Thursday, March 29, 2018

Automatic Identification of Potential Respondents to Subjective and Objective Questions


In recent years social networking sites are very popular for user needs. Mostly people use an important social networking information source such as Twitter to find answers to their questions. Twitter contains microblogging services for informal information interactions. In this paper, we classify the subjective and objective questions using Naïve Bayes algorithm and also find the respondent users. For classification we build the feature extraction techniques such as lexical, syntactical and contextual in terms of the way they are asked and answered. For applying the classification on a larger dataset using other social media and analysis of performance. 


By Sonali U. Tapase | Prof. K. B. Manwade"Automatic Identification of Potential Respondents to Subjective and Objective Questions"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10966.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10966/automatic-identification-of-potential-respondents-to-subjective-and-objective-questions/sonali--u-tapase

multidisciplinary journal, submit paper online, indexed journal

A Review on Fast FPGA Development of RSD based ECC Processor


Elliptic curve Cryptography (ECC) is an asymmetric cryptographic system such as Lenstra elliptic-curve factorization. This provides higher security than the Rivest, Shamir and Adleman system (RSA) system. The processor employs extensive pipelining techniques for Karatsuba'“Ofman method to achieve high throughput multiplication. Furthermore, an pwerfull smodular adder without comparison and a highthroughput modular divider, which results in a short datapath for maximized frequency, are implemented. The processor supports the recommended NIST curve P256 and is based on an extended NIST reduction scheme. 


The proposed processor performs singlepoint multiplication employing points in affine coordinates in 2.26 ms and runs at a maximum frequency of 160 MHz in Xilinx Virtex 5 (XC5VLX110T) field-programmable gate array. 

By V. Surega"A Review on Fast FPGA Development of RSD based ECC Processor"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd7166.pdf 

Direct URL: http://www.ijtsrd.com/engineering/electrical-engineering/7166/a-review-on-fast-fpga-development-of-rsd-based-ecc-processor/v-surega

peer reviewed journals, manuscript submission, call for paper engineering

Detecting Malicious Facebook Application using Digital India Scheme


With 20 million installs a day third-party apps are a major reason for the popularity and addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps for spreading malware and spam. The problem is already significant, as we find that at least 13% of apps in our data set are malicious. So far, the research community has focused on detecting malicious posts and campaigns. In this paper, we ask the question: given a Facebook application, can we determine if it is malicious? Our key contribution is in developing Proguard Facebook's Rigorous Application Evaluator arguably the first tool focused on detecting malicious apps on Facebook. 


To develop ProGuard, we use information gathered by observing the posting behavior of 111K Facebook apps seen across 2.2 million users on Facebook. First, we identify a set of features that help us distinguish malicious apps from benign ones.For example, we find that malicious apps often share names with other apps, and they typically request fewer permissions than benign apps. Second, leveraging these distinguishing features, we show that ProGuard can detect malicious apps with 100% accuracy, with no false positives and a low false negative rate (4.1%). Finally, we explore the ecosystem of malicious Facebook apps and identify mechanisms that these apps use to propagate. 

Interestingly, we find that many apps collude and support each other; in our dataset, we find 1,584 apps enabling the viral propagation of 3,723 other apps through their posts. Long-term, we see ProGuard as a step towards creating an independent watchdog for app assessment and ranking, so as to warn Facebook users before installing apps And improved online infrastructure and by increasing Internet connectivity so that we can avoid fraud and cheating. 

By M. Divya | M. Monika | N. Kanimozhi"Detecting Malicious Facebook Application using Digital India Scheme"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10964.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10964/detecting-malicious-facebook-application-using-digital-india-scheme/m-divya

peer reviewed journals, manuscript submission, call for paper engineering

Geometric Modeling, Design and Analysis of Custom-Engineered Milling Cutters


The geometric modeling of the cutting tools is an important aspect for the design and manufacturing engineers from the viewpoint of shape realization. The geometry of cutting tools? surfaces based on two-dimensional (2D) projected geometry approach has certain limitations. This definition is also inadequate due to inaccuracy and non-applicability of the model for further manipulation. To address these issues, an accurate three-dimensional (3D) surface-based generic definition for a few families of custom-engineered milling cutters has been developed. 


The proposed geometric definition of the customized cutter is developed in terms of biparametric surface patches using proposed 3D rotational angles rather than the conventional 2D angles. The non-uniform rational B-spline (NURBS) curve(s) and generation of sweep surfaces based on it are utilized for the shape generation of cutting elements of the generic cutters. 

This representation scheme enables tooth shapes to be controlled by manipulating control polygons and sweep trajectories and in the process varied tool geometries can be generated. Further, an interface is developed that converts the proposed 3D parametric definition of the cutter into an intermediate neutral CAD format. This helps in rendering the cutter model in any CAD modeling environment. 

R. R. Karthi | B. Tamilarasu | S. Mukesh | K. M. Naveen Kumar"Geometric Modeling, Design and Analysis of Custom-Engineered Milling Cutters"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10986.pdf 

Direct URL: http://www.ijtsrd.com/engineering/mechanical-engineering/10986/geometric-modeling-design-and-analysis-of-custom-engineered-milling-cutters/r-r-karthi

peer reviewed journals, manuscript submission, call for paper engineering

Meaconing and Spoofing Attacks Evaluation with Enhancement in Security for Satellite Communication


Spoofing is the most dangerous threat of the GNSS infrastructure. Main goal of meaconing is to mis-¬lead the receivers tracking and sending wrong informa-¬tion about the signal position. The normal receiver is not conscious about this attack, and it acquires the counterfeit or mislead signal and discards the authentic signals. 


The rapid diffusion of GNSS location based applications which involve in large set of human activities makes the navigation system infrastructure very vulnerable against malicious attacks, which aim to disrupt the functionalities for illegal purposes. Considering into this scenario, ef-ficient and computationally efficient detection and mitiga-¬tion techniques are present in this paper in order to counteract spoof-¬ing and meaconing signals. 

The aim of this paper is to present possible and simple ap-proaches in the spoofing detection field. Signal affected by spoofing signals are considered and detection methods are described pointing out the principal steps and possible applications, and drawbacks are also considered. 

By Tarun Varma | Dr. Akhilesh R. Upadhyay"Meaconing and Spoofing Attacks Evaluation with Enhancement in Security for Satellite Communication"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10981.pdf 

Direct URL: http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/10981/meaconing-and-spoofing-attacks-evaluation-with-enhancement-in-security-for-satellite-communication/tarun-varma

international peer reviewed journal, paper publication for engineering, conference issue publication

Maintaining Secure Cloud by Continuous Auditing


Increases in cloud computing capacity, as well as decreases in the cost of processing, are moving at a fast pace. These patterns make it incumbent upon organizations to keep pace with changes in technology that significantly influence security. Cloud security auditing depends upon the environment, and the rapid growth of cloud computing is an important new context in world economics. The small price of entry, bandwidth, and processing power capability means that individuals and organizations of all sizes have more capacity and agility to exercise shifts in computation and to disrupt industry in cyberspace than more traditional domains of business economics worldwide. 


An analysis of prevalent cloud security issues and the utilization of cloud audit methods can mitigate security concerns. This verification methodology indicates how to use frameworks to review cloud service providers (CSPs). The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by potential customers. While preventive controls for security and privacy are actively researched, there is still little focus on detective controls related to cloud accountability and auditability. The complexity resulting from large-scale virtualization and data distribution carried out in current clouds has revealed an urgent research agenda for cloud accountability, as has the shift in focus of customer concerns from servers to data. 

By M. Kanimozhi | A. Aishwarya | S. Triumal"Maintaining Secure Cloud by Continuous Auditing"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10829.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10829/maintaining-secure-cloud-by-continuous-auditing/m-kanimozhi

high impact factor, ugc approved journals for engineering, special issue publication

Vehicle Density Based Traffic Control System


In this paper, we proposed a system i.e. vehicle density based traffic management system. Present day traffic signal system is fixed time based which may render inefficient if one lane is operational than the others. To optimize this problem we have made a framework for an intelligent traffic control system. 


Sometimes higher traffic density at one side of the junction demands longer green time as compared to standard allotted time. Basically, it is divided into two modules. In first module, the timing of signal will change automatically on sensing the traffic density at any junction. We, therefore propose here a mechanism in which the time period of green light and red light is assigned on the basis of the density of the traffic present at that time. 

And in second module, to reduce the crime we develop a technique of automatic number plate recognition using image processing. In this paper, the first section is introduction, second section is literature survey, third section is block diagram and components, fourth section is prototype implementation, fifth section is conclusion, sixth section is references. whatever the result is shown in this paper is partially executed. 

By Anand Gaikwad | Shreya | Shivani Patil"Vehicle Density Based Traffic Control System"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10938.pdf 

Direct URL: http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/10938/vehicle-density-based-traffic-control-system/anand-gaikwad

high impact factor, ugc approved journals for engineering, special issue publication