No. |
Title and Author |
Area |
Country |
Page |
601 |
Training Based Channel Estimation for Multi Carrier-Noma with Imperfect Channel State Information
-G. Aruna ; T. Agnes Ramena
Nowadays, the issue is to limits the general transmit control for multicarrier non-orthogonal various access (MC-NOMA) frameworks. The asset designation equation style is created as a non-curved change drawback that set up together styles the power portion, rate allotment, client programming, and progressive obstruction cancelation (SIC) unscrambling arrangement for limiting the general transmit energy of the frameworks. Along these lines, the general transmit control are put something aside for megacycle ulcer frameworks and furthermore the mean square mistake esteem is limited by the MMSE minimization strategy for Non-Orthogonal Multiple Access Systems. Read More...
|
Communication Systems |
India |
2178-2182 |
602 |
Adoption and Implementation of Supply Chain Management in Fast Food Industry in Pakistan
-Yasir Hanif ; Muhammad Usman; Muhammad Khalil
The study aims to identify the degree of impact of adoption variables that includes strategic purchasing, customer focus, environmental uncertainty, top management support, competitive priorities and information technology on supply chain management in fast food market. For the adoption and implementation of supply chain, the issue is that we don’t understand how strategic purchasing is impacted by different factors and how adoption factors impact buyer-supplier relationship. This study initiates and unites various supply chain schemes and factors to check the adoption and implementation of supply chain management in Pakistan for local and international fast food chains including the problems being faced and outcomes. Questionnaire was used to collect data from the respondents. Our unit of analysis is individual that is persona involved in managerial decision making. We collected the data from the managers of 105 multinational corporations and local firms of Rawalpindi and Islamabad. Study explores that customer focus, information technology and strategic purchasing are dominant factors in adoption of supply chain in both MNCs and local fast food chains. Results guide us toward the elements that come in the orbit of supply chain management in fast food in context of Pakistan. Read More...
|
Management science |
Pakistan |
2183-2193 |
603 |
Text Classification using Naive Bayes
-Kamaljeet Kaur ; Neena Madaan
In text mining, one of the challenging and growing importance's is given to the task of document classification or text characterization. In this process, reliable text extraction, robust methodologies and efficient algorithms such as Naïve Bayes and other made the task of document classification to perform consistently well. Classifying text documents using Bayesian classifiers are among the most successful known algorithms for machine learning. Text mining refers to the process of taking high-quality information from text one of the classification method that can be used is Naïve Bayes Classifier. Read More...
|
Computer Science and Engineering |
India |
2194-2196 |
604 |
Study on Safety Handling of Hazardous Chemicals in Industries
-Karthikeyan G
Anything which has a potential to cause harm resulting in injuries or ill-health, property damage is known as Hazard. In Industries Hazardous chemicals are used for manufacturing, Analysis and research. Many accidents have occurred due to mishandling of hazardous chemicals which are resulted in catastrophic events. Knowing the nature, property of chemicals would help preventing from severe accidents. This paper focuses on the various hazardous chemicals, their handling techniques and prevention to be taken. Read More...
|
Health,Safety and Environment Engineering |
India |
2197-2199 |
605 |
Stress Level of Banking Employee in Banks
-Aman Ansari
Stress and its effects on human being have spread cause its wings in all the sectors in general and the banking sector. There is tremendous challenge amongst the public and private banks to give services to their customers to keep them happy. In this technology driven corporate landscape, the corporate organization keeps their employees on their toes. While doing this, employee always experienced enthusiasm heaviness at the workplace which every now and then effects on their physical and mental health. The reason & idea of this paper is to measure up to the stress practiced by the employees of public and private sector banks using primary and secondary data. For the research paper, I have done study on staff of banks on the topic of stress level practiced by them. A study was done to address specific of bank employee's stress. The population of this study includes public bank and private bank employees in Pune and Indore. The sample size was 39 in which employees from public bank 20 and 19 employees from private banks are taken. The research followed systematic random sampling. The population belongs to an age group 25 -55 employees. The result reveals that work stress is found in survey. Read More...
|
MANAGEMENT |
India |
2200-2204 |
606 |
Effect of Demographics on Investment Objectives
-Aman Ansari
The markets have been moving from status to more of energy and are continuously changing the propaganda to risk. As the level of risk has been increasing, more and more money is at stake among different demographic profiles. This paper explores relationship between level of risk and demographic factors of investors. Depending upon risk appetite, there is an increase in number of investment avenues available for investors like bank deposits, government / private bonds, shares and stocks, mutual funds, insurance, derivatives, gold, silver, currencies, real estate, etc. Most of the investors' primary objective of investment is to earn capital appreciation and expected rate of return differs from individual to individual based on their level of market knowledge and risk taking ability. This paper further reveals that there is a negative correlation between Marital Status, Gender, Age, Educational Qualification and Occupation of the investors' also there is a positive correlation between Cities, Income Level and Knowledge of the investors'. This has been identified on the basis of cross analysis by applying Correlation analysis. Read More...
|
MANAGEMENT |
India |
2205-2207 |
607 |
Design and Fabrication of Multi-Terrain Motorized Mountain Board
-Harshal Dagade ; Omkar Dalvi; Makarand Dahivalikar; Vani Taklikar
Our project, a multi-terrain mountain board, is inspired by new-age design with an introduction of engine on a skateboard. What sets it apart from a skateboard is that the engine, used for acceleration, is mounted upon the board. The mountain board includes a chassis on which a deck is supported, a sprocket-chain combination is connected to the rear axle of the chassis, which is connected to the engine. The sprocket is fixed to a wheel which helps to drive the entire board. On the either wheel of the rear axle, a mechanical disc brake is mounted which provides deceleration and stopping the forward motion of the board. High tensile springs are fixed underneath the board which helps in dual suspension and turning of the board. The chassis is inclined to a certain angle from the front axle. This inclination makes the board to turn in any side. More the inclination, easier will be the steering movement. Read More...
|
Mechanical Engineering |
India |
2208-2209 |
608 |
Genetic Disease Identification and Medical Diagnosis using MF, CC, Bp, Microrna and Transcription Factors
-J. Jensy Celestina ; R. Karthiga; Dr. Adlin Sheeba
There are a lot of upcoming and new evolving diseases that the humans cannot predict. These diseases are found and analysed in the last stages and feel helpless in saving the humans. If we could determine the disease and predict in the early stages, human lives can be saved much more than we can imagine. So Genomic and Proteomic Dataset (GPD) is created, which integrates the most relevant sources of bio information. This dataset helps the user to find their genetic diseases that they obtained from their families in advance. The hospitals can make use of these data to keep track on their patient’s health. Cross ontology is used to evaluate the gene test values from three ontologies for determining the genetic disease. We compare the cellular component, molecular function and biological process values between the input values and the average values. If any two of the input values are greater than the normal genetic values then the person is prone to extrinsic diseases or else intrinsic diseases. The diseases obtained as the result of cross ontology is integrated with the miRNA – transcription factor interactive diseases using the fusion technique. Disease updation is used to optimize the diseases from the above interactions and update the diseases whenever new diseases are encountered. Tree Representation gives us the complete structure of genetic diseases identified by various process, their symptoms and cure for the particular diseases to the associated user. Read More...
|
Computer Science and Engineering |
India |
2210-2212 |
609 |
A protected and Lively Multi Keyword Hierarchical Search Arrangement over Encoded Cloud data
-Agalya ; Vasutharadevi
Research focus on a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. The research propose a “Greedy Depth- ï¬rst Search†algorithm to provide efficient multi-keyword ranked search. A secure tree-based search scheme over the encrypted cloud data, which supports multi- keyword ranked search and dynamic operation on the document collection. Specially the vector space model and the widely-used “term frequency (TF) × inverse document frequency (IDF)†model are combined in the index construction and query generation to provide multi-keyword ranked search. In order to obtain high search efficiency, construct a tree-based index structure and propose a “Greedy Depth-ï¬rst Search†algorithm based on this index tree. Due to the special structure of our tree-based index, the proposed search scheme can flexibly achieve sub-linear search time and deal with the deletion and insertion of documents. The secure algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results. Moreover, parallel search can be flexibly performed to further reduce the time cost of search process. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme. Read More...
|
Computer Science |
India |
2213-2223 |
610 |
Design of Advance Compacting Tool for Railway Track: A Review
-Kunal Meshram ; Prof. P. Awachat
Maintenance has long been an important part of rail roading. Under repeated loading from traffic the track progressively moves, causing deviations from the desired vertical and horizontal alignment. Compacting is the process to restore the geometry and rearrange the ballast under the sleeper to keep the track in position and provide it with a homogenous ballast bed. The track geometry should be measured regularly or at least the track should be compacted at regular intervals to ensure that trains are able to travel safely at the normal speed of line. This paper deals with the design modification of the compacting tool used in compacting machine to restore geometry and rearrange the ballast. In this project we will be creating CAD model of the existing compacting tool and determine the stresses and failures occurring in tool. After detailed study and analysis on existing tool we will modify and perform analysis for the improvement of the compacting tool for minimum stresses and failures. Thus comparing the results for the both modified and the existing tool, the tool with the minimum stresses will be taken into consideration. Read More...
|
M.Tech MECHANICAL ENGG |
India |
2224-2225 |
611 |
Ranking Prediction of Search Engines using Cloud Services
-Abhilasha ; Jhalak Jain; Ajay Kumar Kaushik
This project aims to do ranking prediction of various search engines available on the web. The objective of the project is to do feedback analysis of various search engines. This project deals with study of Naïve Bayes algorithm which is used in feedback analysis. Read More...
|
Information Technology |
India |
2226-2228 |
612 |
Detection of Blood Vessels and Hard Exudates using Curvelet in Fundus Images
-V. Akila
In this paper an algorithm is proposed for the identification of hard exudates in fundus images. The method is based on segmenting all objects that have contrast with the background including the exudates. The exudates could then be extracted after extracting the blood vessel based on curvelet transform operations and optic disc is detected and masked. The regions representing the blood vessel and the optic disc are removed to get the regions of exudates. The exudates are obtained by morphological reconstruction. This method is shown to be promising as we can detect the very small areas of exudates. Read More...
|
Biomedical Engineering |
India |
2229-2231 |
613 |
Effective Energy Consumption with Power Quality Improvement in Distribution
-E. Babu ; K. Kamaraj; S. Karuppusamy; V. Pradeep; K. Shanmugavel
Power quality improvement for nonlinear loads is the point of interest for researches in recent years. Power factor plays an effective role in efficiency of electrical system. In power system the voltage level at different system changes with the change in load. The voltage level at the load must be maintained within required range irrespective of the type & magnitude of the load. For maintaining voltage fixed within limits, it is necessary to maintain the balance of reactive power in the system as reactive power is related with voltage directly. The appropriate choice for such problem is static Var compensators (SVCs) due to its low cost and simple control strategy. This paper proposes to minimize the harmonics and increase the power quality into the power distribution systems by the operation of SVC used in coordination with fast changing loads. We present a design and performance of TRIAC based capacitor bank switching using Arduino Uno. The performance of system is evaluated for different load conditions. Read More...
|
ELECTRICAL AND ELECTRONICS ENGINEERING |
India |
2232-2234 |
614 |
Frauds in Indian Banking
-Prof. Vikas Upadhyay
In this paper, we have attempted to identify the issues and problems associated with banking frauds. Fraud is a concept that is generally understood, but whose characteristics are often not recognized until it is too late. The potential damage, financial and reputational, means that this risk cannot be ignored. Combating fraud requires an understanding of how and why it occurs and the way by which it can be minimized. As the pressure on management to maintain income and earnings increases, the incentive to commit fraud is higher. The above issues are the main subject of the paper. Its most interesting part refers to real fraud cases that have occurred in the banking system. These cases reveal the causes leading to fraud. Finally, the paper asks how the risk of fraud can be prevented. Read More...
|
COMMERCE |
India |
2235-2239 |
615 |
Women Safety Device using GPS, GSM
-Anam Quadri ; Ankita Kotagle; Mintu Bhimte; Aarti Patmase
In this paper we are introducing an intelligent women security system to inform about an emergency situation faced by women to the authorized people. We are using the GSM and GPS technology for the intimation to allocate the women. A GSM modem is used to send the position of the women from a remote place, the microcontroller ATMEGA 328 is used, which controls the function of the GSM modem for the intimation to the concerned person via SMS. Micro control unit takes the value of latitude and longitude from the GPS receiver and transfer it to the pre-programmed mobile number via SMS through GSM modem. Read More...
|
Electronics and Telecommunication Department |
India |
2240-2241 |
616 |
Vertical Axis Wind Mill: A Review
-Saikrishna K. Yengantiwar ; Shrikant D. Rathod; Dr. S. V. Prayagi
Energy crises is the major problem all over the world. Most of energy requirement is fulfilled by thermal power plants based on coal and diesel. To avoid these polluting and limited sources should be adopted alternative power sources like wind energy. Wind power is an important source of environmental-friendly energy and has become more and more important in the recent years. The amount of installed wind power is increasing every year and many nations have made plans to make large investments in wind power in the near future. The wind mills which are used for energy generations have heavy framework and is limited because of their heavy designs. The domestic wind mills can be used for domestic purpose by making a suitable prototype for considerable load and will serve benefit to the resources that are limited to earth surface .This will also minimize the dependency on power stations and thus will serve a great advantage to our nation. There is an important requirement for a domestic wind turbine, which can be used for domestic application because of the limited availability of the resources. This project is limited to designing and development of wind mill by using CAD and CFD software for domestic application. Read More...
|
M.Tech MECHANICAL ENGG |
India |
2242-2244 |
617 |
Similarity and Location Aware Scalable Deduplication System for Virtual Machine Storage Systems
-S. Prema ; C. Dhivya; G. Sowmiya; M. Bhuvaneswari; P. Pavithra
Ongoing advancement in technology lead to ever-increasing storage capacities. Several techniques based on delta-encoding and duplicate block suppression have been shown to reduce storage over-heads, with varying requirements for resources such as computation and memory. Data deduplication has gained increasing attention and Ongoing Popularity as a space efficient approach in backup storage systems. Main challenges for centralized data deduplication is the capability of fingerprint-index search. We propose SiLo, a near-exact and salable deduplication system that professionally and complementary exploits similarity and locality of data streams to achieve high duplicate abstract—Data deduplication has gained increasing attention and popularity as a space-efficient approach in support elimination, throughput, and well balanced load at extremely low RAM overhead. The main scheme after SiLo is to representation and develop more similarity by grouping strongly correlated small files into a segment and segmenting large files, and to leverage the locality in the data stream by grouping contiguous segments into blocks to capture similar and duplicate data missed by the probabilistic similarity detection .By sensibly enhancing comparison through the development of locality and vice- verse. SiLo and employs a locality based stateless routing algorithm to paralleling and distribute data blocks to multiple backup nodes. SiLo is able to significantly reduce RAM usage for index look up, achieve the near-exact efficiency of duplicate elimination, a high deduplication throughput, and obtain load balance among backup nodes. Read More...
|
Computer Science and Engineering |
India |
2245-2251 |
618 |
Smart Health Care System
-Suvitha. S ; Dineshi. R; Manimegalai. P
Health related issues and parameters are of utmost importance to man, and is essential to his existence and influence and thus he has sought for an improved system that would be able to capture and monitor the changes in health parameters irrespective of time and location so as to provide for measures that will forestall abnormalities and cater for emergencies. This work presents a system that is capable of providing real time remote monitoring of the heartbeat, temperature, ECG signal in monitor with improvements of an alarm and SMS alert. This project aims at the design and implementation of a low cost but efficient and flexible heartbeat monitoring and alert system using GSM technology. It is designed in such a way that the heartbeat/pulse rate is sensed and measured by the sensors which sends the signals to the control unit for proper processing and determination of the health parameters which is displayed on an LCD, it then proceeds to alert by an alarm and SMS sent to the mobile phone of the medical expert or health personnel, if and only if the threshold value of the health parameter is maximally exceeded. Thus this system proposes a continuous, real time, remote, safe and accurate monitoring of the heartbeat rate and helps in patient’s diagnosis and early and preventive treatment of cardiovascular ailments. Read More...
|
EMBEDDED SYSTEM TECHNOLOGIES |
India |
2252-2255 |
619 |
Adulterant Testing of Milk using Analog Sensors and Programmable Logic Controller
-Prof. Kimberly Moraes ; Kaymeron Tovar Dias; Uchita Prabhu Dessai
Adulteration is a global concern and developing countries at a higher risk associated with it, due to lack of monitoring and policies. This adulteration can pose serious health hazards leading to fatal diseases and a decrease in its quality. Adulteration usually refers to mixing other matter of an inferior and sometimes harmful quality with food or drink intended to be sold. As a result of adulteration, food or drink becomes impure and unfit for human consumption. Here the monitoring of liquid adulteration particularly that of milk is done by setting a limited range of the specific gravity of milk and maintaining temperature corrections at various temperature points to obtain an accurate specific gravity reading. In this manner, one parameter of the adulteration of milk will be distinguished from pure milk. Read More...
|
Electronics and Telecommunication Department |
India |
2256-2258 |
620 |
Improvement in Mobility of Mechanical Spider
-Sandeep Sharma ; Tarunprasad Kushwaha; Dayanand Tambe; Amit Kumar P. Sharma
As a different types of mechanical spider has been developed in past few years, that can walk on rough plane but only in forward and backward direction, according to the recent study on mechanical spider which moves in left or right direction, but this is the major disadvantage of mechanical spider .So this research study is mainly focused on improving the mobility of mechanical spider. Read More...
|
Mechanical Engineering |
India |
2259-2261 |
621 |
Review on Heat Transfer Enhancement with the Help of Different type of Inserts in Channel
-Akshay Chhatrapati Athate ; Vilayatrai. M. Kriplani; Prashant P. Singare
A review paper based on investigation of heat transfer enhancement with the help of using different types of inserts or turbulators used in duct (Square, circular and Rectangular Channel). Set of repeated turbulators used to promote turbulence and enhance convective heat transfer. Which results at various Reynolds number (Re) within the turbulent flow regime the local heat transfer coefficient obtained. Here due to low heat transfer the heat transfer rate also lower level. Read More...
|
Heat Power Engineering |
India |
2262-2266 |
622 |
Smart Home Security System using Internet of Things
-Nishigandha Dattatray Chavan ; Sayali Maruti Deshmane; Dipali Kantilal Dombale; Prof. R. K. Patil
This paper deals with the design of the smart home using wireless technology. Now a days, security system is more preferred over manual system. IOT is the latest internet technology. Home appliances control of smart security system uses mobile and computer for their controlling purpose to operate the system anywhere around the world via internet. This system uses Arduino Mega Microcontroller as a processor. The motion sensor, smoke sensor, water level sensor and light sensor are connected with the Arduino Mega. Read More...
|
Electronics and Telecommunication Department |
India |
2267-2269 |
623 |
Twitter Trend Analysis using LDA
-Prof. Mrs. Laxmi. R. Sisode ; Shubham Deshpande; Shubham Kamble; Vikram Damase; Akash Kamerkar
The community of users participating in social media tends to share about common interests at the same time, giving rise to what are known as social trends. A social trend reflects the voice of a large number of users which, for some reason, becomes popular in a specific moment. Through social trends, users therefore suggest that some occurrence of wide interest is taking place and subsequently triggering the trend. In this work, we explore the types of triggers that spark trends on the microblogging site Twitter. The user will be allowed to search for the latest trends by inputting a keyword into search field. Based on user provided keyword, the system will search for similar keywords in database and summarize the total count to provide the trending tweets on twitter. The trending tweets with hashtag () will be displayed first and then the rest words will be displayed. By clicking on every trending tweet, the user commented tweets will be displayed. User can view all the tweets from the searched keyword. Read More...
|
Computer Engineering |
India |
2270-2272 |
624 |
Security Requirement in Cryptograpic Health Monitoring System
-Anupama S ; Sudheesh S. R; Hari S
Wireless technology and its applications are most common in today's markets. The advantage and benefits of wireless system became attractive in all kind of industrial and non-industrial applications. In order to eliminate the complications of wired connection, it is possible to implement cryptographic wireless systems in medical fields. This technique is already developed and became a successful in recent years. In medical application, real time health monitoring for patients is very critical. So this paper gives a real time health monitoring system and need for its security requirements. The security and privacy is more essential in health monitoring. So it develops a WBAN system, under some aggregation and encryption scheme. Read More...
|
Mtech Communication Engineering |
India |
2273-2274 |
625 |
Self-Similar Human Action Recognition
-Anju Marium Abraham ; Smita C Thomas
The dynamic of an human action is recognized by the system. In this software we first train the system for identifying the human face, sound generation and action recognition based on action recognition technique. HOG pattern generation, Edge based matching and Skin colour segmentation are the algorithms used here. We train the system for identifying the human face, skin and action, the system extract all the features and store it in the database.it is applicable in the pharmacy management system for managing the pharmacy details such as medicine details, user details etc. it is mainly useful for dumb people who wants to know more about medicines etc. The proposed system make use of silhouettes, tracked points and histogram of gradient. Read More...
|
Computer Science and Engineering |
India |
2275-2277 |
626 |
Automatic Air Inflation System
-M Gnanasekaran ; Kavi Parasanth K; Naveenkumar U K; K.M.Nitheshkumar
The Main Aim of Our Project Is to Develop a AUTOMATIC AIR INFLATION SYSTEM. This can be placed in all automobiles while long drives and that can be utilized while climbing uphill or down hills. It is very necessary for the every automobile to be cautious while driving through long distances. So we have fabricated this machine to fill the air automatically by using control units. Read More...
|
MECHATRONICS |
India |
2278-2283 |
627 |
Plant Leaf Disease Identification
-Shivani Gupta ; Mr. Bhagwaticharan Patel
In this survey paper, we present survey on the variety of leaf disease in plants and also their classification and identification. When plants are affected by the diseases, it may affects the production as well as the economy of the country. In order to find out which disease affect the plants, the farmer need to contact the expert for the solution. The expert provide the suggestions which is based on its knowledge and information whereas sometimes searching the expert suggestion is time consuming, expensive and may be not precise. Therefore to resolve this problem, Image processing techniques provides the accurate and fast solution. Here this survey paper gives different detection and classification techniques. There are various successful detection techniques like Probabilistic Neural Network, Genetic algorithm, Artificial Neural Network, Back propagation neural network and Support vector machine (SVM). Read More...
|
Information Technology |
India |
2284-2289 |
628 |
A Study on the Prediction of Infosys Stock Price using Artificial Neural Network (ANN)
-Devashish Mohan
Stock markets tend to be stock trading institutions where stocks and shares (equity) as well as other financial instruments for instance bonds are offered intended for trade. With regard to stocks, the marketplace generally operates any kind of ‘willing buyer, willing-seller’ trade, wherever buyers and sellers price tags are matched for the fit. Predicting has long been within the domain of linear statistics. An artificial neural network (ANN) is a large-scale, nonlinear compelling technique that is capable of executing extremely nonlinear functions, self-learning, and self-organizing. ANN is considered as more desirable pertaining to stock market forecasting than any other techniques given, it will be able to identify and find out patterns or even relationships through the data itself. For the study, simulation have been used as a way of predicting the stock price. The two efficiency measures, Mean Square Error (MSE), and Sum Squared Error (SSE) are applied to evaluate the actual performances for the model designed. The results produced will help the investors to take decision in a wise manner. Read More...
|
Artificial intelligence |
India |
2290-2293 |
629 |
Proposal of a Low Cost Prototype Energy Measurement of Defibrillators with Impedance Variator
-Sergio Omar Rodriguez Navarro ; Nancy Gabriela Gama Lizarraga; Juan Carlos Bauza Olalde
In the following work an alternative prototype was developed to measure the energy discharge in external defibrillators, unlike the conventional defibrillator analyzers where the energy discharge is performed with a fixed impedance of 50 Ω, this prototype proposes to perform the energy discharges of any external defibrillator and will have a variable impedance module at an affordable price. To verify that the prototype makes precise measurements, two external defibrillators of the same model were evaluated, and compared with a gold standard Phase 3, making five discharges of each defibrillator in three different energy intervals, and thus validate the proposed prototype, and according to the obtained results it was demonstrated that this prototype is reliable since by means of the Bland-Altman method it was proved that the prototype is accurate and that there is agreement between the two measuring instruments used. This prototype seeks to be an alternative measurement of cardiac resuscitation equipment, for health institutions that do not have the resources to purchase expensive equipment. Read More...
|
Biomedical Engineering |
Mexico |
2294-2297 |
630 |
Detection of Hackers Behavior in Gaming Software by Using BOT Security
-Rutuja Kaswa ; Kunal Mutha ; Snehal Dagade; Shreepad Kale
Online games have many players they can purchase game money and online game have ecosystems from real money trading players get the money officially. The reason behind in raising gold farming groups is unofficial market of real money trading. Gold farming groups also called as GFGs. GFGs is a directly impact on real world and cyber. MMORPGs (massively multiplayer online role playing games) is one of the most interesting cyber economics reason is massive nature of game. GFGs detect gold farmers. GFG is technique to hide. That is concealing cyber money, front organization and changing trade pattern all those thing happen when online game providers ban GFGs. We build third to trace the gold farming groups and also analyze their behavior. Read More...
|
Computer Engineering |
India |
2298-2300 |
631 |
Enhancing Security in Steganography using Indexed Texture Synthesis and Color Synthesis
-Anusha P
Digital Image Steganography is a techniques of hiding message or information in a digital image such a way that nobody can notice the existence of message. In this paper we using a novel approach for enhancing the security in steganography using Indexed texture synthesis. A texture synthesis process resample’s smaller texture image to obtain a new image with same appearance and arbitrarily size. To conceal the secret message in image we use the texture synthesis in steganography. In contrast of using existing cover image to hide the secret message, our approach hides the source texture and embed the secret message through the process of indexed texture synthesis and color synthesis. This method has advantage over other steganography techniques, it offers the message embedding capacity is proportional to the size of stego image, it is difficult to reveal the secret message by an attacker since we are using dual indexed approach. The Experimental result shows theour approach provides various embedding capacities, provides visually plausible Stego image and extraction of source texture. Read More...
|
Computer Science and Engineering |
India |
2301-2304 |