Manuscripts

Recent Papers

Project Report

Privacy and Security on Twitter: A Semantic Network Analysis

As the technologies advance rapidly, the privacy and the security have become one of top concern in the digital communication in this age. Thus, we are trying to understand and drawing a conceptual view depend on how is the people view privacy and security in this era which has been changed and still changing and expanding as the technology developed. In order to analyze and see what it the person's apprehension regarding the view of the privacy and security, we have used one of the widespread social media which is Twitter. Based on the Twitter’s users view we have constructed our project and draw our conclusions. We have collected more than 125000 tweets to analysis them based on different aspects. This project mainly focused on privacy and security then it takes into account the Health Information Portability and Accountability Act (HIPAA), Facebook, and online keywords. After collecting the tweets, we have analyzed them using AutoMap tool. In the initial analysis, AutoMap extracts all of the words which have been occurring in the tweets along with each word frequency. As a second step of the analysis, we have filtered out all about numbers, symbols, and non-relative wording. Then, we took the most frequent work and did discourse analysis to see how these words are emerging. Based on discourse analysis, we have wiped out some of the words that appear in different context. From that point, we have drawn our discussion and conclusions. Based on our analysis, the privacy is beyond the information control and access. The people have changed their view regarding the privacy with the advancement of the technology. The Twitter’s users get concerned about their Facebook and Google personal data privacy. Particularly, when the Facebook has posted the new term and privacy policy, the users become more worried about their privacy. In addition, Twitter users’ were discussing the privacy and security of the mobile device to further assist the people who plan to buy in the near further. Moreover, they have anxiety regarding different acts and lows that are developed, and whether these laws will protect them or the laws will work against them.

Published by: Mansour A. Alshaikhsaleh, Dr. Abdullah, Faisal, Prof. Mohamed Zohdy, Ahmad Alshammari

Author: Mansour A. Alshaikhsaleh

Paper ID: V4I1-1385

Paper Status: published

Published: February 21, 2018

Full Details
Research Paper

Use of Surf and Genetic Algorithm for Content Based Image Retrieval System

Content-based image retrieval (CBIR) has most important research area in the last couple of years. Image retrieval is the system used for searching out the desired features of a query image. The main purpose of CBIR method is to obtain the accurate and fast results. In this paper, an Query image is retrieved from the database with high accuracy. This going through various steps namely, Pre-processing, feature extraction, Optimization and matching. In pre-processing noise is removed by using filtering and color conversion is performed on the query image. For extracting features SURF (Speedup Robust Feature) descriptor is used. It is the enhanced form of SIFT (Scale Invariant Feature transform) and more speedy than it. For optimization Genetic algorithm (GA) is used which improves the features of the extracted image. For matching Euclidian formula is used. It measures the similarity between the extracted feature and the database image. The simulation is carried out in MATLAB simulator tool with an accuracy of approximately 98 %.

Published by: Sumit Sharma, Kavita

Author: Sumit Sharma

Paper ID: V4I1-1342

Paper Status: published

Published: February 21, 2018

Full Details
Survey Report

Survey on an Intelligent AAA Device for Fire Detection

Fire is a huge serious disruption which can lead to economic or environmental losses. A system to detect fire and alarm the people before it breaks out is a need to our environment. In this paper, the focus is on the literature by providing an edifice and comprehensive overview of fire detection. It includes Alarming, Authentication and then Addressing the location of the place where the fire broke out to the admin and fire emergency services. Raspberry Pi 3 is used to control the system which is integrated with few sensors and camera. It supports image processing using OpenCV library which is used to process video more accurately with less time period. A 360ż relay motor is assembled with the camera so that it can snap the image in whatever angle the fire is detected after sensor detection. To avoid disk memory usage, this system saves the image only when a fire is detected. This paper also reviews the context and key features of fire detection systems. A method of combining sensor data and real-time processing help the device to avoid false alarm and image is sent to a group of users. Finally, we summarize the open problems and future exploration area in detecting the fire and authenticating it to the users.

Published by: Ramya. K, Subashini. I, Subhashri. H, Kalpana Devi. S

Author: Ramya. K

Paper ID: V4I1-1396

Paper Status: published

Published: February 19, 2018

Full Details
Research Paper

Experimental Analysis on Concrete by Partial Replacement of Fine Aggregate with Powdered Ceramic Tile

Concrete is the most versatile material in building industry. River Sand is scarcely available now and other alternative materials are being tried. Ceramic tiles are widely used in the construction industry in which about 25% becomes waste. This investigation deals with replacing sand partially with 10%, 20%, 30% and 40% of waste powdered ceramic tile in concrete. The test results for M30 grade concrete with water cement ratio of 0.4 and partial replacement by 30% shows an increase of 13% and 15% respectively in compressive and flexural strength. For 40% replacement of sand with ceramic tile, the compression and flexural strength are at par with conventional concrete. The result leads to the effective utilization of ceramic tile waste thus by reducing the disposal and environmental problems.

Published by: Dr. P. Chandrasekaran, R. Ramesh Kumar, R. Praba Rajathi

Author: Dr. P. Chandrasekaran

Paper ID: V4I1-1383

Paper Status: published

Published: February 19, 2018

Full Details
Research Paper

Comparative Evaluation of Mast Cell Tryptase Activity in Oral Squamous Cell Carcinoma (OSCC), Oral Precancerous Pathologies (OPP) and Normal Oral Mucosa (NOM)

Oral squamous cell carcinoma (OSCC) is the most common malignancy of the oral cavity. Many times it is preceded by oral precancerous pathologies (OPP) namely leukoplakia, erythroplakia, and oral submucous fibrosis. The rate of malignant transformation is variable for these premalignant pathologies. Mast cells have a predominant role in tumor progression and metastasis. Mast cells contain proteolytic enzymes tryptase and chymase which is responsible for degradation of extracellular matrix. In the current research project, we have studied the comparative expression of mast cell tryptase activity in OSCC, OPP & NOM using immunohistochemistry method.

Published by: Dr. Anuradha Kote, Dr. Ajinkya Deshmukh, Dr. Atul Deshmukh

Author: Dr. Anuradha Kote

Paper ID: V4I1-1379

Paper Status: published

Published: February 19, 2018

Full Details
Review Paper

Hand Detection and Gesture Recognition in Real-Time Using Haar-Classification and Convolutional Neural Networks

Over the past few years, with the development of hardware and software, Human-Computer Interaction(HCI) has evolved from the use of keyboard and mouse to a more gesture-based approach to make the computer function according to your own will. Gesture Recognition has been used successfully in various applications like gaming (Xbox Kinect), recognizing sign languages and many others. The use case for the gesture recognition problem is very vast and therefore is being worked on continuously.

Published by: Kartik Wadehra, Mukul Kathpalia, Vasudha Bahl

Author: Kartik Wadehra

Paper ID: V4I1-1377

Paper Status: published

Published: February 19, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X