Manuscripts

Recent Papers

Research Paper

Traffic sign detection and recognition for autonomous vehicles

Traffic sign recognition and detection is an important part of any autonomous vehicle. However the real challenge lies in the detection and recognition of these traffic sign from the natural image in real time and with accuracy. This paper gives an overview of the traffic road sign detection and recognition system, we developed and implemented using artificial neural network which are trained using real life datasets. This paper presents the usage of convolution neural network along with GTSRB dataset as an implementation of our project to attain real time result with accuracy. The system developed based on this methodology can be implemented in public transports, personal cars and other vehicles in order to keep drivers alert and reduce human errors that lead to accidents. The project has a wide implementation in self-driving vehicles.

Published by: Mohit Singh, Manish Kumar Pandey, Lakshya Malik

Author: Mohit Singh

Paper ID: V4I2-1815

Paper Status: published

Published: April 12, 2018

Full Details
Review Paper

Design and estimation RCC overhead water tank

Storage reservoirs and overhead tank are used to store water, liquid petroleum, petroleum products and similar liquids. The structure analysis of the reservoirs or tanks is about the same irrespective of the chemical nature of the product. All tanks are designed as crack free structures to eliminate any leakage This project gives in brief, the theory behind the design of liquid retaining structure (Elevated circular water tank with a domed roof and conical base) using working stress method. Elements are designed in limit state method. Liquid tanks and especially the elevated tanks are structures of high importance which are considered as the main lifeline elements that should be capable of keeping the expected performance. An earlier design of water tanks being done using the working stress method given in IS 3370: 1965. This method leads to thicker and heavily reinforced section. The use of limit state method of design has been adopted in received code IS 3370:2009 and provision for checking the crack width is also included in this code.

Published by: Ravi, A. Parameshwar, D. Vijay kumar, R. Narender Reddy, M. Rajesh

Author: Ravi

Paper ID: V4I2-1820

Paper Status: published

Published: April 12, 2018

Full Details
Research Paper

Securing coding-based cloud storage against pollution attacks

At present Cloud Computing has become a popular computing paradigm. Though Cloud Computing architectures lack support for computer forensic investigations. Inspecting various logs such as process logs, network logs etc plays an important role in computer forensics. Pollution Attack, whereby is an arrangement of noxious substances endeavor to degenerate put away information, are one of the many dangers that influence cloud information security. Pollution attack occurs when along with the data packets, malicious packets are injected into the network. In this paper we manage pollution attack in coding-based square level distributed storage frameworks, i.e. frameworks that utilize straight codes to part, encode, and scatter virtual circle areas over an arrangement of capacity hubs to accomplish wanted levels of repetition and to enhance unwavering quality and accessibility without giving up on execution. Shockingly, the impacts of a pollution attack on straight coding can be unfortunate, since a solitary dirtied piece can proliferate unavoidably in the interpreting stage, along these lines hampering the entire division. The alarm triggers a procedure that locates the polluting nodes using the proposed detection mechanism along with statistical inference. The packets which fail the verification are detected and discarded by considering they are malicious packets or polluted packets in the network. Therefore the pollution in the network is removed before the packets reach the destination. Hence the pollution attack is reduced and this, in turn, will increase the throughput and performance of the data transmitted across the coding based network in cloud storage.

Published by: Parihar Vimladevi Mishrilal, Rohini Dattatrey Patil, Supriya Shrikant Shete, Bhargavi Rai, Babita Bhagat

Author: Parihar Vimladevi Mishrilal

Paper ID: V4I2-1821

Paper Status: published

Published: April 12, 2018

Full Details
Research Paper

An FPGA based cyclic navigation Algorithm for mobile robots in the indoor environment

Guiding a mobile robot for within the time in an indoor environment has shown the way for the study and sophistication of navigation methods. In this paper, we developed robotic structure in the indoor and developed navigational algorithm that would be helpful to move from one point to another point. This paper concentrates on the design of mobile robot control mechanism that uses the ultrasonic array for sensing random maze environment like hospitals and actuate the motor modules accordingly to complete the service. As a part of the development, we simulated in Xilinx ISE 10.4 environment using Verilog HDL programming and also synthesized on FPGA part Spartan 3AN evaluation board by considering a random environment.

Published by: Kishore Vennela, M. K. Ravali, G. Manisha, T. Hema Rani, B. Sai Charan Rathod

Author: Kishore Vennela

Paper ID: V4I2-1823

Paper Status: published

Published: April 12, 2018

Full Details
Research Paper

Dynamic analysis of block type machine foundation as per IS: 2974 (Part-I) – D.D.Barkan method by application software

Today most of the analysis and design processes are done on the computers day-by-day. The ongoing process of the invention makes it more and easier. In this work, the analytical solutions are programmed for dynamic study of block foundation. The results can be obtained in the detailed text file so that the user can easily understand. This application package is developed by me, using latest standards of Visual C++. The reliability of this package can be checked with manual work. In this package, Visual C++ is used because; it is the most powerful tool among all other programming tools.

Published by: Kalpak M Vora

Author: Kalpak M Vora

Paper ID: V4I2-1837

Paper Status: published

Published: April 12, 2018

Full Details
Case Study

Manipulated undiagnosed Dermal Sinus leading to Meningitis/Sepsis with Multifocal Brain Abscess (Lesion)

A dermal sinus tract is a very rare entity, which usually comes to clinical attention by cutaneous abnormalities, neurologic deficit, and/or infection [1]. The present study was undertaken to know the clinical profile, differential diagnosis and management of the manipulated undiagnosed dermal sinus leading to meningitis or sepsis with multifocal brain abscesses and discussed associated anomalies and to assess the results of surgical intervention.

Published by: Dr. Prasada Swamy, Dr. Vangala Bramha Prasad, Dr. Srividya Lonkala

Author: Dr. Prasada Swamy

Paper ID: V4I2-1839

Paper Status: published

Published: April 12, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X