Manuscripts

Recent Papers

Research Paper

An efficient intrusion detection system on blackhole attack for Mobile Ad hoc Network

A Mobile Ad hoc Network (MANET), also known as wireless ad hoc network, is a self-configuration and infrastructure-less network of mobile devices connected wirelessly in a continuous manner. They are vulnerable to various kinds of attacks due to their dynamic nature and lack of a central control point. One of the most several network layer routing attacks in Blackhole attack. Among those routing attacks, black hole throws a challenge in interrupting and degrading the performance of data forwarding operation by dropping the data packets that are transferred through it. To ensure secure MANET an Intrusion Detection System (IDS) is being required. So in this research, we proposed an anomaly based IDS to detect black hole attack in MANET in turn computations have been performed using Neighbors Selective Acknowledgement. In the proposed method, all the nodes receiving data packet send an acknowledgment to the node from which it received it. If the source node receives an acknowledgment from a destination within the threshold time, the path is found to be protected against black hole node and originator takes no action. Otherwise, the source starts verifying nodes. Source node unicast verification message to all the nodes whose details it has stored. Our simulation experiment proves that detects black hole nodes efficiently with less false positive rate of detection and false positive rate.

Published by: S. Nivetha

Author: S. Nivetha

Paper ID: V5I3-1325

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Data sharing and privacy preserving on personal healthcare information in cloud

Cloud computing is an Internet-based computing model which provides several resources through the cloud service provider to cloud users on demand based. Cloud computing storage, users are able to access and shared resources offered by cloud services provider at a lower cost. Data protection, reliability, dependency, transparency, data portability are the most important challenges of the various cloud environment. In Healthcare system privacy is the ability to protect the patient’s personal information against unauthorized access. While sharing the healthcare data in the cloud, the clients have handled security and scalable key management. In this proposed work of Merkle hash tree algorithm used to significantly reduce the amount of data that a TPA has to maintain to proof the integrity of the data. CP-ABE perform private verification, delegated verification, and public verification. A privacy-preserving OPOR auditing scheme for shared data in the cloud environment and utilize with signature, to compute verification information on shared data

Published by: A. Aaro, S. Usha

Author: A. Aaro

Paper ID: V5I3-1324

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Multi factor AKE protocol and key stroke authentication for secured communication

Authenticated Key Exchange (AKE) protocol permits a user and a server to authenticate each other for the first time. It generates a session key for the successive communications without any authentication. Many AKE protocols had been proposed to obtain person privateness and authentication for the duration of conversation. Other than secured consultation key established order, these AKE protocols offer a few other useful capability like two-thing user authentication and mutual authentication. But they have got few weaknesses along with vulnerability in opposition to loss of smart card, offline dictionary assault, de-synchronization attack, person anonymity or untraceability. Also, AKE scheme the usage of public key conversation doesn’t suite nicely for lightweight computational gadgets. In this work, a novel Multi-Factor AKE protocol is proposed to overcome all the above-mentioned weaknesses. This protocol supports revoked smart card transactions. The password that is available on the USB device will be overwritten once the user used it. Passwords can be updated without centralized storage. The average time to enter a password will be defined. The user has to type the password within the allocated time, failing which he/she has to enter it again. This security model of AKE supports user anonymity and resist a lost card attack. Elliptical Curve Cryptography algorithm is used for encryption and decryption of the session key. The computational cost and the bandwidth cost for this proposed model are low, which makes it useful in pervasive computing applications and mobile communications. The proposed AKE model is much secured when compared to the existing protocols.

Published by: S. Kanimozhi, S. Jayanthi

Author: S. Kanimozhi

Paper ID: V5I3-1321

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Location-aware heterogeneous web service recommendation using Hybrid approach

Web service has been emerged as a promising technique to support inter-operable machine-to-machine interaction which provides a method of communication between electronic devices over a network. As the number of web services with similar functionality has increased rapidly over the internet the web service discovery is not a challenging task but selection and recommendation are becoming more important. The Optimality of a web service depends on its performance and performance is measured through Quality of Service that is QoS. QoS is the set of non-functional properties of a web service which includes response time, price, failure rate and so on. Recommendation system initially searches for the list of web services those having similar functionality, which the user requested and finally the optimal web services are recommended to users. In addition, QoS is widely employed in describing non-functional properties of Web Services for optimizing the Web service composition. Since the number of functionally equivalent services offered on the web with different QoS properties is increasing, it is quite important to recommend services considering their non-functional QoS properties. In this project, we can include the recommendation algorithm which includes ratings, reviews, and emoticons. These details are recommended by using a hybrid algorithm. User details are encrypted using Elliptical curve cryptography. Third parties are difficult to hack the original details. Admin can discover the services based on the highest feedbacks and also recommended based on locations. And also using roll back discovery to cancel the web services automatically to overcome the burden of service cancellation.

Published by: D. Ananthi, K. Ambika

Author: D. Ananthi

Paper ID: V5I3-1314

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Dimensionality reduction and classification in gene expression data using hybrid approach

The microarray technology has modernized the approach of biological research in such a way that scientists can now measure the expression levels of thousands of genes simultaneously in a single experiment. With this large quantity of gene expression data, experts have started to discover the possibilities of disease classification using gene expression data. Quite a large number of methods have been planned in recent years with hopeful results. But there are still a set of issues which need to be addressed and understood. In order to gain insight into the disease classification difficulty, it is necessary to get a closer look at the problem, the proposed solutions, and the associated issues altogether. In this paper, we present a dimensionality reduction methods and classification method such as Mutual information, Pearson’s correlation, search algorithms (Recursive feature elimination, Genetic Algorithm, simulated annealing) with Support Vector Machine (SVM) classification algorithm and estimate them based on their evaluation time, classification accuracy and ability to reveal biologically meaningful gene expression. Our experimental results shows that classifier performance through graphs with improved accuracy in disease prediction.

Published by: K. Iswarya, C. Kanimozhi

Author: K. Iswarya

Paper ID: V5I3-1312

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Design and development of continuous variable transmission with launch gear

A transmission is a machine in a power transmission system, which provides a controlled application of power. Often the term transmission refers simply to the gearbox that uses gears and gear trains to provide speed and torque conversions from a rotating power source to another device. The transmission also provides a reverse gear resulting in backward motion of the vehicle. CVT or continuously variable transmission provides an automatic feature for changing the gear ratio depending upon different engine load conditions. Even being an automatic transmission, CVT consists of lesser moving parts and is simpler and compact design. Metal belt and variable pulleys, one of the most popular kinds of CVT that are used in the automobiles widely because it can provide better acceleration because of higher low ratio and better fuel consumption because of less over drive ratio. Despite providing such advantages, CVT generates less torque at lower engine RPM. This is due to slipping of the belt over the tapered surfaces of the variable pulley. Therefore, a mechanism with a launch gear driving the pulleys to reduce belt slip is to be introduced and developed to overcome this problem increasing torque at lower rpm.

Published by: Kshitij Santosh Soman, Chinmay P. Tendulkar, Affan M. Wadkar, Nilesh K. Pednekar, Sumit S. Surve

Author: Kshitij Santosh Soman

Paper ID: V5I3-1310

Paper Status: published

Published: May 11, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X