Impact of upliftment of the ban on cryptocurrency in India
Money is something that has great value in the life of any human being on this planet and its history dates back to the ancient times when gold, silver, and other metal coins were used for buying goods and other essential items. Cryptocurrency is a digital currency that is created for the purpose of transactions like a normal currency. It uses Cryptography and Blockchain technology to secure its exchanges and limit the production of a particular type of cryptocurrency and keep track of each and every transaction in the network.
Published by: Arnav Shah
Author: Arnav Shah
Paper ID: V7I3-1770
Paper Status: published
Published: June 11, 2021
Seismic Response of Irregular Structures
The main objective of earthquake engineering is to analyze, design and build a structure in such a way that the damage to the structure and its structural component during an earthquake is minimized. A large number of papers have focused to study the effect of irregular structures. Being inspired from the work contributed in the study on effect of earthquake on irregular shaped building this research work presents effect of plan and shape configuration on irregular shaped structures. Building with irregular geometry responds differently against seismic action. Plan geometry is the parameter which decides its performance against different loading conditions. This research work aims to evaluate the behaviour of irregularity (plan and shape) on structure under seismic effect. To workout the performance of structure, equivalent static analysis and response spectrum analysis has been adopted. For achieving this objective by using structural based software ETABS 19. Estimation of response such as: lateral displacement, storey drift, and base shear are carried out. Based on these parameters we have compared response of each model. Results are expressed in form of graphs and bar charts. From research it is observed that to minimize the effect of earthquake simple plan and configuration like regular shape must be adopted at the planning stage.
Published by: Jayant Janardhan Sahare, Dr. Milind V. Mohod
Author: Jayant Janardhan Sahare
Paper ID: V7I3-1765
Paper Status: published
Published: June 11, 2021
Social distancing indicator and alarming system
One way of limiting the spread of an infectious disease, for instance, Covid-19, is to practice social distancing. This is not a new concept, as most societies have been aware of the value of keeping away from people who are suffering from an infection for many generations. The objective is to reduce transmission, delaying the epidemic peak, reducing the size of the epidemic peak, and spreading cases over a longer time to relieve pressure on the healthcare system
Published by: Vaishnavi Shantaram Gujar, Divya Shinde, Trupti Kherde
Author: Vaishnavi Shantaram Gujar
Paper ID: V7I3-1716
Paper Status: published
Published: June 11, 2021
D Flip Flop circuits: Review of different architectures
A detailed architectural study of different types of flip flop designs is presented. This includes the conventional transmission gate flip flop topology (TGFF), Sense amplifier-based flip flop architecture (SAFF), Clock pulse-based Flip Flop design, and the Dynamic Flip Flop architecture. The fundamental working principles of each topology are discussed along with the operation principles. Important comparisons are made between the architectures and are also presented as a part of this work.
Published by: Nagaraj N., Nithin M.
Author: Nagaraj N.
Paper ID: V7I3-1781
Paper Status: published
Published: June 10, 2021
Financialization of housing
Essay supporting the United Nations Human Rights Council's 2017 report on the financialization of housing
Published by: Keshav Bajaj
Author: Keshav Bajaj
Paper ID: V7I3-1769
Paper Status: published
Published: June 10, 2021
SQL injection and XSS
SQL Injection is a vulnerability that influences the Structured Query Language (SQL) [1] queries that an application passes to a back-end database. By exploiting what is given to the database, the attacker can leverage the syntax and capabilities of SQL itself and the power and flexibility of supporting database functionality and operating system functionality available to the database. Cross-Site Scripting (XSS) is a Code Injection attack executed on the client-side of an internet Application. The foremost common method of stealing cookies or hijacking sessions is to introduce JavaScript with a browser-supported html cryptography technique. [2] Cross-site scripting vulnerabilities ordinarily enable AN aggressor to masquerade as a victim user, to hold out any actions that the user is ready to perform, and to access any of the user’s knowledge. If the victim user has privileged access at intervals the applying, then the aggressor could be able to gain the full management over all the application’s practicality and knowledge. [3] The CWE/SANS Top 25 software errors place SQL injection and Cross-Site Scripting at the very top. Additionally, the Open Web Application Security Project (OWASP) lists Injection Flaws (SQL injection) as the most severe security vulnerability affecting Web applications in its Top 10 list. This highlights how common and very relevant in the domain of Web security. As developers, we should be aware of the consequences and prevention measures of these attacks. This report mentions a brief survey on the real-world attacks of SQL Injection and cross-site Scripting. Additionally, the paper highlights some defenses one can use to mitigate these attacks. Index Terms—SQL Injection, Cross-Site Scripting, Defenses
Published by: Devashish Agarwala, Bhanu Pratap Yadav, Vanishree K.
Author: Devashish Agarwala
Paper ID: V7I3-1768
Paper Status: published
Published: June 10, 2021