Manuscripts

Recent Papers

Research Paper

Design of continuous loading vertical chain conveyor

A conveyor system is a common piece of mechanical handling equipment that moves materials from one location to another. The main purpose of this project is to safely lift the load at the rate of 6m/min. This paper consist of, selection, a design of basic mechanical elements. This system is able to overcome the drawbacks of inclined belt conveyor, achieves desired height and occupies less floor space as a material is transformed in vertically upward direction. This Chain Conveyor utilizes a continuous chain arrangement, carrying a series of a single pallet for lifting the load. The chain arrangement is driven by a motor, and the material suspended on the pallets is conveyed to the next floor.

Published by: Aditya J. Kulkarni, Tanmay M. Kulkarni, Omkar J. Mahadik, Parshuram V. Mahindrakar

Author: Aditya J. Kulkarni

Paper ID: V4I6-1281

Paper Status: published

Published: December 1, 2018

Full Details
Research Paper

Women safety system using Raspberry Pi

In today’s world, women come across many situations that make them feel unsafe. Women from various walks of life face situations that make them feel threatened in different environments. Sixty six percent of women have reported sexual harassment in the year 2010 in New Delhi. It has also been proven that in urban environments, women are more prone to experience harassment especially in developing countries. In such situations, the aid of a safety device that will inform the victim’s family members or the authorities (in Severe situations) may help women feel safer, confident and reduce the chances of harassment. Though there are a few Smartphone based solutions for the same, it might not be possible for the victim to reach for her phone in some situations without the knowledge of the perpetrator. In this approach, the focuses on a security system that is designed merely to serve the purpose of providing security to women so that they never feel helpless while facing such social challenges. An advanced system can be built that can capture the video of the event as well as send the emergency messages of the victim through GSM to respective mobile numbers. The idea to develop a smart system for women is completely comfortable and also easy to use as compared to existing women security solutions such as infamous mobile apps, bulky belts and the separate garment that are just very abstract and obsolete.

Published by: Priyanka Yuvaraj Gonde

Author: Priyanka Yuvaraj Gonde

Paper ID: V4I6-1318

Paper Status: published

Published: December 1, 2018

Full Details
Research Paper

Correlation and effectiveness of coordination exercise and activity of daily living in differently able children

Eye-hand coordination abilities are an integral part of a Child’s development. Eye-hand coordination is necessary for functional independence progress and its effects on the activity of daily living. This study is aimed at the effectiveness of coordination exercise on activity of daily living and the correlation between coordination exercise and activity of daily living. Total 20 children (7 Female, 13 Male) age group 10 to 15 years with different disabilities situated around Anand. Developmental Coordination Questionnaires (DCDQ) was used for assessment of coordination skill. Functional Independence Measure (FIM) was used for evaluating the activities of daily living. The coordination exercise program was effective for an activity of daily living in differently able children. Coordination exercise was positively associated with Activity of daily living. Coordination has an effect on Activity of daily living. After the coordination exercise program, the child improved his/her Coordination skill. Coordination exercises are effective on an activity of daily living in differently able children.

Published by: Dr. Bansari Anish Patel, Dr. Brajesh Kumar Mishra

Author: Dr. Bansari Anish Patel

Paper ID: V4I6-1317

Paper Status: published

Published: December 1, 2018

Full Details
Research Paper

Solid waste management in internally displaced persons IDPS camps in Maiduguri Borno state Nigeria

This study aims to examine the solid waste management conditions of Internally Displaced Persons (IDPs) camps in Maiduguri, Borno State. The research is descriptive, qualitative approached were used. The primary data for the research was sourced through the use of questionnaire and interview using a combination of purposive and convenience sampling. While books, journals, newspapers, magazines and internet materials made up the secondary data. The data collected were coded, edited, presented and analyzed using descriptive statistics through frequency tables and percentages. A total of 197 IDPs participated in the study. The findings revealed that almost half of the respondents (45.7%) revealed that food waste is the highest type of solid waste generated in the camps this is because food is the basic need for the livelihood of the IDPs in the camps. And also (36.5%) of the respondents indicated that fine was the second most abundant type of solid waste generated in the camps. Therefore, the burning of fuelwood as a source of energy can be produced beautiful and this is environmentally not friendly which generate air pollution and environmental degradation. The study revealed that majority 122 (62.0) of the respondents perceived air pollution was the consequences of solid waste disposal in the camps. While 38 (19.3%) of the respondents reveals that the spread of germ is the consequences of solid waste disposal. Similarly, the study found that incineration was used for managing waste in the camps. Some NGOs contributed in sanitation through Water Sanitation and Hygiene (WASH) committee which conducts regular sensitization on the danger of poor waste management. The study recommends among others the need for intensive education to promote positive attitude for solid waste management among the IDPs. Keywords: Solid Waste Management Sanitation Polythene

Published by: Baba Gana Zannah, Bukar Usman, Mohammed Baba Shehu

Author: Baba Gana Zannah

Paper ID: V4I6-1279

Paper Status: published

Published: November 30, 2018

Full Details
Research Paper

Effect of scenario planning on strategic entrepreneurship in Iraqi higher education

For many organizations and institutions, the challenge of knowing how to face competition derived from the globalization of the economy is presented. A fundamental technique to successfully answer that question is scenario planning. Which has become the basis for the success of various businesses. Accordingly, The objective of this study is to analyze the effect of scenario planning on strategic entrepreneurship. considering the impact which may have the dimensions of scenario planning and strategic entrepreneurship. For this, a theoretical model was designed depending on the literature, the questionnaire was the main tool for this study. Statistical analysis, based on direct correlation and effects tests (using SPSS and Amos software), allows proving there are positive effects on strategic entrepreneurship by scenario planning and its dimensions as revealed by the findings.

Published by: Karawan Azeez Hussain

Author: Karawan Azeez Hussain

Paper ID: V4I6-1307

Paper Status: published

Published: November 30, 2018

Full Details
Research Paper

Encrypted data management with deduplication in cloud computing

Cloud computing plays an important role in supporting data storage, processing, and management in the Internet of Things (IoT). To preserve cloud data confidentiality and user privacy, cloud data are often stored in an encrypted form. However, duplicated data that are encrypted under different encryption schemes could be stored in the cloud, which greatly decreases the utilization rate of storage resources, especially for big data. Several data deduplication schemes have recently been proposed. However, most of them suffer from security weakness and lack of flexibility to support secure data access control. Therefore, few can be deployed in practice. This article proposes a scheme based on attribute-based encryption (ABE) to deduplicate encrypted data stored in the cloud while also supporting secure data access control. The authors evaluate the scheme's performance based on analysis and implementation. Results show the efficiency, effectiveness, and scalability of the scheme for potential practical deployment. To ensure data privacy, existing research proposes to outsource only encrypted data to CSPs. However, the same or different users could save duplicated data under different encryption schemes at the cloud. Existing solutions for deduplication are vulnerable to brute-force attacks2 and can’t flexibly support data access control and revocation (see the “Related Work in Data Deduplication” sidebar for a discussion of some other work in this area). Existing industrial solutions fail in encrypted data deduplication. A scheme based on attribute-based encryption (ABE) is proposed to deduplicate encrypted data stored in the cloud while at the same time supporting secure data access control. proposes to outsource only encrypted data to CSPs. However, the same or different users could save duplicated data under different encryption schemes at the cloud. Although cloud storage space is huge, this kind of duplication wastes networking resources, consumes excess power, and complicates data management. intra-user deduplication and interdeduplication.6 In their scheme, the ciphertext C of convergent encryption is further encrypted with a user key and transferred to the servers. However, it doesn’t deal with data sharing after deduplication among different users. Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. In this project the following modules are used: i) Cloud Computing ii) Inter And Intra User iii) Deduplication. Various cloud service providers (CSPs) offer huge volumes of storage to maintain and manage IoT data, which can include videos, photos, and personal health records. These CSPs provide desirable service properties, such as scalability, elasticity, fault tolerance, and pay per use. Thus, cloud computing has become a promising service paradigm to support IoT applications and IoT system deployment. Thus, saving storage is becoming a crucial task for CSPs. Deduplication can achieve high space and cost savings, reducing up to 90 to 95 percent of storage needs for backup applications and up to 68 percent in standard file systems. Inter And Intra User:- At the same time, data owners want CSPs to protect their personal data from unauthorized access. CSPs should, therefore, perform access control based on the data owner’s expectations. In addition, data owners want to control not only data access but also its storage and usage. a data owner that stores its data at the CSP (we assume there’s only one data owner for one data M); and • data holders (ui, i = 1, . . . , n) that are eligible data users and could save the same data as the data owner at the CSP. That is, the same data, although in an encrypted form, is only saved once at the cloud but can be accessed by different users based on the data owners’ policies. Data-Deduplication:- Data deduplication should cooperate with data access control mechanisms. That is, the same data, although in an encrypted form, is only saved once at the cloud but can be accessed by different users based on the data owners’ policies. current industrial deduplication solutions can’t handle encrypted data. Existing solutions for deduplication are vulnerable to brute-force attacks and can’t flexibly support data access control and revocation (see the “Related Work in Data Deduplication” sidebar for a discussion of some other work in this area). Few existing schemes for cloud data access control support data deduplication simultaneously, and few can ensure flexibility and security with a sound performance for cloud data deduplication that data owners control directly. Algorithms:- Cyphertext Policy ABE (CP-ABE) or Key Policy ABE (KP-ABE):- Attribute-based encryption is a type of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes (e.g. the country in which he lives, or the kind of subscription he has). In such a system, the decryption of a ciphertext is possible only if the set of attributes of the user key matches the attributes of the ciphertext. A crucial security aspect of Attribute-Based Encryption is collusion-resistance: An adversary that holds multiple keys should only be able to access data if at least one individual key grants access. Encryption Algorithm:- In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception but denies the message content to the interceptor. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm Decryption. There are many modern key-based cryptographic techniques. These are divided into two classes: symmetric and asymmetric (also called public/private) key cryptography. In symmetric key cryptography, the same key is used for both encryption and decryption. H/W System Configuration: System : Pentium –IV 2.4 GHz RAM : 256MB(min) Hard Disk : 40 GB Key Board : Standard Windows Keyboard S/W System Configuration: Operating System : Windows/XP/7 Application Server : Tomcat5.0/6.X Front End : HTML, Java, JSP Scripts : JavaScript Server-side Script : Java Server Pages Database : Mysql 5.0 Database Connectivity : JDBC.

Published by: Pokala Phanitej, Y. Suresh

Author: Pokala Phanitej

Paper ID: V4I6-1297

Paper Status: published

Published: November 30, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X