Volume-5 Issue-2

  • Version
  • Download 34
  • File Size 4.00 KB
  • File Count 1
  • Create Date November 17, 2018
  • Last Updated February 20, 2019

Volume-5 Issue-2

Download Summary Book

S. No

Volume-5 Issue-2, December 2018, ISSN: 2319-9598 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication

Page No.

1.

Authors:

Gulshan Mishra, Anubha Shamra

Paper Title:

Android Powered Modular Robot using DTMF and Artificial Intelligence

Abstract: This paper is about ease of developing a modular robot with the help of basic electronic CHIP sand attaching it with an android phone. Here, it also mentions usage of most of the hardware and software features of an android device for a robot.It suggests why android robot will change to robotics.

Keywords: Android, Robot, DTMF, Network Coverage

References:

  1. Venkatesan, V.S. GSM Controlled Robotics, Advanced Computing and Communication Technologies (ACCT), 2014 Fourth International Conference Year: 2014,10.1109/ACCT.2014.1
  2. Pathik, B.B.; Ahmed, A.S.M.A.; Alamgir, L.; Nayeem, A. Development of a cell phonebased vehicle remote control system, Intelligent Green Building and Smart Grid (IGBSG), 2014 International Conference, 10.1109/IGBSG.2014.6835161 [6]. Dey, G.K.; Hossen, R.; Noor, M.S.; Ahmmed, K.T., Distance controlled rescue and security mobile robot2013, Informatics, Electronics and Vision (ICIEV), 2013 International Conference, 10.1109/ICIEV.2013.6572602

1-3

http://blueeyesintelligence.org/2checkout_download.html

2.

Authors:

Archana Pandey, Bhupesh Gour

Paper Title:

Face Recognition Techniques USING (Deep Learning)

Abstract: Deep Learning is replacing the way we look at technologies. In this so many excitement around Artificial Intelligence (AI) along with it is branches namely Machine Learning (ML) and Deep Learning at the moment. After research It has estimated that several deep learning applications will affect our life in the coming generation. Basically, these are already making an impact. Approx next five to ten years, It will progressive tools, bibliothecary and dialect will become standard components of every software progressive toolkit. 

Keywords: Deep Learning; Machine Learning; Facial Recognition; Holistic Approach; Face Detection.

References:

  1. Abate A. F., Nappi M., Riccio D. and Sabatino G., "2D and 3D face Authentication: A overview", Pattern Authentication Letters
  2. and Seidel H.-P.,
  3. Kosov S., Scherbaum K., Faber K., Thormahlen T. and Seidel H.-P., "Quick stereo-vision increased face observation", Image Processing (ICIP)
  4. Zhao W., Krishnaswamy A., Chellappa R., Swets D. L. and Weng J.,
  5. "Discriminant investigation of principal elements for face Authentication", Face Authentication, Springer
  6. Kanade T., "Picture processing system by computer complex and recognition of human faces"
  7. Levada A., Correa D., Salvadeo D., Saito J. and Mascarenhas N., "template similarity with dynamic time warping and LSTM Neural Network Supervised Categorization", Systems, Signals and Image Processing.

4-6

http://blueeyesintelligence.org/2checkout_download.html

3.

Authors:

Youssef Bassil

Paper Title:

Text Steganography: The Deep Web in Plain Sight

Abstract: Essentially, the Deep Web also known as the Invisible Web is a hidden web whose content cannot be found by search engines and thus is inaccessible using conventional means. With the rise of activism, many has started using the Deep Web as a way to bypass regulations in order to distribute their ideologies while keeping their identity totally in secret. Tor short for The Onion Router is a Deep Web network that has been for many years used by many people from whistleblowers to cyber criminals to disguise their identities. However, as the Tor network is free and open to public, its inner workings and protocols can be seamlessly reverse-engineered. As a result, security experts were able to restrict the Tor traffic and block its network ports and IPs, making it prone to constant investigation by intelligence, security bodies, and law enforcement agencies. This paper proposes a novel method for implementing the Deep Web on the public Internet using Text Steganography. In short, the proposed method hides a secret page into another benign page called the carrier page using Cascading Style Sheets. When the carrier page is accessed using a regular browser, the benign page is rendered. Nonetheless, when the very same carrier page is accessed using a proprietary browser that implements the proposed algorithm, the hidden version of the page is rendered, mainly the secret web page that was originally concealed into the carrier page. The experiments conducted showed that the proposed method is plausible, seamless, and transparent as it allowed a single web page to exhibit two versions, one that is part of the Surface Web and another one that is part of the Deep Web. As future work, the proposed Text Steganography algorithm can be improved so much so to make it more robust and harder to reverse engineer.

Keywords: Deep Web, Search Engine, Text Steganography, Tor 

References:

  1. Bergman, Michael K, "The Deep Web: Surfacing Hidden Value", the Journal of Electronic Publishing, vol. 7, no. 1, 2001.
  2. Lin, K. and Chen, H., "Automatic Information Discovery from the Invisible Web", in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'02), 2002.
  3. Senker, Cath, "Cybercrime & the Dark Net: Revealing the hidden underworld of the internet", London Arcturus Publishing, 2016, ISBN 9781784285555
  4. Janis Dalins, Campbell Wilson, Mark Carman, "Criminal motivation on the dark web: A categorization model for law enforcement", Elsevier Digital Investigation Journal, vol 4, pp. 62-71, 2018
  5. "Sealed Complaint 13 MAG 2328: United States of America v. Ross William Ulbricht", p. 6, 2014.
  6. Devine Jane, Egger-Sider Francine, "Beyond Google: the invisible web in the academic library", The Journal of Academic Librarianship, vol. 30, no. 4, pp. 265–269, 2004
  7. "Tor Project: FAQ", www.torproject.org, retrieved 25 Dec 2018.
  8. "The Invisible Internet Project", https://geti2p.net/en/, retrieved 25 Dec 2018.
  9. "The Free Net Project", https://freenetproject.org/, retrieved 25 Dec 2018.
  10. Bastick, Zach, "Our Internet and Freedom of Speech Hobbled by History: Introducing Plural Control Structures Needed to Redress a Decade of Linear Policy", European Commission: European Journal of ePractice, vol. 15, pp. 97–111, 2012
  11. Ross Nancy, Wolfram Dietmar, "End user searching on the Internet: An analysis of term pair topics submitted to the Excite search engine", Journal of the American Society for Information Science, vol. 51, no. 10, pp. 949–958, 2000
  12. G. Reed, P.F. Syverson, D.M. Goldschlag, "Anonymous connections and onion routing", IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, 1998
  13. TOR - Onion routing online documentation, https://www.torproject.org/, retrieved on June 2014
  14. Syvneron, G. Tsudik, M. Reed, C. Landwehr, "Towards Analysis of Onion Routing Security", Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability, vol. 1, no. 1, pp. 96-114, 2000.
  15. J. Anderson, F.A.P. Petitcolas, "On the Limits of Steganography", IEEE Journal Selected Areas Communnication, vol. 16, no. 4, pp.474-481, 1998
  16. J. Simmons, “The prisoners’ problem and the subliminal channel,” in Advances in Cryptology: Proceedings of Crypto 83, pp. 51–67, 1984.
  17. Bailey, K. Curran, "Steganography the Art of Hiding Information", BookSurge Publishing, 2005.
  18. Charles Petzold, “Programming Microsoft Windows with C#”, Microsoft Press, 2002.

7-12

http://blueeyesintelligence.org/2checkout_download.html

4.

Authors:

M M Uthappa, A N Santosh Kumar

Paper Title:

A Review on Early Implementation Advantages of an Enterprises Resource Planning [erp] System in Indian Startup Ecosystem.

Abstract: Indian startup ecosystem is considered as fastest growing ecosystems in the world. The success of start-up companies depends upon various factors, which includes optimum utilization of available resources. Managing customer projects efficiently and effectively by achieving project goal is the real challenge in an indian startup ecosystem.in such an environment, enterprises resource management system solution will ease the project manager to act proactively to fine tune the project plan as per the requirement. Hence a changed plan should be in place in real time and made available for all project stakeholders. Apart from this, for delivering the product or services to new customers within the agreed time frame calls for real-time solutions to position the start-up enterprises in the globally competitive marketplace. Thus enterprises resource management system implementation is considered to be the most strategic top management decision to be considered and the success of futuristic startup projects in india will definitely need an integrated software support to meet various customer challenges to emerge as a global player in the chosen area of business domain. Overall, this review paper is an attempt to survey existing literature to understand the importance of the enterprises resource planning solutions in resolving issues related to projects executed under startup ecosystem.

Keywords: Indian startup ecosystem, enterprise resource planing & project management concept.

References:

  1. http://www.egazette.nic.in/WriteReadData/2017/176201.pdf
  2. https://www.gartner.com/it-glossary/enterprise-resource-planning-erp/
  3. https://nsuworks.nova.edu
  4. Miguel Buleje. 2014. The Impact of Enterprise Resource Planning Systems on Small and Medium Doctoral dissertation. Nova South-eastern University. Retrieved from NSUWorks, Graduate School of Computer and Information Sciences. (108) https://nsuworks.nova.edu/gscis_etd/108.
  5. Dhinakaran Samuel and N. Santhosh Kumar, Factors Determining the Enterprise Resource Planning Project-Success in Small and Medium Enterprises: Evidence from Indian Cases .World Appl. Sci. J., 31 (Applied Research in Science, Engineering and Management): 05-11, 2014.
  6. Kostas Metaxiotis and Kostas Ergazakis, 2010. “Taking knowledge management on the ERP road: A two dimensional analysis”, IEEE proceedings, pp: 422-427.

13-15

http://blueeyesintelligence.org/2checkout_download.html