Manuscripts

Recent Papers

Others

Design development of women’s casual wear (travel jacket)

The present generation of women who are under the age category of 18-25 are the ones who travel a lot. Out of which most of them are gallivanter, fashionistas, early adaptors, and digital natives. They are in search of something new. They wish to travel seeking new experiences that are filled with fun, adventure, and activities that get them the at most pleasure. This thirst for pleasure makes them go on trips very often. Travel jackets have become an essential part of the traveler’s kit. They search for travel jackets to complement their travel plans. Wearing travel jackets make them happier and also comfortable during travel. These travel jackets create an emotional feel to the wearer, every time they wear it. In this paper, the expectations and the needs of the target customer are collected and travel jackets are designed and developed to fulfill their needs and expectations. Through our study, we tried to incorporate these details into the garment through the emotional design process.

Published by: Pragatheswari, Nithya Prakash V.

Author: Pragatheswari

Paper ID: V5I2-1689

Paper Status: published

Published: April 2, 2019

Full Details
Research Paper

Machine learning algorithms for intrusion classification

The usage of the Internet, the amount of network traffic volume is rapidly raising high. Preventing such huge, sensitive data from security attacks is equally important. Monitoring network traffic may indicate a possible intrusion in the network and therefore anomaly detection is important to detect and prevent such attacks. One of the approaches to anomaly detection is based on machine learning classification techniques. Here we apply seven different machine learning techniques: K-Means, K-Nearest Neighbours (KNN), Fuzzy C-Means (FCM), Support Vector Machine (SVM), Naïve-Bayes (NB), Radial Basis Function (RBF) and Ensemble method (Weighted average method) comprising of K-Nearest Neighbours and Naïve-Bayes (NB) on NSL-KDD dataset and evaluate the performance of these techniques. We also deduced how the change in the training size can affect the training time and the accuracy of each algorithm

Published by: Alapati Avinash, Alla Haripriya, B. Sandeep

Author: Alapati Avinash

Paper ID: V5I2-1600

Paper Status: published

Published: April 2, 2019

Full Details
Research Paper

A research paper on: Automatic switching of relays according to set limits of voltage on distribution side

This Paper Presents The Design, Construction And Working Of Protective Mechanism For Single Phase Devices Against Over Voltage And Under Voltage Stage. Which Circuit Is Fabricated Using Microcontroller Atmega328, Voltage Regulator Ic, Comparators, Relays, And Other Devices. In Over Voltage Conditions, When The Supplied Voltage Is 240 V Or Above, The Relay Operates With Buzzer, However In Under Voltage, When Voltage Is 180 V Or Less, The Relay Operates With Buzzer, On Such Conditions,16×2 LCD indicates the status of the voltages as regulated voltage, low voltage and over voltage. Buzzer also beeps when over or low voltage detected. The Main Advantage Of This Protective Circuit Is That, It Can Protect The Single Phase Household Equipment As Well As On Distribution Side. In Future, This Model Can Be Modified For The Protection of Three-Phase Power System And Industry Level Equipments.

Published by: Jitendra Laxman Lohar, Ganesh Ghashiram Chawla, Kshitij Pramod khachane, Shivdas Santosh Gai, Shubham Gajanan Kachare

Author: Jitendra Laxman Lohar

Paper ID: V5I2-1637

Paper Status: published

Published: April 2, 2019

Full Details
Research Paper

Cloud based employee attendance management system using NFC and Face Recognition

For every organization, the attendance process is one of the important aspects to consider employee performance. Yet it is something that should be done swiftly and efficiently, without giving any effort into it. Manual attendance system could be time-consuming and error-prone, and other new system developed could prove to be complex and costly. Hence, the proposed system called as “Cloud-Based Employee Attendance Management System using NFC and Face Recognition” provides several important operations such as captured attendance records using NFC, automatic time calculation, leave and overtime checking, working hour’s evaluation, real-time updated information access, and generating reports. In order to add on to the security of genuine attendance tracking, facial recognition mechanism is embedded, so the system could not be fooled. An online portal is developed for managers to keep track of this process and manage employee attendance easily. The system can be used by any companies from small to medium size to implement cheap and efficient attendance tracking mechanism.

Published by: Ankit Rana, Vipul Pugaokar, Akshay Sawant, Arti Gore

Author: Ankit Rana

Paper ID: V5I2-1606

Paper Status: published

Published: April 2, 2019

Full Details
Research Paper

Offline speech recognition on android device based on supervised learning

Offline Android Smartphone Assistant is a virtual personal assistant which is implemented to perform basic functionalities of the smartphone in offline mode with speech commands. The task includes open apps, toggle wi-fi, toggle Bluetooth, call a person, send messages, control brightness, open torch, etc. The key functionality of the Offline Android Smartphone Assistant is the capability of performing each and every task without the use of the internet. The users can interact with the assistant through natural voice commands. Many companies had established several virtual assistants like Google Assistant, Apple’s Siri, Amazon Alexa, etc. However, the virtual assistants established by several companies do not provide many offline functionalities. In this proposal, we provide easy to access every system functionality without using the internet using Speech Recognition. This application will help people in areas where internet connectivity is hardly possible. The application also provides the functionality of a screen overlay. The application uses Natural Language Processing for processing the voice commands and performing the required tasks.

Published by: Reeta Bandhu, Nikhil Kumar Singh, Betawar Shashank Sanjay

Author: Reeta Bandhu

Paper ID: V5I2-1688

Paper Status: published

Published: April 2, 2019

Full Details
Technical Notes

Utilization of waste plastic in fly-ash bricks

The main aim of our project is to utilize those plastics and fly ash in the manufacturing of bricks. In this project, plastic bricks were cast with different proportions with quarry dust & fly-ash. The plastic percentage is varied by 5%,10%,15%,20% with the casting of quarry dust and fly-ash was constant. The tests are conducted compressive strength test, water absorption test, and efflorescence test. Here the strength properties of plastic bricks comprising of waste plastics, fly ash as the constituents and the design considerations for pavement block incorporating waste plastic bags is presented. A comparative economy, etc. compression strength test was performed on the plastic brick and its strength was found to be 6.66 N/MM2 which is higher than red clay bricks which have a compressive strength of 3-5 N/mm2.

Published by: Etaveni Madhavi, Darshak Sai Ginjipelli, Kadavaluru Uday kumar, Gachu Shekar, Lavudya Apoorva

Author: Etaveni Madhavi

Paper ID: V5I2-1631

Paper Status: published

Published: April 2, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X