multi-cloud provides highly scalable and reliable application for IT leaders to transforming their data center architectures to move from a reactive, inflexible organization to being a more proactive, a multi-cloud deployment is appropriate. Multi-cloud denotes the use of multiple independent clouds by a client or a service. Since the multi-cloud services will be migrating from single cloud to different cloud service providers it is challenging quest to procure Security issues in multi-cloud. Hence there is a need to ensure storage security in multi-cloud. So to provide the storage security at multi-cloud, we adopted the cryptography techniques in our proposed method. In cryptography, we are focusing on Deffie-Hellman key exchange protocol and elliptic curve for a reliable key generation. In this paper, we majorly focused on multi-cloud, need, benefits and security aspect relating to multi-cloud.

Published by: P. Sabitha, Dr. V. B Narasimha

Author: P. Sabitha

Paper ID: V4I1-1187

Paper Status: published

Published: January 10, 2018

Full Details
Survey Report

Survey on Removal of Rain or Snow From a Single Color Image

It is well-known that a bad weather, e.g., haze, rain, or snow, affects severely the quality of the captured images or videos, which consequently degrades the performance of many image processing and computer vision algorithms such as object detection, tracking, recognition, and surveillance. Rain/snow removal from a video or a single image has been an active research topic over the past decade. Today, it continues to draw attention to outdoor vision systems (e.g., surveillance) where the ultimate goal is to produce a clear and clean image or video. Here, the most critical task is to separate rain/snow components from the other part.

Published by: Binju Bentex, Dr. K S Angel Viji

Author: Binju Bentex

Paper ID: V4I1-1181

Paper Status: published

Published: January 9, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X