Manuscripts

Recent Papers

Research Paper

Object identification using picture for blind peoples

From 1970, object identification technologies have matured to a point at which many applications are becoming possible for visual substitution. Human vision is one of the very essential part and it plays the most important role in free movement of blind peoples in surrounding environment. Hence, over thousands of techniques have been founded on these subjects that propose a variety of object recognition products and services by developing new electronic devices for the blind. Visually impaired peoples need is to perform most navigational tasks, so visually impaired people are at disadvantage because necessary information about the surrounding environment is not available. The system aims to introduce a proposed system that restores a central function of the visual system which is the identification of surrounding objects. The object detection method is based on the local grayscale conversion concept. The simulation results using feature extraction algorithm and key-points matching showed good accuracy for recognizing objects. Thus, the contribution is to present the idea of a visual substitution system based on gray-scale conversation, features extractions and matching to recognize and provide audio output of objects in images.

Published by: Nandini Jalandar Patil, Lokesh Manoj Bhavsar, Lokesh Shriram Chaudhari, Kalpesh Ramlal Patil

Author: Nandini Jalandar Patil

Paper ID: V4I3-1726

Paper Status: published

Published: June 4, 2018

Full Details
Research Paper

Robust security approach using hybrid steganography

Information security is one of the major problem faced nowadays since the number of internet users is increasing and secret information is getting shared every second. This has also hiked the cyber-crime and threat of malicious access. The two main techniques that are used for information security are steganography and cryptography. Cryptography can be basically considered as secret writing; on the other hand, Steganography can be considered as data hiding. In this project, a hybrid technique for data security is proposed by combining the cryptography and steganography properties. The proposed image steganography algorithm works on improvement of data embedding capacity. Implementation of image processing is implemented using modified LSB approach which showed improved results in terms of image quality and data hiding capacity. The aim of this work is to implement a system for data security as well as improve the data hiding capacity. The results show increased image quality and fewer distortions. Also proposed key exchange protocol will aid in security.

Published by: Pranay Kapgate, Surendra Demgunde, Nikhil Tulankar

Author: Pranay Kapgate

Paper ID: V4I3-1703

Paper Status: published

Published: June 4, 2018

Full Details
Review Paper

Machine learning: Trends and applications

As in past fifteen years with the ton of data accessible, machine learning has become one in each of the mainstays of data technology and thereupon, a rather central, albeit sometimes hidden, a part of our life. With the ever-increasing amounts of information changing into accessible, there's the sensible reason to believe that good data analysis can become additional pervasive as a necessary ingredient for technological progress. Machine learning is leverage of self-learning behavioral model. Through the past learning experience, the machine is used to extract hidden value from raw data. Data-intensive nature of machine learning makes it useful in the various aspect of life such as healthcare, marketing, automotive industry, information retrieval, intrusion detection, education and so on. This paper takes a review of various machine learning trends and application.

Published by: Ashwini Dhoke, Sarika Kadam, Shital Sungare

Author: Ashwini Dhoke

Paper ID: V4I3-1722

Paper Status: published

Published: June 4, 2018

Full Details
Survey Report

Profound survey on virtualization in cloud

Cloud Computing is the fundamental change happening in the field of Computer Science and Information Technology. It helps to overcome the problems of data loss, accessing data whenever needed and data security. This technology is mainly service oriented and focuses on cost reduction, hardware reduction and pay just for service concept. Virtualization is one of the key components of cloud computing. With the help of virtualization, cloud computing brings efficiency benefits, security, availability and privacy protection. Virtualization is expensive mainframes to be easily shared among different application within the environments. The concept of virtualization needs to understand and implement in the cloud computing systems and enables the users how to better use it and make it better management of cloud. In this paper, the virtualization in the cloud is explained with the concept of service models. In this internet world, cloud computing is raising high by providing everything incense the required resources, applications, software, hardware, computing power to computing infrastructure, business process to control collaboration.

Published by: V.N.V.L.S Swathi, A.Swathi

Author: V.N.V.L.S Swathi

Paper ID: V4I3-1728

Paper Status: published

Published: June 4, 2018

Full Details
Research Paper

Knowledge and practice towards prevention of dengue fever infection among health care workers in BIN Nasir hospital December 2017

This paper evaluates the knowledge and practice of dengue fever infection among nursing staff in Bin Nasir hospital Saudia Arabia in 20017 82 nurses enrolled in the study. A descriptive study design – Was adopted for this study 82 staff nurses selected randomly,grouping ter age from 20 up to 41 and with different education level and different work experience and departments, self administered questionaired filled regard knowledge and practice, data arranged tabulated analysed (descriptive and inferential statistics) using spss 20.results respondents revealed good knowledge towards dengue fever, their mean knowledge 63.4%, p .000 and good practice, mean score 64.6% p .000, the results showed significant association between qualification, work experience and work department with both knowledge and practice Ps are .055, .023, .500. conclusion respondent showed good knowledge and practice, also showed the highly significant association between qualification, work experience and work area and both knowledge and practice.recommendation.stablish of regular session towards knowledge and prevention toward dengue fever.

Published by: Manal Bilal Mohamed

Author: Manal Bilal Mohamed

Paper ID: V4I3-1472

Paper Status: published

Published: June 4, 2018

Full Details
Research Paper

Analytical method development of the combination pesticide Azoxystrobin and Epoxiconazole by R- HPLC

A simple reverse phase liquid chromatographic method has been developed and subsequently validated for the Azoxystrobin and Epoxiconazole are a fungicide molecule; which are applicable for the treatment of the vegetable and fruits fungal decease. These Azoxystrobin and Epoxiconazole molecules were separated through a mobile phase consisting of the mixture of acetonitrile, methanol, and water in the ration of 10:30:60. All these solvents are HPLC grade. Column: Qualis BDS C18 (250 x 4, 5μ); Flow rate: 1.0 ml/min; Detector: UV-Vis. Absorption (λ) at 230 nm of Shimadzu HPLC (model: LC-2030). The LC solution software was used for the analytical method, data integrations, and calculations in this analysis. There are two molecules were analyzed for separation and quantification. The results of the study showed that the proposed RP-HPLC method is simple, rapid, precise and accurate, which is useful for the identification and quantifications of these molecules interims of validation parameters viz., separation, system suitability, System Precision and linearity in a simple HPLC analysis.

Published by: Ayyavoo Kaliyan, Dr. C. Tamilselvan

Author: Ayyavoo Kaliyan

Paper ID: V4I3-1600

Paper Status: published

Published: June 2, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X