Manuscripts

Recent Papers

High Security Data Hiding in Videos Using Multi-Frame, Image Cropping and LSB Algorithm

An art of invisible communication by embedding secret information in other sources like text, image, audio, and video is called steganography. A high security data hiding technique is proposed in this paper. Selected frames from the video are cropped into four equal parts, block of secret data is hiding in each three channels of crop of a frame using LSB technique in a predefined sequence, and then image crops are joined to get stego image/ frame. This stego frame is replaced in video in its original position. Comparative study is performed between proposed approach and existing approach using different metrics such as visualization test, MSE, PSNR and CPU time. Experimental results shows that the proposed approach is more secure compared to the existing approach.

Published by: Bharathi D. A, Anitha .P, Kiran S. M

Author: Bharathi D. A

Paper ID: V3I3-1402

Paper Status: published

Published: May 27, 2017

Full Details

Recognition of Online Handwritten Characters Using Lipi Toolkit

Handwritting deformation and complex structure has been one of the most challenging problems in handwritten recognition. In this paper a online handwritten recognition tool has been for recognition. Online handwriting data is collected as strokes, where a stroke is defined as the sequence of data points captured from the event of a pen-down to the subsequent pen-lift. Lipi toolkit engine is used to develop the character recognition system. Lipi toolkit is open source engine. Engine uses backpropagation and nearest neighbour for pattern classification and recognition which employs unsupervised learning algorithms. It has shown that the Lipi engine is feasible for online handwritten English character recognition to a certain degree.

Published by: Tanvi Zunjarrao, Uday Joshi

Author: Tanvi Zunjarrao

Paper ID: V3I3-1416

Paper Status: published

Published: May 27, 2017

Full Details

Extracting Deblur Image Using Fuzzy Logic Approach from Impulse Noise in Dip

Image processing is very crucial in today world because various noises, attacks, and many more problem faced by an image from transmitter to receiver side. By applying various algorithms and filters we can remove such type of noises and attacks. Blur detection techniques are very helpful in real life application and are used in image segmentation, image restoration and image enhancement. Blur detection techniques are used to remove the blur from a blurred region of an image which is due to defocus of a camera or motion of an object. Blurring is a form of bandwidth reduction of an ideal image owing to the imperfect image formation process. It can be caused by relative motion between the camera and the original scene, or by an optical system that is out of focus. Deblurring techniques are basically used to sharp an image using different methods & parameters so that we can abundant amount of knowledge. As we know there are various types of noises occurred in an image and to remove various techniques are used. Every technique is suitable for a particular noise and we cannot apply randomly to remove a particular noise. With advancement of time old technique are replaced by advanced method and today Fuzzy Logic is much more appreciated due to simple logic function and it is fourth generation technique

Published by: Renuka Yadav, Munesh Yadav

Author: Renuka Yadav

Paper ID: V3I3-1418

Paper Status: published

Published: May 26, 2017

Full Details

Analysis of Cooling Process for Data Centre’s at Africa

Among the most popular cyber centers, there are few problems that generally interrupts the process of complete automation and cooling process. Modern data centers are generally keen to a lot of neatness’s the industry consumes a lot of heat by consuming a huge amount of heat. So, for that, a substantial cooling process is required. This paper is basically a survey on the cooling process and also the human-automation on cyber centers and also a prototype networking software that helps cyber owners to forget their worries about the login and logout time of their customers. This system supports all types of human activities and also provides security and reliability. This paper based on the literature survey finds that Africa is lagging behind this scenario. It is based on Research and process for selecting the best location to build data centers for cloud providers in West Africa. This paper studies this problem by taking main considerations on Network performance, costs, and submarine cables.

Published by: Asha Yadav, Minakshi Memoria

Author: Asha Yadav

Paper ID: V3I3-1312

Paper Status: published

Published: May 26, 2017

Full Details

Aqua Silencer

Air pollution is large problem from the public health of view, because every individual person breaths approximately 22000 times a day, inhaling about 15 to 22 kg of air daily. Polluted air causes physical ill effects decide undesirable aesthetic and physiological effects. Air pollution can be defined as addition to our atmosphere of any material, which will have a dexterous effect on life. The main pollutant contribute by automobile are carbon monoxide (CO), unburned hydrocarbon (UBHC), oxides of nitrogen (NOx) and Lead. These toxic gases are harmful not only to atmosphere, but also to the human and animal race. The Pollution Control Aqua Silencer is used in the exhaust to direct the gas from the engine after going through the process of reducing the toxic gases and also water is used to reduce the exhaust noise. The objective of this project is to design and fabricate a simple system, where the toxin levels are controlled through chemical reaction to the more agreeable level. The whole assembly is fitted in the exhaust pipe; it does not give rise to any complications in assembling it. This system is very cost effective and more economical.

Published by: Nitish Kumar, Virendra Pal Singh, Sudhanshu Raj, S. P. Madnawat, Mohan Singh

Author: Nitish Kumar

Paper ID: V3I3-1368

Paper Status: published

Published: May 26, 2017

Full Details

A Survey of Multipath Routing protocols in Wireless Multimedia Sensor Networks

There has been an rapid development in the field of wireless senor networks(WSN) in the recent years. The development is mainly due to the availability of small size sensor cameras and microphones The advances in micro electromechanical systems have promoted the progress of a powerful class of sensor-based distributed intelligent systems skilled of ubiquitously retrieving multimedia information, namely Wireless Multimedia Sensor Networks (WMSNs).So the WMSN is the current topic of research due to its applications in various fields. In order to improve the channel utilization rate, reduce transmission delay and balance the transmission load in WMSN multipath routing is a promising solution. Multipath routing helps to transfer data concurrently by reducing the delay and congestion in WMSN. In this paper, various protocols and schemes are being discussed on multipath routing strategy which will identify the areas of further development for WMSN.

Published by: N. Kusuma, Dr. A. Subramanyam

Author: N. Kusuma

Paper ID: V3I3-1371

Paper Status: published

Published: May 26, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X