VOLUME 7, ISSUE 9, SEPTEMBER 2018
A Review on Various Plagiarism Detection Systems Based on Exterior and Interior Method
Nosheena Khan*, Chetan Agrawal*, Tehreem Nishat Ansari
Implementing Automated Power Outlet Distribution Control System using Electronic Wastes
Dr. Akinola. S. Olayinka, Dr. Wilson Nwankwo, Tosin. C. Olayinka, M.O. Osiele
A Novel Technique for Analysing Performance using Conceded Cluster Heads in VANETs
Deepika Kumari, Harmanpreet kaur
A Review on Machine Learning and Artificial Intelligence in Management of Storage
Swapnali Rajaram Pawar
Internet of Things (IoT): Interconnected Network of Sensors Measuring Physiological Parameters
Anil Umesh
Arduino Based Forward Collision Detection Warning System
Orji E.Z, Oleka C.V, and Nduanya U.I
Misuse and Anomaly Based Combined Hybrid Approaches for Intrusion Detection: A Survey
B.Sujata, M.Priyanka, M. Beulah Rani
Analysis of Security Algorithms for Data Sharing in Cloud Computing
K. Lakshmi Sirisha, Sk. Mahboob Basha
RSS Blowfish Block Encryption Technique for Secure Image Cryptography
Amandeep Kaur, Gurjeet Singh
Data Analytics: Employee Turnover in a Company-1
Mahesh VR, Shivachetan Ulavi
Design an Information Management System for a Gas Station
Hewa Majeed Zangana
Doctor’s Cloud
Prof. Chandrapal Chauhan, Roheet Kantode, Rajat Wanode, Pranay Dhopte, Gaurav Dhawane
Abstract
Performance Analysis of the Optimized Link State Routing Protocol with Link-Layer Feedback for Mobile Ad hoc Networks
Phu Hung Le
DOI: 10.17148/IJARCCE.2018.791
Abstract:
In Mobile Ad hoc Network (MANET), routing is one of the important problems in research. Routing influence significantly the network performance. In this paper, we analyze performance of the Optimized Link State Routing Protocol with Link-layer Feedback (OLSR-FB) that is an improved protocol of OLSR protocol by comparing to the famous protocol DSR in terms of Packet Delivery Fraction, Delay, Routing overhead and Normalize Routing Load. Simulation results show that the OLSR-FB’ packet delivery fraction outperforms that of the DSR in some cases. Our results also show that OLSR-FB‘ Delay, Routing overhead and Normalize Routing Load are less than the corresponding results from the DSR.Keywords:
Mobile Ad hoc Networks; Routing Protocol; OLSR; DSRAbstract
A Review on Various Plagiarism Detection Systems Based on Exterior and Interior Method
Nosheena Khan*, Chetan Agrawal*, Tehreem Nishat Ansari
DOI: 10.17148/IJARCCE.2018.792
Abstract:
Plagiarism is an intellectual theft. It means representation of author’s output as self - contribution without mentioning reference or attribution. Plagiarism is considered as a fraudulent act which simply means forgery of someone’s fresh content by not paying any tribute. It is proliferated due to increasing access to multiple resources and simply using copy paste method. With the immense growth of internet resources new technologies and original ideas or innovative thoughts are available effortlessly due to which protection over such intellectual property is challenging, but important. Therefore, in this paper we delineate about plagiarism and then classification of plagiarism. We also discuss two main approaches- Exterior and Interior methods for plagiarism detection with their characteristics methods based on their grammar styles, lexical, syntax or Stylometric features. Further, literature analysis of various algorithms is described to find out their issues and challenges improvised scope of work in future.Keywords:
Plagiarism, Classification of Plagiarism, Textual Plagiarism Detection, External Plagiarism detection, Internal Plagiarism detectionAbstract
Implementing Automated Power Outlet Distribution Control System using Electronic Wastes
Dr. Akinola. S. Olayinka, Dr. Wilson Nwankwo, Tosin. C. Olayinka, M.O. Osiele
DOI: 10.17148/IJARCCE.2018.793
Abstract:
Keywords:
Abstract
A Novel Technique for Analysing Performance using Conceded Cluster Heads in VANETs
Deepika Kumari, Harmanpreet kaur
DOI: 10.17148/IJARCCE.2018.794
Abstract:
Keywords:
Abstract
A Review on Machine Learning and Artificial Intelligence in Management of Storage
Swapnali Rajaram Pawar
DOI: 10.17148/IJARCCE.2018.795
Abstract:
Keywords:
Abstract
Internet of Things (IoT): Interconnected Network of Sensors Measuring Physiological Parameters
Anil Umesh
DOI: 10.17148/IJARCCE.2018.796
Abstract:
Internet of things (IOT) is a network or an ecosystem of interconnected items embedded with electronics, software and sensors connected with the internet based on stipulated protocols. One of the defining feature of IoT in the present day is that they are no longer exclusively tied to major providers. Smaller networks can exist if they are practical. IoT creates these small networks between its system devices. Devices have become smaller, cheaper and robust overtime. Medical sensors measuring various physiological parameters of the body holds greater advantage in exploiting the concept and working of IoT. In this paper we employ body temperature sensor, pulse sensor, ECG and GPS to track the location of patient. The values of the above sensors are uploaded to the cloud via Wi-Fi module. A graph of these values is plotted and analysed using IoT forum called ‘thingspeak.com’ providing dedicated channels to each user logging in with a unique user-ID and Password. Data can be any time exported into CSV, XML and JSON format.Keywords:
Internet of things (IOT), body temperature sensor, pulse sensor, ECG, GPS, CSV, XML and JSON format.Abstract
Arduino Based Forward Collision Detection Warning System
Orji E.Z, Oleka C.V, and Nduanya U.I
DOI: 10.17148/IJARCCE.2018.797
Abstract:
Keywords:
Abstract
Misuse and Anomaly Based Combined Hybrid Approaches for Intrusion Detection: A Survey
B.Sujata, M.Priyanka, M. Beulah Rani
DOI: 10.17148/IJARCCE.2018.798
Abstract:
Intrusion Detection Systems (IDS) can be defined with various detection techniques. Misuse based and anomaly based detection techniques are some of the techniques used for identifying the known and unknown attacks. This paper shows a survey on both misuse and anomaly based detection techniques for IDS where it is observed that these two techniques when applied at a time gives better results than when applied individually on a particular dataset and it has been depicted in this paper by considering a case study where decision support system and expert rule based approach are applied on KDD 99 dataset for observing both normal and abnormal behaviour of the data.Keywords:
Intrusion Detection Systems, Misuse based systems, Anomaly based systemsAbstract
Analysis of Security Algorithms for Data Sharing in Cloud Computing
K. Lakshmi Sirisha, Sk. Mahboob Basha
DOI: 10.17148/IJARCCE.2018.799
Abstract:
Cloud computing is the fastest growing technology. This technology has changed the face of traditional computing technologies and offers many benefits to the field of IT enterprises, even though it has to overcome many challenges to satisfy its maturity level. Cloud computing provides a adaptable, flexible and convenient way for sharing the data that brings plethora of benefits for both the industry and community. But often there is a natural resistance for individual users/industry to directly outsource the data to be shared on to the cloud server as the data often might contain sensitive information. Encryption is the one of the most secured way to prevent unauthorized access. This paper discusses the major security challenges of cloud computing and also highlights the importance of various cryptographic encryption algorithms as it is the major solution that can be considered for the security challenge. Due to increasing demand for more clouds and data are stored in an open environment several security issues like confidentiality, integrity and authentication may arise. This paper discusses various algorithms that ensure security in the cloud environment.Keywords:
Encryption, confidentiality, computing, integrity and authenticationAbstract
Image Steganography Techniques – A Review Paper
Mohammed A. Saleh
DOI: 10.17148/IJARCCE.2018.7910
Abstract:
Nowadays, computer-based communications are at the threshold of making life easier for everyone in the world; from sharing information, to communicating with each other, to exchanging electronic documents, and to checking bank balances and paying bills. Nonetheless, information security is an essential factor, which must be taken into consideration to ensure secure communications. There are significant interests in security approaches that aim to protect information and digital data, since the growing increase in uses of the internet and multimedia, have raised the interests in image steganography in order to secure and protect them. In this paper, a detailed literature review on a variety of different methods, algorithms, and schemes in image steganography is conducted in order to analyse and investigate them. In addition, this research summarized a comparative literature review for these researches and presented into a table, which involves a research name, broad domain, research methodology, advantages, disadvantages, and the evaluation method.Keywords:
Image Steganography, Data Hiding, Image Steganography Techniques, Data Embedding and ExtractingAbstract
RSS Blowfish Block Encryption Technique for Secure Image Cryptography
Amandeep Kaur, Gurjeet Singh
DOI: 10.17148/IJARCCE.2018.7911
Abstract:
Keywords: Cryptography, RSA, RSS Blowfish
Abstract
Realization of Virtual-Link on a Network
Anil Umesh
DOI: 10.17148/IJARCCE.2018.7912
Abstract:
Keywords:
Abstract
Data Analytics: Employee Turnover in a Company-1
Mahesh VR, Shivachetan Ulavi
DOI: 10.17148/IJARCCE.2018.7913
Abstract:
Keywords:
Abstract
Design an Information Management System for a Gas Station
Hewa Majeed Zangana
DOI: 10.17148/IJARCCE.2018.7914
Abstract:
Keywords:
Abstract
Doctor’s Cloud
Prof. Chandrapal Chauhan, Roheet Kantode, Rajat Wanode, Pranay Dhopte, Gaurav Dhawane
DOI: 10.17148/IJARCCE.2018.7915
Abstract:
Keywords:
