Manuscripts

Recent Papers

Research Paper

Design and fabrication of embedded cutting and drilling machine

We all live in a world of advancing technologies which is shifting its gears day by day such as to comfort us at every step leaving behind time at a much rapid rate. Machines are the main source of production which influences us. Thus, making the process of manufacturing efficient in all aspects increases the production rate and human resource. Considering all these aspects, our aim is to design a multipurpose device such as to make it reliable and decrease the workload. We have fabricated the device in such a way to perform no. of operations like cutting and drilling with the use of a hydraulic system using the same. The device makes sure that it reduces the time and increases productivity at a definite rate.

Published by: Nishant Sharma R, P. B. Dinesh, S. Devanathan, N. Mohammad Abu Basim, A. Ashwindh Vignesh

Author: Nishant Sharma R

Paper ID: V3I12-1147

Paper Status: published

Published: December 12, 2018

Full Details
Research Paper

Cathode ray propulsion rocket

The Cathode Ray Propulsion Rocket is working by an atomic reactor power supply source with a rectifier for the D.C. current which is needed for cathode ray tube. Cathode Ray has a momentum with light speed/second that is why if we achieve 1/10th part speed of the light speed then we can get a big achievement for technological progress in the sector of missile defense and space research sector in an eco-friendly environment. Someone said that who has the advantage position in speed and range of fighter aircraft and missile, he is the game changer of the last moment of electronic warfare. Emitted Cathode Ray is not the cause of polluted gas caused by the burning of liquid and solid fuel but we have to find out the exact voltage current and size with a type of the cathode ray tube for generating necessary thrust for liftoff of the rocket. U.S.A. has made a cathode ray toy (Bablet) by the help of NASA but this kind of rocket engine’s example has not been designed. Atomic aircraft cargo fighter ship and atomic submarine are not for emitting cathode ray by using Newton’s third law of motion but it is. It needs a heat shield for every module for the protection against damage caused by excessive heat due to an atomic reactor. Technical phenomena of rectifier can be selected according to the electrical power of the atomic reactor. It will be very helpful and time saver for an unmanned planetary astronomical mission. High level of security measures should be taken with external anti-radiation moderator because we have to always remember that it is an atomic reactor power source based project. I think a hole external moderator assembly should be made because any disaster in the mid sky will be catastrophic and due to this I am saying it can be used in war only in case of atomic threat by the enemies as keeping in mind as a factor of world peace.

Published by: Krishnendu Sengupta

Author: Krishnendu Sengupta

Paper ID: V3I12-1140

Paper Status: published

Published: December 12, 2018

Full Details
Review Paper

The power of knowledge: A mini review

Knowledge is familiarity or understanding of something or someone through experience. Gaining knowledge is acquiring information, skills or facts through education, experience or through other means of understanding. This article gives information on this topic in a way to impart more knowledge about this topic and also bring more understanding of the subject matter. This review provides the basic definition of knowledge and the power that knowledge commands. Moreover, the review gives a clear description of how knowledge is resourceful in an individual point of view. Also, the text has described the relationship between knowledge and technology.

Published by: Nasser Salim Ali Al Shekaili

Author: Nasser Salim Ali Al Shekaili

Paper ID: V3I12-1145

Paper Status: published

Published: December 6, 2018

Full Details
Case Study

A study on employee retention strategies at Hyundai Motor India Limited in digital era

In today’s scenario, retaining the employees is becoming a challengeable job. Hiring knowledge people for the job is essential for an employer. But the retention is more important than hiring because the employees are valuable assets to the organization. So it is the responsibility of the organization to develop the strategies in order to retain the employee. Today, employees are different. They are not the ones who don’t have good opportunities in hand. As soon as they feel dissatisfied with the current employer or the job, they switch over to the next job.

Published by: N. Muthuselvi

Author: N. Muthuselvi

Paper ID: V3I12-1137

Paper Status: published

Published: December 6, 2018

Full Details
Review Paper

Impact on learning and teaching with cloud computing

In today’s technology based world, using cloud based learning, teachers are improvising on teaching methodologies by integrating modern technologies such as blended learning and collaborative learning, thus creating an effective learning environment for students In a rapidly evolving technological world, cloud computing is an emerging trend that has firmly sunk its footprints in a surplus of industrial verticals. Importantly, the cloud is proving to be an important backbone in the modern education sector. Cloud computing is a very important low cost entry to education market for many small, medium and upcoming educational institutions, due to the pay as you use pricing framework, and delegation of resource and computing tasks to remote cloud data centers. Hence if today, I want to open a community college, if need not worry about buying strong supercomputers, databases, servers, and physical support staff for them, for my computing, record keeping and other cyber-dependent tasks etc. I can just delegate them to the cloud, which provide results back to cheap thin clients at your college. Thus there is reduced investment, hence I can charge my students less for their fees, if I want to keep my profits constant. During vacations, nothing is used, so no pay is required, during end semester you can have more traffic and then you pay more as you use. As you could see there is a tremendous benefit for students, colleges and university administration. Cloud Computing is a very low cost entry to accessing large scale infrastructure for imparting effective computer science education and experiments that need to test big data, massive parallel algorithms etc. The students could also benefit by lesser fees, because of reduced investment and maintenance of in house cyber infrastructure. This paper focuses on the impact on the learning and teaching with cloud computing and show the beneficial of the cloud computing in Educational sector.

Published by: Shartaj Fatima

Author: Shartaj Fatima

Paper ID: V3I11-1144

Paper Status: published

Published: November 29, 2018

Full Details
Research Paper

Human rights violations in Myanmar: Rohingya case

Myanmar gained its independence in 1948 and faced a military coup in 1962. The country was ruled by a military dictatorship for two generations. During the period of military dictatorship, the economy, social order, cultural diversity, and political freedoms had been continuously decreased. In addition, there had been an increase in human rights violations. Today, Myanmar human rights violations are one of the worst countries in the world. In particular, human rights violations against ethnic minorities have increased dramatically. As a result of these human rights violations increasing, armed conflicts started between many ethnic minorities and army. This paper examines human rights violations against ethnic minorities in Myanmar. The human rights violations of the Myanmar regime against ethnic minorities have been analyzed in depth with the case of Rohingya.

Published by: Ahmet Yiğitalp Tulga

Author: Ahmet Yiğitalp Tulga

Paper ID: V3I11-1178

Paper Status: published

Published: November 29, 2018

Full Details
Research Paper

IoT based border alert and secured system for fisherman

An embedded system which protects the fishermen by notifying the country border to them by using Global Positioning System (GPS) and Global system for mobile communication (GSM). Using GPS, we can find the current latitude and longitude values and is sent to the microcontroller unit. Then the controller unit finds the current location by comparing the present latitude and longitudinal values with the predefined value. Then from the result of the comparison, this system aware the fishermen that they are about to reach the nautical border. Looking at this operation from an IoT (Internet of Things) lens, and taking account of the latest technology, it seems necessary and desirable to integrate the data sources to make sure that the perspective that needs is based on a complete picture of the situation – not just whether the traveler or a vehicle is on the watch list. This paper looks at some of the issues and opportunities that appear to be worth considering. It is necessarily a cursory look presented in the hope that it will be of use as the thought process for such a project starts. These are strictly personal views of the authors who have no connection with any law-enforcement agency If the boat enters the zone nearer to the restricted zone the alarm will turn on and the speed of the boat engine automatically gets controlled by the concerned authority and once it touches the restricted zone and its pulled back to the non restricted area.

Published by: Uthayakumar Jothilingam, Liston Deva Glindis

Author: Uthayakumar Jothilingam

Paper ID: V3I11-1170

Paper Status: published

Published: November 29, 2018

Full Details
Research Paper

Modified Support Vector Machines approach for image retrieval

Content-based image retrieval uses portrayals of highlights that are naturally extracted from the images themselves. Almost the majority of the current CBIR frameworks take into account questioning by-precedent, a method wherein an image (or part of an image) is chosen by the client as the inquiry. The framework separates the component of the question image, scans the database for images with comparative highlights, and displays significant images to the client arranged by similitude to the inquiry. In this specific circumstance, content incorporates among different highlights, perceptual properties, for example, surface, shading, shape, and spatial connections. Numerous CBIR frameworks have been produced that think about, break down and recover images based on at least one of these highlights. A few frameworks have made different degrees of progress by joining both content-based and message based retrieval. In all cases, in any case, there has been no complete end with respect to what highlights give the best retrieval. In this paper, we present a changed SVM system to recover the images like the inquiry image.

Published by: Nasib Kaur, Sukhdeep Kaur

Author: Nasib Kaur

Paper ID: V3I11-1169

Paper Status: published

Published: November 29, 2018

Full Details
Review Paper

A review paper on Support Vector Machines for image retrieval

Image retrieval is an imperative zone of advanced image preparing. An image can be recovered from a huge database on the premise of content, shading, structure or content. Content-based image retrieval utilizes the visual contents of an image, for example, surface, shading, shape, and spatial format to speak to and list the image. In normal CBIR frameworks, the visual content of the images in the database is extricated and portrayed by multi-dimensional component vectors. The component vector of the images in the database frame an element database. To recover the images, clients give the retrieval framework precedent images. The framework at that point changes these precedents into its interior portrayal of highlight vectors. In this paper we present the audit on different content-based image retrieval strategies

Published by: Nasib Kaur, Sukhdeep Kaur

Author: Nasib Kaur

Paper ID: V3I11-1168

Paper Status: published

Published: November 29, 2018

Full Details
Case Study

Dangerously leaking nose

Cerebrospinal fluid(CSF) rhinorrhea is a symptom caused by the leakage of CSF into the nasal septum, resulting from a defect in the skull base. Bacterial meningitis following CSF rhinorrhea is seen even in immunocompetent individuals. Meningeal infection with Mycobacterium tuberculosis is an example of a form of meningitis where difficulties in diagnosis and management regularly occur. However tubercular meningitis(TBM)is very rare and there is still no diagnostic method, which is both sufficiently rapid and sensitive.

Published by: Soham Mukherjee, Himanshu Bhagbole, Suraj Kumar, Krishna Kumar

Author: Soham Mukherjee

Paper ID: V3I11-1163

Paper Status: published

Published: November 29, 2018

Full Details