Manuscripts

Recent Papers

Research Paper

Fluidized bed with heat exchanger: An advance equipment for moisture removal from coal

In the rainy season, the coal from coal mines are totally wet and it takes lots of time (10 to 12 days) to get dry. Such type of coal cannot be used for the boiler. The Additional new equipment fluidized bed with heat exchanger for removal of coal moisture can be used. If CHP will work on such advanced equipment which is reliable and have less maintenance cost then the efficiency of the plant get an increase. In the present paper, the advance coal handling unit consists of a fluidized bed with heat exchanger. An integrated solution of coal handling plant is given to meet the increasing production needs.

Published by: Nilesh V. Pise, V. V. Dongaonkar, Shubham R. Lonkar, Akash A. Kolhe

Author: Nilesh V. Pise

Paper ID: V5I2-2052

Paper Status: published

Published: April 23, 2019

Full Details
Research Paper

A novel approach for indoor-outdoor scene classification using transfer learning

Scene understanding and analysis has gained significant importance and widely used in computer vision and robotics field. Classification of complex scenes in a real-time environment is a difficult task to solve. Convolution Neural Networks (CNNs) is a widely used deep learning technique for the image classification. But the training of CNNs is not an easy task since it requires large scale datasets for training. Also, the construction of CNN architecture from the scratch is a complex work. The best solution for this problem is employing transfer learning which gives desired result with small scale datasets. A novel approach of Alexnet based transfer learning method for classifying images into their classes has been proposed in this paper. We selected 12 classes from publicly available SUN397 dataset out of which 6 are indoor classes and the remaining 6 are outdoor classes. The model is trained with indoor and outdoor classes separately and the results are compared. From the experimental results we found that the model exhibited the accuracy of 92% for indoor classes and 98% for outdoor classes.

Published by: A. Yashwanth, Shaik Shammer, R. Sairam, G. Chamundeeswari

Author: A. Yashwanth

Paper ID: V5I2-2051

Paper Status: published

Published: April 23, 2019

Full Details
Research Paper

An implementation framework for real-time spam detection in Twitter

With the expanded prominence of online informal community, spammers discover these stages effectively available to trap clients in noxious exercises by posting spam messages. In this work, we have taken the Twitter stage and performed spam tweets identification. To stop spammers, Google Safe Perusing and Twitter's BotMaker instruments identify and square spam tweets. These instruments can square noxious connections, anyway, they can't ensure the client continuously as ahead of schedule as could be expected under the circumstances. Along these lines, businesses and specialists have connected diverse ways to deal with make spam free informal community stage. Some of them are just founded on client-based highlights while others depend on tweet based highlights as it were. Nonetheless, there is no extensive arrangement that can solidify tweet's content data alongside the client based highlights. To illuminate this issue, we proposed a system which takes the client and tweet based highlights alongside the tweet content component to order the tweets. The advantage of utilizing tweet content element is that we can recognize the spam tweets regardless of whether the spammer makes another record which was unrealistic just with client and tweet based highlights. We have evaluated our solution with two different machine learning algorithms namely – Support Vector Machine and Random Forest. We are able to achieve an accuracy of 86.75% and surpassed the existing solution by approximately 17%.

Published by: Poornima N. C.

Author: Poornima N. C.

Paper ID: V5I2-2050

Paper Status: published

Published: April 23, 2019

Full Details
Research Paper

A secure client side deduplication scheme in cloud storage environments

Freshly identified and endorsed the trend of holding cloud-based services for large scale content storage, processing, and distribution. Security is the top concerns for open cloud environments. Towards these security challenges, we propose and implement, on Open Stack Swift, a new client-side deduplication scheme for securely storing and sharing outsourced data via the public cloud. The originality of our proposal is twofold. First, it ensures better confidentiality towards unauthorized users. That is, every client computes a per data key to encrypt the data that he intends to store in the cloud. hence, data access is with the data owner. Second, by accessing rights in the metadata file, an authorized user can decipher an encrypted file only with his private key. It elaborates a computationally low-cost method for making all log entries generated prior to the logging machine's compromise impossible for the attacker to make an attempt and also impossible to undetectably modify or destroy.

Published by: Prateek Naharia, Eshan Pacheriwala, Soumyajyoti Dutta, M. Vinodhini

Author: Prateek Naharia

Paper ID: V5I2-2049

Paper Status: published

Published: April 23, 2019

Full Details
Review Paper

Noise reduction in electrocardiogram using LMS algorithm based on adaptive filtering

This project tells about the algorithms of adaptive filters which is for reduction of noise in these heat waves. There are different types of algorithms like NLMS, LMS, and RLS. In those types there are only LMS is used mostly for noise reducing because it produces low MMSE than all of those algorithms so for the best accuracy the LMS algorithm is used. By using mat lab we calculate the performance. The measures we calculated in mat lab is in range of convergence value and MMSE value. When we decrease the step size of noise will also decrease. If it is increased convergence value to increases, then the rate of noise also will increase.

Published by: Jayaprakash A., Manikanta Sai G., Satya Praveen P., Vishnu Teja I., Mohammed Arif A.

Author: Jayaprakash A.

Paper ID: V5I2-2012

Paper Status: published

Published: April 23, 2019

Full Details
Research Paper

Extensions of Kannan Fixed-Point theorem on complete metric spaces and on generalized metric spaces

In this paper we get sufficient conditions for the existence of unique fixed point of Kannan type mappings on complete metric spaces and on generalized complete metric spaces depended on another function.

Published by: Dharmendra Singh Rajput, Anil Rajput, Rucha Athaley

Author: Dharmendra Singh Rajput

Paper ID: V5I2-2007

Paper Status: published

Published: April 23, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X