Manuscripts

Recent Papers

Survey of Various X-RAY Bone Image Segmentation Approaches

Photo segmentation is an foremost study subject considering the fact that it plays a major position in photo evaluation, and understanding. Segmenting an snapshot is essentially the most difficult and tricky assignment due to the fact that there exist exclusive objects and a tremendous variants between them using a common framework. Thresholding is likely one of the simplest segmentation strategies. The drawback of thresholding methods is that they may be able to be utilized to a single-band photograph, equivalent to a gray-scale image or a single band of a multi-band photograph. Area headquartered ways have shown to be very useful and effective segmentation methods in photograph processing. Nevertheless, they've over-segmentation tendency, require handbook initialization and are touchy to noise. Clustering system can be used for multi-band pics, however the number of groups need to be founded first. Classification-situated algorithm requires a training phase. Deformable units are less sensitive to noise than the opposite methods awarded in this paper, which make them compatible for problematic clinical picture segmentation problems. Atlas-situated approaches use prior potential in an effort to perform segmentation, but they are time-ingesting.

Published by: Sarita, Vikas Sandhu

Author: Sarita

Paper ID: V2I5-1183

Paper Status: published

Published: October 22, 2016

Full Details

Real Time Sign Language Recognition Systems: A Review

Alerts give a good watching, handy to fully grasp contrasting option to utilising a product unit like a console, mouse, and joystick brutal computer collaboration (HCI).Accordingly, the major factor of movement acknowledgment logical experiences are to fabricate a framework that can admire and have an understanding of targeted human motions naturally and make use of them to move on data (i.E., for informative use as in verbal exchange by way of gestures) or to control gadgets (at the finish of the day., manipulative utilize like in controlling robots without a physical contact). Possibly a standout amongst probably the most important standards for signal dialect acknowledgment is that normal signaling be bolstered by using the acknowledgment motor in order that a person can interface with the framework with none barriers. Considering a grouping of indicators is most likely mixed with co enunciation and inadvertent tendencies, these non-gestural developments must be disposed of from an information video before the recognizable proof of every motion in the association.

Published by: Sumit Sandhu, Sonia khatri

Author: Sumit Sandhu

Paper ID: V2I5-1182

Paper Status: published

Published: October 22, 2016

Full Details

Review on Encrypt the Text by MD5 and RSA in Client Cloud Approach

Cloud computing is one of the emerging technology which is showing continuous advancement in the field of networking. Cloud computing is defined by National Institute of Standards and Technology (NIST)[1] as a model for enabling ubiquitous, on demand network access to a shared pool of configuration computing resources (e.g. computer networks, servers, storage, applications and services) ,which can be rapidly provisioned and release with minimal management effort. It is gaining popularity in all the areas. But still by far cloud computing sharing is behind one expected because of the security concerns (unauthorized access, modification or denial of services, etc). In this research paper, the proposed work plan is to eliminate security concerns using cryptographic algorithm and hashing algorithm.

Published by: Adviti Chauhan, Jyoti Gupta

Author: Adviti Chauhan

Paper ID: V2I5-1181

Paper Status: published

Published: October 22, 2016

Full Details

Review on Detection of Gray Hole Attack in MANET

Mobile ad-hoc network(MANET) is a wireless network which has robust infrastructure. Mobile nodes can be used to form MANET. Arbitrary topology can be formed by connecting nodes with each other randomly. When source want to transfer packets to destination, a path being discovered for transmission. Sometime packet get dropped in path due to malicious node. Attack by malicious node is called gray hole attack. In this paper we detect the gray hole attack in the MANET. The detection and removal of the malicious node depends on the calculated probability of each node.

Published by: Geetanjali, Anupama Kumari

Author: Geetanjali

Paper ID: V2I5-1180

Paper Status: published

Published: October 22, 2016

Full Details

Hazards Reporting based on Real-Time Field Data Collection using Personal Mobile Phone.

Hazard is a situation or thing that has the potential to harm people's, property or the environment. Hazardous area cause many people health. So we must to prevent from it. We are develop hazard reporting system to prevent from hazard prob- lem. Important task of the Reporting is Data Collection.The Geo-spatial Data is used to Indicate the Data along with the geographic component.This means that the data set have loca- tion information tied to them such as geographical data in the form of coordinates,address,city,or ZIP code.User report to the organization by using the same data and organization solve that problem.

Published by: Jayanti Khutwad, Bindu Konde, Ashvini Deokate, Prof A.A.Kadam

Author: Jayanti Khutwad

Paper ID: V2I5-1179

Paper Status: published

Published: October 22, 2016

Full Details

Efficient Fingerprint Recognition using Wavelet Transforms

Fingerprints have long been used as a reliable biometric feature for private identification. Fingerprint classification refers to the matter of assignment fingerprints to 1 of many prespecified categories. Automatic classification may be used as a pre-processing step for fingerprint matching, reducing matching time and complexness by narrowing the search area to a set of a usually large info. Automatic fingerprint identification is one among the foremost vital biometric technologies. so as to expeditiously match fingerprints during a massive info, Associate in Nursing classification theme is critical. Fingerprint classification, that refers to assignment a fingerprint image into variety of pre-specified categories, provides a possible classification mechanism. In observe, but massive intra-class and tiny interclass variations in world pattern configuration and poor quality of fingerprint pictures build the classification drawback terribly tough. A fingerprint classification algorithmic program needs a sturdy feature extractor that ought to be ready to reliable extract salient options from input pictures

Published by: Jaspreet Kaur, Navleen Kaur

Author: Jaspreet Kaur

Paper ID: V2I5-1178

Paper Status: published

Published: October 21, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X