Manuscripts

Recent Papers

Review Paper

Strengthening of weak soil against soil liquefaction

Liquefaction is one of the main concerns of the geotechnical network just as those associated with the building and advancement of the basic establishment. Liquefaction is a phenomenon in which the quality and stiffness of soil are diminished by earthquake shaking or another quick loading. Liquefaction and related phenomenon have in a charge of colossal measures of damage in historical earthquakes tremors the world over.

Published by: Nidhi Singh, Rajat Yadav, Rahul Jha, Rachana Kumari

Author: Nidhi Singh

Paper ID: V6I3-1208

Paper Status: published

Published: May 14, 2020

Full Details
Others

The role of indexing agencies and parameters in research

This paper addresses the indexing and its importance to a researcher—a report of indexing and indexing parameters of various indexing agencies. Today, various abstracting and indexing services are available. Most are affiliated with institutions (e.g., PubMed held at the National Institute of Health by the United States National Library of Medicine), and others are provided by publishers (e.g., Scopus by Elsevier).

Published by: Anju S.

Author: Anju S.

Paper ID: V6I3-1207

Paper Status: published

Published: May 14, 2020

Full Details
Case Study

Detecting hate speech and offensive language on Twitter using Machine Learning

In this work, we argue for a focus on the latter problem for practical reasons. We show that it is a much more challenging task, as our analysis of the language in the typical datasets shows that hate speech lacks unique, discriminative features and therefore is found in the ‘long tail’ in a dataset that is difficult to discover. We then propose a Deep Neural Network structure serving as feature extractors that are particularly effective for capturing the semantics of hate speech. Our methods are evaluated on the largest collection of hate speech datasets based on Twitter and are shown to be able to outperform state of the art by up to 6 percentage points in macro-average F1, or 9 percentage points in the more challenging case of identifying hateful content. This aims to classify textual content into non-hate or hate speech, in which case the method may also identify the targeting characteristics (i.e., types of hate, such as race, and religion) in the hate speech.

Published by: S. Avinash, Satarup, Nilanjana Adhikary

Author: S. Avinash

Paper ID: V6I3-1195

Paper Status: published

Published: May 14, 2020

Full Details
Case Study

C-Shaped canal management in endodontics

Introduction: Thorough knowledge of the root canal morphology is essential for successful endodontic therapy. C-shaped canal configuration is commonly seen in mandibular second molars. These canals are challenging to negotiate, debride, and obturate because of the high incidence of anastomoses, lateral canals, and apical deltas. The inability to detect and debride C-shaped canal anatomy can lead to endodontic failure. Case report: This case report highlights the management of a case of C- shaped canal configurations using thermoplastics gutta-percha technique. Conclusion: Complex intricacies and diverse morphology of C shaped canals can be managed with advanced irrigation and obturation techniques.

Published by: Dr. Madhuri B. Wavdhane, Dr. Pradnya V. Bansode, Dr. Seema D. Pathak, Dr. Sameer S. Khedkar

Author: Dr. Madhuri B. Wavdhane

Paper ID: V6I3-1173

Paper Status: published

Published: May 14, 2020

Full Details
Review Paper

Security issue in watermarking: An overview

This paper provides the conceptual framework on image watermarking which is widely used for security purposes within the epoch of data and Communication Technology. Image watermarking is predicated on the concept that the signal may carry several different watermarks at the identical time. The signal is also audio, pictures or video. A security issue in watermarking is because of the enlargement of the internet within the present paper the primary phase detailed description of watermarking has been on condition that data set are prepared on which watermarking technique is executed. In the second phase detailed working of the various techniques of image watermarking have to locate a selected watermarking technique which is able to provide appropriate ends up in term of PSNR and interval and various attacks are tested on images so implemented method must stand against various attacks. In the third or final phase reverse processes are executed to extract host and watermark images. There are many viable attacks. Spotting is an algorithm that is applied to the attacked signal to infusion the watermark from it. During this research paper, it focused to increase the worth of PSNR because in existing techniques It's clear from the assessment that the proposed technique is long way stable than the prevailing technique.

Published by: Mansi

Author: Mansi

Paper ID: V6I3-1144

Paper Status: published

Published: May 14, 2020

Full Details
Case Study

Three-dimensional additive manufacturing

The technology we used in this project was once a dream dreamt by several people, wondering whether they could bring their imagination into reality. This report gives us detailed information about using a three-dimensional printer to create an object. The method we have used here is FDM(Fused Deposition Modelling).

Published by: Jayasangeetha J., Swarna Pragna, Marlapati G. Pravallika, M. Jayashree

Author: Jayasangeetha J.

Paper ID: V6I2-1464

Paper Status: published

Published: May 13, 2020

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X