Manuscripts

Recent Papers

Research Paper

Improved DoS attack detection and Prevention by SVM based optimize Leach Routing and clustering approach

It improves the packet delivery ratio of the network. The following measures were used to assess the success of a previous strategy: packet delivery ratio, throughput, number of flooded packets, and residual network energy. The findings correspond to reliable and secure data transfer between source and destination by addressing DoS assaults. Indeed, a particularly fatal attack is the Wormhole denial-of-service (DoS) attack, in which attackers establish low-latency connections between two network nodes.

Published by: Simranjeet Kour, Dr. Rajat Joshi

Author: Simranjeet Kour

Paper ID: V7I3-2031

Paper Status: published

Published: June 22, 2021

Full Details
Case Study

The rise of cyber crime and need of cybersecurity

Network safety adopts a substantial part in the field of data innovation .Receiving the data have gotten conceivably the greatest test in the present day. At whatever point we contemplate the network safety the main thing that rings a bell is 'digital wrongdoings' which are escalating enormously step by step. Different Governments and organizations are partaking in numerous actions to forestall these cybercrimes. Other than different dealings, network safety is as yet a foremost worry to many. This paper for the most part, centres around complications encountered by network safety on the most recent developments .It additionally centres around the most recent of the digital protection procedures, moralities and the designs altering the essence of network protection.

Published by: Aksh Yadav, Advay Surve, Siddhant Singh, Harsh Singh, Poonam Vengurlekar

Author: Aksh Yadav

Paper ID: V7I3-1982

Paper Status: published

Published: June 22, 2021

Full Details
Research Paper

Pollution Controlling Bricks

Air pollution, particularly in crowded cities, is increasing, mainly due to industrial activity and transportation. A crucial element in construction, bricks are the most important materials in the world.Therefore, one possible approach to reduce pollution is to use“smart” bricks, particularly those that incorporate photocatalytic structures in them. Incorporating Titanium dioxide (TiO2) in bricks could degrade and reduce various pollutants under ultraviolet sun radiation. TiO2-infused bricks would also maintain their optical characteristics for far longer than traditional bricks. This study evaluated the ability of bricks containing TiO2to degrade organic molecules, as assessed by the concrete’s ability to degrade Lithol Rubine bk dye. The amount of TiO2in the concrete samples was 0%, 2%, 4% of the clay. The resulting bricks were exposed to sunlight for 24, 48, and 72 hours. All TiO2 specimens significantly degraded the Lithol Rubine bk dye, demonstrating the potential of this approach to benefit the smart construction industry and, as a result, fight certain types of air pollution.

Published by: Janmesh Bhoir, Shubham Patil, Pratish Patil, Amey Patil, Shivraj G. Patil

Author: Janmesh Bhoir

Paper ID: V7I3-2018

Paper Status: published

Published: June 22, 2021

Full Details
Research Paper

Phishing Websites Classification Based on Machine Learning

Phishing has been a huge problem since the evolution of the Internet. It is kind of an Internet scam. Therefore, no antivirus or any kind of technical protection can completely eradicate this. But there has been research going on and conducted from intellects across the world to fight this online scam. Researches are coming up with different approaches to deal with this problem. The two main focused approaches taken by researchers to tackle phishing are Black Listing and Machine Learning. Machine Learning is a new and innovative way to tackle phishing. For this thesis I went with Machine Learning and heuristic based approach to tackle phishing. This thesis consist of a comparative study of different Machine Learning algorithm like Logistic Regression and ensemble algorithms like Adaboost and Gradientboost in order to know if ensemble algorithms can do a better prediction rather than standard machine Learning algorithms. The result obtained by ensemble algorithms were good but not as promising as expected.

Published by: Hardik Shah, Dharmik Timbadia

Author: Hardik Shah

Paper ID: V7I3-2006

Paper Status: published

Published: June 22, 2021

Full Details
Research Paper

Power generation using PN-Junction

This project concept to generate power with eco friendly envornment and low cost. It is also help to save convectional sources because they can be limited. Power genation using burn waste garbage. To reduce the total cost of power genration The peltier effect genration using burn waste genrate heat supply pn junction this heat to genrate temprature diffrence in pn junction and this temperature diffrance the positive terminal proton is to attract the negative terminal of electron and the negative terminal of electron attract to the postive terminal of proton. To generate peltier effect electric charge. This electric charge it used to stored in battery with the help of booster circuit

Published by: Praful Randive, Shivani Ulewar, Pratiksha Lanjewar, Vikas Mohabanshi, Ashim Majumdar, Mayuri Maind, Bhumeshwari Nagose

Author: Praful Randive

Paper ID: V7I3-2047

Paper Status: published

Published: June 22, 2021

Full Details
Research Paper

Masking private user information using Natural Language Processing

The Internet brings a lot of efficiency to our lives but we must be aware that everyone exchanges a huge amount of data while interacting with the internet. One of the most important leisure activities one gets from the internet is to be able to socialize. For example, social media has become part and the core of our lives. With more than 2.3 billion active users, data privacy is an issue of concern. The world of the internet has become full of frauds hunting for personal information they leverage for their immoral activities. So, coming up with an algorithm that could secure data and process it such that no private data is involved, and machines continue to be trained with greater data. This could mean a dataset with data that is processed in a manner to make it anonymous. If there is any private information, we will mask that information with pseudo data. We use Named Entity Recognition using Deep Learning for identifying and masking personal information. In this paper, we will discuss how we mask private data. This model will be a successful technique to hide one’s personal information to achieve complete data privacy.

Published by: Satwik Ram Kodandaram, Kushal Honnappa, Kunal Soni

Author: Satwik Ram Kodandaram

Paper ID: V7I3-2048

Paper Status: published

Published: June 22, 2021

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X