Manuscripts

Recent Papers

A Pairwise Algorithm using Speech Separation and Pitch Estimation for the Deep Stacking Network

The Speech detachment and contribute estimation loud conditions are thought to be a "chicken-and-egg" issue. Pitch data is an one of the essential prompt for discourse partition. Also, discourse detachment makes pitch estimation simpler when foundation commotion is expelled. In this paper, we propose a directed learning design to take care of these two issues iteratively. The proposed calculation depends on the profound stacking system (DSN), which gives a technique to stacking straightforward preparing modules to manufacture profound structures. Every module is a classifier whose objective is the perfect paired veil (IBM), and the information vector incorporates otherworldly components, pitch based elements and the yield from the past module. Amid the testing stage, we gauge the pitch utilizing the partition results and refresh the pitch-based components to the following module. At the point when inserted into the DSN, pitch estimation and discourse detachment each run a few times. To examination technique demonstrate that the proposed framework result in both a top notch assessed twofold cover and precise pitch estimation and outflanks late frameworks in its speculation capacity.

Published by: Saranya .S, E. Menaka

Author: Saranya .S

Paper ID: V2I6-1136

Paper Status: published

Published: June 7, 2017

Full Details

Public Auditing For Shared Data with Efficient User Revocation in the Cloud

With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the large size of shared data in the cloud. In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind. By utilizing the idea of proxy re-signatures, we allow the cloud to resign blocks on behalf of existing users during user revocation so that existing users do not need to download and re-sign blocks by themselves. In addition, a public verifier is always able to audit the integrity of shared data without retrieving the entire data from the cloud, even if some part of shared data has been re-signed by the cloud. Moreover, our mechanism is able to support batch auditing by verifying multiple auditing tasks simultaneously. Experimental results show that our mechanism can significantly improve the efficiency of user revocation.

Published by: R. Ramesh, Dr. N. Revathy

Author: R. Ramesh

Paper ID: V2I5-1139

Paper Status: published

Published: June 3, 2017

Full Details

Prospective Study to Study the Effect of Routine Salpingectomy with Hysterectomy on Ovarian Reserve

Fallopian tube removal(salpingectomy) is being incorporated in routine hysterectomy procedures as there have been theories supporting less incidence of development of adenexal mass including ovarian tumour in post hysterectomy patients.Fallopian tube is also considered a reservoir of serous tubular intraepithelial carcinoma precursor cells, which are considered to be precursor of epithelial ovarian carcinoma, So studying the ovarian reserve before and after routine salpingectomy helps in deciding whether or not salpingectomy affects ovarian reserve in patients undergoing hysterectomy.As diminished ovarian reserve predisposes to onset of postmenopausal symptoms , one of the drawback of hysterectomy.

Published by: Nikita Mittal, Nisha Rani Agarwal, Ashish Verma

Author: Nikita Mittal

Paper ID: V2I6-1151

Paper Status: published

Published: June 2, 2017

Full Details

IOT Application in Education

“The Internet of Things allows people and objects to be connected Anytime, Anywhere, preferably by means of Any path/network and Any service.” In this article there is a brief overview of IoT areas and possible solutions of use in Education sector“. The article consists of three main parts: first, an overview of IoT applications, second, IoT in Education sector, and third, valued added things in education though IoT.

Published by: Shrinath S. Pai, Vikhyath, Shivani, Sanket, Shruti

Author: Shrinath S. Pai

Paper ID: V2I6-1148

Paper Status: published

Published: June 2, 2017

Full Details

Online Anomaly Detection Method Using Method of Support Vector Machine Algorithm

Conveyed registering is a trademark improvement of the no matter how you look at it gathering of the virtualization. It ensures more affordable IT, and additionally speedier, less requesting, more versatile, and more effective IT. In cloud conditions, a champion among the most unpreventable and urgent challenges for relationship in indicating security consistence is showing that the physical and virtual establishment of the cloud can be trusted – particularly when those system sections are asserted and supervised by outside organization providers. In ask for to remain adaptable to the external risks, a cloud needs the ability to react to alluded to perils, and to new troubles that target cloud establishments. In this paper we exhibit and look at an online cloud anomaly revelation approach, including conferred portions which are especially used for area in the cloud adaptability designing. We show that our peculiarity area plot i.e. Support Vector Machine (SVM) definition can accomplish a high revelation precision of over 90% while perceiving distinctive sorts of malware and DoS attacks. Moreover, we evaluate the upsides of considering both the structure level data and framework level data depending upon the attack sort.

Published by: V. Poomathy, R. Rajagopal

Author: V. Poomathy

Paper ID: V2I6-1141

Paper Status: published

Published: June 2, 2017

Full Details

Protect Data Transfer Using Method of Generic Data Lineage Framework & Encryption Mechanism

Consider or Non ponder spillage of the mystery information data is a positively a standout amongst the most serious security issues in the association these days .Not just in the association, it ought to be extend to individual lives. The a lot of data are refreshed in PDAs and informal communities, this was the reason that oversights was occurred by people. This data is sideways exchanged to outsider and fourth gathering applications. For this present the Generic system demonstrate (i.e.) Data ancestry of LIME structure. By utilizing this model, it comprises of two parts: proprietor and purchaser information stream over numerous substances. And furthermore play out an extra part called reviewer. Construct and consolidate another technique for Accountable information exchange convention with the system. At long last applying the LIME structure and responsibility system to the information spillage situations

Published by: T. Sathya, R. Shamili, K. SudahDevi, J. Jeyaram

Author: T. Sathya

Paper ID: V2I6-1140

Paper Status: published

Published: June 2, 2017

Full Details

Enabling the Structure from Its Packet Flow Disaster

Packet Flow control turns out to be essential in mostly operated and fused networks. It runs on precise applications. Here, packet flow control techniques for close networks are rendered. The proposal is to shift the flow of packets dodging trouble from the information fabric to an arranged network, that set aside flows using exact counters. The arranged network take in resultant power that allows data packets after holding back space for them in the buffer memories in pretense of fabric results. In detailed, a basic form give a picture of this outcome as synergy flanked by buffer uncertainties as well as fine-grained multipath routing. Two diverse schemes are at hand. The principal one keeps all the system in a fundamental organize component and in trouble-free. The subsequent one is further scalable by broadening the powers above the toggling components of the close network. It is finished by course-plotting the managed information to and from the endpoint adapters. Simulations of the entire scheme reveal promoted throughput and squat latency among the crammed amount produced. Weighted max-min reasonable portion of fabric resultant link bandwidth is also demonstrated. In addition, disturbance malfunctions illustrate that the instant that packets hang around in fabric as well as reordering buffers is diminished. At last, the promoted throughput potential of the structure is corroborated by a Markov chain scrutiny of final buffer responses.

Published by: D. R. Pavithra, E. Menaka

Author: D. R. Pavithra

Paper ID: V2I6-1137

Paper Status: published

Published: June 2, 2017

Full Details

Design and Analysis of Hot Rolls Using Finite Element Method

The main objective of this research work is to study the rolling process in steel manufacturing industry which has been in use to produce high quality steel products. The entire research work has been initially carried out by practical observation of the process in the steel manufacturing industry, along with the introduction of sophisticated technology having number of stands associated with rolls made of spheroidal cast iron and alloy cast steel. The hot billet is passed through different stands to get correct size with a defect free surface, At initial stage the billet ranging from 200-205mm can passed through roughing stands made of alloy cast steel, further it is passed through intermediate and continued to pass through finishing stands to get smooth finished product,The displacement at each stage is practically observed for thorough understanding of the valuable rolling design methods, In this thesis reverse engineering is done based on the practical conditions in order to achieve required finishing with minimal deformation in the stands while producing high quality rolled product. At next stage of the research , it is analyzed that the material used to manufacture the stands at initial stage has less Isotropic elastic properties when compared to spherodial cast iron. Thus the shape of the billet remains same, Also, the deformations at different stags are observed using finite element method using ANSYS 15.0 software after designing a 3D model in CATIA V5 software. Thus, the results obtained during post-processing, shows that spheroidal cast iron or SG iron is the best material than Alloy cast steel which was initially considered to overcome maximum twisting at the center of the rolls when billet is allowed to pass through the groves optimized with appropriated radiu, and spacing to balance various parameters such as roll separation force, torque, elongation, spread and draft. All the possible solutions have been discussed and the essential theoretical calculations are considered to successfully validate the results with the finite element analysis of hot rolled design.

Published by: L. Nalini, Dr. P. Vijay Kumar

Author: L. Nalini

Paper ID: V2I6-1145

Paper Status: published

Published: May 31, 2017

Full Details

Evaluation of Hepatoprotective Activity Of Arithirathi Chooranam In Ccl4 Induced Liver Damage In Rats

Though symptoms of Liver disorders are challenging, Siddha system of medicine ameliorates them in a very effective way. This research aimed to evaluate the Hepatoprotective activity of Siddha herbo mineral preparation Arithiraadhi chooranam by CCl4 induced hepatotoxicity in albino rats. Administration of Arithiraadhi chooranam significantly reduced the impact of CCl4 toxicity. Protection of hepatocytes was evaluated by estimating the level of ALT, AST, ALP, serum bilirubin, and total protein. The results strongly indicates that Arithiraadhi chooranam has appreciable hepatoprotective potential.

Published by: Kavitha .P, Velpandian .V, Kumar .A

Author: Kavitha .P

Paper ID: V2I5-1184

Paper Status: published

Published: May 29, 2017

Full Details

Strategies in Research

A plan or scheme by which the activity of searching for and assessing information found is carried out is called a research strategy. A research strategy usually involves a number of steps. Firstly, the analysis of the major concepts of the topic. Secondly, defining relevant keywords and their synonyms. Thirdly, searching appropriate information sources (e.g. databases), and fourthly, assessing the quantity and quality (relevance) of the information found. The research strategy, a subset of research design, includes elements of data collection and interpretation and emerges from both the research purpose and question. These strategies differ in their Ontological assumptions, Starting points, Steps or logic use of concepts and theory, Styles of explanation and understanding and the status of their products. Each strategy has connections with particular philosophical and theoretical traditions, i.e. research paradigms (Blaikie 2007).The paper has been analyzed in view of the research strategies which are done in carrying out the research activity. They provide a ladder which helps in carrying out the research. The strategies Inductive, Deductive, Retroductive & Abductive have been explained in the paper with their epsitelmogical assumptions. The paper analyses their importance & also brings out its applications that have come over the years.

Published by: Garima Malhotra

Author: Garima Malhotra

Paper ID: V2I5-1220

Paper Status: published

Published: May 29, 2017

Full Details