Manuscripts

Recent Papers

Implementation of Secured Sensor Nodes Using Cryptographic Algorithms

Application of wireless sensor networks (WSN) to commercial, home environments and military purpose are increased in wide range. As the wireless sensor networks continue to grow, they are vulnerable to attacks and hence need for security mechanisms. Identifying suitable cryptography for WSN is important challenge due to limitation of energy, computation capacity and storage resources of sensor nodes. For this purpose, Cryptography plays a vital role in securing the data in W SN. In this paper we implemented two symmetric cryptographic algorithms algorithms: block cipher AES (Advanced encryption standards) and the Lightweight block cipher PRESENT. Our main aim of implementing the symmetric cryptographic algorithms in sensor nodes to provide secure communication which guarantees the confidentiality, integrity and avoids key exchange via unsecured channel that impose real threats. The experimental results are carried by implementing these algorithms in Atmega 32 bit microcontroller using simple C codes.

Published by: M. Jothimeena, R. Sherin jenny

Author: M. Jothimeena

Paper ID: V3I3-1398

Paper Status: published

Published: May 30, 2017

Full Details

Experimental Investigation of Mortar Cube with Pumice Powder and Ceramic Tile Powder

An experimental investigation was carried out to evaluate the properties of cement Mortar. In this project study, ordinary Portland cement is replaced partially with pumice powder and fine aggregate is replaced partially with ceramic tile powder. In this research is to study the utilization of ceramic waste as a partial replacement of fine aggregate in a mortar. In this experimental investigation, prepare mortar cube of size 70.7mm x 70.7mm x 70.7mm with mix proportion 1: 3. The aim of this study is to determine the optimum % replacement of pumice powder in mortar cubes. .Cement mortar is made by replacing cement with pumice powder of different percentages like 5%, 10%, 15%, 20% & 25% with curing of 3, 7 & 28 days. The various combinations of pumice powder and ceramic waste powder were added to the mortar. Compressive strength test, splitting tensile strength test, water absorption test and the density test were performed and the results were analyzed. Mortar cube shows light weight behavior by replacing cement with pumice powder. The density of mortar is decreasing by adding pumice powder. The density of mortar cube is increasing by adding pumice powder and ceramic tile powder. Mortar cube shows almost similar strength compare to conventional mortar by adding pumice powder and ceramic tile powder.

Published by: Jitha Mathew .V

Author: Jitha Mathew .V

Paper ID: V3I3-1389

Paper Status: published

Published: May 30, 2017

Full Details

Implementation of Anonymous and Secure Communication System with Group Signatures

For Privacy Preserving Communications Both Anonymity and end to end encryption mechanism is essential. Identity Based Encryption technique is best suitable for secure and anonymous communications. For solving anonymous and secure communication problems both cryptographic and IBE based protocols needed which governs the proper communication between two parties. For the purpose of authentication of the user proxy server is maintained between user and service providers. The GM and KGC is essential in anonymous communication for issuing both signing and decryption keys for getting plaintext from ciphertext in original form. Public key encryption and digital signature mechanism needed for guarantees of secure communication between both ends. Finally protocol realizes secure and anonymous communication between sender and receiver. The Communication Protocol along with IBE and Group signatures allow secure anonymous authentication. In this way, illegitimate users cannot use anonymous system and cannot effect the communication between source and destination whereas legitimate users access systems without compromising anonymity. In this way the proposed system get secure and anonymous communication over the network. Keywords: Anonymous Communication, Anonymous Authentication, Secure Channel, Identity-Based Encryption, Group Signature.

Published by: Mr. Vaibhav P. Thakare, Prof . Chetan J. Shelke

Author: Mr. Vaibhav P. Thakare

Paper ID: V3I3-1370

Paper Status: published

Published: May 30, 2017

Full Details
Research Paper

Development of Data Mining Model for the Evaluation of Human Skill Placement in the Engineering Sector

Data mining is one of the widespread research areas of present time as it has got wide variety of application to help people of today’s world. It is all about finding interesting hidden patterns in a huge history database. In this research work, data mining is comprehensively applicable to a domain called placement chance prediction, since taking wise career decision is so crucial for all of us for sure. A strategy to predict the overall absorption rate for every branches as well as the time it takes for all the students of a particular branch to get placed etc. are also proposed. From each combination of attributes from the history database of student records, corresponding placement chances is computed and stored in the history data base. From this data, various popular data mining models are built and tested. These model can be used to predict the most suitable branch for a particular new student with one of the above combination of criteria. A strategy to predict the overall absorption rate for various branches as well as the time it takes for all the students of a particular branch to get placed etc. are also proposed. The proposed method is tested on the data set provided by A.I.M.T college Lucknow and data is passes through the various data mining model, namely decision tree ,neural network and navie bayes classifier on area of the application to a domain, development of classifier and future outcomes were also configured on this thesis. At last this research work puts forward the data mining algorithm namely C 4.5 * stat for numeric data sets which has been proved to have competent accuracy over standard benchmarking data sets called UCI datasets. It also proposes to improve the standard C 4.5 algorithm.

Published by: Arun Mishra

Author: Arun Mishra

Paper ID: V3I3-1407

Paper Status: published

Published: May 30, 2017

Full Details

An IOT Approach to Monitor Water Quality Using MQTT Algorithm

The degradation of water resources has become a common problem. The conventional methods of water quality monitoring involves the manual collection of water sample from different locations. These water samples were tested in the laboratory using the rigorous skills. Such approaches are time consuming and no longer to be considered efficient. Moreover, the current methodologies include analysis of various kinds of parameters of water quality such as physical and chemical. The old method of water quality detection and communication was time consuming, low precision and costly. Therefore, there is a need for continuous monitoring of water quality parameters in real time. By focusing on the above issues, a low cost water quality monitoring system is developed and designed that can monitor water quality in real time using IOT. In the proposed system water quality parameters are measured by the different sensors such as pH, turbidity, dissolved oxygen and temperature for communicating data onto a platform via microcontroller system i.e. Arduino model. So in order to meet all these requirements, other technologies can be used such as MQTT (Message Queuing Telemetry Transport) which allows publishing and subscribing od data between the sensor and end device. Instead of using GSM network or any other technology, MQTT algorithm will be implemented to make the system feasible, modular, scalar and cost-efficient. Not only this , with the help of MQTT algorithm there will be simultaneous flow of data between the sensors and server.

Published by: Mehwish Mir

Author: Mehwish Mir

Paper ID: V3I3-1415

Paper Status: published

Published: May 30, 2017

Full Details

Improving the Performance for Crime Pattern Analysis Using Data Mining Techniques

As the crimes rates against women is increase day by day, the new problems are faced by the law organisation. Due to which this cause more burdens on the crime against women resources. The law organisation is able to generate such increases or decreases in crime, so it is necessary to find out the most useful method to control and avoid crimes against women. The aim of this paper is to classify clustered crime against women based on occurrence frequency during different years by the process of Data mining. Data mining is used to analysis, investigate and discovery of patterns for occurrence of different crimes against women. We connected a hypothetical model in light of information mining strategies, for example, grouping and characterization to real crime dataset recorded by OGD. The k-means clustering, KNN algorithm, decision tree algorithm and prediction method for future purpose, is used for the classification and clustering of crimes

Published by: Chhaya Yadav

Author: Chhaya Yadav

Paper ID: V3I3-1422

Paper Status: published

Published: May 30, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X