Manuscripts

Recent Papers

Review Paper

Review of Approaches Under Water Image Enhancement

Because of the poor perceivability conditions nature of the world's seas is as yet not very much investigated for this reason Underwater picture improvement procedures are utilized, on the grounds that the earth is a sea-going planet and as the reality around 70%of its surface is secured by water. Presently a days there is a solid enthusiasm for recognizing what lies in submerged, and besides, this field has made a significance to the utilization of submerged successions to screen marine species, Underwater mountains and plants, to accomplish this reason it is totally important to utilize the unmistakable pictures. Here additionally talked about the impacts of shading in submerged pictures. Regarding light reflection, portrays that the impression of the light differs enormously relying upon the structure of the ocean. Another worry is identified with the water that twists the light either to make crease designs or to diffuse. In particular, the nature of the water controls and impacts the separating properties of the water, for example, sprinkle of the clean in water . Perceivability reclamation alludes to various strategies that expect to lessen or expel the decay or corruption that have happened while the computerized picture was being gotten

Published by: Karamjit Kaur, Rajnish Kansal

Author: Karamjit Kaur

Paper ID: V3I3-1335

Paper Status: published

Published: May 18, 2017

Full Details

A New Hybrid Approach on Face Detection and Recognition

Face detection and recognition is an important paradigm when we consider the biometric based systems. Among various biometric elements, the face is the most reliable one and can be easily observed even from a distance as compared to iris or fingerprint which needs to be closely observed to use them for any kind of detection and recognition. Challenges faced by face detection algorithms often involve the presence of facial features such as beards, mustaches, and glasses, facial expressions, and occlusion of faces like surprised or crying. Another problem is illumination and poor lighting conditions such as in video surveillance cameras image quality and size of an image as in passport control or visa control. Complex backgrounds also make it extremely hard to detect faces. In this research work, a number of methods and research paradigms pertaining to face detection and recognition is studied at length and evaluate various face detection and recognition methods, provide a complete solution for image-based face detection and recognition with higher accuracy, a better response rate as an initial step for video surveillance.

Published by: Saloni Dwivedi, Nitika Gupta

Author: Saloni Dwivedi

Paper ID: V3I3-1331

Paper Status: published

Published: May 18, 2017

Full Details

Implementation of an Efficient and Robotically Operated Home Automation System Using the Robustness of IOT

With the advancement of Automation technology, life is obtaining less complicated and easier in all aspects. In today’s world, Automatic systems are being most well-liked over the manual system. With the speedy increase within the variety of users of the web over the past decade has created the web a region and parcel of life, and IoT is that the latest and rising web technology. Internet of things may be a growing network of the everyday object-from industrial machine to the commodity which will share data and complete tasks whereas you're busy with alternative activities. Wireless Home Automation system (WHAS) victimization IoT may be a system that uses computers or mobile devices to regulate basic home functions and options mechanically through the web from anyplace round the world, an automatic house is generally referred to as a sensible home. It’s meant to avoid wasting the electrical power and human energy. The house automation system differs from the alternative system by permitting the user to work the system from anyplace round the world through web affiliation. In this paper, we have a tendency to gift a Home Automation system (HAS) victimization raspberry pi that employs the combination of cloud networking, wireless communication, to produce the user with remote of varied lights, fans, and appliances within their home and storing the info within the cloud. The systems can mechanically amendment on the premise of sensors’ information. This technique is meant to be low value and expandable permitting a spread of devices to be controlled.

Published by: Muthubharathi .R, Vigneshkumar .B, Durgalakshmi .K

Author: Muthubharathi .R

Paper ID: V3I3-1317

Paper Status: published

Published: May 18, 2017

Full Details

Cryptography- A Fundamental Tool for Directions of Research Process-An Overview

In Today’s, Digital communications Era sharing of information is increasing significantly. The Information being transmitted is vulnerable to various passive and active attacks. Therefore the information security is one of the most challenging aspects of communication. Cryptography plays an integral role in secure communication and it provides an excellent solution to offer the necessary protection against the Data Intruders. Over a period of time, Data encryption techniques took a massive leap from simple methods too complicated mathematical circulations. In order to achieve secure communications, however still with its complexity erypgraphic algorithms are prone to one or many attacks. Therefore this paper presents a detailed study about the Directions of safety, protection that leads to the Research process. The various symmetric key encryption techniques, its comparison, and the attacks to which they are vulnerable to.

Published by: Dr. V. Venkateswara Rao

Author: Dr. V. Venkateswara Rao

Paper ID: V3I3-1302

Paper Status: published

Published: May 18, 2017

Full Details

Campus Connect : Advanced QR based Identity Card

Educational institution in developing countries is a vast sector and it is expanding rapidly. With the rapid growth of technologies, educational institutions are still lagging behind. For identification of students they still lie on manual handwritten ID card and files. If proper ID card system is introduced then it would be much easier to identify a student and can track his/her progress. Therefore, in this research we implemented advanced using of QR code and student ID generation. We tried level best to make right implementation of QR code with student ID card. Automated student ID had image capturing facility and requirements of an ID and there is no need of hand written ID card. QR code is attached into ID card and student personal details can be found by scanning the QR code with smart phones (downloaded & installed QR reader software). QR code is said to be the next generation of bar code and using QR code with ID card brought positive outcomes. While using software tools, identity cards works fine and suitable for an educational institution as it is free. Thus, ID card will be a perfect use of modern technology in developing countries.

Published by: Muthuraj, Nagashayan, Thejaswi G. N, Rahulkumar Solanki

Author: Muthuraj

Paper ID: V3I3-1295

Paper Status: published

Published: May 18, 2017

Full Details

Effect of BG-II Cotton Hybrids and Non Bt Cotton on Weight of Different Instars of Spodoptera Litura (Fab.)

Laboratory evaluation of eleven Bt cotton cultivars expressing both Cry1Ac and Cry2Ab endotoxins (BT-II) and non Bt cotton on weight of first, second, third and fourth instar larvae of Spodoptera litura. Different plant parts were used i.e. leaves, squares and bolls at 60, 75, 90 and 125 days after sowing of the crop for bioassay. First instar larvae fed on leaves and bolls shows hundred per cent mortality. The final weight of the each instar was reduced at seven days after feeding when compared to non Bt cotton. Reduced in weight was more in case of first, second and third instar than fourth instar larvae. Among leaves, squares and bolls reduction in weight of all four instars was more on leaves followed by squares and bolls

Published by: Ramanjali Thirri, T. V. K Singh

Author: Ramanjali Thirri

Paper ID: V3I3-1273

Paper Status: published

Published: May 18, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X