Manuscripts

Recent Papers

Cipher Text Policy Attribute-Based Encryption Supporting Flexible Attributes

Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been a very active research area in recent years. Because of two properties traceability and the large universe, CP-ABE is enriching the commercial applications. But to achieve this it requires more computation overhead. In this paper, a novel approach for construction of efficient ciphertext-policy ABE supporting flexible attributes is proposed, which helps to reduce the computation overhead and improves security by providing privacy-preserving data access policies.

Published by: Mr. Mayur D. Ghodeswar, Dr. S. S Sherekar, Dr. V. M Thakare

Author: Mr. Mayur D. Ghodeswar

Paper ID: V3I1-1259

Paper Status: published

Published: January 24, 2017

Full Details

An Experimental study on Effect of Rice Husk Ash and Glass Fibre on properties of Cement with Partial Replacement of Fine Aggregate by Quarry Dust

Fiber reinforced concrete is a composite material consisting of mixtures of cement, fine aggregate, coarse aggregate, and fibers. The fiber reinforced concrete exhibits better fatigue strength and increased static and dynamic tensile strength and compressive strength. In this project, the strength of fiber reinforced concrete was investigated partial replacement of cement with rice husk ash and fine aggregate with quarry dust. Glass fiber was added in the order of 0.25% and 0.5% by weight of cement. Rice husk ash was used to replace Ordinary Portland Cement by 10%, 20% and 30% by weight of cement proportions. Quarry dust was used as partial replacement of fine aggregate by 20%.

Published by: S. Nambirajan

Author: S. Nambirajan

Paper ID: V3I1-1258

Paper Status: published

Published: January 24, 2017

Full Details

A Detailed Classification of Routing Attacks Against RPL in Internet of Things

With the advancement in mobile computing and wireless communications, a new paradigm called Internet of Things is generating a lot of research interest and the industrial revolution. The increasing interest for this paradigm has resulted in the large-scale deployment of Low power and Lossy Networks (LLN), such as wireless sensor networks and home automation systems. These networks are typically composed of many embedded devices with limited power, memory, and processing resources interconnected by a variety of links, such as IEEE 802.15.4 or low-power Wi-Fi. These networks have a wide scope of applications such as industrial monitoring, connected home, healthcare, environmental monitoring, urban sensor networks, energy management, and assets tracking etc.RFC 7228. In order to address the specific properties and constraints of these networks, RPL (Routing Protocol for low power Lossy network) has been developed by the IETF working group [ROLL WG]. RPL is a lightweight, rank based routing protocol. However, this routing protocol is exposed to various attacks which can significantly impact the network resources and its performance. This paper presents an elaborate classification of the possible attacks against RPL in IoT network. Further, we have analyzed and compared the severity of these attacks.

Published by: Ishani Mishra, Divya Sharma, Dr. Sanjay Jain

Author: Ishani Mishra

Paper ID: V3I1-1257

Paper Status: published

Published: January 24, 2017

Full Details

A Survey on Pattern Discovery of Web Usage Mining

In the recent years with the development of Internet technology the growth of World Wide Web exceeded all expectations. A lot of information is available in different formats and retrieving content has become a very difficult task. One possible approach to solving problem is Web Usage Mining (WUM). Web mining is the application of data mining on web data and web usage mining is an important component of web mining. The goal of web usage mining is to understand the behavior of website users through the process of data mining of web data and Web usage mining is to understand the behavior of website users through the process of data mining of web Access data. knowledge obtained from web usage mining can be used to enhance web design, introduce personalization service and facilitate more effective browsing the important an application of web mining extracting the hidden knowledge in the log files of a web server recognizing various interests of web users, discovering customer behaviour while at the site are normally referred as the application of web usage mining. In this paper, we provide an updated focused survey on different pattern discovery techniques of web usage mining.

Published by: Manoj Kumar, Mrs. Meenu

Author: Manoj Kumar

Paper ID: V3I1-1254

Paper Status: published

Published: January 24, 2017

Full Details

Care When You Dare-A Selective Study

Abstract: An Entrepreneur is always searched for a change and exploits it an opportunity. An entrepreneur is a person who produces innovative products to satisfy the needs, wants & desires of the target market. Industrial development in any country depends on the type of human resources the country possesses and more particularly on entrepreneurs. The main aim of an entrepreneur is to promote setting of small scale industries and through them contribute production and employment in the country. So that the country’s economy will get a boost. This paper recognizes a significant business model that shows the required factors to start a business. A survey is conducted in Prakasam Dt, Andhra Pradesh. After testing normality by Shapiro Test, One Sample T-Test, and ANOVA are used for analyzing the effect of gender, age, and education qualification respectively and Factor Analysis is applied to derive the factors in order to start business and Discriminate Analysis to design the business model on the opinion of the decision will be taken after analyzing all alternatives.

Published by: Ch. Jyothisreedhar

Author: Ch. Jyothisreedhar

Paper ID: V3I1-1253

Paper Status: published

Published: January 24, 2017

Full Details

Comparison of Antioxidant Activity in Gracilaria Edulis and Hypnea Valentiae

The present study investigates about the antioxidant activity of red algae Gracilaria adults and Hypnea valentine by radical scavenging method, DPPH assay. The ethyl acetate and ethanolic extracts of the two red algae were prepared to keep BHT as a standard Hypnea valentine showed the highest antioxidant activity compared to Gracilaria adults. The absorbance was recorded at 517 nm.

Published by: A. Chandramohan, Dr. S. R Divya

Author: A. Chandramohan

Paper ID: V3I1-1251

Paper Status: published

Published: January 23, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X