Paper Type | :: | Research Paper |
Title | :: | M commerce in Android Application |
Country | :: | India |
Authors | :: | Aamina Ayman T || Sindhu T |
Page No. | :: | 01-04 |
M-commerce (stands for mobile commerce) is the transaction of goods and services through wireless handheld devices. It's a complete online shopping experience, but with all the convenience of being on a cell phone or tablet. M commerce enables users to access the Internet in a wireless environment. This paper provides a way to ease the shopping experience with the help of m-commerce.
[1]. http://ijarcet.org/wp-content/uploads/IJARCET-VOL-4-ISSUE-3-874-878.pdf
[2]. https://www.doofinder.com/en/blog/physical-store-vs-online-shop-advantages-and-disadvantages
[3]. https://techterms.com/definition/android
[4]. https://accountlearning.com/advantages-disadvantages-online-shopping
[5]. https://hub.packtpub.com/9-most-important-features-in-android-studio-3-2/
Paper Type | :: | Research Paper |
Title | :: | A Survey on Neural Network in Robotics |
Country | :: | India |
Authors | :: | A. Aasifa Kouser || N. Maliha Safeen |
Page No. | :: | 05-09 |
The robotics plays an important role in this digital world. The neural network in robotics is the wide
spreading concepts. In this context we would like to stress on the process of neural networks in robotics by the
use of vacuum cleaner. A robot is an invention which serves as a computer and so it can be used by the higher
authorities to serve works to their house hold workers and also the capacity of robots can be accessed with the
help of neural network.
The vacuum cleaner robots should have a mechanisms for example the 'artificial intelligent '(AI). The artificial
intelligence (AI) is used to automate the system and to work independently without human intervention. Neural
networks is a parallel computing devices.............
[1]. Christopher M. Bishop. Neural Networks for Pattern Recognition. Oxford University Press, 1995.
[2]. Zoo Liang Cao, Yoyo Huang, and Ernest Hall. Region filling operations with random obstacle avoidance for mobile robots. Journal
of Robotic Systems, 5(2):87–102, 1988.
[3]. E. Gonzalez, A. Suarez, C. Moreno, and F. Artigue.Complementary regions: a surface filling algorithm. In Proceedings IEEE
International Conference on Robotics and Automation, pages909–914, Minneapolis, Minnesota, April 1996.
[4]. Christian Horner and Gunther Schmidt. Path planning and guidance techniques for an autonomous mobile cleaning robot. Robotics
and Autonomous Systems, 14:199–212, 1995.
[5]. Teuvo Kohonen. Self-Organizing Maps. Springer, second edition, 1997.
Paper Type | :: | Research Paper |
Title | :: | Analyzing and Tracing of Various Packet Dropping Attacks Using Containing Order Rough Set |
Country | :: | India |
Authors | :: | V. A. Afsal Basha || N. Syed Siraj Ahmed |
Page No. | :: | 10-16 |
Intrusion detection systems (IDS) aim at determining attacks against information systems in general.
It is difficult to provide secure information systems and maintain them in a secure state for their entire lifetime.
Maintenance of such information system is technically difficult as well as economically costly. With the
invention of new vulnerabilities to information system new techniques for determining these vulnerabilities have
been implemented. Today containing order rough set (CORS) has appeared as a useful mathematical tool for
dealing with uncertain data. The main theme of this paper is the analysis and evaluation of packet dropping
attack data set through the applications of containing order rough set (CORS) and other concerned notations,
formalizes method of data analysis of various packet dropping attacks and rule generation.
Keywords: IDS; CORS; Data Analysis; Vulnerabilities; Criteria
[1]. Zadeh, L. A., (1965) Fuzzy sets, Information and Control, Vol. 8, pp338-353.
[2]. Pawlak, Z., (1982) Rough Sets, International Journal of Computer and Information Sciences, Vol. 11, pp341-356.
[3]. Pawlak, Z. and Skowron, A., (2007) Rudiments of rough sets, Information Sciences, An International Journal, Elsevier, Vol. 177,
No. 1, pp. 3-27.
[4]. Pawlak, Z. and Skowron, A., (2007) Rough sets and boolean reasoning, International Journal of Information Sciences, Elsevier,
Vol. 177, No. 1, pp. 41-73.
[5]. Slowinski, R. and Vanderpooten, D., (2000) A generalized definition of rough approximations based on similarity, IEEE
Transactions on Knowledge and Data Engineering, Vol. 12, No. 2, pp. 331-336.
Paper Type | :: | Research Paper |
Title | :: | Discussion on E-Payment System, Payment Gateway and Security |
Country | :: | India |
Authors | :: | S.Uma Mageshwari || Umme- Iman taskeen |
Page No. | :: | 17-20 |
The electronic payment system has grown increasingly over the last decades due to thegrowing spread of internet-based banking and shopping. When it comes to payment options, nothing is more convenient than electronic payment. One need not have to write a check, swipe a credit card or handle any paper money; all we have to do is enter some information into your Web browser and click your mouse. It's no wonder that more and more people are turning to electronic payment -- or e-payment -- as an alternative to sending checks through the mail. This research paper reviewsthe types of electronic payment, discuss its benefits and limitations and explain about the security in electronic transactions.
Keywords: E-payment, Security, Transaction.
[1]. A survey on E-payment System Elements, Adoption, Architecture, Challenges and Security Concepts by Muddassir Masihuddin
Burhan UL islam khan, M mueen UL Islam matoo and Rashidah F Olanrewaju-Indian Journal of Science and Technology, Vol
10(20), DOI: 10.17485/ijst/2017/v10i20/113930, May 2017
[2]. Security in electronic transaction by Smita kakade, Jyoti charade ,Volume: 04, Issue: 04, Apr -2017
[3]. https://securionpay.com/payment-security/
[4]. How Secure Are Your Online Payments-https://razorpay.com/blog/online-payment-security
[5]. https://securionpay.com/blog/e-payment-system/
[6]. https://www.tutorialspoint.com/e_commerce/e_commerce_security.htm
Paper Type | :: | Research Paper |
Title | :: | Digital Twin: Genetic Algorithm in Technology |
Country | :: | India |
Authors | :: | R.Elango || IFRA V.Z |
Page No. | :: | 21-23 |
DIGITAL TWIN is used to get the best outcome of the result in industry, other researcher had presented much idea which was typical but here we present a paper on digital twin which will be most useful in the upcoming smart generation with the help of genetic algorithm for the best outcome. Digital twin is the "living object‟ of the physical that represents the asset memories and group consciousness which gathered interest in a short time. As before the digital twin technology is just used to know how that the process of the object or entity will be success in the most particular field, but now if the digital twin is implemented with genetic algorithm then the confusion in the several processes will be sought out to get the perfect result in every field, where this kind of technology is the key for the mysterious success of all industries.
[1]. Cerrone, A., J.Hochhalter, G.heber and A.Ingraffea (2014). "On the effects of modeling as manufactured geometry: Toward Digital
Twin." International Journal of Aerospace Engineering2014.
[2]. Tuegel,E.J.,A.R.Ingraffea, T.G.Eason and S.M.Spottswood (2011)."Reengineering Aircraft Structural Life Prediction Using a
Digital Twin." International Journal of Aerospace Engineering2011.
[3]. Dr. Grieves, Michael and Vickers, John (2001). Digital Twin: Mitigating Unpredictable,Undesirable Emergent Behavior in
Complex Systems (Excerpt)
[4]. Negri E, Fumagalli L, Macchi M. A review of the roles of digital twin in cpsbased production systems. Procedia Manuf
2017;11:939–48.
[5]. Rosen R, von Wichert G, Lo G, Bettenhausen KD. About the importance of autonomy and digital twins for the future of
manufacturing. IFACPapersOnLine 2015;48(3):567–72.
Paper Type | :: | Research Paper |
Title | :: | Handwritten Character Recognition Using Neural Network |
Country | :: | India |
Authors | :: | R.Elango |
Page No. | :: | 24-27 |
Neural networks are most used for processing any kind of the information, this efficient capability of neural network paved the way for its uses in recognition of patterns. The term "Recognition" plays an important role in our practical lives. It is the basic and most important property of every human. When we see an object for the first time we gather all information about that and compare its behaviors with the existing knowledge stored in our mind. This amazing feature of human brain can be built in systems and machines through the "neural network". Pattern recognition involves recognizing various patterns by finding its association with past experience or knowledge.
[1]. Cheng, B. and Titterington, D. M. (1994). Neural networks: A review from a statistical perspective. Statistical Science, 9, 2-54.
[2]. Dewolf, E.D., and Francl, L.J., (1997). Neural networks that distinguish in period of wheat tan spot in an outdoor environment.
Phytopathalogy, 87, 83-87.
[3]. Dewolf, E.D. and Francl, L.J. (2000) Neural network classification of tan spot and stagonespore blotch infection period in wheat
field environment. Phytopathalogy, 20, 108-113.
[4]. Gaudart, J. Giusiano, B. and Huiart, L. (2004). Comparison of the performance of multi-layer perceptron and linear regression for
epidemiological data. Comput. Statist. & Data Anal., 44, 547-70.
[5]. Hassoun, M. H. (1995). Fundamentals of Artificial Neural Networks. Cambridge: MIT Press
Paper Type | :: | Research Paper |
Title | :: | Frequent Item Set Mining Using Various Data Mining Techniques |
Country | :: | India |
Authors | :: | G.Ramesh Kumar || Dr.K.Arulanandam |
Page No. | :: | 28-30 |
Frequent item sets assume a basic part in numerous Data Mining undertakings that attempt to discover fascinating examples from databases, for example, affiliation rules, relationships, groupings, scenes, classifiers and bunch. The mining of affiliation rules is a standout amongst the most well known issues of all these. The recognizable proof of sets of things, items, manifestations and qualities, which regularly happen together in the given database, can be viewed as one of the most fundamental errands in Data Mining. The first inspiration for looking continuous sets originated from the need to break down alleged market exchange information, that is, to inspect client conduct as far as the obtained items..........
Keywords - Data Mining , Frequent Itemset Mining, Proposed Algorithms, Association rules in data mining
[1]. Jiawei Han, and Micheline Kamber. Data Mining – Concepts and Techniques. Morgan Kaufmann, 2 edition, 2006.
[2]. Manila, H. Local and global methods in Data Mining: Basic techniques and open problems. In Widmayer, P., Ruiz, F., Morales, R.,
Hennessy, M., Eidenbenz, S., and Conejo, R., editors, Proceedings of the 29th International Colloquium on Automata, Languages
and Programming.
[3]. Han, J., Pei, J., Yin, Y., and Mao, R Mining frequent pattern without candidate generation. A frequent-tree approach. Data Mining
and Knowledge discovery, 2004.
[4]. N. Pasquier, Y. Bastide, R. Taouil, and L. Lakhal. Pruning closed itemset lattices for association rules. In Acres des 14" journ~es ¢
Bases de donates avanc&s 4, pages 177-196, Oct. 1998.
[5]. N. Pasquier, Y. Bastide, R. Taouil, and L. Laldml. Discovering frequent closed itemsets for association rules. In Proc. of the 7th
lnt~ Conf. on Database Theory (ICDT), pages 398-416, Jan. 1999.
Paper Type | :: | Research Paper |
Title | :: | A Survey On Inventory Management System |
Country | :: | India |
Authors | :: | Halima Sadiya .F |
Page No. | :: | 31-33 |
Inventory management is the supervision of non-capitalized assets (inventory) and stock items. Inventory management softwaresystem is to track inventory levels, orders, sales and deliveries. It can also be used in the manufacturing industry to create a work order, bill of materials and other productionrelated documents.Inventory Management System which is helpful for the businesses operate hardware stores, where owner keeps the records of sales and purchase. In this model, all the information regarding the stock of the organization will be presented and generates a billing to the customer. A key function of inventory management is to keep a detailed record of each new or returned product as it enters or leaves a warehouse or point of sale. Inventory Management System will have the ability to track sales and available inventory, tells a store owner when it's time to reorder and how much to purchase..
[1]. Literature Review and Survey of Inventory Model - http://shodhganga.inflibnet.ac.in/bitstream/10603/54451/8/08_chapter%202.pdf
[2]. PunamKhobragade, RoshniSelokar, Rina MaraskolheProf.ManjushaTalmale – "Research paper on Inventory management system" e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
[3]. https://www.whatissixsigma.net/inventory-model-types/
[4]. https://www.slideshare.net/SachinBohra/inventory-management-53807389
[5]. https://www.mruni.eu/upload/iblock/019/VSE-15-5-1-03.pdf
Paper Type | :: | Research Paper |
Title | :: | Review: Robotics in Artificial Intelligence |
Country | :: | India |
Authors | :: | G.Lokeshwari || D.Nandhini || P.Aishwarya || B.Monisha |
Page No. | :: | 34-36 |
The wildest imagination of AI has been captured in scientific community as well as in the general public. Artificial intelligence and robotic both have a same common root interaction and scientific discussion. Robots and robotics leaded from intelligent machine.Robotics as a preferred testbed for artificial intelligence. Robotics researchers have also tackled some of the issues that all dealt with in the present paper but the view of robotics research towards Artificial Intelligence may not be properly reflected in the paper.
[1]. R. C. Arkin. Just what is a robot architecture anyway? Turing equivalency versus organizing principles. In AAAI Spring Symposium
on Lessons Learned from Implemented Software Architectures for Physical Agents, 1995.
[2]. A. Bicchi, and G. Tonietti. Fast and soft arm tactics: Dealing with the safety-performance tradeoff in robot arms design and control.
IEEE Robotics and Automation Magazine 11(2), 2004.
[3]. A. Bonarini, M. Matteucci, and M. Restelli. Filling the gap among coordination, planning, and reaction using a fuzzy cognitive
model. In RoboCup 2003: Robot Soccer World Cup VII, pages 662–669, Berlin, Heidelberg, 2003. Springer-Verlag.
Paper Type | :: | Research Paper |
Title | :: | An Analysis of Swarm Optimization Algorithms |
Country | :: | India |
Authors | :: | D. Jasmine Priskilla || Dr. K. Arulanandam |
Page No. | :: | 37-40 |
Swarm intelligence alludes to aggregate knowledge. Researcher and characteristic researcher have been concentrate the conduct of social creepy crawlies because of their productivity of tackling complex issues, for example, finding the most limited way between their home and nourishment source or arranging their homes. Notwithstanding the way that these creepy crawlies are unsophisticated independently, they make ponders as a swarm by communication with one another and their condition. In most recent two decades, the practices of different swarms that are utilized in discovering preys or mating are mimicked into a numerical enhancement method. In this section, eight distinctive swarm intelligence– based algorithms are condensed and their working advances are recorded............
[1]. Glover, F. and Laguna, M. (1997). Tabu Search, Kluwer Academic Publishers, Boston:MA.
[2]. Kennedy, J. and Eberhart, R.C. (1995). Particle swarm optimization, in: Proc. of IEEE International Conference on Neural
Networks, Piscataway, NJ, pp. 1942–1948.
[3]. Koziel, S. and Yang, X. S., (2011). Computational Optimization, Methods and Algorithms, Springer, Germany.
[4]. Yang X. S., (2010). Engineering Optimisation: An Introduction with Metaheuristic Applications, John Wiley and Sons.
[5]. Gandomi, A.H., Yang, X.S. and Alavi, A.H. (2013). Cuckoo search algorithm: a meteheuristic approach to solve structural
optimization problems, Engineering with Computers, 29(1), pp. 17–35 (2013).
Paper Type | :: | Research Paper |
Title | :: | Woocommerce- The New Smart Plug in for Doing Electronic Commerce |
Country | :: | India |
Authors | :: | Dr. B.Manjula || Ms.Umrah.Daaniya Khulood |
Page No. | :: | 41-45 |
A few years ago, building an online store used to be an incredibly complex task. You had to install bulky software onto your own website and pay expensive developers a significant sum of money to customize even the simplest elements of your store. Luckily, nowadays, adding e-commerce functionality to your WordPress-powered website can be done by installing a single plugin and that is WOOCOMMERCE. WooCommerce preserves many of the functions core to the standard WordPress experience, but adds eCommerce capability, configuration, and customization. WORDPRESS is one of the most popular and efficient content management platforms in the world and WooCommerce was developed by it. This alone stands as a major advantage for the uses of the plugin..
Keywords - Woocommerce, plugin, ecommerce, platform.
[1]. Wwww.http/anydifferencebetween.com
[2]. Wwww.http/atlantisthemes.com
[3]. Wwww.http/en-gb.wordpress.org
[4]. Wwww.http/en.m.wikipedia.org
[5]. Wwww.http/woocommercecookbook,PatrickRauland,PACKT publishing,Mumbai
Paper Type | :: | Research Paper |
Title | :: | Implementation of Research Scholar Utilizing Web Based References |
Country | :: | India |
Authors | :: | R. Sangeetha |
Page No. | :: | 46-50 |
Research is the work that implicates new idea and trying to discover facts happening in diverse organizations. The revolution in web nowadays helps the research scholars' in research preparation, research activity, research oriented skill development and to communicate between the research groups by using different aspects like online journals, web references, research forums and social networks. In this current scenario, most of the research scholars are using web for a better understanding and research outcome. The main purpose of this research work has been carried out to identify and analyze available internet facilities and its impact on research oriented productivity.
Keywords: Research, Social Networks and Web References etc.
[1]. AsamenewDemessieBireda, "Challenges to the doctoral journey: a case of female doctoral students from Ethiopia", October 2016,
Vol.7, No.4, pp.287-297(ISSN 2304-070X).
[2]. LiuisCoromina,"PHD students Research Group Networks- A qualitative Approach", MetodoloskiZvezki, vol.8, No.2, 2011, pp173-
189.
[3]. JegarPitchForth , "Factors affecting timely completion of a PHD: a complex systems approach", vol.12,No.4, December 2012,
pp.124-135.
[4]. Anne Moyer, "Challenges facing female Doctorial students and Recent Graduates", Psychology of women quarterly, 23(1999), pp.
607-630.
[5]. AbigaliDiamond,"The impact of doctorial careers", November 2014.
Paper Type | :: | Research Paper |
Title | :: | Analysis of Ontology Development, Editing, Mapping, Prompting, Visualizing and Analyzing Tools Based On Different Paradigm |
Country | :: | India |
Authors | :: | A. Shabeen Taj |
Page No. | :: | 51-55 |
Ontologies are helpful for to enable the interoperability across different systems and semantic web
applications. It plays a vital role for capturing domain knowledge as well as the knowledge of the domain that
can be recycled and distributed across many applications and groups. Appropriate tools are available to
develop ontology more efficiently and effectively. But finding those tools are quite difficult and some tools might
be available as open source while some may be commercial. There are varieties of tools that can be used to
make user more comfortable with their features. Each and every tool might provide best feature when compared
with other tools. To build the ontology, tool support is must. So, developers or users should know the different
tools that are available to build
Keywords: Ontology, Semantic web, Editing tools, etc.
[1]. Namyoun Choi, Il-Yeol Song, and Hyoil Han, ―A Survey on Ontology Mapping Tools‖, SIGMOD Record, Vol. 35, No. 3, Research
gate, Sep. 2006.
[2]. Sabin CorneliuBuraga, LilianaCojocaru, OvidiuCătălinNichifor, ―A Survey on Web Ontology Editing Tools‖, Vol.NN (ZZ), 2006,
ISSN 1224-600X, Research gate, 2006.
[3]. M. RahamatullahKhondoker, Paul Mueller, ―Comparing Ontology Development Tools based on Online Survey‖, Proceedings of the
World Congress on Engineering 2010 Vol IWCE 2010, June 30 - July 2, 2010.
[4]. T.Aruna, Saranya.K, Bhandari.Chetna, ―A Survey on Ontology Evaluation Tools‖, IEEE paper, 2006.
[5]. Dr. SunithaAbburu, G. Suresh Babu, ―Survey on Ontology Construction Tools‖, International Journal of Scientific & Engineering
Research, Volume 4, Issue 6, June-2013.
Paper Type | :: | Research Paper |
Title | :: | Applications of Neural Networks in Intrusion Detection |
Country | :: | India |
Authors | :: | T.Sindhu || V. Safa Mehrin |
Page No. | :: | 56-59 |
Intrusion detection systems are employed to detect the intrusion which has found its applications in securing both public data and private data. This paper deals with various aspects by providing different intrusion detection systems using neural networks for several purposes. It has various tools and databases to focus on proper intrusion detection techniques. There are several methodologies in neural networks that cause detection of intrusions using newer technologies.
[1]. Cheng, B. and Titterington, D. M. (1994). Neural networks: A review from a statistical perspective. Statistical Science, 9, 2-54.
[2]. Dewolf, E.D., and Francl, L.J., (1997). Neural networks that distinguish in period of wheat tan spot in an outdoor environment.
Phytopathalogy, 87, 83-87.
[3]. Dewolf, E.D. and Francl, L.J. (2000) Neural network classification of tan spot and stagonespore blotch infection period in wheat
field environment. Phytopathalogy, 20, 108-113 .
[4]. Gaudart, J. Giusiano, B. and Huiart, L. (2004). Comparison of the performance of multi-layer perceptron and linear regression for
epidemiological data. Comput. Statist. & Data Anal., 44, 547-70.
[5]. Hassoun, M. H. (1995). Fundamentals of Artificial Neural Networks. Cambridge: MIT Press.
Paper Type | :: | Research Paper |
Title | :: | Discussing Security Aspect In Cryptography |
Country | :: | India |
Authors | :: | S.Uma Mageshwari || Dr. R.Santhi |
Page No. | :: | 60-63 |
Cryptography is a science of writing secret messages. The various cryptographic algorithms do this process with different methodology. Each algorithm differs on the basis of key size and the number of steps invloved to produce ciphertext.. The key plays a vital role for Encryption (plaintext to Ciphertext) and Decryption(Ciphertext to Plaintext) process. This paper emphasizes terminology used in Cryptography, various algorithms, key illustration of each algorithm and shown implementation of Encryption/Decryption process with sample data by using different approaches.
Keywords: Encryption, Decryption, Algorithms, Key.
[1]. Cryptography and Network Security – William Stallings, Fourth Edition, PHI,2006.
[2]. D.Lohit Kumar,Dr.A.R.Reddy, Dr.S.A.K.Jilani,‟Implementation of 128 – bit AES algorithm MATLAB‟, International Journal of
Engineering Trends and Technology(IJETT), Vol.33, Issue No.3,March 2016,ISSN: 2331-5381.
[3]. HimjaAgrawal, Prof.P.R.Badadpure,‟A Survey Paper on Elliptic Curve Cryptography‟, International Research Journal of
Engineering and Technology(IRJET),Vol.3, Issue No.4,April 2016. e-ISSN: 2395- 0056.
[4]. https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functions-and-properties.
[5]. D.Stinson, Cryptography : theory and practice, CRC Press Inc.,Boca raton,(1995).
[6]. Atul kahate " Cryprography and Network Security", Tata McGraw –Hill Companies, 2008.
Paper Type | :: | Research Paper |
Title | :: | Awareness about Public Libraries in Vellore District: A Study |
Country | :: | India |
Authors | :: | Dr.Aariefa Basheer || Dr.K.Kaliyaperumal |
Page No. | :: | 64-69 |
This study determines the user awareness about the Public Libraries and their services in Vellore District. Objective of the paper is to study the frequency of the visit and reasons for Non Use of the Library. Dependency of Library Resources for Socio – Economic Development and their use of library on the particular day of their visit. Research methodology- Vellore Distric has 179 Public libraries it includes, branch library, village libraries and partime library and one Distric Central Library. Among these five blocks of libraries selected for data collection. A systematic questionnaire has administered for data collection. Findings - It is found that more than 85 per cent of the respondents in all the libraries under study are disseminating the local information for the community developments. However, the fact "Area library supports lifelong learning in the present educational system" is opined positively by 84 per cent and 71 per cent , 87 per cent of the Ambur and Ranipet, Vellore public libraries respectively. Suggestions were given to conduct awareness programme and orientation programme among the public about the features and benefits of reading in Public Libraries.
[1]. D'Elia, and Eleanor Jo Rodger, (1987) Library and Information Science Research, Vol. 9 (1) Jan Mar, pp 5-20.
[2]. Subramanian, N. (2014) Electronic Information Use Pattern of Yercaud Tribal Students in Salem District, Tamil Nadu, Journal of
Advances in Library and Information Science, 3 (1) pp 47-52.
[3]. Thanuskodi, S. (2012) Assessing the Efficacy of Library Services of District Central Libraries in Tamil Nadu from Users
Perception, DESIDOC Journal of Library and Information Technology, 32, (6) pp 485-492.
[4]. UNESCO (2004) "The UNESCO Public Library Manifesto".
© 2019 All Rights Reserved | Design by iosrjen