Manuscripts

Recent Papers

Research Paper

A survey on security issues in online social networks

This paper surveys this state of security problems and offered defense mechanisms relating to well-liked on-line social networks. It covers a large variety of attacks and also the corresponding defense mechanisms if offered. The authors organize these attacks into four classes - privacy breaches, viral selling, network structural attacks, and malware attacks - and focus primarily on privacy considerations. they provide associate degree in-depth discussion of every category and analyze the connections among the various security problems involved.

Published by: Satish Kumar Ray

Author: Satish Kumar Ray

Paper ID: V4I6-1424

Paper Status: published

Published: December 27, 2018

Full Details
Research Paper

Effect of uphill training on selected physical and physiological variables among long distance runners

The main purpose of this study is to find out the effect of uphill training on selected physical and physiological variables among long-distance runner. For the present study, the researcher takes the male long distance runners from Pudukkottai District taken as sources of data. Thirty male long distance runners, who had participated in intercollegiate tournaments, were preferred as an area under discussion for this study. The age of the subject matter was ranging from 18 years to 25 years. The criterion measures adopted for the study measuring the physical and physiological variables are given below. To measure the physical variables 600 m run for speed endurance, 12 minutes run and walk for cardiorespiratory endurance, pulse count for resting pulse rate and Harvard step test for vo₂ max the effect of uphill training on selected physical variables and physiological variables among long-distance runners the independent “t” test was used at 0.05 level of significance. Result: There was a significant difference in experimental groups in speed endurance, Cardiorespiratory endurance, resting pulse rate and vo₂ max.

Published by: R. Panneer Selvam, M. Sundar

Author: R. Panneer Selvam

Paper ID: V4I6-1411

Paper Status: published

Published: December 27, 2018

Full Details
Research Paper

A survey on cyber security and privacy concerns in smart grids

A smart grid could be a promising power delivery infrastructure integrated with communication and knowledge technologies. Its bi-directional communication and electricity flow enable each utility and customers to observe, predict, and manage energy usage. It additionally advances energy and environmental sustainability through the mixing of Brobdingnagian distributed energy resources. Deploying such an inexperienced electrical system has huge and extensive economic and social edges. still, increased interconnection and integration additionally introduce cyber vulnerabilities into the grid. Failure to handle these issues will hinder the modernization of the prevailing grid. In order to create a reliable sensible grid, a summary of relevant cybersecurity and privacy problems is given. supported current literature, many potential analysis fields are mentioned at the end of this paper.

Published by: Satish Kumar Ray

Author: Satish Kumar Ray

Paper ID: V4I6-1423

Paper Status: published

Published: December 27, 2018

Full Details
Research Paper

An efficient biometric fusion using iris and fingerprint in digital image processing

The Biometric systems are the skill for legalization or arrangement of various individuals using person’s physical and behavioral personalities. Though these schemes are more sheltered compared to the conservative processes like key authentications, password, they also experience many limitations like noise in the data, intra-class difference and spoof occurrences. One of the explanations to these glitches is to deal multi-biometric schemes also in these type of systems various foundations of biometric data are used. This paper deals with the fusion approach using extraction of feature vector for biometric traits of human in terms of iris and fingerprints and the performance is evaluated in terms of high recognition rates. The proposed system shows the robustness in the recognitions of the unique individuals using their iris and fingerprints fusion process.

Published by: Sarbjit Kaur, Harjinder Kaur

Author: Sarbjit Kaur

Paper ID: V4I6-1425

Paper Status: published

Published: December 27, 2018

Full Details
Research Paper

A survey on anti-phishing browser plug-ins

Phishing is an internet fraud that aims to steal sensitive information like usernames, passwords, and credit card numbers. Though phishing may be a straightforward social engineering attack, it's proved to be amazingly effective. Hence, the amount of phishing scams is continuing to grow, and also the prices of the ensuing damages is increasing. Researchers moreover because the IT trade has known the imperative want for anti-phishing solutions and recently, a number of solutions to mitigate phishing attacks are proposed. many of those approaches square measure browser plugins. In 2005, we tend to enforce a Firefox anti-phishing browser plug-in referred to as AntiPhish. when cathartic AntiPhish, we determined to port it to the Microsoft web adventurer (IE) browser. Supporting i.e. was vital as a result of a majority of web users area unit accessing the net with this browser. Our initial expectation at the start of the project was that porting a browser plug-in that's written for Firefox to i.e. couldn't be too difficult; in spite of everything, browser plug-ins area unit conceptually similar. However, creating an associate degree-phishing browser plug-in for the i.e. tested to be much more difficult than expected. during this paper, we report on our expertise in implementing anti-phishing (i.e., security) browser plug-ins and summarize 5 lessons we tend to learn from our endeavor.

Published by: Satish Kumar Ray

Author: Satish Kumar Ray

Paper ID: V4I6-1422

Paper Status: published

Published: December 27, 2018

Full Details
Review Paper

Overview of recent research and development to make E2O as advance system of mobility

After the e2o electric car, Mahindra has launched e2o plus in a year. The all new Mahindra e2o in a rare car that have highly advanced technologies and goodness which keep you and your planet in mind there are so many causes to call it smart generation they are:- Zero emission, easy charging, Smartphone connectivity, Remote Diagnostics, Direct Drive transmission, Regenerative breaking, Revive, Small turning radius, Highly advanced and internationally designed lithium-ion battery hiss assist feature and its beats all transport system in running cast. This paper will make an overview of recent research and development to make e2o as future advanced of mobility

Published by: Ravi Ranjan, Pramod Chaudhary, Himanshu Raj, Jaiprakash Pingua, Pratap Ranjan, Dixit Suthar

Author: Ravi Ranjan

Paper ID: V4I6-1418

Paper Status: published

Published: December 27, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X