Manuscripts

Recent Papers

Consumer Trend Prediction using Efficient Item-Set Mining of Big Data

Habits or behaviors presently prevalent amid customers of goods or services. Customer trends trail extra than plainly what people buy and how far they spend. Data amassed on trends could additionally contain data such as how customers use a product and how they converse concerning a brand alongside their communal network. Understanding Customer Trends and Drivers of Deeds provides an overview of the marketplace, analyzing marketplace data, demographic consumption outlines inside the group, and the key customer trends steering consumption. The report highlights innovative new product progress that efficiently targets the most pertinent customer demand states, and proposals crucial recommendations to capitalize on evolving customer landscapes.

Published by: Yukti Chawla, Parikshit Singla

Author: Yukti Chawla

Paper ID: V2I4-1153

Paper Status: published

Published: July 14, 2016

Full Details

A Novel Approach for Detection of Traffic Congestion in NS2

Traffic congestions are formed by many factors; some are predictable like road construction, rush hour or bottle-necks. Drivers, unaware of congestion ahead eventually join it and increase the severity of it. The more severe the congestion is, the more time it will take to clear. In order to provide drivers with useful information about traffic ahead a system must: Identify the congestion, its location, severity and boundaries and Relay this information to drivers within the congestion and those heading towards it. To form the picture of congestion they need to collaborate their information using vehicle-to-vehicle (V2V) or vehicle-to-infrastructure (V2I) communication. Once a clear picture of the congestion has formed, this information needs to be relayed to vehicles away from the congestion so that vehicles heading towards it can take evasive actions avoiding further escalation its severity. Initially, a source vehicle initiates a number of queries, which are routed by VANETs along different paths toward its destination. During query forwarding, the real-time road traffic information in each road segment is aggregated from multiple participating vehicles and returned to the source after the query reaches the destination. This information enables the source to calculate the shortest-time path. By allowing data exchange between vehicles about route choices, congestions and traffic alerts, a vehicle makes a decision on the best course of action.

Published by: Arun Sharma, Kapil Kapoor, Bodh Raj, Divya Jyoti

Author: Arun Sharma

Paper ID: V2I4-1152

Paper Status: published

Published: July 13, 2016

Full Details
Research Paper

Authentication using Finger Knuckle Print Techniques

In this paper, a new approach is proposed for personal authentication using patterns generated on dorsal of finger. The texture pattern produced by the finger knuckle is highly unique and makes the surface a distinctive biometric identifier. Important part in knuckle matching is variation of number of features which come by in pattern form of texture features. In this thesis, the emphasis has been done on key point and texture features extraction. The key point features are extracted by SIFT features and the texture features are extracted by Gabor and GLCM features. For the SIFT and GLCM features matching process is done by hamming distance and for the Gabor features matching is done by correlation. The database of 40 different subjects has been acquired by touch less imaging by use of digital camera. The authentication system extracts features from the image and stores the template for later authentication. The experiment results are very promising for recognition of second minor finger knuckle pattern.

Published by: Sanjna Singla, Supreet Kaur

Author: Sanjna Singla

Paper ID: V2I4-1151

Paper Status: published

Published: July 13, 2016

Full Details

A Robust Cryptographic Approach using Multilevel Key Sharing Paradigm

Cloud computing is a popular technology that provides services to the users on demand and on pay-per-usage fee that is they only pay for the data utilized when required. With the vast growth in the use of mobile phone applications, the users are relying on their phones for their personal as well as professional work and suffering from many problems (storage, processing, security etc). To overcome these limitations and growth in the use of cloud applications, a new development area has emerged recently called as Mobile cloud computing. Mobile cloud computing is an integration of three technologies cloud computing, mobile computing and internet, enabling the users to access the services at any time and from any place. Mobile phones are sensitive devices and the personal data is not secured when user stores data on cloud and can be easily attacked by unauthorized person. This paper presents a two level encryption through a mobile application that encrypts the data before moving it to the cloud that ensures the security and the users authentication.

Published by: Tajinder Kaur

Author: Tajinder Kaur

Paper ID: V2I4-1150

Paper Status: published

Published: July 13, 2016

Full Details

A Malicious Data Prevention Mechanism to Improve Intruders in Cloud Environment

We proposed a new model presents improved key management architecture, called multi-level complex key exchange and authorizing model (Multi-Level CK-EAM) for the Cloud Computing, to enable comprehensive, trustworthy, user-verifiable, and cost-effective key management. In this research, we will develop the proposed scheme named Multi-Level CK-EAM for corporate key management technique adaptable for the Cloud Computing platforms by making them integral and confidential. To add more security, there is a next step which includes Captcha, user has to fill the correct given Captcha which eliminates the possibility of robot, botnet etc. In addition, it also has to be created in way to work efficiently with Cloud nodes, which means it must use less computational power of the Cloud computing platforms.

Published by: Tajinder Kaur

Author: Tajinder Kaur

Paper ID: V2I4-1149

Paper Status: published

Published: July 13, 2016

Full Details

Arduino based Low Cost Power Protection System

In this paper, harmonics, noises, reactive power etc. are considered as major concerns. This paper presents the development of simple power quality software for the purpose of protection of any system under fault conditions. By designing virtual instruments using LabVIEW software, the real time data of hardware are fed to the software using Arduino for interfacing with LabVIEW. The software recognizes the different types of fault conditions based on pre set values and indicates the type of fault occurred in system. It also disconnects the equipments on load side. Testing results and analysis indicate that the proposed method is feasible and practical for protection of the system during fault conditions.

Published by: Anurag Verma, Mrs. Shimi S.L

Author: Anurag Verma

Paper ID: V2I4-1148

Paper Status: published

Published: July 13, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X