Friday, March 30, 2018

A Survey on Garbage Monitoring System using Internet of Things


The IoT Garbage Monitoring system is one of the innovative systems which will provides a healthy surroundings in the cities. The ultrasonic sensor is used for measuring the length of the bins, once the bins are being dumped with garbage the level of bins are shown graphically in the webpage. The data's are stored in the microcontroller and through the Wi-Fi module the data is being transferred to the webpage. 


The sensors are kept underneath the bins and once the garbage is being filled the data is transmitted to the microcontroller and from the microcontroller the data is regularly updated to the webpage through Wi-Fi module, once the level of garbage in the bins reaches the fixed threshold value then there is a buzzer sound which indicates that the bin is full, the LCD display intimates about the bin which is filled and a LED light glows the data is regularly updated to the user monitoring it in the webpage. Thus this idea helps in maintaining a healthy environment. 

By V. Praveen | T. Arunprasad | R. Naveen | Dr. P. Gomathi"A Survey on Garbage Monitoring System using Internet of Things"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11020.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11020/a-survey-on-garbage-monitoring-system-using-internet-of-things/v-praveen

research papers, paper publication for engineering, conference issue publication

A Review on Bus Tracker via GPS using Android Application

Android is becoming very popular in embedded market for two main reasons. First, it is open source software; moreover, there are no royalty fees for java VM (virtual machine). Second deriving from the first, android is highly suitable for expansion as the developer sees fit. Being Computer Science Engineering Users ourselves, we have been motivated to develop this project for the benefit of the people masses, by the idea of providing an easier means of accessing various web resources related to the bus, thus providing them with a better, richer experience of travelling. Further, the recent advent and popularity of android technology motivates us to create an android application for the same. 

By Mohammad Altamash | Swapnil Mahalle | Prof. Nusrat Anjum"A Review on Bus Tracker via GPS using Android Application"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd11022.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/11022/a-review-on-bus-tracker-via-gps-using-android-application/mohammad-altamash

review papers, ugc approved journals for engineering, special issue publication

Thursday, March 29, 2018

Automatic Identification of Potential Respondents to Subjective and Objective Questions


In recent years social networking sites are very popular for user needs. Mostly people use an important social networking information source such as Twitter to find answers to their questions. Twitter contains microblogging services for informal information interactions. In this paper, we classify the subjective and objective questions using Naïve Bayes algorithm and also find the respondent users. For classification we build the feature extraction techniques such as lexical, syntactical and contextual in terms of the way they are asked and answered. For applying the classification on a larger dataset using other social media and analysis of performance. 


By Sonali U. Tapase | Prof. K. B. Manwade"Automatic Identification of Potential Respondents to Subjective and Objective Questions"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10966.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10966/automatic-identification-of-potential-respondents-to-subjective-and-objective-questions/sonali--u-tapase

multidisciplinary journal, submit paper online, indexed journal

A Review on Fast FPGA Development of RSD based ECC Processor


Elliptic curve Cryptography (ECC) is an asymmetric cryptographic system such as Lenstra elliptic-curve factorization. This provides higher security than the Rivest, Shamir and Adleman system (RSA) system. The processor employs extensive pipelining techniques for Karatsuba'“Ofman method to achieve high throughput multiplication. Furthermore, an pwerfull smodular adder without comparison and a highthroughput modular divider, which results in a short datapath for maximized frequency, are implemented. The processor supports the recommended NIST curve P256 and is based on an extended NIST reduction scheme. 


The proposed processor performs singlepoint multiplication employing points in affine coordinates in 2.26 ms and runs at a maximum frequency of 160 MHz in Xilinx Virtex 5 (XC5VLX110T) field-programmable gate array. 

By V. Surega"A Review on Fast FPGA Development of RSD based ECC Processor"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd7166.pdf 

Direct URL: http://www.ijtsrd.com/engineering/electrical-engineering/7166/a-review-on-fast-fpga-development-of-rsd-based-ecc-processor/v-surega

peer reviewed journals, manuscript submission, call for paper engineering

Detecting Malicious Facebook Application using Digital India Scheme


With 20 million installs a day third-party apps are a major reason for the popularity and addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps for spreading malware and spam. The problem is already significant, as we find that at least 13% of apps in our data set are malicious. So far, the research community has focused on detecting malicious posts and campaigns. In this paper, we ask the question: given a Facebook application, can we determine if it is malicious? Our key contribution is in developing Proguard Facebook's Rigorous Application Evaluator arguably the first tool focused on detecting malicious apps on Facebook. 


To develop ProGuard, we use information gathered by observing the posting behavior of 111K Facebook apps seen across 2.2 million users on Facebook. First, we identify a set of features that help us distinguish malicious apps from benign ones.For example, we find that malicious apps often share names with other apps, and they typically request fewer permissions than benign apps. Second, leveraging these distinguishing features, we show that ProGuard can detect malicious apps with 100% accuracy, with no false positives and a low false negative rate (4.1%). Finally, we explore the ecosystem of malicious Facebook apps and identify mechanisms that these apps use to propagate. 

Interestingly, we find that many apps collude and support each other; in our dataset, we find 1,584 apps enabling the viral propagation of 3,723 other apps through their posts. Long-term, we see ProGuard as a step towards creating an independent watchdog for app assessment and ranking, so as to warn Facebook users before installing apps And improved online infrastructure and by increasing Internet connectivity so that we can avoid fraud and cheating. 

By M. Divya | M. Monika | N. Kanimozhi"Detecting Malicious Facebook Application using Digital India Scheme"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10964.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10964/detecting-malicious-facebook-application-using-digital-india-scheme/m-divya

peer reviewed journals, manuscript submission, call for paper engineering

Geometric Modeling, Design and Analysis of Custom-Engineered Milling Cutters


The geometric modeling of the cutting tools is an important aspect for the design and manufacturing engineers from the viewpoint of shape realization. The geometry of cutting tools? surfaces based on two-dimensional (2D) projected geometry approach has certain limitations. This definition is also inadequate due to inaccuracy and non-applicability of the model for further manipulation. To address these issues, an accurate three-dimensional (3D) surface-based generic definition for a few families of custom-engineered milling cutters has been developed. 


The proposed geometric definition of the customized cutter is developed in terms of biparametric surface patches using proposed 3D rotational angles rather than the conventional 2D angles. The non-uniform rational B-spline (NURBS) curve(s) and generation of sweep surfaces based on it are utilized for the shape generation of cutting elements of the generic cutters. 

This representation scheme enables tooth shapes to be controlled by manipulating control polygons and sweep trajectories and in the process varied tool geometries can be generated. Further, an interface is developed that converts the proposed 3D parametric definition of the cutter into an intermediate neutral CAD format. This helps in rendering the cutter model in any CAD modeling environment. 

R. R. Karthi | B. Tamilarasu | S. Mukesh | K. M. Naveen Kumar"Geometric Modeling, Design and Analysis of Custom-Engineered Milling Cutters"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10986.pdf 

Direct URL: http://www.ijtsrd.com/engineering/mechanical-engineering/10986/geometric-modeling-design-and-analysis-of-custom-engineered-milling-cutters/r-r-karthi

peer reviewed journals, manuscript submission, call for paper engineering

Meaconing and Spoofing Attacks Evaluation with Enhancement in Security for Satellite Communication


Spoofing is the most dangerous threat of the GNSS infrastructure. Main goal of meaconing is to mis-¬lead the receivers tracking and sending wrong informa-¬tion about the signal position. The normal receiver is not conscious about this attack, and it acquires the counterfeit or mislead signal and discards the authentic signals. 


The rapid diffusion of GNSS location based applications which involve in large set of human activities makes the navigation system infrastructure very vulnerable against malicious attacks, which aim to disrupt the functionalities for illegal purposes. Considering into this scenario, ef-ficient and computationally efficient detection and mitiga-¬tion techniques are present in this paper in order to counteract spoof-¬ing and meaconing signals. 

The aim of this paper is to present possible and simple ap-proaches in the spoofing detection field. Signal affected by spoofing signals are considered and detection methods are described pointing out the principal steps and possible applications, and drawbacks are also considered. 

By Tarun Varma | Dr. Akhilesh R. Upadhyay"Meaconing and Spoofing Attacks Evaluation with Enhancement in Security for Satellite Communication"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10981.pdf 

Direct URL: http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/10981/meaconing-and-spoofing-attacks-evaluation-with-enhancement-in-security-for-satellite-communication/tarun-varma

international peer reviewed journal, paper publication for engineering, conference issue publication