Manuscripts

Recent Papers

Thesis

Migration of Database from Oracle to Sybase System

This Migration intends to give the relocation interaction from an Oracle database to Sybase ASE (Adaptive Server Enterprise). By “migration " we mean the most common way of changing a client-server application at present involving the Oracle database as its RDBMS, to such an extent that it utilizes the Sybase ASE database instead. This Migration has as its essential concentration to move usefulness from Oracle to Sybase ASE. Execution-related parts of Sybase ASE are covered Sybase ASE is the data set that powers Wall Street. ASE has been conveying unshakable dependability and top-level performance for the beyond 25 years. Sybase ASE has a lower total cost of ownership than Oracle and delivers better performance on the same hardware. Sybase ASE is ready to be the database in any application that runs on Oracle today

Published by: Praful R. Nagpure

Author: Praful R. Nagpure

Paper ID: V8I3-1405

Paper Status: published

Published: June 18, 2022

Full Details
Research Paper

Detection of phishing websites using a Machine Learning approach

In recent years, advancements in Internet and cloud technologies have led to a significant increase in electronic trading in which consumers make online purchases and transactions. This growth leads to unauthorized access to users’ sensitive information and damages the resources of an enterprise. Phishing is one of the familiar attacks that trick users to access malicious content and gain their information. In terms of website interface and uniform resource locator (URL), most phishing webpages look identical to the actual webpages. Various strategies for detecting phishing websites, such as blacklist, heuristic, Etc., have been suggested. However, due to inefficient security technologies, there is an exponential increase in the number of victims. The anonymous and uncontrollable framework of the Internet is more vulnerable to phishing attacks. Existing research works show that the performance of the phishing detection system is limited. There is a demand for an intelligent technique to protect users from the cyber-attacks

Published by: Koushik Kumar Reddy, E. Surendra, M. Sai Nikhil Gowd, N. Jaya Pradeep Reddy, Narasimhayya B. E.

Author: Koushik Kumar Reddy

Paper ID: V8I3-1404

Paper Status: published

Published: June 17, 2022

Full Details
Research Paper

Investigating the impact of COVID-19 on Transplantation and Transplant patients and observing the further consequences of the virus caused on the lives of the transplanted

The purpose of this paper is two-pronged to analyse and assess if COVID has had any impact on the quality of life/longevity of patients who have received transplants. To identify what (if any) impact COVID has had on the lives of patients waiting for transplants. It aims to compare the physical and psychological challenges faced by transplant patients, after transplant and after COVID. For those waiting for transplants, with COVID restrictions, there was a two year period in which transplants were stalled or delayed and therefore looks at the consequential impact on those waiting for transplants. A study was conducted with transplant patients of Indian origin, and transplant surgeons and secondary research findings were conducted since the inception of the pandemic.

Published by: Nirvaan Puri

Author: Nirvaan Puri

Paper ID: V8I3-1403

Paper Status: published

Published: June 16, 2022

Full Details
Research Paper

Use and application of nudging in different countries

‘Nudging’ has been a popular technique used by governments, institutions, and other groups to reinforce positive habits and choices among people without the use of force and with ease of opting out. Different countries around the globe have inculcated the practice of ‘nudging’ into their policies for purposes like improving public health, promoting eco-friendly behavior, and more. It’s important to study and analyze past experiments with nudging in order to understand what makes a ‘nudge’ effective, which in turn will help formulate better such campaigns in the future.

Published by: Tanushree Sarda, Simran Raina, Milind Surana, Vineet Nair, Ganeev Kaur Sethi, Sattwik Mohanty

Author: Tanushree Sarda

Paper ID: V8I3-1402

Paper Status: published

Published: June 16, 2022

Full Details
Research Paper

Sensitivity Analysis using k-anonymization

It's necessary to keep sensitive data and private data safe. When financial information, healthcare information, and other sensitive consumer or user data are mishandled, they can be destructive. Due to a lack of access control over personal information, individuals may be susceptible to fraud and identity theft. This paper provides an overview of the ideas of data privacy, re-identification risk, and dataset utility, as well as the correlations between the three. On the adult dataset from the UCI Machine Learning Repository, this study presents a sensitivity analysis of the k-anonymization algorithm. ARX, an open-source anonymization tool, was used to show this.

Published by: Krishna Yanmantram, T. M. Vishnu Mukundan, Jama Surya Teja

Author: Krishna Yanmantram

Paper ID: V8I3-1399

Paper Status: published

Published: June 15, 2022

Full Details
Research Paper

Development of lightweight and secure IoT device management framework

The area of the Internet of Things (IoT) is rapidly growing, raising severe security concerns for the entire network. Due to its high traffic volume and real-time operation, a security framework is essential. The paradigm of the Internet of Things (IoT) requires pervasive connectivity to billions of heterogeneous devices. Devices in the Internet of Things (IoT) are very limited in processing capacity, memory, and storage. Therefore, a lightweight security process is to be provided for IoT devices in other to create the required development. This paper introduces several developments in lightweight versions of various known security processes and analyzes each relevant process. With a machine-learning-based model process that provides a lightweight solution that works by selecting the best features leveraging well-known filter and wrapper methods for feature selection. The strategy can be evaluated over different datasets collected from varying network scenarios.

Published by: Faith Ebosetale Omohodion, S. Padma

Author: Faith Ebosetale Omohodion

Paper ID: V8I3-1395

Paper Status: published

Published: June 15, 2022

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X