Manuscripts

Recent Papers

Others

Social distancing indicator and alarming system

One way of limiting the spread of an infectious disease, for instance, Covid-19, is to practice social distancing. This is not a new concept, as most societies have been aware of the value of keeping away from people who are suffering from an infection for many generations. The objective is to reduce transmission, delaying the epidemic peak, reducing the size of the epidemic peak, and spreading cases over a longer time to relieve pressure on the healthcare system

Published by: Vaishnavi Shantaram Gujar, Divya Shinde, Trupti Kherde

Author: Vaishnavi Shantaram Gujar

Paper ID: V7I3-1716

Paper Status: published

Published: June 11, 2021

Full Details
Review Paper

D Flip Flop circuits: Review of different architectures

A detailed architectural study of different types of flip flop designs is presented. This includes the conventional transmission gate flip flop topology (TGFF), Sense amplifier-based flip flop architecture (SAFF), Clock pulse-based Flip Flop design, and the Dynamic Flip Flop architecture. The fundamental working principles of each topology are discussed along with the operation principles. Important comparisons are made between the architectures and are also presented as a part of this work.

Published by: Nagaraj N., Nithin M.

Author: Nagaraj N.

Paper ID: V7I3-1781

Paper Status: published

Published: June 10, 2021

Full Details
Review Paper

Financialization of housing

Essay supporting the United Nations Human Rights Council's 2017 report on the financialization of housing

Published by: Keshav Bajaj

Author: Keshav Bajaj

Paper ID: V7I3-1769

Paper Status: published

Published: June 10, 2021

Full Details
Research Paper

SQL injection and XSS

SQL Injection is a vulnerability that influences the Structured Query Language (SQL) [1] queries that an application passes to a back-end database. By exploiting what is given to the database, the attacker can leverage the syntax and capabilities of SQL itself and the power and flexibility of supporting database functionality and operating system functionality available to the database. Cross-Site Scripting (XSS) is a Code Injection attack executed on the client-side of an internet Application. The foremost common method of stealing cookies or hijacking sessions is to introduce JavaScript with a browser-supported html cryptography technique. [2] Cross-site scripting vulnerabilities ordinarily enable AN aggressor to masquerade as a victim user, to hold out any actions that the user is ready to perform, and to access any of the user’s knowledge. If the victim user has privileged access at intervals the applying, then the aggressor could be able to gain the full management over all the application’s practicality and knowledge. [3] The CWE/SANS Top 25 software errors place SQL injection and Cross-Site Scripting at the very top. Additionally, the Open Web Application Security Project (OWASP) lists Injection Flaws (SQL injection) as the most severe security vulnerability affecting Web applications in its Top 10 list. This highlights how common and very relevant in the domain of Web security. As developers, we should be aware of the consequences and prevention measures of these attacks. This report mentions a brief survey on the real-world attacks of SQL Injection and cross-site Scripting. Additionally, the paper highlights some defenses one can use to mitigate these attacks. Index Terms—SQL Injection, Cross-Site Scripting, Defenses

Published by: Devashish Agarwala, Bhanu Pratap Yadav, Vanishree K.

Author: Devashish Agarwala

Paper ID: V7I3-1768

Paper Status: published

Published: June 10, 2021

Full Details
Survey Report

A study on network intrusion detection system

In this study, we have tried to survey the methods to detect network intrusions. The Intrusion detection system is important in computer networks for protecting the data. There are several algorithms using neural networks, deep learning, and machine learning to detect intrusion detection in the system. There are many methods for detecting intrusions by ensemble methods, classifiers, anomaly detection giving accuracy according to the methods. The goal of the study is to give a comparison of the methods for an accuracy rate of low rate false alarm and high detection rate. Also, the data sets used in the methods.

Published by: Vasumathi A. K., V. Banupriya

Author: Vasumathi A. K.

Paper ID: V7I3-1760

Paper Status: published

Published: June 10, 2021

Full Details
Research Paper

Improvement of Rigid Pavement with Geogrid Material

We have seen the non uniformity, non consistency, loose soil, unstable soil while construction of roads. We have experimentally examined that geogrid can be added as an additional reinforcement. The benefit of Geogrid is that the geogrid increases the bearing ability of construction and reduces the spreading of gravels and soil. The Geogrid is also economical so the cost of construction can be reduced. Geogrid gives strength to the construction and increases life span of construction. Geogrid reinforcement is a method used in permanent paved roadways in two major application areas. They are: base reinforcement and subgrade stabilization. The strength and life of pavement is greatly affecting the type of sub- grade, sub base and base course materials. But in India most of the flexible pavements are mainly constructed over weak and problematic sub-grade. In base reinforcement, the geogrids are placed at the bottom of unbound layers of a flexible pavement system and improve the load-carrying capacity of the pavement under repeated traffic. In subgrade stabilization applications, the geogrid is used to build construction platform over weak subgrade to carry equipment and facilitate the construction of the pavement system without over deformations of the subgrade.

Published by: Samata Devanand Thakare, Ankita Kanhaiya Pailkar, Shradha Sanjay Sanap, Utkarsh Rajesh Andhere, Sarvesh Sudhakar Palkar, Vivek Sahadev Ubhare, Vaibhav Vinod Bhoir, Dr. S. R. Bhagat, P. P. Mahajan

Author: Samata Devanand Thakare

Paper ID: V7I3-1777

Paper Status: published

Published: June 10, 2021

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X