Manuscripts

Recent Papers

Review Paper

Privacy-Preserving Multi Keyword Search in Cloud Computing

The current study is intended to present an in-depth analysis of literature relative to privacy preserving multi-keyword search over encrypted cloud data. The multi-keyword ranked search that the study proposes has the capacity to post the exact matching documents only. This paper essentially seeks to fill the perceived research gaps from previous studies in multi-keyword search in cloud computing. To be precise, the current paper considers three peer-reviewed research articles concerning multi-keyword search in cloud computing. As such, it analyses the methods, approaches and techniques that have been proposed in each of the three studies while presenting viewing these aspects in a critical limelight. The central problem focused by each of the three selected articles is keyword privacy. This draws from the fact that despite the capacity of perceived approaches to generate cryptic trapdoors which conceals keywords, there is a possibility that cloud service providers through statistical analysis can estimate the keywords. The second concern that has been discussed in these research articles is trapdoor un-linkability. This arises mostly from deterministic trapdoor generation functions which gives the cloud service provider an easy avenue of accumulating keyword frequency. Lastly, surveyed studies also reveal concerns relating to access patterns whereby although a many of encryption techniques can be deployed to conceal the access pattern, there remains efficiency concerns with such encryption.

Published by: Mansour Alshaikhsaleh, Prof. Mohamed Zohdy

Author: Mansour Alshaikhsaleh

Paper ID: V4I2-1307

Paper Status: published

Published: March 22, 2018

Full Details
Research Paper

Stellar Objects

Stellar object is more of an approach towards the universe we live in. It is a lookout for those school students who are intrested in the universe and the space. Written by 17 year old it talks about stellar objects,their birth, their death etc.

Published by: Simran Tuteja

Author: Simran Tuteja

Paper ID: V4I2-1331

Paper Status: published

Published: March 22, 2018

Full Details
Research Paper

Strength and Durability of Concrete Made with Marble Dust

As per preservation endeavors, this examination concentrates on the waste marble dust as partial replacement with cement. Concrete creation, the counter active action of ecological contamination with considering the components of reasonable and cost-sparing development ventures, particularly material utilization. Moreover, many of the construction industry in India produce construction waste that contributes largely to solid waste. Utilizing marble waste, this research will focus on marble wastes obtained from the construction industry in India. Presently, much of ceramic industries production goes to waste, which is not undergoing the recycle process yet. Replacement of marble dust of different percentage 5%, 10%, 15% and 20% of marble dust as partial replacement of cement with M-25 grade of concrete. The age of concrete at 7, 14, 28 and 56days.From the results of the study, samples of concrete with 0 to 15% marble dust replacement have reached optimum strength. Findings showed that concrete containing marble dust 0 to 15%showed the highest amount of compressive strength, and split tensile strength of concrete. Further studies can be carried out as this study only concludes that there is an increase in strength upto 15% replacement of cement by the marble powder. Further scope is to find out the optimal %age of marble powder to replace.

Published by: Shashank Dixit, Siddharth Nigam, Ram Bharosh

Author: Shashank Dixit

Paper ID: V4I2-1333

Paper Status: published

Published: March 22, 2018

Full Details
Research Paper

Under Pipe Traveling Robot to Detect Gas Line Leakage and Address Navigation to Cloud over IoT

The Internet of things (IOT) is the network of electronic devices, which are related to embedded systems and also other domains through the internet. The infrastructure of the kit is like a moving robot with two motors and it consists of a gas sensor to detect the gas leakages in the pipe. Gas pipes play very important roles for cities, industries and thus in growing economies. So, gas leakages lead to losses as well as are a threat because they can also lead to fire accidents. Placing sensors on each section of pipe is very costly. So here we propose an innovative robot that clings on to the outer surface of the gas pipe and moves with the pipe to check for leakages. The kit consists of an MQ2 gas sensor to detect the gas leakages. The robot will be moving continuously along the metal pipe, if there any presence of leakage the GPS sensor module will transmit the location to the cloud.

Published by: S. Jeya Anusuya, S. Venkat, R. Elangovan, P. Sunnyteja, M. S. Karthik, E. Jawahar Raj

Author: S. Jeya Anusuya

Paper ID: V4I2-1342

Paper Status: published

Published: March 22, 2018

Full Details
Research Paper

Automatic Fan Speed Control using Temperature and Humidity Sensor and Arduino

The Study is aimed at controlling the speed of the fan automatically using Arduino, temperature and humidity sensors. Fan speed need to be manually controlled every time but by using this idea the speed of the fan will be automatically adjusted according to surrounding environment. The project is based on the concept of Internet of Things(IOT). A simple strategy to automatically control the speed of fan using DHT22 sensor. According to the temperature sensed by temperature and humidity sensor the resistance of the fan will be adjusted to change the fan speed. It’s fairly straightforward to use, however needs careful arrangement to grab information. DHT22, Arduino and LCD will get power from the same fan connection, so that less battery power is used. The temperature will automatically control. In the proposed system Fan can be set at rather high for lowered activity level that required limited body movement like sleeping and sitting. DHT22 sensor is used to sense the temperature and then speed of fan is adjusted accordingly using PWM. Here Arduino code is used. In this proposed system, it takes comparatively less time to process. It requires additional devices, external clock and for programming it requires development system.

Published by: Suraj Kaushik, Yuvraj Singh Chouhan, Nagendra Sharma, Shreyansh Singh, P Suganya

Author: Suraj Kaushik

Paper ID: V4I2-1348

Paper Status: published

Published: March 21, 2018

Full Details
Review Paper

Study of Data Mining and Machine Learning for Intrusion Detection System

An interruption affirmation framework is programming that introduces a man or a system of PCs for dangerous exercises that are coordinated at taking or editing data or ruining system conventions. Most methodology inside the present interruption distinguishing proof framework can't offer with the intense and complex figure of digital assaults on PCs. Notwithstanding the way that solid versatile strategies like different methods of machine learning can cause higher prominence rates, bring down false thief caution rates and proper calculation and correspondence cost. Using information mining can bring about successive organization mining, order, bunching and minute information stream. This examination paper symbolizes an engaged writing outline of machine learning and information digging alternatives for digital investigation to get interruption acknowledgment. Predicated on the amount of references or the significance of rising strategy, printed material speaking to every technique were revealed, perused, and compressed. Since information are so essential in machine learning and information mining techniques, some notable digital information decisions inside machine learning and information digging are distinguished for digital security is appeared, in addition to a few hints about when to employ affirmed strategy get.

Published by: Mohak Chaturvedi, Atul Kumar Verma

Author: Mohak Chaturvedi

Paper ID: V4I2-1353

Paper Status: published

Published: March 21, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X