Manuscripts

Recent Papers

Research Paper

IoT based garbage monitoring system

These days we can see that a large portion of the refuse's over the roadside, also in many spots, dustbins are not cleaned at appropriate time are over-burden in light of the fact that the squanders are not collected regularly, this prompts various types of ailments, the expansive number of creepy crawlies and mosquitos. It results in the creation of an unhygienic condition for the general population and makes terrible smell around the environment. The conventional method for physically observing the losses in squander canisters is a mind-boggling, bulky process and uses more human exertion, time and cost which isn't perfect with the present day innovations in any capacity. To defeat this issue we will execute an undertaking called IOT based Garbage Monitoring System. In this paper, we will portray savvy dustbin in view of Arduino Nano, Ultrasonic sensor, LoLin NodeMCU and Flame sensor which is interfaced with Mobile Application through Web Server to put on brilliant dustbin which will quantify the status of the dustbin. This system screens the trash canisters and educates about the level of waste gathered in the junk containers. This will likewise send the status of bins to waste accumulation vehicles.

Published by: Naman Sharma, Nikhil Mishra, Paurvi Gupta

Author: Naman Sharma

Paper ID: V4I2-1834

Paper Status: published

Published: April 16, 2018

Full Details
Research Paper

Conceptual design and analysis of electron beam welding fixture for truss rod assembly in the construction of ITSC-15 in GSLV MK-II

The scope of our project deals with the design of a welding fixture for Electron Beam Welding to weld the Truss rod Assembly of Inter Tank Structure and Lower Thermal Shroud for GSLV MK-II. According to this, the result of the welding is pure and dense, porosity and inclusions are not present in welds due to the absence of oxidization in the chamber.The role of our project is to design the fixture to support the components that have to be functioning in order to increase the geometrical accuracies and mainly concentrated to reduce the fabrication errors that comes under the manufacturing process.

Published by: Moniha P, Ajithkumar M, Mahalakshmi S, Thiyagu M

Author: Moniha P

Paper ID: V4I2-1850

Paper Status: published

Published: April 16, 2018

Full Details
Case Study

FEM analysis of helical gear

In this paper the problem of the failure of gear in speed reduction gearbox developed by Laxmi Hydraulic Pump ( LHP) Pvt Ltd, Solapur is resolved by modifying or redesigning the gear and pinion using AGMA and FEM analysis Method. In the gear design, the bending stress and surface strength of the gear tooth are considered to be one of the main contributors to the failure of the gear.In this paper bending and contact, stresses are calculated by using the analytical method as well as Finite Element Method. the software is used to generate the 3-D solid model of the helical gear. Ansys software package is used to analyze the bending stress and contact stress. The main objective of this study has to investigate the stresses induced by gear tooth profile. Finally, the results obtained by theoretical analysis and Finite Element Analysis are compared to check the correctness. Estimated stress is used to calculate module of gear which can withstand easily at given loading conditions.

Published by: Sonali A. Mote, A. V. Gaur, Ajit. B. Gujale

Author: Sonali A. Mote

Paper ID: V4I2-1872

Paper Status: published

Published: April 16, 2018

Full Details
Research Paper

Movie recommendation system

Recommendation systems have become increasingly popular in recent times. They are utilized in a variety of areas like music, videos, and social sites. There are two ways to produce recommendation-through collaborative filtering-which presents recommendation based on past history of the user. Content-based filtering uses similarity between items to recommend a product. In this paper, we have proposed a movie recommendation system based on collaborative filtering method and simple method of ranking movies according to their popularity rating. The system has been developed using PHP, python.

Published by: Deepak Kumar Singh, Abhishek Gangwar, Abhishek Sharma

Author: Deepak Kumar Singh

Paper ID: V4I2-1826

Paper Status: published

Published: April 16, 2018

Full Details
Research Paper

Analysing Twitter Bot

A Twitterbot is a type of bot software that controls a Twitter account via the Twitter API. The bot software may autonomously perform actions such as tweeting, retweeting, liking, following, unfollowing, or direct messaging other accounts. The automation of Twitter accounts is governed by a set of automation rules that outline proper and improper uses of automation. Proper usage includes broadcasting helpful information, automatically generating interesting or creative content, and automatically replying to users via direct message. In this paper, we are examining the automatic replies generated by a text generating machine which generates the quote to the hashtag word (prime word) sent by a sender to the bot. For training, the bot deep neural networks, more specifically RNN(Recurrent neural network) is used for which python is used as the programming environment, and Tensorflow as the machine learning library. On the sender’s side, we applied the text summarisation algorithm using PyTeaser library to detect whether the quote generated and tweeted to the sender is by the bot or any human.

Published by: Shipra, Rahul Yadav

Author: Shipra

Paper ID: V4I2-1810

Paper Status: published

Published: April 16, 2018

Full Details
Research Paper

Spy camera attacks on mobile security

Nowadays, Smartphone security has become a major issue to resolve. All the smart phones have features like camera, touch screen and many more. These may cause attacks on users smart phones. Modern smart phone platforms provide users to customize their device using applications found on app stores. Users are constantly in trouble that they are unaware of installing malicious apps that steal personal data or gain access to other private information. For example, while using such malicious application, the application provider may carry the hidden request to have access to different devices connected to our phone such as camera, smart phone is been attacked, identifying our location through camera as it will show our surrounding area and trying to identify PIN using camera. However, few Works have studied mobile phone multimedia Security. In this survey, we focus on security problems related to mobile phone cameras. Specifically, we discuss several attacks that are based on the smart phone features.

Published by: Bhagyashree Sonone, Samrudhi Khond, Pranali R. Dandekar

Author: Bhagyashree Sonone

Paper ID: V4I2-1796

Paper Status: published

Published: April 16, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X