Manuscripts

Recent Papers

Thesis

Suicide terrorism – Physical and mental destruction

Suicide terrorism is a troublesome phenomenon for all of us, the masses, to conceptualize and to entirely understand. Its very presence appears to straightforwardly negate quite a bit of what we think about fundamental human survival impulses, which obviously has consequences for the mannerisms by which we look to gauge such elusive factors as radicalization and ideological duty. Our comprehension of suicide psychological warfare can likewise shift contingent upon whether it depends on the subjective examination of specific contextual investigations, some other experimental strategy, or assaults executed by explicit gatherings or sorts of gatherings, groups, mental institutions. Terrorist activities and government responses to them portray a strong and dynamic transaction, with the moves of one side affecting those of the other. As one model, if any terrorist organization attacks and a state sends in their arms and army as the power to send a rebuffing message back, the terrorists may utilize that activity to negatively persuade the commoners or the mob, resulting in turning the mob against the state. This is seen happening on the grounds of communal bias, power trip, inhumane methods of segregation from the nation which would only conclude in angering the civilians as well. Therefore, the findings would only address the terrorist activities and neglect the other end as that is something subject to the less important part of humanity and our community. Terrorism isn't legitimately characterized in all locales; the rules that do exist, in any case, by and large offer some normal components. Terrorism or lethal acts, to be psychological or physical violence include the utilization or danger of viciousness and looks to make fear, inside the immediate exploited people as well as among a wide gathering of people. How much it depends on dread recognizes fear based oppression from both traditional and guerrilla fighting. No doubt, customary military powers perpetually participate in fighting against the foe, their key methods for triumph is quality of arms. With the end goal to draw in and keep up the exposure important to produce across the board fear, terrorists must participate in progressively emotional, vicious, and prominent assaults. These have included hijackings, hostage takings, kidnappings, vehicle bombings, and, habitually, suicide bombings. Albeit, clearly arbitrary, the people in question and areas of fear-based terrorist groups or organizations assaults frequently are precisely chosen for their stun esteem. Schools, malls, transport and train stations, and eateries and dance club have been focused on both on the grounds that they pull in substantial groups and in light of the fact that they are places with which individuals from the non-military personnel populace are commonplace and in which they feel calm. The objective of terrorism, by and large, is to obliterate general society's feeling that all is well with the world in the spots most commonplace to them. Real targets some of the time additionally incorporate structures or different areas that are vital monetary or political images, for example, government offices or army bases.

Published by: Pranshu Kabra

Author: Pranshu Kabra

Paper ID: V5I2-2121

Paper Status: published

Published: April 26, 2019

Full Details
Research Paper

An efficient approach for sarcasm detection in tweets using polarity flip

Sentiment analysis is the qualitative method that uses natural language processing, text analysis, and computational linguistics. The goal of sentiment analysis is to determine if a specific passage in the text shows positive, negative or neutral sentiment towards the subject. Social media platforms, like Twitter, offer a wide ability that allows users to express their thoughts by employing figurative language devices such as sarcasm to achieve different communication purposes. Dealing with such kind of content represents a big challenge for computational linguistics. Due to these difficulties and the inherently tricky nature of sarcasm, it is generally ignored during social network analysis. As a result, the outcome of such analysis is affected adversely. Also, nowadays, Customers use twitter as a platform to express their emotions and opinions about social issues, products or services. Lexicon based methods of text mining can at times fail to recognize sarcasm used by customers online. This has direct implications for companies using text mining on online content to identify new customers, address customer problems, and reduce customer turn rates or for any other CRM (Customer Relationship Management) activities. Thus, sarcasm detection poses to be one of the most critical problems which we need to overcome while trying to yield high accuracy insights from abundantly available data. This work considers sarcastic tweets (including those based on products) and proposes an effective approach to detect sarcasm. The system utilizes 21 features based on context, contrast, and emotions. The results show that sarcastic tweets inclined to have more polarity flips than Non-sarcastic tweets. Also, it is found that MLP and the Random Forest classifier tend to perform better than other classifiers with an accuracy of 94%.

Published by: Karthika K.

Author: Karthika K.

Paper ID: V5I2-2114

Paper Status: published

Published: April 26, 2019

Full Details
Research Paper

Effect of demographic variables on emotional intelligence: A study on college students in Visakhapatnam

This study is aimed to examine the effect of demographic variables (age, qualification, and community, of gender and socio-economic status) impacts on emotional intelligence among early adulthoods. A sample of 116 graduate and post graduate college students both male and female at 18-25 years age group students participated in this study. Descriptive statistics and t test findings revealed thatthis emphasizes the role of financial status and community of a person on his/her which is directly influence on the areas of Adaptability and sensitivity which are domains of emotional intelligence.

Published by: Subhashini Akurathi, P. Swathi, G. Ravi Kumar

Author: Subhashini Akurathi

Paper ID: V5I2-2107

Paper Status: published

Published: April 26, 2019

Full Details
Review Paper

A review on geopolymer using fly ash and GGBS

If we talk about today’s era, Concrete is the most important aspect in the present scenario in terms of construction. All the construction is being done with the help of this building material. Use of cement is rising on the peak from the last few decades due to the enormous demand for construction of megastructures all around the globe. In addition to that cement is the only material whose demand is increasing day by day in order to meet the needs of mankind. Subsequently, the price of cement is also increasing as its demand is increasing profoundly and also it available limited only. Manufacturing of cement results in the emission of CO2 and other gases which contribute to global warming and which further contribute to climate change and thus it is one of the most complicated material. Its use cannot be stopped but can be limited by using various materials. In order to dilute the use of cement, various alternatives and substitutes have been manufactured which is contributing to less pollution as compared to cement. Since cement cannot be fully replaced, it has been partially replaced with geopolymer using fly ash and GGBS.

Published by: Baljot Kaur

Author: Baljot Kaur

Paper ID: V5I2-2072

Paper Status: published

Published: April 25, 2019

Full Details
Case Study

The impact of various child-centric NGOs in the city of Vellore

In this paper, we discuss the impact of various child-centric Non-Governmental Organizations present in our city. This will help volunteers to choose better organizations for their efforts and at the same time provide a platform for the organizations to improve their mistakes. Over the past decade, many NGOs and social change organizations have mushroomed in India, but very few have expanded on the basis of scale and community impact. After all, scraping through red tapestry in government is a herculean task to be able to set up an NGO in the first place.

Published by: Ansha Sondhi, Nehalika Ramchandani

Author: Ansha Sondhi

Paper ID: V5I2-1858

Paper Status: published

Published: April 25, 2019

Full Details
Research Paper

Approach for improving data security in cloud computing

Multi-client framework for access control to datasets set away in an untrusted cloud condition. Appropriated storing like some other untrusted condition needs the capacity to check share data. Our framework gives a path of authority over the informational index away in the cloud without the supplier adventure. The fundamental instrument of access control structure is the figure content arrangement trademark based encryption plot with dynamic properties. Utilizing a blockchain based decentralized record, our framework gives the steady log of all vital security occasions, for example, key age, get the chance to strategy undertaking, change or refusal, get the chance to ask for. We propose a huge amount of cryptographic conventions guaranteeing the security of cryptographic endeavors requiring conundrum or private keys. Just ciphertexts of hash codes are exchanged through the blockchain record. The model of our structure is acknowledged utilizing sharp contracts and endeavored on square chain sort out. Here is proposed structure as a customer if they are going to enroll in that account director will give assorted keys to each customer it takes after a private key in the wake of selecting a customer they can log in and they can exchange all of the reports what they need while exchanging time the substance everything will be encoded and for that one open key will be produce these all will be secured in cloud database . As a customer they have an alternate privet key which was given by the manager so they can log in and they can get to that account if they have to exchange they can exchange else they have to get any record they can get that record by using of cloud they can see all the customer archives if they need any record they have to send sales to executive .if overseer to recognize that request they can get that interface if the customer need that record they have to click that record in case you clicked that archive, by then it will be asked first it will ask private key . obviously, it will ask with respect to whether two keys was composed then nobody however they can prepared to download else they can't prepared to down weight .

Published by: L. Venkat, Lakshman Babu K., Nikhith, Ethirajulu V.

Author: L. Venkat

Paper ID: V5I2-2091

Paper Status: published

Published: April 25, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X