Manuscripts

Recent Papers

Research Paper

A novel prototype to secure network using malware detection framework against malware attack in wireless network

A new and novel proposed algorithm based on malware detection has been used that overcomes the disadvantages of the existing algorithms and helps to eliminate viruses and worms from entrusted environment. In the wireless networks suffers from various spyware programs that prevents access to legitimate users who obtains services from target web server. In our proposed prototype helps to authenticate the sender to make the dynamic rule set to avoid the formations of unavailable networks which any user who obtain web services. In our proposal architecture diagnose malware whether malware based data has been really being sent to the valid user or is it being morphed by the attacker in the middle. The proposed algorithm has been tested against various existing algorithms to study how effectively the algorithm is working, and how effectively it is overcoming the drawbacks of the present malware detection algorithms. The algorithm is projected to serve the purpose of prevention of being used malware based programs to drop it by the user and also to identify that the non-infectious message is reaching only to the valid user.

Published by: G. Jagadish, L. Jaswanth, K. Sowjanya, P. Sri Harsha, M. Nikhil Kumar

Author: G. Jagadish

Paper ID: V5I2-1278

Paper Status: published

Published: March 16, 2019

Full Details
Research Paper

Development of particle reinforced composite by plastic and e-waste

The main aim of this project is to develop Particle reinforced composites. Thermoplastic is taken as matrix material. Thermosetting plastics and E-Waste glass powder of 60µm is taken as particles. The formed structure exhibits high strength, low mass density and less weight compare to wood and steel. Due to its superior performance, the composite reinforced materials are mainly used indoors, frames, the automobile industry, especially for vehicle body applications. In this project particle reinforced Composite formed from Plastics and Electronic wastes. A formed specimen is subjected to tensile, hardness and bend test. It exhibits high tensile and bending strength.

Published by: A. Kanagaraj, C. Franciskennathamreth, M. Ajithkumar, V. Anandh, R. Nagaraj

Author: A. Kanagaraj

Paper ID: V5I2-1320

Paper Status: published

Published: March 16, 2019

Full Details
Others

Use of housing society

Over the last few years, we have observed a focus on engineering science has been established whose products are likely to create a large market in the near future. It has been known ''Housing Society". First, a user must be registered in the system so that his password can be identified. This impression is securely stored in a central database or a smart card given to the user. The impression is fetched when an individual needs to be verified. Depending on the information, a software system can operate either in a verification (authentication) or a recognition mode.

Published by: Sanket Vikas Sagare, Zishan Usman Baig, Niranjan Bapuso kadam, Faique Shaikh

Author: Sanket Vikas Sagare

Paper ID: V5I2-1252

Paper Status: published

Published: March 15, 2019

Full Details
Research Paper

An adaptive approach to prognosticate an individual’s capability for emolument through Machine Learning

One of the major integrant to be considered while granting a loan is the customer‟s ability to pay back the amount to the bank as per the bank's provided a schedule. Our work focuses on the analysis of all the attributes that might affect the customer‟s ability to pay the loan. It is basically a credit scoring mechanism used by the bank to make sure a customer's intentions to apply for a loan are legit using Ensemble Algorithms. Our work gives a probabilistic predictive model or a scorecard to estimate the probability of defaulters in the current global scenario. Our work is due diligence fulfilled by the investors involved with the bank. Our aim is to prognosticate correct credit worth which will cause a significant increment in the profits of commercial institutions.

Published by: Jujjuri Goutham, T. Anitha, S. Joshua Johnson, Routhu Dhanunjay, Vemuri Susmitha, Nagavarapu Sravani

Author: Jujjuri Goutham

Paper ID: V5I2-1309

Paper Status: published

Published: March 15, 2019

Full Details
Research Paper

IoT based accident detection and prevention system with android application

A system of accident detection and prevention powered by IoT((Internet of Things) The method helps in detecting and preventing vehicular accidents with immediate intimation and information like real-time tracking of the vehicle to closed ones, vehicular speed met. The device is connected over the cloud to use its basic functionalities of storage and perform historical analysis. Vital information’s that help over as an aid at the red-zone is passed over to the nearest police stations, hospitals, highway authorities, etc. Information is instantaneously notified and shared to the closed ones of the victim using the cloud services and mobile application at the time of the accident to avoid delay of information and aid and

Published by: Johnny Antony Puthur, Dr. S. Siamala Devi

Author: Johnny Antony Puthur

Paper ID: V5I2-1305

Paper Status: published

Published: March 15, 2019

Full Details
Review Paper

Share market analysis for share selection using data mining technique

The share market has been a field of vast interest both for those who wish to make money by trading shares in the share market. Generally, there is an opinion about share markets like high risk and high returns. Even though we have a huge number of potential investors, only very few of them are invested in the share market. The main purpose is they are not able to take risk of taking the skill of investors. Though get low returns they want to save their money. One important reason for this problem is that they don’t have proper guidance for making their portfolio. In this paper we focus the real-world problem; we had selected three indices such as SENSEX, NIFTY. The analysis is purely based on the data collected from the past three years. The Data mining technique, Time series interpretation is applied for the Data analysis to show the ups and downs of a particular index. The correlation and Beta are the tools which give the suggestion about the share and its risk. The correlation tool is used to identify the relationship between the index and the company individually. This Beta is used to identify the risk associated with the share.

Published by: Munaf Patel, Zahir Aalam

Author: Munaf Patel

Paper ID: V5I2-1300

Paper Status: published

Published: March 15, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X