Manuscripts

Recent Papers

Twitter Stream Analysis for Traffic Detection in Real Time

Now a days,social networking are more popular.for example,twitter,Facebook etc.social networking are used forevent detection in real time.Real time events are traffic detection,earthquake monitoring.In this paper,we use the the twitter for real time traffic event detection.Firstly,the system extract the tweets from twitter and apply the text mining techniques on that tweets.those techniques are tokenization, stop-word removing,stemming.after that classify that on the basis of class label i.e traffic event or no traffic event.In this paper, we present an online method for detection of real-traffic events in Twitter data.

Published by: Rucha Kulkarni, Sayali Dhanawade, Shraddha Raut, Prof.D.S.Lavhkarer

Author: Rucha Kulkarni

Paper ID: V2I5-1186

Paper Status: published

Published: October 26, 2016

Full Details

Smart Wifi Dustbin System

We realize that Garbage causes damage to local ecosystems, and it is a threat to plant and human life. To avoid all such situations we are going to implement a project called IoT Based Smart Garbage."When somebody dumps trash into a dustbin the bin ashes a unique code, which can be used to gain access to free Wi-Fi". Sensor check garbage lls in dustbin or not and Router pro- vides Wi-Fi to user. Major part of our project depends upon the working of the Wi-Fi module; essential for its implementa- tion. The main aim of this project is to enhancement of a smart city vision.

Published by: Akshay Bandal, Pranay Nate, Rohan Mankar, Rahul Powar

Author: Akshay Bandal

Paper ID: V2I5-1185

Paper Status: published

Published: October 25, 2016

Full Details

Extracting News from the Web Pages by using Concept of Clustering with Neural Genetic Approach

Web news extraction is a investigation area which has been widely discovered. It has resulted in some systems which takes good extraction capabilities with little or no human involvement. The present system looks into the perception of web broadcast from a single web site which takes a equivalent format and the idea commonly is not as efficient when multiple web news pages are measured which go to altered sites. My work proposes a web extraction layout which is pretty same for maximum of the web news The purpose of web news extraction is to enhance information retrieval which provisions news articles associated to a particular event for competitive business analysis Researches in this area have shown many methods altered from the other based on the requirement, the extractor should be chosen. . In previous work they use unsupervised learning for extracting the news from web, but it compares the entire news pattern which extract so far. And in previous work did not work on the pattern of text in web which provide important information for classification and analysis of news from the web. Previous work extracting news is not complex process but classification of news take more time in processing. In previous work features will increase exponentially on the basis of unsupervised learning done. We reduce the complexity and increase the accuracy web news extraction by using text from web and classified by Cluster based supervised learning. to study and analysis of text mining and classifier on different parameters. To offered and implement pre-processing of web page by text mining and classified by cluster based supervised leaning. To learning the offered methodology by precision, recall, accuracy and F1 measure. The point of information accessible in the World Wide Web, it performs that the detection of quality data is graceful and simple but it has been a important matter of concern text mining is a field of researches and alterations. Online news classification has been challenge continuously in terms of manual operation. Data mining is procedure of determining interesting knowledge such as patterns, suggestions, changes, variances and important structures, from large amounts of data stored in database, data warehouse, or additional information sources. Information to the wide availability of massive amount of data in electronic form, and pending need for revolving such data into useful information and knowledge for broad application with market analysis, business administration and judgment support, documents mining has involved a great deal of devotion in information business in recent year.

Published by: Nishan Singh Saklani, Saurabh Sharma

Author: Nishan Singh Saklani

Paper ID: V2I5-1184

Paper Status: published

Published: October 25, 2016

Full Details

Survey of Various X-RAY Bone Image Segmentation Approaches

Photo segmentation is an foremost study subject considering the fact that it plays a major position in photo evaluation, and understanding. Segmenting an snapshot is essentially the most difficult and tricky assignment due to the fact that there exist exclusive objects and a tremendous variants between them using a common framework. Thresholding is likely one of the simplest segmentation strategies. The drawback of thresholding methods is that they may be able to be utilized to a single-band photograph, equivalent to a gray-scale image or a single band of a multi-band photograph. Area headquartered ways have shown to be very useful and effective segmentation methods in photograph processing. Nevertheless, they've over-segmentation tendency, require handbook initialization and are touchy to noise. Clustering system can be used for multi-band pics, however the number of groups need to be founded first. Classification-situated algorithm requires a training phase. Deformable units are less sensitive to noise than the opposite methods awarded in this paper, which make them compatible for problematic clinical picture segmentation problems. Atlas-situated approaches use prior potential in an effort to perform segmentation, but they are time-ingesting.

Published by: Sarita, Vikas Sandhu

Author: Sarita

Paper ID: V2I5-1183

Paper Status: published

Published: October 22, 2016

Full Details

Real Time Sign Language Recognition Systems: A Review

Alerts give a good watching, handy to fully grasp contrasting option to utilising a product unit like a console, mouse, and joystick brutal computer collaboration (HCI).Accordingly, the major factor of movement acknowledgment logical experiences are to fabricate a framework that can admire and have an understanding of targeted human motions naturally and make use of them to move on data (i.E., for informative use as in verbal exchange by way of gestures) or to control gadgets (at the finish of the day., manipulative utilize like in controlling robots without a physical contact). Possibly a standout amongst probably the most important standards for signal dialect acknowledgment is that normal signaling be bolstered by using the acknowledgment motor in order that a person can interface with the framework with none barriers. Considering a grouping of indicators is most likely mixed with co enunciation and inadvertent tendencies, these non-gestural developments must be disposed of from an information video before the recognizable proof of every motion in the association.

Published by: Sumit Sandhu, Sonia khatri

Author: Sumit Sandhu

Paper ID: V2I5-1182

Paper Status: published

Published: October 22, 2016

Full Details

Review on Encrypt the Text by MD5 and RSA in Client Cloud Approach

Cloud computing is one of the emerging technology which is showing continuous advancement in the field of networking. Cloud computing is defined by National Institute of Standards and Technology (NIST)[1] as a model for enabling ubiquitous, on demand network access to a shared pool of configuration computing resources (e.g. computer networks, servers, storage, applications and services) ,which can be rapidly provisioned and release with minimal management effort. It is gaining popularity in all the areas. But still by far cloud computing sharing is behind one expected because of the security concerns (unauthorized access, modification or denial of services, etc). In this research paper, the proposed work plan is to eliminate security concerns using cryptographic algorithm and hashing algorithm.

Published by: Adviti Chauhan, Jyoti Gupta

Author: Adviti Chauhan

Paper ID: V2I5-1181

Paper Status: published

Published: October 22, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X