Manuscripts

Recent Papers

Research Paper

WebEnum

When you want to compromise a system or infrastructure, the most critical phase you have to care about is information gathering. Then you enumerate the system using gathered information to get the exact version of protocols or software. Enumeration is one important phase where you extract the user information, network share, banner grabbing and retrieval of network protocol information. Enumeration is so important because one bad move could lure you to a rabbit hole which gives false information using that you can't compromise a system and you waste most of the time in it. So when you spend the most time in this enumeration phase you would get exact information about the system. It will save you some time and it will avoid getting you frustrated. When you are hacking a big network every information you should gather correctly. So some information will help you in further phases like privilege escalation or clearing tracks.

Published by: Karthik J. Bhat, Karthik P., Mithun B. L., Nishith B. Rao, Dr. Sangeetha

Author: Karthik J. Bhat

Paper ID: V6I3-1377

Paper Status: published

Published: June 3, 2020

Full Details
Research Paper

Computational structural analysis for Protein Glutathione

Glutathione is an anti-oxidant present in plants. It is used to treat lung diseases, including idiopathic pulmonary fibrosis, cystic fibrosis, and lung disease in people with HIV disease, cancer, skin pigmentation. Glutathione was also given as a shot (by injection into the muscle) for preventing poisonous side effects of cancer treatment (chemotherapy) and for treating the inability to father a child (male infertility). The Glutathione was given intravenously (by injection into the vein, by IV) for preventing “tired blood” (anemia) in kidney patients undergoing hemodialysis treatment, preventing kidney problems after heart bypass surgery, treating Parkinson’s disease, improving blood flow and decreasing clotting in individuals with “hardening of the arteries” (atherosclerosis), treating diabetes, and preventing toxic side effects of chemotherapy (cancer patient)In the following studies using bioinformatics software and tools the chemical structure of glutathione protein, drug indication, glutathione protein pathway, a gene present in the protein, binding and active site, binding interaction with other protein, domain region were predicted based on these studies it is concluded that the glutathione protein can be used to treat many human diseases.

Published by: Aruna Aasirvatham

Author: Aruna Aasirvatham

Paper ID: V6I3-1379

Paper Status: published

Published: June 3, 2020

Full Details
Research Paper

A study on procurement performance evaluation

The main objective of the study was to study procurement performance and its evaluation. Procurement processes are important functions within any enterprise. Procurement is the process of acquiring, buying goods or services or works from an external source, often via a tendering or bid process. The procurement process involves two categories i.e. direct procurement and indirect procurement. Direct Procurements affects the production process of manufacturing firms. It encompasses all items that are part of finished products, such as raw materials, components and parts. The indirect procurement activities deal with operating resources that a company purchases to enable its operations. The success of any organization is depends on supply chain and procurement, because of this it is very important to evaluate the performance of procurement. The financial performance is also indirectly linked with the procurement of material. For the efficient and effective working of any organization or company need to measure procurement performance. For this research purpose descriptive research design was used in executing the study. The targeted group of the study was staffs who deal with procurement. The questionnaire design according to objective and send to respective person and the analysis made on the response collected from them. The results describe using table, graphs, etc.

Published by: Moin N. Kureshi

Author: Moin N. Kureshi

Paper ID: V6I3-1375

Paper Status: published

Published: June 3, 2020

Full Details
Review Paper

Utilization of Reclaimed Asphalt Pavement in bituminous road

This paper aim to study various properties, parameter of RAP (Reclaimed Asphalt Pavement) and use it in construction of flexible pavement. RAP mainly constituted with scrap material received from flexible pavement due to increment of granular sub base and base course as per latest IRC code. In this the scrap material is recycled as RAP so the construction cost will considerably decrease. This RAP may be used as sub base course or base course with cold in place recycling method or reclaimed with additional binder or aggregates and use in base course as bituminous layer. This will also help to save valuable natural resource in huge quantity. This paper also contains a case study of RAP and analysis of direct saving of construction cost.

Published by: Abdul Wahab, Prakhar Srivastav, Prashant Katiyar, Abhishek Singh Yadav

Author: Abdul Wahab

Paper ID: V6I3-1404

Paper Status: published

Published: June 2, 2020

Full Details
Research Paper

Plant disease detection using Machine Learning

Agriculture is considered to be the backbone and major revenue producing of our country. Crops play an important role in our daily routine providing us with nourishments. Due to environmental conditions, crops are getting affected with many diseases. Farmers are not able to detect these diseases at an early stage. Thus, assessment of crop condition is vital. The growing technology plays a major role and techniques like Machine Learning, Deep Learning are used. Here in this project focuses on the assessment of the crop condition with the help of their leaves, Healthy as well as diseased leaves are capture using cameras from real-time environments, K-means clustering is used for segmentation. After segmentation undergo classification using Machine learning algorithms in which healthy and diseased leaves are detected.

Published by: Rakshitha G., Yashaswini B. M., Sneha M., Shalini Singh A., Sonu C. S.

Author: Rakshitha G.

Paper ID: V6I3-1401

Paper Status: published

Published: June 2, 2020

Full Details
Survey Report

A survey on different Port Scanning methods and the tools that are used to perform them

Port Scanning is a method which is used in the vulnerability Detection of a host Machine. Port scanning is a phase in footprinting and scanning; this comes in reconnaissance which is considered as the first stage of a computer attack. However there are different methods that can be used in different circumstances to perform a port scanning. But each method has its own cons and pros. This survey paper presents few such methods that was developed long ago but are in constant research and the tools that employ these methods. The paper presents different methods and compares them.

Published by: Abhinav Upadhya, B K Srinivas

Author: Abhinav Upadhya

Paper ID: V6I3-1400

Paper Status: published

Published: June 2, 2020

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X