Manuscripts

Recent Papers

Research Paper

Multi factor AKE protocol and key stroke authentication for secured communication

Authenticated Key Exchange (AKE) protocol permits a user and a server to authenticate each other for the first time. It generates a session key for the successive communications without any authentication. Many AKE protocols had been proposed to obtain person privateness and authentication for the duration of conversation. Other than secured consultation key established order, these AKE protocols offer a few other useful capability like two-thing user authentication and mutual authentication. But they have got few weaknesses along with vulnerability in opposition to loss of smart card, offline dictionary assault, de-synchronization attack, person anonymity or untraceability. Also, AKE scheme the usage of public key conversation doesn’t suite nicely for lightweight computational gadgets. In this work, a novel Multi-Factor AKE protocol is proposed to overcome all the above-mentioned weaknesses. This protocol supports revoked smart card transactions. The password that is available on the USB device will be overwritten once the user used it. Passwords can be updated without centralized storage. The average time to enter a password will be defined. The user has to type the password within the allocated time, failing which he/she has to enter it again. This security model of AKE supports user anonymity and resist a lost card attack. Elliptical Curve Cryptography algorithm is used for encryption and decryption of the session key. The computational cost and the bandwidth cost for this proposed model are low, which makes it useful in pervasive computing applications and mobile communications. The proposed AKE model is much secured when compared to the existing protocols.

Published by: S. Kanimozhi, S. Jayanthi

Author: S. Kanimozhi

Paper ID: V5I3-1321

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Location-aware heterogeneous web service recommendation using Hybrid approach

Web service has been emerged as a promising technique to support inter-operable machine-to-machine interaction which provides a method of communication between electronic devices over a network. As the number of web services with similar functionality has increased rapidly over the internet the web service discovery is not a challenging task but selection and recommendation are becoming more important. The Optimality of a web service depends on its performance and performance is measured through Quality of Service that is QoS. QoS is the set of non-functional properties of a web service which includes response time, price, failure rate and so on. Recommendation system initially searches for the list of web services those having similar functionality, which the user requested and finally the optimal web services are recommended to users. In addition, QoS is widely employed in describing non-functional properties of Web Services for optimizing the Web service composition. Since the number of functionally equivalent services offered on the web with different QoS properties is increasing, it is quite important to recommend services considering their non-functional QoS properties. In this project, we can include the recommendation algorithm which includes ratings, reviews, and emoticons. These details are recommended by using a hybrid algorithm. User details are encrypted using Elliptical curve cryptography. Third parties are difficult to hack the original details. Admin can discover the services based on the highest feedbacks and also recommended based on locations. And also using roll back discovery to cancel the web services automatically to overcome the burden of service cancellation.

Published by: D. Ananthi, K. Ambika

Author: D. Ananthi

Paper ID: V5I3-1314

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Dimensionality reduction and classification in gene expression data using hybrid approach

The microarray technology has modernized the approach of biological research in such a way that scientists can now measure the expression levels of thousands of genes simultaneously in a single experiment. With this large quantity of gene expression data, experts have started to discover the possibilities of disease classification using gene expression data. Quite a large number of methods have been planned in recent years with hopeful results. But there are still a set of issues which need to be addressed and understood. In order to gain insight into the disease classification difficulty, it is necessary to get a closer look at the problem, the proposed solutions, and the associated issues altogether. In this paper, we present a dimensionality reduction methods and classification method such as Mutual information, Pearson’s correlation, search algorithms (Recursive feature elimination, Genetic Algorithm, simulated annealing) with Support Vector Machine (SVM) classification algorithm and estimate them based on their evaluation time, classification accuracy and ability to reveal biologically meaningful gene expression. Our experimental results shows that classifier performance through graphs with improved accuracy in disease prediction.

Published by: K. Iswarya, C. Kanimozhi

Author: K. Iswarya

Paper ID: V5I3-1312

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Design and development of continuous variable transmission with launch gear

A transmission is a machine in a power transmission system, which provides a controlled application of power. Often the term transmission refers simply to the gearbox that uses gears and gear trains to provide speed and torque conversions from a rotating power source to another device. The transmission also provides a reverse gear resulting in backward motion of the vehicle. CVT or continuously variable transmission provides an automatic feature for changing the gear ratio depending upon different engine load conditions. Even being an automatic transmission, CVT consists of lesser moving parts and is simpler and compact design. Metal belt and variable pulleys, one of the most popular kinds of CVT that are used in the automobiles widely because it can provide better acceleration because of higher low ratio and better fuel consumption because of less over drive ratio. Despite providing such advantages, CVT generates less torque at lower engine RPM. This is due to slipping of the belt over the tapered surfaces of the variable pulley. Therefore, a mechanism with a launch gear driving the pulleys to reduce belt slip is to be introduced and developed to overcome this problem increasing torque at lower rpm.

Published by: Kshitij Santosh Soman, Chinmay P. Tendulkar, Affan M. Wadkar, Nilesh K. Pednekar, Sumit S. Surve

Author: Kshitij Santosh Soman

Paper ID: V5I3-1310

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Log based internal intrusion detection for web applications

The web environment security has become a high priority for e-businesses communities. As the usability and popularity of web applications have increased, various types of attacks in web applications also increase. The Intrusion detection system has been used for the purpose of detecting the attacks by looking at the network traffic or by looking at operating system events. Log-based intrusion detection system makes use of user logs from the web servers, where the access information about each and every request is saved. The drawback of Log-based web intrusion detection is that it can be executed only after transactions take place; hence, the prevention of attack is unattainable. In this paper we are focusing on user’s behavior, to find out the difference between the common user and malicious user and try to prevent the attack before it takes place

Published by: S. Chanthini, Dr. K. Latha

Author: S. Chanthini

Paper ID: V5I3-1311

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Farm produce delivery management

Agriculture provides employment to over 60% of the Indian population. It also contributes 17% for the GDP. However, agricultural marketing has not taken its shape in rural India. The farmers are completely dependent upon local traders and middlemen for disposal of their farm produce. This is due to the lack of good marketing facilities. Hence the products are sold at a throwaway price. The aim behind developing this app is to give the farming community a fair and consistent price for their produces and therefore they farmers can overcome the problem of facing the middlemen. By using this application, the farmers can directly connect with the wholesalers, retailers or the end-users and supply the product directly to them. This will ensure that there is an increase in the profit of the farmers.

Published by: Aishwarya S. Murudi, Krishna Keerthana, Likith S. R., Meghana V. Reddy, Shashikanth T. S.

Author: Aishwarya S. Murudi

Paper ID: V5I3-1334

Paper Status: published

Published: May 11, 2019

Full Details