Manuscripts

Recent Papers

Research Paper

Accident detection system based on Internet of Things (IoT)- Smart helmet

The objective of our smart helmet is to provide the means for detecting and reporting accidents. The working of this smart helmet is very simple; vibration sensors are placed in different places of the helmet where the probability of hitting is more, which are connected to the microcontroller board. When the rider met with an accident and the helmet hits the ground, these sensors sense and gives to the microcontroller board, then controller extracts GPS location using the GPS module that is interfaced to it. When the data exceeds the minimum stress limit then the GSM module automatically sends a message to the registered emergency contacts and the link through which the location and the speed of the victim will be displayed in the mobile application and in the web application.

Published by: Kabilan M., Monish S., Dr. S. Siamala Devi

Author: Kabilan M.

Paper ID: V5I2-1253

Paper Status: published

Published: March 12, 2019

Full Details
Review Paper

ATM- Security using machine learning technique in IoT

The idea of designing and implementation of the real-time ATM security project came with the incidents of accessing the ATM by the unauthorized users instead of an authorized user. This project will give access to the user only after identifying the image of the user taken by the CCTV in the ATM and compare the identified image with the image of the user that was stored in the database created during the account creation which comes under the banking session of banks. In some cases the authorized user is not able to use the ATM for some emergency purposes, in such cases, the OTP is sent to the users registered mobile number and the person who came instead of the authorized user have to enter the OTP that the authorized user received. This method will reduce the risk of ATM usage by common people. The face detection and face recognition are done using deep learning techniques and machine learning. The IOT components like Camera, RFID reader, Tag, Relay, Motor were used. The Raspberry pi 3 (2015 version) is used as the main component. Here the open CV is used as the platform and the python language is used for the deep learning techniques and face detection Haar cascade is used for face detection. The face recognition module is done by Local Binary Patterns (LBP) algorithm. And an alert message is sent to the authorized user as a text message if the user is found to be the third party user.

Published by: Udhaya Kumar N., Sri Vasu R., Subash S., Sharmila Rani D.

Author: Udhaya Kumar N.

Paper ID: V5I2-1225

Paper Status: published

Published: March 11, 2019

Full Details
Review Paper

The Future of Cyber Security

In the near future, cyber security will play a dominant role in personal and business applications. As society is becoming more and more digitized, there are more chances to win by exploiting this. As a result of the growing proliferation of digitization and connected devices, the demand for cyber security solutions is growing at a relatively high rate. The complexity and connectivity of digitized systems have a direct impact on their security. The goal of this review is to summarize the logical predictions of the future of cyber security.

Published by: Adharsh Krishnan, M. Deva Priya

Author: Adharsh Krishnan

Paper ID: V5I2-1237

Paper Status: published

Published: March 11, 2019

Full Details
Research Paper

Intelligent model to identify the duplicate products in catalog management

Nowadays electronic catalog management provide more information about the products to the customers. Catalog management in the e­commerce system supports the definition, storage, retrieval, and management of product information in the e­commerce process. In which electronic catalog contains a duplicate of the product so it reduces the customer’s experiences and it should not provide much more relevant information about the products in the search recommendations. This paper presents the method to solve the duplicates of the product and increase the search recommendations with the help of the Relational Database Management System (RDMS) and (DBMS). So, it creates a systematic and impressive catalog that helps the customers to get all the product descriptions and images they need and reduces the duplicates to make a buying decision

Published by: M. Kavitha, Akilandeswari E., P. Tamije Selvy

Author: M. Kavitha

Paper ID: V5I2-1236

Paper Status: published

Published: March 11, 2019

Full Details
Research Paper

Graft materials in lateral window approach for maxillary sinus lift procedure before implant placement

Endosseous dental implants have been widely used in the past decades for rehabilitation of edentulous area as a successful and predictable treatment strategy. Achieving the adequate volume of bone is the prerequisite and a challenging issue for severely atrophic areas. Several reconstructive procedures have been used for vertical and horizontal bone augmentation before implant placement. Maxillary open sinus lift procedure is a conventional technique for elevating the sinus floor and placing the bone graft in the posterior atrophic maxilla before implant placement. This article represents the graft materials used for lateral approach sinus lift surgery.

Published by: Ali

Author: Ali

Paper ID: V5I2-1226

Paper Status: published

Published: March 11, 2019

Full Details
Research Paper

Fusion of two and three colored and gray scale images using modified – Laplacian Pyramid Technique

Image fusion is a process of blending the complementary as well as the common features of a set of images, to generate a resultant image with superior information content in terms of subjective as well as objective analysis point of view. The goal of this exploration work is to build up some novel picture combination calculations and their applications in different fields, for example, split identification, multi-spectra sensor picture combination, restorative picture combination and edge location of multi-center pictures and so forth. The initial segment of this exploration work manages a novel break identification system dependent on Non-Destructive Testing (NDT) for splits in dividers smothering the assorted variety and multifaceted nature of divider pictures. It pursues diverse edge following calculations, for example, Hyperbolic Tangent (HBT) sifting and shrewd edge recognition calculation. The combination of locator reactions are performed utilizing Haar Discrete Wavelet Transform (HDWT) and most extreme guess with mean-detail picture combination calculation to get increasingly noticeable identification of split edges. In the proposed framework we have performed picture combination for two just as for three pictures. The proposed framework gives improved edge location in pictures with unrivaled edge confinement and higher PSNR.

Published by: Kajal, Puneet Jain

Author: Kajal

Paper ID: V5I2-1238

Paper Status: published

Published: March 11, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X