Manuscripts

Recent Papers

Research Paper

Alternate Medicine Recommendation

On the Internet, where the number of choices is overwhelming, there is a need to filter, prioritize and efficiently deliver relevant information to alleviate the problem of information overload, which has created a potential problem for many Internet users. Alternate Medicine System solves this problem by searching through a large volume of medical information to provide users with filters and services. This project explores the different characteristics and potentials of different recommendation techniques in recommendation systems to serve as a compass for research and practice in the field of medical recommendation systems. In this project, we have used a dataset over 100+ medicines from different companies and brands to do recommendation based on the content of medicine and then filter it based on rating and cost-based analysis. Through experimental results, we have found that more than 95% of the medicines have a lower cost based alternative available with a higher rating.

Published by: Roshani R. Zamare, Shital P. Dhok, Sampada V. Babhulkar, Richa S. Singh, Jayshri G. Marbade, Nayan D. Bawane, Abhishek M. Shukla

Author: Roshani R. Zamare

Paper ID: V6I3-1621

Paper Status: published

Published: June 26, 2020

Full Details
Research Paper

Optimized social media customer support using machine learning with AWS

The rising popularity of social media communication can be witnessed everywhere. Not only individuals but companies too have noticed the importance of communication via social media and persist. Associations between customers and companies can be seen via social media. Customers might choose to publicize their opinions about a service or product via social media. Twitter is exceptionally used for is such cases. In this paper, we will exhibit how everyday customers are publicizing their items or taking the criticism for their items utilizing Web-based social networking systems like Twitter. In this procedure, the framework will consumer messages (tweets) and apply machine learning techniques (SVM, Porter stemming) to analyze the nature of the tweet via sentiment analysis. The results will be shown as tweets regarding positive, negative. We likewise will provide an automated response to the tweet (if found negative) and forward the message contents to the customer care email client for quick analysis and explicit response.

Published by: Supreeth Basabattini, N. Nikitha, Risita Kumar, Mathiyalagan R.

Author: Supreeth Basabattini

Paper ID: V6I3-1611

Paper Status: published

Published: June 26, 2020

Full Details
Review Paper

Review paper on the behavior of RC structure subjected blast load

As we know that nowadays the increase in the number of terrorist attacks especially in the last few years has shown the effect of blast load on buildings is a serious matter that should be taken into consideration in the design process. Although these kinds of attacks are exceptional cases, man-made disasters; blast loads are in fact dynamic loads that need to be carefully calculated just like earthquakes and wind loads. In that I have calculated the blast load manually by using IS code 4991-1968 and the analysis is carried out in multi-storeyed building by using STADD-Pro Software.

Published by: Diksha Menghare, Raju Bondre

Author: Diksha Menghare

Paper ID: V6I3-1608

Paper Status: published

Published: June 26, 2020

Full Details
Research Paper

Women’s mental health as a part of health and well-being in women and sustainable development

One among’ women and sustainable development’ goal is health and wellbeing, and also the term health, WHO states health as “a state of complete physical, mental and social wellbeing and not merely the absence of disease or infirmity”. Health is one of the highest things people say matters to wellbeing, both physical health and psychological state can influence wellbeing. The effect of wellbeing on health is substantial and admires other risk factors more traditionally targeted by public health like a healthy diet. Wellbeing and psychological state are correlated with depression and anxiety, which are related to low levels of wellbeing. Psychological state and wellbeing are independent dimensions; the psychological state is not simply the other of psychological state. We will easily find a someone’ with a mental disorder; while discussing women sustainable development in India, there are some programs through health like SARTHI, and PHC to supply proper enhancement and physiological state to those in need, based upon researchers objectives we must always create and supply awareness about the importance of health and women’s psychological state among adolescents and every other through the general public health centers, schools, colleges and then, but initially Social workers and sociologists can do their own contributions to the society like build up a correct knowledge and well awareness among their family.

Published by: Rehna K.

Author: Rehna K.

Paper ID: V6I3-1331

Paper Status: published

Published: June 26, 2020

Full Details
Others

Achieving Single Sign-On (SSO) using federated repositories

Application Server Agent (ASA) & Trust Association Interceptors(TAI) set up for Single Sign-On. ASA and TAI are critical parts when implementing Single Sign-On in a multiple federated Light Weight Directory Protocol’s environments. There needs to be a presence of web agents on the web servers to intercept the web requests and an ASA agent on the Application Servers to intercept the Application Server’s requests. Then you enable TAI on your Application Servers to intercept the requests and perform Single Sign-On. We need to understand the request flow to achieve a successful Single Sign-On authentication. The key to achieve SSO is to intercept the user requests and update the HTTP headers with LTPA or other authentication tokens from Application1 to successfully authenticate onto Application2. Single-Sign-On between any two or multiple systems can be achieved in a Federated repository configuration.

Published by: Mallikarjuna Akkinapalli

Author: Mallikarjuna Akkinapalli

Paper ID: V6I3-1609

Paper Status: published

Published: June 26, 2020

Full Details
Survey Report

A survey on various encryption techniques

Cloud computing and social network change the way of healthcare by providing real-time data sharing in a cost-effective manner. Data sharing in the cloud is a technique that allows users to conveniently access data over the cloud. The data owner outsources their data in the cloud due to construction and the great conveniences provided by cloud services. The data owner is not able to control over their data, because the cloud service provider is a third-party provider. The main crisis with data sharing in the cloud is the privacy and security issues. Various techniques are available to support user privacy and secure data sharing. This paper focuses on various schemes to deal with secure data sharing such as identity-based encryption, proxy Re-encryption, ciphertext-PolicyAttributeBasedEncryptionandattributeBased Encryption.

Published by: Abymol Thankachan, Alpha Mathew

Author: Abymol Thankachan

Paper ID: V6I3-1600

Paper Status: published

Published: June 26, 2020

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X