Manuscripts

Recent Papers

Research Paper

Decentralized secure money transfer using blockchain

A blockchain is just a chain and a list of blocks. Each block, in the blockchain, will have its own digital signature. Each block doesn’t just contain the hash of the block, but its own hash in part, calculated from the previous hash Calculating and comparing the hashes allow us to see if a blockchain is invalid. We create a system that Allows users to create wallets and Provides wallets with public and private keys using Elliptic-Curve cryptography. Secures the transfer of funds, by using a digital signature algorithm to prove ownership and finally allow users to make transaction your blockchain

Published by: Suganya T., Vignesh A., Vignesh Kumar N., Vivin Kumar D.

Author: Suganya T.

Paper ID: V5I2-1234

Paper Status: published

Published: March 12, 2019

Full Details
Others

Restaurant management system Android application

The main target of this paper is to conduct a thorough and in-depth analysis of the vast field of Software engineering and at the same time explore the opportunities and the conditions that could lead into building a successful Android app. The simplicity and ease of access to a menu is the main component that facilitates ordering food in a restaurant. A user-friendly menu completely changes the patron’s dining experience. Existing programs provide an app that restaurants can use to enter their menus into Android-based tablets and make it easier for the diners to flip, swipe and tap through the menu. This system is used to provide the restaurants with a tablet menu that would recommend dishes based on a recommendation algorithm which has not been implemented elsewhere. This system uses a cloud-based server for storing the database.

Published by: Sucharita M. Samantaray, Karan Dhoke, Pranay Pawar, Rina Mishra

Author: Sucharita M. Samantaray

Paper ID: V5I2-1229

Paper Status: published

Published: March 12, 2019

Full Details
Research Paper

Accident detection system based on Internet of Things (IoT)- Smart helmet

The objective of our smart helmet is to provide the means for detecting and reporting accidents. The working of this smart helmet is very simple; vibration sensors are placed in different places of the helmet where the probability of hitting is more, which are connected to the microcontroller board. When the rider met with an accident and the helmet hits the ground, these sensors sense and gives to the microcontroller board, then controller extracts GPS location using the GPS module that is interfaced to it. When the data exceeds the minimum stress limit then the GSM module automatically sends a message to the registered emergency contacts and the link through which the location and the speed of the victim will be displayed in the mobile application and in the web application.

Published by: Kabilan M., Monish S., Dr. S. Siamala Devi

Author: Kabilan M.

Paper ID: V5I2-1253

Paper Status: published

Published: March 12, 2019

Full Details
Review Paper

ATM- Security using machine learning technique in IoT

The idea of designing and implementation of the real-time ATM security project came with the incidents of accessing the ATM by the unauthorized users instead of an authorized user. This project will give access to the user only after identifying the image of the user taken by the CCTV in the ATM and compare the identified image with the image of the user that was stored in the database created during the account creation which comes under the banking session of banks. In some cases the authorized user is not able to use the ATM for some emergency purposes, in such cases, the OTP is sent to the users registered mobile number and the person who came instead of the authorized user have to enter the OTP that the authorized user received. This method will reduce the risk of ATM usage by common people. The face detection and face recognition are done using deep learning techniques and machine learning. The IOT components like Camera, RFID reader, Tag, Relay, Motor were used. The Raspberry pi 3 (2015 version) is used as the main component. Here the open CV is used as the platform and the python language is used for the deep learning techniques and face detection Haar cascade is used for face detection. The face recognition module is done by Local Binary Patterns (LBP) algorithm. And an alert message is sent to the authorized user as a text message if the user is found to be the third party user.

Published by: Udhaya Kumar N., Sri Vasu R., Subash S., Sharmila Rani D.

Author: Udhaya Kumar N.

Paper ID: V5I2-1225

Paper Status: published

Published: March 11, 2019

Full Details
Review Paper

The Future of Cyber Security

In the near future, cyber security will play a dominant role in personal and business applications. As society is becoming more and more digitized, there are more chances to win by exploiting this. As a result of the growing proliferation of digitization and connected devices, the demand for cyber security solutions is growing at a relatively high rate. The complexity and connectivity of digitized systems have a direct impact on their security. The goal of this review is to summarize the logical predictions of the future of cyber security.

Published by: Adharsh Krishnan, M. Deva Priya

Author: Adharsh Krishnan

Paper ID: V5I2-1237

Paper Status: published

Published: March 11, 2019

Full Details
Research Paper

Intelligent model to identify the duplicate products in catalog management

Nowadays electronic catalog management provide more information about the products to the customers. Catalog management in the e­commerce system supports the definition, storage, retrieval, and management of product information in the e­commerce process. In which electronic catalog contains a duplicate of the product so it reduces the customer’s experiences and it should not provide much more relevant information about the products in the search recommendations. This paper presents the method to solve the duplicates of the product and increase the search recommendations with the help of the Relational Database Management System (RDMS) and (DBMS). So, it creates a systematic and impressive catalog that helps the customers to get all the product descriptions and images they need and reduces the duplicates to make a buying decision

Published by: M. Kavitha, Akilandeswari E., P. Tamije Selvy

Author: M. Kavitha

Paper ID: V5I2-1236

Paper Status: published

Published: March 11, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X