Manuscripts

Recent Papers

Research Paper

A system for profiling and monitoring database access patterns for application programs by anomaly detection

Database Management Systems (DBMSs) provide access control mechanisms that allow database administrators (DBAs) to grant application programs access privileges to databases. Though such mechanisms are powerful, in practice finer-grained access control mechanism tailored to the semantics of the data stored in the DMBS is required as a first-class defense mechanism against smart attackers. Hence, custom-written applications that access databases implement an additional layer of access control. Therefore, securing a database alone is not enough for such applications, as attackers aiming at stealing data can take advantage of vulnerabilities in the privileged applications and make these applications to issue malicious database queries. An access control mechanism can only prevent application programs from accessing the data to which the programs are not authorized, but it is unable to prevent misuse of the data to which application programs are authorized for access. Hence, we need a mechanism able to detect malicious behavior resulting from previously authorized applications. In this paper, we present the architecture of an anomaly detection mechanism, DetAnom, that aims to solve such a problem. Our approach is based on the analysis and profiling of the application in order to create a succinct representation of its interaction with the database. Such a profile keeps a signature for every submitted query and also the corresponding constraints that the application program must satisfy to submit the query. Later, in the detection phase, whenever the application issues a query, a module captures the query before it reaches the database and verifies the corresponding signature and constraints against the current context of the application. If there is a mismatch, the query is marked as anomalous. The main advantage of our anomaly detection mechanism is that, in order to build the application profiles, we need neither any previous knowledge of application vulnerabilities nor any example of possible attacks. As a result, our mechanism is able to protect the data from attacks tailored to database applications such as code modification attacks, SQL injections, and also from other data-centric attacks as well. If the data is attacked by the insider and he modifies the data, we could be able to recover the original file with the help of our mechanism. We have implemented our mechanism with a software testing technique called consoles testing and the PostgreSQL DBMS. Experimental results show that our profiling technique is close to accurate, requires an acceptable amount of time, and the detection mechanism incurs low run-time overhead.

Published by: Mohammed Ahmed Raza, Divya K., Kavya Jain B. S., Harsha N., Basavaraj Neelagund

Author: Mohammed Ahmed Raza

Paper ID: V6I3-1551

Paper Status: published

Published: June 17, 2020

Full Details
Research Paper

Retirement Community – A safe haven for the elderly

There was a time when senior care in India was confined to old age homes. These old age homes, often managed by charitable organizations provided shelter and basic facilities for older people of lower economic status. The concept of retirement homes was unheard of until a decade ago. This paper showcases seniors in India as a demographic segment, bringing out the key trends in senior housing. The entrenched social norm hints towards a moral obligation for children to assume the responsibility in caring for their aging parents. Retirement homes were perceived as the last – resort for older people who did not have anyone to care for them. However, the perception of a retirement home as a shelter for destitute older people is slowing changing. The main catalyst for this change is urbanization and changes to traditional family structure, while most continue to stay with their children, a large number of middle and upper-class seniors, especially those whose children have moved abroad or other cities for work, are opting to pack up their homes and move to ‘Retirement Communities’ or ‘Senior Living’ facilities to continue living independently to enjoy their post-retirement life without any hassle. This paper concludes with a discussion on the importance of retirement community in the present-day scenario as a boon for both children and aged parents, highlighting the gradual change in the stigma attached to it.

Published by: I. Simheca

Author: I. Simheca

Paper ID: V6I3-1543

Paper Status: published

Published: June 17, 2020

Full Details
Research Paper

Handwritten text pattern recognition

Character recognition from handwritten images is of great interest in the pattern recognition research community for their good application in many areas. To implement the system, it requires two steps, viz., feature extraction followed by character recognition based on any classification algorithm. A convolutional neural network (CNN) is an excellent feature of extractor and classifier. It is having multiple applications fields such as robotics, medicine, and security and surveillance. In this article, CNN is implemented for the NIST dataset with appropriate parameters for training and testing the system. The system provides accuracy of up to 94%, which is better with respect to others. It also takes a very low amount of time for training the system.

Published by: Anurag G., Deepak S. D., Harsha J. K., C. Sagar Patil, Hemalatha M.

Author: Anurag G.

Paper ID: V6I3-1541

Paper Status: published

Published: June 16, 2020

Full Details
Research Paper

Experimental analysis of axially loaded CFST columns over RC column

In recent years, the use of Concrete Filled Steel Tube columns is increased significantly in medium-rise to high-rise buildings, therefore to understand the deformation characteristics of Concrete Filled Steel Tube columns critically Over Reinforced Concrete Columns, Extended Three Dimensional Building System ETABS Software is used. This paper focuses on a comparative study of Concrete Filled Steel Tube columns over Reinforced Concrete Columns under axial compressive loading. Two kinds of columns, including CFST column with varying size and conventional column were tested. The experimental results showed that the CFST column has a higher bearing capacity, more effective plastic behavior, and greater stiffness.

Published by: Abhishek P. Hedgire, Nikhil. A. Maske, Dr. Nagesh L. Shelke

Author: Abhishek P. Hedgire

Paper ID: V6I3-1521

Paper Status: published

Published: June 16, 2020

Full Details
Research Paper

Performance analysis of high wing for a micro class unmanned aerial vehicle

The paper deals with the design and performance analysis of high wing of a Micro Class Unmanned Aerial Vehicle. The wing design involves its initial considerations like and weight of the aircraft, planform selection, selection of airfoil, area of the wing and wing loading characteristics. The design is done based on the calculated values and performance analysis is done to show airfoil characteristics, and performance of the wing with the help of XFLR5 software. The objective of this project is to compare the results obtained for different wing planforms, different angle of attack over a range of speeds. From the results we will conclude which wing configuration meets the payload lifting goals. Selection of wing configuration is an iterative process. The iterative process allows us to accommodate other design criteria such as catering storage, systems installations (high lift devices, attachment of motors and the main undercarriage) which may or may not be directly related to the goals of the mission. The result of iterative optimization is typically a compromise in configuration which best satisfies the overall needs of the mission. The final decision upon configuration will represent a compromise based on design priorities

Published by: Akshay Rajesh Prasad, Vivek Sharma

Author: Akshay Rajesh Prasad

Paper ID: V6I3-1490

Paper Status: published

Published: June 16, 2020

Full Details
Research Paper

Sexual harassment at workplace

In this era of patriarchal society, where everyone deem to have adopt western culture could not change their thinking against goddess of the nation which is women. Nowadays crimes have been increased at a very high rate. Crimes in the nation have been increasing at a very high rate but crimes against women have taken a major boom. One of the major crimes is sexual harassment at workplace against women. Women are being suppressed from the very beginning and the men are used to take advantage of this and harass women and make them feel humiliated. Sexual Harassment At Workplace against women knocked doors of legal system in the case of Vishaka V/S State Of Rajasthan in the year 1997 where honorable Supreme Court gave a set of guidelines for the cases dealing with sexual harassment at workplace. Even after having guidelines and acts for the same the men take advantage of loopholes in the legal system and does not leave any table unturned in order to suppress women and make them feel insecure and humiliated. What is sexual harassment? Sexual harassment is a sexual behavior against the wish either directly or by implication through physical contact , a demand or force for sexual pleasure, showing pornography or implicating sexual action on exchange of any demand through force and any act which is humiliating or sexual in conduct either spoken or written or through actions. “Sexual Harassment at workplace is suppressing women or making them feel humiliated or insulting them or making them feel insecure or sexually harassing them at the workplace.” The definition still remains subjective and depends on how the judges interpret the citation put before them. It can make a person feel humiliated or offended. It can be verbal, physical or written. It has existed in the past and has become a source of discussion. A job or educational performance is conditioned on sexual pleasure. “Hostile work or educational environments can be created by actions such as addressing women in crude or objectifying terms, posting pornographic images in the office and by making derogatory or demeaning or humiliating statements about women like anti-female jokes.” Even after adopting a modern society the mind set of people will never change with respect to a woman. Many women feel unsafe even at workplace where good environment is a major clause for profit of the organization. Even if women complain about it to anyone specially illiterate women they are also being suppressed and are threatened or tortured if they raise their voice against men of the nation. Is this even about gender inequality that men of the nation can do whatever they want even without having any fear of the law? Even after adopting all the values given by the families where does the ethics and respect of men go toward women? Why they think they can do anything to women and can get safe without being punished? Is this because of women not being educated enough or small girls who are sent to big houses for non-employed works? Or is sexual harassment at heights due to illiterate and unemployed population of the nation? Even after having laws enforced or act for prevention of sexual harassment at workplace against women it is practiced almost in every one of 5 workplaces in developing nation like India. The troubles women has to face at workplace even gives a decline in efficiency and effectiveness of the women that is being humiliated and other women that are even working. Patriarchy has gone into heights at such a rate where men have made joke of women and even laws of the nation. I would like to address all such questions in my research paper and answer all these questions as we further.

Published by: Snigdha Singhi

Author: Snigdha Singhi

Paper ID: V6I3-1533

Paper Status: published

Published: June 16, 2020

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X