Manuscripts

Recent Papers

Research Paper

Multiplier and dual multiplier on BCC/weak BCC algebras

Presenting some significant properties of multiplier and dual multiplier defined on BCC/Weak BCC algebras.

Published by: Arbind Prakash, Dr. Ram Lakhan Prasad

Author: Arbind Prakash

Paper ID: V7I4-1610

Paper Status: published

Published: July 31, 2021

Full Details
Research Paper

Traumatic brain injury during covid lockdown and relaxation of lockdown comparative study

Road traffic accidents are the common cause of traumatic brain injury in civilian population covid lockdown had decreased head injury cases treated in a tertiary care center because of decreased traffic materials and methods traumatic head injury patients admitted in madras medical college during covid lockdown is compared with patients admitted after relaxation of lockdown by retrospective analysis.

Published by: Raj Kumar R.

Author: Raj Kumar R.

Paper ID: V7I4-1599

Paper Status: published

Published: July 30, 2021

Full Details
Research Paper

A State-of-the-Art Review on Differential Evolution (DE)

Proposing new mutation strategies and adjusting control parameters to improve the optimization performance of differential evolution (DE) are considered vital research studies. Therefore, in this paper, a short review of the most significant contributions on parameter adaptation and developed mutation strategies is presented.

Published by: Sanchari Majumdar, Sangita Roy

Author: Sanchari Majumdar

Paper ID: V7I4-1474

Paper Status: published

Published: July 30, 2021

Full Details
Research Paper

BIM applications in risk management

Risk Management at the Architecture, Engineering, and Construction (AEC) manufacture is a global problem. The inability to overseen hazards isn't only lead to tasks while gathering project objectives additionally arranging the land-use impacts and further planning the metropolitan spatial plan later on for the urban area development. Due to quick advancement and the BIM-related computerized advances and BIM (Building Information Modelling) selection, and then the hazard management innovation utilization becomes a develop and examination of prompting pattern of interest to an intensive review of the development. This paper provided the overview of conventional risk management, with a complete and broad survey of distributed writing concerning the most recent endeavors of overseeing hazard utilizing innovations, like BIM, programmed rule checking, information-based frameworks, proactive and receptive IT (data innovation)- based security frameworks. The discoveries show that BIM was not only just be used to help the venture advancement measure as a planned risk management apparatus, however, performing further risk analysis instruments based on BIM was permitted. The greater part of the current endeavours have focused on enquiring specialized turns of events, and the administration of development staff security was the primary interest up until this point. In light of existing specialized constraints and the absence of ''human factor" examinations, BIM-based hazard management is not regularly utilized in genuine conditions. To survive this hole, future exploration is recommended that ought to be: (1) having a multi-disciplinary framework of thinking, (2) investigating execution techniques and cycles, (3) incorporate conventional management of risk with new advances, and (4) supporting the improvement interaction.

Published by: Omar Ahmed Khan

Author: Omar Ahmed Khan

Paper ID: V7I4-1543

Paper Status: published

Published: July 30, 2021

Full Details
Research Paper

A lightweight Remote user Authentication Scheme for IoT communication using Elliptic Curve Cryptography

Internet of Things (IoT) has become a new era of communication technology for performing information exchange. With the immense increment of usage of smart devices, IOT services become more accessible. To perform secure transmission of data between IOT network and remote user, mutual authentication, and session key negotiation play a key role. User authentication is becoming crucial in accelerating the environment of internet of things (IOT).It is mostly used in several applications in management of surveillance, healthcare, security etc. In this project, the proposed model is based on ECC-based three-factor remote user authentication scheme that runs in the smart device and preserves privacy, and data confidentiality while communicating with the user.This model establishes a secure session between the user node and IOT node.Here three-factor authentication is performed between the remote user and the gateway as well as between the gateway and sensor node. ECC is a public key encryption technique based on an elliptic curve theory, in this model ECC is used to generate public key and private key at user, gateway and smart device and it is also conjunction with public key encryption techniques like ECDSA algorithm used to perform mutual authentication through digital signatures, ECDH used to create faster, smaller and more efficient symmetric keys in order to provide secure session environment. Finally, the computation and communication overheads of the proposed scheme are reduced to maximum extent to confirm that the proposed scheme is lightweight and secure. We prove the security strength of our proposed system using formal security analysis tool called AVISPA simulation tool. On implementing this tool, it determines that the proposed model is robust with holding various security threats like all active, passive attacks and then confirms its security in the presence of an intruder. It is found that our model holds all the security functionalities. Therefore, it can be concluded that the proposed scheme is secure against relevant existing security attacks and provides security.

Published by: Gudiwada Rajeswari, Pilla Anuradha, Suma Varada, Sireesha Mallula, Dr. Esther Sunanda Bandaru, D. Sowjanya

Author: Gudiwada Rajeswari

Paper ID: V7I4-1501

Paper Status: published

Published: July 30, 2021

Full Details
Research Paper

Study on dimensional stones available in Southern Asia with specific reference to granite waste

Dimensional stones are used primarily in buildings and construction industry. Almost all the buildings exhibit stones that are shaped, cut or polished for the walls, floors, columns and steps. There are a large number of dimensional stones available in southern Asia such as sandstone, slate, marble, granite, gneiss, etc. which produces huge amount of waste in their manufacturing, cutting and polishing. This waste is dumped in the fields openly and it causes major environmental problems such as land infertility, loss of land infiltration, air pollution, problem in breathing, etc. India has large reserves of granite and huge amount of waste is produced that’s why we have worked on granite specifically. Granite is a coarse grained rock composed mostly of quartz, alkali, feldspar and plagioclase. Green granite is hard enough to resist abrasion, strong enough to bear significant weight, inert enough to resist weathering and it accepts a brilliant polish. Granite is an igneous volcanic rock having good compressive strength and it has always been used in the concrete as a replacement for fine aggregate. But in this research, we have replaced the granite with the cementitious material that is, the cement. For this, we have replaced the granite with cement by 0%, 5%, 10% and 15%. Detailed study has been done to investigate the fresh, mechanical and physical properties of granite waste powder, the compatibility of use of granite waste powder in concrete. Analysis of the fresh, mechanical and physical properties of concrete mixes designed with different mix proportioning quantities with the use of granite waste powder as a cementitious material.

Published by: Mayur Mewara, Mansi Agarwalla, Madhu Yadav, Dr. Harshwardan Singh Chouhan

Author: Mayur Mewara

Paper ID: V7I4-1529

Paper Status: published

Published: July 30, 2021

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X