Manuscripts

Recent Papers

Research Paper

Design and fabrication of pipe bending machine

As we know that pipe bends are used in various household & industry things therefore it is necessary to build an economical pipe bending machine. It is also used in designing of various machine components, without this bending device a machine can’t work properly. As far as the industrial application is concerned it is used for piping purposes. The reason to design a bending machine is because there is no proper bending machine to bend a hallow pipe for small scale. Pipe bending machines are typically human-powered, pneumatic powered, hydraulic assisted, or electric servo motor. In the pipe bending operation the tube may be supported internally or externally to preserve the cross-section of the pipe. In this study, manually operated pipe bending machine is fabricated. This machine is used to bend pipes into circular shapes. The size of the machine is very convenient for portable work. It is fully made of mild steel. Moreover, it is very easy to be carried and used at any time and any place.

Published by: Sai Raghava P., U. Siva Nagaraju, G. Sai Durga Prasad, M. Gopiraju, P. Uma, P. Suresh, S. Kiran Kumar

Author: Sai Raghava P.

Paper ID: V6I3-1522

Paper Status: published

Published: June 18, 2020

Full Details
Research Paper

To analysis mechanical properties in a different composition of a cylindrical block

The hardness of the cylinder block is studied using Brinell-Hardness testing machine. Tooling problem occurred castings were collected for analysis. From which hardness testing carried by Brinell hardness testing machine and the hardness values observed with higher side against the specification. Followed by micro structure evaluation comparing with the ASTM A 247 standard. And the graphite form present Type D and E instead Type A graphite. Knowing the constituents present in it, properties of every single metal present in it, is studied and modifying the alloying elements; Copper (Cu) & Tin (Sn), as Pearlite structure and hardness greatly depends on it, the hardness of the cylinder block is improved. Hence, this could be easily distinguished by being compared as, before and after. The Before criteria, states a failure sample with a higher Cu and Sn composition along with the alloy composition, whereas, the After criteria, states an optimised sample with reduction of Cu and Sn composition along with the alloy composition of the analysed diesel engine block .

Published by: R. Karthikeyan

Author: R. Karthikeyan

Paper ID: V6I3-1531

Paper Status: published

Published: June 17, 2020

Full Details
Review Paper

Hybrid technique of data security by ECS (Encryption, Compression, Steganography)

The security of confidential data has long been a serious concern, and as a result, data security is in huge demand. Data is considered an important aspect of an asset and must be protected. Data Protection comprises data integrity, data authenticity, data confidentiality, and then some. Data is prone to possible security risks despite several measures for protecting data including steganography, encryption, and compression. The great reason is the disadvantages of these particular methods when certain factors are taken into account. Cryptography provides security, but it is expensive when time and space are considered. Compression methods encrypt data and save disk space, but attackers can easily decompress these compressed files. Steganography is a technique that hides data, does not encrypt it, and also has its advantages and disadvantages. This article details the approaches to data protection (compression, steganography, and compression) and their possible pros and cons. An extensive comparison between these techniques was generated and as a result, a hybrid approach called ECS (Encryption, Compression, and Steganography) was proposed. The proposed method utilizes particular approaches to overcome the limitations of existing techniques while also maintaining low complexity and minimal complexity and rich data security.

Published by: Shishupal Sidar, Gourav Chandel, Deepak Garg

Author: Shishupal Sidar

Paper ID: V6I3-1483

Paper Status: published

Published: June 17, 2020

Full Details
Research Paper

A system for profiling and monitoring database access patterns for application programs by anomaly detection

Database Management Systems (DBMSs) provide access control mechanisms that allow database administrators (DBAs) to grant application programs access privileges to databases. Though such mechanisms are powerful, in practice finer-grained access control mechanism tailored to the semantics of the data stored in the DMBS is required as a first-class defense mechanism against smart attackers. Hence, custom-written applications that access databases implement an additional layer of access control. Therefore, securing a database alone is not enough for such applications, as attackers aiming at stealing data can take advantage of vulnerabilities in the privileged applications and make these applications to issue malicious database queries. An access control mechanism can only prevent application programs from accessing the data to which the programs are not authorized, but it is unable to prevent misuse of the data to which application programs are authorized for access. Hence, we need a mechanism able to detect malicious behavior resulting from previously authorized applications. In this paper, we present the architecture of an anomaly detection mechanism, DetAnom, that aims to solve such a problem. Our approach is based on the analysis and profiling of the application in order to create a succinct representation of its interaction with the database. Such a profile keeps a signature for every submitted query and also the corresponding constraints that the application program must satisfy to submit the query. Later, in the detection phase, whenever the application issues a query, a module captures the query before it reaches the database and verifies the corresponding signature and constraints against the current context of the application. If there is a mismatch, the query is marked as anomalous. The main advantage of our anomaly detection mechanism is that, in order to build the application profiles, we need neither any previous knowledge of application vulnerabilities nor any example of possible attacks. As a result, our mechanism is able to protect the data from attacks tailored to database applications such as code modification attacks, SQL injections, and also from other data-centric attacks as well. If the data is attacked by the insider and he modifies the data, we could be able to recover the original file with the help of our mechanism. We have implemented our mechanism with a software testing technique called consoles testing and the PostgreSQL DBMS. Experimental results show that our profiling technique is close to accurate, requires an acceptable amount of time, and the detection mechanism incurs low run-time overhead.

Published by: Mohammed Ahmed Raza, Divya K., Kavya Jain B. S., Harsha N., Basavaraj Neelagund

Author: Mohammed Ahmed Raza

Paper ID: V6I3-1551

Paper Status: published

Published: June 17, 2020

Full Details
Research Paper

Retirement Community – A safe haven for the elderly

There was a time when senior care in India was confined to old age homes. These old age homes, often managed by charitable organizations provided shelter and basic facilities for older people of lower economic status. The concept of retirement homes was unheard of until a decade ago. This paper showcases seniors in India as a demographic segment, bringing out the key trends in senior housing. The entrenched social norm hints towards a moral obligation for children to assume the responsibility in caring for their aging parents. Retirement homes were perceived as the last – resort for older people who did not have anyone to care for them. However, the perception of a retirement home as a shelter for destitute older people is slowing changing. The main catalyst for this change is urbanization and changes to traditional family structure, while most continue to stay with their children, a large number of middle and upper-class seniors, especially those whose children have moved abroad or other cities for work, are opting to pack up their homes and move to ‘Retirement Communities’ or ‘Senior Living’ facilities to continue living independently to enjoy their post-retirement life without any hassle. This paper concludes with a discussion on the importance of retirement community in the present-day scenario as a boon for both children and aged parents, highlighting the gradual change in the stigma attached to it.

Published by: I. Simheca

Author: I. Simheca

Paper ID: V6I3-1543

Paper Status: published

Published: June 17, 2020

Full Details
Research Paper

Handwritten text pattern recognition

Character recognition from handwritten images is of great interest in the pattern recognition research community for their good application in many areas. To implement the system, it requires two steps, viz., feature extraction followed by character recognition based on any classification algorithm. A convolutional neural network (CNN) is an excellent feature of extractor and classifier. It is having multiple applications fields such as robotics, medicine, and security and surveillance. In this article, CNN is implemented for the NIST dataset with appropriate parameters for training and testing the system. The system provides accuracy of up to 94%, which is better with respect to others. It also takes a very low amount of time for training the system.

Published by: Anurag G., Deepak S. D., Harsha J. K., C. Sagar Patil, Hemalatha M.

Author: Anurag G.

Paper ID: V6I3-1541

Paper Status: published

Published: June 16, 2020

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X