Manuscripts

Recent Papers

Others

Accident detection and rescue information system

Nowadays accidents have been a quite common problem for the people who are in highly populated countries. Every day most of the people here are met with accidents and losing their lives. At least if there is an availability of emergency facilities there is a chance of saving lives. This project is to overcome the drawback mentioned if any vehicle met with an accident immediately a vibration sensor in the pre-installed device kept in the vehicle gets activated and sends signals to the Arduino microcontroller. Now the microcontroller will send an alert message through GSM modem includes the location coordinates to the police station or to the rescue team so that the rescue team or police can be able to locate the location easily using GPS modem to provide emergency facilities or they will take them to the nearest hospital once the information received. The proposed system has been simulated and practically designed using hardware components and the results are satisfied with the explanation.

Published by: K. Ramamohan Reddy, M. Lavanya Latha, B. Mallikarjuna Reddy

Author: K. Ramamohan Reddy

Paper ID: V5I2-1525

Paper Status: published

Published: March 27, 2019

Full Details
Review Paper

Non-destructive testing by liquid penetrant testing and ultrasonic testing – A review

Non-destructive testing (NDT) is commonly thought of as a broad field. However, at its core, it refers to a good cluster of tested review ways to analyze the soundness of a cloth, part or structure while not with chemicals or physically neutering it. When it involves correct results, non-destructive testing is reliable due to the variability of obtainable and complementary choices. Any given piece of kit or machinery may be subject to a variety of NDT that eliminates the danger of oversight or quality. This paper consists of a detailed review about the latest researches carried out for finding out the defects using LPT and Ultrasonic method and how it improves the quality of the products by reducing the time taken for testing. NDT is one of the finest and accurate quality tool used in reducing the costs of testing. The Liquid Penetrant Testing (LPT) technique is usually used for the scrutiny of non-ferrous materials and non-magnetic materials like Al, chrome steel in addition as alternative materials which may not be inspected by the Magnetic Particle technique. Ultrasonic testing is mostly used for finding minute deflections and flaws in the materials using transducers.

Published by: C. Chris Roshan, Raghul C., Hari Vasanth Ram, Suraj K. P., John Solomon

Author: C. Chris Roshan

Paper ID: V5I2-1529

Paper Status: published

Published: March 27, 2019

Full Details
Review Paper

College bus tracking system

This project is based on a Real-Time College Bus Tracking Application which runs on the website. This enables students to find out the location of the bus so that they won't get late or won't arrive at the stop too early. The main purpose of this website is to provide the exact location of the student's respective buses in Google Maps besides providing information like bus details and distance. College students use this website. It is a real-time system as the current location of the bus is updated every moment in the form of latitude and longitude which is received by the students through the website on Google maps. The application also estimates the time required to reach a particular stop on its route. This mode of communication can be useful for the bus tracking system.

Published by: Sangavi K. A., Vinitha N., Vimala R., Ramesh A.

Author: Sangavi K. A.

Paper ID: V5I2-1502

Paper Status: published

Published: March 27, 2019

Full Details
Research Paper

Development of conducting organic polymer film by R. F. plasma polymerization

Electrodeless R.F. capacitive coupling is used to make plasma polymer. The thickness of the film measured to be 8.0 µm. The film is made conducting by doping with Iodine. The resistivity measured with Vander Pauw’s Method and it was found to be 1.7 KΩ cm. Hopping conduction mechanisms found to be the probable mechanism of charge transport in the obtained polymer film

Published by: Mukesh Nigam

Author: Mukesh Nigam

Paper ID: V5I2-1505

Paper Status: published

Published: March 27, 2019

Full Details
Research Paper

Artificial Lampyridae Classifier (ALAC) for coronary artery heart disease prediction in diabetes patients

Soft computing techniques and its applications extend its wings in almost all areas which include data mining, pattern discovery, industrial applications, robotics, automation and many more. Soft computing comprises of the core components such as fuzzy logic, genetic algorithm, artificial neural networks, and probabilistic reasoning. In spite of these, recently many bio-inspired computing attracted attention for the researchers to work in that area. Machine learning plays an important role in the design and development of decision support systems, applied soft computing and expert systems applications. This research work aims to build an artificial Lampyridae classifier and also compared with Takagi Sugeno Kang fuzzy classifier and ANN classifier in terms of prediction accuracy, sensitivity, specificity, and Mathew’s correlation coefficient. The significance of MCC is to test the ability of the machine learning classifier in spite of other performance metrics. Implementations are done in Scilab and from the obtained results it is inferred that the built ALC outperforms that that of TSK fuzzy classifier and ANN classifier.

Published by: B. Narasimhan, A. Malathi

Author: B. Narasimhan

Paper ID: V5I2-1543

Paper Status: published

Published: March 27, 2019

Full Details
Research Paper

Android mobile hacking using Linux

Backdoors are one of the most complicated types of Android malware. A normal backdoor carries out its functionalities such as installing itself into the system directory, disabling system apps, or gaining access to app’s data, to steal and upload sensitive info, download and ask to install applications and set up mobile botnets when setting proper Android permissions. This project focus on how Android devices are hacked using backdoors and how they can be stopped from doing so. The backdoor application when installed and turned on the mobile allows an attacker to read, write and modify the data. Due to Backdoor attacks Confidentiality, Integrity, and Accountability of the information security are lost. When the application is installed on the victim's mobile and the victim opens the application it creates the meter-preter session which permits the attacker to access functions like webcam, contacts, read SMS, send SMS, read call log, write call log, access storage, install applications.

Published by: Arulpradeep S. P., Vinothkumar P., Nilavarasan G. S., Sai Harshith Kumar S., Naveen P.

Author: Arulpradeep S. P.

Paper ID: V5I2-1528

Paper Status: published

Published: March 27, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X