Manuscripts

Recent Papers

Research Paper

Cyber security and the Internet of Things: Vulnerabilities, threats, intruders and attacks

Internet of Things (IoT) devices is rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides, analyze and characterize intruders and attacks facing IoT devices and services.

Published by: M. Hemanth Kumar, Dr. A. Swarupa Rani

Author: M. Hemanth Kumar

Paper ID: V5I2-1835

Paper Status: published

Published: April 12, 2019

Full Details
Research Paper

Eye ball movement controlled mouse and keyboard using camera

Some are not ready to work with PCs in light of a sickness. Eye controls of extraordinary use to the eventual fate of characteristic contribution as well as more essentially the impeded and debilitated. Besides executing a controlling framework in it empowers them to work PC without the assistance of someone else. It is increasingly useful to the crippled. Those have to work PCs without hand this one is most valuable those can work cursor by the development of the eye. In this paper, the camera is catching the picture of eye development. First, distinguish student focus position of the eye. At that point, the distinctive minor departure from understudy position gets diverse development of cursor. The Implementation process for Pupil location utilizing Raspberry Pi and on the terminal of the Raspbian picture introduced on a raspberry pi. The eye tracker depends on pictures recorded by a transformed webcam to gain eye developments.

Published by: Vidhat Ganga, Saaima T., Sweta Kumari, Monika Jain, Rohan Madan, R. Veera Amudhan

Author: Vidhat Ganga

Paper ID: V5I2-1808

Paper Status: published

Published: April 12, 2019

Full Details
Research Paper

Moringa oleifera as a natural coagulant

The powder obtained from the seeds of the M.olifera shown to be an effective primary coagulant for water treatment. In this paper, preliminary investigations M.olifera seed suspension for the softening of hard water is furnished. To analyze the influence of Moringaoleifera seeds in coagulant activity when used for natural raw water treatment. Water samples were collected from pond, tap, and the lake of Kammanahalli, HennurBande and Bagalur rural areas of Bangalore and are labeled as sample 1, sample 2 and sample 3 respectively. In each of the water sample, 25mg of dried M.olifera seed extract was added and allowed to settle for 1 hour 15 minutes. The parameters such as color, turbidity, odor and pH were analyzed before and after the inoculation of M.olifera seeds of all the three water samples. The water was analyzed for the parameters such as color, odor, turbidity, and pH. When the seeds are dried, crushed and added to water, the powder acts as a coagulant. Removal of efficiency was found to increase with increasing dosage of M.oleifera. The higher dosage was required to achieve equivalent residual hardness. Based on the results it is ascertained that seeds stored in dry containers at room temperature can be used as a coagulant for few years. Creation of awareness amongst the rural farmers on the usefulness of the M.olifera enables its cultivation which will have overall economic benefits to the entire country.

Published by: Dr. Vanitha G. Ramesh, Ashrith Kumar

Author: Dr. Vanitha G. Ramesh

Paper ID: V5I2-1830

Paper Status: published

Published: April 12, 2019

Full Details
Research Paper

Detection of spoofing attacks in network over IP calling

Detection of call is one of the key process this generation for customers to look over and find the details and information of the caller. It is easy to identify a caller by the method of caller detection. But the calls that come from an IP based computer system through a scheme of VoIP it is difficult to find or detect a call where mostly attackers use this kind of technique. This caller detection process is also used by many banks in order to take the confirmation of the customer. This detection can be done by using a smartphone by installing an appropriate application in the mobile or by using service providers that offer caller ID spoofing. The upgrade of old hardware is very costly, and there is no mechanism available to end users where there is no storage of information and it also very difficult to locate the physical location of the attacker. The main drawback is that it is more complex when it is considered in the real world. In this article, we consider an appropriate solution named as Passive IP Trace-back to overcome the challenges in deployment in caller id detection. PIT is a kind of technique where we can find out the history of the attacker through which we can consider that a specific person is trying to attack the victim. PIT exploits the path back-scatter messages to find the location of the attacker. The scheme of PIT is used as an efficient software for computers to validate their effectiveness in the detection of spoofing attacks.

Published by: Vijay Ankamma Reddy Male, Hruthik, P Renuka Devi

Author: Vijay Ankamma Reddy Male

Paper ID: V5I2-1854

Paper Status: published

Published: April 12, 2019

Full Details
Research Paper

IoT based ATM monitoring using cloud data with sensors

In this system, we are using sensors like IR sensor, LDR sensor, Temperature sensor, smoke sensor, and the vibration sensor. The IR Sensor is used to monitoring the person IN/OUT in the ATM room. If more than 2 person enters the ATM, then it gives an alert to the user. LDR sensor is used to monitor the light intensity inside the ATM room. If the LDR output values are lower than the threshold value, then the ATM room light will automatically switch ON. Temperature Sensor is used if the temperature inside the ATM room goes below the specified limit, then the AC can be switched off, thus we can have a power saving. Smoke Sensor is to monitor the smoke level in the ATM room. If the smoke sensor value crosses the threshold value, the buzzer will get ON automatically. The Vibrator Sensors used to monitor the ATM when try to break. This will lock the door and send the message to the police station. The whole system relates to the IoT. So the user can monitor the ATM (like temperature level, Smoke) from anywhere and also can control the loads (Like AC, light, door) from the long distance

Published by: P. Visalakshi, D. V. Sai Teja, K. Muni Kiran

Author: P. Visalakshi

Paper ID: V5I2-1864

Paper Status: published

Published: April 12, 2019

Full Details
Research Paper

Face recognition based door unlocking system using Raspberry Pi

Today we are facing security issues in every aspect. So we have to resolve these issues by using updated technology. In this project, we are using the Face recognition module to capture human images and to compare with stored database images. If it matches with the authorized user then the system will unlock the door by an electromagnetic lock. The need for facial recognition system that is fast and accurate that continuously increasing which can detect intruders and restricts all unauthorized users from highly secured areas and aids in minimizing human error. Face recognition is one of the most Secured System than biometric pattern recognition technique which is used in a large spectrum of applications. The time and accuracy factor is considered about the major problem which specifies the performance of automatic face recognition in real-time environments. Various solutions have been proposed using multicore systems. By considering the present challenge, this provides the complete architectural design and proposes an analysis for a real-time face recognition system with LBPH Algorithm. In this algorithm, it converts the image from color to greyscale image and divides into pixels and it will be allocated in a matrix form and those images will be stored in the database. If an image is detected then microcontroller will send power to the motor driver unit then the electromagnetic lock will unlock the door and it will lock again when there is no power supply to that unit. Finally, this paper concludes for the advanced implementations achieved by integrating embedded system models against the convention.

Published by: Thulluri Krishna Vamsi, Kanchana Charan Sai, Vijayalakshmi M.

Author: Thulluri Krishna Vamsi

Paper ID: V5I2-1856

Paper Status: published

Published: April 12, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X