Manuscripts

Recent Papers

Dissertations

Home made daily use personal care products

Personal care is a broad term used to refer to supporting with personal hygiene and toileting, along with dressing and maintaining your personal appearance. Personal care includes products as diverse as cleansing pads, colognes, cotton swabs, cotton pads, deodorant, eyeliner, facial tissue, hair clippers, lip gloss, lipstick, lip balm, lotion, makeup, hand soap, facial cleanser, body wash, moisturizer, talcum powder, toilet paper, toothpaste, facial treatments, wet wipes, and shampoo. As these products include mica, parabens, triclosan, fluoride and other harmful chemicals that cause skin cancers and other diseases, we have tried to find out a solution to end the usage of such chemical products in an effective way. Here we have prepared daily use personal care products like face powder, lip balm, kajal, soap, and toothpaste using natural ingredients. Ingredients used for preparation of face powder are-cocoa powder, arrowroot powder, cinnamon powder; lip balm-beetroot, vaseline, oil, vitamin E capsule; kajal-cyanthiliumcinereum, castor oil, anjanaston; aloe vera soap-aloe vera, soap base, basil leaves, basil leaf extract, vitamin E capsule, vaseline; toothpaste-coconut oil, baking soda, neem extract, turmeric powder and salt.

Published by: Jesna John, Helen Vincent, Sarika V. Rajan, Gopika N. G., Anu Maria Wilson, Arathi C. V.

Author: Jesna John

Paper ID: V5I6-1184

Paper Status: published

Published: November 28, 2019

Full Details
Research Paper

The required engineering skills for saudi labor market after automation

This paper aims to explore the required engineering skills in the Saudi labor market before and after automation. For this purpose, data were collected from 230 participants from different engineering sectors with a structured questionnaire. The data were coded and analyzed using SPSS software. The researcher found that the existing labor market skills are teamwork, verbal communication, willingness to learn, understanding, and taking directions for work assignments. Skills required after automation are: computer skills, technical skills, ability to use modern tools and equipment, the ability to design a process to meet desired objectives. The researcher recommends that curriculum reform as part of an automation strategy to improve labor market skills.

Published by: Yasir Al Hujaili, Ali Rizwan

Author: Yasir Al Hujaili

Paper ID: V5I6-1202

Paper Status: published

Published: November 26, 2019

Full Details
Research Paper

Cursor tracking by sensory organs for handicapped people

A vision primarily based Human–Computer interface is conferred during this paper. The utilized image process ways embrace digital camera for investigation the face, and example matching method-based eye region detection. SVM classification methodology is employed for classifying the attention movements. The classification of eye movements like eye open, eye close, eyeball left, and eyeball right movements area unit used for indicator high, bottom, left and right movement severally. The interface relies on a notebook equipped with a typical internet camera and needs no further lightweight sources. All of these devices need manual management and can't be utilized by persons impaired in movement capability. There's a necessity for developing different ways of communication between human and laptop that might be appropriate for the persons with motor impairments and would provide them the chance to become a section of the knowledge Society. In Hough rework, circular methodology is employed to regulate the indicator movements. This technique is employed for physically disabled persons to work with the computers effectively just by their face movements.

Published by: Venuu Maadhav V. R., Anirudh Parlapalli, Vardhan Reddy, Swarnalatha P.

Author: Venuu Maadhav V. R.

Paper ID: V5I6-1167

Paper Status: published

Published: November 26, 2019

Full Details
Review Paper

Solar powered agricultural dryer

Sun-powered drying of horticultural item is significant and most practical response to the world's nourishment drawback includes decreasing the nourishment misfortune, that happens on account of various reasons like absence of fitting innovation, ill-advised development and treatment, absence of selling channels, ill-advised transportation, high post collect misfortunes, and so on., dispensing a nourishment misfortune from ten to four-hundredth. The nourishment conservation by star drying is that the exclusive method to decrease the nourishment misfortune that is being embraced for a few centuries.(M.V. Ramana Murthy ., 2008). various types of star dryers had been intended to beat this drawback. the kind of drier relies upon the product and subsequently the drying strategy required for that particular style of item. basically the drying strategy includes the relocation of water from within the product to be dried on to the surface for its dissipation and along these lines, it's a warmth and mass exchange improvement (P.Barnwal et al., 2008). The convective warmth move consistent is a significant parameter that decides the glow and mass move. The convective warmth moves steady changes from harvest to edit and in this way the method of drying. just if there should be an occurrence of unpracticed chilies the convective warmth one.31 W/m2 K, (Anwar et al., 2001a,b). the fundamental embodiment of drying is to reduce the wet substance of the product to review that thwarts disintegration among a careful measure of your time. Drying might be a twin strategy for - heat move to the product from the warming stockpile. What's more, mass exchange of wet from within the product to its surface and from the surface to the circling air (O.V Ekechukwu et al1999).

Published by: Aakarshit Sharma, Shivam Ganju

Author: Aakarshit Sharma

Paper ID: V5I6-1185

Paper Status: published

Published: November 25, 2019

Full Details
Review Paper

Survey on text-to-speech Kannada using Neural Networks

In this paper, we have explained the different approaches of text-to-speech conversion for Kannada language using Neural Networks. Text-to-speech conversion (TTS) has a wide variety of applications like it serves as an effective aid to the visually impaired by offering a computer-generated spoken voice that would “read” text to the user. TTS can also be used as an interactive educational appliance, as an assistant, etc. The application field of synthetic speech is expanding fast while the quality of the TTS system is also increasing steadily. Text-To-Speech conversion using Neural Networks is found to be more accurate when compared to many other methods like Concatenation, Digital Signal Processing, Articulatory Synthesis, etc. The different approaches of neural networks that we have mentioned in this paper explain its own methodologies, its applications and also its pros and cons.

Published by: Pawan S. Nadig, Pooja G., Kavya D., R. Chaithra, Radhika A. D.

Author: Pawan S. Nadig

Paper ID: V5I6-1159

Paper Status: published

Published: November 25, 2019

Full Details
Research Paper

Efficient and effective keyword search over encrypted data in cloud

Searchable Encryption (SE) systems provide cloud information with safety and privacy. The current SE methods allow multiple users to search using various systems such as Broadcast Encryption (BE), Attribute-Based Encryption (ABE), etc. These systems, however, do not allow various users to conduct the search procedure over various owners ' encrypted information. Some SE systems require a Proxy Server (PS) that allows various users to search. However, these approaches incur a huge computational burden on PS due to the repeated encryption of the user queries for transformation purpose to ensure that users’ query is searchable over the encrypted data of multiple owners. Therefore, this project recommends a safe proxy server strategy to eliminate this computational burden on PS that conducts the search procedure without transforming user queries. This method also returns appropriate top-k records to user queries using a similarity method to Euclidean distance. This strategy is effective in terms of search time and precision based on the experimental study. This scheme does not allow making search operations over the data owned by multiple owners that is do not supports search operations in multiple owners and multiple user environments. So we proposed in this project half encryption-based multi-user keyword search over encrypted cloud data. In this project, the data owner creates an index for each document. It encrypts the document collection and sends the encrypted documents over to the cloud server. The words in the indices are partially encrypted with the owner’s secret key and then these indices are sent to the proxy server. This project we have proposed two algorithms IBE algorithm to perform the Encryption. Top Rank, the files, and another algorithm is the TF/IDF algorithm which calculates the term frequency of each keyword.

Published by: Padma Atmakuri, T. G. Ramnadh Babu

Author: Padma Atmakuri

Paper ID: V5I6-1191

Paper Status: published

Published: November 23, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X