(An ISO 9001:2008 Certified Online Journal) ISSN:2455-9660

Feedback
Home

Volume 03 Issue 05 (May-2018) | IJERAS

Title: Browser Security and Phishing Technique

Authors: Ms. Kshitija Harishchandra Dalvi, Dr. Praveen Gupta

For Abstract: Click Here
This paper, what are types of attack on web browser, and phishing technique, this is presented. The attack of web browsers is vulnerable; they performed of these attacks are due to vulnerabilities in the User Interface of the web page, Browser cache memory, extensions, plug-in etc. Today the web browsers given information and services on Internet are the most dominant platforms. For critical services are used most number of Internet, web browser is become for security attacks regarded with great favor and worthful aim. Nowadays or further attack will be on the computing environment like web browsers and on the PC operating system of the end user. These will be online and offline. There is variety of attacks; if online attacks, then it will be using user tracking of cookies. The important information’s are hijacked to social engineering in phishing technique. To make suspicious websites blacklist which is easiest way to prevent phishing; but nowadays lots of new phishing sites so they are out of favor. The phishing sites to protect users are available; in that web browser is security toolbar for implement. Nowadays, all progressive web browser has own connotative security toolbar. Phishing techniques of social engineering are used information of personal from users to steal information and money from their banking account. The criminal activities data are used like passwords or details of bank account. So this research paper reviews about phishing attack and browser security.

Page 1-8

Download

Title: Performance of Steel Frame by Pushover Analysis for Solid and Hollow Sections by Using Stad Programme

Authors: Akshitha G B ,Dr Sunilaa George

For Abstract: Click Here
There are different type of steel frames solid and hollow sections, here we are compairing the structural behavior of these sections.The research concentrates on a computer based push-over analysis technique for performance-based design of steel building frame works subjected to earthquake loading. Through the use of a plasticity-factor that measures the degree of plasticisation, the standard elastic and geometric stiffness matrices for frame elements (beams, columns, etc.) are progressively modified to account for nonlinear elastic–plastic behaviour under constant gravity loads and incrementally increasing lateral loads. This investigation aims to analyse the difference in structural behaviour between hollow and solid frames.

Page 12-18

Download

Title: Building Information Modelling (Bim) and Safety: Automatic Safety Checking of Construction Models and Schedules

Authors: Chitra PA, Dr.Sunilaa George

For Abstract: Click Here
Today’s buildings are getting larger and more complex. As a result, the traditional method of manually checking the design of a building is no longer efficient since such a process is time-consuming and laborious. Building Information Modelling (BIM) allows for rapid decision-making and evaluation. This research can be beneficial in promoting the efficient use of BIM-based communication and collaboration among the project party concerned for improving safety management. In addition, the work presented here has the potential to expand research efforts in BIM-based quality checking processes. Key words : Building Information Modelling (BIM), API (Application Programming Interface)

Page 19-21

Download

Title: Extinction of Bluetooth Technology in Wireless Devices

Authors: Ms.Amruta Hanumant Shinde , Prof.Pooja Mehta

For Abstract: Click Here
Bluetooth is old and might be on its way out. It’s been around since 1994 and is widely used in most of the remote gadgets. But will it be used forever or are its days numbered a Bluetooth ad hoc system can be shaped by interconnecting Pico nets into scatter nets. The constraints and properties of Bluetooth Scatternets present special challenges in forming an ad hoc network efficiently. This paper the research contributions in this arena are brought together to give an overview of the state-of-the-art. Bluetooth is used for communication in most of the wireless device. For example transferring files between two phones connecting a speaker with phone to play and control music wireless controllers used by playstation4 and other consoles wireless keyboard and mouse fitness devices such as heart rate monitors and many more. Recently many new technologies have arrived such as nfc or near field communication Wi-Fi direct etc. These technologies probably having advantages over Bluetooth have got us wondering if it is really the end of Bluetooth technology this research paper is discussion on the extinction of Bluetooth technology. Every new technology overtakes the current technologies drawbacks and add new view to the using the gadgets.

Page 22-24

Download

Title: Effect of the EEG Sensor Number on the Current-Source Decoder Performance based on a variational Bayesian method (VBMEG)

Authors: Alejandra Mejia Tobar, Yousuke Ogata, Kahori Kita, Tatsuhiro Nakamura, Hiroyuki Kambara, Takashi Hanakawa, Yasuharu Koike and Natsue Yoshimura

For Abstract: Click Here
Several studies have demonstrated the ability of electroencephalography (EEG) based brain-computer interfaces (BCI) in decoding motor tasks. In order to use these BCIs in out-of-laboratory environments, technical considerations must be taken into account. Among these considerations, the number of electrodes used plays an important role, as a few number of EEG electrodes will translate in a shorter setting up time for the future BCI . e c a f r e t n i e h t r o f g n i n u t r e t e m a r a p r e t s a f a d n a , r e s uT echniques for EEG feature extraction include one of the distributed current source estimation based on a variational Bayesian estimation method (VBMEG). The efficacy of VBMEG has been reported in studies about cognitive and motor decoding studies. In order to study the feasibility of implementing multi-class decoders based on VBMEG in BCIs developments, we evaluate the effect of the reducing numbers of EEG electrodes on the on accuracy of the multiclass classification of walking-related tasks.

Page 25-29

Download

Title: Computer Forensics -A Tool for Investigating Crime

Authors: Miss.Payal Krishna Varde , Prof.Kirti Kakde

For Abstract: Click Here
A Computer Forensics is a legal procedure of saving distinguishing extricating reporting and translating information on Computer. Computer crime scene investigation incorporate recuperation conservation lawful examination and introduction of the information such that it can be available as proof in court. the Computer criminology advanced in joined states 30 years back that is in mid-1980s. It is presently considered as expert field. There is absence of formal preparing and training for this field such a large number of the specialists are self-educated. The need is to expand the utilization of advanced information and instruments together to diminish the time taken amid examination.

Page 30-33

Download

Title: Spatial and Temporal Autocorrelations Based Dynamic State Context Hierarchical Trust model for WSN

Authors: Darsana D, Ashok kumar N, Eswaramoorthy V

For Abstract: Click Here
In this paper, intrusion detection based on Spatial and temporal autocorrelations with dynamic state context and hierarchical trust in WSNs (IDSHT) is proposed, which is flexible and suitable for constantly changing WSNs characterized by changes in the perceptual environment, transitions of states of nodes and variations in trust value. A multidimensional two-tier hierarchical trust mechanism in the level of sensor nodes (SNs) and cluster heads (CHs) considering interactive trust, honesty trust and content trust is put forward, which combines direct evaluation and feedback-based evaluation in the fixed hop range. This means that the trust of SNs is evaluated by CHs, and the trust of CHs is evaluated by neighbor CHs and BS; in this way, the complexity of evaluation is reduced without evaluations by all other CHs in networks. In the monitoring node introduced to observe the key parameters of the monitored nodes at the each group of clustering and calculates the deviations of these key parameters. According to the deviations of the parameters, the monitoring node can evaluate the trustworthiness toward the monitored node by aggregating the trust values at different layers and send it to the CH. The CH can then calculate the aggregated trust value of a node according to the trust values which are evaluated by multiple monitoring nodes. If the trust value of a node is less than a predefined threshold, the node is regarded as abnormal. Because the key parameters of monitored nodes are being monitored, it is effective for our scheme to detect different types of attacks.

Page 34-37

Download

Title: Neural Computing

Authors: Matthew N. O. Sadiku, Kelechi G. Eze, Sarhan M. Musa

For Abstract: Click Here
Neural computing is a research discipline based on the overlap of brain research and computation. It uses computational neural networks (also known as artificial neural networks or neural systems) to perform complex tasks. It is can carry out tasks conventional computers find very difficult. This paper provides a brief introduction to neural computing.

Page 38-39

Download

Title: Power Congestion Control in Transmission Network using UPFC

Authors: Y.Chaitanya, R.Sathish Kumar

For Abstract: Click Here
This paper presents the power flow control in transmission network using a new FACTS device, i.e., Unified Power Flow Controller (UPFC) to relieve power congestion on grid. This work presents the power flow control in transmission network using a new FACTS device, i.e., Unified Power Flow Controller (UPFC) to relieve power congestion on grid. A simple model of a three phase AC–network of 500/230kV grid of three transmission lines (T1,T2,T3) interconnected with 5 buses, two transformers (TF1,TF2) and two power plants generation (1000MW, 500MW) is designed. UPFC is designed with IGBT converters one connected in shunt other connected in series and both interconnected with DC bus on DC side and connected to AC side with coupling reactors and transformers. A contingency case is considered such that two transformers are considered instead of three transformers. The power flow of an UPFC installed at Bus-3 in 5-bus system is analyzed to show how the congestion of power on the grid is relieved through it. A bypass circuit breaker is installed at Bus -3 in the circuit to show the natural power flow without UPFC and power flow after installation of UPFC. The series converter build in UPFC can inject maximum of 10% of line-ground voltage in series. The simulation network of the 5-bus transmission network with UPFC connected at Bus-3 is designed with MATLAB/SIMULATION Software to estimate the power flow with and without UPFC connected.

Page 40-46

Download

Title: Differential Evolution Strategy Considering UPFC for Optimal Power Flow

Authors: B.Bhaskar Rao, P.Lakshmi Narayana

For Abstract: Click Here
This paper presents Optimal power flow control in transmission network using Differential Evolution Algorithm (DE) considering a new FACTS device, i.e., Unified Power Flow Controller (UPFC). A new differential evolutionary algorithm (DEA) is designed from genetic algorithm which is considered as global optimization method. Basic operations such mutation, crossover and selection process are considered in the optimization. A new FACTS device UPFC is considered in optimization problem to obtain optimal active and reactive power flows of the 5-bus and 30 bus networks. The constraints to minimize the total fuel cost of generation, total real power loss and also maintain an acceptable system performance in terms of limits on generator real power, bus voltages are considered. In this work, the proposed method (DEA) has been applied to solve the optimal power flow problems with and without installation of UPFC device on the standard IEEE 5-bus system and 30-bus system. Differential evolution strategy is used to optimize the parameters like bus voltages, angles, generation cost and the reactance values of UPFC. The proposed strategy which is best suited for solving optimization problems, has been implemented on IEEE 5-bus and 30-bus system and it shows better results when compared with other methods. electronic document is a “live” template. The various components of your paper [title, text, heads, etc.] are already defined on the style sheet, as illustrated by the portions given in this document. (Abstract)

Page 47-52

Download

Title: Experimental Investigation on Low Cost Concrete With Paper Industry Waste and Lathe Waste

Authors: Ansumol,M.Rajalingam,Dr.Sunilaa George

For Abstract: Click Here
The rapid increase in construction activities leads to active shortage of conventional construction materials. In the world of concrete many artificial pozzolanas are found by research other than this the recent studies haveshown that the waste from paper industries has pozzolanic property termed as hypo sludge. Hypo sludge behaves like cement because of silica and magnesium properties. This propertyimproves the setting of concrete. By utilizing hypo sludge, the strength will be increased and also cost reduction in the concrete is achieved. The present dissertation work is directed towards developing low cost concrete incorporating hypo sludge. This study is carried out with M35 grade concrete as a control specimen and hypo sludge is replaced in different percentages such as 10%, 20%, 30%, 40%, 50%, 60% and 70% by weight of cement and addition of Lathe Machines waste material as fibers ata dosageof 1.5 %by weight ofcement. Mechanical properties like compressive strength, split tensile strength and flexural strength are determined for 7,14 and 28 days curing and compared with conventional concrete.

Page 9-11

Download