Manuscripts

Recent Papers

Software Piracy Production System

In this paper entitled as “software piracy protection system” is mainly used to protect the piracy of the system. Now a day’s and a number of users download the software without having the permission of the owner of the software, however, the software have the product key the unknown person also find the key and it’s used that software. A one user pays and download the software and it has them the specific product key of that software. The authorized user share the key to another user (like as friends, relatives and organizations etc), other users are using that software without buying and download. Overcome this problem to implement this project, it is used for the online process. First the user registers to the website when the user downloads the software, first, the user pays the amount for online and then starts the download the software. Mutually it read the MAC (Medium Access Control) address of the corresponding user. Then the owner of the software generates the product key of the corresponding downloaded software and it's sent to the user. After receiving the key, when the user installs the software on the system it asks the product key, the user type that product key. It checks the product key corresponds MAC address. If it is correct the software is installing, else the software is not installed on the system. In this system only allows the authorized person, because it checks the MAC address. The MAC address is the unique address of the system, so the MAC address is not used for another user.

Published by: B. Karpakavalli, Miss. R. Arunadevi

Author: B. Karpakavalli

Paper ID: V3I1-1261

Paper Status: published

Published: January 25, 2017

Full Details

Cipher Text Policy Attribute-Based Encryption Supporting Flexible Attributes

Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been a very active research area in recent years. Because of two properties traceability and the large universe, CP-ABE is enriching the commercial applications. But to achieve this it requires more computation overhead. In this paper, a novel approach for construction of efficient ciphertext-policy ABE supporting flexible attributes is proposed, which helps to reduce the computation overhead and improves security by providing privacy-preserving data access policies.

Published by: Mr. Mayur D. Ghodeswar, Dr. S. S Sherekar, Dr. V. M Thakare

Author: Mr. Mayur D. Ghodeswar

Paper ID: V3I1-1259

Paper Status: published

Published: January 24, 2017

Full Details

An Experimental study on Effect of Rice Husk Ash and Glass Fibre on properties of Cement with Partial Replacement of Fine Aggregate by Quarry Dust

Fiber reinforced concrete is a composite material consisting of mixtures of cement, fine aggregate, coarse aggregate, and fibers. The fiber reinforced concrete exhibits better fatigue strength and increased static and dynamic tensile strength and compressive strength. In this project, the strength of fiber reinforced concrete was investigated partial replacement of cement with rice husk ash and fine aggregate with quarry dust. Glass fiber was added in the order of 0.25% and 0.5% by weight of cement. Rice husk ash was used to replace Ordinary Portland Cement by 10%, 20% and 30% by weight of cement proportions. Quarry dust was used as partial replacement of fine aggregate by 20%.

Published by: S. Nambirajan

Author: S. Nambirajan

Paper ID: V3I1-1258

Paper Status: published

Published: January 24, 2017

Full Details

A Detailed Classification of Routing Attacks Against RPL in Internet of Things

With the advancement in mobile computing and wireless communications, a new paradigm called Internet of Things is generating a lot of research interest and the industrial revolution. The increasing interest for this paradigm has resulted in the large-scale deployment of Low power and Lossy Networks (LLN), such as wireless sensor networks and home automation systems. These networks are typically composed of many embedded devices with limited power, memory, and processing resources interconnected by a variety of links, such as IEEE 802.15.4 or low-power Wi-Fi. These networks have a wide scope of applications such as industrial monitoring, connected home, healthcare, environmental monitoring, urban sensor networks, energy management, and assets tracking etc.RFC 7228. In order to address the specific properties and constraints of these networks, RPL (Routing Protocol for low power Lossy network) has been developed by the IETF working group [ROLL WG]. RPL is a lightweight, rank based routing protocol. However, this routing protocol is exposed to various attacks which can significantly impact the network resources and its performance. This paper presents an elaborate classification of the possible attacks against RPL in IoT network. Further, we have analyzed and compared the severity of these attacks.

Published by: Ishani Mishra, Divya Sharma, Dr. Sanjay Jain

Author: Ishani Mishra

Paper ID: V3I1-1257

Paper Status: published

Published: January 24, 2017

Full Details

A Survey on Pattern Discovery of Web Usage Mining

In the recent years with the development of Internet technology the growth of World Wide Web exceeded all expectations. A lot of information is available in different formats and retrieving content has become a very difficult task. One possible approach to solving problem is Web Usage Mining (WUM). Web mining is the application of data mining on web data and web usage mining is an important component of web mining. The goal of web usage mining is to understand the behavior of website users through the process of data mining of web data and Web usage mining is to understand the behavior of website users through the process of data mining of web Access data. knowledge obtained from web usage mining can be used to enhance web design, introduce personalization service and facilitate more effective browsing the important an application of web mining extracting the hidden knowledge in the log files of a web server recognizing various interests of web users, discovering customer behaviour while at the site are normally referred as the application of web usage mining. In this paper, we provide an updated focused survey on different pattern discovery techniques of web usage mining.

Published by: Manoj Kumar, Mrs. Meenu

Author: Manoj Kumar

Paper ID: V3I1-1254

Paper Status: published

Published: January 24, 2017

Full Details

Care When You Dare-A Selective Study

Abstract: An Entrepreneur is always searched for a change and exploits it an opportunity. An entrepreneur is a person who produces innovative products to satisfy the needs, wants & desires of the target market. Industrial development in any country depends on the type of human resources the country possesses and more particularly on entrepreneurs. The main aim of an entrepreneur is to promote setting of small scale industries and through them contribute production and employment in the country. So that the country’s economy will get a boost. This paper recognizes a significant business model that shows the required factors to start a business. A survey is conducted in Prakasam Dt, Andhra Pradesh. After testing normality by Shapiro Test, One Sample T-Test, and ANOVA are used for analyzing the effect of gender, age, and education qualification respectively and Factor Analysis is applied to derive the factors in order to start business and Discriminate Analysis to design the business model on the opinion of the decision will be taken after analyzing all alternatives.

Published by: Ch. Jyothisreedhar

Author: Ch. Jyothisreedhar

Paper ID: V3I1-1253

Paper Status: published

Published: January 24, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X