Manuscripts

Recent Papers

Railway Bridge & Track Condition Monitoring System

As railroad bridges and tracks are very important infrastructures, which has direct effect on railway transportation, there safety is utmost priority for railway industry. This project aims at monitoring the tracks on the bridges along with structural health condition of the bridge for accidents reduction. In this paper we introduces railway tracks and bridge monitoring system using wireless sensor networks based on ARM processor. We designed the system including sensor nodes arrangement , collecting data, transmission method and emergency signal processing mechanism of the wireless sensor network.. The proposed system reduces the human intervention, which collects and transmit data . The desired purpose of the proposed system is to monitor railway infrastructure for accident reduction and its safety.

Published by: Vinod Bolle, Santhosh Kumar Banoth

Author: Vinod Bolle

Paper ID: V2I4-1182

Paper Status: published

Published: August 12, 2016

Full Details

Security Enhancement of the Telemedicine and Remote Health Monitoring Models

The telemedicine applications are the application utilized for the remote monitoring and health assessment of the people living in the remote areas. The networks of the doctors and the field executives utilizes the various kinds of the healthcare sensors for the health checkup of the people by collecting and transmitting over the internet for the treatment of the affected ones. The information being propagated through the internet between the healthcare sensors and the online server model is always prone to the several forms o the attacks. In this paper, the proposed model has been designed to improve the level of security over the telemedicine network. The proposed model will be improved by using the robust encryption with the highly scrambled authentication key. The performance of the proposed model will be assessed under the various performance parameters which define the network health as well as the security level.

Published by: Nishu Dhiman, Tejpal Sharma

Author: Nishu Dhiman

Paper ID: V2I4-1181

Paper Status: published

Published: August 8, 2016

Full Details

Design of Low Area and Secure Encryption System using Combined Watermarking and Mix-column Approach

Lately, the significance of security in the data innovation has expanded fundamentally. This paper shows another proficient design for rapid and low range propelled encryption standard calculation utilizing part strategy. The proposed engineering is actualized utilizing Field Programmable Gate Array.

Published by: Swati Sharma, Dr. M. Levy

Author: Swati Sharma

Paper ID: V2I4-1178

Paper Status: published

Published: August 2, 2016

Full Details

Lexicon Analysis based Automatic News Classification Approach

The news classification approach is the primary approach for the online news portals with the news data sourced from the various portals. The various types of data is received and accepted over the news classification portals. The lexicon analysis plays the key role in the categorization of the news automatically using the automatic news category recognition by analyzing the keyword data extracted from the input image data. The N-gram news analysis approach will be utilized for the purpose of the keyword extraction, which will further undergo the support vector classification. The support vector machine based classification engine analyzes the extracted keywords against the training keyword data and then returns the final decision upon the detected category. The proposed model is aimed at improving the overall performance of the existing models , which will be measured on the basis of precision, recall, etc.

Published by: Kamaldeep Kaur, Maninder Kaur

Author: Kamaldeep Kaur

Paper ID: V2I4-1175

Paper Status: published

Published: August 1, 2016

Full Details

A Survey over the Critical Performance Analytical Study of the MANET Routing Protocols (AODV & TORA)

The mobile ad-hoc network (MANET) is the ad-hoc technology for the automatic connectivity of the nodes in the network cluster. The MANETs are considered as the infrastructure less technology, which uses the peer-to-peer connectivity mechanism for the establishment of the inter-links between the network nodes. The MANET data is propagated over the paths established through the routing algorithms. There are several routing algorithms, which are primarily segmented in the two major groups, reactive and proactive. The reactive networks are designed to query the path when its required, whereas the proactive routing protocol constructs the pre-computed route based routing table, which is utilized to propagate the data over the pre-derived links/routes. In this paper, the major routing protocols have been evaluated for their performance under the distributed denial of service (DDoS) attacks. The advance on-demand distance vector (AODV) and temporally ordered routing algorithm (TORA) protocols, which are considered as one of the best protocols. This paper focuses upon the assessment of the best routing protocol under the DDoS attack over the MANETs. The security and vulnerability analysis of the routing protocols plays the vital role in the security enhancement of the aimed routing protocols. The security evaluation has been based upon the targeted protocols based upon the various factors.

Published by: Manju, Mrs Maninder kaur

Author: Manju

Paper ID: V2I4-1174

Paper Status: published

Published: August 1, 2016

Full Details

Review of Brain Tumour Segmentation Approaches

Brain image segmentation is one of the most important parts of clinical diagnostic tools. Brain images mostly contain noise, in homogeneity and sometimes deviation. Therefore, accurate segmentation of brain images is a very difficult task. However, the process of accurate segmentation of these images is very important and crucial for a correct diagnosis by clinical tools. We presented a review of the methods used in brain segmentation. Reproducible segmentation and characterization of abnormalities are not straightforward. In the past, many researchers in the field of medical imaging and soft computing have made significant survey in the field of brain tumour segmentation

Published by: Nagampreet Kaur, Natasha Sharma

Author: Nagampreet Kaur

Paper ID: V2I4-1173

Paper Status: published

Published: July 30, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X