Paper Type :: Research Paper
Title :: A Study about Security Essentials on Biometrics Authentication and Identification
Country :: India
Authors :: Dr.M.Felix Xavier Muthu || Mrs.M.Angelin Rosy
Page No. :: 01-05

Over the last few years a new area of engineering science It has been called ''biometrics" to create a large market in the near future. The pioneers of this new domain intend to construct devices which would allows the identification of a person on the basis of their ''biological'' characteristics like voice, dynamics of movements, features of face recognition and other parts of the body, eye retina or iris pattern. Nature has been made the human beings with different kinds of characteristics which may vary from one person to another person. This is made of using Biometric technology to distinctly identifying each person. Biometric system is essentially a pattern recognition system which recognizes a user by determining the authenticity of a specific physiological or behavioral characteristic possessed by the users...........

Keyword : Biometrics, identity, characteristics, security, secret

[1]. Ms. Shraddha S. Giradkar, Dr.N.K.Choudhari, A survey paper on Various biometric security system methods, International Research Journal of Engineering and Technology, Volume: 03, Issue: 02 | Feb 2016 (IRJET), e ISSN: 2395 0056
[2]. Esther Rani.D , Dr. J. John Raybin Jose, fingerprint based biometric authentication, International Journal of Computer Science and Mobile Computing, Vol.5 Issue.9, September-2016, pg. 6-15, ISSN 2320 – 088X


Paper Type :: Research Paper
Title :: An Expository Investigation on Cloud Computing
Country :: India
Authors :: J.Punitha || Mrs.M.Dukitha || M.Leka
Page No. :: 06-09

Cloud computing is the use of various services, such as software development platforms, servers, storage spaces and software's, over the internet, and also sharing the resources, hardware's through the virtualization concepts. In this paper we discussed about the types, characteristics and services of the cloud computing. The three types of cloud is briefly explained and the services of the cloud is highlighted with an examples and also discuss about difference between the private cloud, public cloud and hybrid cloud with an illustrations.

Keywords:Types of cloud, IaaS (Infrastructure as a Service), PaaS (Platform as a Service), SaaS (Software as a Service)

[1]. Cloud Computing: Overview & Current Research Challenges Mohsin Nazir Department of Information Technology, Central University of Kashmir, India.
[2]. Cloud Computing : Research Issues and Implications Article (PDF Available)· May 2013 with 1,638 Reads DOI: 10.11591/closer.v2i2.1963
[3]. Survey Paper on Cloud Computing
[4]. Article (PDF Available) · April 2014 with 13,656 Palvinder Singh
[5]. Next generation cloud computing: New trends and research directions Blesson Varghese a, *, Rajkumar Buyya b a School of Electronics, Electrical Engineering and Computer Science, Queen's University Belfast, UK b Cloud Computing and Distributed Systems (CLOUDS) Laboratory, School of Computing and Information Systems, The University of Melbourne, Australia


Paper Type :: Research Paper
Title :: Architecture and Applications of Wireless Body Area Network
Country :: India
Authors :: K.Priya || S.H.Taqhiyatunnisa || S.Safreen Nisha
Page No. :: 10-13

Over the course of years a booming Internet is comprehended in the field of wireless communication for the evolution of a monitoring system to notice the human vital organs activities remotely. Wireless Body Area Network (WBAN) can be wearable or implantable in the human body. Due to its applications in the field of health, medical, entertainment services and many more, WBAN have received great attention. In this paper a concise survey consisting of the existing approaches of WBAN and its challenges has been discussed. Its abundance applications in the field of medical and non-medical sectors have been outlined. And finally this paper describes the future scope for further research in the field.

Keywords: Wireless Body Area Network, Auto medication, easily accessible, affordable.

[1]. J.K.Madsen, H. Karstoft, F.O.Hansen, and T.S. Toftegaard, "ASE-BAN- a Wireless Body Area Network Testbed," Proceedings EMERGING 2010, Florence, Italy, 2010, pp.1-4.
[2]. A. Natarajan, et al., "Link Layer Behavior of Body Area Networks at 2.4 GHz," in the 15 th Annual International Conference on Mobile Computing and Networking (MobiCom '09), Beijing, China, 2009, pp. 241-252.
[3]. Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., & Leung, V. C. (2011). Body area networks: A survey. Mobile Networks and Applications, 16(2), 171-193.
[4]. K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad hoc networks, vol.3, no. 3, pp.325- 349, 2005.
[5]. Wearable Sensors for Remote Healthcare Monitoring System Narendra Kumar, Alok Aggrawal and Nidhi Gupta C.M.J. University, Shillong JIIT, NOID A2


Paper Type :: Research Paper
Title :: Big Data -the Next Frontier for Innovation, Competition and Productivity
Country :: India
Authors :: Ms.S.Rekha || Ms.N.Prameela || Dr.M.Inbavalli
Page No. :: 14-19

Collection is realization a tipping point for main technical changes that can fetch new ways in decision making, managing our health, cities, finance and education. whilst the data complexities are increasing counting data's volume, variety, velocity and veracity, the real impact pivots on our ability to uncover the `value' in the data through Big Data Analytics technologies. Big Data Analytics pose a impressive challenge on Big data is a new driver of the world economic and public changes. The world's data the design of highly scalable algorithms and systems to integrate the data and uncover large hidden values from datasets that are diverse, complex, and of a massive scale............

Keywords: Big data, volume, velocity, veracity, analytics, technologies, application, educations.

[1]. Kaisler, S., Armour, F., Espinosa, J.A., Money, W.: Big data: Issues and challenges moving forward. In: System Sciences (HICSS), 2013 46th Hawaii International Conference on. pp. 995-1004. IEEE (2013).
[2]. Katal, A., Wazid, M., Goudar, R.: Big data: Issues, challenges, tools and good practices. In: Contemporary Computing (IC3), 2013 Sixth International Conference on. pp. 404-409. IEEE (2013).
[3]. Jabin, S., & Zareen, F. J. Biometric Signature Verification. International Journal of Biometrics, 7(2), 97-118 (2015).
[4]. Fan, J., Han, F., Liu, H.: Challenges of big data analysis. National science review 1(2), 293-314 (2014).
[5]. Beyer, M.A., Laney, D.: The importance of big data: A definition. gartner (2012).


Paper Type :: Research Paper
Title :: Emerging Technologies in Library and Information Centres
Country :: India
Authors :: Dr. Aariefa Basheer
Page No. :: 20-26

In the digitalized world, library and information centre's are attaining more number of web Tools(Electronic Resources) because of its perceived benefits, such as easy access to information and its comprehensiveness. This paper highlights the Web Technology /Digital Technology/ Web oriented resources availability, offers its features for teaching, learning and research. It also provides different types of electronic resources, accessing methodology and application in library and information centre's and also highlights the SWAYAM, NPTEL(National Programme on Technology Enhanced Learning), CEC(Consortium for Educational Communication), DELNET, INFLIBNET and open access electronic tools for higher education and research. The main objective of the paper is to expose the availability of different kinds of web tools, open access technology and how to utilize in library and information centres and also to create awareness among the students, research scholars and faculty.

Keywords : Higher Education, Web Tools, Electronic Resources, Swayam, NPTEL, INFLIBNET and DELNET

[1]. Christopher Edwards (2001). Global knowledge: a challenge for librarians'', IFLA Journal:vol.27,no.2,2001,pp.65-69.
[2]. Kaul, H.K (2002) Knowledge Centres : The key to self employment and poverty alleviation'' Delnet newspaper , vol.9, no.2, December 2002, pp17-18.
[3]. Yapa , N.U. (2003). Utilization of ICT for LIS with special reference to Sri Lanka. Papers presented at the first international CALIBER-2003, Ahmedabad, India, 13-15 February(2003).
[4]. Keller,A.(2015). Research Support in Australian University Libraries: An Outsider View. Australian Academic & Research Libraries, 46(2),73-85.
[5]. Jeyapragash,B., (2015). Reference Management Tools for Effective Research: with special reference to MENDLEY, International Journal of Science and Humanities, 1(1A), 387-396.


Paper Type :: Research Paper
Title :: A review on Security Issues in image Steganography
Country :: India
Authors :: A.Aarthi Devi
Page No. :: 27-28

Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into cipher text using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image............

Keywords: - Cryptography, image steganography, image stitching.

[1]. "Automatic Panoramic Image Stitching using Invariant Features", Matthew Brown and David G.Lowe of Computer Science, University of British Columbia, Vancouver, Canada.
[2]. "High payload using mixed codebooks of Vector Quantization", H. B. Kekre, Tanuja K. Sarode,ArchanaAthawale, KalpanaSagvekar
[3]. "H.B.Kekre,ArchanaAthawale and Pallavi N.Halarnkar,"Performance Evaluation of Pixel Value Differencing and Kekre's Modified Algorithm for Image Hiding in Images",ACM International Conference on Advances in Computing,Communication and Control(ICAC3)2009.


Paper Type :: Research Paper
Title :: Self-Destructing Scheme in Cloud Computing for Data Security
Country :: India
Authors :: A. Sriranjani
Page No. :: 29-31

Cloud computing have been playing very vital role in the rapidly growing organizations. It becomes mostly susceptible to use cloud services to share data between organizations, electronic businesses and a friend circle in the cloud computing environment. Because of the fastest development in electronic business by using the various cloud services, it is very difficult to provide full lifecycle privacy security and access control becomes a very tedious task, specifically when sharing the sensitive data on cloud servers for achieving the anytime, anywhere service for authentic person or organization. Also for sharing purpose we need efficient method and secure technique over cloud services...........

Keywords - Sensitive Data, Cloud Computing, privacy-preserving, fine-grained access control.

[1]. Jinbo Xiong, Ximeng Liu, Zhiqiang Yao, Jianfeng Ma, Qi Li, Kui Geng, and Patrick S. Chen (2014), A Secure Data SelfDestructing Scheme in Cloud Computing, IEEE Transaction on Cloud computing, 2(4) pp. 448-458.
[2]. Wang, B. Li, and H. Li, (2014), Oruta: Privacy-preserving public auditing for shared data in the cloud, IEEE Transactions on Cloud Computing , 2(1), pp 43-56.
[3]. J. Xiong, Z. Yao, J. Ma, X. Liu, Q. Li, and J. Ma (2014 Priam: Privacy preserving identity and access management scheme in cloud, KSII Trans. Internet Inf. Syst., 08(01), pp 282-304
[4]. P. Jamshidi, A. Ahmad, and C. Pahl (2013), Cloud migration research: A systematic review, IEEE Trans. Cloud Comput. 01(02), pp 142-157.


Paper Type :: Research Paper
Title :: Feasibility approach on Web Services and Security
Country :: India
Authors :: K. Priya || S.Yamuna Devi
Page No. :: 32-34

The vision of a landscape of heterogeneous web services deployed as encapsulated business software assets in the Internet is currently becoming a reality as part of the Semantic Web. When pro-active agents handle the context-aware discovery, acquisition, composition, management of applications services and data, ensuring the security if customers data become a principle task. In this paper we propose neoteric way web services and security. A methodology based on type-based Information flow to control the security of dynamically computed data and their proliferation to other web services. The business and security concern of integrated web services are separated and building them independently. Runtime modification of integrated web services. Providing compartmentalization so that one service can not affect another. We are developing flight system to demonstrate the feasibility of our approach.

Keywords - Web services, security, flight system, internet.

[1]. Benslimane, D.; Dustdar, S.; Sheth, A. (2008). "Services Mashups: The New Generation of Web Applications".
[2]. IEEE Internet Computing 10 (5): 13–15.doi:10.1109/MIC.2008.110 Maler, Eve.
[3]. "Minutes of 9 January 2001 Security Services TC telecon". Security-services at oasis-open mailing list. Retrieved 7 April 2011.
[4]. Bob Atkinson, et. al.: Web Services Security (WS-Security) http://www.oasis-open.org/committees/tc home.php?wg abbrev=wss.


Paper Type :: Research Paper
Title :: Analysis and Impact of WhatsApp Messenger usage among students
Country :: India
Authors :: K. Priya || Kathikar Sumaiya Tahseen || Naziya Banu.V
Page No. :: 35-37

This paper explains about the usage level of WhatsApp. Now-a-days WhatsApp is popular mobile application for smart phone and android mobiles.It use the internet to communicate hypermedia messages between the user and group. The WhatsApp effect is increase on our lives, culture and society. WhatsApp is also used for marketing in business and publicity in politics. WhatsApp user and even we believe that WhatsApp has improved their relationship with friends and user thinks that it is not harmful to them. There is a possibility of using WhatsApp in education, social services and governance. WhatsApp was started to interchange SMS with a cross platform feature. WhatsApp uses mobile network or local area network to send and receive messages. WhatsApp regular updates have been improving its functionality since its release date.

Keywords- WhatsApp, marketing, education

[1]. Available from: https://www.theguardian.com/technology/short-cut/2012/WhatApp-new-text-messaging
[2]. https://www.imore.com/WhatsApp
[3]. https://www.slideshare.net/prakashBambhaniya/research-proposal-the-impact-of-WhatsApp-on-youth-in-bhabnagar-city
[4]. www.academia.edu/28203254/WhtasApp_Research_paper.pdf
[5]. https://expandedramblings.com/index.php/WhatsApp-statics/4/


Paper Type :: Research Paper
Title :: A Review: WI-VI Technology and Its Application in Cell Phones
Country :: India
Authors :: K. Priya || V.Safa Mehrin || S.Humera Tahseen
Page No. :: 38-41

The wireless vision act as real time executor for all the fantacies of comics, sci-fi-movies etc..Wi-vi is believed to be a connecting technology that serve as a communication medium between itself and human behind a wall. Wi-fi is cheapest technology which is going to be one of the features of every smart electronic gadgets in future. Wi-vi allows to communicate by combination of gestures and messaging through the help of wi-fi signals. WI-FI signals enable human to interact with web remotely. They have feasibility to carry an information from the transmitter to receiver. This feature of wi-fi acts as a key aspect for wi-vi. This paper investigates the capability of utilizing Wi Fi signals for detecting movement of people behind the walls and doors by introducing a new technique called Wi-vi (wireless vision). This paper will also focus on having Wi-vi technology build in cellphones to give more power to human, thereby reducing the cost of individual Wi-vi system and devices.

[1]. How Signal is affected. www.ci.cumberland.md.us/. City of Cumberland Report
[2]. G. Char vat, L. Keppel, E. Roth well, C. Coleman, and E. Mohole. A through-dielectric radar imaging system IEEE Trans. Antennas and Propagation, 2010
[3]. G. Char vat, L. Keppel, E. Rothwell C. Coleman, and E. Mohole. An ultra wideband (UWB) switched-antenna-array radar imaging system In IEEE ARRAY, 2010
[4]. K. Chatty, G. Smith, and K. Woodbridge Through-the-wall sensing of personnel using passive bi static Wifi radar at standoff distances. IEEE Trans. Geosciences and Remote Sensing, 2012
[5]. J. Choi , M. Jain, K. Sri Nivasan, P. Levis, and S. Katti . Achieving single channel, full duplex wireless communication,. In ACM MobiCom, 2010.


Paper Type :: Research Paper
Title :: Emerging Future Technologies of Ai in Current World
Country :: India
Authors :: P.Koikla || R.Deepa || Dr. M.Inbavalli
Page No. :: 42-46

This paper express about the future innovative technologies of AI with real time example of AI robot- Sophia. Some of the technology of AI is examined in day-to-day aspect. AI robotic plays an extra ordinary role and interacts with the peoples. Future view of AI also discussed AI system have involved in regular use economic, medical, engineering and the military , video games and so on.

Keywords - Artificial Intelligence, Medical, Humanoid, robot, Cameras.

[1]. W. Afzal and R. Torkar. 2008. A comparative evaluation of using genetic programming for predicting fault count data. In 3rd International Conference on Software Engineering Advances. IEEE, NJ, USA, 407–414. https://doi.org/10.1109/ICSEA. 2008.9
[2]. W. Afzal and R. Torkar. 2008. A comparative evaluation of using genetic programming for predicting fault count data. In 3rd International Conference on Software Engineering Advances. IEEE Press, NJ, USA, 407–414. https://doi.org/10.1109/ ICSEA.2008.9
[3]. S. Akbarinasaji, A. B. Bener, and A. Erdem. 2016. Measuring the principal of defect debt. In 5th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE '16). ACM, NY, USA, 1–7. https://doi.org/10.1145/ 2896995.2896999
[4]. A. Barr and E. A. Feigenbaum. 1981. The handbook of artificial intelligence. HeirisTech Press, CA, USA.
[5]. D. Barstow. 1987. Artificial intelligence and software engineering. In 9th International Conference on Software Engineering (ICSE '87). IEEE Computer Society Press, CA, USA, 200–211.


Paper Type :: Research Paper
Title :: A Review on Enterprise resource planning System
Country :: India
Authors :: V. Anitha
Page No. :: 47-49

Enterprise resource planning (ERP) system solutions are currently in high demand by both manufacturing and service organisations because they provide a tightly integrated solution to an organisation's information system needs. During the last decade, ERP systems have received a significant amount of attention from researchers and practitioners from a variety of functional disciplines. In this paper, a comprehensive review of the research literature (1990-2003) concerning ERP systems is presented. The literature is further classified and the major outcomes of each study are addressed and analysed. Following a comprehensive review of the literature,proposals for future research are formulated to identify topics where fruitful opportunities exist.

[1]. Adam, F. and O'Doherty, P. (2000), "Lessons from enterprise resource-planning implementations in Ireland: towards smaller and shorter ERP projects", Journal of Information Technology, Vol. 15, pp. 305-16.
[2]. Aderet, A. (2002), "A new approach to ERP customization", available at: www.erpfans.com/erpfans/eshbel.htm
[3]. Al-Mashari, M. and Zairi, M. (2000a), "Supply-chain re-engineering using enterprise-resource planning (ERP) systems: an analysis of a SAP R/3 implementation case", International Journal of Physical Distribution & Logistics Management, Vol. 30 No. 3/4, pp. 296-313.


Paper Type :: Research Paper
Title :: Future Supervision on Augmented Reality
Country :: India
Authors :: Mrs.M.Angelin Rosy || Ms.S.Nivetha || Ms.K.Sangeetha
Page No. :: 50-54

This paper express about the augmented reality involved in the fields and its applications they are – 3d-viewer, browser, games, AR-tools, navigation, advertising, medicine and finally major role in educational port. Some of the challenged in augmented reality are discussed in day-to-day life. Future view and growth of the augmented reality will be discussed.

Keywords: Augmented Reality, AR tools, Navigation, Browser, Games, Applications

[1]. https://studymafia.org/augmented-reality-seminar-and-ppt-with-pdf-report
[2]. https://www.emergingedtech.com/2018/08/multiple-uses-of-augmented-reality-in-education
[3]. https://www.3pillarglobal.com/insights/augmented-reality-introduction-and-its-real-world-uses
[4]. https://www.google.com/search?biw=1366&bih=654&tbm=isch&sa=1&ei=nrkcXKXEFJj49QOemZSwCA&q=market+growth++o f+virtual+reality+upto+2018&oq=market+growth++of+virtual+reality+upto+2018&gs_l=img.3...7257.16123..16426...4.0..0.321.35 88.0j12j4j2......1....1..gws-wiz-img.......0i8i30.K6-IHT2tU-w
[5]. https://mobidev.biz/blog/augmented-reality-future-trends-2018-2020


Paper Type :: Research Paper
Title :: A Review on Security and Privacy in Manet
Country :: India
Authors :: K.Priya || M.Keerthiga || G.Ragapriya || N.soundarya
Page No. :: 55-57

A Mobile Ad hoc Network (MANET) as a network that has many unrestricted or autonomous nodes, often composed of mobile devices or other mobile that can position themselves in various ways. And it is using as network simulation. That can variation locality and constitute itself on the wing because MANET or mobile communication it can be used as wireless connection to connect various network. Some MANET are regulated to local area of wireless device while other may be connected to the network so it is to be important to be attentions MANET there are archetypally are not very secure. In this paper propose an organization address to this issues security and privacy in MANET face much difficulties in this environment. So it is to be needed security production to MANET arises as future extension of a work.

Keywords: ad hoc network, security, privacy, mobile communication

[1]. Yongguang Zhang and Wenke Lee, Security in mobile ad hoc networks, in book ad hoc network technologies and protocols(chapter-9), springer 2005
[2]. Ail Dorri and Seyed Reza Kamel and Esmail kheyrkhah, security challenge in mobile ad hoc networks.
[3]. Jian Ren and Yun Li and Tongtong Li, Providing source privacy in mobile ad hoc network.
[4]. Mrs. V. Umadevi Chezhian and Dr.Ramar and Mr. Zaheer Uddin Khan, Security requirement in ad hoc network.
[5]. Zhou.L and Haas.Z security ad hoc network, ieee network magazine, vol 13 1999


Paper Type :: Research Paper
Title :: Network Security and Types of Attacks in Network Security
Country :: India
Authors :: Ms.M.Aruna || Ms.K.Gayathri || Dr. M.Inbavalli
Page No. :: 58-63

The network technology is developing fast, and the development of internet technology is more quickly, people more aware of the importance of the network and its security. This Network security is main issue of computing because many types of attacks and problems are increasing day to day. In the mobile ad-hoc network the nodes are autonomous. Shielding computer and the network security are the critical issues. The malicious codes create a problem in the network and damages the network. This malicious codes acts as selfishness, It can use the resources of other nodes and preserve the resources of its own. After analyzing the network information and its security elements privacy, integrity and availability, this paper describes the network security privacy vector, network security integrity vector and network security availability vector; also we present the major type of attacks in MANET and the another MANET issues.

Keywords: Network, Security, MANET, Integrity, Privacy.

[1]. Neha Khandelwal, Prabhakar.M. Kuldeep Sharma, "An Overview Of security Problems in MANET".
[2]. Anupam Joshi and Wenjia Li. "Security Issues in Mobile Ad Hoc Networks- A Survey".
[3]. Ali Ghaffari, "Vulnerability and Security of Mobile Ad hoc Networks".
[4]. Shobha Arya1 And Chandrakala Arya2, "Malicious Nodes Detection In Mobile Ad Hoc Networks", Journal of Information and Operations Management, ISSN: 0976–7754 & E-ISSN: 0976–7762, Volume 3, Issue 1, 2012, pp-210-212.
[5]. Siddharth Ghansela "Network Security: Attacks, Tools and Techniques" , ijarcsse Volume 3, Issue 6, June 2013.