Manuscripts

Recent Papers

Review on Load Balancing Techniques for Mobile AD HOC Networks

Mobile Ad Hoc network is a group of nodes or a collection of nodes; they communicate with each other without any central administrator. Life of node as well as network is directly proportional with battery capacity. Lifetime of the node usually depends upon the load over the node. If a node is overly loaded, that means it is forwarding more packets and hence it might die out soon. So load balancing is another aspect to be considered while designing the routing scheme for mobile ad hoc networks. This paper presents the survey of various studies regarding the load balancing in the mobile ad hoc networks.

Published by: Harpreet Rupra, Rasbir Singh

Author: Harpreet Rupra

Paper ID: V3I3-1472

Paper Status: published

Published: June 19, 2017

Full Details

Big Data in Cloud Computing

This paper aims to provide definition, characteristics, and classification of big data along with environment for carrying net analytics in clouds for Big Data application. The relationship between the big data, cloud computing, big data storage systems, and Hadoop technology are also presented. This paper provides a comprehensives review of the big data state of the art, characteristics, management and research challenging aspects.

Published by: Mythreyee .S, Poornima Purohit, Apoorva D.R, Harshitha .R, Lathashree P.V

Author: Mythreyee .S

Paper ID: V3I3-1558

Paper Status: published

Published: June 16, 2017

Full Details

Efficient Use of Safety and Emergency Management on a Construction Site

Construction Industry in India has changed drastically during the last few decades. It is the second largest employing sector next to agricultural sector, but first in terms of accidents close to the road accidents. From the construction of building simple structures, roads and minor civil work projects, the construction industry has changed significantly over the last few decades. Safety on construction job site has been ignored by construction companies worldwide and particularly in countries where labour force is required. Due to increasing numbers of reported accidents and injuries on construction projects, safety is becoming an important issue in construction environment today; also safety is usually discarded by its operator.

Published by: Makarand P. Garole, Uday Phatak

Author: Makarand P. Garole

Paper ID: V3I3-1551

Paper Status: published

Published: June 16, 2017

Full Details

Hiding Information in Encrypted Video Stream by Using Code word Technique

To preserving the privacy as well as maintain security of video it needs to be stored in an encrypted format. For copyright protection, access control and transaction tracking we use information hiding techniques, that can be embedded a secret message and secret image into a video bit stream. The quality of video in the absence of the original reference assesses by information hiding techniques. The edge quality information and the no of the bit streams processed in an encrypted format to maintain security as well as privacy. In this paper hiding information directly in the encrypted version of H.264/AVC video stream is proposed. The proposed scheme contains the three main parts, i.e. encryption of video, embedding secret message and extraction of secret message and video. After analyzing the H.264/AVC codec property, the code words of intra prediction modes (IPM), the code words of motion vector differences (MVD), and the code words of residual coefficients are encrypted. The data hider embeds additional data in the encrypted domain, they use the code word substitution technique. The code word substitution technique gives information without knowing the original video content. After decryption of video secret message remains hidden, its invisible to a human observer. The extraction of data can be done either in the encrypted or in the decrypted domain.

Published by: Gote Yogita Ram, Prof. Ashruba Korde

Author: Gote Yogita Ram

Paper ID: V3I3-1539

Paper Status: published

Published: June 15, 2017

Full Details

Design and Analysis of Composite Tank with End Domes

The work is aims to establish an optimal design method of vacuum molded composite tank under internal pressure specifically for storage of LPG. In this geodesic path equation was used to calculate the variable thickness of the dome portions, instead of constant thickness throughout the structures. The head shape is obtained by the numerical solution of the elliptical integral. The finite element analysis was performed to identity of safest design cylindrical and dome portion of the structure. The stagnation of fiber matrix composite leads to the variable thickness dome. The experimental test of leak proof and the pressure test also carried out and the results also investigated.

Published by: Ramesh Kumar .M, S. Raja

Author: Ramesh Kumar .M

Paper ID: V3I3-1534

Paper Status: published

Published: June 15, 2017

Full Details

Designing and Performance Evaluation of a 3-Level Watermarking Based On Encryption and Compression

As the mobile handheld gadgets geared up with fingerprint sensors, it turns out to be important to protect the private records of a user (i.e., fingerprint image) in the remote applications. Virtual image watermarking is the process of hiding statistics in any shape (text, image, audio and video) in original image without degrading its visual quality. Watermarking is carried out for copyright protection of the authentic records. In this work, we have introduced a new concept with current gray-scale image watermarking strategies. The novelty of the method is that first we have compressed the cover image with the usage of wavelet compression method before going for the encryption of the same. After that we have encrypted the cover and watermark image that is based on random key array generation, the usage of consumer key, a few constants and fixed operations. The mixture of all 3 steps collectively made the proposed approach extra robust and more secure in term of watermarking as compression itself is pretty endorsed for facts transfer and information protection. Also, watermark is extracted with reverse application of the same steps. Some output parameters are also calculated to reveal the accuracy and robustness of proposed method. Those parameters are Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Correlation value between unique watermark image and extracted watermark image. The PSNR, MSE and Correlation values imply that the visual similarity of the signed and attacked images is right. Additionally, we've computed the behavior by clubbing the same watermark with different Cover images in terms of MSE, PSNR and Correlation Value and analyze the difference between authentic watermark and extracted watermark. The embedding algorithm is robust against common image processing operations. It is concluded that proposed algorithm is agreeably optimized, robust and show the development over different comparable said strategies.

Published by: Kirtika Gupta, C. S. Rai

Author: Kirtika Gupta

Paper ID: V3I3-1536

Paper Status: published

Published: June 15, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X