Manuscripts

Recent Papers

Others

Image Processing in Industry 4.0

The world is moving rapidly towards establishing industry 4.0 in every field. The concept of industry 4.0 is to replace humans with Robots or Software bots to perform repetitive tasks and tasks that require a high amount of accuracy and speed. Industry 4.0 is achieved by connecting various machines that can communicate with each other to collect and analyze tremendous amounts of data. These machines are connected to a large number of high-precision sensors and actuators that can help to monitor, operate and manage various industrial processes in real-time. The use of machine learning and artificial intelligence has enabled machines to automate various processes that required manual labor and also to make accurate decisions without the need for any human intervention. Image Processing is a major component of Industry 4.0. The main objective of this paper is to understand the concept of image processing, and its application in the industry and to build a simple Machine Vision (MV) solution that uses image processing algorithms to detect an object irrespective of its orientation.

Published by: Jhanavi Trilok, Shivkumar A., Dr. Babu Rao, Dr. S. Saravana Kumar

Author: Jhanavi Trilok

Paper ID: V8I3-1406

Paper Status: published

Published: June 18, 2022

Full Details
Thesis

Migration of Database from Oracle to Sybase System

This Migration intends to give the relocation interaction from an Oracle database to Sybase ASE (Adaptive Server Enterprise). By “migration " we mean the most common way of changing a client-server application at present involving the Oracle database as its RDBMS, to such an extent that it utilizes the Sybase ASE database instead. This Migration has as its essential concentration to move usefulness from Oracle to Sybase ASE. Execution-related parts of Sybase ASE are covered Sybase ASE is the data set that powers Wall Street. ASE has been conveying unshakable dependability and top-level performance for the beyond 25 years. Sybase ASE has a lower total cost of ownership than Oracle and delivers better performance on the same hardware. Sybase ASE is ready to be the database in any application that runs on Oracle today

Published by: Praful R. Nagpure

Author: Praful R. Nagpure

Paper ID: V8I3-1405

Paper Status: published

Published: June 18, 2022

Full Details
Research Paper

Detection of phishing websites using a Machine Learning approach

In recent years, advancements in Internet and cloud technologies have led to a significant increase in electronic trading in which consumers make online purchases and transactions. This growth leads to unauthorized access to users’ sensitive information and damages the resources of an enterprise. Phishing is one of the familiar attacks that trick users to access malicious content and gain their information. In terms of website interface and uniform resource locator (URL), most phishing webpages look identical to the actual webpages. Various strategies for detecting phishing websites, such as blacklist, heuristic, Etc., have been suggested. However, due to inefficient security technologies, there is an exponential increase in the number of victims. The anonymous and uncontrollable framework of the Internet is more vulnerable to phishing attacks. Existing research works show that the performance of the phishing detection system is limited. There is a demand for an intelligent technique to protect users from the cyber-attacks

Published by: Koushik Kumar Reddy, E. Surendra, M. Sai Nikhil Gowd, N. Jaya Pradeep Reddy, Narasimhayya B. E.

Author: Koushik Kumar Reddy

Paper ID: V8I3-1404

Paper Status: published

Published: June 17, 2022

Full Details
Research Paper

Investigating the impact of COVID-19 on Transplantation and Transplant patients and observing the further consequences of the virus caused on the lives of the transplanted

The purpose of this paper is two-pronged to analyse and assess if COVID has had any impact on the quality of life/longevity of patients who have received transplants. To identify what (if any) impact COVID has had on the lives of patients waiting for transplants. It aims to compare the physical and psychological challenges faced by transplant patients, after transplant and after COVID. For those waiting for transplants, with COVID restrictions, there was a two year period in which transplants were stalled or delayed and therefore looks at the consequential impact on those waiting for transplants. A study was conducted with transplant patients of Indian origin, and transplant surgeons and secondary research findings were conducted since the inception of the pandemic.

Published by: Nirvaan Puri

Author: Nirvaan Puri

Paper ID: V8I3-1403

Paper Status: published

Published: June 16, 2022

Full Details
Research Paper

Use and application of nudging in different countries

‘Nudging’ has been a popular technique used by governments, institutions, and other groups to reinforce positive habits and choices among people without the use of force and with ease of opting out. Different countries around the globe have inculcated the practice of ‘nudging’ into their policies for purposes like improving public health, promoting eco-friendly behavior, and more. It’s important to study and analyze past experiments with nudging in order to understand what makes a ‘nudge’ effective, which in turn will help formulate better such campaigns in the future.

Published by: Tanushree Sarda, Simran Raina, Milind Surana, Vineet Nair, Ganeev Kaur Sethi, Sattwik Mohanty

Author: Tanushree Sarda

Paper ID: V8I3-1402

Paper Status: published

Published: June 16, 2022

Full Details
Research Paper

Sensitivity Analysis using k-anonymization

It's necessary to keep sensitive data and private data safe. When financial information, healthcare information, and other sensitive consumer or user data are mishandled, they can be destructive. Due to a lack of access control over personal information, individuals may be susceptible to fraud and identity theft. This paper provides an overview of the ideas of data privacy, re-identification risk, and dataset utility, as well as the correlations between the three. On the adult dataset from the UCI Machine Learning Repository, this study presents a sensitivity analysis of the k-anonymization algorithm. ARX, an open-source anonymization tool, was used to show this.

Published by: Krishna Yanmantram, T. M. Vishnu Mukundan, Jama Surya Teja

Author: Krishna Yanmantram

Paper ID: V8I3-1399

Paper Status: published

Published: June 15, 2022

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X