Manuscripts

Recent Papers

Review Article

Application of the Hash Function on Secret Message and Provide it Security with the Help of Invisible ASCII Character Replacement Technology

Most widely used technique over the internet for communication is the text-document exchange. This text document may contain valuable data or some general information of any kind. If this text document contains some important information and if gets hacked then they may change information about it or may misuse that information. Because of all these reasons we need some technique for information hiding within a text document while communication over the internet. Although there are lots of text-based information hiding techniques present and proposed by many authors but these techniques have some drawbacks such as poor robustness, lower embedding rate, and semantic clutter. Due to all these flaws in the existing system many time the information is hacked or extracted by the interceptors. To mitigates all these drawbacks of existing system or techniques we proposed a new technique based on the hash function and the invisible ASCII character replacement method. In this approach, we first find the binary formatted information which is added by even numbers of 1’s for even parity, after that the space character in every carrier is replaced by SOH with the help of some replacement algorithm. In the third stage, a hash value is generated. At last the hash value is compared with the encoded secret information.

Published by: Swati Dandekar, Dr. Jyoti Rao

Author: Swati Dandekar

Paper ID: V4I1-1171

Paper Status: published

Published: January 8, 2018

Full Details
Review Article

Sliding Window Control Based High Utility Pattern Mining For Industrial Use

Value of the item set is considered as an utility of that item set and find out the high utility of the item set is the aim of utility mining .Some time database parameters are considered to find out high utility pattern eg. Profit, cost etc. In day to day life high utility pattern mining play important role in applications. Its current hot topic in today’s research area. Different existing algorithms are present in this area .It first of all identify the candidate itemsets by using their utilities, and simultaneously identify the exact utility of that candidate pattern. Problem of using this algorithm is large number of candidate itemsets are generated. But after computing exact utility it’s clear that most of the candidate having no high utility. For generating profitable product manufacturing plan its very important to understanding the customer preferences in industrial area. One of the approach in pattern mining, by considering the quantity, quality and cost of each product for generating high profitable product set, which employed to find out high utility pattern. For establishing highly profitable manufacturing plan which allow corporation to maximize its revenue, high utility pattern mining is important aspect. Large amount of stream data related to customer purchase behavior used for establishing manufacturing plan. Recent preference of the customers also helps in generating manufacturing plans. This survey work contains a list structure and a novel algorithm for generating high utility pattern over large data, on the basis of Sliding Window Control Mode. This approach avoid the generation of candidate pattern. Due to that algorithm not required large amount of memory space as well as computational resources for verifying candidate patterns. Due to this it’s very efficient approach.

Published by: Swapnali Londhe, Rupesh Mahajan

Author: Swapnali Londhe

Paper ID: V4I1-1170

Paper Status: published

Published: January 8, 2018

Full Details
Case Study

Consumer’s Acceptance to Green Building Concept for Sustainable Construction in India

The changing consumer demands for eco-friendly products and services in all industrial sectors have paved way for constant growth and development of the real estate sector, especially in Delhi-NCR. The growing interest towards green products in real estate can be attributed to the fact that quality of air is decreasing day by day. According to few reports, buildings consume more than 30% of energy utilizing 40% of resources while simultaneously generating 40% of wastes and 35% of harmful greenhouse gases. So this study is focused on consumer’s acceptance and willingness to pay more for green building products in Delhi-NCR. For the purpose of the study 150 commercial property owners were contacted to identify the factors stimulating them to pay premium prices for sustainable buildings over conventional buildings. From the results, it was found that environmental attitude, green awareness, architectural factors and social influence significantly influence the customer willingness to pay higher prices for green buildings. Social Influence is the strongest factor that has positively influenced the customer inner will to pay premium prices for green buildings. The research also provides an in-depth understanding of factors stimulating customers to go green in the context of construction industry specifically in Delhi-NCR region.

Published by: Ankit Kumar Jat, Prithviraj Dilip Mane

Author: Ankit Kumar Jat

Paper ID: V4I1-1163

Paper Status: published

Published: January 6, 2018

Full Details
Research Paper

Analysis and Design of Multistorey Building G+4

A multi-storey is a building that has multiple floors above the ground. It can be a residential or commercial building. in this project the analysis and design of multi-storey building G+4. In general the analysis of multi-storey is elaborate and rigorous because those are statically indeterminate structures. Shears and moments due to different loading conditions are determined by many methods such as portal method, moment distribution method and matrix method. The present project deals with the analysis of a G+4 building. The dead load & live loads are applied and the design for beams, columns, footing is obtained Manually. The Analysis part of the structure is done using Kani’s Method and the values are taken for design.

Published by: Mohd Zohair, K. Mounika Reddy

Author: Mohd Zohair

Paper ID: V4I1-1153

Paper Status: published

Published: January 6, 2018

Full Details
Research Paper

Energy Aware Node Mobility Prediction in Mobile Adhoc Networks

The analysis of human location histories is currently getting an increasing attention, due to the widespread usage of geopositioning technologies such as the GPS, and as well as online location-based services that allow users to share this information. Tasks such as the prediction of person’s movement can be addressed through the usage of this data, in order for offering support for more privileged applications, such as adaptive mobile services through proactive context-based functions. Here we aim to develop a simple and effective scheme to predict when the user will leave the current location and where he will move to future position. This paper presents a hybrid method for predicting human mobility on the basis of Mobility Markov Chain Models (MMCs). The proposed approach clusters location histories according to their characteristics, and later trains the MMC model based on mobility history to obtain transition matrix. The usage of MMC allows us to take information of location characteristics as parameters, and also to account for the effects of each individual’s previous actions. The proposed system is a mobility prediction with adaptive duty cycling approach in reducing energy consumption, with a mobility model called Mobility Markov Chain (MMC) for predicting the future location. We report a series of experiments with a real-world location history dataset and from the LifeMap dataset, showing that the prediction accuracy is in the range of 65 to 85 percent.

Published by: Ram S. Kale

Author: Ram S. Kale

Paper ID: V4I1-1165

Paper Status: published

Published: January 6, 2018

Full Details
Survey Report

A Literature Survey on Smart Home Automation Security

This paper presents a detailed description of different technologies and home automation systems from a security point of view. This paper highlights various security flaws in existing home automation systems and how the concept of security and the meaning of the word “intruder” have evolved over time.  We studied the challenges in home automation security from point of view of home owner and security provider. This work considers home automation systems like central controller based home automation systems, context-aware home automation systems, Bluetooth-based home automation systems, Short Messaging Service-based home automation systems, Global System for Mobile communication or mobile-based home automation systems, and Internet-based home automation systems. The work is concluded by giving future directions home automation Security Research.

Published by: Rohit Ragmahale

Author: Rohit Ragmahale

Paper ID: V4I1-1160

Paper Status: published

Published: January 5, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X