Thursday, May 23, 2019

A Review on Stegnography Data Hiding using Color Images


Nowadays, network has necessary roles for transferring knowledge accurately and quick from supply to a destination. The info isnt secure enough to transfer extremely confidential. The protection of data has become one in every of the principle challenges of resource sharing with electronic communication over network. Cryptography and Steganography square measure to strategies for shielding knowledge from intruders whereas transferring over an open channel network. Cryptography could be a technique to cipher knowledge and steganography is that the art and science of concealing secret message in an exceedingly cowl image. The digitally shared knowledge between the users ought to be born again to some unclear format which cannot be tampered by the intruders. To fulfill these necessities the technique Steganography will be used. During this technique we tend to use completely different mediums to cover the info that square measure text, images, audio, video etc. this paper is that specialize in encrypting of knowledge by exploitation image steganography. 


BY Gagandeep Singla | Chamkour Singh "A Review on Stegnography Data Hiding using Color Images"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd23556.pdf

Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23556/a-review-on-stegnography-data-hiding-using-color-images/gagandeep-singla

languages journal, social science journal, open access journal

Security Issues and the Energy Consumption in the Optical Burst Switched Networks


Optical burst switching is an optical network technology that helps in improving the use of the optical networks resources. In OCS, the network is configured to establish a circuit, from an entry to an exit node, by adjusting the optical cross connects circuits in the core routers in a manner that the data signal, in an optical form, can travel in an all optical manner from source to destination node. This approach suffers from all the disadvantages known to circuit switching the circuits require time to set up and to destroy, and while the circuit is established, the resources will not be efficiently used to the unpredictable nature of network traffic. Security is one of the major problems in field of networks. Mainly this work focused on security issues in optical burst switching and to decreased the energy consumption. In this research work, a secure public key cryptography technique is proposed and evaluated as a security solution to measure security threats related to burst packet in optical burst switching networks. 


BY Palak Kesar | Mandeep Kaur Sandhu "Security Issues and the Energy Consumption in the Optical Burst Switched Networks"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd23934.pdf

Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/23934/security-issues-and-the-energy-consumption-in-the-optical-burst-switched-networks/palak-kesar

life sciences journal, languages journal, social science journal

Wednesday, May 22, 2019

Design and Construction of Line Following Robot using Arduino

Line following robot is an autonomous vehicle which detect black line to move over the white surface or bright surface. In this paper, the line following robot is constructed by using Arduino nano microcontroller as a main component and consists of three infrared IR sensors, four simple DC motors, four wheels and a PCB frame of robot chassis. The infrared sensors are used to sense the black line on white surface. When the infrared signal falls on the white surface, it gets reflected and it falls on the black surface, it is not reflected. In this system, four simple DC motors attached with four wheels are used to move the robot cars direction that is left, right and forward. The Arduino nano is used as a controller to control the speed of DC motors from the L2953D driver circuit.

BY Khin Khin Saw | Lae Yin Mon "Design and Construction of Line Following Robot using Arduino"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd23977.pdf

Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/23977/design-and-construction-of-line-following-robot-using-arduino/khin-khin-saw

indexed journal, paper publication, peer reviewed journal

Utilization of Plastic waste for Making Plastic Bricks


The plastic waste is the hazardous problem in today's world. This is most dangerous problem in front of humanity. The most hazardous type of wastes are HDPE and PTE and the plastic below 50micron is also causing a serious problem. These plastic mixed in the soil, it directly effects on fertility of the soil. Nowadays, the large amount of plastic is deposited into sea. This plastic wastes gives hazardous effect on the aquatic life and quality of seawater also polluted by this plastic. So, we try to finding efficient way to solve this problem of plastic waste. So, we added this plastic wastes into the bricks and create the bricks by using plastic wastes. It is most economical solution present in the construction industry and it is also economical and environment friendly solution of the plastic wastes. 


BY R. S. Kognole | Kiran Shipkule | Kiran Shipkule | Manish Patil | Lokesh Patil | Udaysinh Survase "Utilization of Plastic waste for Making Plastic Bricks"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd23938.pdf

Paper URL: https://www.ijtsrd.com/engineering/civil-engineering/23938/utilization-of-plastic-waste-for-making-plastic-bricks/r-s-kognole

medical science journal, life sciences journal, languages journal

Improving Properties of Concrete Replacing Cement and Natural Sand with Metakolin and Robo Sand


Concrete is the most extensively used construction material in the world, which consumes natural resources like lime, aggregates and water. The worldwide production of cement has greatly increased, due to this production environmental pollution increases with emission of CO2 gas. To reduce this effect cement was replaced by some supplementary materials like Metakaolin, Fly ash, Bottom Ash, Ground Granulated Blast Furnace Slag GGBS and Rice Husk etc.. In this content Metakaolin was a pozzolanic material used in wide range in replacement of cement. Metakaolin is dehydroxylated aluminum silicate, due to its pozzolanic activity the strength properties and durability properties of concrete increases and reduction in Porosity and Permeability also. Now a day's availability of natural sand is constraint, so alternative material called ROBO Sand having similar properties as that Natural Sand is used in place of Natural sand to study the fresh and hardened properties of concrete. In this present investigation cement is replaced partially with metakaolin in varying percentage i.e. 0 , 6 , 12 , 18 and 24 and natural sand with 45 ROBO sand to get the different concrete mixes. The fresh and mechanical properties of concrete i.e. workability slump test and compressive strength, split tensile strength and flexural strength at 7 days, 28 days and 56 days are studied of the different concrete mixes and results are compared with conventional concrete. 


BY Jyoti Rani | Shashi Sharma | Vikram Dhillon "Improving Properties of Concrete Replacing Cement and Natural Sand with Metakolin and Robo Sand"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd23944.pdf

Paper URL: https://www.ijtsrd.com/engineering/civil-engineering/23944/improving-properties-of-concrete-replacing-cement-and-natural-sand-with-metakolin-and-robo-sand/jyoti-rani

arts journal, medical science journal, life sciences journal

Tuesday, May 21, 2019

QR Code Based Secure Billing System for Shops using Cued Click Points


In today's Mall shopping system, the users usually visit the mall for shopping di erent products and spend their valuable time in searching the products and the products in their price range. After selecting the product the users have to wait in a long queue for billing which is another time consuming part of shopping, and moving the cart from one place to another place is another hectic task. In this system the user's time and searching for products in the entire mall increases. So, we are working on this system to avoid these drawbacks. The drawbacks in the existing system are, rstly the time required for bill payment is more as the users have to wait in a long queue. Secondly, the users have to move the cart through the entire mall and carry a load of products at their home. One more drawback is regarding the barcode in which less data is stored. In view of the mobile phone has become popular consumer products, a simple optimization method was given to design shopping guide systems run on smartphones, with the help of QR code generation and recognition technology, wherein, we can store more data using the QR code. The proposed programs can show accurate and real time shopping destination, thus help shopping mall to mine customer data more accurately and scienti cally. In our system we are going to use QR code for every product using QR code generator, a user goes for shopping and wants to purchase a product, he will scan the QR code of the product using QR code scanner, from his Android device and he will get list of all the similar products in that range and any o ers and discounts related to that product, this is done using searching and sorting algorithms. Once the user scans and adds the product to the cart the data gets fed to the server and the bill gets generated after adding all the products to the cart. The bill is sent to the user on his device and the products are delivered home and also bill payment is done online. Nowadays it is di cult to deal with the text based password. As text can be easily detected, or if it is known then its risky to deal with such things when we have con dential systems with us. We can overcome this problem with the help of a graphical password with cued click points. This graphical password will be really helpful to secure the con dential systems. Cued click points are the concept in which Persuasive Cued Click points graphical password scheme which includes usability as well as security evaluations. There are a lot of e ects that are most well known about passwords such as that user cannot memorize complicated passwords which are simple to identify. 


BY Mr. Vikas Nandgaonkar | Nikita Dongre | Priyanka Giri | Diksha Hinge | Ankita Kashid "QR Code Based Secure Billing System for Shops using Cued Click Points"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd23946.pdf

Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23946/qr-code-based-secure-billing-system-for-shops-using-cued-click-points/mr-vikas-nandgaonkar

commerce journal, arts journal, medical science journal

Face Recognition Based Attendance System with Auto Alert to Guardian using Call and SMS

Now a days the wise attending management system victimization face detection techniques. Daily attending marking could also be a typical and vital activity in colleges and colleges for checking the performance of students. Manual attending maintaining is tough methodology, significantly for large cluster of students. Some machine driven systems developed to x beat these difficulties, have drawbacks like worth, faux attending, accuracy, meddlesomeness. To beat these drawbacks, there is need of good and automatic attending system. We've a bent to unit implementing attending system victimization face recognition. Since face is exclusive identity of person, the problem of pretend attending and proxies could also be resolved. The system uses native binary pattern face recognition technique because it is fast, straightforward and has larger success rate. Also, its pro vision to have an effect on intensity of sunshine draw back and head produce draw back that produces it effective. This wise system could also be degree effective because of maintain the degree will less squat recognition system is planned supported appearance based choices that concentrate on the shortened squatter image rather than native countenance. The remainder step in squatter recognition system is squatter detection Viola Jones squatter detection methodology that capable of method photos terribly whereas achieving higher detection rates is utilized. The complete squatter recognition methodology could also be divided into a pair of parts squatter detection and squatter identification. For face detection, Viola Jones face detection methodology has been used out of the many face detection ways that. Once face detection, face is cropped from the actual image to urge obviate the background. Chemist faces and shear faces ways that are used for face identification. Average photos of subjects area unit used as coaching job set to spice up the accuracy of identification.

BY Diksha Ghare | Prajakta Katakdhod | Shraddha Ujgare | Komal Suskar | Prof. Amruta Surana "Face Recognition Based Attendance System with Auto Alert to Guardian using Call and SMS"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd23928.pdf

Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23928/face-recognition-based-attendance-system-with-auto-alert-to-guardian-using-call-and-sms/diksha-ghare

chemistry journal, management journal, commerce journal